HOW WE ASSESSING RISK FOR EXECUTIVE PROTECTION MISSION
- Tomer Israeli
- Mar 21
- 5 min read

What to expect when you come to do risk assessment to a new client:
Data collection, sites survey and interviews of key figures
Who you protect?
What you protecting from? (You don't what you don't know)
Where you protect? location?
When? schedule? travel plans?
Resources security and admin in order to do the job
Sensitivities issues such as privacy or other concerns you should consider is also part of the assessment
Creating a report and consider all the data collected in-order to eventually write a proposal and a security plan macro and micro case by case.
Introduction In the modern, volatile landscape of global business and political travel, protecting high-value assets and individuals is a complex, high-stakes mission.
The classic image of a suit-clad bodyguard as a static shield has evolved into a sophisticated, dynamic paradigm where prevention and proactive strategy are paramount.
This is "High-Risk/Executive Protection," and at the center of any successful mission is a rigorous, constantly evolving risk assessment. Among the many methodologies that have shaped the industry, one name stands out for its blend of intelligence, behavior detection, and unconventional tactical thinking: the Israeli Tactical School (ITS) and its adherence to the Shin Bet/Israeli Security Agency (ISA) doctrine.
The Israeli method is not just about what you do, but how you think. It is fundamentally an aggressive, intelligence-led philosophy that prioritizes stopping an attack before it starts (staying "left of bang") rather than purely reacting to an immediate threat. While Western systems often rely on extensive, static checklists and checklists, the ITS assessment is based on a foundational set of "behavioral detection" and "predictive profiling" principles.
This article will deconstruct how risk is assessed and mitigated in an ITS executive protection mission, exploring its core pillars and tactical application.
The Foundation: Predictive Profiling and Behavioral Detection (The ISA Method) The most critical and unique differentiator of the Israeli method is Behavior Detection (BD) and Predictive Profiling. Traditional risk assessment often centers on analyzing a specific individual's risk level—their known enemies, political stances, and previous threats. This is, of course, a critical part of the puzzle.
The ITS assessment, however, expands this, asking not "who is the threat?" but rather "how would an attack happen in this environment?" Predictive Profiling is the "adversarial mindset." Before a team can assess a location, they must become the attacker.
The mission commander and recon (advance) teams analyze a location from a potential assailant's perspective, looking for optimal places for an ambush, a surveillance post, or a quick escape route.
A regular security survey might focus on points of access; the Israeli recon identifies "Choke Points"—unavoidable, high-risk locations where a motorcade must slow down or stop, and "Kill Zones." Building upon this is Behavioral Detection.
Developed and refined by the Shin Bet, this is the art and science of spotting people who are engaged in suspicious activity.
BD looks for anomalies from the environment's baseline. We don't just look for an individual with a concealed weapon (which can be hidden); we look for the psychological and physiological signs of stress, nervousness, and intent—the person who is scanning the area too intensely, whose micro-expressions betray their anxiety, and whose behavior deviates from everyone else's. An individual can mask a weapon, but it is extremely difficult to mask their internal stress when they are planning or about to commit a hostile act.
The Seven Pillars of Tactical Planning: A Cohesive Risk Assessment Framework This proactive approach is integrated into the operational DNA through the "7 Pillars of Tactical Planning," which form the architecture of the risk assessment itself.
1. Intelligence & Information: The Lifeblood A mission's success depends on data. But the ITS methodology goes deeper than just threat files. We assess risk by analyzing the "Principal" (the client) themselves—not just who they are, but their public profile, digital footprint, and the habits that can be observed and exploited. The risk assessment creates a "baseline" for the client's standard day and looks for the vulnerabilities created by that routine.
2. Predictive Profiling: The Adversarial Mindset This pillar takes the "adversary's perspective." For every part of the mission—from the hotel lobby to the motorcade route—the team asks, "If I were a professional assassin, where would I attack?" They profile the environment and then profile the adversary’s most likely modus operandi (MO), determining whether the threat is a lone wolf with a primitive weapon or a sophisticated team planning a coordinated, multi-stage ambush.
3. Surveillance & Counter-Surveillance: Anticipating the Watcher Risk is assessed with the assumption that the VIP is already being watched. A critical component of the risk assessment during the advance recon phase is to determine where an adversary would most likely place a surveillance team. The methodology incorporates "surveillance detection" not as a luxury, but as a primary risk mitigation tool. We look for vehicles or people in positions that provide optimal viewing angles but have no other logical reason to be there.
4. Concentric Rings of Protection: Structured Defense The Israeli model employs structured defense through "Concentric Rings," and risk is assessed for each level:
• Inner Ring: Close Protection (the Diamond formation or Box). We assess the direct physical space around the VIP and the ability of the direct bodyguards to cover and evacuate.
• Middle Ring: Technical Security & Transportation. We assess the risks associated with the safe houses, vehicles (e.g., armored or unarmored), and the reliability of communication systems.
• Outer Ring: Intelligence & Advance Teams. This ring is entirely about identifying and stopping threats before they reach the inner circles. This is where most risk mitigation happens.
5. Behavior Detection (ISA Method): The Signature Technique This is the moment-to-moment, dynamic assessment. Whether in a large crowd or a corporate foyer, the team is constantly scanning for the anomalies that signal a threat. They are not just looking at faces, but at behavior patterns and physiological indicators (heavy breathing, excessive sweating, inappropriate attire for the weather). If the crowd is flowing left and one person is cutting hard right, that's an anomaly that requires an assessment.
6. Deception & Concealment: Reducing the Target If the adversary can't predict where the VIP is, the probability of a successful attack plummets to near zero. A massive part of the risk assessment involves "break-routine" tactics—identifying and scheduling irregular routes, using "soft" vehicles that don't scream "security detail," and using "decoy" vehicles or dummy details to mislead potential adversaries. We assess whether we can completely obscure the client’s presence in a way that minimizes public exposure.
7. Deterrence: The Hard Target Image A critical form of risk mitigation is to ensure that a scout for the adversary concludes that an attack is too difficult or unlikely to succeed. Deterrence is achieved not just by having a large team, but through the obvious professionalism, situational awareness, and hard, confident visual posture of the detail. We assess the public perception of the team to ensure they project an image of an unbeatable, proactive force.
The 7 Pillars are not a linear checklist, but a set of filters through which every operational detail is processed. This unrelenting focus on proactivity, behavior detection, and unconventional, adversarial thinking is what sets the Israeli Tactical School methodology apart, preparing protection specialists to face and mitigate high-risk threats that traditional checklist-based systems may overlook. Israeli Tactical School Executive Protection Training A look at the training for this methodology in a high-threat environment, showcasing the intense, reality-based scenarios that teach agents to manage risk and protect VIPs.




Comments