
PROTECTIVE OPERATIONS
152
conrm the threat as well as provide means of identifying the involved
parties should they make an appearance. This also goes back to the topic
discussed in risk management on identifying those in your organization
most apt to be targeted. If the initial background and research is per-
formed correctly, then the team already has the baseline surveillance
detection work in their hands. All the team needs to do is refer to the plan
prior to going out and setting up.
In preparing the surveillance detection, use of a chart or matrix is
extremely benecial in identifying the hostile surveillance positions ...