• Skip to primary sidebar
  • Skip to content
  • Skip to footer
  • Home
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

Circuit Magazine

For Security & Protection Specialists

A key skill for security and counter-terrorism professionals

History has taught us that certain kinds of activities can indicate terrorist plans are in the works, especially when they occur at or near high profile or sensitive sites, places where high profile individuals reside or work, or where large numbers of people gather like government buildings, military installations, bus or train stations or major public events.  The ability to detect hostile or suspicious activity early in the target selection and planning phase is the primary means of defeating a terrorist or criminal attack.  Thus, surveillance detection (SD) has become critical to successful intelligence collection, counter terrorism and security operations.

Terrorist attacks follow a distinct process referred to as the Terrorist Attack Cycle.  The terrorist attack cycle includes:  Target selection, planning, deployment, escape and exploitation.  Regardless of the type of attack, whether it is terrorism such as a bombing, or kidnapping, or a criminal attack such as a theft, there is almost always some amount of preoperational hostile surveillance conducted.  This hostile surveillance is intended to assess a potential target for value, security measures and vulnerabilities and it’s during this phase that terrorists and other attackers are vulnerable to detection.

Historically, terrorists have relatively poor surveillance skills or tradecraft.  It is this poor surveillance tradecraft that if recognized can provide individuals and organizations with the time needed to involve the proper authorities, avoid an immediate threat and help prevent an attack.

In Surveillance Detection (SD), the acronym T.E.D.D. is often used by the U.S. government to define the principles that can be used to identify surveillance conducted by hostile surveillance and counter intelligence agencies.  T.E.D.D. stands for Time, Environment, Distance and Demeanor.  In other words, if a person sees someone over time, in different environments and over distance or someone who displays poor surveillance tradecraft then that person can assume they are under surveillance.

Time, environment and distance are not applicable when a specific location or mode of public transportation is targeted or in cases of ambush attackers.  Therefore, when talking about hostile surveillance, demeanor is the most critical of the four elements.  Poor demeanor will often help the target or surveillance detection unit identify hostile surveillance.

Demeanor indicators include:  people wearing unsuitable clothing for the weather or environment, people with unusual bulges under their clothing, wires protruding from their clothing, people who are sweating profusely, mumbling to themselves or fidgeting, people who appear to be attempting to avoid security personnel or law enforcement and people who appear out of place.

When attempting to identify hostile surveillance, you must first identify suitable observation points (OP’s) that provide optimal views of critical locations that hostile surveillance would want to watch such as the entrance to the targets residence or office.  Close attention should be paid to vehicles and people that look out of place or are exhibiting poor surveillance demeanor.

Surveillance detection personnel should conduct a pattern and route analysis to determine where along routes of travel that the target is most predictable and vulnerable.  Route analysis should include identification of choke points.  Choke points are a geographical feature such as a valley, bridge, roundabout or other area where the target must travel and where rapid forward motion and or escape is difficult.  If a choke point provides a position where attackers can freely wait for their targets and have access to a suitable escape route, the choke point becomes a potential attack site.  An ideal countermeasure would be to vary routes and times of travel to avoid exhibiting predictable behavior.

Hostile surveillance operatives will often change their appearance by changing clothes, using hats or wigs and other disguises.  Many times they will change vehicle plates or even change vehicles.  For this reason it is important to focus on an individuals facial features, build, mannerisms, gait and identifying marks such as scars and tattoos.  When it comes to vehicles, special attention should be paid to characteristics such as body damage, stickers and other unique characteristics.

There are primarily three types of surveillance related activities; they are surveillance (SV), surveillance detection (SD) and counter surveillance (CS).

Surveillance:  In this case hostile surveillance conducts purposeful observation of people, places and vehicles with the intent of collecting intelligence that can be used in the planning of a hostile action be it criminal or terrorist, against a specific target.  Surveillance can also be used to collect intelligence on a range of potential targets in order to eliminate target options and aid in target selection by identifying a target that satisfies the objective of the attacker.

