• Skip to primary sidebar
  • Skip to content
  • Skip to footer
  • Home
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

Circuit Magazine

For Security & Protection Specialists

Surveillance Detection

A key skill for security and counter-terrorism professionals

History has taught us that certain kinds of activities can indicate terrorist plans are in the works, especially when they occur at or near high profile or sensitive sites, places where high profile individuals reside or work, or where large numbers of people gather like government buildings, military installations, bus or train stations or major public events.  The ability to detect hostile or suspicious activity early in the target selection and planning phase is the primary means of defeating a terrorist or criminal attack.  Thus, surveillance detection (SD) has become critical to successful intelligence collection, counter terrorism and security operations.

Surveillance Detection

 

Terrorist attacks follow a distinct process referred to as the Terrorist Attack Cycle.  The terrorist attack cycle includes:  Target selection, planning, deployment, escape and exploitation.  Regardless of the type of attack whether it be terrorist such as a bombing or kidnapping or a criminal attack such as a theft there is almost always some amount of preoperational hostile surveillance conducted.  This hostile surveillance is intended to assess a potential target for value, security measures and vulnerabilities and it’s during this phase that terrorists and other attackers are vulnerable to detection.

In general terrorists have relatively poor surveillance skills or tradecraft.  It is this poor surveillance tradecraft that if recognized can provide individuals and organizations with the time needed to involve the proper authorities, avoid an immediate threat and help prevent an attack.

In Surveillance Detection (SD), the acronym T.E.D.D. is often used by the U.S. government to define the principles that can be used to identify surveillance conducted by hostile surveillance and counter intelligence agencies.  T.E.D.D. stands for Time, Environment, Distance and Demeanor.  In other words, if a person sees someone over time, in different environments and over distance or someone who displays poor surveillance tradecraft then that person can assume they are under surveillance.

 

Time, environment and distance are not applicable when a specific location or mode of public transportation is targeted or in cases of ambush attackers.  Therefore, when talking about hostile surveillance, demeanor is the most critical of the four elements.  Poor demeanor will often help the target or surveillance detection unit identify hostile surveillance.

Demeanor indicators include:  people wearing unsuitable clothing for the weather or environment, people with unusual bulges under their clothing, wires protruding from their clothing, people who are sweating profusely, mumbling to themselves or fidgeting, people who appear to be attempting to avoid security personnel or law enforcement and people who appear out of place.

When attempting to identify hostile surveillance, you must first identify suitable observation points (OP’s) that provide optimal views of critical locations that hostile surveillance would want to watch such as the entrance to the targets residence or office.  Close attention should be paid to vehicles and people that look out of place or are people exhibiting poor surveillance demeanor.

Surveillance detection personnel should conduct a pattern and route analysis to determine where along routes of travel that the target is most predictable and vulnerable.  Route analysis should include identification of choke points.  Choke points are a geographical feature such as a valley, bridge, round a bout or other area where the target must travel and where rapid forward motion and or escape is difficult.  If a choke point provides a position where attackers can freely wait for their targets and have access to a suitable escape route, the choke point becomes a potential attack site.  An ideal countermeasure would be to vary routes and times of travel to avoid exhibiting predictable behavior.

Hostile surveillance operatives will often change their appearance by changing clothes, using hats or wigs and other disguises.  Many times, they will change vehicle plates or even change vehicles.  For this reason, it is important to focus on an individuals facial features, build, mannerisms, gait and identifying marks such as scars and tattoos.  When it comes to vehicles, special attention should be paid to characteristics such as body damage, stickers and other unique characteristics.

There are primarily three types of surveillance related activities; they are surveillance (SV), surveillance detection (SD) and counter surveillance (CS).

Surveillance:  In this case hostile surveillance conducts purposeful observation of people, places and vehicles with the intent of collecting intelligence that can be used in the planning of a hostile action be it criminal or terrorist, against a specific target.  Surveillance can also be used to collect intelligence on a range of potential targets in order to eliminate target options and aid in target selection by identifying a target that satisfies the objective of the attacker.

