• Home
  • Categories
    • Protection
    • Hostile Environment
    • Industry News
    • Intel
    • Career Advice
    • Surveillance
    • Cybersecurity
    • Maritime
    • Risk Management
    • Fitness
    • Medical
    • Training
    • Equipment
    • Reviews
  • Daily Briefing
  • Subscription
  • The Magazine
  • Contribute
  • Advertise
  • Contact Us

Circuit Magazine

For Security & Protection Specialists

Get free circuit subscription with BBA membership
You are here: Home / Archives / Surveillance Detection For Countering Terrorism

Surveillance Detection For Countering Terrorism

A key skill for security and counter-terrorism professionals

History has taught us that certain kinds of activities can indicate terrorist plans are in the works, especially when they occur at or near high profile or sensitive sites, places where high profile individuals reside or work, or where large numbers of people gather like government buildings, military installations, bus or train stations or major public events.  The ability to detect hostile or suspicious activity early in the target selection and planning phase is the primary means of defeating a terrorist or criminal attack.  Thus, surveillance detection (SD) has become critical to successful intelligence collection, counter terrorism and security operations.

Terrorist attacks follow a distinct process referred to as the Terrorist Attack Cycle.  The terrorist attack cycle includes:  Target selection, planning, deployment, escape and exploitation.  Regardless of the type of attack, whether it is terrorism such as a bombing, or kidnapping, or a criminal attack such as a theft, there is almost always some amount of preoperational hostile surveillance conducted.  This hostile surveillance is intended to assess a potential target for value, security measures and vulnerabilities and it’s during this phase that terrorists and other attackers are vulnerable to detection.

Historically, terrorists have relatively poor surveillance skills or tradecraft.  It is this poor surveillance tradecraft that if recognized can provide individuals and organizations with the time needed to involve the proper authorities, avoid an immediate threat and help prevent an attack.

In Surveillance Detection (SD), the acronym T.E.D.D. is often used by the U.S. government to define the principles that can be used to identify surveillance conducted by hostile surveillance and counter intelligence agencies.  T.E.D.D. stands for Time, Environment, Distance and Demeanor.  In other words, if a person sees someone over time, in different environments and over distance or someone who displays poor surveillance tradecraft then that person can assume they are under surveillance.

Time, environment and distance are not applicable when a specific location or mode of public transportation is targeted or in cases of ambush attackers.  Therefore, when talking about hostile surveillance, demeanor is the most critical of the four elements.  Poor demeanor will often help the target or surveillance detection unit identify hostile surveillance.

Demeanor indicators include:  people wearing unsuitable clothing for the weather or environment, people with unusual bulges under their clothing, wires protruding from their clothing, people who are sweating profusely, mumbling to themselves or fidgeting, people who appear to be attempting to avoid security personnel or law enforcement and people who appear out of place.

When attempting to identify hostile surveillance, you must first identify suitable observation points (OP’s) that provide optimal views of critical locations that hostile surveillance would want to watch such as the entrance to the targets residence or office.  Close attention should be paid to vehicles and people that look out of place or are exhibiting poor surveillance demeanor.

Surveillance detection personnel should conduct a pattern and route analysis to determine where along routes of travel that the target is most predictable and vulnerable.  Route analysis should include identification of choke points.  Choke points are a geographical feature such as a valley, bridge, roundabout or other area where the target must travel and where rapid forward motion and or escape is difficult.  If a choke point provides a position where attackers can freely wait for their targets and have access to a suitable escape route, the choke point becomes a potential attack site.  An ideal countermeasure would be to vary routes and times of travel to avoid exhibiting predictable behavior.

Hostile surveillance operatives will often change their appearance by changing clothes, using hats or wigs and other disguises.  Many times they will change vehicle plates or even change vehicles.  For this reason it is important to focus on an individuals facial features, build, mannerisms, gait and identifying marks such as scars and tattoos.  When it comes to vehicles, special attention should be paid to characteristics such as body damage, stickers and other unique characteristics.

There are primarily three types of surveillance related activities; they are surveillance (SV), surveillance detection (SD) and counter surveillance (CS).

Surveillance:  In this case hostile surveillance conducts purposeful observation of people, places and vehicles with the intent of collecting intelligence that can be used in the planning of a hostile action be it criminal or terrorist, against a specific target.  Surveillance can also be used to collect intelligence on a range of potential targets in order to eliminate target options and aid in target selection by identifying a target that satisfies the objective of the attacker.

Surveillance Detection:  Surveillance detection can be conducted by civilians, executives, security personnel, government agencies, law enforcement and the military.  Surveillance detection conducts purposeful observation of people, locations and vehicles with the specific intent of determining if surveillance is being conducted against a specific target.  The focus of surveillance detection is to distinguish types of suspect behavior and other indicators of possible surveillance and report any suspicious behavior or indicators.  The reports are then analyzed and directed to the proper authorities for an appropriate response.  Surveillance detection plans should include a strategy for recording and reporting observations, use of cover and will include a surveillance detection response during routine travel and around any facilities or locations that may be targeted.  Surveillance detection plans should be implemented discretely and abide by local laws and federal laws such as the Foreign Surveillance Intelligence Act (F.I.S.A.).  If hostile surveillance is detected, all relevant details should be reported to the appropriate authorities in a timely manner.  The response to discovery of hostile surveillance will depend on the situation and potential threat at the time of discovery.

Counter Surveillance:  Counter surveillance is often conducted by professionals who are trying to exploit and neutralize hostile surveillance.  Essentially, counter surveillance is an operational measure taken once hostile surveillance has been identified.  Counter surveillance then conducts surveillance of the hostile surveillance in order to gather intelligence that can be used to manipulate, exploit or apprehend the hostile surveillance.  Counter surveillance is normally conducted by intelligence agencies and the military but in today’s global environment more and more security contractors are becoming involved in counter surveillance operations.  Some sophisticated attackers may use counter surveillance as a countermeasure against surveillance detection to increase their operational security.

