Bodyguard and his Responsibilities

Bodyguard and his Responsibilities

(From Imtiaz Ahmad Malik, CEO Reichert Security)

 

A bodyguard (or close protection officer/operative) as per Wikipedia definition is a type of security guard, government law enforcement officer, or servicemember who protects a person or a group of people — usually high-ranking public officials or officers, wealthy people, and celebrities — from danger: generally theft, assault, kidnapping, assassination, harassment, loss of confidential information, threats, or other criminal offences. The personnel team that protects a VIP is often referred to as the VIP’s security detail.

 

In layman language, Bodyguards are the security operatives with superior experience and acumen having direct interaction with the principal. Bodyguards have specialized trainings. They often a part of the security team or they perform independently. Bodyguards generally know the activity schedule of the principal and plan their moves and perform responsibilities accordingly. Bodyguards keep the information confidential.

 

Numerous people hire bodyguards for the reason that they are in public eye and there could be several associated risks. For example, celebrities face risk from overzealous fans and from the people who doe not like their work as a belief. Similarly, some people always want to take advantage of a VIP, s wealth. Few hire bodyguards who are rich, famous, famed and celebrated, hence feel threatened.

 

Revelries and the jealousy could be another reason to feel at risk. There could be many reasons creating a real demand to have the professional bodyguards for the safety and security.

 

 

 

Prime Responsibility of a Bodyguard

 

Bodyguard must be a skilled person to prevent and mitigate threats. Bodyguard must be able to stand in front of danger. Bodyguard should assess the imminent threats, security issues and devise a strategy to tackle the same. The work of a bodyguard is extensively challenging and sensitive.

 

Other skills

 

  • Correct assessment of the situation
  • Reading the imminent
  • Excellent judgment
  • Common sense
  • Must know team work and should be able to perform
  • Stout and healthy
  • Must have good training
  • Weapon handling
  • Preferably should have the driving

 

  • Calculative decision-making ability
  • Physical health
  •  
  • Trust worthy
  • Communication skill must be good
  • Good height and must look like a
  • Truthful

 

Uniform

 

Bodyguards that protect high-risk principals may wear safety Jacket or the body armer. The bodyguard may also have other ballistic shields, such as Kevlar-reinforced bags / jacket. Principal if does not have grave threats, bodyguard can wear normal but smart uniform comfortable enough to perform his duties without any trouble.

 

Weapons

 

Bodyguard can be armed, without armed depending upon law of the land and the prevailing threats.

 

Difference between Bodyguard and the Bouncer

 

“As per wikipedia, A bouncer (also known as a doorman or door supervisor)[1] is a type of security guard, employed at venues such as bars, nightclubs, cabaret clubs, strip clubs, casinos, hotels, billiard halls, restaurants, sporting events, or concerts. A bouncer’s duties are to provide security, to check legal age and drinking age, to refuse entry for intoxicated persons, and to deal with aggressive behaviour or non-compliance with statutory or establishment rules”

 

Just to understand difference between both “A bouncer is a security doorman who refuses entry to an individual or makes them leave an event if they are deemed to be too intoxicated or causing trouble. Bodyguards are employed to protect individuals from assassination attempts, kidnapping, or other attempts on their physical well-being”.

 

” The body guard is tasked with protecting one certain individual or a small group from

physical harm. Unlike bouncers, they’re likely to be armed, where permitted by law”.

Deniss E. Bolužs

Difference between Security Guard and the Bodyguard

 

Difference between both is a bodyguard is responsible for one or more individuals whereas a security guard is responsible for one or more premises.

 

Who may require a bodyguard?

 

  • Celebrities
  • Government officials

 

  • Wealthy individuals
  • Individuals who have been threatened in some way
  • Event Companies for the events like High Marriages
  • People who are celebrating events at home (for temporary reasons).
  • Anybody renowned
  • The one who faces some risks due to any reasons
  • Travelers
  • Persons who need protection due to any reasons

 

Responsibilities / Duties

 

The major role of a bodyguard depends on several factors.

