You are on page 1of 91

Executive Protection For The Ministry

Pablo Birriel

Hampton,

Virginia

www.consumingfireinc.com
This publication is designed to provide competent and reliable information regarding the subject matter covered. However, it is sold
with the understanding that the author and publisher are not engaged in rendering legal, financial or other professional advice. The author
and publisher specifically disclaim any liability that is incurred from the use or application of the contents of this book.
Published by CFI Publishing.
Copyright 2006 by Pablo Birriel. All Rights Reserved.
CFI Publishing Nonfiction CFI Publishing
CFI Publishing
206 W Taylor Ave, Hampton, VA 23663
CFI Publishing is a subsidiary of Consuming Fire Inc. Visit our website at www.consumingfireinc.com.
Printed in the United States of America
First CFI Publishing Printing: May 2006
ISBN:
Cover design by Stephen Blackmon.

I first give thanks to God, because He is the actual source of this book.
Thanks to my wife, Maydear, and my children Jos, Rico and Tierra. Your support means everything
to me.
A special thanks to Grandmasters Hulon Willis and Mike Morris, and to my seniors John
Alexander and Van Blowe. Thank you for your teaching, and for giving me and ear when I was
seeking.
To Crue, thanks for being my brother, and for all those days of training where we beat the
daylights out of each other in the quest for martial arts perfection.
Thanks to Bob Wugan and the staff of ESI. Your teaching has been a strong foundation for me over the
years.
To brother Jacques and my sons Jos and Paul, thanks for your input in this book.
To Bishop Steven W. Banks, and Pastor Keira Banks, thank you for your prayers and leadership.
This book is the manifestation of my spiritual relationship with God, which has grown tremendously
through your teaching. Thank you.
5
One Conducting a Security Survey ~ 9
Two Identification and Intelligence ~ 41
Three Neutralizing a Threat Within the Sanctuary ~ 63
Four Neutralizing a Threat on Church Grounds ~ 75

Five Managing Other-Than Situations ~ 87


Six Control ~ 95
Controls ~ 99
Seven The Human Target ~ 105
Eight The Human Weapon ~ 115
Combatives ~ 121
Nine Invisible Weapons ~ 131
Ten Improvised Weapons ~ 137
Eleven Firearms ~ 143
Conclusion ~ 159
A threat to your man and women of God can come in many forms. It can be either a nuisance
attack meant to embarrass the pastor or it can be a full-blown attack that is meant to murder, maim or
otherwise harm the pastor. Either attack can be devastating not only to your pastor but to the
congregation as well. The best way to counter an attack against your man or woman of God and your
ministry is to thwart it before it can manifest itself. Your security survey is the best place to stop it. It
is here that the operatives will have the opportunity to review the sanctuary and the blueprint of the
building. It is also here that you will be able to assess threat levels and take appropriate action to
prevent an attack from being successful.

Threat Assessment
In order to determine a proper level of threat it is necessary to not only review the actual area that
your man or woman of God will be speaking, but to read local newspapers and consult people within
the law enforcement community for additional information. With a clear understanding of your current
events you will be able to determine the current mood of the public and narrow down the area of
potential attackers. To develop the assessment you must ask yourself several questions. They are:
1. Are the subjects that your pastor speaks on controversial (i.e. gays in the church, abortion,
etc.)?
2. Is your pastor active in politics?
3. Does your pastor have an active broadcast ministry?
4. Is your pastor well known and active in the community?
5. Is your church growing in size and influence? If the answer to any of these questions is yes, you
have a legitimate reason to be concerned for the safety of your pastor. It also gives you an idea of
your potential attackers. It is this knowledge that you will use when you approach the threat
assessment. A threat assessment consists of four levels. They are:
1. White - All clear no recognizable threat.
2. Yellow - Caution no clear threat but the possibility of one exists.
3. Red - Clear threat, there have been calls made or intelligence reveals high probability.
4. Orange - An actual attack or disturbance is in progress.
In my opinion, it is best to keep your staff in condition yellow the vast majority of the time
because it keeps them alert to potential problems. If you have watchers for the opposing team
observing your people and they observe them in a relaxed state it will escalate the potential for attack
because your team will be viewed as easy pickins. It is best for your team to be fluid like water.
This means they should have the ability to transition from condition yellow to orange seamlessly.

Every part of your team should have clearly assigned duties and it is up to those in charge to see that
they are periodically tested, (read Stress-Induced Training). It is best to ponder as many scenarios as
possible, and if necessary, give your team a written test to insure that they have considered the
repercussions of their own actions. If you do this they will continue to progress to the type of
cohesiveness that is required in this position. If you are the chief of security it is your job to contact
the various security agencies in this country for a forecast or sitrep of issues throughout the world.
Contacting the state department, FBI, state police, local police, or other more esoteric agencies is a
requirement if you are to protect your pastor against potentially life threatening situations. If you
contact these agencies you can get various reports from them that will give you all of the information
you will require to keep your team alert and aware.
Now that we have gotten our preliminary information and we have assembled our threat
assessment now it is time to conduct our security survey. As a security operative, it would be in your
best interest to learn how to think as an attacker. Conduct a walk through of your entire church
grounds both the inside and out. Pay careful attention to areas that are well hidden from view or are
obscured. If there is an area that gives access to the building and it is obscured from view by vines or
outgrowth it is your job to ensure that the area is cleared. I would also suggest that even if it is
cleared that you consider fencing in the area and putting in motion detection lighting and a camera.
This will make it difficult for an attacker to use the area for an entrance because the sudden burst of
light from the spot will attract attention from the general public. A video monitor in that area will
serve as evidence later.
Review all alternative entrances to the sanctuary and assign a priority to each area based on the
proximity of it to an outside entrance. Consider this: a well-trained, well-armed attacker can enter
your building from an outer access area and be into your sanctuary within seconds in most churches. It
only takes semi automatic fire combined with other types of attacks that will literally cause maximal
damage and freeze the security team based on the sheer carnage going on around them, unless they
have a military background. The best way to stop this type of attack is to do it on the outside of your
building.
Now that you have reviewed and assigned a priority to these areas you must transpose this
information on the floor plan of your building. This is absolutely necessary. Having a copy of your
building's floor plan is tantamount in setting up your circles of protection. See illustration 1.0. If you
don't know how your building is laid out, you will have no idea how to evacuate your people or how
to bottle up an attack. Once you have transposed this information onto your floor plan, you must now
ascertain the assignments of your personnel.

In making your assignments, you must honestly assess the abilities of all of your operatives and
determine how capable each individual will be in the event of danger. In looking at their capabilities
you will determine if they will be classified as a Transporter, Conflict Resolution Operative, or a
Watcher. Below is a list of things that I consider to be optimal in determining these assignments. 1.
Take a look at the physical capabilities of the individual.
A. Is the operative male or female?
B. Does the operative have a medical condition or is he or she taking medication that will slow
their response time to danger?
C. Is the operative capable of following orders?
D. Is the operative in good physical condition?
E. Is the operative experienced, i.e. military, local/state, or privately trained?
F. What is the age of the operative? 2. Take a look at the mental capabilities of the individual.
A. Is the operative even tempered?
B. Is the operative able to get along with the general public?
C. Is the operative capable of following instructions with minimal supervision?
D. Is the operative observant?
E. Is the operative focused while on duty or prone to have his or her mind wander?
After you have done an assessment on your personnel you can now divide them into their
operational groups based on their strengths below. I will present the classifications of these positions
and give you their job duties. They are: 1. Watcher - The watcher is just that, a trained observer that
has a special
attention to detail. It is this person that will serve to alert the team to possible problems. It is this
type of person that will notice that someone is dressed incorrectly for the season, i.e. Trench coat in

the summer, package carried under the arm. This person is very important because he or she is your
first line of defense.
2. Transporter - The transporter is the individual or team that is responsible for moving your
first family from location to location. These persons are responsible for the development of the first
familys itinerary. They are responsible for the development of travel routes and alternates. They are
also responsible for removing the client from dangerous situations. These individuals have to have
the highest integrity of the unit because it will be their lives lost in the event of an attack against your
man or woman of God. They must be willing to sacrifice themselves for the safety of your man or
woman of God.
3. Conflict Resolution Operative The individuals in this team are responsible for the
suppression of any negative events on church property. It is absolutely necessary that these
individuals are highly trained because their actions can constitute arrest or lawsuit for the ministry. It
is also necessary that these individuals be action oriented; meaning they must have the will to fly into
the face of danger instead of fleeing, which is the normal human emotional response. These
individuals should have CQC (close quarters combat) training as well as a weapons dynamic
training. This is important because it is highly likely that they will be facing armed aggressors in the
worst-case scenario. It should be understood that their primary objective is to control the situation.
They should be made aware that their job is to be carried out as professionally as possible, and in the
best-case scenario, to conduct their job unknown to the congregation, pastors, visitors and cameras.
4. Usher - Although this position is not normally considered to be one of security it is very
important nevertheless. An effective and alert usher is of great benefit not only to your ministry but
also to the security team because they will be in close proximity to the people coming into the
sanctuary. They will most likely be the initiators of contact. It will be the usher that will alert the
security operative of strange behavior or of things that dont feel right. That extra pair of eyes
that these dedicated servants employ could be the difference between life and death in a crisis
situation.
I do have a special consideration. I hope that you as the primary/lead operative would consider
the minimal arming of several of the CROs, (those with the highest level of training and control).
Although I am sure that the first consideration will be negative, this matter deserves an honest look.
These individuals will be your only line of defense in the event of an attack and if they are not
prepared to respond to an attack they will only be range fodder for the attackers who will not
consider that they are not armed but will consequently murder them on the way to their objective. We
must understand that the loss of life is repulsive to a Christian. We must remain dedicated to the
preservation of life as a whole. In other words, you must consider the loss of life of many people as
opposed to only that of your man or woman of God and members of the congregation. You must
consider that if an attack is accomplished and it is televised it will breed imitators. So it is necessary
to review every possible contingency not only for your ministrys sake but for others as well. Your
response will dictate either a positive or negative action on behalf of the aggressors. I would also
like to note that possible attackers may not be easily identifiable. They will not rush your church
spouting scriptures in foreign languages or do anything obvious that will make your task any easier.
What they will do is blend into the background and look like any other worshipper until they decide
to act. Only then will their true intent become known. Your job is to give them a difficult look, to
show that their loss would be larger than their gain. If you can do this, then they will overlook your
man or woman of God and go to a less protected target.
Now that you have categorized your operatives you may assign them to areas on your grid (floor

plan) based on perceived threat level. See illustration 1.1.


On the following page you will see possible assignments for your security operatives. Your
CROs will be located close to entrances and exits because these are the most likely areas that will
engage danger. Ushers are located at the entrance to the church and in the sanctuary. Watchers are
located in non-critical areas where they are free to roam. Transporters are strategically placed close
to the pastor and first family. Note: you might want to increase the staff of the transporters to cover
your elders and ministers as well. All ministry gifts should be protected. Now that we have assigned
areas to our operatives we must now use training to develop the skills necessary to provide a high
level of protection to our ministry.

Reading Expressions and Body Language


A valid part of setting up your protection is the ability to read expressions and body language.
The preeminent data on reading micro expressions was developed by Dr. Paul Ekman, and it would
be in the best interest of all parties engaged in protection to review it and utilize it. Dr. Ekman has
determined in his research that individuals give glimpses of deception in their expressions. In other
words the eyes are the window to the soul, just as scripture suggests. Although I have had training in
this area I dont claim to be an expert and again refer you to Dr. Ekmans work, but I do have several
tools that I use that will be beneficial to any security operative.
If you check the facial expression of an individual and it is not consistent this can suggest
deception. Facial expressions involve the entire body and as such are honest. It is impossible to
sincerely laugh without including the eyes. This is true of smiles, anger and indifference. An

individual with a roving eye can suggest that this person is doing a visual check for security personnel
prior to staging an incident. Pay careful attention to the dress of people as they enter the church
grounds and as they enter the sanctuary. If you have a relaxed dress code it is more difficult to profile
but I would suggest paying careful attention to those individuals that are incorrectly dressed for the
season. Look carefully at those that have exceptionally large jackets and coats on because they could
contain weapons or other objects. Look at individuals and see if they occasionally pat or touch
themselves.
Inexperience attackers that are not used to carrying concealed weapons will frequently pat the
area that they have the weapon concealed to either adjust it or to make sure it is still in position.
Sometimes this will increase their confidence or give them a false sense of invincibility. Also be on
the look out for individuals that frequently go the rest room. If it is at all possible, restrict movement
within the sanctuary. If an attacker is trying to plant a device he or she will show it in their
expressions if confronted by a diligent usher. Use your cameramen to scan the audience. A welltrained security operative will be able to scan the faces within the congregation and see if someone is
out of place or doesnt fit. If you are reviewing the feed from the cameramen then check to see if the
people in the congregation are concentrating on the speaker or if their attention is elsewhere. Please
consider that all of this information is no more than pieces of a puzzle. It is up to you to use these
pieces to get the answers to the questions you seek. The next thing we will do is look at the actual
process of conducting a perimeter sweep for weapons or devices.

Weapons and Bomb Search


One of the most important aspects of your survey is the search for potential weapons or bombs.
You must always be aware of items that can be used against your man or woman of God or the
congregation. When conducting a security sweep you must never have an active cell phone, radio
frequency transmitter (walkie talkie), a CB (scanner or transmitter) or radio in the area you are
searching because it could detonate a device. For the record, there are only three ways to detonate a
device. They are:
1. Electronic Transmission- RF/CB activation
2. Mechanical Ignition- Cell phone device or timed device.
3. Human Ignition- Hand grenades or lit fuses.
When conducting a site search you must first section off the various areas prior to revue. It is also
best if you have a prescribed method of determining which areas have been searched in order to cut
down on the possibility of missing an area or spending too much time in one area. When conducting a
sweep I first categorize areas as critical or non-critical.
Non-critical areas are locations within the building that dont give access to the main sanctuary or
have limited access to the sanctuary. You must also consider what type of damage can be done in
these areas. If there are no personnel in one of these areas, or it doesnt have an exit nearby, I
consider it to be non-critical. However, it should be noted that even in these non-critical areas an
attacker can use a diversionary action to divert the attention of the team areaway from their real
target, (i.e. breaching the sanctuary, your man or woman of God's office, the kitchen, etc.). So there
should always be someone patrolling these areas to ensure that there are isn't any vulnerability. It is
not unknown for a small fire or incendiary device to be placed in one area to create panic followed
by a full assault in another. So you must work scenarios with your operatives to insure that they dont

abandon their posts in the event that there is a crisis.


