• Skip to primary sidebar
  • Skip to content
  • Skip to footer
  • Home
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

Circuit Magazine

For Security & Protection Specialists

Specialist Surveillance


One of the oldest and most common practices in investigative services remains the best option in most cases when real-time information is required. Mostly used as a tools for private investigations but also a viable option in order to gather protective intelligence on a subject, surveillance is a very useful tool to keep greased in your toolbox. Surveillance is a skill learned best through experience, however tactics and techniques can also be improved via tips and tricks from seasoned practitioners. Below we have compiled some very effective tactics, techniques and procedures for conducting surveillance investigations, for both private investigators as well as for protective intelligence assignments.

On the Surveillance:
• How your presence is perceived in your target environment is very important to the success of your surveillance. ‘Fitting in’ and creating the illusion that you belong in order to effectively “hide in plain sight” is a very effective practice – sometimes being seen is better trying to remain hidden; hiding in plain sight to take advantage of the heuristics and geographics of that environment is difficult at times, but worth it.

• Be very careful not to give up your face directly to the subject, and only do so if absolutely necessary. At all costs, avoid eye contact as your eyes will tell the target more than you would ever care to. Remember, even if someone looks directly at you that does not mean that they see you. Avoid reacting as if they are on to you and just carry on.

• Avoid driving (or walking) by the target’s residence more than once per day unless absolutely necessary. You should prepare a story explaining why you are in that area and you can scatter ‘peepers’  such as a car seat/toys, laundry basket, etc. in plain view within the vehicle and do not leave anything revealing in view – camera, binoculars, notebook, etc.

• You do not need a ‘Chester the Molester’ or ‘Free Candy’ van to work covert surveillance cases without being seen and a van like that will stand out to every parent in the neighborhood. In most environments renting a common vehicle (Toyota Camry, Honda Civic, etc.) will be your best bet in blending in. Check the area ahead of time or even check Google Earth imagery to see the types of vehicles in the area and get what works. A business account with a big name renter usually means a standard car for $20-$30 a day, which is worth it.

• Check Google Earth imagery for routes in and out of the location and familiarize yourself with the area. This will facilitate your staging area as to avoid sitting right on the house, and will also let you know ahead of time if multiple vehicles will be required.

• It may help to get into the environment during the early morning hours as to avoid being seen entering the area and appear to have been there all night. Also consider insertion into the target area via someone dropping you off or parking the vehicle and walking away leaving you there to get a great spot. Remember, it is typically not the presence of the investigator that attracts attention – it is movement.

• Avoid being observed with a camera in-hand as the act itself will draw attention. No one uses a camera anymore…with the capabilities of most smart phones today, consider using it as this is less alerting. Some phones (namely iPhones) can activate the shutter with the volume button and you can do this with the device to your ear as to appear like you are talking on the phone – which works very well. Additionally, there are free apps that will time/date/GPS stamp the photo or video.

• Caution yourself when working cases near places where families an children gather – playgrounds, schools, etc. as you might find yourself surrounded by some very suspicious and emotional parents and consider the legality of who is in your photos and video as well.
• Start the day with a full tank of gas and clean the windshield and all glass on your vehicle so you can utilize your mirrors on your vehicle to shoot video and take photos to reduce movement and reduce frontal exposure. Make sure you note in your report if a photo was shot through a mirror.

• Conduct a pre-surveillance investigation and/or read all prior reports on the case, and know the places your target frequently visits. In being ‘creatures of habit,’ it may be your best bet to check your map and go to the closest location upon losing contact.

• Find a peculiar characteristic (sticker, damage, etc.) of the vehicle you are following or place an identifier, such as a sticker placed in the center of the tail light. If in a high traffic area at night, an IR chem-light affixed under the vehicle with an IR Viewer in hand works like a charm.

• If you can work as a male/female team you will be much less likely to be noticed; hold hand, flirt, etc. You can even get creative, taking pictures of the target making it look like you are taking pictures of each other.

• Be especially proactive on mobile surveillances; anticipate turns, stops and traffic interferences and consider your lane position carefully. The best way to learn this skill is through experience or by a ride along with a seasoned practitioner who verbalizes their thoughts as they work.

• When static, avoid things that will distract you from the target, such as Facebook, games, crosswords, etc. and if you must, bring the item to eye level in order to keep the target in your peripheral vision to maximize the observance of movement or change.

