Skip to Main Content
Protective Operations
book

Protective Operations

by Glenn McGovern
March 2011
Intermediate to advanced content levelIntermediate to advanced
204 pages
6h 29m
English
CRC Press
Content preview from Protective Operations
PROTECTIVE OPERATIONS
118
If they eventually fall out of the program, they still have the intelligence
(see Figure7.1.).
One of the rst things that should be performed upon law enforce-
ment’s initial receipt of threat information is to determine the victim/
target’s OPSEC. Some of this information will be useful later during the
vulnerability assessments. Some of the questions, however, differ from
habits and routes of travel and times of arrival and departure. I have
found the best place to start is, again, with the target/victim’s vehicle.
The rst question is, the location of the parked vehicle. For some
ofce/department heads, they may have assigned parking (hopefully it is
not labeled with a name or rank/position, ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Business Espionage

Business Espionage

Bruce Wimmer, CPP
Secrets Stolen, Fortunes Lost

Secrets Stolen, Fortunes Lost

Richard Power, Christopher Burgess

Publisher Resources

ISBN: 9781439851715