Surveillance Detection:  Surveillance detection can be conducted by civilians, executives, security personnel, government agencies, law enforcement and the military.  Surveillance detection conducts purposeful observation of people, locations and vehicles with the specific intent of determining if surveillance is being conducted against a specific target.  The focus of surveillance detection is to distinguish types of suspect behavior and other indicators of possible surveillance and report any suspicious behavior or indicators.  The reports are then analyzed and directed to the proper authorities for an appropriate response.  Surveillance detection plans should include a strategy for recording and reporting observations, use of cover and will include a surveillance detection response during routine travel and around any facilities or locations that may be targeted.  Surveillance detection plans should be implemented discretely and abide by local laws and federal laws such as the Foreign Surveillance Intelligence Act (F.I.S.A.).  If hostile surveillance is detected, all relevant details should be reported to the appropriate authorities in a timely manner.  The response to discovery of hostile surveillance will depend on the situation and potential threat at the time of discovery.

Counter Surveillance:  Counter surveillance is often conducted by professionals who are trying to exploit and neutralize hostile surveillance.  Essentially, counter surveillance is an operational measure taken once hostile surveillance has been identified.  Counter surveillance then conducts surveillance of the hostile surveillance in order to gather intelligence that can be used to manipulate, exploit or apprehend the hostile surveillance.  Counter surveillance is normally conducted by intelligence agencies and the military but in today’s global environment more and more security contractors are becoming involved in counter surveillance operations.  Some sophisticated attackers may use counter surveillance as a countermeasure against surveillance detection to increase their operational security.

When conducting surveillance detection, it is important not to cross over into the role of counter surveillance as this can compromise any future counter surveillance operation conducted by the authorities and risks chasing the surveillance into hiding.

Surveillance detection works because it allows the hostile surveillance to feel confident operating in the open because they have no idea anyone is watching them.  If the intelligence collected by surveillance detection warrants further investigation, then the proper authorities can get involved and design a professional counter surveillance operation to exploit or capture the hostile surveillance.

By applying professional surveillance detection to security and counter terror operations we can effectively detect and prevent terrorist attacks in the planning phases, reduce the number of attacks and allow for safer operations in high risk environments.

By:  Jeff Burns

Learn more about the author here

Tweet
Share
Pin
Share3
3 Shares

Buy The Latest Issue

Sign Up For News and Updates

We respect your privacy and will not share your information with anyone.
We will only message you when we have something relevant and of value to share with you.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Latest Issue

Circuit Magazine - Issue 66 - AI Armageddon

Issue 66

Buy Now

Latest Newsletter

Newsletter Sign Up

What you don't know CAN hurt you!

SUBSCRIBE

Latest Industry News

Ugandan Minister Killed by Bodyguard in Apparent Wage Dispute

A Ugandan government minister, Charles Engola, was shot and killed by his bodyguard early Tuesday in an apparent private dispute over wages, according to the army and local media. Engola, a retired army colonel, served as the junior minister in charge of labor in President Yoweri Museveni’s government.

Event

News - Circuit Magazine

Zelenskiy Denies Ukraine’s Involvement in Alleged Kremlin Drone Attack

Ukrainian President Volodymyr Zelenskiy has refuted Russia’s claims that Ukraine was involved in a drone attack on the Kremlin, which was allegedly aimed at killing Russian President Vladimir Putin. Zelenskiy stated that Ukraine fights and defends its territory, not attacking Putin or Moscow. The Kremlin reported that two drones were used in the attack but were disabled by Russian defenses.

News taken from Issue 65 of the Circuit Magazine

Bodyguard Saves Japanese PM from Pipe Bomb Attack

A bodyguard has been hailed as a hero for his quick-thinking actions during a suspected pipe-bomb attack on Japanese Prime Minister Fumio Kishida. Video footage captured the bodyguard kicking away a metal object as it landed near Kishida
before positioning himself between the Prime Minister and the device, shielding him with a collapsible, handheld ballistics shield.

News from Issue 65 of the Circuit Magazine

AlertEnterprise Reveals First-Ever Guardian AI Chatbot Powered by OpenAI ChatGPT

AlertEnterprise has unveiled its first-ever Guardian AI Chatbot powered by OpenAI ChatGPT. The chatbot will make its global debut at the ASIS Europe and ISC West trade events. Built on OpenAI’s GPT-3 platform, the Guardian AI Chatbot aims to provide security operators with instant access to critical physical access and security insights through quick questions and prompts.