 

  • Protection role given by the security company or the security
  • Can be assign the responsibility of close
  • Escort guarding role
  • IED detection if the area is sensitive
  • Surveillance and checking and monitoring not to be under surveillance.
  • Direct interacting with the principal
  • Assessing potential threats
  • Neutralizing any snatching, kidnapping or harassment attempts to the
  • Crowd control

 

How Bodyguard Squad Works – Concepts and Procedures

 

We will not discuss here the hiring procedures but purely will deliberate on concepts and work modalities. The concept is to know the threats and associated risks to the principal. Bodyguard gets the planned schedule of all activities well before time. As a team leader or in individual capacity makes the plan for the safety and security of his principal or the group. Arranges transportation, assess the route clearance, destination hazards, security arrangements, location of safe havens etc.

 

He plans his activities keeping in view the principal activities like if principal is travelling, he would see whether Principal is travelling through Railway or public transport or moving by plane, where he has to attend the meetings etc. He will ensure that his coordination in relation to safety and security are complete. He keeps all confidential.

 

When principal exposes himself to a range of risks mingling up in public or participates in rally and addresses to large audience, team leader of the bodyguard squad plans for foolproof protection.

 

Bodyguard team leader seeing the itinerary, plans one or more bodyguards for hanging over security to check the route is completely clear or not.

 

Clearance of Car / Vehicles

 

Bodyguard clears the car /vehicle for the principal and does not leave it un-attended as searched car /vehicle has to be attended by the member of a team. Unattended vehicles are exposed to multiple dangers like some IED can be attached etc.

 

Bodyguard ensures complete protection of the principal when he /she is coming to the car to travel. This moment is considered critical, as 60% of such attacks happen when the protected person is in or around the vehicle.

 

Travelling

 

Travel is a very crucial activity. It has to be planned by the team leader very carefully. Travelling is always vulnerable to many hazards like target killing, ambush and other route perils. Bodyguard plans the halt points/ rest areas carefully. Ensures that choke points are cleared safely.

 

Destination

On arriving destination, two to three bodyguards (depending upon total strength of the squad) dismount from the vehicles and ensure that the site is cleared from safety and security point of view. When they confirm, give okay to other team members, they open the door and take the client to the final destination using flank procedures. If the principal is moving like shopping plaza or moves to some of the playing ground whose entries are open, bodyguard team splits in to small groups, few move with the principal, other perform monitoring around open entrances and exits while one or more remain around the vehicles. If the Principal is attending a marriage ceremony or the meeting in a secure building, bodyguards need to secure him keeping distance and should look after the entrance gates etc.

Return to secure location

On return the same care is adopted as the duties performed during move to the destination. Exiting from the vehicle and walking to the door exposes the client to risk, so the distance is kept as short as possible to cut down the time it takes to reach the door. Vehicle should be parked in carriage, door locked due to the security reasons.

The team leader will ensure collection of weapons, will make safe and keep it in to the designated place like weapon kote or the weapon box.

 

 

Disclaimer

 

This disclaimer informs readers that the views, thoughts, and opinions expressed in the text belong solely to me, and not necessarily to our company or our employees. There is no responsibility on my part for this article for not proving beneficial to anyone or caused any loss /damaged when implemented.

Author

Major Imtiaz Ahmad Malik ( R ) Tamgha-i-Basalat , a result oriented Chief Executive of Reichert Security Services (Pvt) Ltd with vast experience at operational and strategic levels in  Pakistan  Army. Managing international organizations and operations with proven success in managing large organizations

Walkthrough Gates and Metal Detectors

Understanding and Selecting Walk Through Security Metal Detectors Walkthrough Gate

Walk through metal detectors fall into one of two general categories. The first style of walk through metal detectors provides single zone detection. The second style provides multi zone detection. Basic multi zone detectors like the Garrett MT 5500 will identify that the target is on the left side or right side. To understand the difference, I will provide a quick example. Let’s say that an individual walk through the opening of the metal detector with a concealed weapon located at their ankles. Both the single and multi zone detectors will locate the target. The difference between the two is that the multi zone detector will be able to identify the location of the target, on either the left or right side of the individual. More advanced multi zone detectors like the Garrett PD 6500 will pinpoint the specific location from head to toe and on the left or right side.

Pinpointing the location of the target quickly is important so that your security personnel can respond swiftly. Larger crowds require greater through put. If you are scanning a large volume of individuals, a multi zone metal detector will let you process more individuals quicker.

Single Zone Walk Through Metal Detectors (walkthrough gate­)

Multi Zone Walk Through Metal Detectors:

What are the typical locations and uses for a walk-through gate metal detector?