A critical area is any location where an attack or device can be maximally damaging to vital
equipment or personnel. If there are large amounts of traffic, (i.e. restrooms, hallways, offices, and
the sanctuary, or areas that contain vital equipment or utilities, such as your media center, power
transformer, gas lines, security command post and other areas. If any of these areas are attacked it
could be devastating to your ministry. Anywhere your first family is located is an especially critical
area because your set man or woman of God is just as important to the ministry as your heart's
function is to your body. It is your job as the ministry's security operative to insure that they are
neither harmed nor embarrassed by any event or individual on church grounds.
The reason I have divided areas into critical and non-critical is simply because there is a
difference in the type of survey that is conducted in each area. To ensure that there are no mistakes
made while conducting the site survey of your building, it is best to do several things. They are:
1. Sector the room you are about to survey into six parts: from the middle to the left, and from the
middle to the right - above eye level, eye level, and below eye level.
2. Divide these sections into four.
3. Have a pre-decided manner of marking the pre-searched area to ensure that vital time is not spent
on surveying an area more than once. 4. Have a pre-determined amount of time to survey each area.
This ensures that you have enough time to thoroughly search each area. 5. Dont have a regular
scheduled time to conduct security surveys. They should always be at random to discourage potential
attacks. Remember, the opposition has watchers, and if anything can be timed it can be exploited. 6.
The lead security operatives must review a surveyed area before it is considered clear. 7. Finally, an
operative should keep a log of the area he or she searched that includes the date, time and any other
items of special interest that they believe should be included in the report. Reports should be
maintained or filed by the security staff. These records will not only provide a history on each
operative that you have, but it will also provide records for your ministry's insurance company in the
event of an attack or anything that might result in an insurance claim. Keeping good records will also
ingratiate you to the local authorities and raise your level of esteem in their eyes. This will be very
helpful in the event that you must physically respond to an attack. They will be able to vouch for the
professionalism of your security staff.

Grounds Survey
1. When conducting a survey on the church grounds you should follow our guide. The lot should
be divided from the middle to the left and from the middle to the right. The rear of the building is
divided in like manner. The outside survey should include:Review of the area for cleanliness - There
should be no accumulated trash on church grounds that could be used to ignite a fire.
2. Review of the area for abandoned vehicles - In recent times abandoned vehicles have often
been used as the bearers of very bad news in the form of car bombs, which are the most dangerous of
all devices. Example: A car bomb detonated in Iraq killed hundreds of men, women and children.
Church officials or security personnel should attempt to locate the owner of any vehicle left on the lot.
If that person cant be located the vehicle should be towed. Under no condition should a vehicle be
allowed to remain on church grounds even if the owner can be identified because it will eventually
become commonplace to security operatives and become a possible weapon by those that can enter it
and equip it with a very large explosive device.

3. Review the area for unknown objects - Any object that is abandoned on the church ground is
assumed to be an explosive device until it can be determined that it is not. Be especially mindful of
backpacks, boxes, trash bags and bottles. Remember the Unibomber disguised his devices as nuisance
devices, which are items that will puncture tires or something or generally disrupt the peace of an
individual experiencing one of these items. These devices were in fact of a murderous nature filled
with explosives.
4. Review critical areas- Critical areas on the outside of your building could be locations
containing your power transformer, air conditioning/heating units, sewage entrance, trash receptacles
and water. Any area that can hide a potential attacker must also be included in this list.
5. Dont ignore common items- Trees, lamp posts, man hole covers, gutters and the like are seen
by security operatives daily. But effective security personnel must resist the temptation to ignore these
areas because they are easily compromised and converted to weapons. Example: In Bolivia a platter
charge was assembled using a man hole cover. The device was elevated above street level and when
the target pulled up to the light, at the usual time no less, the device was detonated. The result was the
targets murder as well as his security team. There was also a nice crater made by the device that
measured almost fifty feet around in diameter and over fifty feet deep.
I must also add some important information concerning the possibility of robbery. In this day and
time most ministries maintain a media ministry that makes CDs, tapes, books and videos available to
its members. The funds collected from this ministry as well as the tithes and offerings collected from
the members could amount to a large amount of money. This type of money could attract the interest of
some of our less respectful members of society. We must guard carefully anyone that transports these
funds because they could be prime targets for gang members or professional robbers. My suggestion
is that there should always be a visual security sweep within the building and on the grounds for
unidentifiable people prior to movement. There should also be an armed (concealed) escort (CRO) to
travel with this individual. There should be a pre-assigned code to insure that all are aware if the
transport has been successful or if there is a problem.

Interior Survey
The interior survey is divided into several sections. These are: the foyer, the offices, the kitchen,
the general area, and the sanctuary. Each area should follow our pre-established sectoring factors, but
special consideration should also be addressed for each area.
The foyer is the most heavily trafficked area of the ministry. There will be a constant flow of
individuals through this area either going to offices or passing through to the sanctuary. The main
consideration when conducting a sweep in this area is that it cant be static. You must constantly
review the individuals or objects that pass through this area. Here are a few of my considerations:
1. Take careful consideration of items left in the foyer.
2. Be aware of the dress of individuals in that area. Is it seasonal.
3. Be particular of individuals that have no apparent destination.
4. Dont allow individuals to loiter too long in the foyer either before or after service because this is
a prime time for attack while there are a large number of people clustered together.
5. You must be inside the church prior to the worshippers' arrival to sweep the foyer.
6. If there are tables or desks in the area you must inspect the underside for weapons or devices
7. Have your lead operative inspect your area after your sweep.

8. Update your log regularly to give the time, date and circumstance of your survey.
9. Forward all of your correspondence to the security office for record.
In conducting a sweep in church offices we must first sector the office as we have pre-established.
Note the special circumstances of reviewing this area: 1. Use a digital camera to take pictures of the
office in its normal condition; you may use these pictures in the event of a device review. This will
tell you if there is anything out of place. 2. Inspect the vents and tiles above the desk, if there are any.
3. Make sure that there arent any blown bulbs in the office. 4. Be observant of any unknown items
left on the desk, take the user of the office in to determine what is theirs and what is not. 5. Inspect
larger items such as computers, printers, scanners, television sets, etc. because they can be used to
sequester a device. 6. Make sure that all office doors are locked when not occupied. 7. Inspect the
doorknob and jamb prior to entering the office to see if it has been tampered with. 8. Inspect the desk
in the office to make sure it hasnt been forced open. 9. Inspect the bottom of the seats in the office to
make sure there are no devices attached to the bottom. Do this with a penlight. 10. Do not switch on
any item in the office before inspecting the office. This includes the lights. Use a flashlight to review
the floor and desk for droppings from the ceiling prior to switching on the lights. 11. Make sure that
trash in these offices are removed daily. A coke can could be used to conceal a device. 12. Update
your log after the completion of your sweep.
13. Mark the office door with colored masking tape; use different colors at random to reflect that it
has been reviewed.
14. Have your lead security operative inspect the offices after you have to insure that all has been
completed.
If your ministry has a kitchen it must also be swept regularly because some of the deadliest forms
of biological and chemical attacks can be administered through food. There should be someone
responsible for this area and they should be the only individuals with total access to this area. Here
are several considerations you must have in sweeping this area. They are:
1. There should never be food, seasonings, drinks, or any other cooking items out of place when
there is no one in the kitchen.
2. Inspect the area for cleanliness.
3. Review the cabinets for devices and weapons.
4. Review kitchen equipment such as, mixers, blenders, microwaves, refrigerators, freezers, and
ovens. Mark them with colored tape.
5. Review the ceiling lights, tile and other fixtures.
6. Have the responsible party for that area keep a log of people that are authorized to work in this
area, the date, time and condition.
7. Make sure that there is always someone present when water or any other food or drink is placed
for your pastor to insure that it isnt tampered with.
8. Update your log to reflect the sweeptime, date and condition.
9. Mark the area after the completion of your sweep.
10. Finally, have your lead security operative inspect the area to insure its completion.
Hallways must be viewed and swept similarly to the foyer area. It will have heavy traffic but it
will be easier to sweep than the other areas. My considerations for this area are:
1. Always keep the hallways free of any objects.
2. Limit traffic to these areas as much as possible. Depending on the area, traffic can be limited to
office personnel. But during a day set aside for worship you have to be particularly vigilant for
wandering visitors.

3. If there is to be maintenance done in these areas keep a complete log of the date, time and
condition.
4. Keep roaming patrols in these areas on worship days to discourage loitering.
It is also best to have your security staff sweep the ministrys restrooms after every service and
during service if there is a lot of traffic. The area should be swept following each guideline, and
particular attention should be made of the trash containers because they will be the prime choice to
seclude incendiary devices.
If your organization maintains a media ministry, access to its area should be limited at all times to
the appropriate staff. Special attention should be paid to it, especially during service, as any invasion
in this area will allow attackers to view your congregation prior to attack. It will even allow the
attackers to remove a video record of their attack from the area. In addition, some of the ministry's
most expensive equipment is maintained in this area and must be guarded against theft or corruption.
If your ministry has a live taping anyone gaining entry to this area can use your ministry's airtime to
promote its own cause by transmitting from this center. A security operative should be assigned
inside of this area as well as one outside to make sure this area is well protected during service
hours. Security personnel should also be sure that this area is properly set up with pressure pads and
volumetric alarms systems that will identify this area if it is breached during non-operating hours.
Areas that contain maintenance equipment must be reviewed regularly. All of the equipment must
be kept in a locked storage area. All flammables should be kept in a locked area on the exterior of the
church. This area should be under video surveillance or in other ways secured. Remember this area
can be set aflame or detonated to initiate an attack, so there must be a large amount of control over
this building or structure. It is also better if it is set a good distance away from the church so that any
such attack would have less probability of damaging your facility. If you will keep a limited amount
of flammables it would be permissible to keep them in a secured area within your facility, but this
area should be known only to a select few and should again be visible by video surveillance.

Alarm Systems and Video Cameras


You absolutely must have an exceptional alarm system for your ministry. This is not the area to
economize. Your system should be able to identify a breach in any area. You should be able to
identify the area of any fire or activated smoke alarm from your command center. Video cameras
should be of the highest quality affordable because this system will not only help you to identify
possible threats, but it will provide a visual record for your insurance company and
local/state/federal authorities. As a final note, you must insist that your ministry's security system be
dedicated. Many commercial alarm systems (read home systems) operate on a loop system. This
could be a deal breaker for you and your security team. For example: if an alarm goes off in another
area that is within your loop it will leave your building unprotected. With a dedicated system your
building will standalone. This will eliminate false alarms. It is also necessary that your pastors
residence comply with this same requirement. In order to protect your man/woman of God you must
be vigilant. You must have a solid plan for protection and it should be in degrees or levels. The
church grounds and the facility itself is only the beginning.
Here is a final consideration for the setup and staffing of your command center. A ministry's onsite security command center should have an array of equipment such as:
1. A series of video monitors that will give someone in the command center the ability to review

all areas inside and outside of the building.


2. Command center manuals/log books that include:
All critical information for contacting local authorities in case of an emergency
All Standard Operating Procedures (SOPs) covering every possible scenario
Insurance information
All required security codes in case of a false alarm
3. If weapons will be kept on the grounds, this area should have a hardened lock box to contain those
that are not on designated CROs.
4. Fire extinguishers should be kept ready within this area in case of fire.
5. This area should also contain a base for communications with all security operatives and other
areas within the ministry.
6. A complete first aid kit should be kept on hand. This kit should have everything necessary to treat
anything from a scratch or headache, up to a sucking chest wound. A qualified LPN or EMT should
maintain it if available. It would also be valuable to have all security staff at least CPR certified or
first responder trained because medical emergencies have the potential of occurring more often than
physical assault.
7. The doors on this area should be secured at all times with either a punch pad or a maximum
strength deadbolt lock with a steel framed security door.
The command center is going to be the single most important location within the facility, other
than the sanctuary itself. It is from this center that all actions and counter measures will be initiated. It
is also from this area that you will direct your staff and conduct the flow of traffic of your
worshippers in time of danger. It will also be the primary target in case of an attack. If the command
center is breached it will set your operatives in disarray and make your pastor and churchgoers
vulnerable to assault.

The Pastors Residence


It will also be necessary for your security team to occasionally conduct a sweep of your pastors
residence to insure the familys protection. There are several considerations to take into account
before conducting a survey of the pastors residence. They are:
1. The lead or most senior operative must conduct this sweep.
2. Although it must be done, the sweep should be approved by your pastor. This is your first familys
home. It must be respected before it can be protected.
3. You must not do anything to make the pastors neighbors aware of the nature of your visits. You
must be efficient, quick and invisible.
After getting the consent of your first family, you can conduct your security survey. There are
differences between conducting this type of survey and the surveys previously discussed. Here are my
considerations:
1. Inspect the grounds. Insure that the grass, hedges and trees are properly maintained. Make sure
there is no shrubbery close to the residence that can conceal an attacker.
2. Check all exterior windows for integrity.
3. Check the entrances for attempts at entering the home. Look for footprints or other signs of intruders
on the grounds.
4. Make sure that there are motion detection lights on the rear of the residence. This is an economical

means of discouraging attack or breaking and entering.


5. Periodically test the residences security system.
6. If there is a garage that has an interior entrance to the home make sure that the system has a screw
system to open and close it. Also, test the system to see if any of the commonly available remotes can
activate the system. This is a common trick for thieves. They drive up and down an upper middleclass
or wealthy neighborhood pointing their various remotes, available at local hardware stores, until one
actually works. They will come back when the residence is empty and invade the home through the
garage. 7. If the residence has a pool the water must be collected and tested for bacteria and toxins.
Biological agents can be administered by insertion into the water. 8. Review the grounds for items
that have no legitimate reason for being in their current location (examples: a ladder placed against
the side of the residence, a gasoline container near the rear of the residence, etc.).
You should also have your pastors transporter inspect the familys vehicles before they are
started. Vehicle mining is a common technique of the terrorist whether they are international or
domestic. Here are some considerations:
1. Inspect the exterior of the vehicle by walking around it first.
2. Inspect the interior of the vehicle through the windows, without touching it.
3. Review the area around the vehicle for clumps of dirt, oil, or other items.
4. Use a mirror to inspect the underside of the vehicle. 5. Inspect the tailpipe of the vehicle. 6. Inspect
the gas tank door for wires or fuses (use EXTREME CAUTION). 7. Inspect the door handles with
mirrors to insure no devices are in the handles. 8. If all appears clear, open the doors remotely and
inspect the interior of the vehicle for devices. 9. Open the trunk of the vehicle and inspect for devices.
10. Raise the hood of the vehicle and inspect for devices. 11. Finally, remotely start the vehicle.
When checking the vehicle for devices carefully consider all unknown objects that you discover
because not all devices are easily recognized. Also, you must divide the search of engine
compartment just as you do when conducting an interior/exterior sweep. This type of continuity will
enable your operatives to become more efficient in conducting sweeps. Review illustration 1.2 below
and Illustration 1.3 on the following page.
Illustration 1.2

Illustration

1.3

Letter and Parcel Devices


I am going to touch briefly on the inspection of strange packages or letter bombs. Although it is no
longer as commonplace to send explosive devices through the mail due to increased security
countermeasures after 9/11 and the anthrax attacks, it is still a threat. It is an unsophisticated attack,
but all security operatives should still be made aware of what to look for. We must first understand
what to look for during our visual inspection.
1. Check the package itself for stains or unusual packaging.
2. Check the item for postage marks, this is particularly important if you have a drop box. An attacker
could just place the item in the drop box and it wont have any postal marks.
3. Check the item to see if it is specifically addressed to any one individual. An attacker will try to
narrow down the contact by being specific to whom his or her target is. 4. Feel the object. See if it
has a hard core or if it has something pliable inside of it. 5. Check to see if the item has a return
address. 6. Check the addressee to see if his or her name has been misspelled. 7. Check the item to
see if it is foreign mail. If your ministry has a global mandate you might receive items from another
country. In these cases pay particular attention to the postal marks and return address because it is
likely that the attacker will misspell the name and other information. 8. Check the item for markings
such as Airmail, special delivery, and personal, confidential or for addressee only. 9. Check the
weight of the item, does it weigh too much for a letter. 10. Check for excessive material in the sealing
of the item. 11. Beware of diversionary items such as, boxes of candies, books, magazines, purses or

other unrequested items.


