As in any approach within the ATAC Companies, we preach preventative maintenance is the best maintenance. Building the most appropriate team is step one, advancing beyond the highest standards in the industry. We are motivated to help each other become stronger, more educated, and more aware. ATAC, as a company and as an organization, recruits top subject matter experts (SMEs) to bring comprehensive current information that will serve to educate and enhance our corporate clients on correct protocols for security.
The basis of advanced tactics and countermeasures for executive protection team building and corporate security is to understand the complexity of the potential risk, willingness and ability of any and all threats.
First, there are seemingly boundless outlets for corporate terrorism, espionage, upset employees, jealous competitors and kidnap and ransoms. Access points can touch you from any vantage point to gain a superior position.
Modern day criminal syndicates and common criminals penetrate your corporate veil by: online, email, utility services, food services, HVAC, bank accounts, company stakeholders, smartphones, social media, and internal employees who were not properly vetted; these are just some of the access points to the vulnerabilities of your corporation.
State of mind
- Mental Discipline
- Control and management of fear
- Concentration/focus under stress
Threat Identification: Three phases of threats: possible, confirmed or no threat.
- Is it a threat?
- Could it become a threat?
- Human Threats
- Non-Human Threats
- Casualty Assessment
Biomechanics
- Portrait of vital and non-vital areas
- Footwork
Tactical Organization
- Accuracy, timing, penetrations
- Zeroing, zoning, speed penetrations
- Multi-directional threats
- Offensive attacks
- Guarding secondary attacks and how to terminate them while maintaining control
- Low and no light conditions
Anatomical Considerations/Neutralization Concepts and Techniques
- Anatomy
- Approach
- Close Quarter isolation’s
- Distance Vs. Re-Action Time
- Concepts of projectile weaponry
- Movement Multiple threats
- Restraints (Zip Ties, Cuff, Improvised)
- Joint Locks
Considerations: Understanding Environments
- Environmental
- Tactical
- Political
- Financial
- Compromised
Unarmed
- Restraints (Zip Ties, Cuff, Improvised)
- Joint Locks
- Multiple Attacks
- Movement Flow
- Movement of Principal
- Crowd Control
- Ground Work
Armned
- Blade
- Baton/Stick
- Improvised Weapons
Team Concepts
- Formations
- Emergency Procedures
- Two man team: Single target objective
- Two man team: Multiple targets, successive targets
- Multiple Attacks
- Movement Flow
- Movement of Principal
- Crowd Control
- Ground Work
Flow drills
- Offensive posturing
- Defensive posturing
- Speed and sensitivity drills
- Neutralization drills
- Simple Scenarios
- Unarmned Vs. Blade
- Blade Vs. Blade
- Unarmned Vs. Baton
- Baton Vs. Unarmned
- Baton Vs. Blade
Transportation: One of the most vulnerable and exploitable times is during transportation.
- Evasive driving techniques
- Advance support procedures
- Detection techniques, identifying potential threats before they manifest into dangerous situations
Event Security: Reduce the risks of security issues for business conferences, corporate events, general meetings, VIP parties, and public appearances.
- Corporate Events
- Social Events
- Business Conferences
- General Meetings
- Access Control
- Perimeter Security Screening
- Crowd & Parking Control