Professional Documents
Culture Documents
Textbook Understanding Personal Security and Risk A Guide For Business Travelers 1St Edition Goslin Ebook All Chapter PDF
Textbook Understanding Personal Security and Risk A Guide For Business Travelers 1St Edition Goslin Ebook All Chapter PDF
https://textbookfull.com/product/strategic-security-management-a-
risk-assessment-guide-for-decision-makers-2nd-edition-karim-
vellani/
https://textbookfull.com/product/executive-s-guide-to-personal-
security-2nd-edition-katz/
https://textbookfull.com/product/rational-cybersecurity-for-
business-the-security-leaders-guide-to-business-alignment-dan-
blum/
https://textbookfull.com/product/borderless-leadership-global-
skills-for-personal-and-business-success-zlatica-kraljevic/
Trading Options for Dummies for Dummies Business
Personal Finance 3rd Edition Duarte
https://textbookfull.com/product/trading-options-for-dummies-for-
dummies-business-personal-finance-3rd-edition-duarte/
https://textbookfull.com/product/cyber-strategy-risk-driven-
security-and-resiliency-1st-edition-carol-a-siegel/
https://textbookfull.com/product/understanding-islam-a-guide-for-
teachers-imran-mogra/
https://textbookfull.com/product/understanding-your-migraines-a-
guide-for-patients-and-families-1st-edition-morris-levin/
https://textbookfull.com/product/the-routledge-companion-to-risk-
crisis-and-security-in-business-first-edition-edition-kurt-j-
engemann/
HOMELAND SECURITY Goslin
Understanding
Uniting broad, time-tested security principles and the author’s 35-plus years of
experience with international security, intelligence, and foreign affairs, Understanding
Personal Security: A Guide for Business Travelers offers a detailed yet practical
framework on which to develop personal security awareness and training programs.
Personal Security
and Risk
As a critical resource for any travelers who may need to make fast, smart judgments in
high-risk environments, this book helps readers analyze threats, threat actors, and the
common adversarial characteristics, as well as the function of risk as a differentiating
principle. This versatile text blends abstract organizing principles with street-honed
instincts, becoming equally valuable to security managers with previous experience
and those corporate or non-profit organizations with employees in developing nations.
Features
• Author draws from more than 3 decades of experience in intelligence and security
A Guide for
s
• Encourages readers to consider the threats specific to the region they are headed
then make their assessment from there and plan accordingly
• Gives workers, mid-level employees and managers a way to develop the intuitive Business Travelers
sixth-sense needed to make fast, smart judgments on what to do and how to
behave when they travel to, or live and work in high-risk environments
• Intended as a blueprint for corporations that need to develop in-house intelligence
reporting about their global operations
Charles E. Goslin
K29109
Charles E. Goslin
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize
to copyright holders if permission to publish in this form has not been obtained. If any copyright material
has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, trans-
mitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereaf-
ter invented, including photocopying, microfilming, and recording, or in any information storage or
retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright
.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and
registration for a variety of users. For organizations that have been granted a photocopy license by the
CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
Acknowledgments xvii
Author xix
Introduction xxi
vii
viii Contents
Chapter 4 Kidnapping 63
Introduction 63
Classifying Types of Kidnap/Abduction Operations 65
Type 1: Money but No Politics 65
Type 2: No Money, No Politics 66
Type 3: Money and Politics 67
Type 4: Politics, No Money 67
Tip of the Iceberg: Keeping Kidnap Threat Trends
in Perspective 68
Top Severe Kidnap Threat Countries for 2016 69
Regional Summary 72
Latin America 72
Africa 74
Asia 75
International Patterns and Trends in Kidnapping 76
The Gap between Rich and Poor and Failed States 77
The Collapse of Communism and the End of the
Cold War 77
A Weak Ethical Environment 77
Arab “Spring,” Arab “Winter,” and Islamic Extremism 77
A Closer Look: Kidnap for Ransom 78
Target Selection Development Phase 79
Intelligence Gathering Operation 80
Route Analysis, Snatch Location Selection,
and Logistics 80
Abduction Operation 81
x Contents
Taxis 217
Buses 220
Trains 221
Rental Car and Driving 222
Safety and Security Risk Considerations 223
Air Transportation 229
Prepacking for Security and Safety 229
At Security Screening 230
In the Terminal 230
On the Plane 231
Emergency Situations 232
References 233
Endnotes 234
Conclusion 245
Index 247
http://taylorandfrancis.com
Acknowledgments
xvii
xviii Acknowledgments
One does not put prose to paper for a book-length topic without
having had someone from the beginning who unfailingly encouraged
the project. My wife Cinthya Trueba’s tremendous patience and unfail-
ing support is of incalculable value. My mother and my father’s active
encouragement to follow my muse and write got me started on the habit
at an early age, and coupled with their spirit of exploration and adven-
ture, I got the itch to live and work abroad. Not seen, but very present
between the lines of my exhortations on what one should do to survive
and stay secure, are my children. A routine 9-to-5 job in our cities here
in the United States was not to be my lot in life. My kids were a tether on
my heart that always got me home, no matter the destination. Alexandra
Goslin Boren and Sebastian Goslin are in the heart and the soul of this
book.
Finally, my late son Cabot Goslin, my guiding spirit throughout the
long weekend nights writing this book. He would have wanted me to
write this book.
Author
xix
http://taylorandfrancis.com
Introduction
xxi
xxii Introduction
INTRODUCTION
CONCEPT OF EFFECTIVENESS
1
2 Understanding Personal Security and Risk
present for the purpose of security, they are just that—security on paper,
not in reality. This absurd example is used to illustrate a point regarding
personal security: if the measure cannot be remembered and acted on
when it is most needed, it is useless. Just as the effectiveness of physical
security is measured in how well the various layers of defense are imple-
mented, the effectiveness of personal security is measured in how well the
various layers of defense are available for immediate recall from memory.
Personal security is, unlike other security disciplines, much more inti-
mate because it is principally focused on one key asset: you.
The second set of concepts within personal security that are different are
those of threat, vulnerability, and risk. These discrete elements of risk
take on new meaning when considered in the personal security sphere.
The terms threat and risk are often used interchangeably. In fact, these
terms are not the same. It is important to have a clear understanding
of what each term really means and how it applies to your personal
security.
A threat, defined in the context of personal security, is an event with
an undesired impact on your health and well-being. It is a supplemental
ingredient to risk and should never be substituted for it. The components
of a threat include the threat agent, or the actor, and the undesirable
event. Threat events can be classified by type and category into inten-
tional events that are planned and carried out or unintentional events
such as accidents and natural disasters.
Vulnerabilities are weaknesses intrinsic and inherent to you that can
be exploited by a threat actor or are susceptible to hazard events. In
terms of personal security, these can include bad practices, such as never
varying your routine or schedule, and bad habits, such as being easily
distracted or inattentive, drinking too much, or being indiscreet about
your location or business. Another example of bad practice is checking
into a hotel, on the 40th floor beyond the reach of fire-fighting rescue
ladders.
Risk is a more complex term. It is a calculus that, technically speak-
ing, takes into measured consideration the loss potential to an asset that
will likely occur if a threat is able to exploit a vulnerability. Another way
of stating this is that it is the potential harm to you if a threat actor such
as a kidnapper or a terrorist is able to take advantage of a weakness in
your personal profile. Notice that conditional words such as potential
and likelihood are included in the description of risk—these are impor-
tant conditional terms that can be scaled up or down depending on the
weight and the relevance of threat, vulnerability, and impact to you.
Important Personal Security Concepts 3
CONCEPT OF TIME