This website is awash with references to “Proactive” operations and bemoans the hazards of “Reactive” style security. This short article will clearly demonstrate the difference.
Reactive security is, as the name implies, based on reacting to an external stimuli, usually an unforeseen and occasionally dangerous one. The security team should be highly proficient in a set series of drills that are designed to counteract the threat once it is perceived and identified. These are often called “immediate action drills” and the military spends countless hours perfecting them.
Having said that, they are fairly rigid and thus somewhat inflexible. They have to be otherwise they don’t work. CASS Global Security also expends immense resources in perfecting a preselected number of reactive drills so in this context we are as Reactive based as any other company in the industry.
The overwhelming majority of Security Providers are 100% Reactive in nature and are stereotyped by the classic large male in a dark suit with sunglasses. These companies rely upon physical intimidation to deflect potential attackers. It also means they are generally “high profile” type services with all the positives and negatives that are associated with this style.
The catastrophic failure with ONLY Reactive style Security is that we are ceding the initiative to the opposition. This is a strategic error of the first magnitude as it allows those who wish to do our clients harm to, unhindered, chose the W5 (Who, What, Where, When and Why) and most importantly, How.
In short, Reactive means sitting around waiting for something bad to happen. Most companies endorse this style, usually complete with some murky advertising, because it is the easiest to implement and satisfies poorly educated clients who don’t REALLY understand what they are purchasing. It is the easiest to implement because the alternative requires highly intelligent human beings which are usually in short supply thus the service equation falls to the level of the lowest common denominator, which in this case can be low indeed.
Proactive security is complex, cerebral heavy, requires mastery of a number of exotic skill sets, and is nearly invisible when done correctly. Which is precisely why only a few companies are proficient at it. The premise is simple, but the execution is challenging.
Proactive security is predicated upon seizing the initiative, never ceding it, and always keeping the other guy off balance and one step behind. This is implemented in a number of ways.
We tightly control the outflow of information, often dubbed as Operational Security, to the public. That means only a trusted few know the precise itinerary of our clients at any given time. In so doing, we severely constrict or negate the “When and Where” needed to mount a successful attack. Discrete but aggressive counter surveillance, when coupled with the development of Low Level Intelligence Networks, defeats the “Who” as we can identify them before they can implement a negative course of action.
By running effective contingencies in “real time” we can sidestep the “What”. A classic example is that when executing foot or vehicle movements, all personnel are constantly assessing potential hazards. A simple example is driving, where our driver, much like airline pilots, are constantly scanning for “outs” should the car ahead swerve in front, overtake rapidly from the rear, etc. In short, our personnel are already mentally planning for adverse actions, which means we are prepared for them should they occur.
Finally, the “How” succumbs to never ending internal assessments of weak points and easy approaches. We have all been on the offensive side of the coin, and are thus highly competent in our comprehension of what is required to mount any form of attack on the client, be it embarrassment, paparazzi, or physical.
The last point is one of harmonization. This website stresses repetitively that all members of the team must work in unison. The plan will not work if the security element is at loggerheads with personal assistants, subordinate leaders, etc. Ergo we must approach all participants with the precise aim of collective effort. In so doing we create a safer ring of security around the client, improve efficiency, and boost morale.
As can be seen, Proactive Security is one of two approaches to the challenges facing affluent individuals.
As for CASS Global, it is the only way to conduct security operations.