CIPP – Official Protection Level 2

CIPP – Official Protection orientation. We begin by discussing the concepts of protection and the requirements, duties and responsibilities of the protection officer. Attendees are then explained the answer to the question “What is Official Protection?” This period of instruction will specifically discuss the mindset and protective conduct expected of the sworn officer.  This initial portion of the training also breaks out the differences between protecting someone in the private sector and protecting someone like the President of the United States, more specifically how the local or state law enforcement officer’s mission initiatives rests between those two extremes. The training will also include an in-depth conversation on the difference  between high threat and high risk protection and the appropriate “applications”  and profiles used to address each respectively.

  • Job description of the official protection officer
  • Protective philosophy
  • Protection terminology
  • Protection concepts and mission sets
  • Applying protection mission under the sworn duty of a law enforcement agency

Assessment of the Threat

  • Assessment of the principal’s protective culture
  • Threat and vulnerabilty assessment
  • The protective operation plan
  • Reason, method and motivation of attacks
  • Steps to the “X”, effort of the threat
  • Utilizing agency intelligence capabilities to support protection mission

Protective Advance Work 

  • Protective Advances
  • Site specialist
  • Route planning
  • Reports / Presentations

Protective Detail Operations 

  • Principles of Protection
  • Formations / Working the Principal (RF system)
  • Threat commitment 1 to 6 officer shift
  • Immediate Action scheme
  • Assault on Principal
  • Designing and establishing the protective sphere
  • Choreography
  • Communications
  • Principal briefing

Tactical Support and Special Skills (minus) 

  • Route Surveys
  • Motorcade protocols
  • Transportation security
  • Surveillance detection routes
  • Vehicle management
  • Postings and event phases
  • Crisis management pathways
  • Special event protection checklists
  • Target surveillance procedures
  • Various surveillance platform
  • Countermeasures concepts in combating surveillance
  • Surveillance vulnerabilities evaluation table
  • Working along side and or supporting higher and adjacent protection elements