Surveillance and Threat Detection
eBook - ePub

Surveillance and Threat Detection

Prevention versus Mitigation

  1. 264 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Surveillance and Threat Detection

Prevention versus Mitigation

About this book

Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, fixed site facility can be integrated into an overall security footprint for any organization. - Understand the terrorist/criminal cycle and how to interrupt that cycle to prevent an attack - Understand how to encapsulate criminal and terrorist surveillance, analyze suspicious activity reports, and use an all-hazard, threat-based surveillance detection protection program - Access a full ancillary package, including instructor's manual, test banks, and student study exams

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Surveillance and Threat Detection by Richard Kirchner in PDF and/or ePUB format, as well as other popular books in Social Sciences & Criminology. We have over one million books available in our catalogue for you to explore.

Information

1

Preface and Introduction

Abstract

Surveillance and Threat Detection Methodology is the most definitive resource to date addressing threat detection and attack prevention. This book contains never-before-published information from a subject-matter expert in the growing field of threat detection. The author shares a wealth of practical information on surveillance detection in the physical security realm. You are offered the opportunity to recognize a paradigm shift in modern-day security—one that goes from the reactive to the proactive—with details on how to protect yourself from terrorist and criminal attacks before they reach your doorstep! You will learn how to train your security force with the techniques and tactics necessary to recognize hostile surveillance and thwart an attack. This book is ideal for the professional physical security officer who wants a tooth-to-tail understanding of surveillance and threat detection.

Keywords

audience; detection; deterrence; normal; surveillance; territory; threat
Chapter Outline
1.1 Definitions
1.2 Scope
1.3 Audience and Use Case Assumptions
1.4 Executive Summary
1.4.1 Why Threat Detection
1.4.1.1 Territorial Dominance
1.4.1.2 Territorial Integrity
1.4.1.3 Territorial Imperative
1.4.1.4 Territorial Intelligence

1.1 Definitions

Actionable information: Information that is directly useful to customers for immediate exploitation without having to go through the full intelligence production process.
Anarchist: A person who rebels against any authority, established order, or ruling power.
Countersurveillance: All measures, active or passive, taken to counteract hostile surveillance.
Criminal enterprise: All illegal activity committed.
Emotionally disturbed persons: Individuals found within an administrative site assessed as either temporarily or permanently psychologically or mentally impaired to a degree that the person is gravely disabled or presents a clear danger to that person or another.
Foreign intelligence entity: Any foreign organization, person, or group (public, private, governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. This term includes a foreign intelligence and security service.
Hostile civil disturbance entities: Identified organizations known to target Department of Defense personnel, facilities, and assets through violence and other destructive and disruptive means.
If You See Something, Say Something™: Trademarked public access program for individual reporting of suspicious activity to law enforcement.
Illegal imaging: The act of taking photos or recording video footage without prior authorization as outlined in jurisdictional law.
Measuring: Actively measuring distances of physical locations or objects by individuals located at that site through simple pacing, ground still photography, and/or commercially obtained overhead still photography. Measuring is a key step in the planning phase of attack/exploitation cycles, as the collection of such information assures the accuracy of plans, logistics, and execution.
Observation: Also regarded as “physical surveillance,” this is systematic and deliberate observation of a person by any means on a continuing basis or acquisition of a nonpublic communication by a person not a party thereto or visibly present threat through any means not involving electronic surveillance.
Operational security: A protective and proactive discipline implemented to mitigate the risk of inadvertent exposure of personnel, methods, and means falling under surveillance detection (SD) purview. SD ensures and manages the continuous implementation of this discipline as to safeguard assigned personnel from potential negative or lethal actions having terrorism, antigovernment, foreign intelligence, and/or criminal nexus.
Presidential Executive Order 12333: President Ronald Reagan signed Presidential Executive Order 12333 on December 4, 1981 (U.S. President 1981, 1). The directive delineated the duties and responsibilities of the various U.S. intelligence agencies. This directive was also designed to protect the United States, its national interests and citizens, from foreign security threats. It also prohibited assassinations by stating, “No person employed by or acting on behalf of the United States Government shall engage in, or conspire to engage in, assassination” (U.S. President 1981, 18).
Querying: The acquisition of information from a person or group in a manner that does not disclose the intent of the interview or conversation. A technique of human source intelligence collection, generally overt, unless the collector is other than he or she purports to be.
Surveillance: The systematic observation of aerospace, surface, or subsurface areas, places, persons, or things by visual, aural, electronic, photographic, or other means.
Surveillance detection: Measures taken to detect and/or verify whether an individual, vehicle, or location is under surveillance.
Surveillance operation specialist: These personnel possess specialized advanced skills, training, and experiences in surveillance, surveillance detection, and countersurveillance methodologies.
Suspicious activity: Observed behavior indicative of criminal activities, intelligence gathering, or other preoperational planning related to national security or public safety.
Terrorism: The unlawful use of violence or threat of violence to instill fear and coerce governments and/or societies. Terrorism is often motivated by religious, political, or other ideological beliefs and is committed in the pursuit of goals that are usually political.
Terrorist-related suspicious activity: Observed behavior consistent with preoperational targeting relating to a potential terrorist threat(s) to national security interests. Furthermore, any activity or behavior related to planning, preparation (including probes), and attack execution.
Test of security: Any attempt to measure reaction times and actions by police, security personnel, and/or other first responders. A simple mistake such as a vehicle approaching a security barrier and then turning around or an attempt to circumvent access control procedures in order to assess strengths and weaknesses of police and equipment can disguise acts of test of security.
Timing: A subset of observation or “physical surveillance” with the intent of identifying the precise moment in which gaps of security appear; associated patterns of life or reoccurring patterns set by individuals of interest, assets, and critical mission functions. Adversarial planners require this information in support of the analysis, collection management, and dissemination targeting cycle.