Surveillance Detection:  Surveillance detection can be conducted by civilians, executives, security personnel, government agencies, law enforcement and the military.  Surveillance detection conducts purposeful observation of people, locations and vehicles with the specific intent of determining if surveillance is being conducted against a specific target.  The focus of surveillance detection is to distinguish types of suspect behavior and other indicators of possible surveillance and report any suspicious behavior or indicators.  The reports are then analyzed and directed to the proper authorities for an appropriate response.  Surveillance detection plans should include a strategy for recording and reporting observations, use of cover and will include a surveillance detection response during routine travel and around any facilities or locations that may be targeted.  Surveillance detection plans should be implemented discretely and abide by local laws and federal laws such as the Foreign Surveillance Intelligence Act (F.I.S.A.).  If hostile surveillance is detected, all relevant details should be reported to the appropriate authorities in a timely manner.  The response to discovery of hostile surveillance will depend on the situation and potential threat at the time of discovery.

Counter Surveillance:  Counter surveillance is often conducted by professionals who are trying to exploit and neutralize hostile surveillance.  Essentially, counter surveillance is an operational measure taken once hostile surveillance has been identified.  Counter surveillance then conducts surveillance of the hostile surveillance in order to gather intelligence that can be used to manipulate, exploit or apprehend the hostile surveillance.  Counter surveillance is normally conducted by intelligence agencies and the military but in today’s global environment more and more security contractors are becoming involved in counter surveillance operations.  Some sophisticated attackers may use counter surveillance as a countermeasure against surveillance detection to increase their operational security.

When conducting surveillance detection, it is important no to cross over into the role of counter surveillance as this can compromise any future counter surveillance operation conducted by the authorities and risks chasing the surveillance into hiding.

Surveillance detection works because it allows the hostile surveillance to feel confident operating in the open because they have no idea anyone is watching them.  If the intelligence collected by surveillance detection warrants further investigation, then the proper authorities can get involved and design a professional counter surveillance operation to exploit or capture the hostile surveillance.

By applying professional surveillance detection to security and counter terror operations we can effectively detect and prevent terrorist attacks in the planning phases, reduce the number of attacks and allow for safer operations in high risk environments.

By:  Jeff Burns

Tweet
Share
Pin
Share27
27 Shares

Buy The Latest Issue

Sign Up For News and Updates

We respect your privacy and will not share your information with anyone.
We will only message you when we have something relevant and of value to share with you.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Latest Issue

Circuit Magazine - Issue 66 - AI Armageddon

Issue 66

Buy Now

Latest Newsletter

Newsletter Sign Up

What you don't know CAN hurt you!

SUBSCRIBE

Latest Industry News

Ugandan Minister Killed by Bodyguard in Apparent Wage Dispute

A Ugandan government minister, Charles Engola, was shot and killed by his bodyguard early Tuesday in an apparent private dispute over wages, according to the army and local media. Engola, a retired army colonel, served as the junior minister in charge of labor in President Yoweri Museveni’s government.

Event

News - Circuit Magazine

Zelenskiy Denies Ukraine’s Involvement in Alleged Kremlin Drone Attack

Ukrainian President Volodymyr Zelenskiy has refuted Russia’s claims that Ukraine was involved in a drone attack on the Kremlin, which was allegedly aimed at killing Russian President Vladimir Putin. Zelenskiy stated that Ukraine fights and defends its territory, not attacking Putin or Moscow. The Kremlin reported that two drones were used in the attack but were disabled by Russian defenses.

News taken from Issue 65 of the Circuit Magazine

Bodyguard Saves Japanese PM from Pipe Bomb Attack

A bodyguard has been hailed as a hero for his quick-thinking actions during a suspected pipe-bomb attack on Japanese Prime Minister Fumio Kishida. Video footage captured the bodyguard kicking away a metal object as it landed near Kishida
before positioning himself between the Prime Minister and the device, shielding him with a collapsible, handheld ballistics shield.

News from Issue 65 of the Circuit Magazine

AlertEnterprise Reveals First-Ever Guardian AI Chatbot Powered by OpenAI ChatGPT

AlertEnterprise has unveiled its first-ever Guardian AI Chatbot powered by OpenAI ChatGPT. The chatbot will make its global debut at the ASIS Europe and ISC West trade events. Built on OpenAI’s GPT-3 platform, the Guardian AI Chatbot aims to provide security operators with instant access to critical physical access and security insights through quick questions and prompts.

