• Home
  • Categories
    • Protection
    • Hostile Environment
    • Industry News
    • Intel
    • Career Advice
    • Surveillance
    • Cybersecurity
    • Maritime
    • Risk Management
    • Fitness
    • Medical
    • Training
    • Equipment
    • Reviews
  • Daily Briefing
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

Circuit Magazine

For Security & Protection Specialists

Get free circuit subscription with BBA membership
You are here: Home / Archives / Hostile Surveillance Detection

Hostile Surveillance Detection

Minimizing Kidnap Risk

 

Hostile surveillance detection is one of the few security techniques that preempts danger. As the name suggests it is the art of identifying an individual or group that is attempting to obtain intelligence by placing your client under surveillance. Its main advantage as a security tool is that it is proactive rather than reactive.

 

Circuit Magazine: Hostille Surveillance Detection

The global kidnap industry is booming and no longer is the focus predominantly on Latin America. It is prevalent throughout the world and for a successful kidnap, hostiles will normally conduct some degree of pre-attack intelligence gathering. The early and covert identification of this intelligence gathering by security teams can significantly minimize the risk of kidnap.

 

To provide a professional security service it is imperative that security teams and the ‘at-risk’ individuals themselves learn how to identify the signs that may precede an attack. By identifying a threat early, and pro-actively working in unison to increase awareness, the risk of a successful kidnap is drastically reduced. The preemptive action and early identification of possible hostile intent allows a security team to remove the client from danger or deter and disrupt the potential attackers.

 

Scoping for Opportunity

Why would kidnappers put a person or group under surveillance prior to an attack? What would the hostile surveillance teams be trying to achieve? Business executives when planning strategy utilize the SWOT analysis model. This same model can be engineered to help identify what hostile individuals or groups will be looking for.

 

SWOT Analysis

By identifying a target’s Strengths and Weaknesses, the hostiles will then be able to identify their own Opportunities and Threats. This intelligence-gathering model will help them answer the following questions:

  1. Can we kidnap our target?
  2. How can we kidnap our target?
  3. When could we kidnap our target?
  4. Should we kidnap this target?

Point four identifies that the hostiles may want to carry out the kidnap but realize that it is a hard target and therefore not worth the risk, OR as can be seen in the case study below, they may just adapt their attack and exploit the weaknesses they have identified.

In March 1978, Former Italian Prime Minister Aldo Moro was being driven to work in a two-car motorcade in Rome, accompanied by five bodyguards. His Motorcade was ambushed and eleven members of the Red Brigade terrorist group ambushed him. As the motorcade approached a stop sign a car pulled in front and stopped suddenly. Moro’s car was following too close and struck the car, then Moro’s follow vehicle, also travelling too close, rammed into Moro’s car pinning his vehicle with no chance of immediate escape.

Two men got out of the blocking vehicle and shot with pistols through the front side windows of Moro’s car killing his driver and bodyguard. Concurrently, a second attack element consisting of four men dressed in Air Italia uniforms that were stood on the pavement as if waiting for a bus pulled weapons from their flight bags and proceeded to fire at the remaining bodyguards. A third attack element of two terrorists jumped out from behind bushes (possibly within a car) and pulled Moro from the car and put him into a waiting vehicle. The terrorists then escaped with preplanned and strategically positioned vehicles.

The whole operation lasted no more than 30 seconds, involved eleven terrorists who fired between 80 and 90 rounds and killed five bodyguards. Yet the build up and preparation was far more detailed and time consuming.  Through prolonged covert surveillance and potentially a mix of human intelligence sources the terrorists had identified the strengths and weaknesses of Moro and his security team and utilized these to focus on the opportunities and threats.

The terrorists identified a pattern of life and common route that Moro and his team used. They had also noted that the drivers of both his motorcade drove too close to each other and tailgated other vehicles and the Red Brigade planned to exploit that. They also noted that many airline personnel lived in the area of attack so adopted the air uniforms for cover. The terrorists did several other things that would have been gained through intelligence gathering operations. They slashed the tires of the flower vendor whose normal place of work was near the attack site, telephone lines were overloaded during the attack and vehicles were positioned for a getaway.

There are many conspiracy theories surrounding his capture and detention, whatever the true story, fifty-five days after his abduction Aldo Moro was found shot to death in the trunk of a car in Central Rome. It is interesting to note that according to later terrorist declarations, in the months before the kidnapping they had instead envisaged the possibility of kidnapping another leader, Giulio Andreotti. This was abandoned once they deemed that Andreotti’s police protection was too strong.

Sourced from: Just2Seconds: Using Time And Space To Defeat Assassins. 2008, Gavin De Becker, Tom Taylor and Jeff Marquart.

