Personal Protection for Religious Leaders and Dignitaries: Developing a Climate of Trust and Confidence…


Personal Protection for Religious Leaders and Dignitaries presents some very unique challenges. The vocation and calling of many high profile leaders often requires them to have frequent interaction with the public. The security detail members that are familiar and sensitized to the spiritual and emotional climate of the environment will be in a better position and prepared to deal with the challenges.

The personalities and idiosyncrasies of the (principal, protectee)play an enormous role into the ebbs and flows of the protective detail. If we are uncertain of our ability to choreograph within this sometimes unpredictable and highly emotional charged environment we will find ourselves overwhelmed, jittery and frustrated. Our confidence will most certainly wane and impact our ability to provide the proper service for our client.

The ability to blend into the environment requires more than one’s dress attire and professional demeanor, blending requires an innate ability to interact with many people, some who are emotionally needy and others who possess some strong individualistic beliefs. There are some extremely intense encounters and will require an abundance of patience, tact and strength for the detail member.

A Jittery and Frustrated Practitioner:

We must be careful of not overreacting and acting out inappropriately to a non-threatening situation. Some protective members have prematurely advised their principal about non-essential situations, which only creates anxiety, frustration and may reveal the need for further training. Sometimes protective detail members have prematurely removed their principal from a non-threatening situation; this can foster distrust in the relationship and cause the client to lose confidence in the protector’s ability to handle matters professionally. Although there are moments when informing or providing cover and evacuating is deemed totally appropriate.

An understanding of key aspects such as behavioral nuances and leakage are essential towards our success, this will enable the practitioner to respond proactively. Equally important is combining these talents with a background in threat analysis. Threat assessments and threatening behavior must be identified early and evaluated before we can implement skillful and tactful interventions.

The Importance of Threat Assessments and Behavioral Analysis:

Personal Protection and Threat Assessments:

“There is a distinct difference between those who make a threat or those who pose a threat.”

There are several practitioners in the industry who are tasked with the responsibility of conducting a thorough threat assessment. These professionals have a clear understanding and knowledge of the basics and processes that are necessary to complete a thorough threat assessment and implement sound interventions. Sadly; there are too many who endeavor the task of handling threatening communication and threatening behavior that possess little understanding and knowledge of the basics and processes.

“Experience and training is necessary to determine the credibility of the threat itself”

The threat assessment process is essential to the successful practitioner and will assist in reducing unnecessary panic and the expenditure of unnecessary resources. All threats should and must be taking seriously, but not every threat is deemed credible and in fact some are indeed a hoax. Matters become more and more complicated when untrained and inexperienced professionals overreact and /or respond inappropriately to the communicated threat and/ or threatening behavior.

All threats should be properly assessed and evaluated to determine if there is any credibility to the communication or behavior. Threats classifications are placed upon a continuum which tends to range from – No Identified Risk to Extreme Risk. Keep in mind the continuum is fluid as the threat fluctuates.

7 Primary Factors when undertaking a Threat Assessment:

1. Is there anger, rage or frustration in the communication

2. Evidence of personalization

3. Specificity of threat

4. Does author have the technical knowledge to carry out the threatened actions

5. Does the author possess a strong commitment to the cause

6. Do ancillary incidents occur at the same time as the threatening communication

7. Escalation in communication increased frequency

Consider Developing and…

  • Identifying a member of the security detail to be responsible for interviewing and evaluating threats, letter writers, unusual interest from fans, etc.
  • Task that person to gather facts, track investigation and make final assessments
  • Provide for behavioral training for the designated staff member who is tasked with this responsibility

Behavioral Training is Key to Our Overall Success:

Behavioral-based training and practical experience handling numerous and diverse cases will be quite helpful in our profession. Occasionally the security professional may learn of someone who demonstrates an unusual interest in your protectee (principal), or you may encounter an emotionally disturbed person.

A practitioner who is well rehearsed in behavioral analysis will have an advantage in identifying many of these individuals well in advance and can properly assess the situation without ever breaching that sensitive inner layer of protection. When deemed necessary, the trained security professional will also know how to use creativity when implementing the appropriate interventions.

