+49 8331 6908 825 +49 1557 8648 351 Mon-Sun 0-24 Am Heidebruch 1b, 81375 Munich, Germany
Ceritified
ISO 28000 | ISO 28007:2015
Number #1
Provider in region

Celebrity Protection

Xtreme Security has up-dated the traditional face of celebrity and entertainment protection by generating a secure method of
protecting clients that is flexible, discreet and effective.

Unfortunately celebrities around the globe face an ever increasing burden of intrusion and disturbance from the paparazzi,
the media in general, potential kidnappers, stalkers, robbers and threats that normally come from some form of envy.

Therefore celebrity protection today, has became necessity.

Dealing With Media

We realize that wherever you are, there will be a media presence.
We also fully realize that media presence can be just as challenging to monitor, if not more so than crowd control.
Our personnel are fully trained to cope with the media presence in both crowds and traffic situations while maintaining celebrity security.

Our staff are capable of running any other duties whilst on task such as transportation, family and media liaison to allow the celebrity to focus on what they do best!

Executive Protection

Executive Protection (EP) is a security specialty focused on safeguarding the life, health, time, reputation, and peace of mind of corporate executives and others who face elevated risk.

Executive protection (EP)—the task of keeping key personnel safe from intentional and unintentional harm—is a widespread, recognized specialty in the security field. Its purpose is to safe-guard people who face an above-average level of risk or whose security is especially important to an organization.

In today’s complex threat environment, the challenges to executive protection professionals—and to their principals—have never been greater.
And so, there are also a different type of executive protection.

Overt—Low-Profile—Covert

Overt

Overt refers to operators who anyone can see are on-duty as security personnel. Everyone knows who they are and what they’re doing.

Low-profile

Low-profile operators are usually plain-clothed individuals (or ones dressed like the people around them) who try not to draw any attention or make it too obvious that they’re providing protection. Most untrained people will probably not notice who they are and what they’re doing but trained and/or experienced and/or observant individuals might. Strictly speaking, low-profile isn’t an attempt to hide security, just to make it less conspicuous and attention-grabbing.

Covert

Covert means that nobody is supposed to know that there’s an operator there. It’s not a question of hiding or camouflaging but of blending in and making it appear like the operator is not engaged in a protection or intelligence operation.

So, what type of Operation fits to your needs?

Our colleague Ami Toben could not have explained better than he did in his book
“SURVEILANCE ZONE”.

Whenever I get a request for a covert operation, I start by asking the client about their concerns and goals. Quite often, once the picture becomes clearer, it turns out that an overt or low-profile situation can serve their needs much better than a covert one.

Some clients ask for a covert operation simply because they think it gives them a higher level of protection. I’ve often had to explain that the covertness factor can be an important tool, but that it isn’t necessarily the right kind of tool for every job. This is most apparent when the job in question is preventive physical security.

It’s true that in most cases, the covert operator is more skilled than a conventional one, but the covertness factor isn’t always the best way to achieve your protective goals. It can, in fact, make things much trickier, not to mention more time consuming and expensive.

Covertness is a tool, not a goal.
Many people fall in love with the idea of a covert operation without first considering if it’s the best tool for the job.
The tool needs to serve the goal, not the other way around.

We don’t need to add anything to this…
If you’re interested in more information about any of what was discussed here, please contact us with confidence and we would find the best solution for your needs.

Threat & Risk Assesment

Threat awareness, evaluation and avoidance is the key to effective protection.

Our threat assessment is a clear, logical, accurate, relevant and comprehensive.
With the addition of reconnaissance and background checks which in essence are risk assessments of both,
the location you will visit and the people you will encounter there, we ensure all bases are covered.

When managing the possibility of a threat, we at first do our very best to AVOID the threat in the first place,
and then try to ESCAPE the threat. If extraction from the scene is not achievable, only then will we confront the threat.

In the world of Close Protection security, the basis of all planning for protection of the client, is derived from
the threat assessment.

A threat assessment defines the current situation, historic development and the methodology of the threat in which we
place our principal. Once prepared, the assessment is not concluded or static, but forms the basis of a dynamic, ever-changing assessment as more information appears.
A threat assessment can be done on an entire country or simply an individual; in every case it has many treads and facets.

The “Threat” is external and constant. Apart from per-emotion there is little can be done about it.
“Risk” is what we are paid to reduce by taking appropriate measures. The risk is NOT constant.
95% of the protection of a VIP consists of waiting, planning, ‘what if’ and carrying out the day to day duties of normal life in anticipation of the 5% of actions, thinking under pressure and keeping the VIP safe.

​The anticipation and planning consume 100% of our attention

Operational Intel & Planning

CP Operations need to have the correct planning to establish the correct drills and profiles for each threat of operations.
Within an established operation there may be a requirement to plan for a particular event or trip that is not normally catered for.
That planning is on what we put great importance.

A well planned operation significantly reduces anything left to chance and permits the operation to be conducted in a smooth and professional manner.

Our most important aspect of VIP protection is preparation.
Good preparation allows us to be pro-active and in charge, not always having to react to a crisis.

Preliminary security arrangements at all the sites to be visited by the VIP are made by our advance teams.

This is the role of our Security Advance Party (SAP).

To achieve this our SAP carry out a site survey to identify areas requiring security upgrades so that the visit of the VIP progresses smoothly and safely, ensuring where possible that the detail knows all security arrangements prior to the actual visit.

Counter Surveilance

A Major component of criminal and terrorist planning is prior surveillance of their target.
We are constantly alert to the fact that someone could have the principal under observation.
Failure to understand surveillance methods will mean that we will be unaware of the criminals watching you and therefore you are most probably under greater danger.

Counter surveillance is our responsibility, and there are certain drills and techniques which
our teams can employ if they think you are being subjected to a surveillance.
However proper planning and preparation can assist in our counter surveillance plan.