This case study identifies how focused surveillance can be utilized to identify and exploit weaknesses and enable efficient and successful attack planning, even against a defended ‘hard’ target such as a Former Italian Prime Minister.

Intelligence Gathering

Just as the Red Brigade terrorist group did in the case study , hostiles will be trying to gather as much intelligence on the target’s pattern of life as possible, asking themselves the following questions and many more:

  • Is there security, are they aware, are they armed, are they any good?
  • How do they travel and by what means? Do they drive, what do they drive, is it armored?
  • Do they have good travel security in place?
  • What routes do they take to work, events, school? Do they vary routes?  Are they forced to take the same routes?
  • Do they have a family, is there family an easier target?
  • Are they creatures of habit? Is there a pattern forming? If so what is the pattern? What are the weaknesses?
  • Do they have employees, can we use them, can they provide us information, can we corrupt them?

The hostiles, however, must have the capability to gather this information, it cannot just be plucked from the air. Where intelligence gathering and surveillance operations come into play, there are always limitations.

Capability and Limitations

The quality and type of hostile surveillance can vary greatly, it may be quick and basic observations by untrained and opportunistic gangs looking for the best time to strike, or it could be professional, criminal organizations carrying out effective and focused intelligence gathering prior to a kidnap or assault.

There are of course a number of potential limitations to a hostile surveillance team, these will affect the quality and capability of the surveillance. Examples of limitations are:

  • Training
  • Capability
  • Resources – Human and Technical
  • Finances
  • Environment

All the above factors will determine how capable a group is of carrying out effective and covert surveillance without detection, whilst still obtaining all the necessary information.

 

Many terrorist and criminal organizations may not have the technical and practical expertise to carry out a high level of surveillance that is required to defeat good anti and counter surveillance procedure. They may only have one or two people with limited skills and resources to observe their target compared to the ten or twenty that a government team has available.

 

Numbers do not necessarily mean results though, a team of three well-trained surveillance operatives with time and resources would be able to glean a surprising amount of intelligence, perhaps even within a few days. Specifically, when dealing with high-risk clients it must always be taken into account that a hostile group may in-fact have a good capability and a small professional team with time, patience and resources.

 

The large range of limiting factors will, however, normally provide the security team a much greater chance of identifying hostile surveillance, but two major factors must be taken into consideration. The first is that terrorist and criminal organizations normally have time and dedication on their side. They can pop in and pop out, they can choose their times and methods, they can also utilize human sources and agents. All the time slowly building up their intelligence picture. The second and most important to acknowledge and understand though is that accurately and covertly identifying surveillance is far from easy.

 

Skills and Drills

There are two factors that must be taken into account when dealing with hostile surveillance detection:

  1. The skills, experience, knowledge, and resources of the person or group carrying out the hostile surveillance.

BUT ALSO…

2. The skills, experience, knowledge, and resources of the person or group carrying out the anti and counter surveillance.

If there is a major gap between either of these then one side will falter.

Whilst attempting to identify hostile surveillance it is important that tactics are undertaken to a high standard, but also covertly. This is just one of the reasons why intensive training and specialist counter surveillance teams should always be considered, especially for high-risk clientele. Whatever the level of hostile surveillance being conducted, whether it be rudimentary or highly professional it is important that hostile surveillance does not realize that anti and counter-surveillance measures are in place and being utilized. There are two main reasons:

  • If hostile surveillance is unaware of the counter-measures in place they are far more likely to make a mistake, use sloppy tradecraft or become complacent and therefore be identified easier and quicker.

 

  • If hostile surveillance becomes aware that they have been spotted it can lead to a number of possible actions including, impulsive behavior and an increased risk of action or attack. But, and this is more likely, they may just take a step back to then take two steps forward in the future, with better skills and resources. As we mentioned dedicated and professional teams will spot poor anti and counter surveillance early, they will drop out and only come back when they feel it is safe to do so.

 

It is clear that hostile surveillance detection is a vital tool in trying to minimize the risk of kidnap. Those that wish harm on others, especially professional and dedicated terrorist or criminal organizations will strive to gather intelligence on their targets. With this intelligence, they will look to exploit the weaknesses of a target and turn these into opportunities for a successful attack.

 

Remember, if there is a gap between the skills, experience, knowledge, and resources of the hostile surveillance team and those of the security team, one side will falter.

 

By: Explorer Travel Security:  Click Here for more information

Buy The Latest Issue

Sign Up For News and Updates

We respect your privacy and will not share your information with anyone.
We will only message you when we have something relevant and of value to share with you.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Issue

Circuit magazine cover issue 55

Issue 55

Buy Now

Latest Industry News

Industry News October 2020

We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.

