Skip to Main Content
Protective Operations
book

Protective Operations

by Glenn McGovern
March 2011
Intermediate to advanced content levelIntermediate to advanced
204 pages
6h 29m
English
CRC Press
Content preview from Protective Operations
PROTECTIVE OPERATIONS
152
conrm the threat as well as provide means of identifying the involved
parties should they make an appearance. This also goes back to the topic
discussed in risk management on identifying those in your organization
most apt to be targeted. If the initial background and research is per-
formed correctly, then the team already has the baseline surveillance
detection work in their hands. All the team needs to do is refer to the plan
prior to going out and setting up.
In preparing the surveillance detection, use of a chart or matrix is
extremely benecial in identifying the hostile surveillance positions ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Business Espionage

Business Espionage

Bruce Wimmer, CPP
Secrets Stolen, Fortunes Lost

Secrets Stolen, Fortunes Lost

Richard Power, Christopher Burgess

Publisher Resources

ISBN: 9781439851715