Mitigating Targeted Violence in Protective Operations
Unlike conventional security or law enforcement roles, the primary mission of protective services is narrowly focused—preventing specific threats from impacting the individual under protection. This mission can be categorized into five essential areas:
Prevention of targeted violence
Prevention of accidental harm
Prevention of medical crises
Prevention of unauthorized removal (kidnapping)
Prevention of reputational harm
Through meticulous advance planning, protectors not only steer their clients away from threats but also facilitate their daily movements, increasing their overall efficiency and security. While some in the industry discourage tasks like carrying bags or assisting with mundane activities, real-world scenarios often require adaptability. In some cases, taking control of a shopping cart is not just practical—it’s also a form of low-profile security. A lone male trailing a female shopper can attract attention, whereas pushing the cart himself creates a more discreet presence. Moreover, an improvised tool, like a cart, can serve as an effective barrier if necessary.
Despite our best efforts, history provides countless examples of security failures where an intervention could have mitigated or prevented harm. This discussion will focus on the first element: Preventing Targeted Violence.
Understanding Targeted Violence
Targeted violence refers to deliberate acts of harm, including assassination attempts, physical attacks, or intimidation tactics. These threats can manifest through direct assaults—striking, kicking, throwing objects—or through the use of weapons ranging from knives and firearms to more sophisticated methods like explosives or chemical agents. While conventional threats remain a primary concern, advancements in weaponized technology have expanded the spectrum of risks, introducing chemical, biological, and radiological threats into modern protection strategies.
Historically, firearms have been the most frequently used weapon in attacks against high-profile individuals, with varying levels of success. Consider the following incidents:
Gerald Ford, 1975: Lynette “Squeaky” Fromme attempted to shoot President Ford in Sacramento, but the firearm had no chambered round. Secret Service Agent Larry Buendorf's quick action prevented further escalation.
Gerald Ford, 1975 (Again): Just weeks later, Sarah Jane Moore fired a shot at Ford in San Francisco but missed due to a misaligned gun sight. A well-positioned security perimeter forced her to fire from an extended distance, reducing accuracy.
Ronald Reagan, 1981: John Hinckley Jr. managed to fire six shots within seconds outside the Washington Hilton, striking multiple individuals, including the president. The swift response of Secret Service Detail Leader Jerry Parr ensured Reagan’s immediate evacuation to a medical facility, ultimately saving his life.
While not all attacks reach this level of severity, even seemingly minor incidents—such as a thrown egg at Arnold Schwarzenegger in 2003—can create disruptions and safety concerns. Protective specialists must account for a wide range of possible threats when planning operations.
Proactive Strategies to Mitigate Threats
When intelligence or risk assessments indicate a potential for targeted violence, protective teams must implement proactive countermeasures. Strategies may include:
Adjusting the Principal’s Schedule – Whenever possible, altering routes and appearance times can minimize predictability and reduce exposure.
Relocating Events to Controlled Environments – Securing a venue with layered access control minimizes vulnerabilities.
Expanding Security Perimeters – Increasing standoff distance between the principal and potential aggressors significantly reduces risk.
Deploying Additional Personnel or Barriers – Physical barriers and a well-positioned security team can prevent direct engagement.
Utilizing Protective Intelligence Networks – Collaboration with law enforcement or specialized intelligence personnel can provide real-time threat assessments.
Assessing and Managing Crowds – Identifying individuals who exhibit pre-attack indicators allows security personnel to act preemptively.
A well-structured protective strategy revolves around controlling the principal’s environment. The more control we exert over external variables, the more effectively we can mitigate risks.
Stay Connected & Support the Mission
If you're passionate about protection, risk mitigation, and continuous learning in the field of executive security, I invite you to join my newsletter. You'll receive industry insights, case studies, and expert strategies straight to your inbox.
Additionally, if you find value in this content and would like to support the work I do, consider making a small donation. Your contribution helps keep these resources available and allows for the continued sharing of best practices in protective operations.
Thank you for being part of this professional community. Stay safe, stay prepared.