1.2 Scope

Surveillance and Threat Detection Methodology is the most definitive resource to date addressing threat detection and attack prevention. This book contains never-before-published information from a subject-matter expert in the growing field of threat detection. The author shares a wealth of practical information on surveillance detection in the physical security realm. You are offered the opportunity to recognize a paradigm shift in modern-day security—one that goes from the reactive to the proactive—with details on how to protect yourself from terrorist and criminal attacks before they reach your doorstep! You will learn how to train your security force with the techniques and tactics necessary to recognize hostile surveillance and thwart an attack. This book is ideal for the professional physical security officer who wants a tooth-to-tail understanding of surveillance and threat detection.
The persistent stream of suspicious activity reports is proof that the “bad guys” are conducting surveillance of valuable targets in the United States and abroad. Such surveillance indicates preattack planning by terrorists and criminals and demands attention by security officers at all levels. To stop these attacks, security officers must understand terrorist and criminal surveillance and planning—to know what the “bad guys” are looking for and how they gather intelligence. Key to this understanding is that security officers learn how to distinguish “normal” from “not normal” behavior that will alert you to hostile surveillance and preattack planning. With this knowledge, security officers can implement protective countermeasures to detect, deter, disrupt, and defend against future attacks.
Whether you are responsible for a local storage facility, a bank, a mass-transit depot, or a nuclear reactor, introduction of a proactive threat detection program will increase your chances of preventing any attack dramatically. Such a program will align your security assets precisely to where they are needed and give you the tools to recognize if you are the target of criminal or terrorist surveillance. This first edition includes a historical overview of surveillance and an in-depth analysis of terrorist preattack and attack methodologies—illustrated with relevant real-world case studies. It describes how to incorporate threat detection into both a fixed-site physical security program and toward the protection of high-risk personnel. It discusses the counterintelligence and business intelligence arena and reviews the latest technologies in threat detection and how they may integrate into your operations.
You will come to understand preattack and attack surveillance methodology and, more importantly, learn how to recognize hostile surveillance so you can prevent an attack.

1.3 Audience and Use Case Assumptions

For most of the individuals in the security and force protection ecosystem, “surveillance detection” is used commonly to describe the act of taking measures to detect and/or verify whether an individual, vehicle, or location is under surveillance. Throughout this book the words “threat detection” are utilized with and in place of “surveillance detection,” as surveillance detection fails to capture the full scope of threats; threat detection fully encompasses the entire process of recognizing “threat” not just “surveillance.” With many years working on and around the U.S. Pentagon Reservation we were looking for the enemy we wanted (Al Qaida, Hezbollah, Lone Wolves, etc.), yet we found the enemy we had (Russia, China, emotionally disturbed persons, etc.) all “threats” in and of themselves. This methodology rests on the proven historical understanding that the common element across the threat spectrum—regardless if it’s internationally state-sponsored actors, homegrown violent extremists, extremist militia groups, intelligence operations, everyday criminals, or the emotionally disturbed person—has been, and will continue to be, that bad actors routinely observe and record their target’s activities to discover vulnerabilities and collect preoperational attack intelligence.
It should also be explained that the term “surveillance detection” is a misnomer. The word surveillance is the French word for “watching over”; “sur” means “from above” and “veiller” means “to watch.” The word surveillance may be applied to observation from a distance by means of electronic equipment [such as closed-circuit television (CCTV) cameras] and usually of people for the purpose of influencing, managing, directing, or protecting. Therefore, detecting surveillance or “surveillance detection” could infer simply looking up to see a CCTV camera. The inverse of surveillance is sousveillance (“to watch from below”) or the recording of an activity from the perspective of a participant in that activity or from groun...

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Digital Assets
  6. Acknowledgments
  7. 1. Preface and Introduction
  8. 2. Overview and Understanding
  9. 3. Case Studies
  10. 4. Conducting Surveillance Detection
  11. Glossary
  12. Index