The complexity of the environment is further challenging due to the fact that there are persons we encounter who are sometimes delusional and need to be handled accordingly. Delusional – based stalkers are not uncommon and will occasionally arise from the crowd and begin their own stalking campaign. Therefore a team member who is adequately trained in aberrant behavior will be much better prepared to intervene in such instances.

Bring it all Together:

A personal protection practitioner with a strong background in behavioral analysis and conducting threat assessments will be a highly valued asset for any client. A protector who is trained and experienced in the behavioral aspects will be highly effective in the tactical and practical applications. A protector who has his tactical techniques together but lacks behavioral insights will more likely overreact or act out inappropriately. Some protectors will remain inactive due to the lack of behavioral sensitivities. There are situations that are just on the fringe that may suddenly escalate, while early intervention may have quelled the situation. Unpleasant and embarrassing scenarios happen to most professional protectors, but are less frequent when we are sensitized to the nuances and leakage aspects of behavior.

The Incorporation of Behavioral Analysis: The Use, Effectiveness and Benefits for Security Professionals and Protective Details…

Bill Martin, PPS

What is Situational Awareness?

Most of us have used certain techniques known or similar to what security professionals call situational awareness, a highly effective tool in crime/violence prevention. The observation skills used and incorporated make us sensitized to something that deviates from what is standard, normal, or expected (anomalies) within a particular environment. Our security team and protective detail was adequately trained and experienced in these aspects. We found them highly effective and quite successful.

The Incorporation and Integration of Behavioral Analysis:

Behavioral identification/analysis techniques incorporate a different set of skills and mental process. The incorporation of leakage is actively integrated throughout our assessments. The trained and experienced professional will assess the involuntary clues known as (leakage) and gain vital building block information.

The security practitioner who is experienced in behavioral assessments (leakage) understands and comprehends that people tend to reveal certain things about themselves unconsciously and involuntarily, becoming sensitized to these types of aspects enables us to act on the information we assess in a professional and appropriate manner.

A Personal Story That Illustrates Behavioral Analysis and Leakage:

It was a cold holiday weekend and we were traveling to visit family in another state. My wife and I decided to use a car ferry to cross state lines. We really enjoy the scenery traveling across the Long Island Sound. The weekend was great, and it was time to drive back home. As we were approaching the ferry entrance, we noticed several Department of Homeland Security Agents and a Strong Police Presence. They also had several dogs checking vehicles for explosives.

Was there a credible threat?

I pulled into the entrance and parked my car in a staging area, not uncommon before boarding the vessel. We were approached by a DHS Agent, while waiting in the staging area. I was in the driver’s seat, my wife in the passenger’s seat and my young son in the back seat of the car. I rolled down the window as the agent approached the driver’s side of the car. The Agent was friendly and respectful. He engaged me in casual conversation. The questions he asked were not intimidating. “How are you doing this morning?” “Where are you going today?” Simple casual questions and yet it caught me slightly off guard.

The final question he asked was a perfect example of an aspect of leakage (dress attire):

“Who was in the Marine Corp?” How did he know I was in the Corp? I asked him why did he ask and how did he know? I happened to be wearing a hooded sweatshirt with a small Marine Corp emblem inscribed on my upper front left side. I put this on in the morning as a matter of routine, I did it unconsciously. He was using behavioral analysis techniques to clear us or possibly detain us. Of course, we were cleared in a matter of minutes. He assessed and mentally processed the information he needed in a fraction of time, which gave him the confidence to clear us. He was professional, respectful and friendly in all his communications and mannerisms.

I told my wife afterwards; he just threw me off guard using similar techniques that I am accustomed to utilizing.

How does Leakage Work?

  • The more you think about something the closer you come, to doing it.
  • If a person believes in something so strong and intense it will begin to leak out.
  • Fantasy exists before the action; you can see fantasy before the action through leakage.

Let’s Break it Down Further Applying One Aspect of Leakage (Dress Attire)

I used the analogy of jewelry (an aspect of leakage) during a full day presentation at the Pennsylvania Institute of Criminological and Forensic Sciences. It was a great interactive exercise and tons of fun for all the professional attendees.

