Four Ways to Prevent an Assassination

When a Ukrainian politician stepped out of a television studio in Kiev last fall, a bomb detonated and wounded him while killing his bodyguard. By studying past assassination attempts, we can better illuminate concepts and techniques that help keep our protectees safe. After reading the above article, here are four protection concepts that could have prevented, or at least reduced the lethality, of this attack.

  1. Red Zones. The immediate area where surveillance/assassination teams are likely located (red zones) when observing their target.
    • Lesson:Trained protectors conduct routine Surveillance Detection, particularly in the time preceding a protectee’s movement.  By conducting surveillance detection, the protector in Ukraine could have detected suspicious activity and decided on an alternate exit. (Unknown if protector conducted SD.)
  2. Theory of Controlled Spaces.  The protectee departed the television studio (a controlled space) for the sidewalk (an uncontrolled space). Because the sidewalk is a more observable space for surveillance teams and assassins, it became a more vulnerable space for the protectee.
    • Lesson: Reduce the distance between the vehicle and the building’s exit point. Less distance walked between the building’s exit and awaiting vehicle = less time the protectee is observable to surveillance teams or vulnerable to assassination.
  1. Public Arrival, Private Departure.  Private arrivals are not always an option for protectees making a scheduled public appearance.  Private departures, however, should always be the preferred option.  Due to the cover, concealment, and physical security measures often afforded to a private departure, protectors can better safeguard their protectees. (Unknown if a private departure was possible in the Kiev attack.)
    • Lesson.  If possible, always consider multiple exits for scheduled and unscheduled departures. To gain access to multiple entry and exit points, conduct a thorough Advance and coordinate with onsite security to gain full access to the building and property.
  1. ACE(Access – Concealment — Escape).  As described in Just 2 Seconds, the assassin(s) in Kiev held the ACE. Through the assassin(s)’ own concealment, the protector and protectee were unaware of any suspicious behavior that often precedes an attack. Moreover, following the attack the assassin(s) escaped.
    • Lesson: As protectors, we can hold our own ACE — except our “C” is Cover and “E” is Evacuation. And by incorporating Surveillance Detection, Theory of Controlled Spaces, and Public Arrival, Private Departure — we can better hold our ACE and create a “hard target.”

Click here for past Blogs.