At one time, security metal detectors were primarily seen just in airports and correctional facilities. Today we see walk through detectors in a variety of locations including police stations, night clubs, schools, public and private buildings and for corporate work place security. They are also used in manufacturing facilities, warehouses for loss prevention, nuclear facilities, transportation terminals, courthouses, historical landmarks, sporting events, arenas and at concerts. One of the first places to pick up a walk through detector from us was a roller skating rink, and that was nearly 25 years ago.

Choosing the best configuration.

Will your detector be set up at one location or do you plan to move the detector from location to location? If you will be moving the detector often, you will want a light weight portable walk through metal detector or one that can be moved easily.

Setup and operation:

Modern security walk thru detectors are easy to setup and operate. Each unit will come with a detailed manual and instructional setup video. Digital electronics are easily adjusted through a touch pad and LCD display. The walk through metal detectors come with factory preset programs. You can adjust the detectors for your specific location or the type of object that you are looking to locate. Based on the level of sensitivity that you choose, the detector can be adjusted to locate various targets.

Controlling the flow of traffic is important when setting up your metal detector. You will want to be sure that all individuals that enter or leave the building are directed through the detector. It is a good idea to have a basket or tray setup next to the metal detector for individuals to place any metal objects in to. It is important that watches, coins, keys, belts and other large metal objects are removed before walking through the detector. The better organized you are, the better your through put will be.

Do I need a security metal detector wand?

You can think of the walk thru detector as the general screening device. Once you have identified that an individual has a concealed item, you will need to precisely pinpoint it. A metal detector wand will let you locate the target quickly. Security wands will alert you to the target with an audible tone, target identification light, vibration or a combination of the three. The wand metal detector is a required accessory for use with the walk-thru gate.

Metal Detector Security Wands featuring Audio and Vibration Alerts:

Rolling out your security plan:

While it is a significant investment, do not get too caught up on the cost of acquiring your walk through metal detectors. Your largest expense will be the annual cost of security personnel to operate the equipment. While you may already have staff on hand, you might find that you will need to allocate funds to increase staffing. Armed with a good knowledge of your organization and the available types of security metal detectors, you are now ready to choose the best equipment. We are here to help you put the pieces of the puzzle together. Feel free to speak with one of our Security Product Specialists to discuss your specific needs.

Understanding and Selecting Security Guards / Bouncers

By Imtiaz Ahmad Malik

First of all, you need to select a security company which is doing superior work in the field. Just seeing on internet foe few renowned security companies wouldn’t suffice. You need to check for the repute and response. When selecting a company, you may ask your friends and family, see which security company is ISO Certified. Evaluate its work history, check all credentials, held meetings, must see who is heading the company in that area like CEO. You should know that CEO is highly professional and know the job. His back track must tell you that he /she has been working in renowned security setups or has worked in Multinational companies or in UN (Projects or directly worked in UNDSS). If CEO or the chairmen does not have security background that too of international organizations, its likely that you may face problems in getting better services. If you need Security guards, bodyguards, Escort guards, persons for close protection, Executive protections, for travel security or you need home security, you need to select a company with all care.

Most renowned companies of Asia do not provide the services to every client. They select their target market and work in the same. Few good security companies do not provide single security guard, those companies deal in bulk. In Pakistan very few companies have the expertise in training of Body guards and CPOs. Those companies working in provision of Bodyguards are very few in Lahore. If you are in need to travel somewhere or have some event like high marriages or you need to have good protocol with superior bodyguards, CPOs, or the escort guards, you can google , see the website instead of face book, read the blog, look for the services and select your security company for initial stage. In second phase, talk to them, see their professional approach instead flowery offers and attractive discussion. You should be clear on following.

* Full licensure according to state and local laws

* Reputation with previous clients and certifications like ISO certification.

* References

* Policies

* Equipment and weapons

* Management Policies

* Cost vis-à-vis quality

* Responsiveness of a security company

 

Author

Major Imtiaz Ahmad Malik ( R ) Tamgha-i-Basalat , a result oriented Chief Executive of Reichert Security Services (Pvt) Ltd with vast experience at operational and strategic levels in  Pakistan  Army. Managing international organizations and operations with proven success in managing large organizations

Business Security and Good Practices

Business Security and Good Practices

Business security is paramount important for thriving your business. You must be aware of workplace violence, business espionage, identity theft issues and confidentiality requirements dictate that your business must be safe from every side. Here we evaluate for the requirement of all types of security to secure our businesses.

