Thesis on "Planning and Threat Assessment"

Thesis 5 pages (1355 words) Sources: 2

[EXCERPT] . . . .

Law Enforcement - Threat Assessment

THREAT ASSESSMENT and PLANNING

Personal protection encompasses many different considerations and threat assessments that are completely unrelated to the physical condition, personal reputation and character of the protectee, as well as very specific (possibly unique) threats particular to the individual. Idiosyncratic issues may include the physical condition and ambulatory abilities of the protectee, medical conditions, political affiliation, and public reputation.

Likewise, personal protection plans may also have to take into account the ability or willingness of protectees to follow directions and cooperate with protection agents.

The politically unpopular protectee represents several specific challenges, as does the protectee with ambulatory difficulties or delicate medical conditions, especially those requiring continual monitoring and treatment by medical personnel. The combination of a highly negative political profile and ambulatory difficulties with delicate medical circumstances dramatically expands the breadth of personal protection plans. More importantly, the combination of issues often raises more complex threat considerations in combination than the sum total of all individual threat factors. Nevertheless, by identifying each potential threat systematically, the threat assessment plan can account for all conceivable contingencies.

Controversial Public Figures:

Generally, the higher the public profile of a protectee, the greater the potential exposure to threats. That is equally true of traditional VIPs like political representatives, d
Continue scrolling to

download full paper
iplomats, and high profile executives. However, whereas the primary threat to the ordinary VIP is mainly posed by lone individuals who fit the traditional FBI profile for ideological zealots (Kessler 2002), the potential threats to the controversial high profile protectee are more likely to involve multiple individuals acting in concert, possibly within a much larger network of ideological opponents.

Therefore, threat assessment planning for controversial high profile public figures should include advance intelligence-gathering efforts such as monitoring available information on opposition groups and organizations. The starting point for threat assessment-related intelligence gathering efforts should emulate the record keeping procedures of the U.S. Secret Service (USSS) in connection with past threats against protectees. In addition to following up on all threats, the USSS maintains a database of all past threats which it continually consults whenever its protectees are scheduled to appear in regions from which previous threats originated (Freeh 2005).

By utilizing publicly available information and proprietary databases, the protective agent should ascertain the whereabouts of all previously identified threats to the protectee on an ongoing basis that coincides with the protectee's schedule. Apart from their physical whereabouts, various recent successes in the Global War on Terror have repeatedly demonstrated the value of monitoring Internet websites and chat rooms frequented by vocal elements of the political fringe.

Irrespective of whether or not they provide actual information as to specific threats against the protectee, those sources have proven remarkably good indicators of the climate prevailing within the opposition community at any given time. In the case of a white supremacist, advance intelligence gathering consists of monitoring the corresponding activist groups of the targets of white supremacists in their publicly available literature, schedules, and websites.

Ambulatory Difficulties:

Protectees with ambulatory difficulties pose additional problems for the personal protection agent. In addition to requiring specialized vehicles for the safe and efficient transport of a wheelchair-bound protectee, the protection agent must train to effect the transfer of the protectee to and from the vehicle used for transport and to minimize the amount of time necessary to complete the transition. In particular, with respect to ingress and egress with a wheelchair, the greatest potential exposure occurs at the entrance to the vehicle in association with motorized elevators and retractable ramps.

The protective agent must train to understand the capabilities (including the amount of time necessary for deployment and retraction) of all mechanical devices used in conjunction with providing convenient access to the wheelchair-bound protectee.

Needless to say, the less time the protectee spends in close proximity to the transport vehicle but outside its protective environment, the less the protectee's threat exposure.

Toward that end, transportation protocol for the wheelchair-bound protectee should include ensuring that any portion of mechanical cycling capable of completion outside the presence of the protectee is initiated before the… READ MORE

Quoted Instructions for "Planning and Threat Assessment" Assignment:

I am requesting freelance ***** for this paper. Freelance *****: Please be as specific as you can with the details for the planning and threat assessment for the individual. Strict APA format as usual.

This is a planning and threat assessment paper based on the scenario that you have to provide planning and thgreat assessment for a man in his 40's who is confined to a wheelchair and requires attendance by a nurse 24/7 due to respiratory and other medical conditions. He is an extremely high profile white supremacist who is outspoken and controversial. Many people hate him.

How to Reference "Planning and Threat Assessment" Thesis in a Bibliography

Planning and Threat Assessment.” A1-TermPaper.com, 2008, https://www.a1-termpaper.com/topics/essay/law-enforcement-threat-assessment/10165. Accessed 3 Jul 2024.

Planning and Threat Assessment (2008). Retrieved from https://www.a1-termpaper.com/topics/essay/law-enforcement-threat-assessment/10165
A1-TermPaper.com. (2008). Planning and Threat Assessment. [online] Available at: https://www.a1-termpaper.com/topics/essay/law-enforcement-threat-assessment/10165 [Accessed 3 Jul, 2024].
”Planning and Threat Assessment” 2008. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/law-enforcement-threat-assessment/10165.
”Planning and Threat Assessment” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/law-enforcement-threat-assessment/10165.
[1] ”Planning and Threat Assessment”, A1-TermPaper.com, 2008. [Online]. Available: https://www.a1-termpaper.com/topics/essay/law-enforcement-threat-assessment/10165. [Accessed: 3-Jul-2024].
1. Planning and Threat Assessment [Internet]. A1-TermPaper.com. 2008 [cited 3 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/law-enforcement-threat-assessment/10165
1. Planning and Threat Assessment. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/law-enforcement-threat-assessment/10165. Published 2008. Accessed July 3, 2024.

Related Thesis Papers:

Threat Assessment Essay

Paper Icon

Threat Assessment

The objective of this work is to prepare a report that plans threat assessment in the scenario of an event in which attending at the courthouse will be… read more

Essay 5 pages (2120 words) Sources: 5 Style: APA Topic: Law / Legal / Jurisprudence


Planning and Pollution Control Annex 2: Development Essay

Paper Icon

Planning and Pollution Control

Annex 2: Development on Land Affected by Contamination

Assessment of the Planning Policy Statement 23: Planning and Pollution Control

Annex 2: Development on Land Affected by… read more

Essay 3 pages (941 words) Sources: 3 Topic: Environment / Conservation / Ecology


Planning Budgeting Term Paper

Paper Icon

Planning, Programming and Budgeting: Understanding Financial Management and Enterprise Resource Planning and How it Is Applicable in the Real World

The objective of this work is to research planning, programming… read more

Term Paper 11 pages (3133 words) Sources: 6 Style: APA Topic: Business / Corporations / E-commerce


Risk Assessment and Contingency Planning Essay

Paper Icon

Risk Assessment and Contingency Planning

Risk assessment is a common undertaking in many organizations where they look at the areas that need the allocation of resources most and allocate accordingly… read more

Essay 4 pages (1530 words) Sources: 3 Topic: Management / Organizations


Security Planning and Assessment Thesis

Paper Icon

Security Planning and Assessment

Security Assessment

A security assessment is the process of looking at a business and supporting technologies and determining what security risks are present. It is a… read more

Thesis 7 pages (2028 words) Sources: 7 Style: APA Topic: Management / Organizations


Wed, Jul 3, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!