4

Conducting Surveillance Detection

Abstract

By now you should be familiar with the terrorist preattack and attack methodology and their tactics, techniques, and procedures (TTPS)—indicators of preattack operations—and are now ready to understand the paradigm shift in surveillance and threat detection: to go from a reactive to a proactive security posture. We discuss proactive measures and learn how to exploit the vulnerabilities in terrorist and criminal’s TTPs and how to stop them during their preattack operations.

Keywords

assessment; elicitation; infrastructure; observation; risk; security; surroundings; vulnerability

Chapter Outline

Get Surveillance and Threat Detection now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.