Types of Security

We can divide the security into two parts, Physical Security and the Technical or the E Security (Electronic Security).

Concept of Physical Security Arrangements

Physical security can include may include following.

  • External Security Arrangements for a facility
  • Access Control Arrangements
  • Closed Circuit Television Arrangements and sensors
  • Intrusion Detection Arrangements
  • Promove

External Security Arrangements

  • Early warning systems like fence linked with the alarm system
  • Security Gate Systems (Vetting arrangements)
  • Bollards: Fixed & Electrohydraulic
  • Vehicle Entry Barriers
  • Guard Shelters
  • Security Guards
  • Security Lights

Access Control Arrangements

  • Turnstiles
  • Walkthrough gates
  • Identifications and vetting of each entry
  • Logs
  • Biometric arrangements for identification and for record keeping.
  • Security Guard Checks
  • Explosive detectors
  • Metal Detectors
  •  

Closed Circuit Television Arrangements and Sensors

Common Types of Security Sensors in Modern Security Devices

  • Infrared (IR) Security Sensors.
  • Photoelectric Beams.
  • Microwave Sensors.
  • Tomographic Motion Detection Sensor.
  • Microphones.
  • Glass Break Sensors
  • Vibration Detection Systems
  • IP Video Systems
  • Analog Video Systems
  • Hybrid Video Systems
  • Digital Video Recorders (DVR)
  • Network Video Recorders (NVR)
  • PTZ Components

Promoves

Promoves (Protection arrangements during moves) are very important for all VIP movements. VIPs always need close protection (Bodyguards, CPOs, Bouncers, Well trained guards). Following arrangements may be planned according to the threat in the environment and keeping in view the associated risks. Undermentioned arrangements can be done according to the needs.

  • Escort Vehicles
  • Escort Guarding
  • Body Guards or the trained security guards
  • Bouncers
  • All must be with superior weapons if needed according to the situation.

 

Document Security

“Out of Bound” ne written on a visible entry place where your documents are kept. None should be allowed to go into that office except the authorized persons. All physical documents must have an electronic data and all electronic data must have physical data.

Good Business Practices

 

Reichert Security carryout analysis for different incidents to determine the corrective measures. Here few good practices are being mention for the business. The same may help you to deal with the physical and the technical security.

Quickly change alarm and login passwords when an employee leaves the company.

  • Require employees to update passwords regularly or employ a password keeper.
  • Thoroughly check employment references and conduct background checks.
  • Keep evacuation plans updated
  • Keep parking lots and building exits well lit.
  • Use keyless locks
  • Invest on CCTV
  • In/out records
  • Ensure Punctuality
  • Carryout stakeholders’ engagements
  • Keep equipment serial wise
  • Fix Walkthrough gates., There are number of walkthrough gates, different types and categories. Invest for good walkthrough gate which should give good results. You can google for walkthrough gates, check good companies. Few Chinese companies are found in making walkthrough gates and delivering to Pakistan with a much cheaper rate. If you need walkthrough gates in bulk, may contact directly with the foreign vendor otherwise you can purchase or can get on rent the walkthrough gates.
  • Keep Good Security Guards, Bodyguards, Bouncers or the escort guards for yours and foe the security of your facility. Its said that you have a security or you don’t have. There is no word having a normal security. So always keep good security guards
  • Beside good guarding, Keep door entrances clear of undergrowth like shrubs / trees, or other objects that block visibility.
  • If you deal with cash and physical checks, vary bank drop-off times or use an armored transport service.
  • Track all company-owned equipment, including serial numbers, and store information off-site.
  • Conduct building walk-throughs before closing for the day.
  • Implement clear desk policy.
  • Keep the area or the facility well lit.

What Physical Security Best Practices Don’t Look Like

(Extract of an article of Andrew Tyler, a certified Security Engineer)

Some organizations think that blocking physical access to the data center, such as by having it behind a locked door with only one entrance or exit, is enough. However, there’s quite a few more elements that would need to be involved there.

Just tracking ingress and egress to the building or to the data center doors itself does not provide a full complement of security compliance.

If you’re not logging access to this secure area, you’re also missing some best practice (and likely compliance) requirements. The clipboard sign in sheet next to the door isn’t going to cut it here either.

