• Home
  • Categories
    • Protection
    • Hostile Environment
    • Industry News
    • Intel
    • Career Advice
    • Surveillance
    • Cybersecurity
    • Maritime
    • Risk Management
    • Fitness
    • Medical
    • Training
    • Equipment
    • Reviews
  • Daily Briefing
  • Subscription
  • The Magazine
  • Contribute
  • Advertise
  • Contact Us

Circuit Magazine

For Security & Protection Specialists

Get free circuit subscription with BBA membership
You are here: Home / Archives / Hostile Environment Surveillance Operations

Hostile Environment Surveillance Operations

A look at Hostile Environment Surveillance Operations

 

 

As a result of the privatization of Iraq in 2003 and the dramatic growth of private security operations in politically unstable and hostile environments, close protection professionals are finding themselves working in increasingly diverse environments that require highly specialized skills and training. One of those specializations is Hostile Environment Surveillance Operations (HESO).

Bombing India

 

This article will discuss the primary types of hostile environment surveillance operations and their application to the layered security of the protection detail as well as the specialized training needed by operatives wishing to conduct this type of work.

 

Let’s start by identifying what a hostile environment is. For our purposes an environment may be considered hostile because of high crime rates like Mexico and South America or due to civil unrest like in the cases of Ukraine, Iraq, and Syria, Egypt and Libya during the Arab Spring or Nigeria. Additional hostile environments include areas that are dramatically underdeveloped and lack critical infrastructure such as east Africa or India.

 

The primary goal of Hostile Environment Surveillance Operations (HESO) is to successfully detect and gather intelligence on hostile third party activities which pose a security threat, in aid of preventing an attack. There are four primary types of HESO’s: Protective surveillance (PS), surveillance detection (SD), counter surveillance (CS) and close target reconnaissance (CTR). Each of these involves the use of the fundamental principles of physical surveillance and plays a critical role to the support of the protection detail.

 

Protective surveillance is the covert use of a team of highly trained and experienced operatives to form a protective ring around the principal. The protective surveillance team’s (PST) primary goals are is to occupy or control areas that could be used by a hostile surveillance team (HST) to plan or assist in an attack on the principal. The PST will identify hostile surveillance, gather protective intelligence and if necessary serve as a quick reaction force (QRF) to assist defending an attack on the principal. If hostile surveillance is detected, the PST will notify the close protection team of the threat so that the principal can be discreetly removed to a safe environment. As mentioned earlier, in worst case scenarios the PST will act as a quick reaction force (QRF) which is why it is essential that all members of the PST have advanced specialized training in close protection, close quarter battle, anti ambush and anti kidnapping.

History has taught us that terrorist attacks follow a distinct process known as the Terrorist Attack Cycle which includes target selection, planning, deployment, escape and exploitation. Regardless of the type of attack there will almost always be some type of preoperational hostile surveillance conducted. The hostile surveillance is intended to assess the value of the target, security measures and vulnerabilities and escape routes. Surveillance Detection (SD) has become critical to successful hostile environment operations because it gives us the ability to prevent or defeat an attack by detecting hostile or suspicious activity early in the target selection and planning phase. The surveillance detection team (SDT) will develop a surveillance detection plan that includes identifying suitable observation points that provide optimal views of critical locations that hostile surveillance would want to observe during the planning phase. The SDT will conduct surveillance of these critical locations to identify people or vehicles that look out of place or have suspicious patterns and exhibit poor surveillance demeanor. In addition, the SDT will conduct pattern and route analysis to determine where the target is most predictable and vulnerable during travel. Surveillance detection works because it allows the HST to feel confident operating in the open because they have no idea anyone is watching them. If the intelligence collected by the SDT warrants further investigation, then an appropriate counter-surveillance (CS) operation can be designed to exploit or capture the hostile surveillance. It is critical that the SDT’s role does not cross over into CS as this risks compromising future CS operations by chasing the HST into hiding.

Counter Surveillance (CS) is conducted by a third party or counter surveillance team (CST) to exploit and neutralize hostile surveillance. Essentially, counter surveillance is an operational measure taken once hostile surveillance has been identified. The CST then conducts surveillance of the HST to gather intelligence that can be used to manipulate, exploit or apprehend the hostile surveillance. Counter surveillance is normally conducted by intelligence agencies and the military but in today’s global environment more and more security contractors are becoming involved in CS operations. It should be noted that some sophisticated attackers may use CS as a countermeasure against surveillance detection to increase their operational security.

Close Target Reconnaissance (CTR) is the covert collection of detailed intelligence against a target location to assist in operation planning and success. Potential CTR targets include a variety of residential and commercial structures and CTR is designed to develop tactics, techniques and procedures that identify, assess and exploit each structure’s vulnerabilities. The skills here are different than the other HESO areas. CTR teams are versed in environmental and terrain analysis, tactical tracking operations, covert patrol methods, planning and risk assessment, facility vulnerability assessment, defeating active and passive security, external security threat / risk mitigation, covert entry, active and passive security sensor mitigation, human security vulnerability analysis, defeat and or exploitation. CTR is most often used in support of military, intelligence and hostage rescue operations.

Regardless of what HESO area you may wish to specialize in there is some core specialized training that all HESO operatives should have. Each HESO operative should have completed advanced level training in covert physical surveillance and have extensive experience planning and conducting a wide range of covert surveillance operations against a variety of targets. In addition, to allow the HESO operative to operate relatively safely in the hostile environment they should have specialized training in night surveillance operations, advanced operational security and planning, threat assessment, analysis and target identification, terrorist / security threat groups operating in their region, terrorist and hostile surveillance tradecraft, firearms training to include pistol, rifle, shotgun and foreign weapons of the region, advanced hostile environment close protection operations (HECPO), advanced counter ambush and counter kidnapping, detecting car bombs, VBIED’s and IED’s, detecting suicide bombers, tactical combat casualty care and defensive counter sniper operations.

