Executive movement risk is rarely solved by adding a vehicle and a driver. It is solved by understanding how routine, public exposure, information leakage and travel patterns combine to create assessable risk — and then deciding which controls actually reduce it.
Executives, principals and senior officials may be exposed not only because of specific targeting, but because their movements are observable, their schedules are partially public, and their environments transition repeatedly between controlled and uncontrolled space. Each transition is a decision point. Each decision point can be assessed.
An executive movement risk assessment is the structured evaluation of those transitions. It is an advisory function. It is not a protective operation, and it is not the deployment of close-protection personnel.
What Executive Movement Risk Actually Is
The instinctive response to executive risk is to focus on the threat actor: kidnap, hijack, assault, intrusion. The threat actor matters, but the assessable risk is generated by the combination of three factors, none of which the executive directly controls in the moment.
Predictability. Repeated routes, fixed timings, recurring meeting venues, regular social patterns and the visible movements of household members all reduce the planning burden on a hostile party. Predictability is often one of the largest contributors to assessable movement risk because it is the variable hostile reconnaissance is designed to discover.
Exposure. Time spent in environments where access cannot be controlled — arrivals and departures, kerbside pick-ups, restaurants, golf clubs, school runs, public events, airport forecourts, hotel lobbies — is when the executive is reachable by an opportunistic or planned actor. Exposure is the period in which the threat actor must act, and the period in which controls must function.
Information leakage. Personal assistants, drivers, household staff, social media, corporate calendars, press releases, frequent-flyer programmes and routine business correspondence all leak information about future movements. Information leakage is what converts a general threat environment into a specific opportunity.
These three factors are why the right question is rarely “is the principal threatened?” The right question is: “which of the principal’s recurring movements is most predictable, most exposed and most discoverable in advance?”
Where Movement Risk Concentrates
Across executive engagements in South Africa and on cross-border travel, assessable risk concentrates in a small number of recurring movement profiles.
Home departures and arrivals. The home address is usually the most predictable point of departure. Departure timing is often constrained by school runs, gym schedules or meeting calendars, all of which create narrow, observable windows. Residential arrival and departure points often create short, predictable exposure windows and should be treated as important control points.
Office arrivals and departures. Underground or undercover parking, lift lobbies, reception areas and after-hours departures concentrate exposure into short, predictable windows. Building access controls that protect the asset do not necessarily protect the executive in the kerbside or basement transitions.
Recurring social and lifestyle venues. Restaurants, sports clubs, religious institutions, family events and recreational properties are repeat venues with publicly known timing. They are also the venues where personal protective discipline is lowest.
Airport and hotel transitions. Domestic and international travel concentrates risk into a small number of predictable transitions: kerbside drop-off, baggage handover, lounge entry, gate boarding, arrival kerbside, hotel forecourt, hotel lobby, room corridor. Each transition is a control point that can be assessed.
Cross-border and high-risk-jurisdiction travel. Risk shifts materially when the operating jurisdiction changes. Local response times, kidnap-for-ransom prevalence, hotel security standards, ground-transport providers, communications coverage and contingency arrangements may be substantially weaker than in the home jurisdiction.
Family and household movement. The exposure of spouses, children and household staff is frequently higher than the principal’s, because their movements are less protected, more routine and less scrutinised. Hostile parties may target the most accessible member of a household rather than the most senior.
What a Structured Movement Risk Assessment Examines
An executive movement risk assessment evaluates the recurring movements against the threat environment, the control environment and the consequence profile. It is the same logic as any other physical security risk assessment, applied to a mobile asset rather than a fixed site.
Specifically, the assessment examines:
- the principal’s recurring movement profile across home, office, travel, social and family contexts;
- the principal’s role sensitivity, public profile and acceptable level of protective friction;
- the credible threat environment in each operating jurisdiction, including criminal, opportunistic and targeted scenarios;
- the information environment — what is publicly known, what is discoverable through routine reconnaissance, and what is leaking through staff, calendars and social media;
- existing arrangements — drivers, vehicles, residential security, route practices, communications discipline, contingency protocols;
- the integration between household, office and travel arrangements, including handover points;
- response capability in each operating environment, including realistic response times and the suitability of local providers;
- the consequence profile — what an incident would mean operationally, reputationally and personally for the principal, the family and the organisation.
The output is a structured risk view, not a procurement list. It clarifies where the principal’s exposure is genuinely elevated, where existing arrangements are working, where they are not, and which targeted interventions would reduce assessed risk most efficiently.
Controls That Actually Reduce Movement Risk
Movement risk is most effectively reduced by a small number of disciplines, applied consistently. The disciplines are unglamorous and easily neglected.
Variation. Varying routes, departure times, venues and patterns to break observable predictability. Variation often has low direct cost and can be one of the highest-value controls, although it requires discipline and operational buy-in. It is also the discipline most often abandoned under operational pressure.
Information discipline. Restricting who knows what about future movements; reviewing calendar exposure; controlling staff social-media behaviour; treating travel itineraries as sensitive information; eliminating routine confirmations that travel via insecure channels.
Driver selection, training and supervision. The driver is the most consistently present element of the executive’s security environment. Driver competence, judgement, vetting and discipline matter more than vehicle specification. A trained, situationally aware driver in a standard vehicle is a stronger control than an inattentive driver in an armoured one.
Pre-travel intelligence. Structured pre-travel review for each non-routine movement: jurisdiction profile, hotel selection, ground-transport arrangements, route options, local response, communications, contingency. Done well, this is a 30-minute discipline applied to each significant trip.
Contingency protocols. Pre-agreed actions for foreseeable disruptions, security incidents, medical emergencies, lost communications or attempted hostile contact. Contingency protocols are most useful when they have been rehearsed; least useful when they exist only in a binder.
Residential and household integration. Aligning home security with movement security, so that the residence does not become the predictable, exposed weak point in an otherwise considered arrangement. In South Africa, residential departure and arrival points are often among the most important exposure areas to assess.
These are advisory disciplines. They do not require an entourage. In many cases the most cost-effective intervention is to reduce, not increase, the visible protective footprint, while strengthening discipline behind it.
Distinguishing Advisory Assessment from Protective Operations
Executive movement risk assessment is distinct from executive protection operations.
Assessment is an advisory function. It examines the risk, the controls and the gaps. It produces findings, priorities and recommendations. It supports the principal, the family and the corporate sponsor in deciding what protective arrangements are warranted.
Protective operations — close protection, drivers, residential guarding, secure transport — are operational delivery. They are normally provided by specialist operators contracted for that purpose.
The two functions should not be conflated. A protective operator assessing whether protective operations are required has an obvious commercial interest in the answer, which is the same conflict explored in Why Security Recommendations Must Be Independent of Product Sales.
Keown & Associates conducts the advisory assessment. The firm does not provide protective operations, drivers, vehicles or close-protection personnel. Where protective arrangements are warranted, the firm helps the client define scope, capability requirements and selection criteria so that the operator can be contracted to a defensible specification.
Conclusion
Executive movement risk is assessable. It often concentrates in recurring transitions, is amplified by predictability and information leakage, and is reduced most efficiently by disciplined variation, information control, competent driver arrangements and tested contingency planning.
The starting point is not procurement. The starting point is a structured assessment of how the principal actually moves, where the exposure genuinely sits, and which controls would reduce assessed risk in a defensible, proportionate way.
Keown & Associates conducts independent executive and sensitive-movement risk assessments for principals, families and corporate sponsors. Engagements remain advisory and risk-based.
Discuss a Security Risk Assessment | Discuss an Advisory Requirement