Surveillance and Threat Detection book cover

Surveillance and Threat Detection

Prevention versus Mitigation

Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.

Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs.

Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, fixed site facility can be integrated into an overall security footprint for any organization.

Audience
Physical security practitioners, Security Managers and Directors, military personnel, Antiterrorism professionals, and  Counterterrorism professionals, both domestic and international, as well as Federal, State, and Local Law Enforcement leadership and management and college students studying in these fields.

Hardbound, 264 Pages

Published: January 2014

Imprint: Butterworth Heinemann

ISBN: 978-0-12-407780-5

Contents

  • Preface

    Section I: Introduction

    Chapter 1: Definitions

    Chapter 2 Scope

    Chapter 3 Use Case Assumptions

    Chapter 4 Executive Summary of the Surveillance and Threat Detection methodology

    Section 2: Overview and Understanding

    Chapter 5 Historical Overview of Surveillance, Counter surveillance, and Surveillance Detection

    Chapter 6 The Terrorist Attack Cycle

    Section 3: Case Studies

    Chapter 7 Criminals

    Chapter 8 Terrorists

    Section 4: Conducting Surveillance Detection

    Chapter 9 The Basics

    Section 5: Advanced Surveillance and Threat Detection Applications

    Chapter 10 Infusion of Surveillance Detection into current operations

    Chapter 11 Incorporation of video technology

    Chapter 12 Surveillance Detection Training

    Chapter 13 Surveillance Detection on the horizon

    Chapter 14 Surveillance Detection over the horizon

    Appendices

Advertisement

advert image