This three (3) day course explores commonly used techniques and strategies to aid law enforcement, federal agents and close protection teams in their efforts to detect, deter and mitigate hostile surveillance activity at the earliest stages.
A successful course graduate will have acquired the knowledge and practical working ability to plan, organize and conduct discrete surveillance/surveillance detection operations in non-permissive environments worldwide. Attendees will practice surveillance on both static and mobile targets in simulated real-world exercises.
- Duration: 30 Hours | 3 Full Days (some training modules will last well into the evening and include practical surveillance detection exercises)
- Contact Us: For More Information call +1-804-491-9860
- Recommended Audience: PSD Team Leaders | Executive Protection Specialist | Close Protection Professionals
- Training Locations: Los Angeles, California | Savannah, Georgia | Denver, Colorado
Course Tuition: $725.00 per person (includes; airport pickup and return, overnight lodging, training manual, CD diskette with PowerPoint and multimedia content, and a Certificate of Competency upon successful completion.
Why Serious Operators MUST Understand Surveillance Detection
Every successful terrorists attack, kidnap attempt, or criminal strike begins with identification and selection of a high profile, attack-susceptible target. Strike planning also includes, intelligence gathering and pre-attack planning by means of meticulous surveillance of the selected target. Your job as a security expert is to reduce or eliminate attack susceptibility. This can only be achieved through a knowledge of surveillance detection.
COURSE SYLLABUS CONTENT
Module 1: Defining; Surveillance & Surveillance Detection
Module 2: Hostile Surveillance Methodologies (Target Identification and Selection)
Module 3: Surveillance Techniques
Module 4: Routine Dynamics & Travel Pattern Analysis
Module 5: Common Attack Methodologies
Module 6: Attack Pattern Analysis & Forecast Indicators
Module 7: Surveillance Detection (SD) Operations
Module 8: Observation & Reporting
Module 9: Developing a SD Plan
Upon successful completion of training and skill assessment evaluation, the attendee will earn a Certificate of Proficiency in Surveillance Detection Operations.
- SURVEILLANCE PRACTICAL (2 hour lecture/discussion and a 6 hour practical exercise; 2 hour post exercise critique)
In preparation for training in surveillance detection, students will be familiarized with various surveillance techniques.- Methods of Surveillance:
- Vehicular and pedestrian foot surveillance
- Electronic surveillance: telephone, eaves-dropping, Internet
- Static observation and mobile surveillance techniques used by potential attackers, including terrorist organizations, who may be planning kidnapping or assassination attempts.
- A practical exercise is conducted that focuses on the conduct of surveillance and the attendant correlation of movement that will assist the student in recognizing common surveillance activity.
- Methods of Surveillance:
- SURVEILLANCE DETECTION OPERATIONS (3 hour lecture/discussion)
Phases of planning for a kidnapping or assassination attempt will be identified and discussed so that the student will understand the dynamics of how surveillance is used by the potential attacker to identify a potential target, plan and launch an attack information.- Factors pertaining to the identification of potential ambush sites will be identified and discussed. This will be followed by a discussion of how this information can be used by a surveillance detection team.
- Factors pertaining to correlation of movement, identification of surveillance operatives and selection of surveillance detection techniques will be identified and discussed. Factors pertaining to route and area reconnaissance, developing familiarity with the environment and choosing appropriate surveillance detection positions will be identified and discussed.
- Factors pertaining to conducting liaison and coordination with local law enforcement authorities will be identified and discussed.
- A decision making matrix will be presented and discussed that identifies the various courses of action available to individual executive protection agents suspecting that surveillance has been detected.
- Command and control techniques for a surveillance detection team will be identified and discussed.
- Factors pertaining to information gathering by surveillance detection agents and the correlation of that information will be identified and discussed.
- PENETRATION TESTING CASE STUDIES (1 hour lecture/discussion)
Surveillance can take more than one form. Penetration testing is sometimes conducted as a part of the terrorist planning cycle. Discussion centers on known instances of penetration testing being conducted so that the student can learn the analytical process involved in evaluating circumstantial evidence that penetration testing is being conducted and what to do about it.
- SURVEILLANCE DETECTION CASE STUDIES (5 hour lecture/discussion)
Case studies of known surveillance detection successes are briefed and examined. The student is familiarized with methodology and analytical skills necessary in attempting to determine how surveillance detection teams can be successful in their effort. - PRACTICAL EXERCISE PLANNING (1 hour planning session)
Operational guidance, briefings and preparation planning session to support an executive protection operation with surveillance detection efforts is conducted. Students will be briefed on the principal’s itinerary and will have opportunity to organize a surveillance detection effort in support of the protective operation.