Conducting Surveillance Detection
Abstract
By now you should be familiar with the terrorist preattack and attack methodology and their tactics, techniques, and procedures (TTPS)—indicators of preattack operations—and are now ready to understand the paradigm shift in surveillance and threat detection: to go from a reactive to a proactive security posture. We discuss proactive measures and learn how to exploit the vulnerabilities in terrorist and criminal’s TTPs and how to stop them during their preattack operations.
Keywords
assessment; elicitation; infrastructure; observation; risk; security; surroundings; vulnerability
Chapter Outline
Get Surveillance and Threat Detection now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.