4

Conducting Surveillance Detection

Abstract

By now you should be familiar with the terrorist preattack and attack methodology and their tactics, techniques, and procedures (TTPS)—indicators of preattack operations—and are now ready to understand the paradigm shift in surveillance and threat detection: to go from a reactive to a proactive security posture. We discuss proactive measures and learn how to exploit the vulnerabilities in terrorist and criminal’s TTPs and how to stop them during their preattack operations.

Keywords

assessment; elicitation; infrastructure; observation; risk; security; surroundings; vulnerability

Chapter Outline

Get Surveillance and Threat Detection now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.