PROTECTIVE OPERATIONS
118
If they eventually fall out of the program, they still have the intelligence
(see Figure7.1.).
One of the rst things that should be performed upon law enforce-
ment’s initial receipt of threat information is to determine the victim/
target’s OPSEC. Some of this information will be useful later during the
vulnerability assessments. Some of the questions, however, differ from
habits and routes of travel and times of arrival and departure. I have
found the best place to start is, again, with the target/victim’s vehicle.
The rst question is, the location of the parked vehicle. For some
ofce/department heads, they may have assigned parking (hopefully it is
not labeled with a name or rank/position, ...