As you can see hostile environment surveillance operations play a critical role in successful hostile environment protection operations and it’s definitely not for the newbie. To be successful the operative needs extensive experience, comprehensive training and the ability to blend in to their environment.

 

 

By: Jeff Burns

About the Author

Buy The Latest Issue

Sign Up For News and Updates

We respect your privacy and will not share your information with anyone.
We will only message you when we have something relevant and of value to share with you.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Issue

Circuit magazine cover issue 55

Issue 55

Buy Now

Latest Industry News

Industry News October 2020

We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.

Security industry News Brought to you by the Circuit Magazine

Industry News

We cast our eye over the main stories impacting the security industry, including, Kanye West’s former bodyguard is calling the rapper a “bully” and is threatening to sue for damages after West accused him of breaking a confidentiality agreement.

Industry News

We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.

Security industry News Brought to you by the Circuit Magazine

Security Industry Association Announces New SIA Women in Security Scholarship Opportunity

“The SIA Women in Security Forum works to grow and retain leaders in the security industry,” said Gloria Salmeron, director of human resources at Brivo and co-chair of the scholarship committee. “With the addition of this new scholarship, we look forward to helping bring opportunities for further education and advancement to as wide a spectrum of people as possible and inviting individuals to participate in the Women in Security Forum.”

Introduction to Cybersecurity Part 4

Insecure Smart Houses

They are only of limited relevance today, but as the technologies involved become more widespread and implemented into every facet of life they will only become more prevalent. While it sounds like the stuff of science fiction, these threats exist now and are not going to go away.

For simplicity, we’ll say that a ‘smart’ device is anything which connects to the internet (or a network) and is not intended to be a computer interface. Intended is the key word there, as many of these devices are insecure for the simple reason that they are a computer. The problem is that it is now cheaper and easier to put a general purpose computer into a device and run some software to, for example, turn lights on and off than it is to design a single-purpose lightbulb which also connects to a network.

Behavioral Analysis

Turning Habitual Habits into a Positive

Being an instructor for Tony Scotti’s Vehicle Dynamics Institute has forwarded the opportunity to observe how a large section of professionals interact and function from different niches of the industry. Military, transnational EP teams, US based teams, Federal LEO’s or with civilians this theme shows through. Even in the larger training arena the change can be seen as more of the schools are starting to focus on classes or blocks of instruction such as client management and behavioral analysis. The discussion forms are flooded with conversations relating to how to work in a team dynamic. It doesn’t matter if its a 28 day school or a three day school, they will be touching on and teaching these topics.

Executive Protection is more than an individual who drives a car or walks alongside a corporate executive.

What is Executive Protection?

In the past, I viewed Executive Protection (EP) as persons who provided corporate level protection. This was the guy who only walked with the CEO, politician, or other important corporate executives and dignitaries. With my limited understanding, I didn’t think of those who drive these same individuals as being considered Executive Protection agents as well. As an EP specialist, I now understand and have experienced some of the vast role’s EP work will encompass.

Global Risk

Global Situation report provided by Stratfor

Global Situation Report October, 2020

Having informed insight in today’s increasingly complex international environment is more important than ever. That’s why we’ve partnered with Stratfor, the worlds leading geopolitical intelligence platform, to bring readers regular analysis and accurate forecasting of global trends from someone you can trust.

Popular Tags

Afghanistan armed attack Bodyguard Bodyguarding Celebrity client Close Protection Close Protection Officer Elijah Shaw Executive Executive Protection fight firearm gun Intelligence Iraq Law Enforcement Medical military News online police Prevention professional protect protection PTSD Risk Risk Assessment Risk Management Safety Security Security Incidents Security Industry Authority SIA Social Media Surveillance terror Terrorism terrorist Threat train Training VIP

On The Frontline

The Impact of Street Crime on the Security Professional

And the Responsibilities of the Security Company. Did you know: Historically, street crime increases, proportionately, … >>>

A View of Cyber Risk Security

Shield Ltd CEO, Alexandru Zamfir shares his thoughts on Cyber Security and advancements within the field.The “Edge of … >>>

Mexico Risk Factors

A Personal Account Mexico is one of the worlds most violent countries with one of the highest murder rates in the … >>>

Follow us

  • Email
  • Facebook
  • Twitter

From The Archives

Hands-On Protection Training

Are We As Good As We Think We Are? After finishing 5 days of intense and demanding protection training aimed at the … >>>

Creating a Safe Environment – What is a ‘Protective Bubble?’

If you’ve spent enough time around executive protection professionals, you’re no doubt familiar with the concept of … >>>

You Have a Complex Advance? Simplify It

Defining a Complex Advance All advances can be considered “complex” if you, and you should, consider all factors like … >>>

What You Need to Know About Body Armour

You can only perform to the best of your ability with preparation and awareness. Prioritising preparation is the only … >>>

  • Terms And Conditions
  • Magazines
  • Privacy Policy
  • Archives

© 2021 Circuit Magazine · Rainmaker Platform

This website or its third-party tools use cookies which are necessary to its functioning and required to improve your experience. By clicking the consent button, you agree to allow the site to use, collect and/or store cookies.
I accept