You want to be able to see point in time who accessed that area, when they accessed, where they went, and what they did.

Many log structures are done by badge access or biometrics. While these seem secure on paper, there are some definite flaws in just relying on them for physical security. Consider scenarios where a badge, key fob, etc. is lost or stolen.

The badge is assigned to a certain person, so your logs say it was that person that accessed your data center when in reality it was likely someone with bad intent in that scenario.

You may contend that biometrics could fix that problem but they have their own blind spot: consider how that log would look if your employee was leading a customer tour or scanned a co-worker in while they were both chatting in front of the data center.

Though these situations may not seem worrisome, a would-be criminal could employ social engineering tactics to plant themselves among that tour group and your employee may not be aware before they scanned that entire group in.

Typically, this is where something like video monitoring can help. You get recorded, historical insight into that secure area access. However, there’s also some underlying security issues with the typical video system setup that the average business uses.

Most video systems being used in the average business place is for ingress and egress. They’re typically DVR associated systems and the cameras are mounted in strategic locations to track just access to the building.

But putting that DVR device inside the data center – which isn’t uncommon – can defeat the whole purpose of having the cameras in the first place, since it’s easy to steal and provides a single point of failure for the entire environment.

Another potential tripping point is lighting. As I mentioned above, having only a basic light switch controlling the lighting in your data center won’t do your video system much good as it’s unlikely an individual looking to do something unsavory is going to turn the lights on beforehand.

A better option is motion activated lights. These will automatically turn on when they detect movement within their coverage range – literally shedding some light on the situation as your video system rolls.

Based on the above, lets assume a business has this not uncommon setup: check-in at the front desk, badge-only access to the data center, a DVR video system in the data center with a camera mounted inside the data center, and standard lighting. This checks off many of the basics on paper. Here’s a common scenario that can play out with that setup:

 

Andrew Tyler is a certified Security Engineer with Contegix. He believes in persistence, technical excellence and creativity in developing solutions.

 

Author

Major Imtiaz Ahmad Malik ( R ) Tamgha-i-Basalat , a result oriented Chief Executive of Reichert Security Services (Pvt) Ltd with vast experience at operational and strategic levels in  Pakistan  Army. Managing international organizations and operations with proven success in managing large organizations

Access Control

Access Control

Access control is paramount important for the security of coworkers and for the safety and information. For superior access control systems, the organization can have layered security which restricts all unauthorized entries in a befitting manner. The access control system should provide complete record of in/outs, Stay time, movements, authorized access attempts and unauthorized access attempts. Similarly, information security is protected. Information should travel on need to know basis.

 

The definition (Wikipedia) of access control is, In the fields of physical and information security, access control (AC) is the selective restriction of access to a place or other resource. Permission to access a resource is called authorization.

Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft or terrorist attacks whereas information security is the practice of protecting information by mitigating information risks, It typically involves preventing or reducing the probability of unauthorized/inappropriate access to data, or the unlawful use, disclosure,  disruption, deletion, corruption, modification, inspection, recording, or devaluation of information.

 

First of all we see the risks of access control then we can easily evaluate the mitigations and counter measures and good practices.

 

It is for sure that aantivirus won’t stop a physical attack but for the purpose, physical security would be required.  Without proper protection measures in place, your business is left vulnerable to physical threats.

Deceptions in Access Control

Most workplaces are secured by some type of access control, whether a locked door or a swipe-card access point. These physical security measures are, unfortunately, easily deceived.

When multiple people pass through doors, and only the front person shows identification or swipes card. The people following behind get the opportunity to get success without following the access control protocols.   

1.      How to overcome the Deception

a, Fixing of anti -tailgating doors.

b, Deployment of hi-quality guards

c, Implementation of access control policy strictly.

d. Hardening Physical Access Control Measures

(1) Physical access control can be made harden to stop the vehicles through barriers, bollards, crash gates (Steel Gates with sliding designs), vedge, Drop Arm (Could be manual or the electronic).

(2). Portable barriers can also be used like plastic barriers which can be lifted on place to another. The same barriers can be devised also. The aim must be cleared that barriers should work efficiently to block or stop the vehicles.

Bollards can be fixed, moveable. Steel bollards are generally fixed and the plastic bollards can be removed easily and shifted from one point to another.

