• Skip to primary sidebar
  • Skip to content
  • Skip to footer
  • Home
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

Circuit Magazine

For Security & Protection Specialists

 

 

Individuals face a variety of threats in today’s global environment. By developing and applying a Surveillance Detection (SD) plan to the targets daily protection operations you can significantly reduce the likelihood of an attack on your target.

 

Before surveillance detection (SD) can be used to prevent or deter an attack, you must have a thorough understanding of the threat. Intelligence as to who is a potential threat to the target, how vulnerable the target is to the threat and what countermeasures can be taken to mitigate the vulnerabilities is essential in creating a plan that will provide the correct type and amount of protection for the target. The threat assessment will then serve as your guide for defining your SD operations. SD goals must be based on limitations and needs and each course of action must be evaluated to ensure the security countermeasure is justified.

 

When applying SD to the protection of individuals, once a threat assessment has been conducted and preventative courses of action determined, you will have identified several areas where SD can be used to significantly reduce identified threats.

 

For example, by conducting SD at the potential targets residence, you can reduce the risk of an intrusion, attack or kidnapping taking place at the targets residence. Some simple SD tactics that can be employed for a target at their residence may include the discreet observation of the surroundings of the targets residence before the target departs or returns to the residence to detect hostile surveillance in direct line of sight. As the target departs their residence, any corresponding activity in the area such as a vehicle following the target or an individual observed taking photos of the target, making a phone call or writing should be noted and detailed information about the potential hostile surveillance should be recorded.

 

All potential SD locations should be identified and discreet observation methods for each location should be developed.

 

It is essential that you have some type of recording method available such as pen and paper, audio recorder and ideally digital still and video cameras. Having a pair of binoculars will allow you to overcome distance and obtain difficult details such as license plate information or physical descriptions.

 

When conducting SD for individuals you must conduct a route assessment for the target and their family members. The route assessment is designed to identify choke points, potential attack sites and hostile surveillance positions. It is a good idea to involve spouses and family members in this process so that basic surveillance detection instruction may be given regarding their travel and routes. Route assessments should be conducted for places of employment, children’s schools and any other locations of routine travel.

 

SD information should be collected and reviewed daily so that SD plans can be adjusted as needed. It is important that your SD plan addresses what countermeasures to take should hostile surveillance be detected or an attack is recognized. These countermeasures include:

  • Obtaining a restraining order
  • Communication regarding the threat with family members, employers, school administrators, etc.
  • Mobile surveillance responses.
  • Defensive response to attack.

 

The protection of individuals is an arduous task. By exercising due diligence and incorporating a surveillance detection plan into the targets protection operations we can significantly reduce the targets exposure to threat.

By Jeff Burns

 

Tweet
Share
Pin
Share1
1 Shares

Buy The Latest Issue

Sign Up For News and Updates

We respect your privacy and will not share your information with anyone.
We will only message you when we have something relevant and of value to share with you.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Latest Issue

Circuit Magazine - Issue 66 - AI Armageddon

Issue 66

Buy Now

Latest Newsletter

Newsletter Sign Up

What you don't know CAN hurt you!

SUBSCRIBE

Latest Industry News

Ugandan Minister Killed by Bodyguard in Apparent Wage Dispute

A Ugandan government minister, Charles Engola, was shot and killed by his bodyguard early Tuesday in an apparent private dispute over wages, according to the army and local media. Engola, a retired army colonel, served as the junior minister in charge of labor in President Yoweri Museveni’s government.

Event

News - Circuit Magazine

Zelenskiy Denies Ukraine’s Involvement in Alleged Kremlin Drone Attack

Ukrainian President Volodymyr Zelenskiy has refuted Russia’s claims that Ukraine was involved in a drone attack on the Kremlin, which was allegedly aimed at killing Russian President Vladimir Putin. Zelenskiy stated that Ukraine fights and defends its territory, not attacking Putin or Moscow. The Kremlin reported that two drones were used in the attack but were disabled by Russian defenses.

News taken from Issue 65 of the Circuit Magazine

Bodyguard Saves Japanese PM from Pipe Bomb Attack

A bodyguard has been hailed as a hero for his quick-thinking actions during a suspected pipe-bomb attack on Japanese Prime Minister Fumio Kishida. Video footage captured the bodyguard kicking away a metal object as it landed near Kishida
before positioning himself between the Prime Minister and the device, shielding him with a collapsible, handheld ballistics shield.

News from Issue 65 of the Circuit Magazine

AlertEnterprise Reveals First-Ever Guardian AI Chatbot Powered by OpenAI ChatGPT

AlertEnterprise has unveiled its first-ever Guardian AI Chatbot powered by OpenAI ChatGPT. The chatbot will make its global debut at the ASIS Europe and ISC West trade events. Built on OpenAI’s GPT-3 platform, the Guardian AI Chatbot aims to provide security operators with instant access to critical physical access and security insights through quick questions and prompts.

