One of the questions we start off every day with in the carrying out of our protective duties to our clients is: how do we prevent untoward events, threats or outright attacks on our clients? It is not enough to be there and be aware, ready to take on and neutralize a threat. There must be proactive, preventive work – solid detection work that exposes threat individuals and their plans. Basically, we want to deduce or know the other side’s plans, and here at WWPro our team uses all available resources and tactics to achieve this – so when we’re on the job protecting you we’re also on the job preventing that which you need protection from.
One of the ways we prevent action is through Surveillance Detection (SD), a strategy of professionally surveilling for potential threat individuals, and further, to detect patterns and even plans. This is intelligence, and intelligence is the checkmate moves for any close executive protection agency. This intelligence underpins the SD strategy that we establish for any given client. This is part of our threat assessment, and it includes many levels and resources of inquiry. At each point, our SD goals are based on actual reasons for the SD, so they are fully justified as a countermeasure.
Once an SD plan is in place, then the actual surveillance takes place. For instance, if we’re on executive protection for a client at their residence, we’ll use recording devices to watch the environs as the client departs or returns to the residence, and as well, to be observant of vehicle patterns as the client’s vehicle is traveling, or to track if there is hostile image-taking of the client. There is a route assessment. A venue assessment. Additionally, there are checks we run on individuals who may have had some kind of intimidating contact with the client or others around the client. Each of these and many more has to be of a vigilant, observational science and art. All this information is collected and analyzed daily by our team.
Finally, countermeasures are recommended to respond to the different levels of threats. These countermeasures include: obtaining a restraining order, communication about the threat with individuals who should be informed, mobile surveillance responses, and defensive response to the threat.