(3). For the facility entry turnstile gates integrated with electronic device can prove effective measure for the control entry of the pedestrians.

Theft of documents

Your office is likely to have papers and documents lying around in many places, from desks to printer stations. Sensitive documents can easily become unaccounted for – and fall into the wrong hands. Even if they are not taken from the office, a visitor could see information that you wouldn’t want them to see.

1.      Measures to Overcome

a.      Clear Desk Policy.

  • It good to keep your belongings safe. If you are working in a large office or even small office, clear desking policy will help you to keep your belongings safe.
  • You may not have thought over it but by clearing the desk daily, you can save your money by not losing your important documents, project information and other valuable items.

(b). Keeping Laptop or the computer screen visibility limited. 

(c)Keeping diaries and note books well within control.

Un-Vetted and unaccounted Visitors and Guard’s duties

Un-vetted and Unaccounted visitors pose a grave risk, they can plan and execute a negative activity selecting their own time and day. For an instance, some incident happens, it would be difficult for the organization to check the details of visitors as they were not recorded.

2.      Check on Vvisitors

a.      Check through Guards

b.      CCTV

c.       ID Doors and visitor passes

d.      Recording

e.      Identification cards

f.        Biometric for the registered people.

  1. Guards Duties at Access control
a.      Handling the guests and Invitees

The normal procedure for handling the visitor depends on the types of visitors. whether the visitor is planned, unplanned, or a VIP, etc.

    • Guard should complete all the access control protocols in relation to identification. 
    • If advance notification is done through advance notification form, then he may have identification information already and can Talley the data for confirmation. 
    • If guest has some appointment, guard should confirm it by the office barer who has invited him or fixed the appointment. 
    • Guard should issue visitor badge / card before allowing him to proceed inside premises.
    • Record the entries.
b.      Deliveries of Assets /Stores
  • All the organizational SOPs should be implemented. All stores arriving at Access Controlling Points (ACP) should be properly checked as per the given check list.
    • Guard should complete the screening.
    • Make record of delivery items like Parcel, mail, food, commercial goods. Perishable items should be inspected for the its health.
    • None should be allowed to be delivered for which permission is not granted. 
c.       Venders Access
  1. Guard should carryout screening.
  2. Should check authorizations
  3. Nature of visit, if vendor is making visit of some maintenance team, nature of work must be asked.
  4. Recording entries on log book

 

  1. Issue the proper access badges and record the badge details in the visitor logbook, mentioning date and time.
4. Guard’s ACP Record Details

Guard should maintain following records at ACP.

  • Identifications
  • Verifications
  • Checking authorizations
  • Search of people and the vehicles before allowing to enter.
  • Log Book Entries should include name, ID details, vehicle details, location, pass number issued, time and date, signatures
5. Guard’s Exit check list
  • Search of outgoing vehicle
  • Search of personnel
  • Depositing back of the visitor card already issued,
  • Ensure same vehicle entered the premises /site on which time and date

 Employees, at times, commit crime of steeling identifications

You will observe that own employees do not take it as a crime or the offense using someone else’s identification for access or the exit, meaning by there is no access control at all.  The violators may be dealt using organizational policies.

 

d.      Measures to Overcome

a.      Training

b.      Checks by the Guards

c.       CCTV

Author

Major Imtiaz Ahmad Malik ( R ) Tamgha-i-Basalat , a result oriented Chief Executive of Reichert Security Services (Pvt) Ltd with vast experience at operational and strategic levels in  Pakistan  Army. Managing international organizations and operations with proven success in managing large organizations

Kidnapping

KIDNAPPING / ABDUCTION OF CHILDREN

Child abduction or child theft  (Wikipedia ) is the unauthorized removal of a minor (a child under the age of legal adulthood) from the custody of the child’s natural parents or legally appointed guardians.

The term child abduction includes two legal and social categories which differ by their perpetrating contexts: abduction by members of the child’s family or abduction by strangers:

  • Parental child abduction is the unauthorized custody of a child by a family relative (usually one or both parents) without parental agreement and contrary to family law ruling, which may have removed the child from the care, access and contact of the other parent and family side. Occurring around parental separation or divorce, such parental or familial child abduction may include parental alienation, a form of child abuse seeking to disconnect a child from targeted parent and denigrated side of family. This is, by far, the most common form of child abduction.
  • Abduction or kidnapping by strangers (by people unknown to the child and outside the child’s family) is rare. Some of the reasons why a stranger might kidnap an unknown child include:
    • illegal adoption, a stranger steals a child with the intent to rear the child as their own or to sell to a prospective adoptive parent

Most people are aware of kidnappings but might not be knowing the reasons and the volume. I will not make the people dreaded and terrified of the kidnapping data but just for the information, few statistics will be mentioned to have the right impression of sensitivity. Open sources reveal the data as under.