Executive Protection/Secured Transportation Profession

COVID-19 and the Executive Protection

As practitioners, our responsibilities are many: protection of the client from physical harm, protection of the client from self-embarrassment, etc. Now, that the restrictions in the post COVID-19 era are starting to be lifted in some areas, Clients, and other high-net-worth individuals will be more aware of the area in which they are located, lodging, and traveling to.

James Bore's Cyber Security

Ways to See the Threat Before it Happens

Threat modelling is widely in use, whether knowingly or not, across every walk of life – and has been used since time immemorial to prioritise security defences. The only difference between the well-known risk assessments carried out by everyone and threat modelling in cyber security is the attempt to document and systemise it. I am hoping that this idea of formal threat modelling will be a useful tool for you to use in your future arsenal of available resources as a CP operator.

Close Protection advice

Keeping Your Edge: Building a Solid Foundation

Longevity, consistency and remaining relevant are some primary goals of all protectors. These factors are important when establishing a new contract and providing services for a new client. But what is equally important is the mindset that goes into those first days and weeks on the assignment. As such, I wanted to get the personal perspective of Vantrell Wilson, a close protection agent who I have trained with and worked alongside of for years now.

Global Risk Updates

Global Situation Report - November 2021

Global Situation Report – November 2021

Each issue our global geopolitical partner, Stratfor, provides an in-depth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.

Popular Tags

armed attack Bodyguard business Celebrity client clients Close Protection Communication cp Crime Elijah Shaw EP Executive Executive Protection firearm firearms government gun Intelligence Law Enforcement Media Medical military News online police Prevention professional protect protection Risk Safety Security SIA Social Media Surveillance Technology terror Terrorism terrorist Threat Training VIP weapon

On The Frontline

Communications Column By Andy Clark

A Deeper Understanding

a PoC service is like any other client server system that you use. Take Skype as an example that many people will be familiar with. This is what is commonly referred to as a ‘client-server’ application. The Skype app sits on you phone, tablet, laptop or desktop and is in constant communication with the Skype servers out there in the cloud.

Get To The Back Of The Line

No Cutting

Throughout my nine years of experience in the Executive Protection (EP) industry, I’d like to think that I’ve achieved many significant accomplishments. 

Having traveled to over 30 countries, building executive protection and estate teams, embarking on 10 major worldwide tours and transitioning from field agent to Director of Security. Despite my successes, I’ve still felt like a student at best, but now finally considering myself a Specialist. Naively, many young protectors are eager to consider themselves “specialists” without undergoing the proper mentorship and gaining the practical experience needed to hold this title. 

Mike Gillette Interview – Speaker, Author, Inventor and Peak-Performance Coach

Mike Gillette’s bio describes him as a “Speaker, Author, Inventor and Peak-Performance Coach with a life story that reads like an action-adventure novel.” This includes being an Army Paratrooper, SWAT Commander, Government Counter-Terrorism Expert, Bodyguard to Fortune 500 Executives and a Record-Breaking Motivational Strongman. Find out more in our exclusive interview.

Follow us

  • Email
  • Facebook
  • Twitter

From The Archives

Supervisee relationship

Working with your dissertation supervisor

A dissertation or research project is normally par for the course on degree programmes. In my …

Continue Reading about Working with your dissertation supervisor

Russia Risk Assessment

The 2017 FIFA Confederations Cup were recently held in Russia, between 17 June to 2 July 2017, as a …

Continue Reading about Russia Risk Assessment

In today’s modern world, there is insurance for almost everything.

Kidnap & Ransom – Finding a Resolution

In today’s modern world, there is insurance for almost everything. Any kind of "Risk" is big …

Continue Reading about Kidnap & Ransom – Finding a Resolution

Gap Training – What Most Practitioners Overlook

Many industry practitioners understand and embrace that continuing education is a necessity in a …

Continue Reading about Gap Training – What Most Practitioners Overlook

Promoted Event

International Security Expo

Latest Podcast Episode

Latest Issue

Circuit Magazine - Issue 66 - AI Armageddon

Issue 66

As AI armageddon comes closer, the global challenge is discerning the line between innovation and oversight, particularly concerning decision-making biases and security implications.

Buy Now

Follow us

  • Email
  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
  • Home
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

© 2023 Circuit Magazine · Rainmaker Platform

This website or its third-party tools use cookies which are necessary to its functioning and required to improve your experience. By clicking the consent button, you agree to allow the site to use, collect and/or store cookies.
I accept