As a golden rule, I would state that if you review an item and it has not been requested or
expected; if it has been received by a personal delivery or anything that appears to be out of the
ordinary, I would assume that it is a device until it has been determined otherwise. Although it is
obvious that most items will not be devices, treating every item with respect and suspicion will
establish diligence and good security inspection habits that will serve to protect your pastor.
When searching for devices it should be understood that any device could fall into two sub
categories: lethal and non-lethal. If a device was assembled with the desire to cause maximal
damage, it will have a larger amount of explosives. It will sometimes be wrapped with other items to
create an improvised claymore mine or shrapnel delivery device that will cause a great deal of harm
to anyone in the area when the device goes off. However, it is often the non-lethal or nuisance device
which causes much more harm. Non-lethal devices cause panic, and it is panic that can kill. A
nuisance device will cause damage to your ministry far after the event has transpired because it will
cause you to spend twice as much time screening packages as you normally would. It can also cause a
panic amongst your worshippers that can cause the elderly and children to be trampled in a rush to
flee the attack. A non-lethal attack can cause noise, smoke and fire, which is a deadly combination. It
might not be the objective of the attacker to cause fatalities, but they can always be a by-product of
this type of attack. It should also be noted that this type of attack takes less tactical expertise than the
former.

Incendiary Devices
Incendiary devices are very simple to develop and offer an extremely efficient means of attack for
the urban or religious terrorist. Incendiary devices can be as simple as a candle being left lit in a
vulnerable area to thrown firebombs. The booby-trap type of incendiary device should be discovered
by your operatives within the course of your initial security sweep. However your parking lot or
exterior security will be the most responsible for discouraging the firebombing of your church while
it is open. I suggest that all exterior windows around your church be inspected and tested to see if it
can withstand the initial impact of a firebomb. Additional motion detection lighting and posted video
cameras could serve to discourage evening attacks when there are no ministry personnel present.
Finally, I will answer the question that will be asked by every operative on your team and that is,
'what do you do if you identify a device or find a weapon?' It is extremely important that you have the
correct protocol in place for this type of situation because it means that you are in condition orange.
This means that your man or woman of God is in imminent danger. If there is a device or weapon
present that means an attack is in the process of being actuated. These are the steps that need to be
followed immediately after determining that an attack is pre-imminent. They are:
1. Evacuate your ministry's first family immediately. If they have not arrived, notify their
transporter immediately and have him or her drive to a secured predetermined location. The
transporter should especially be vigilant because there is a high probability that there is a watcher
group or team shadowing your pastor.
2. The lead security operative must activate his team to evacuate the building of all other
personnel. Other ministry gifts and elders should be removed first. Ushers should be used to direct the
other worshippers to the exits.
3. CROs should be dispatched immediately to the predetermined location that the transporter has

determined. This information should be given by code so that anyone listening in has no idea of the
location of your pastor.
4. CROs will set up a defensive perimeter and escort the transporter and first family to a secured
location until the primary residence can be secured.
5. Lead operatives should alert the local/state/federal authorities immediately of the item found
and have them dispatched to the ministry with the appropriate personnel.
6. No one should be allowed into the church until the all clear sign has been given by security staff
and the local authorities.
Now there are other tasks that need to be affected after the area has been swept and the items
removed and they are:
1. All security personnel should be interviewed to see if they remember anything unusual
happening or a person that pricked their senses.
2. All videos cameras within the media center and command center should be reviewed to
identify the potential attacker.
3. All schedules and travel routes should be scrapped and re-established to invalidate the information
collected by the attackers intelligence team.
4. A counter surveillance team should be activated to take video and pictures of all vehicles and
people entering church grounds.
5. The operatives that discovered the device/weapon should be praised within the ministry for their
diligence and they should be presented to the operatives as a good example of what the service
requires. 6. The lead security operative should also change the schedules of all of his operatives, this
again to invalidate the information gathered by the attackers intelligence team. Always remember that
as a security operative you are not only responsible for the well being of your pastor and ministry
personnel but for your own family as well. Please keep in mind that there is always someone
watching you as you conduct your business. This is not only true of potential attackers but churchgoers
as well. It is your professionalism in the execution of your duties that will determine if your
congregation feels safe or not. Now that we have completed our security survey it is time to move on
to the next chapter: Identifying a threat.

In this chapter we will review the process of identifying threats and intelligence gathering. We
will first deal with the types of threats you may encounter while performing your ministerial duties as
security operatives. We will then address neutralizing threats on church grounds, within the church
building and inside the sanctuary itself. We will deal specifically with intelligence gathering and the
development of lines of cooperation between ministry security and the authorities (local, state,
federal, and international). I will also teach you how to develop your own intelligence network
within your community. This network will keep you informed of the various happenings within your
community and of any potential gang activity. I advise every team to frequently and regularly gather

and review intelligence from its sources so that they can determine the correct level of response.
However, before going any further I must strongly suggest that your team consider having your
operatives sworn in as deputy sheriffs within your ministry's local community. This will accomplish
several things. It will:
1. Establish a relationship with the local authorities
2. Lend an air of professionalism and prestige to your security operatives
3. Enable your personnel the right to carry concealed firearms within many different environments.
This is particularly important in firearm restrictive areas.
4. It will raise the level of confidence that your ministry's members and staff have towards your
operatives.
5. It will enable your operatives the opportunity to purchase needed equipment or training at a law
enforcement discount.
6. It qualifies your organization for membership in law enforcement associations, which have a
wealth of useful information.
7. It qualifies your organizations for subscriptions to law enforcement oriented magazines. These
magazines regularly display tactical information and equipment testing.
8. Finally, if there is an incident on church grounds, it will give your operatives limited arrest rights
as deputies (in many locales).
Now we will review the two types of threats we are most likely to encounter.

Nuisance Attacks
The first type of attack that we will look at is the nuisance attack. This attack's primary goal is to
disrupt the function of the church. Its main objective is not to destroy but to embarrass the ministry. It
can either be a verbal assault or a non-lethal attack. Consider if you will protestors situated
throughout your sanctuary shouting obscenities or spouting political slogans. This type of attack can
tax your security operatives and potentially set your man or woman of God up for a far more lethal
attack. We can use the assassination of Malcolm X as a model. There was a group at work that
consisted of a diversionary two-man team and an action team. The diversionary team disrupted the
event by using a loud outburst and a feigned argument while the action team engaged the target. This is
a common tactic that has been used time and again to deadly effect. I consider it to be just like the
work of a good magician. He makes you look at one hand and while you are focused on it he actually
does something with the other had. It is your duty to remain vigilant and to accomplish your
assignment because it is through this type of professionalism that you will thwart this type of scenario.
If your transporters are competent and alert, they will remove the pastor and first family from the line
of fire. This leaves your other personnel in the position of dealing directly with the threat.
Another type of nuisance attack is the physical confrontation or fistfight. In working on details
with controversial individuals it is common for someone to get so upset with the speaker that they
attempt to rush the individual and initiate a fistfight. If your pastor is one to speak specifically on life
and its considerations based on the word of God or is prone to controversial statements, sooner or
later you may have to deal with this type of attack. Also if your church has a television ministry this
type of attack can be devastating. After all, no one would want to go to a church after seeing the
pastor attacked while on television. This is the wrong message to send to your viewers and potential
members. Always remember, it is your job to ensure that your ministry is viewed in the most positive

light and your worshippers only have to concern themselves with receiving the word from their
pastor. They should never be looking over their shoulders for bad guys in the middle of the service.

Maximal Attacks
The next type of attack we will review is that of the maximal attack. This attack is the most
dreaded because this attack is carried out to produce death and maximum damage to the ministry. This
type of attack is usually carried out by an armed attacker or by bombing. In the first chapter we
reviewed information on how to prevent or expose bombing by conducting a security sweep, but in
this chapter we will deal with the armed aggressor. Maximal attacks can be carried out by
individuals or by teams. It is extremely important that we prepare for the possibility of a maximal
attack because of how critical preparation and review are to effective reaction. This type of attack
can also cause considerable collateral damage. Hundreds of frightened churchgoers would flood the
church grounds in such a situation. Think of how frantic they would be as they are unable to locate
their children or other loved ones in the rush to avoid the attack. The crush of these individuals could
cause death and maiming in addition to the actual attack. We must always remain one step ahead of
potential attackers due to the current condition of the world and the rise of radical religious orders
that pursue violence as a means to an end. In order to do this we must cultivate avenues of
communication between the ministry and other gatherers of this type of information.
There are many different sources of information available to your ministry that will allow you to
preemptively prepare for potential strikes against your ministry. In order to effectively cultivate this
information you must consider the categories they fit into and also how easily accessible they are to
you. The primary sources of information are:
1. Local
2. Federal
3. National
4. International In addition to those categories there are several subcategories and they are:
1. Printed
2. Video
3. Humint (human intelligence)
4. Internet Careful assembly of all of the information gathered from local sources will be invaluable
as your team prepares to make a correct forecast.

Intelligence Gathering to Counter the Threat


In the following pages I will list the available resources that I have located on the Internet and
through other means. Using all of the agencies I mention isn't required, but it would be wise to review
their mission so that you know who to contact when it is appropriate. In establishing your own
intelligence arm of the security ministry you can better eliminate threats. In this instance you can be
proactive instead of merely reacting to an attack.
Police/Sheriff s Department
One of your primary sources of information will come from the local
police or sheriff's department. Any local police department will have its

own intelligence network. Since they deal with crime on a daily basis, connecting with them will
quickly make you more aware of the state of your area. Establishing a liaison between your ministry
and the local law enforcement personnel will allow you access to information that is reserved to law
enforcement personnel. Not only will you get information, but you will have access to the crime
blotter which gives you information on who has been arrested and for what charge. Up to date
information on local gangs can also be found in these agencies. Your relationship with law
enforcement personnel will enhance the citywide image of your ministry and your staff. There are
also many different sections within these departments that will have invaluable information available
to assist you in determining the level of threat your ministry may be facing and developing a more
accurate security forecast. These departments are: 1. Juvenile Division - This section will have
information on the types and severity of the crimes committed by youths within the area of your
ministry. It will also have information on adolescent gangs in your area. This information is not only
vital to the development of your forecast but it allows you to determine the challenges facing the
teenagers entering into your ministry. 2. Narcotics Division - The narcotics division of your area
police department will keep statistics and other information on all drug related offenses committed
within the area of your ministry. They will be familiar with the offenders and will also have
intelligence on those gangs that deal with drugs near your ministry. It is best to collect as much
information as you can on drug gangs because the bulk of many city's murders will be drug related.
Many times it will be as a result of a battle over territory wherein your ministry could be located. 3.
Vice Squad - This division keeps track of all crimes of a moral nature. As a security operative you
should be aware of any activities such as prostitution that are occurring in your area. This division
will also have information on those individuals in your city that have been convicted of related
offenses and sexual predators. In order to better protect those within your ministry you should gather
this information and pay particular attention to those most recent crimes. 4. Organized Crime Division
- The organized crime division will keep files on all major crime families within a city. Although you
will not be able to access information from their classified files, you will have access to general
information and statistics,
Local Newspapers
In your position as a security operative, you should make it your business to read your local
newspapers everyday. Many situations that have transpired the previous night will be in the local
newspapers. It will give the location of the incident and its outcome. The local newspaper will allow
you to adjust the threat level of your ministry's operatives accounting for the most recent information.
It is also useful to review any other newspapers in the area. All of this information is very important
to your security forecast. In addition, the newspapers will have sources outside of the local law
enforcement arena, and in some instances this information can be more accurate.
There is also other information available that may not have made the newspapers. Even if the staff
doesnt believe it is newsworthy that information may be of importance to you.
Newsletters
There are a number of newsletters produced within many different communities. They feature
information about their particular subdivisions that may include people moving in or out, or crimes
that have been perpetrated in the area. It would be wise to subscribe to these newsletters and get to
know the individuals responsible for publishing them. They will also be able to provide you with
useful information about the area surrounding your ministry.
Local Internet Forums
Our lives have gravitated toward the Internet more and more in the

21st Century. It has not only revolutionized our way of communicating, but
it excels in providing information. In order to be effective as a security
operative you must cultivate intelligence from the Internet. Internet forums
are great sources of information that can be of use to your team. You must
research the personal websites and forums available in your area to narrow
your informational focus. You must also spend time analyzing information
gathered in this particular way to insure that you are not dealing with mere
gossip. Even gossip may have a foundation of truth in it, but it is up to you
and your team to determine how much.
Real Estate Offices and Rental Offices
Real estate and rental offices can also be excellent sources of information. Many real estate
companies keep statistics on crime throughout the areas that they service simply because families
interested in buying property will ask. Prospective buyers ask various questions about the
neighborhood such as the school district, crime statistics and so on. Developing a relationship with
the different rental offices within your community is just as important, because they will have
information on individuals coming into the neighborhoods as well as whos leaving.
Neighborhood Watches
Neighborhood watches are another good source of local information. These consist of people that
reside in that particular area. In communicating with the watches that are in the immediate area of
your ministry you will have access to a wealth of accurate information. Many neighborhood watches
will have a local law enforcement officer as a coordinator. He or she will already be in the practice
of collecting and providing relevant security information to civilians in the area. This information
will be very valuable to your security forecast.
Ministries
Make sure you fellowship with other ministries as a part of setting up your security plan. In
collectively gathering and disseminating information, you will not only protect your own ministry but
assist in the development of protection strategies for other ministries as well. As all are one body in
Christ we must learn to cooperate with each other to make sure that all are well protected.
Unfortunately in this day and time, our list of enemies is not limited to those who dont believe as we
do. We are confronted with groups that claim allegiance to the same God we serve but are engaged in
subversive activity. We must remain ever vigilant to counter whatever threats may be facing our
various ministries. It would be wise for you to remember the scriptures as they pertain to being
vigilant. In Matthew 7:15 the scripture warns of 'false prophets that come to you in sheeps clothing
but are in fact ravening wolves'. In other words, ministries will not only have worldly enemies, but
opposition from within the realm of cultural Christianity as well. This is very distasteful to review
but it is absolutely necessary to understand if we are to fully protect our leadership and the members
of our congregations.
We will now look at the various information resources available within the states. There will be
crossover information from the local law enforcement divisions because the state organizations
compile data based on what they receive from municipal organizations. However, state organizations
will have a wider scope of collective data concerning organized crime, terrorist activities and narcoterrorism.
State Police
The state police departments keep information compiled by the local agencies. This information
will help you to view potential hotspots throughout your home state. Powerful speakers frequently

travel throughout the state at the request of other ministers to speak at their churches. This can move
your man or woman of God into potentially troubled areas. As you have a better view of the big
picture you can be more effective when setting up your pastors itinerary and defuse potentially
dangerous situations before they have a chance to advance.
State Police departments will have information on: 1. Terrorism alerts - Any information
forwarded to the state police concerning potential terrorist attacks or focuses will be important to
review.
2. Organized gang activities - There are not only local gangs but national gangs that maintain
chapters throughout the country. They will not only be much better organized and financed than the
local gangs but they will be much more ruthless because they have a reputation to uphold. Review the
development of MS-13 in the United States. Many view them as a gang problem when in actuality
they are a terrorist organization that has its ties to the political diaspora of El Salvador.
3. Narco-terrorism - These are some of the most dangerous gangs in the world. They are
surrounded with violence and murder. If your pastor is outspoken you need to be aware of the
potential threat these gangs pose to your ministry. They will not hesitate to kill to further the means of
their criminal ventures.
State governors' offices are another source of great information. There are other state agencies
within the governors office that compile crime statistics and other information that is important in the
development of your security forecast. The attorney generals office is one of the most important
contacts for your office to cultivate. It is this office that distributes their findings to the various state
and federal agencies. In reviewing your state's website you should look for agencies that provide
assistance or information on economic development as well. They will maintain a security forecast of
their own based on the locale you are reviewing. The best suggestion that I have for you is to
research, research and then research some more. You will find that in consistently reviewing and
revising your information you will keep your database from becoming static. Information is just like
produce, you want it as fresh as possible.
Federal Agencies
There are countless intelligence gathering agencies and even more
pseudo agencies that compile information on terrorist organizations, narcoterrorists, organized crime
and gang activities. This information is so massive that even the largest security organizations would
have difficulty processing all of it. So I have taken the liberty of shortening this list to only
include those links and agencies that I consider the most useful. I suggest
that you cultivate your own sources of information based upon your own
ministry's consideration.
Department of the Army
The Department of the Armys website (www.army.mil) has informa
tion and links which provide access to press releases and investigations
[[[What kind of Investigations? Why is this useful?]]] among other things.
Naturally, the sites focus is on the army and you can find many articles on it
that will not only provide the latest information concerning army activity but
it will also have information such as briefings and the like. I recommend
that you visit it regularly.
Department of the Navy
The Department of the Navy maintains an official website
(www.navy.com) that has information similar to that on the armys website.