Security industry News Brought to you by the Circuit Magazine

Industry News

We cast our eye over the main stories impacting the security industry, including, Kanye West’s former bodyguard is calling the rapper a “bully” and is threatening to sue for damages after West accused him of breaking a confidentiality agreement.

Industry News

We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.

Security industry News Brought to you by the Circuit Magazine

Security Industry Association Announces New SIA Women in Security Scholarship Opportunity

“The SIA Women in Security Forum works to grow and retain leaders in the security industry,” said Gloria Salmeron, director of human resources at Brivo and co-chair of the scholarship committee. “With the addition of this new scholarship, we look forward to helping bring opportunities for further education and advancement to as wide a spectrum of people as possible and inviting individuals to participate in the Women in Security Forum.”

Product Review earHero

Product Review – Ear Hero

Designed by an audiologist, earHero’s speakers are so tiny they will never block your ear canal giving you the ability to literally talk on a separate phone without removing the earHero tactical earpiece from either ear.

You can literally hear whisper level sounds from yards away, while identifying the sounds’ precise location. The earHero tactical headsets have wires so thin and clear, they are virtually undetectable, and the design is so comfortable, you’ll barely know the earpiece is there.

Introduction to Cybersecurity Part 4

Insecure Smart Houses

They are only of limited relevance today, but as the technologies involved become more widespread and implemented into every facet of life they will only become more prevalent. While it sounds like the stuff of science fiction, these threats exist now and are not going to go away.

For simplicity, we’ll say that a ‘smart’ device is anything which connects to the internet (or a network) and is not intended to be a computer interface. Intended is the key word there, as many of these devices are insecure for the simple reason that they are a computer. The problem is that it is now cheaper and easier to put a general purpose computer into a device and run some software to, for example, turn lights on and off than it is to design a single-purpose lightbulb which also connects to a network.

Behavioral Analysis

Turning Habitual Habits into a Positive

Being an instructor for Tony Scotti’s Vehicle Dynamics Institute has forwarded the opportunity to observe how a large section of professionals interact and function from different niches of the industry. Military, transnational EP teams, US based teams, Federal LEO’s or with civilians this theme shows through. Even in the larger training arena the change can be seen as more of the schools are starting to focus on classes or blocks of instruction such as client management and behavioral analysis. The discussion forms are flooded with conversations relating to how to work in a team dynamic. It doesn’t matter if its a 28 day school or a three day school, they will be touching on and teaching these topics.

Global Risk

Global Situation report provided by Stratfor

Global Situation Report October, 2020

Having informed insight in today’s increasingly complex international environment is more important than ever. That’s why we’ve partnered with Stratfor, the worlds leading geopolitical intelligence platform, to bring readers regular analysis and accurate forecasting of global trends from someone you can trust.

Popular Tags

Afghanistan armed attack Bodyguard Bodyguarding Celebrity client Close Protection Close Protection Officer Elijah Shaw Executive Executive Protection fight firearm gun Intelligence Iraq Law Enforcement Medical military News online police Prevention professional protect protection PTSD Risk Risk Assessment Risk Management Safety Security Security Incidents Security Industry Authority SIA Social Media Surveillance terror Terrorism terrorist Threat train Training VIP

On The Frontline

K9 in Private Protective Services

As an owner of a working dog, people often ask me, “Do you ever use Maximus on protection details?” I have often replied … >>>

Training for Survival

  Training Provides Realistic Instruction On How to React In Active Shooting Incidents In an international age … >>>

Protecting Businesses During Riots with Simple Security Tactics

Since May 2020 protests have been happening across the country. Destruction to property and looting of businesses have … >>>

Follow us

  • Email
  • Facebook
  • Twitter

From The Archives

Muscle Recovery: Essential to Your Next Workout

Originally published on HVMN by Nate Martins.     The moment every athlete wants to … >>>

Judgement Index

Predicting Performance and Risk The Judgement Index is a value-based analysis of judgement capacity, behaviour and … >>>

Specialist Interviewing

Specialist Interviewing   IT was in the mid 1990’s when I had a ‘road to Damascus moment’ and realised how radical … >>>

Protecting the Principal in a Pandemic

On March 25, 2020, CTG Intelligence hosted an online conference on Protecting the Principal During COVID, which focused … >>>

  • Terms And Conditions
  • Magazines
  • Privacy Policy
  • Archives

© 2021 Circuit Magazine · Rainmaker Platform

This website or its third-party tools use cookies which are necessary to its functioning and required to improve your experience. By clicking the consent button, you agree to allow the site to use, collect and/or store cookies.
I accept