Surveillance Tips

Equipment:
• The capability of taking clear digital video and still photos from 100 yards is critical – date and time stamped with GPS stamp is also important. Also consider a covert camera, such as a pen or button camera which can come in handy if in a small area, such as a small restaurant. Binoculars or a monocular are useful in reducing the use of your camera.

• A voice recorder and notepad are also essential to keep chronological notes. Smart phones usually have voice recorders and you can even speak your notes into it.

• At least one extra set of clothes with a hat so you can change your clothing and accessories (hats, sunglasses, etc.) throughout the assignment – especially if you have had close contact with the target; plan for all weather conditions as well.

• Food, water and a method of relieving yourself to avoid moving your vehicle or getting out of the vehicle is very important as the excessive movement is likely to raise interest.

• Check all electronic devices for proper date and time setting, fully charged batteries and an extra battery is always a good thing.

• A vehicle with fog lights is a great asset – this affords you the option of changing the head light pattern of the vehicle in chase throughout the surveillance which may reduce the chances of the subject identifying you over the course of the surveillance.

Report Writing:
• Write your report to satisfy the client AND the end user – i.e. the client’s attorney. Write in third person, “The investigator arrived…..” and remember, many people will never see you but will know you and judge you by how you write and how you have conducted the surveillance.

• Include a photo log that contains: Identification photos of the target, photos of all vehicles involved in the investigation, photos of every location the target visits along with the address of that location, photos of any special identifying marks on the target and vehicle(s) and of course include any useful photos pertinent to the intent of your investigation. Video can be referenced and/or included in the report by including still photos from the video, noting the time into the segment.

• Stay on topic in your report and satisfy the intent of the request. If it is not pertinent to the case, it does not belong in the report, such as if it’s a worker’s compensation injury case, know the injury and continually address in the report how the injury is consistent or inconsistent with the target’s current behavior and mobility and the fact the target/claimant is functioning inside or outside of those restrictions in your report.

Joseph M LaSorsa
Joseph M LaSorsa is a senior partner managing and conducting: Protective Operations Training Courses, Executive Protection & Bodyguard Services, Risk Management Consultations & Seminars, Workplace Violence Prevention Seminars & Intervention Services, Security Consultations & Seminars, Private Investigations and Technical Surveillance Counter-Measures with LaSorsa & Associates – an International Protection, Investigations & Consulting Firm.
https://www.linkedin.com/in/josephmlasorsa

Tweet
Share
Pin
Share9
9 Shares

Buy The Latest Issue

Sign Up For News and Updates

We respect your privacy and will not share your information with anyone.
We will only message you when we have something relevant and of value to share with you.

Reader Interactions

Comments

  1. Craig dietlam

    August 9, 2016 at 3:22 AM

    Great job info is top notch you go joe

    Reply
  2. Ivy Baker

    June 23, 2017 at 2:12 AM

    I liked that you talked about how you should get a voice recorder and notepad. That does seem like it would help the investigator’s thoughts be kept in order. Especially, if the investigation that is going to be a long one.

    Reply
  3. Bram

    November 5, 2018 at 10:22 PM

    That is a good point you made about not being adjacent to the target’s residence. That was a good rule of thumb you gave about not going by their home unless absolutely necessary. If I ever hire a private investigator, I will be sure to ask them about their policy.

    Reply
  4. Taylor Anderson

    November 26, 2018 at 3:42 PM

    My family really enjoys watching crime and mystery shows, so I’ve always thought it would be cool to learn to do what a private investigator does. It was awesome when you said to make note of the habits and locations, as it will help you know where to trace your target. Thanks for sharing this cool article on how to be like a private investigator.

    Reply
  5. rohit aggarwal

    March 2, 2019 at 6:38 AM

    thanks for the information

    Reply
  6. Varun Gupta

    March 2, 2019 at 6:39 AM

    good one keep it up

    Reply
  7. Dave Anderson

    March 22, 2019 at 8:24 PM

    That is interesting that there should be a pre surveillance investigation. It would be good to hire someone who did that. Maybe I should look into getting someone who did that in case I ever needed one.

    Reply
  8. Gillian Babcock

    May 14, 2019 at 6:08 AM

    My sister is looking for an investigator that will help her at work. It was mentioned here that when looking for an investigator, the success of the surveillance depends on how good they are in hiding in plain sight. Furthermore, it’s recommended to go to trusted businesses when looking for an investigator.

    Reply
  9. Skylar Williams

    August 20, 2019 at 8:27 PM

    I never would have thought of having a method to relieve yourself without getting out of the car. I think my boyfriend is cheating on me and I want to catch him, so I’ve been thinking of doing some investigating. However, if I have to come up with a way to relieve myself while in a car, I think I will stick with using a private investigator.

    Reply
  10. Ron Booker

    September 3, 2019 at 6:33 PM

    I found it interesting how a technical surveillance company has equipment good enough to track any suspicious acts around your property. Someone told me that hiring a surveillance company can even help you know if your significant other is cheating. Thank you for helping me learn more about surveillance benefits.

    Reply
  11. Derek McDoogle

    January 13, 2020 at 7:39 PM

    My cousin thinks that her husband is cheating on her and she does not know what to do to find out. I like how you said that surveillance is a skill learned best through experience. I will suggest to her to contact a private investigator so that she can find out what is going on.

    Reply
  12. Johnny joshua

    December 22, 2020 at 5:49 AM

    Wow, just a fantastic way of experts technique with wonderful tips that you have shared. I am really so impressed by this. Yes there are many type of technology available for an insurance fraud case. Well, I also appreciate ICFECI for helping me in my critical case by fraud investigations.

    Reply
  13. Johnny Joshua

    January 2, 2021 at 7:35 AM

    Well, thank you for such amazing post I really feel good after read this. Keep post always like this. Actually, I was needed a private investigator for one of my issue where I felt very bad because I could not found any help. Then I got ICFECI through my friend who suggest me this and it was very useful for me in solving my case esily.

    Reply
  14. John Carston

    May 6, 2022 at 12:26 AM

    I’m glad that you talked that it is a good thing to check all the electronics and the proper time and date. I remember when my brother mentioned to me last night that he and his business associates were planning to have a CCTV installed in their clothing store for security purposes and to document daily happenings, and he asked if I had any idea what would be the best option to do. Thanks to this instructive article, I’ll be sure to tell him that I will be consulting a trusted security surveillance system service as they can provide more information about the installation process.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Latest Issue

Circuit Magazine - Issue 66 - AI Armageddon

Issue 66

Buy Now

Latest Newsletter

Newsletter Sign Up

What you don't know CAN hurt you!

SUBSCRIBE

Latest Industry News

Ugandan Minister Killed by Bodyguard in Apparent Wage Dispute

A Ugandan government minister, Charles Engola, was shot and killed by his bodyguard early Tuesday in an apparent private dispute over wages, according to the army and local media. Engola, a retired army colonel, served as the junior minister in charge of labor in President Yoweri Museveni’s government.

Event

News - Circuit Magazine

Zelenskiy Denies Ukraine’s Involvement in Alleged Kremlin Drone Attack

Ukrainian President Volodymyr Zelenskiy has refuted Russia’s claims that Ukraine was involved in a drone attack on the Kremlin, which was allegedly aimed at killing Russian President Vladimir Putin. Zelenskiy stated that Ukraine fights and defends its territory, not attacking Putin or Moscow. The Kremlin reported that two drones were used in the attack but were disabled by Russian defenses.

News taken from Issue 65 of the Circuit Magazine

Bodyguard Saves Japanese PM from Pipe Bomb Attack

A bodyguard has been hailed as a hero for his quick-thinking actions during a suspected pipe-bomb attack on Japanese Prime Minister Fumio Kishida. Video footage captured the bodyguard kicking away a metal object as it landed near Kishida
before positioning himself between the Prime Minister and the device, shielding him with a collapsible, handheld ballistics shield.

News from Issue 65 of the Circuit Magazine

AlertEnterprise Reveals First-Ever Guardian AI Chatbot Powered by OpenAI ChatGPT

AlertEnterprise has unveiled its first-ever Guardian AI Chatbot powered by OpenAI ChatGPT. The chatbot will make its global debut at the ASIS Europe and ISC West trade events. Built on OpenAI’s GPT-3 platform, the Guardian AI Chatbot aims to provide security operators with instant access to critical physical access and security insights through quick questions and prompts.