James Bore's Cyber Security

Ways to See the Threat Before it Happens

Threat modelling is widely in use, whether knowingly or not, across every walk of life – and has been used since time immemorial to prioritise security defences. The only difference between the well-known risk assessments carried out by everyone and threat modelling in cyber security is the attempt to document and systemise it. I am hoping that this idea of formal threat modelling will be a useful tool for you to use in your future arsenal of available resources as a CP operator.

Close Protection advice

Keeping Your Edge: Building a Solid Foundation

Longevity, consistency and remaining relevant are some primary goals of all protectors. These factors are important when establishing a new contract and providing services for a new client. But what is equally important is the mindset that goes into those first days and weeks on the assignment. As such, I wanted to get the personal perspective of Vantrell Wilson, a close protection agent who I have trained with and worked alongside of for years now.

Technology in the security industry

Leveraging Technology in Industry Hiring

Increased global connectedness through technology is fast becoming the norm these days. Video conferencing and “face to face” meetings are happening daily in real-time across the world. As an industry that prides itself on having the edge over our adversaries, we are falling below our own standards when it comes to utilizing the technological resources at our availability to their fullest potential.

Global Risk Updates

Global Situation Report - November 2021

Global Situation Report – November 2021

Each issue our global geopolitical partner, Stratfor, provides an in-depth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.

Popular Tags

armed attack Bodyguard business Celebrity client clients Close Protection Communication cp Crime Elijah Shaw EP Executive Executive Protection firearm firearms government gun Intelligence Law Enforcement Media Medical military News online police Prevention professional protect protection Risk Safety Security SIA Social Media Surveillance Technology terror Terrorism terrorist Threat Training VIP weapon

On The Frontline

basic concepts we could say that any social media policy for security companies

Social Media Policies

Anyone who works for you and has their work title/position linked to your company represents your brand and is responsible for your reputation. They can also be a liability for you and may become the weak link of your company and their online activities are such that your competitors can use it against you.

On the Ground in Iraq – A Medics Experience

In the early days of ‘private contractor’ work in Iraq following the end of the war in 2003, medics were generally unregulated and unregistered, most being ex RMAs (now CMT1s) who had left the military and qualified as HSE Offshore Medics. Some had not done any ‘civilian’ courses but were hired on the strength of their military qualifications and experience; the guys would generally operate as firstly a PSD team member/operator, and secondly as a team medic. In those days the drugs and equipment carried by the medics was very limited; generally, FFDs, quick clot, blast bandages and if you were lucky some morphine auto injectors, Paracetamol and Ibuprofen.

Industry News At A Glance March 2020

We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.

Follow us

  • Email
  • Facebook
  • Twitter

From The Archives

Counter-Ambush Tactics for Security Professionals – Part 1

As security personnel working in a protective operations role, we are tasked to do everything we can …

Continue Reading about Counter-Ambush Tactics for Security Professionals – Part 1

The Practical Application of Military Physical Training

Organised physical exercise can be traced far back to ancient Greek times, where it was viewed that …

Continue Reading about The Practical Application of Military Physical Training

Industry News

French medics need bodyguards for 300 metre commute after spike in violent attacks 04 April Paris, …

Continue Reading about Industry News

The Death of Journalist Marie Colvin

Why media management has to be held accountable (young journalists and freelancers also take …

Continue Reading about The Death of Journalist Marie Colvin

Promoted Event

International Security Expo

Latest Podcast Episode

Latest Issue

Circuit Magazine - Issue 66 - AI Armageddon

Issue 66

As AI armageddon comes closer, the global challenge is discerning the line between innovation and oversight, particularly concerning decision-making biases and security implications.

Buy Now

Follow us

  • Email
  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
  • Home
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

© 2023 Circuit Magazine · Rainmaker Platform

This website or its third-party tools use cookies which are necessary to its functioning and required to improve your experience. By clicking the consent button, you agree to allow the site to use, collect and/or store cookies.
I accept