James Bore's Cyber Security

Ways to See the Threat Before it Happens

Threat modelling is widely in use, whether knowingly or not, across every walk of life – and has been used since time immemorial to prioritise security defences. The only difference between the well-known risk assessments carried out by everyone and threat modelling in cyber security is the attempt to document and systemise it. I am hoping that this idea of formal threat modelling will be a useful tool for you to use in your future arsenal of available resources as a CP operator.

Close Protection advice

Keeping Your Edge: Building a Solid Foundation

Longevity, consistency and remaining relevant are some primary goals of all protectors. These factors are important when establishing a new contract and providing services for a new client. But what is equally important is the mindset that goes into those first days and weeks on the assignment. As such, I wanted to get the personal perspective of Vantrell Wilson, a close protection agent who I have trained with and worked alongside of for years now.

Technology in the security industry

Leveraging Technology in Industry Hiring

Increased global connectedness through technology is fast becoming the norm these days. Video conferencing and “face to face” meetings are happening daily in real-time across the world. As an industry that prides itself on having the edge over our adversaries, we are falling below our own standards when it comes to utilizing the technological resources at our availability to their fullest potential.

Global Risk Updates

Global Situation Report - November 2021

Global Situation Report – November 2021

Each issue our global geopolitical partner, Stratfor, provides an in-depth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.

Popular Tags

armed attack Bodyguard business Celebrity client clients Close Protection Communication cp Crime Elijah Shaw EP Executive Executive Protection firearm firearms government gun Intelligence Law Enforcement Media Medical military News online police Prevention professional protect protection Risk Safety Security SIA Social Media Surveillance Technology terror Terrorism terrorist Threat Training VIP weapon

On The Frontline

Executive Protection is more than an individual who drives a car or walks alongside a corporate executive.

What is Executive Protection?

In the past, I viewed Executive Protection (EP) as persons who provided corporate level protection. This was the guy who only walked with the CEO, politician, or other important corporate executives and dignitaries. With my limited understanding, I didn’t think of those who drive these same individuals as being considered Executive Protection agents as well. As an EP specialist, I now understand and have experienced some of the vast role’s EP work will encompass.

The Problem with Selfies

We have all heard the old saying, “Pictures are worth a thousand words,” so who wants an autograph, when a photo with your favorite celebrity conveys much more perceived authenticity? This also has value in the arena of SOCIAL capital.

Mystery Shopper – Circuit Q&A

Mystery Shopper – Circuit Q&A Nick McCarthy interviews Linda  Eastwood. Linda, we became ‘friends’ recently via an online networking portal, exchanged a few messages and then met up at a networking meeting. I was very impressed by your story and your success and thought that Circuit Magazine readers would enjoy your story and the somewhat […]

Follow us

  • Email
  • Facebook
  • Twitter

From The Archives

New Data Highlights Cyber Security Skills Shortage

A new report shows the extent to which a shortage in cyber security skills is affecting businesses. …

Continue Reading about New Data Highlights Cyber Security Skills Shortage

What to Do about School Shootings?

School shootings are both a political hot potato and a concern that directly affects those of us in …

Continue Reading about What to Do about School Shootings?

The Conscientious Bodyguard

Personality: An internal disposition that guides a specific pattern of behaviour. Over many …

Continue Reading about The Conscientious Bodyguard

Global Risk RoundUp – July 2019

  Our Global Risk partners, Drum Cussac, provide in-depth analysis of global risks via …

Continue Reading about Global Risk RoundUp – July 2019

Promoted Event

International Security Expo

Latest Podcast Episode

Latest Issue

Circuit Magazine - Issue 66 - AI Armageddon

Issue 66

As AI armageddon comes closer, the global challenge is discerning the line between innovation and oversight, particularly concerning decision-making biases and security implications.

Buy Now

Follow us

  • Email
  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
  • Home
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

© 2023 Circuit Magazine · Rainmaker Platform

This website or its third-party tools use cookies which are necessary to its functioning and required to improve your experience. By clicking the consent button, you agree to allow the site to use, collect and/or store cookies.
I accept