Skip to Main Content
Protective Operations
book

Protective Operations

by Glenn McGovern
March 2011
Intermediate to advanced content levelIntermediate to advanced
204 pages
6h 29m
English
CRC Press
Content preview from Protective Operations
PROTECTIVE OPERATIONS
174
acquire as open source, it is obtainable and needs to be considered (again
by analysis of the threat source).
As part of this stage, a route analysis is conducted on all roadways
routinely traveled by the individual between ofce and residence, as well
as frequented locations (i.e., gym, children’s school, and day care, etc.).
This, of course, requires individuals honestly detailing the route(s) they
travel, including the admission of taking the same way to and from work.
As part of this analysis, in addition to identifying those locations offering
an adversary the greatest benets and, therefore, likely ambush spots, pos-
sible routes of escape for the target will be noted. It is also recommended
that, given
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Business Espionage

Business Espionage

Bruce Wimmer, CPP
Secrets Stolen, Fortunes Lost

Secrets Stolen, Fortunes Lost

Richard Power, Christopher Burgess

Publisher Resources

ISBN: 9781439851715