linked to www.secretservice.gov header image linked to www.secretservice.gov header image linked to www.secretservice.gov header image
Skip Header InformationSkip to navigation United States Secret Service USSS Star
   United States Secret Service Star

HOW PROTECTION WORKS

Protective Operations

The Secret Service is world-renowned for the physical protection it provides to the nation's highest elected leaders and other government officials. To safeguard Secret Service protectees, the agency does not generally discuss the specific types and methods of its security operations.

The Secret Service is world-renowned for the physical protection it provides to the nation's highest elected leaders and other government officials.
The Secret Service is world-renowned for the physical protection it provides to the nation's highest elected leaders and other government officials.

In general, permanent protectees, such as the president and first lady, have details of special agents permanently assigned to them. Temporary protectees, such as candidates and foreign dignitaries, are staffed with special agents on temporary assignment from Secret Service field offices. All current former presidents are entitled to lifetime Secret Service protection. However, as a result of legislation enacted in 1997, President George W. Bush will be the first president to have his protection limited to 10 years after he leaves office.

The protection of an individual is comprehensive and goes well beyond surrounding the individual with well-armed agents. As part of the Secret Service's mission of preventing an incident before it occurs, the agency relies on meticulous advance work and threat assessments developed by its Intelligence Division to identify potential risks to protectees.

Advances in technology and the world's reliance on interdependent network systems also have changed the Secret Service's protective responsibilities. No longer can law enforcement rely solely on human resources and physical barriers in designing a security plan; agencies also must address the role and inherent vulnerabilities of critical infrastructures upon which security plans are built.

Protective Visits

In general, for protective visits, teams of Secret Service personnel travel in advance and conduct site surveys, which assess needs for manpower, equipment, hospitals and evacuation routes for emergencies. Fire, rescue and other public service personnel in the community are alerted.

Before a protectee arrives at any site, a lead advance agent coordinates all law enforcement representatives participating in the visit. Intelligence information is discussed and emergency options are outlined. Prior to the arrival of the protectee, checkpoints are established and access to the secured area is limited.

The assistance of the military, federal, state, county and local law enforcement, and the public safety organizations is a vital part of the entire security operation. During protective visits, Secret Service and local law enforcement personnel form a network of support for members of the detail working in close proximity to the protectee. A Secret Service command post acts as the communication center for protective activities, monitors emergencies and keeps all participants in contact with one another. After the visit, agents analyze every step of the protective operation, record unusual incidents and suggest improvements for the future.


Protective Research

Protective research is an integral component of all security operations. Agents and specialists assigned to conduct protective research evaluate information received from law enforcement, intelligence agencies and a variety of other sources regarding individuals or groups who may pose a threat to Secret Service protectees. These agents review questionable letters and e-mails received at the White House and maintain a 24-hour operation to coordinate protection-related information.

 linked to www.secretservice.gov header image USSS Star

Search
» Search the website

Powered by USA.gov

About
» Home
» Who We Are
  - Director
  - Deputy Director
  - Special Agents
  - Uniformed Division
  - Support Personnel
» Our Dual Mission
» Rowley Training Center
» History
» Frequently Asked Questions
» Student Q&A

Contact Us
» Contact Information
» Field Offices

Investigations
» Investigative Mission
» Criminal Investigations
» Forensic Services
» Investigative Support
» Know Your Money
» Electronic Crimes Task Force
» Law Enforcement Resources

Protection
» Protective Mission
» How Protection Works
» National Special Security Events
» National Threat Assessment Center

Press Room
» Most Wanted
» Photo Gallery
» Press Releases
» FOIA
» Information Quality

Business Opportunities
» Procurement Division
(For Vendors)

Employment
» Opportunities
- Special Agent
- Uniformed Division
- Professional
- Technical
- Administrative
- Technical Security
- Student Temporary
  Employment Program
- Volunteer Interns
Student Career
  Experience Program
» Current Vacancies
» Electronic Job Application Forms
» Equal Employment Opportunity
» EEO Data Posted Pursuant to the
No FEAR Act
» Reasonable Accommodation

Partnerships
» Boys and Girls Club Partnership
» Center for Missing and Exploited Children Partnership






Copyright © 2008 United States Secret Service. All rights reserved.
http://www.secretservice.gov
Home | Privacy Policy | Security Notice | Section 508 | Department of Homeland Security | USA.gov