12.07.2015 Views

Surveillance Countermeasures: A Serious Guide to ... - Paladin Press

Surveillance Countermeasures: A Serious Guide to ... - Paladin Press

Surveillance Countermeasures: A Serious Guide to ... - Paladin Press

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ecause of business affiliations is vastly increased. This expandingthreat is further compounded by the ever-increasing practice ofindustrial espionage conducted between competing businesses.Criminal, terrorist, and espionage organizations also employ surveillancein support of efforts <strong>to</strong> recruit or coerce individuals <strong>to</strong> provideinformation or other types of support. To this end, surveillanceis employed <strong>to</strong> develop exploitable information on unwitting individuals.Those confronted with exploitable evidence developedthrough surveillance may be forced <strong>to</strong> cooperate rather than riskhaving the information disclosed <strong>to</strong> their families, employers, or thepublic. Attributes and vices such as infidelity, homosexuality, alcoholism,and drug abuse are some common examples of the limitlessoptions possible for such blackmail operations. As a corollary, themajority of surveillance activities conducted by private investigativeagencies are undertaken <strong>to</strong> confirm or deny whether an individual isconducting similar types of activities. Even individuals with noreadily exploitable attributes can be manipulated in<strong>to</strong> compromisingsituations <strong>to</strong> develop the leverage necessary for coercion.Regardless of the nature of the threat, surveillance can bedetected and defeated through the effective use of surveillancecountermeasures. This book addresses the principles that havedeveloped in<strong>to</strong> time-proven methods of countering the mostsophisticated surveillance techniques. Importantly in this age ofterrorism, the very same surveillance countermeasures that areapplicable <strong>to</strong> the detection of preoperational surveillance canprove critical when hostile elements are actually in the act of acrime or attack. This is the point when opera<strong>to</strong>rs must exposethemselves and are consequently most vulnerable <strong>to</strong> detection.Proficiency in the techniques of observation and surveillancecountermeasures is an effective means <strong>to</strong> prevent the act orenable individuals <strong>to</strong> avoid the threat when in harm’s way.<strong>Surveillance</strong> countermeasures can be categorized as either surveillancedetection or antisurveillance. The former is employed <strong>to</strong>detect the presence of a possible or suspected surveillance, whilethe latter is employed <strong>to</strong> elude a suspected or detected surveillance.Both methods are further categorized in<strong>to</strong> distinct disciplines.In general terms, surveillance can be categorized as either physicalor technical. Accordingly, surveillance countermeasures can beeither physical or technical, based on the nature of threat. PhysicalIntroduction <strong>to</strong> <strong>Surveillance</strong> <strong>Countermeasures</strong>3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!