You will find that their information will center on the various naval bases
and naval operations. This website also has links to the Naval Intelligence
Service (NIS) where you can find a lot of good information. Again this is a
good website to regularly visit.
The Intelligence Website
This is an excellent website (www.intelligence.gov) because it serves as
a gateway to any and all sites dedicated to the collection of data. You will
find links to various local, state, and federal government agencies and private
corporations that you are not familiar with. This is one of the most valuable sites, and its information
may indeed be necessary for the thorough and
accurate development of your own forecast.
The Pentagon Channel
This is a very important website (www.pentagonchannel.mil) because it is maintained by the
pentagon. It has information directed at all branches of the military. It has live video feed, which
provides much needed information about ongoing conflicts and occupations. This information is very
important when developing your forecast because it gives a clear view of our countries enemies and
their activities throughout the world.
Defense Intelligence Agency
The Defense Intelligence Agency (www.dia.mil) is a little known agency with a very important
function. It serves as the intelligence-gathering arm for all the branches of the military. There are
press briefings and updates on this website. You can also download reports in pdf files.
Central Intelligence Agency
Everyone is familiar with the CIA (www.cia.gov). This agency is
responsible for intelligence gathered from all points of the globe. Using the
FOIA (freedom of information act) you can access declassified reports that
have been gathered by various means. If your man or woman of God travels abroad this will be one
of several sites that you should consult on a regular basis.
The State Department
The leading website for monitoring international travel belongs to the state department
(www.state.gov). This site has traveling tips and warnings, international issues and press releases,
all of which will be necessary if your man or woman of God has to travel internationally.
The National Security Agency
The NSA (www.nsa.gov) maintains the largest database of informa
tion on earth. Along with the NRO (National Reconnaissance
Organization), they maintain surveillance on all subversive organizations
both stateside and abroad. They maintain a public info section where you
can access declassified information.
Federal Bureau of Investigation
The Federal Bureau of Investigation (www.fbi.gov) is responsible for all intelligence gathering
within the United States. On their website you will find links to the NCIC (National Crime
Information Center), NCAVC (National Center for the Analysis of Violent Crime), and it provides a
link to the Federation of American Scientists (www.fas.org/). The FAS site has intelligence and
terrorism information. You will also find crime statistics and loads of other information that will help
you to assemble your forecast.
Department of Homeland Security

The DHS (www.dhs.gov) is the agency responsible for the setting of nationwide security levels.
It also has links and information from the US customs department and the coast guard. As terror
threats are analyzed they will review the intelligence and set the appropriate response level. Although
this information is not specific there is a section on the site for briefings and other bits of data.
Federal Maritime Commission
The Federal Maritime Commission (www.fmc.gov) maintains informa
tion concerning incidents on the open seas. With the emergence of wellorganized pirates, this
information can be vital especially if your first family
travels by sea. You can find information in their investigations section.
Director of National Counterintelligence
This agency (www.nacic.gov) has a list of publications online that can prove useful in the
development of your security forecast. You can review the information and select that which you feel
will be most helpful to your personnel.
The Department of the Treasury
The Department of the Treasurys website (www.ustreas.gov) has a
large volume of information. You will find links to the IRS (Internal
Revenue Service), Secret Service, and the BATF (Bureau of Alcohol,
Tobacco, and Firearms). I would spend quite a bit of time reviewing information from the US Secret
Service simply because their mission is similar to
your own as a security operative. The Secret Service provides protection for
all of our highest government officials, and they are very good at it. They
also have a new initiative called the CSPI, which stands for Critical Systems
Protection Initiative. This program was developed to assist private industry
in evaluating and managing potential problems before they happen.
Federal Aviation Administration
The Federal Aviation Administration (www.faa.gov) maintains information on all incidents
involving aircraft travel. They maintain an excellent investigative arm. It was this arm that determined
the link between Libyan terrorists and the bombing of the Pan Am flight over Lockerbie, Scotland.
United States Postal Service
The USPS ((www.usps.gov) maintains a website that not only provides
shipping information but also has a section called securing the mail.
Postal Investigators will compile data on attempted letter bombs and other
agents such as the recent investigation involving the shipping of anthrax through the mail.
Now we will review the various private and international agencies that provide information
resources to the general public. You will find information on the various magazines available for
your review in this section. I have also included various associations you can join, or whose
newsletters you can subscribe to, that will make your job that much easier. Remember, the larger the
shield of information you have available to you, the larger the umbrella of protection you can spread
about your man or woman of God and your ministry.
University Microfilms
UMI (www.umi.com) maintains research information and periodicals. You can find information
(printed and video) that will be priceless in training of your security operatives. I suggest that you
review the website and select the information that will provide the highest level of training for your
personnel. This will also help to reinforce the importance of their position within the ministry.
National Criminal Justice Reference Service

The NCJRS (www.ncjrs.org) is a federally funded organization that supplies information from the
Department of Justice to various security agencies and companies. They have information on gang
activity and identification, ID theft, crime and law enforcement.
The Rand Corporation
I have found information from the Rand Corporation (www.rand.org)
to be very helpful in the tracking and understanding of terrorist activity.
This company is a research and development think tank that provides information and training to
corporations. They have a vast library (print and
video) on terrorism and counter terrorism. Using information from this
corporation will give your operatives the opportunity to see situations and
attacks that the general public is unaware of. I have reviewed video from
this company and found it to be of the best quality and most pertinent in
the field of executive protection.
Security World Magazine
This magazine (www.securityworldmag.com) has information on the cutting edge protection
technology. You can find reviews and other studies that will help you in your selection of protection
equipment.
Dr. Paul Ekman
In chapter one I presented a brief synopsis of the concept of
reading micro expressions. Dr. Ekman (www.emotionsrevealed.com) is
the man who originated the study. Although I am familiar with his earlier studies, I highly recommend
his new set of cds and other training
material to any security operative. I suggest strongly that you purchase
this information. Combined with training on body language, this information will help you ascertain
any potential attackers.
Executive Security International
I am a graduate of ESI (www.esi-lifeforce.com), and I recommend them highly. Not only do they
provide the best training available for the protection specialist, but they have a manual on executive
protection that provides a massive amount of information directed specifically towards the protection
specialist and his or her function.
Wall Street Journal and Barrons
Although both the Wall Street Journal (www.wsj.com) and Barrons
(http://online.barrons.com) are business-oriented publications, they offer a
global view of news. You will find quite a bit of important information on
new and emerging technologies and news that affects the political barometers of different nations of
the world.
US News and World Report
This is an excellent magazine (www.usnews.com) that has very accurate information. You can
find information on practically anything that is newsworthy. Any terrorist attacks or domestic terrorist
information will be found here. It is an excellent source.
Paramilitary Publications
Magazines such as Soldier of Fortune (www.sof.com) and S.W.A.T.
(www.swat.com) have good information on many different fronts. You can
find information such as gang identification, counter terrorism, and international sitreps (SOF). The
Soldier of Fortune is directed towards the military

private contractor or read mercenary, and as such provides information on subversive activities
within the United States and other nations around the world. SOF sends in field operatives to gather
intelligence and they print their findings within the magazine.
Interpol
Interpol (www.interpol.int) is the largest international police organiza
tion in the world. They have 184 member nations that share information
with it. This organization promotes cross border police cooperation. They
support and assist all organizations, authorities and services whose mission is
to prevent or combat international crime. You will find extensive information on their website
concerning world wide criminal and terrorist activities.
Gang Information Sources
Another area you should pay attention to is the identification of local and national street gangs.
These outfits can be extremely violent and can be found in almost any city. Recently, law enforcement
personnel have found that well organized metropolitan based gangs have been infiltrating smaller
cities and rural communities throughout this nation. I recommend these sites:
1. National Youth Gang Center- www.iir.com
2. Gangs or Us- www.gangsorus.com , this site is maintained by Robert Walker a noted gang id
expert.
3. Florida Department of Corrections- gang and security threat group (www.dc.state.fl.us) this is a
well maintained site that features information on how to spot gang activity and their personnel.
There are also a large number of law enforcement associations that maintain an Internet presence. It
would be in your best interest to search them and consider becoming a member. These organizations
not only provide information but training and seminars for their members. Here are some I
recommend: 1. National Alliance of Gang Investigators Associationwww.nagia.org 2. National
Major Gang Task Force- www.nmgtf.org 3. National Sheriff s Association- www.sheriffs.org 4.
National Insurance Crime Bureau- www.nicb.org , (this provides insurance claims information and
trends). 5. World Association of Professional Investigators- www.wapi.com 6. American Society of
Industrial Security (ASIS)www.asisonline.com 7. International Association of Chiefs of Policewww.theiacp.org 8. World Association of Detectives- www.world-detectives.com

Identifying threats and preventing them are the most important aspects of what we do as security
operatives. If it is impossible to prevent an attack then we are obligated to neutralize the threat. As
people involved in ministry we must have careful consideration of how we deal with specific threats
within our place of worship. We must be aware that not only do we have our pastors, elders, and
families present, but the Holy Spirit as well. In the commission of our duties, we cannot forget to be
caring even in the event of an attack or altercation. As leaders within the ministry our first calling is

to spread the gospel. As security operatives we are to protect the worshippers as well as the
sanctuary itself. This can only be done with an eye towards subtlety. We must make our interaction
with disturbances or attackers virtually invisible because we dont want to disturb the flow of the
service. In this chapter we will deal directly with what takes place after a threat has been visualized.
I have purposely presented this chapter on dealing with threats within the sanctuary first because it is
the most important aspect of our positions and it only comes into effect if we failed to neutralize the
action on the outside of the church.
If all of our precautionary measures fail, we are presented with our worst-case scenario: our pastor
and first family have become vulnerable. Where do we go from there? How do we respond? What do
we do with the people? These are all questions that will go through your mind in the event of an
attack. The problem becomes handling the situation in a professional and matter-of-fact way. If we
take the lead as security operatives, then we will have the confidence of not only our pastors, elders
and members, but of the general public as well. If the public feels safe in your building, then they will
come in large numbers. But if the people are afraid, even the best ministry will flounder and fail. We
must be ever mindful that someone is always watching how you conduct your affairs. In this day and
time, news of issues within the Christian community goes straight to the front page. It is highlighted
even more if the information is slightly altered. We should be prepared to have microphones and
cameras shoved into our faces if an actual attack occurs. It is with this understanding that we
approach neutralizing threats within the sanctuary. The sanctuary is where the heart of the ministry
exists. It is where souls are saved and lives are repaired. Any attacks directed towards the sanctuary
must be eliminated as quietly and efficiently as possible. However, there are several things to
consider when approaching this function of the security operative.
1. All eyes will be on you and your teams actions because you are in the sanctuary.
2. Any counter attack on your part must be measured out carefully.
3. You must work as a team.
4. You must have an effective means of crisis communication between team members and authorities.
5. ALL TEAM MEMBERS must have some form of close quarters combat (CQC) training. 6. As a
last resort, CROs must have a clear understanding of range and fire to engage the attacker(s). 7. The
attacker(s) must be removed from the sanctuary at the earliest possible moment and sequestered in a
secured area for the alerting or retrieval of local authorities. 8. Using intelligence and advanced
observation skills the team must seek to identify and neutralize the attacker(s) before they attempt to
execute the attack. 9. Finally, there must be a practiced evacuation plan to disperse worshippers from
the sanctuary.
Extra attention will be drawn to any action taken within your sanctuary if your ministry has a large
presence within the community or has a television broadcast. Members of your media ministry should
be able to edit out any situations or counter actions your security team may make to neutralize a threat
within the sanctuary unless your broadcast is live. Although I consider this to be a plus, there will
still be people present when the action is taken. Im referring to your pastor, his or her family, the
ministry leadership, worshippers and any visitors that may be present. It is vitally important that in
the commission of your duties you do not offend these people. I realize that this makes your job that
much more difficult, but you MUST understand that your position is also one of ministry.
All security operatives should be trained properly in the handling of threats. Although the Conflict
Resolution Officers (CROs) will likely be the most highly trained members of your team, it only
makes logical sense that everyone on your team is at least minimally trained. You should plan and
execute scenarios that challenge your operatives mentally and physically. You must prime them to

