Wolfen said: Kayleb, since you've been trying to herd us into better security all along, how about you propose a step-by-step list of embarkation and disembarkation security procedures? (Skills rolls and such where appropriate, too.) Mkay. Just a draft suggestion. Input appreciated. I'm thinking of a three phase plan, with the second two phases being repeated each time we move a VIP. The primary idea behind these steps is that protecting people is all about looking ahead. Seeing potential and actual threats before any violence occurs should be our main focus. And we have people with the skills to make that our big selling point. So the three phases are: Investigation Reconnaissance Secure Movement. 1. INVESTIGATION. When taking on a new client, a full investigation is carried out - on them . All information gathered on a new client is protected under the company's solid confidentiality policy. They should be able to sue us into oblivion if any private information is leaked because of us. The goal of the investigation is to identify potential threats. Interview. The client is thoroughly interviewed to ascertain what groups or individuals pose a potential threat to them. Their line of business, role in society, political affiliations, and previous relationships are all taken into account. The security of their electronic affairs is "tested". We probe into their electronic records and attempt to find out if anyone else has been probing into them. Who is watching them? Threat flagging. Any potential threats are then investigated. Their finances and communications are probed. Who are they talking to and who is receiving their money. If they are communicating with or sending funds to mercenaries or to individuals with military or criminal backgrounds those are also flagged and probed. A full profile is then drawn up of all potential threats. Their possible motives, equipment, movements, affiliations, and pressure points. How can they be avoided? What would make them back off? How is the client best defended against their likely mode of assault? Trip Planning . Threats can be both organized and random. Movement needs to be planned in order to minimize risk to the client. Local threats to safety need to be investigated. History of piracy, military conflict, and other hostile activity needs to looked into. Natural hazards need to be identified and avoided. Hazards that cannot be avoided must either be eliminated or bolstered against. Contact will be made with authorities at the clients immediate and ultimate destination to arrange the maximum level of security for the client. 2. RECONNAISSANCE The client never goes where our eyes haven't been first. Electronic. Local information networks are accessed to gain intelligence regarding potential threats. Security systems accessed and investigated. Who else has access to them? Traffic, berthing ,accommodation and local financial institutions monitored. Have any threats that were flagged during the investigation phase moved into the area? Tele-operated Remote probes fitted with advanced sensors are used to search for potential threats. Visual Security personnel on foot will always travel ahead of VIP party. Scout Vehicles will always travel ahead of VIP vehicles. Advance parties will always be equipped with the best available sensor equipment, and consist of trained and experienced individuals. VIP party will not move into an area that has not been cleared by an advance party. 3. SECURE MOVEMENT All movement is conducted in such a way that minimum opportunity is given to any potential threat to engage in hostilities against the client. Armour. Clients will leave the ship in an armoured vehicle, and leave the armored vehicle wearing personal body armour. Armour is to be of the maximum level of protection that the situation will allow. While social and legal settings will be taken into consideration, the client will comply with what the company considers to be an appropriate level of protection for any given situation. Speed. An indirect, well covered route will be taken to the clients destination at the best possible speed. The highest level of speed and efficiency of movement is to be maintained in order to present threats with minimum oportunity to deliver an attack. Local laws and safety factors will be observed. Decoys High end holographic equipment will be employed to project convincing decoys. Holographic decoys of both vehicles and the VIPs themselves should be projected and moved ahead of the VIP party. They should project in both visible and infra-red spectrums in order to appear on thermal imaging equipment. Accommodation, travel plans and security will be arranged for dummy locations. Point Defense Both area and point defense will be deployed to provide the maximum level of protection against long range ordinance attack, situation permitting. Contact drill. All staff will be trained to act in response to enemy contact. Training will include the deployment of obscuration and exit strategies. Removal of the client from immediate danger will be the focus of all activity during contact. Shield from threat. Removal from area. All staff will be equipped with the highest grade body armour, side arms and sensory aids that the situation will permit. ((still a work in progress. Still hoping to suggest skill chains for each of these points. But now must sleep.))