Executive Protection/Secured Transportation Profession

COVID-19 and the Executive Protection

As practitioners, our responsibilities are many: protection of the client from physical harm, protection of the client from self-embarrassment, etc. Now, that the restrictions in the post COVID-19 era are starting to be lifted in some areas, Clients, and other high-net-worth individuals will be more aware of the area in which they are located, lodging, and traveling to.

James Bore's Cyber Security

Ways to See the Threat Before it Happens

Threat modelling is widely in use, whether knowingly or not, across every walk of life – and has been used since time immemorial to prioritise security defences. The only difference between the well-known risk assessments carried out by everyone and threat modelling in cyber security is the attempt to document and systemise it. I am hoping that this idea of formal threat modelling will be a useful tool for you to use in your future arsenal of available resources as a CP operator.

Close Protection advice

Keeping Your Edge: Building a Solid Foundation

Longevity, consistency and remaining relevant are some primary goals of all protectors. These factors are important when establishing a new contract and providing services for a new client. But what is equally important is the mindset that goes into those first days and weeks on the assignment. As such, I wanted to get the personal perspective of Vantrell Wilson, a close protection agent who I have trained with and worked alongside of for years now.

Global Risk Updates

Global Situation Report - November 2021

Global Situation Report – November 2021

Each issue our global geopolitical partner, Stratfor, provides an in-depth analysis of global incidents via in-house experts, cutting edge technology and through a comprehensive globally sourced network. Here is your summary from the last 30 days.

Popular Tags

armed attack Bodyguard business Celebrity client clients Close Protection Communication cp Crime Elijah Shaw EP Executive Executive Protection firearm firearms government gun Intelligence Law Enforcement Media Medical military News online police Prevention professional protect protection Risk Safety Security SIA Social Media Surveillance Technology terror Terrorism terrorist Threat Training VIP weapon

On The Frontline

Product Review earHero

Product Review – Ear Hero

Designed by an audiologist, earHero’s speakers are so tiny they will never block your ear canal giving you the ability to literally talk on a separate phone without removing the earHero tactical earpiece from either ear.

You can literally hear whisper level sounds from yards away, while identifying the sounds’ precise location. The earHero tactical headsets have wires so thin and clear, they are virtually undetectable, and the design is so comfortable, you’ll barely know the earpiece is there.

Mystery Shopper – Circuit Q&A

Mystery Shopper – Circuit Q&A Nick McCarthy interviews Linda  Eastwood. Linda, we became ‘friends’ recently via an online networking portal, exchanged a few messages and then met up at a networking meeting. I was very impressed by your story and your success and thought that Circuit Magazine readers would enjoy your story and the somewhat […]

Communications Column By Andy Clark

A Deeper Understanding

a PoC service is like any other client server system that you use. Take Skype as an example that many people will be familiar with. This is what is commonly referred to as a ‘client-server’ application. The Skype app sits on you phone, tablet, laptop or desktop and is in constant communication with the Skype servers out there in the cloud.

Follow us

  • Email
  • Facebook
  • Twitter

From The Archives

Women In The Close Protection Industry

Anyone who has read my articles knows that I base most of them on questions or inquiries from those …

Continue Reading about Women In The Close Protection Industry

The Age of the Super Crises

The Age of the Super Crises ~ a nuclear threat   North Korea’s recent nuclear tests should …

Continue Reading about The Age of the Super Crises

Global Incidents: 25 Apr 2014

Global Incidents: 25 Apr 2014   Critical Information Brazil: Fresh clashes in Rio over …

Continue Reading about Global Incidents: 25 Apr 2014

Social Media & Social Management

There is no doubt about it, social media has become one of the fabrics of who we are as a society, …

Continue Reading about Social Media & Social Management

Promoted Event

International Security Expo

Latest Podcast Episode

Latest Issue

Circuit Magazine - Issue 66 - AI Armageddon

Issue 66

As AI armageddon comes closer, the global challenge is discerning the line between innovation and oversight, particularly concerning decision-making biases and security implications.

Buy Now

Follow us

  • Email
  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
  • Home
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

© 2023 Circuit Magazine · Rainmaker Platform

This website or its third-party tools use cookies which are necessary to its functioning and required to improve your experience. By clicking the consent button, you agree to allow the site to use, collect and/or store cookies.
I accept