operate in the face of extreme adversity, and this cannot be accomplished without the introduction of
stress. You must prepare your operatives to be cursed at and spat upon. They must understand that
many times these insults and small infractions are used as a conduit to a much more dangerous attack.
In training your operatives with scenarios you will give them a controlled environment to make their
mistakes or to experiment. It is this type of training that will enable the individual operative to set his
or her own level of limitations. To be effective you must know your own capabilities, and they will
never be fully understood without being tested. My suggestion is that you develop scenarios along
these lines:
1. Dealing with protestors
2. Dealing with a verbal attack
3. Dealing with an unarmed physical attack
4. Dealing with an armed physical attack
Protestors
As a security officer you may frequently find yourself dealing with
protestors. If your ministry is one that deals specifically with the teaching of
the word in an exact manner, there will be many disagreements between it
and the world in general. If you look at the advent of gay activism within
the United States you can easily see how protestors would target a minister that speaks out against
homosexuality. By and large, protestors are not dangerous to your man or woman of God. They are
only exercising their right of freedom of speech. However, protestors who bring their argument to the
church grounds must be made aware that the sanctuary is not the place for such an exercise. If you are
made aware by a team member or usher that there are protestors present, you may disarm the situation
by designating an area that they can be allowed to congregate. In showing love to those that disagree
you may also have the possibility of winning them over to Christ. It would also be a nice touch to
have a time set aside with the ministry leadership to meet with them, with security present of course.
Many times this will defuse a potentially dangerous situation. Your team can also be positioned to
easily remove unruly protestors from the ministry if you have them located in a designated area.
Verbal Attacks
The easiest way to disturb a ministry is to launch verbal assaults at the pastor or minister while
they are speaking. This causes a disruption in his or her concentration and causes the mind to wander.
It is impossible to minister in the full power of the Holy Spirit while the mind is unfocused because
there is confusion present. An usher, backed by a security operative of course, should make the initial
contact with anyone intent upon initiating this type of attack. The usher can then ask (politely) that the
individual or individuals desist from conversing while the minister is speaking. If the individual or
individuals insists on continuing, the security operatives (present in numbers proportionate to the
number of people involved) should at this point ask that they accompany them outside of the
sanctuary. You must take into consideration that there may be some resistance on the persons part to
being removed from the sanctuary. Techniques that are to be employed will be discussed further in
this publication. This type of an attack is classified as a nuisance attack because it has no physical
objective other than to disrupt or embarrass.
Unarmed Physical Attack
Unarmed physical attacks usually occur as a crime of opportunity. If your rings of security are
presumed soft and an attacker has become emotionally charged by what your pastor is saying, it is
possible that the offended person may try to rush the stage. If and when this happens you must be
prepared to intercept the attack. There should always be someone present near the pastor or speaker

for just such a situation. This is a part of your assignments. Several things should go into effect in the
event someone tries to attack your pastor. They are:
1. Transporters should move immediately towards the pastor and his family.
2. CROs (two man teams) situated in the sanctuary should intervene or cut off the potential attacker.
3. Ushers should begin executing a sanctuary evacuation plan.
4. If the attacker can be removed of his or her own accord, they should be removed to a secured area.
If not, then the area should be locked down prior to the authorities arriving at the ministry.
5. If the counter attack results in injury to the attacker, first aid should be administered prior to the
arrival of the authorities.
6. All team members present in the sanctuary should prepare a report to be turned into the head of the
security ministry for proper filing. 7. Lead security operatives should set up and brief ministry heads
on the outcome of the situation. 8. Lead security operatives should review all information pertaining
to the attack and review each operatives response. 9. Finally, if the media arrives, there must be a
person set aside by the ministry as a PR (public relations) representative to field questions about the
attack.
Please remember that what you do after an attack is sometimes more important than what you do
during an attack. Anything perceived as being incorrect or overkill by the public or the attacker could
result in potentially damaging lawsuits. Again I must stress that you are in a ministry and a part of it
as well. You must act accordingly in all of your functions because you are a representative of the
ministry.
Armed Physical Attacks
If there is any one attack that you should be most concerned with, it is the armed physical attack.
The objective of this attack is to either maim or murder your man or woman of God. It is this attack
that you will spend the most time trying to thwart. If any attack gets beyond your defensive rings and
penetrates the sanctuary, the lives of your first family and church members are at stake. Everything
you do from the initial attempt will determine who lives and who dies. With this understanding I must
ask all of you engaged to consider this:
Are you willing to die to protect your man or woman of God? Are you willing to suffer for the
sake of your fellow worshippers? In the event of an attack, you may be called upon to present your
life as a sacrifice. You need to love your church in order to serve in this capacity. You need to love
your leaders, AND you need to love the people. If you dont love the ministry you are involved in by
all means find yourself another or find a less stressful position within the ministry. I am not saying
this to condemn anyone. I say it understanding that anyone who does not love the people in his or her
ministry will hesitate when this moment comes, and as a result many lives may be lost.
Team members that have developed a rapport and actually have a relationship know that in
sacrificing your body the threat will be eliminated by other operatives. For example: If someone
draws a pistol to fire and you are within arms length it might not be possible for you to disarm him or
her without the pistol discharging. You must consider that a stray bullet could end the life of one of
the worshippers. At this point you may have the opportunity to grasp the weapon and press it into
your shoulder. If the individual fires the weapon several things could happen and they are:
1. Their weapon could jam because it doesnt have the freedom to cycle (semi- automatic pistol).
2. The weapon will fire and the energy will dissipate while attempting to exit your shoulder.
3. The individual will hesitate to fire, which will give you an opening.
4. The individual will not fire at all. In any case, this cant be possible at all if you are fearful of
injury. It is fine if you are, but this is not the position for you.

Here is the series of events that should occur in the event of an


armed physical attack:
1. Transporters should move to shield and remove the pastor and anyone else on the pulpit.
2. CROs should immediately confront the attacker.
3. If the attacker cant be removed by swarming, then the appropriate CRO should position himself or
herself to take the shot.
4. CROs should maintain their positions until the all clear sign has been given by the lead operative.
5. Ushers should execute the ministrys evacuation plan.
6. The local authorities should be activated to provide the proper response.
7. The sanctuary should be locked down prior to the arrival of the authorities.
8. All injuries should be addressed and ambulances dispatched as needed.
9. All operatives should prepare an incident report for the authorities and the insurance company.
10. Finally, the ministrys PR representative should be briefed by the ministry leaders in how to
handle the media crush that will follow such an incident.
It is my sincere hope that no one actually has to put this plan into action, but we must be ever
mindful that we have become targets because of our beliefs. Because we are representatives of a
ministry this means that we will come in contact with all types of individuals and families with needs.
In the commission of our duties we must maintain a constant vigil over our spiritual family and be
ever mindful of those that enter into the ministry. It is highly probable that any potential attacker or
group will send intelligence operatives into your ministry disguised as worshippers. They will be
there to study your teams movements and to find potential weaknesses they can exploit. As a security
operative you must always be on the look out for those that are looking for you. It is common amongst
attackers to try and identify security operatives before they initiate an attack. If they are very good,
this may be the only signal you get before the attack.
Now we will review how we identify and neutralize threats on church grounds.
NOTES

There are quite a few situations that you may encounter as a security operative on church grounds.
Because you are not within the boundaries of the actual building you have more flexibility in
countering threats. This is also the ideal ground for turning back potential attacks by removing them
before they become an issue. There are several situations that you could encounter while on duty. The
most common of these are:
1. Physical assaults
2. Robbery

3. Theft
4. Drug activity
5. Loitering
6. Gang activity
7. Arguments
8. Car trouble
9. Surveillance
10. Medical emergencies
This is only a brief listing of things you are most probable to encounter. On the following pages I will
deal with the proper way to handle each situation. You make take my examples and either ramp them
up or scale them down based on your own needs.
Physical Assaults
Ministry is a very unique approach to the healing of mankind. It is
similar to the medical profession in that, like surgery, it is applied where it is
most needed. You will find churches, mosques and synagogues in the most
dangerous and trying neighborhoods in the country, because this is where
they are needed. Because of our proximity to those that are most in need of
spiritual healing, we are most likely to experience or view physical assaults.
If you observe a physical assault taking place while on patrol, there are several things that you must
consider or execute:
1. Alert your team as to the precise location of the assault. 2. Alert the local authorities of the
situation.
3. Maintain contact as you cautiously approach the scene. 4. Maintain distance until other operatives
join you.
5. Once joined by other operatives, move close to the assault carefully being mindful of potential
weapons.
6. If possible, separate and control the antagonists until the authorities arrive.
7. File proper reports with your superiors and local authorities.
Use extreme caution when dealing with assaults on church grounds. There will often be weapons
present, whether you see them or not. If you are not careful, it is likely that some of your team
members may be harmed or killed during a situation like this. You also cant approach this situation
with overkill even though you are obligated to respond if it is a church member being attacked. Here
are several distinct phases in responding to physical attacks:
1. Pre-contact The approach to the scene of the attack
2. Contact- The actual physical intervention
3. Withdrawal- The moment you disengage from the target.
4. Scene control- The period after the response and prior to the arrival of the local authorities and
media. Please remember that all aspects of dealing with physical assaults are under close scrutiny by
the public, media, authorities, church members, visitors, potential visitors and members, as well as
ministry leadership. As a ministry security operative you walk a very fine line indeed because any
mistake you make can have a horrendously serious affect on the way your ministry is perceived in the
community.
Robbery
Robbery is another very dangerous situation that you may encounter. Many ministries have a
media department and sell items in support of the ministry. You must also consider the large sums of

money available as a result of tithes and offerings by the ministry members and visitors. The
transportation of this money is one of the most dangerous situations you will find yourself in as a
security operative. You must honestly consider the lack of respect for the church, the current state of
affairs within this country concerning drugs, and gang activity. It is this climate that makes it very
dangerous for your team members and any other responsible parties that transport money. There is
also the possibility of an incidental robbery occuring on church grounds with unknown parties. I
cannot stress enough how dangerous it is to intercede during a robbery. In over ninety percent of all
robberies (other than purse-snatching) there is some form of weapon involved. Here is my suggested
series of protocols to follow in the event of a robbery. Take them into consideration, but adjust them
to your particular situation.
1. Communicate - Contact your team leader and have them dispatch CROs as back up.
2. View - Observe the situation from a safe position until help arrives.
3. Contact - Only CROs should make contact, and they must assume that the robber is armed, which
means their firearms should be drawn.
4. Control the Attacker - The robber must not be allowed to respond in any way. He or she should be
taken down and restrained until local police or deputy sheriffs arrive.
5. Control the Scene - No one should be allowed into the immediate area after the attacker has been
subdued. This is even more important if there is any gunfire involved.
6. All responding CROs should be available to answer all questions from the local authorities and
ministry leaders as required.
There is one problem that is inherent to any attack: you are only capable of responding to the
attack. It is very difficult to be proactive because crimes such as robbery and theft are based on
opportunity. It is your job as a security operative to make sure there is not an opportunity. Also be
particularly careful of any situation where a CROs firearm is drawn. Make sure that this individuals
decision to deploy his or her firearm is readily defensible in court because it is probable that this is
where you will find yourself. The best way to defend against attempts at robbery is to have a multilayered approach to transporting the ministry's money. Here are some suggestions:
1. Use several CROs when transporting money.
2. Any security operatives engaged in traffic management should be used as spotters prior to moving
money.
3. All security operatives should be alerted prior to movement.
4. Maintain open communications while moving.
5. Have a secured area to store money.
6. Vary the times and routes, if possible, that are used to transport money.
The last issue is very important when discouraging robbery attempts. Robbers will almost always
conduct surveillance against the mark prior to a robbery. One of the things they are looking for is a
pattern in your ministry's movements. Varying the time frame will make it very difficult for them to
conduct a robbery because any experienced robber will know that his or her potential window is very
small. It is also in your favor that ministries operate primarily during the day, which increases the
robbers possibility of being observed or apprehended.
Theft
Theft is another common situation that you will encounter. This can range from breaking and
entering to shoplifting. I will point out that even though you are involved with a ministry people
sometimes bring old baggage with them when they join the church. There are two primary types of
thefts: internal and external. The internal theft is particularly disturbing, because as members and

responsible parties within the ministry there should be a high level of integrity involved. Whenever
there is a problem such as this within a ministry it has a backlash effect. My recommendation is that
your security lead should turnover any internal the event to the local authorities for investigation, if it
is internal. In this way you will insure that there is no favoritism shown to whomever the individual
turns out to be, there should be no room for infractions such as these no matter who the culprit is.
Drug Activity
In this day and age you may encounter drug activity right on church grounds. You should be aware
that the average drug dealer doesnt respect any location, church or not. He or She will conduct
business in the area near or around your ministry. I know that it may be in your nature to confront
anyone as disrespectful as they are in defense of your ministry, but I wouldnt advise that you pursue
this course of action. Some of my earlier suggestions concerning becoming deputized in your
community will come into play if you find yourself in this situation. There are several things that you
can do that will enable you to defeat and discourage drug dealers from doing business near your
ministry. They are:
1. Set up surveillance of the area if exterior security cameras do not
already cover it.
2. Try to identify the individuals that you observe.
3. Relay communications to your base so that other operatives can support you and your base can set
up a time frame from your first contact.
4. Contact the local authorities immediately. They may be able to interrupt the transaction.
5. Establish and maintain a log of events concerning the situation. Because of the nature of drug deals,
it is best that you dont get directly involved unless it is directly impacting someone within the
ministry. If for any reason you must intervene you should follow these tenets if at all possible.
1. Dont contact the individual alone.
2. Always be polite when speaking with the culprit.
3. Be aware of any potential weapons, and be prepared to act.
4. Never allow your attention to wander from the dealer.
5. Assume that there are more people involved, because there usually are more people situated within
the area.
6. If you must initiate contact it must be dynamic.
7. While you are speaking retreat with the victim situated between yourself and the dealer. The order
above can be rearranged according to your own ministries priorities.
Loitering
Although loitering can be an aggravation, it is usually not a serious
problem in the beginning. However, if left unchecked, it can grow into
several issues. It can graduate to drug or gang activity. If you give in to
individuals loitering then they will push the envelope to find out how far you
will allow them to go. It is necessary that your team maintain control at all
times. Here is the protocol for dealing with individuals loitering on church
grounds:
1. Alert your team of the situation.
2. If there are several individuals present request backup from team members.
3. Approach the individual(s) in a non-aggressive manner. 4. Advise the individual(s) of ministry
policy concerning loitering and request that they either remove themselves or welcome them inside to
worship. (Usually if you invite a person just hanging out around the church to come inside they will

leave).
Gang Activity
Gang activity in and around the church grounds will be difficult to
detect because it will usually take place during hours that no one is on
church grounds. There will be evidence of activity in several ways. Look at
the list below to determine if you have a situation wherein you need to alert
the authorities.
1. An accumulation of trash- You will see food or drink items. Sometimes you will see drug
paraphernalia or empty alcoholic beverage containers.
2. Tags- When there is a gang operating within an area they usually mark their territory with graffiti,
most commonly called tags. 3. Increased traffic- There will be evidence of increased human traffic in
and around your church grounds. 4. Incidents- You will notice or be informed by local police of an
increase in incident calls emanating from near church grounds or on church grounds. If you believe
that gang activity is being engaged on church grounds,
it is best to follow the same protocol as mentioned in the section on
robbery.
Arguments
Whether you like it or not you will have to contend with arguments on
or near church grounds. Your only real options are:
1. Follow the same protocol as listed above in the loitering section. 2. Alert the authorities.
People engaged in a verbal argument will usually leave when
approached or asked, but you should not take this situation lightly because it
could escalate into an assault.
Car Trouble
People having car trouble on church grounds are some of the most
common situations. It can be church members, visitors or the beginning of
surveillance. If it is at all possible, your team should assist individuals with
either repairing or removing their vehicles from church grounds. If a vehicle cant be driven from
ministry grounds you should keep a log on it and it absolutely should not be allowed to stay on the
grounds indefinitely. Provision should be made with an area tow company to remove abandoned or
inoperable vehicles. Your team leader can negotiate reduced fees for towing vehicles for exclusivity.
In doing this you will be of great assistance to ministry members and visitors. You will also decrease
the probability of onsite surveillance by a terrorist team.
Surveillance
There are several things that you should look out for in the event that
someone is conducting surveillance on your ministry. They are: 1. Work crews that never accomplish
any work.
2. Vehicles parked near your ministry on a daily basis. 3. Abandoned vehicles left with a view of the
ministry. 4. Individuals photographing the church grounds.
5. The same individuals loitering near the ministry grounds. Surveillance is usually conducted in
layers. It can be easily spotted if
the teams conducting the surveillance are amateurs. But if they are seasoned professionals it will be
almost invisible. All of the other precautions
that are presented in this book are geared towards discouraging surveillance.
It must be understood though that the most determined attackers cant be

dissuaded. You can only make their attempt more difficult and hope that
they refrain or pursue a target with weaker security.
Medical Emergencies
On the list of most likely situations is the medical emergency. It can range anywhere from a
splinter in the finger to a sucking chest wound. It is your responsibility to prepare for these
emergencies. My suggestion is that your team should have specialized training in this area. The bare
minimum of training for each agent should be to be CPR certified. It would be even better if you
received first responder or EMT training. Many ministries have a staff nurse, and if youre truly
blessed you may have a physician that is a member of your ministry on hand in the event of an
emergency. It would make a lot of sense to have a first aid manual on hand at your command post. In
addition, there are several things that your team should have on hand for medical emergencies:
1. Keep a well-stocked first aid kit on hand.
2. Have a portable defibrillator on hand, if possible.
3. Have a portable container of oxygen on hand with several sizes of cannula.
4. Keep medical splints on hand.
5. Have ankle/wrist wraps on hand for sprains.
6. Have a tracheotomy kit on hand.
7. Keep a military medics kit on hand. Everything listed above can be adjusted based on the level of
training available for your team or medical professionals within your ministry. You should have
enough training to be able to stabilize an injured individual. However you must understand that
several of these instruments are best left to medical professionals or EMTs.

As a security operative you will find yourself in all types of situations. Sometimes it will be as a
result of your actions, other times it will just be the will of God. No matter what the problem is you
will be called upon to be the backbone of your ministry. In this chapter we will explore those
situations that dont fit into any of the other previous categories. These are the types of problems that
will test your resolve simply because you are unaware of how to handle them. In reviewing this
information it will allow you to develop concrete protocols that will guide your operatives in their
actions.
Public Relations
In the event of any type of emergency on the ministry's grounds, you will have to deal directly
with the media. The outcome can either be good or a nightmare based on how questions are answered
concerning actions taken by your team. Most ministries will maintain a spokesperson that speaks on
behalf of the ministry. I would suggest that this individual, if not a part of the security ministry, be
closely associated with it. It will be this spokesperson that will have to meet with the press in case of
a problem on ministry grounds and if they are not fully aware of all aspects of the event they will not

be prepared when the press meeting comes. As a security operative you will be required to brief this
individual after an attack or other event. There will be several questions that need to be answered by
your operatives in order to make this individuals job easier. They are:
1. Time of the incident
2. Location of the incident
3. Persons involved
4. Action taken In providing answers to these questions, you will allow your ministry an opportunity
to put together a game plan for handling the media. The proper handling of public relations will go a
long way towards the establishment of a positive relationship between your ministry, its neighbors
and your local law enforcement community. It will also gain a great deal of respect for your teams
professionalism because it will show the public that you have considered all contingencies in the
carrying out of your duties. As a security operative it is your duty to prepare for any possible event,
even when there are conditions you cant prepare for, which brings us to the other situation.
Fire There is nothing in the human lexicon that induces the fear that fire
does. It is instilled in us from the time of our birth that fire is to be respected and feared for its
usefulness and power. It is very important that you and
your team understand the potential that fire has to change the face of your
ministry permanently. It was a common tactic in the 1960s for Ku Klux Klan members, and other
racist organizations, to torch homes, businesses, churches and synagogues that they perceived to defy
their edicts. This tactic is still used even in 2006. Incendiary devices can be very miniscule and yet
very damaging, particularly when they are placed in a non descript area where they can be allowed to
breathe unrestricted. If you have effectively conducted your sweeps prior to service time you will
have most likely discovered any sequestered devices on church grounds or within the sanctuary.
However this doesnt protect your church against firebombing, arson, electri
cal fires or grease fires if your ministry has a kitchen. Everything your team does will be extremely
important in the event
that there is a fire at your ministry. Your team's function will change from
the primary, which is security, to the secondary, which is transportation.
Even in this circumstance you must be aware that fire can be a diversionary
tactic to leave your man or woman of God open to attack. Your teams
transporters job will not change in any circumstances. They will view a fire
at the ministry the same as an attack, until it is proven otherwise. There are
several things that I suggest your team prepare for in the event of a fire.
They are: 1. Your team should have class three fire extinguishers available for use and the training to
use them properly. 2. Your team should defer to the ushers' authority whose primary function is to
move the worshippers from one area to the other. 3. Your team should communicate the nature of the
fire, its severity, and location to the local authorities. 4. Your team should maintain communications
within its rank and file throughout the situation. 5. Your team should have an assigned area to regroup
during the situation. 6. Your team should continue its security function on the church grounds while the
members and leadership are on church grounds. 7. Your team's watchers should be alert to see if
anyone is displaying suspicious behavior or is trying to leave unseen.
If your team can maintain its composure during a situation as dangerous as this they will have
gone a long way in cementing their relationship with the ministry's members and leadership. Your
team will also save your ministry from thousands to millions of dollars in damage and unimaginable
human lives lost. A fire can be a ravenous beast destroying anything and everything in its path. It can

also decimate a ministry, as it sometimes takes years to recover from the emotional and physical
damage done. In many cases the ministry will never be the same, especially if there is arson involved.
Natural Disasters
If you look at the world and the current turmoil that we are experiencing on a global scale, it is
highly probable that your ministry will have to deal with acts of God. The National Oceanographic
Institute believes that there could very well be a category 7 hurricane in our near future. The level of
devastation a storm like this could deposit on our coast would be on a biblical destruction level.
Recent storms in the gulf coast and Florida have cost our country billions of dollars in damages and
hundreds of lives lost, but it is nothing compared to what could lie ahead. It is with this understanding
that I include this information in this book. There are several things you must consider when putting
together a plan for natural disasters. They are:
1. Expect a huge number of refugees
2. Expect civil unrest
3. Expect violence due to fear
4. Expect no help
5. Expect that the local transportation system will be destroyed and you wont be able to flee In the
event that there is a natural disaster, all governmental efforts will lean towards restoring basic
services. This will take time. There could very well be large-scale panic among the populace
because of fear and uncertainty. The water/sewage system will be damaged or destroyed. There
wont be enough law enforcement officers available to cover such a large area and your team may be
called upon to provide a certain level of security. In the event of such an event it would be wise to
have certain things available within the ministry.
1. Have a back up power source.
2. Have a storage area capable of keeping water and emergency food available.
3. Develop a temporary housing capability.
4. Develop a transportation plan. Depending on the nature and severity of the event it may be a better
strategy to house members of your ministry. A concentrated group of individuals will be able to
maintain security outside of and inside of the ministry. They will also be able to provide comfort and
support to the community that is nearby. If there is the perception of order in a time of trial it will
provide stability. It may be required that you move your ministry's leadership and families to the
church in order to better protect them from the potential dangers an event like this can pose. It is far
better to have to rely on an insurance policy to replace items lost than to mourn over lives lost. It is
also wise to consider that civil unrest is a dangerous backlash from a natural disaster. I have
personally sat through several tornadoes and a hurricane. I witnessed how quickly people descended
into primal behavior after they realized that they had no food, no water, no electricity and no help.
Common theft was the least of all problems. People lived in fear that what small rations of food they
had would be taken by their neighbors. In time of great danger even atheists will seek out the house of
God for assistance. I believe that God would have us prepare for any contingency. We must consider
that in the wake of a large natural disaster we may be called upon not only as security operatives, but
as hunter gatherers. It would be wise for all operatives to become aware of survival methods. There
are several good books out there on the subject. The Coastguardsmans Manual is one of my
favorites. You should have an understanding of how to hunt, gather (what plants to eat which are
dangerous), how to prepare shelters and purify water. As a spiritual family we have to be prepared to
support each other. Communications will be very important because there will be no regular
telephone service. You can also forget about using your cell phones because one good hurricane or

tornado will destroy all of the towers in a given area. The best possibility will be CB radios, good
old citizens band. CB radios can be purchased as base or hand held units, I prefer the hand held units.
Hand held units use batteries and can be a consistent means of communications. Units distributed
amongst the members and leaders of the ministry will allow everyone to maintain contact. This will
combat the feeling of isolation and hopelessness that follows a natural disaster. Another thing to
consider is the issue of transportation. After a storm in our area several years ago there were multiple
incidents in our area of armed conflicts because of gas shortages. It would be in everyones best
interest to start looking into alternative methods of fuel and natural resources. As we have seen with
hurricane Katrina in New Orleans there can be millions of dollars worth of damage and hundreds of
lives lost in the wake of a modest storm. NOAA predicts that in the near future a category 7 hurricane
could hit, which could destroy an entire coast with its power. It has also been noted that in times such
as these there will be a tremendous demand placed on the local authorities which means that your
team may be the only other alternative for your ministry's leadership. If this becomes the case, your
lead must develop a contingency plan that will keep them covered. If your leadership will not be
housed within church grounds I suggest that you perform scheduled and non-scheduled drive bys. If
you can have your teams provide periodic stops to review your pastors home security status you will
be able to discourage activities or attacks against them. All in all this will be one of the most difficult
situations that your team can find itself in. It will require the utmost in dedication and professionalism
because your operatives will be concerned with the safety and well being of their own family.

In this chapter we will examine one of the most important aspects of intercepting an attack against
your man or woman of God and that is controlling the opponent. Through the proper application of
grappling techniques you may be able to intervene and smother the attack of someone intent on
disabling your ministry. In my philosophy of combat there are several methods we use in grappling
and they are:
1. Underhooking
2. Overhooking
3. Twisting
4. Pushing/Drawing
If you are familiar with these simple principles you will be able to effectively engage any attacker in
the closest and most personal range.
Underhooking
The tactic of underhooking is very common in all of grappling based martial arts. Some may call
it by many other names but in its least common denominator it is what it is. Underhooking is
accomplished by grasping any limb and attacking its weakest point with a rising force. This force can
either be a forearm, palm or the crook of the elbow. The effectiveness of this techniques is

determined on the corresponding height of yourself and your attacker. It can also be determined by
their body position. For example, your attacker can be taller than you but if he is on one knee then an
underhooking technique will be effective. Underhooking can be used effectively as an entrance to a
joint lock, throw, restraint or as a removal technique.
Overhooking
Overhooking is the reverse of the underhooking technique and it has similar dynamics. It is
applied by applying pressure in a downward motion. For a taller or stronger opponent overhooking
can be very effective because it can be amplified by the correct application of body mechanics. For
example, if you trap an arm and apply an overhooking technique using the elbow as the fulcrum, you
can quite easily take down your opponent by just laying down. The impact would be devastating to
your opponent.
Twisting
One of the most effective grappling techniques available is twisting. It can be applied to the
smaller joints as well as to larger areas. A twisting technique is also an effective set up for a joint
dislocation or break. Using a clockwise or counter clockwise turn is an easy way of gaining an
advantage against your opponent. It is also easily accomplished by following the path of least
resistance.
Pushing/Drawing
Pushing or drawing techniques are often overlooked but are very
effective in their simplicity. If you catch your opponent off balance a quick
step and the use of a hip check, palm strike, chest strike or trip can cause
them to tumble before you. Equally effective is a quick pull of an arm or
leg of an attacking opponent which will cause them to injure themselves.
These techniques can be amplified by supplementing them with stationary
weapons. For example, a draw into a car or wall can render your opponent
unconscious. An overhooking take down onto a street sidewalk will deliver
maximum impact to any attacker.

Your voice is your first line of


control.

in

conjunction

with

your

voice

is

the

second

line

Gentle hand contact


of
control.

Belt grip and arm bar


combination (front view).

Belt grip and arm bar combination (rear view).

Collar grip and wrist lock to lead unruly visitor away, note second agents position for back up if necessary..

Two man operating. Underhook with armbar (left agent) and wrist control (right agent).

Two man team countering unruly visitor, underhooking armbar with assist from other agent.

In this chapter we will cover one of the most necessary areas of your training as a security
operative in the ministry. We must be effective in our hand-to-hand skills as well as our weapons
craft. We learn from a broad spectrum, but we must never forget that we are in a ministry and this is
our primary function. As believers we have been challenged to display love at all times, even to those
that have determined that we are their worst enemy. This gives us a very thin line to tread in the
commission of our duties. It is written in Matthew 25:40 that Christ said Inasmuch as you have done
it unto the least of all men you have done it also unto me." This scripture, combined with his

command to love one another, is always to be extended to all of mankind even unto your enemies.
You will find the most effective means of defending yourself and your ministry within the confines of
this chapter, but I request that in the execution of these techniques you do it with love and kindness.
I am saying this not only because of our command but from a technical aspect as well. When there
is anger in the human body there is tension and where there is tension there is a leech of power, which
translates to ineffectiveness. Anger also affects the blood flow in the body diverting oxygen from the
brain to other parts of the body as a part of the fight or flight reflex. This lack of oxygen helps to
induce tachy cardia or what some call the tachy- psyche effect (tunnel vision). Any of these angerinduced events have a physiological effect as well as a psychological affect and can cause you and
others to be injured or killed. It is with this understanding that I present the following material to you
with a silent prayer that you dont have to use these techniques at all.
In this chapter I will give you information on several things.
1. The Primary targets of the human body
2. The Secondary targets
3. Pressure points I present a wide variety of options for the security operative to end a conflict.
There is an emphasis on being able to transition from empty hands to weapons as the need arises.
Again I reiterate that you dont engage any attacker with anger and that you modulate your response to
end the conflict with the least amount of damage done to your target as possible.
In order to be effective in hand to hand combat or the use of weapons you must understand the
human body as a target. Within the study of martial arts there are all kinds of methods used to target
your attacker, some effective and some not. In this chapter I will go over simple targeting strategies
that will enable you to defeat even the most determined attacker. The first thing we will look at is
what I call the pain factor. Any attack directed at the human body will induce pain. Pain will direct
your attacker because it is only natural for the body to reflex away from it. If you are savvy you can
stage your follow up attacks based on your opening. In my system of Rekibo we attack the areas with
the largest conglomeration of nerve endings to produce involuntary responses. The management of
these areas is known as the four corners principle. Using pain compliance to direct your attacker is an
effective means of diffusing difficult situations. There are three methods of targeting the human body.
They are:
1. Primary targets- points of the body that cause immediate cessation of all action when struck.
2. Secondary targets- points of the body that set up contact to the primary targets.
3. Pressure points- sensitive area with a high concentration of responsive ganglions.

Primary Targets
The primary targets of the human body are located within the middle column of the body. They
include:
1. The eyes
2. The throat
3. The nose
4. The ears
5. The spine
6. The solar plexus
7. The lower abdomen

The Eyes
Strikes to the eyes are immediately debilitating not just because it is painful, but because it prohibits
you from responding. If you cant see panic will ensue because you are at the mercy of your opponent.
Attacks to the eyes have a high probability of success even if you dont make contact because it is
basic human physiology that you react, by closing your eyes, to anything that approaches them. An
open hand or closed hand strike can be effective. Chemical weapons are often used against the eyes
with good effectiveness. Techniques to the eyes have no qualifiers meaning you dont have to be
strong, male, or even fast you just need to get there.
The Throat
Strikes to the throat gain their effectiveness from depriving your
opponent of oxygen. Anything that disrupts this flow will cause an immediate cessation of the attack
and can result in serious injury or death to your
opponent. Within the confines of this area you will find the brachial plexus,
clavicle notch and the jugular notch. Each of these areas house very sensitive pressure points which
can induce everything from disorientation, temporary paralysis (mental stunning) or even death. It is
because of this that
you must be ever mindful of strikes to the throat. It only takes a few
pounds of pressure to crush a windpipe and during a time of panic your
body will be imbibed with chemicals including adrenaline. Adrenaline will
double your strength making it highly improbable that you will be able to
deliver a light strike to the throat.
The Nose
Although the nose is not often though of as a primary target I will explain to you why I have
included it here. The nose contains a large section of cartilage and underneath is the sinal nerve. If
you receive any type of strike to this area it will be extremely painful. But what can be even more
damaging is the involuntary reflex away from this strike.
Disorientation and loss of balance are just a few of the things your opponent can expect if struck
in this area. Watering of the eyes is another condition that is a by-product of this attack. Again, lack of
vision makes the opponent very vulnerable.
The Ears
The ears are a very good attack for several reasons. First it encloses the inner ear, which is
responsible for balance within the body. Second it is barely attached to the body. A grasping attack to
the ear can easily rip it off which will release a large amount of blood and end any attempted attack.
The final reason is that the ears have a very large nerve situated in the mandibular angle. This nerve
can be struck or grasped to devastating effect.
The Spine
The spine is also considered a primary target and this includes the
medulla obligate. It is the center of all activity in the human body and all
movement originates here. An attack to this area can and will disable your
opponent's ability to move freely. If the attack is sufficiently powerful it can
induce temporary to permanent paralysis or death. It is the number one
conduit of the human body.
The Solar Plexus
The solar plexus is the only area in the human body where an attack can penetrate to the human heart.
To state that it is painful being struck here is an understatement. A powerful jab to this area will

generate nausea, loss of oxygen and involuntary spasms. The area is only the size of a dime but it is
worth knowing where it is.
The Lower Abdomen
The lower abdomen includes the coccyx region, which houses all of the reproductive organs. It is
an extremely sensitive region that well aimed attacks can take advantage of. Attacks to this area can
be executed with gross movements (i.e. grasps, shins, knees, thighs, and hip strikes).

Secondary Targets
The secondary targets are the entire human body. Any area that can generate pain can be used to
set up attacks to the primary targets. In my system we have several means of targeting the human body.
We call these zones.
Zone 1 - long distance - effective attacks are either leg fencing or airborne.
Zone 2 - medium distance - effective attacks are hand based.
Zone 3 - close distance - effective attacks are body strikes (head butts, biting, shoulder/hip strikes,
elbows and knees). Any part of the human body that enters any of these zones dictate the type of
response the defender generates.
Zone 1
Zone one is the area where your primary weapons will be long by nature. The weapons at this range
will either be impact weapons such as your legs or sticks or they will be projectile weapons such as
keys, cups, liquids or firearms. If you must respond at this distance it is only to close and finish the
fight as quickly as possible. Only a firearm has the decisive ability to end fights at this distance unless
you consider hand grenades.
Many would have you believe that long range kicking is an effective means of response, but I
disagree. I believe that only low line kicking is effective in this scenario. Kicking above the waist
only gives the opponent more time to counter your attack. However, I do know of someone for whom
this is an effective option, and that is Hwa Rang Do fighter Bob Duggan. I am a former graduate of
Duggans professional bodyguard college ESI. I have personally seen Duggan execute kicks with
extreme speed and ample power. Anyone caught on the end of a kick by someone as accomplished
will have the same affect as been struck with a baseball bat. I would say, if asked, that he can kick
faster than the average boxer can jab and that is plenty fast. So for our purposes, anything that enters
our attack zone becomes a target.
My suggestion is that you target the legs. Kicking attacks to the legs are very effective especially
if they are targeting the pressure points housed within the leg (median and ulnar). A well-executed leg
kick can disturb the balance of the attacker, and if they are armed cause the aggressor to lose focus of
their target. It is also this response, which bridges the distance from zone 1 to 2.
Zone 2
After you have closed the distance past zone 1 you are now entering zone 2 where your most effective
responses will be hand techniques. Parries, traps, open and closed hand strikes delivered with hard
impact will be the best. Strikes are delivered either linear or circular to the various pressure points
and vital areas. In a close combat situation, I prefer strikes to the eyes, ears, nose, and throat to any
others. Strikes to these soft targets are very effective and have the least possibility of damaging the
hand itself. It is also at this point that you can start to target the four corners of the body for a less than
lethal, but still effective, alternative.

Zone 3
This is the most important phase of contact. Once you enter this zone you will be using very close
body strikes primarily with the elbows, forearms, shoulders, head butts, hip strikes, knees and stand
up grappling techniques. You will also determine in this zone whether or not it is necessary to take
the attacker down. It is also at this range that weapon disarms will take place. Also dont disregard
biting to gain an advantage. It is in this zone that four corners manipulation will shine and be most
effective for the fighter.
NOTES

We will now look at the human body as a weapon. Throughout the body there are bones that were
designed by our creator to absorb heavy impact without disintegrating on contact. Our most powerful
weapons are the areas in the body that protect the most important and vital areas of our body.
The Skull
The skull was designed to protect our brain from damage. The area
of the skull that covers the frontal lobe is harder than any other bone and is
ideally suited for attack. If you are a fan of boxing you will be aware that a
headbutt in close can deliver not only a devastating attack but cause horrendous damage as well. If
you have ever seen boxers Evander Hollyfield or
Hasim Rachman fight in close you will never question the headbutt's effectiveness. Strikes with the
head can be delivered from four angles (rising,
dropping, left and right). These strikes can be delivered with minimal damage to yourself. (see
examples)
The Teeth
The teeth are some of the most important defensive elements in the entire body. Their purpose is
obvious; preparing food matter for digestion. The human jaw is interlaced with sinew and muscle
developed solely for the purpose of chewing. It is this development that lends to the effectiveness of
biting as a fighting technique. Biting can be used either as a setup for a technique or as a means to
escape a grappling attack. (see examples)
The Shoulders
The shoulders are two of the four corners of the human body. They serve as a conduit of motion in
the body. The shoulders arent often considered weapons themselves, but they are very effective
nevertheless. The bones within the shoulder are very dense and can be used to position your attacker
or as an imbalance in close to transition to a stronger technique. (see examples)
The Chest
The bone in the chest (sternum) is heavy because it was designed to
protect the heart. However it is almost never considered a weapon. A chest
strike delivered to an opponent can be tremendously powerful. I have delivered such strikes when

sparring in close, and it was not uncommon to hear


your partner gasp because the pain is so unexpected. (see example)
The Elbows and Forearms
The elbows and forearms are excellent weapons, especially for close quarters combat. You can
condition them with hard impacts to heavy bags or posts. My favorite was a telephone pole in front of
my old address. Blows can be delivered from all angles and are effective because they dont need
either speed or power to be effective, they only need to get there. (see examples)
The Hands
Everyone knows that the hands can be effectively used as weapons. The problem is in the
execution. Certain areas within the body are more susceptible to hand strikes than others. Also the
position of the hand dictates the area of the human body that it is most suitable to attack. By and large
hard weapons should be directed to soft targets and vice versa. A closed hand attack directed to the
front of the skull can easily lead to a broken hand but if you attack the skull with a soft palm the hand
has less possibility of being damaged while delivering an effective strike. In my system of Rekibo we
understand that there are two primary positions of the hand. All punches are a derivative of either the
closed hand or the open hand. Everything else is just a variation. Hand attacks also can be delivered
in a circular attack or a linear attack. Close quarters hand attacks include gouges, grabs, and pinches.
(see examples)
The Hips
The hips are in the same category as the shoulders. They are the last
two corners of the body. They are constructed out of particularly dense
bone because they are in the carriage area and help to support the vital
organs in the abdominal area. Techniques with the hip can be used to set up
throws or imbalance your opponent. (see examples)
The Knees
The knees are the most effective weapons in the body. A knee strike can be delivered to almost
any area of the body with great success. Knee strikes are excellent finishers because of their density.
They produce penetrating power. From disrupting balance to nerve strikes the knees are tops in all
areas. (see examples).
The Shins
The shins can deliver devastating strikes in all attack zones. A rising
shin can attack the groin or it can be raised to attack joints, limbs and
other vital areas. The shins are very powerful weapons. Think Muy Thai.
They do not require extreme development. The shins are strong as is.
(see examples)
The Heels
Stomping attacks and kicks are good techniques to use in close quarters combat. Aligned with the
bones in the legs the heels have a penetrating power similar to palm heel strikes because of their
position. Heel attacks can also be delivered from the feet to the hips with good results. (see
examples)
NOTES

WARNING

All techniques shown in this section are not to be attempted without proper instruction. They are
for visual purposes only.

Forearm parry, and solar plexis punch.

Side step and knee block.

Double wrist trap and head strike.

Foot
trap and palm strike.

Elbow trap and knee strike.

Forearm parry, hammerfist strike.

Forearm lever and elbow strike.

Wrist control, draw and roundhouse kick.

Knife disarm, grapevine palm strike combination with a bite.

Pivot step, arm trap and knee strike.

Hand trap, grapevine control and ear rip.

Arm trap and palm heel strike.

Forearm block and throat strike.

Downward parry and eye gouge.

WARNING
All techniques shown in this section are not to be attempted without proper instruction. They are
for visual purposes only.

Now we will start to investigate the weapons that a security operative can rely upon while

serving the ministry. You will note that all items have something in common: they are hidden in plain
sight. The carrying of the majority of these items will not bring attention to the fact that your
operatives are armed and they can usually be carried openly without drawing attention from the
church members or visitors.
The Pocket Stick
The pocket stick is the first weapon we will cover. It is very subtle because of its size (6"x1").
And although this weapon is often underestimated, it can be very effective. This weapon can augment
hand strikes. It can be used in grappling (joint locks) as well as pressure point strikes. I like it
because no one feels threatened by it. Your team can be equipped with these weapons as a key chain
fob. (see examples)
The Strap
The strap is my own invention. It consists of a group of materials sandwiched together. It can be used
to strike, trap, parry and block attacks. It is again very understated. Its appearance will never disturb
the leadership, members or visitors whenever it is displayed. A person well versed in the use of the
strap can also easily restrain an attacker. (see examples)
The Multi-tool
I am including the multi tool in the weapons section simply because it is an item that is commonly
seen. It serves many functions, and much like a large version of the swiss army knife, it can be carried
by any operative unobtrusively. It is virtually invisible when it is worn on the side. However because
of its sturdy construction and tools it can readily be used as a weapon in the hands of a trained
individual. The pliers portion of the multi tool, when extended, serves as a very powerful weapon
when attacking the various pressure points throughout the human body. (see examples)
Chemical Weapons
Although I dont prefer chemical weapons like pepper gas or mace, I
am including them here in this section because there could be a need for
them in the ministry. These implements are best served as diversionary
weapons, and can vary from very effective to no effect at all when dealing
with aggressors. Use in the lobby or sanctuary is a definite no-no because
they are airborne and have the ability to inflict collateral damage simply by
migrating into the congregation. However, if you must use this type of
weapon, take these things into consideration when training in its use. My
suggestion is that you use a set up strike to open up the facial area prior to
deployment. I also suggest that you dont carry either of these implements openly their deployment
should come as a surprise to your opponent. After the attacker has been sprayed the operative should
maintain control by taking the opponent to the ground until back up arrives. (see examples).
The Flashlight
The flashlight is a very effective impact weapon. Modern flashlights such as the Maglites
(www.maglite.com) and stream lights are constructed out of high tensile strength aluminum. They
were designed to be carried by security personnel or officers as a clandestine weapon. Consider it to
be a nightstick that hasnt been drawn. Every attack that is effective using a club is equally effective
using a flashlight. Currently there is a new flashlight on the scene that has exceptional promise: the
Stream Light xx (www.streamlight.com) . This flashlight was designed with close quarters combat in
mind. It is the size of a pocket stick and has the same capabilities.
The front of the flashlight has been scalloped out to be effective in strikes and it also has a most
interesting capability: it has a built in strobe. I find this very impressive because this function will

give your operatives a chance against armed aggressors by covering the distance for them. The strobe
can temporarily blind your opponents. This allows you the opportunity to engage your threats armed
or unarmed. (see examples)
The Pocket Knife
To say that the pocketknife is an effective weapon is an understate
ment. Contrary to popular belief, the blade you carry doesnt have to be six
inches long to be effective. There are plenty of blood vessels that can be
attacked with a blade three inches or less. The construction of the blade dictates that it be used in a
slashing attack but in this it can be extremely effective. I normally wouldnt include this weapon in
this type of lexicon because its use can be terrifying to people within the ministry. However, it does
remain a viable option for those ministries where carrying a firearm is not acceptable. The nature of
the weapon dictates an intimacy unlike any other defensive item this means in order to use this
weapon you will walk
into harms way. Again I must point out the seriousness of the position that you are in.
It is quite possible you will find yourself in dire straits and you might experience injury or death in
the commission of your duties. You must consider
this. The most effective use of small bladed knives is as supplements to
defensive tactics or in grappling situations. This is primarily due to the
proximity close-quarters combat allows to the vital blood vessels or joints.
(see examples)
NOTES