Accessories like jewelry are not a functional article of clothing as are shoes, which are generally worn for comfort, style, protection and the occasion. People wear jewelry for several reasons, but in most cases, it is not necessary or required to wear before leaving one’s home (unless for medical purposes). Some of the most common reasons for wearing jewelry are for fashion or sentimental value. Less common reasons are simply for attention and attitude. But either way jewelry often reveals a small piece of someone’s personality and may also give a trained behavioral analyst more vital building block information.

Case Example Mass Murder:

The Northern Illinois University Gunman Steven Kazmierczek revealed certain things about himself prior to the massacre on Feb 14, 2008.

His violent and horrific actions came as a shock to many including friends, family members, students and faculty. These are just some of the questions that often plague us in the aftermath of such horrific violence.

Body Imagery is another form of communicated behavior (leakage): 

Kazmierczek was certainly revealing his thoughts, feelings, personal interests and/or passions. They were leaking out in the form of body imagery. 

Protective Detail Case Example of Leakage: (Possessions and Non- Verbal’s)

A single white male who appeared to be in his mid to upper thirties is observed walking into to the church. Most men that attend the Sunday Services will be well-groomed and dressed in business type attire. This male was no different because he was finely groomed and dressed in a business suit and tie which appeared to be clean and pressed. He did not indicate or possess anything unusual on the surface. Because many men will enter the building with a small briefcase or something very similar.

But the cues and nuances he was leaking in his non-verbal’s were raising some behavioral concerns coupled with the manner in which he handled the briefcase. We mentally processed the varying different aspects of leakage and decided to engage him in a friendly casual conversation. We would quickly learn what we needed to know.

He affirmed our concerns; his possessions (the briefcase) gave him a sense of importance and great significance, the briefcase made him feel powerful, something of a higher status. He went on to inform us that he was intending to take the stage and assume the role of the head minister. This information allowed us to set boundaries and align ourselves appropriately. He would go on to begin a stalking campaign in which our principal became the primary target. We carefully monitored the situation and involved other supports and disciplines that assisted us in safeguarding the situation and our principal.

Those who are entrusted with the high calling of providing personal protection for their clients may encounter certain other type of stalkers who tend to be attracted to powerful and important people.

Celebrities, high profile political and religious figures are prime targets for identity – type stalkers which are looking for fame themselves, and the recognition they can attain through their acts.

Leakage aspects will help assist the close protection operative during their day to day work, they will become more and more sensitized to behaviors associated to leakage. Individuals and/or groups that believe strongly about something will leak out through one or more of these aspects. The practitioner may also recognize cues and nuances of what is deemed important and of value to a particular individual through various forms of leakage.

Much like a threat assessment… What someone spends their time, money and energy upon is of great personal interest and highly valued:

What one learns in these few seconds or minutes may prove valuable insight and possibly save lives.

It’s Much More Than Book Knowledge:

The ability to be sensitized with the skills to mentally process concerning behaviors varies differently from person to person. Some have thought that simply by reading books or attending training seminars automatically equips us for the task at hand.

All of our team members had been trained in behavioral identification and threat analysis, but not all were able to translate what they learned in the classroom and apply that knowledge into the real world.That means real life application is much more challenging than what we ever realized.

Development through Training & Mentoring:

A good leader must work patently on developing those within the team that are not readily grasping the training and material; here mentoring may be the preferred method. The rewards are huge when a team member begins to grasp the concepts being taught, it produces such a confidence.

Some of our team members began to learn that there are cases that are truly threatening and volatile and then there are other situations that require sensitivity, tact and careful interaction, because nothing can undue a professional (even momentarily) like overreaction or inappropriate approaches.

Those of us who understand the use and effectiveness of applying behavioral analysis will reap the rewards and benefits. Incorporating and integrating the knowledge we learn will no doubt have an advantage in crime and violence prevention.

Organizations, institutions and corporations will also benefit by the professionalism and preemptive measures employed by a trained practitioner:

These are some of the follow-up measures that skilled practitioners may choose to implement: