Providing protective services requires a mind set that differs dramatically from the norm. This line of work demands a forward-thinking anticipation of what might occur and developing solutions on how to mitigate those risks. How does this differ from the norm? Half of the people on this planet are categorized into below average intelligence. Humor […]
Choosing Camera Lenses for Surveillance is equally, if not more, important than choosing the camera body. Two of the most important considerations are the focal length and the speed.
The ability to detect suspicious activity early in the planning phase is the primary means of defeating a terrorist attack. Thus, surveillance detection (SD) has become critical to successful intelligence collection, counter terrorism and security operations. By applying effective surveillance detection to security and counter terror operations we can effectively detect and prevent terrorist attacks in the planning phases, reduce the number of attacks and allow for safer operations in high risk environments.
When it comes to a wardrobe suited for duty, rule number one is, you don’t buy it, you acquire it over time. In most cases, unless you have unlimited resources this will be a slow build for most agents. To help you in developing a work-ready wardrobe I have put together a list of important considerations to help you get the essentials for good fit and function.
Hostile surveillance detection is one of the few security techniques that preempts danger. As the name suggests it is the art of identifying an individual or group that is attempting to obtain intelligence by placing your client under surveillance. Its main advantage as a security tool is that it is proactive rather than reactive.
Surveillance Detection A key skill for security and counter-terrorism professionals History has taught us that certain kinds of activities can indicate terrorist plans are in the works, especially when they occur at or near high profile or sensitive sites, places where high profile individuals reside or work, or where large numbers of people gather like […]
The Silent Witness & Hacking With the proliferation of mobile phones in the public domain, many myths surround the actual truth that lies behind this wireless technology and the inappropriate use of the word Hacking associated with them in recent times. In my past role in a Police Technical Support Unit, I have interrogated […]
What’s in your GO Bag – Going Digital Your Principal has a known stalker that has sent letters and threatening emails. You are at a small venue for a public appearance, and suspect that they might show up. You need to remain with your client in a holding room, but what could make life […]