When conducting surveillance detection, it is important not to cross over into the role of counter surveillance as this can compromise any future counter surveillance operation conducted by the authorities and risks chasing the surveillance into hiding.

Surveillance detection works because it allows the hostile surveillance to feel confident operating in the open because they have no idea anyone is watching them.  If the intelligence collected by surveillance detection warrants further investigation, then the proper authorities can get involved and design a professional counter surveillance operation to exploit or capture the hostile surveillance.

By applying professional surveillance detection to security and counter terror operations we can effectively detect and prevent terrorist attacks in the planning phases, reduce the number of attacks and allow for safer operations in high risk environments.

By:  Jeff Burns

Learn more about the author here

Buy The Latest Issue

Sign Up For News and Updates

We respect your privacy and will not share your information with anyone.
We will only message you when we have something relevant and of value to share with you.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Issue

Circuit magazine cover issue 55

Issue 55

Buy Now

Latest Industry News

Industry News October 2020

We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.

Security industry News Brought to you by the Circuit Magazine

Industry News

We cast our eye over the main stories impacting the security industry, including, Kanye West’s former bodyguard is calling the rapper a “bully” and is threatening to sue for damages after West accused him of breaking a confidentiality agreement.

Industry News

We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.

Security industry News Brought to you by the Circuit Magazine

Security Industry Association Announces New SIA Women in Security Scholarship Opportunity

“The SIA Women in Security Forum works to grow and retain leaders in the security industry,” said Gloria Salmeron, director of human resources at Brivo and co-chair of the scholarship committee. “With the addition of this new scholarship, we look forward to helping bring opportunities for further education and advancement to as wide a spectrum of people as possible and inviting individuals to participate in the Women in Security Forum.”

Introduction to Cybersecurity Part 4

Insecure Smart Houses

They are only of limited relevance today, but as the technologies involved become more widespread and implemented into every facet of life they will only become more prevalent. While it sounds like the stuff of science fiction, these threats exist now and are not going to go away.

For simplicity, we’ll say that a ‘smart’ device is anything which connects to the internet (or a network) and is not intended to be a computer interface. Intended is the key word there, as many of these devices are insecure for the simple reason that they are a computer. The problem is that it is now cheaper and easier to put a general purpose computer into a device and run some software to, for example, turn lights on and off than it is to design a single-purpose lightbulb which also connects to a network.

Behavioral Analysis

Turning Habitual Habits into a Positive

Being an instructor for Tony Scotti’s Vehicle Dynamics Institute has forwarded the opportunity to observe how a large section of professionals interact and function from different niches of the industry. Military, transnational EP teams, US based teams, Federal LEO’s or with civilians this theme shows through. Even in the larger training arena the change can be seen as more of the schools are starting to focus on classes or blocks of instruction such as client management and behavioral analysis. The discussion forms are flooded with conversations relating to how to work in a team dynamic. It doesn’t matter if its a 28 day school or a three day school, they will be touching on and teaching these topics.

Executive Protection is more than an individual who drives a car or walks alongside a corporate executive.

What is Executive Protection?

In the past, I viewed Executive Protection (EP) as persons who provided corporate level protection. This was the guy who only walked with the CEO, politician, or other important corporate executives and dignitaries. With my limited understanding, I didn’t think of those who drive these same individuals as being considered Executive Protection agents as well. As an EP specialist, I now understand and have experienced some of the vast role’s EP work will encompass.

Global Risk

Global Situation report provided by Stratfor

Global Situation Report October, 2020

Having informed insight in today’s increasingly complex international environment is more important than ever. That’s why we’ve partnered with Stratfor, the worlds leading geopolitical intelligence platform, to bring readers regular analysis and accurate forecasting of global trends from someone you can trust.

Popular Tags

Afghanistan armed attack Bodyguard Bodyguarding Celebrity client Close Protection Close Protection Officer Elijah Shaw Executive Executive Protection fight firearm gun Intelligence Iraq Law Enforcement Medical military News online police Prevention professional protect protection PTSD Risk Risk Assessment Risk Management Safety Security Security Incidents Security Industry Authority SIA Social Media Surveillance terror Terrorism terrorist Threat train Training VIP

On The Frontline

What is Tour Security?

The following article attempts to shine a light on what many consider to be a rather niche and unique aspect of security … >>>

The Problem with Selfies

  “If you happen to see me out somewhere know that I’m not gonna take a picture I’m done taking pictures,” he … >>>

A is for Appendix Carry

For those of us in protective services our goal is always risk mitigation verses risk management.  In fact in the … >>>

Follow us

  • Email
  • Facebook
  • Twitter

From The Archives

Legal Testimony & the Close Protection Agent

Legal Testimony & the Close Protection Agent   You are a well- trained, and well educated Protection Agent. … >>>

Assignments Over. Now What?

So you got the tap for the assignment and a spot on the detail?  You are good to go for the next several days, weeks, or … >>>

What Doesn’t Kill You…

What doesn’t kill you makes you stronger... …or so the saying goes. And yet for many people, a traumatic event leaves … >>>

Security industry News Brought to you by the Circuit Magazine

Kevin Hart Blames Woman Knocked Down by His Bodyguards

Industry News – November 20, 2019   “When you walk the streets of New York you don’t assume the risk that an … >>>

  • Terms And Conditions
  • Magazines
  • Privacy Policy
  • Archives

© 2021 Circuit Magazine · Rainmaker Platform

This website or its third-party tools use cookies which are necessary to its functioning and required to improve your experience. By clicking the consent button, you agree to allow the site to use, collect and/or store cookies.
I accept