Skip to Main Content
Protective Operations
book

Protective Operations

by Glenn McGovern
March 2011
Intermediate to advanced content levelIntermediate to advanced
204 pages
6h 29m
English
CRC Press
Content preview from Protective Operations
OPERATIONAL SECURITY (OPSEC)
123
use. These locations like the business and, therefore, many will take extra
steps to make obtaining rooms as painless as possible. This relationship
should be used to the benet of all, but it should not be repeatedly used in
a way that increases the danger to the protectee.
Ideally, it would be benecial to have a list of 10 or more motels/hotels
within the county that could be used for overnight stays (in addition to
any traditional safe houses an agency might have access to). A simple
spreadsheet like the example shown in Table7.1 would list the date, name,
location, case, and any gang links for each person housed overnight. Any
future housing would be compared to the list to determine any coni
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Business Espionage

Business Espionage

Bruce Wimmer, CPP
Secrets Stolen, Fortunes Lost

Secrets Stolen, Fortunes Lost

Richard Power, Christopher Burgess

Publisher Resources

ISBN: 9781439851715