  • Around 8 million children are reported missing each year worldwide.
  • Teenagers particularly girls are kidnapped for trafficking (for sex).
  • In 2020, almost 400 000 juveniles got abducted in the US.
  • Around 20 000 children become missing annually in Australia.
  • In India, around 100 000 children go missing every year.
  • Thousands of children get abducted and sold in China.
  • A child gets reported missing every two minutes in Europe.
  • Figure exceeds 6.0 kidnappings out of 100,000 for Pakistan
  • New Zealand is the country with the top child abduction rate. 9.5 kids get kidnapped per 100 000 citizens.
  • As the 2020 statistics show, one in six children who ran away from home was a part of child sex trafficking.

There are major two types of kidnappings/ abductions.

  • By the Family members / relatives / Known People
  • Non-Family members / Strangers

Other Interesting Facts are.

  • The age group that gets abducted the most is teenagers, especially girls.

Where abduction rate is more (Places / Locations / Timings)

  • the child on their way to or from school, in parks, in the streets, etc
  • Generally, abductions are found in afternoon (Around School Timings, Park Timings).

Safety and Security Measures: –

Children Should

  • Never say they are alone if they answer the phone/ mobile.
  • Avoid answering the door if you are alone.
  • No gifts from strangers.
  • Not going faraway for playing. Do not play in isolated areas.
  • Know your telephone number and mobile numbers.
  • Know that no one has the right to touch any part of their bodies
  • Do not go into the vehicles of anyone else other than your own car.

Parents Should

  • Newly born babies are mostly kidnapped from hotels or maternity homes etc. Most of the nurses are involved too. Never leave the child un-attended.
  • Parents should be aware of new changes the child is adopting.
  • Parents should keep friendly environment with the children and listen their problems.
  • Always teach them to tell the truth
  • Never leave them alone
  • Always pick and drop the children to school yourself and or hire any trustworthy driver.
  • Children who go work should also go with friends and family
  • Educate the children that adults do not need any help from them.
  • Make them understand if anyone tries to kidnap them so shout for help.
  • Stop the children to take and give lift
  • The parents should always have fresh pictures of children
  • Keep medical record of children
  • Memorize them their home number and close friends
  • The parents should make one (ID bracelet) for their children which should have aluminum plate on which following should be written
    • Short name of the boy
    • Phone number of the home
    • Home addresses
  • Tell them when you are being kidnapped throw the bracelet which has following benefits
    • The place of Kidnapping
    • Easement in the investigation of police
    • Anyone can pick that bracelet and inform at their homes which can help the parents in a great extent
  • The kidnappers try to smuggle the children out of the country if you have already made their passport then it is a little difficult to make another passport which can buy you a time and can help you in investigation.
  • Advise the children not to talk with strangers even though anyone too friendly especially when you are away from home so tell them if anyone is coming towards them so run away.
  • If you teach the children martial arts again that is very awesome at the time of difficulty, he can use modern martial techniques and can defend himself and he should know some other defending techniques too.
  • Tell children not to give any personal information on Facebook, any home address, street number or any other information and always tell them not to meet any Facebook friend.
  • Educate the children not to invite any relative as guest or any of his friends because anything wrong may happen.
  • Tell the children not to take anything from others to eat.
  • Make children believe that what so ever the parents say, teach they are always right and if anyone says against that so they should be alarmed that the person is sign of danger.
  • Parents should tell the children that however anyone insists you to sit in his car but they should never.
  • The children should never play outside alone but if they want to then it should be in group.
  • Use latest technology for the safety if your child. 

Author

Major Imtiaz Ahmad Malik ( R ) Tamgha-i-Basalat , a result oriented Chief Executive of Reichert Security Services (Pvt) Ltd with vast experience at operational and strategic levels in  Pakistan  Army. Managing international organizations and operations with proven success in managing large organizations

Open chat