Every operative should have an understanding of how to develop an improvised weapons


vocabulary. It may be necessary for you to defend your pastor and his family at a moment's notice.
You may have unholstered your weapon or for whatever reason allowed your defenses to relax. It is
at this time that a determined attacker will choose to strike. You must be available and ready to
respond in any situation. In my system of Rekibo we have a proscribed way of classifying all items in
your environment for the purpose of developing this defensive capability. There are only three
categories of weapons in Rekibos weaponscraft. Every weapon will fit into one of these three
categories:
1. Impact- any item which can be handheld and used to strike your opponent.
2. Diversionary- any item which can be used to divert the attention of your opponent away from your
primary attack.
3. Stationary- any item that is a part of the landscape and cant be easily moved by force.
You will note that these categories are very broad. This is good reason for keeping them broad. Any
item in your environment can be used as a weapon but only if you recognize it as such. A wad of
tissue grasped in the hand can be used as a weapon. It actually spreads the metacarpals in the hand

and strengthens it so that any strike delivered in this manner is more powerful yet still be unlikely to
damage the hand. In the following pages I will present examples of all the category's weapons as well
as their applications. I would hope that this will be the beginning of your own personal combat
dictionary. (see examples)
Impact Weapons
Almost anything can be used as an impact weapon. Even the flimsiest
of items can be clenched in the hand. Anything placed in the hand will
cause the metacarpals to expand thereby strengthening the hand for striking
purposes. The construction of each item will determine its effectiveness.
The item is categorized and then mentally placed in a zone. The zone then
determines what is the most effective use for the item. For example, a bottle can cover zones 1 and 3.
This means that it can be handheld and used to
strike within close quarters or thrown at the opponent. You will find that
many of the items listed below have dual functions. Sometimes an impact
weapon can also serve as a diversionary weapon. Take the same bottle and
throw it at an attacker who is armed and that persons response will allow the
defender the opportunity to close and attack from the closest quarters.
Below is a list that I compiled of likely impact weapons. This information
classifies them and also lists if they have a duality.
1. Bottles (zones 1 and 3) and diversionary weapon
2. A coat (zones 1,2, and 3) and diversionary weapon
3. Fingernail file (zone 3) 4. Newspaper (zones 1 and 2) 5. A extension cord (zones 1,2, and 3) 6. Big
gulp cup (zones 1 and 3) and diversionary if empty 7. Toilet tissue (zone 1) and diversionary 8.
Broom (zones 1,2, and 3) 9. Canes (zones 1,2, and 3) 10. Ink pen (zones 1 and 2)
Diversionary Weapons
A diversionary weapon is deceptive. It doesnt do damage by its con
struction. It causes a drop in your opponent's defenses. Diversionary
weapons allow you to bridge the gap between you and your attacker. If
your opponent has an edged weapon or a firearm it is this weapon that will
buy you seconds. These seconds may save your life or someone else's. Here
is a list of items that I have included for your review in this category. 1. A Yell or Scream
2. Salt
3. Pepper Gas
4. A Feint
5. Spit
6. Soda Pop
7. A Bag of Chips
8. Deodorant
9. Rocks
10. Perfume
Stationary Weapons
Stationary weapons can be the most damaging of all because they
include every large and solid object around you. The fighter draws or drives
his or her opponent into it. Depending on their consistency, these items
they can cause a large amount of damage with the slightest contact. Think

of an attack coming and you side step your opponent. You then place your
hands in his or her back and drive them into the adjacent wall. This type of
extreme impact will incapacitate almost any attacker.
1. Walls
2. Floors
3. Cars
4. Fire hydrants
5. Shrubs
6. Other people
7. Chairs
8. Curbs
9. A Door
10. A trash bin
The mastery of improvised weapons is an important skill for the security operative. When you travel
it may not always be possible for you to
carry a firearm to protect your pastor and the ministry leadership. You must
be able to find what you need in your environment.
NOTES

I saved this category for last simply because I know what type of anathema guns are within the
ministry. I must present this reality check for all of my brothers and sisters in Christ. I am an
individual that has not only carried firearms, but have had them save my life on several occasions. I
recognize that they are simply tools. They are no less dangerous than the car you drive or the stove
you cook your meals on. However in the wrong hands these items can cause great injury and grief. To
be honest, I feel that most religious peoples opinion of handguns is irrational. Rather than get into my
personal feelings about this, I will direct my attention to the selection, concealment and use of them
for the preservation of the lives of your ministry leaders, members and visitors. In this chapter I will
present several items. They are :
1. Selection of a weapon - Advantages of the revolver, the pistol, rifle or shotgun.
2. Concealment - How to carry your weapon or where to sequester it.
3. Targeting - Selection of targets within the human body.
Weapon Selection
There are many different types of weapons that can be selected for CRO use within the ministry.
The operative's selection will be solely the opinion of the operative. I will only present their
capabilities. I do suggest that in selecting any weapon you focus on its ability to be concealed. You
must always remember that you are a member of the ministry and must always be observant of your

representation of that ministry.


Revolvers
The revolver is a very interesting weapon. It was created in the early 1800s. It has a round
cylinder that rotates allowing each bullet to be struck by a hammer. This rotation and hammer strike
happens every time the revolvers trigger is pulled. The strong suit of the revolver is that if your ammo
has a hard primer a trigger pull will remove the problem by positioning another round. Rounds I
suggest include the .38 special, .357 magnum, .44 special, 9mm, and .45 acp. I like these rounds
because they come in easily concealed weapons and can effectively stop a determined attacker if
struck in most areas. I will also concede one additional caliber: the .22 magnum revolver. Most .22
magnum revolvers are not only petite but carry nine rounds. If carried by an ammo-sensitive CRO this
weapon can be effective because it lacks recoil and is very accurate. It also has the desirable trait of
not being as loud as the other rounds. I like revolvers from the following companies: Smith and
Wesson (www.smithandwesson.com), Taurus (www.taurususa.com), Colt (www.colt.com) and
Ruger (www.ruger.com). These companies are the best. There are other companies out in the
marketplace that produce revolvers, but I would suggest extensive testing before using them for self
defense.
The Pistol
The semi-automatic pistol has been around since the turn of the cen
tury. It has a self-actuating system that preps itself with each trigger pull.
There are several categories of semi automatics. They are:
1. Single action- These pistols must have the hammer cocked to initialize firing after the first shot the
hammer remains rearward for the next subsequent shots. Good examples are the Colt 1911 and the
Browning High Power.
2. Double action- These pistols can be fired by the pull of a trigger from a dormant position. There
are three versions of this: the da/sa (double action/single action), da (double action) only, and the
safe action.
Do not allow my personal preferences to cloud your judgment as to which type of weapon to
select. I will simply explain their features and let you decide. A da/sa (double action/single action)
pistol fires double action for the initial shot and single action for every other shot. The best examples
of these are Smith and Wesson, CZ, Beretta and Ruger firearms. The da (double action) only is just
that, it fires every round in the double action mode. Smith and Wesson, Ruger, Beretta, and Taurus
have excellent examples of the da only pistol. The last version is the safe action. This system
designed by Gaston Glock is the mainstay of his line of pistols but you have also seen similar types of
actions in the Kahr, S&W 99 and Sigma, Para Ordinance and Steyr pistols. Pistols constructed with
this type of action are very simple to manipulate. They usually have a decent trigger pull which makes
them easier to keep on target. They are also seen primarily with polymer framed pistols which gives
them a manageable recoil. I also recommend a certain brand of firearms that is not often mentioned
when speaking of pistols and that is the Keltec (www.keltec.com) pistols.
The 9mm P11 is an excellent and economical firearm that features a unique da only action. It
holds the distinction of being the lightest 9mm pistol in the world. It holds 10 rounds of 9mm
ammunition and is very accurate for its size. The other pistols they make that I like are the P32 and
the P3AT. One is in .32 acp and the other is in .380 acp. These pistols are very small and can be
concealed by anyone. They employ a system that is not that dissimilar to the Glock and are reliable.
The Keltec pistols were originally designed for the intelligence community and their compact
.32s and .380s are carried by hundreds of UCs (undercover officers) and thousands of civilians.

They are good bargains for the money spent, especially for the CRO on a limited budget. In the ammo
department I like .32 acp (ultra concealment), .380 acp, 9mm mak, 9mm, .40, .357 sig, and .45 acp. In
some instances it may be necessary to carry smaller calibers (.25 acp and .22 lr) but in that type of
situation you should be able to conceal a Keltec P32 on your body, which gives you good service
with the correct rounds.
Rifles
Within the confines of a ministry the lead security operative and the
leadership may determine that they would like to keep other weapons on
hand in the command center. These weapons will be made available to the CROs in a worst-case
scenario, terrorist or gang attack. If there are to be long arms in the command post I advise using
either a pistol caliber carbine or a shotgun. There are a lot of available rifles on the market but there
are
several that I like that have reasonable prices. They are: 1. The Highpoint Carbine - This rifle comes
in 9mm and .40 caliber. This rifle is highly regarded in spite of its economical price. There are many
government agencies as well as local and stated departments that use this weapon. 2. Keltec - Keltec
makes a folding rifle in 9mm and .40 caliber that can be easily concealed within the command center.
3. Ruger - Ruger makes a 9mm and .40 caliber carbine designed as a patrol rifle. They are made with
the same excellence as all of their company's other products. 4. Beretta - The Beretta Storm is a
fantastic platform that is in the mid price range. It comes in the standard 9mm and .40 calibers. It also
has the distinction of many different available upgrades or add on equipment available.
Shotguns
If you are considering adding a shotgun to your command center
there are only two options to consider and they are semi auto or pump. The
caliber is simple: twelve gauge. Depending on your training, a high quality
semi auto such as a Bennelli (www.benelli.com) or a Remington 1100
(www.remington.com) might be a good suggestion. However if you want to
keep it simple, selecting a pump shotgun from Mossberg
(www.mossberg.com),
Remington
,
H&K
(www.hecklerandkoch.com),
Winchester
(www.winchester.com), or Benelli is the way to go. The only issue with having a pump shotgun is
where to locate it or them and what type of ammunition to use. However if you factor in less than
lethal ammunition for the shotgun it presents an added dimension. I feel that the carbine is a more
flexible weapon based on the requirements of any weapon wielded by a ministry security operative. I
do suggest you examine your ministry and possible scenarios to determine if the shotgun will be a
good fit for your
operatives. The next thing we will cover is concealment. This section will only
apply to handguns, although the Keltec carbine can be folded in half, which
makes it easily concealable.
Concealment
Carrying your weapon concealed is extremely important for the CRO.
No one should be aware of who is carrying and where the gun is located.
Guns can be carried in several ways.
1. On the hip
2. Under the shoulder
3. On the ankle
4. Off the body (in a purse, fanny pack or case)

Most male individuals that carry handguns will carry them on the hip.
If you are going to carry on the hip you should consider going to a good
tailor so that he can modify your clothing to conceal your firearm better.
There are several advantages of carrying on your hip. They are: 1. Easy access
2. Speed of draw
3. Large number of manufacturer choices
Shoulder Holsters
Carrying your weapon in a shoulder holster is another option. It has
several advantages as well. They are :
1. Easier to conceal
2. More secure from a gun grab
3. You can carry a larger weapon
If you are going to carry a large revolver you may want to consider a
shoulder holster. Because the weapon is located under your arm, it is easier
to conceal a longer barrel. The butt of your firearm also does not protrude
from your body, as it does with a weapon holstered on your hip.
Ankle Carry
The other carry is the ankle carry. I actually like the ankle carry for
certain types of mission. It has several advantages. Theyare : 1. The weapon can be easily concealed
in any type of weather. 2. The weapon can be accessed easily.
3. The weapon type is not a consideration.
I like the ankle carry for a ministry operative because it offers them a
highly concealable alternative. Although its not as fast as a hip draw it does
dictate that the operative must learn to move before he or she indexes the
weapon. Ideally the type of weapon that you select for carry will determine
the best way to conceal it. If you select an ankle carry for a 1911 or a .357
magnum you will have to consider that the holster will ride down and
become visible. A long barrel cant be used effectively in the ankle carry, youd have to roll up your
entire pants leg and that just wont do.
Off Body Carry
The next type of carry is the off body carry. Common holsters in
this category are gun bags, fanny packs and other types of containers.
Carrying the weapon in this manner makes it invisible, but it also makes it
more difficult to access as it is enclosed. The gun bags that are designed for
females to carry look horrendous. No fashion conscious female would be
caught dead with one, though they do work very well (see examples). Fanny
packs worked well when they were being worn as a fashion statement way
back when, but now they stand out as irregular, and sometimes even suggest
that you are carrying a gun (see example). The last type of carry is in the
portfolio or other type of carrier. I do like the types of solutions the various holster makers have come
up with in response to this tactical question.
You will have difficulty in accessing the weapon, but if you have to walk
into a board room you can carry your weapon in this manner with confidence that no one will know
that you are armed unless you are called upon
to retrieve it (see example). There are several holster makers that I recommend for serviceable

equipment for the security operative:


1. Safariland (www.safariland.com)
2. Galco (www.usgalco.com)
3. Bell charter ( www.bellcharter.com)
4. Uncle Mikes (www.unclemikes.com) economical but serviceable 5. Kramer
(www.kramerleather.com)
6. Fobus (www.fobusholster.com)
7. Bianchi (www.bianchi-intl.com)
8. Desantis (www.desantisholster.com) Any of the above holster makers will have something suitable
for your
operatives well within any price range.
Targeting
The last thing we will cover in this chapter is targeting. If you have to engage an aggressor what
do you do? The objective of drawing your weapon is to halt an attack. This is the only acceptable
reason for using your weapon. There are several primary targets in the human body. They are:
1. The head
2. The heart
3. The liver and kidneys
4. The spine
A well placed bullet in any of these areas will stop any attacker in his tracks. If you are using a
subcaliber pistol (.22,.25, or .32) a shot to the neck or into the eyes will be equally effective. I know
that even as you read this your mind will dread the thought of using this information against another
human being, but it may very well be the only option left if an attack occurs at your church home. If
you are selected as a CRO, I suggest that you seek additional firearms training. I can suggest several
companies:
1. Executive Security International (www.esilifeforce.com)
2. Defense Associates (www.defenseaccociates.com)
3. Front Sight
I personally attended ESI and can attest to the relevancy of their training. As for the other companies,
I have heard only good things about their teaching methods. There are also plenty of other companies
that provide training. You will need to review the companies that are indigenous to your area. You
should also learn as much as you can about your area's laws concerning self defense. If it is possible,
a police officer or local prosecutor could provide you with good training.
Here is a sample of some of the weapons I am familiar with which I recommend:

Keltec 3AT with laser sleeve

Browning High Power (SA)

Glock 26

CZ75B

Browning FNP (DA)

Kahr PM9

Keltec 3AT

Kimber Full Size 1911

Keltec P11

Kimber Compact 1911 (SA)

Smith & Wesson MP

Sig Sauer P245

Smith Revolver

Taurus Millenium

Taurus Snubble

Storm

Taurus Revolver

Tomcat

Here are a few suggested inconspicuous holster options. Holster Gallery

Galco Ankle

Inside Pants

Small of the Back

Galco Matrix

Pocket Holster

Fanny Pack

Long Arms Gallery

30 Carbine

Ruger Carbine

Beretta RX4

Remington 870 Shotgun

Beretta Storm Carbine

We live in an uncertain time. As Christians, we face all types of dangers just because of our
devotion to Christ. Standing in the forefront of this opposition is the man or woman of God.
Sacrificing all for the sake of spreading the gospel of Christ, they risk their lives while speaking the
truth. Hostile media and religious fanaticism are just some of the things they must be protected from.
The scriptures state that we will be recognized as followers of Christ by our love. It is this love
that we must constantly display while in the commission of our duties, no matter what the situation.
Even though I am a protection specialist, I am acutely aware that I represent a ministry and that all
of my actions are seen as indicative of my ministry's leadership. For this reason I am constantly
prayerful that I put my best effort forward and that I never approach any attacker with malice.

However, we must make potential attackers aware that just because we love Christ doesnt mean that
we are incapable of defending our place of worship or ourselves.
There is an old saying that states, In order to live in peace you must first prepare for war.
Extremism in any form is a danger not only to the ministry but to our way of life. So lets pray that in
following the strategies set forth in this book, we have prepared for a test that never comes.