SlideShare a Scribd company logo
Minimizing Kidnap Risk
Hostile surveillance detection is one of the few security techniques that preempts danger. As the
name suggests it is the art of identifying an individual or group that is attempting to obtain
intelligence by placing your client under surveillance. Its main advantage as a security tool is that
it is proactive rather than reactive.
The global kidnap industry is booming and no longer is the focus predominantly on Latin America.
It is prevalent throughout the world and for a successful kidnap, hostiles will normally conduct
some degree of pre-attack intelligence gathering. The early and covert identification of this
intelligence gathering by security teams can significantly minimize the risk of kidnap.
To provide security transport services it is imperative that security teams and the ‘at-risk’
individuals themselves learn how to identify the signs that may precede an attack. By identifying
a threat early, and proactively working in unison to increase awareness, the risk of a successful
kidnap is drastically reduced. The preemptive action and early identification of possible hostile
intent allow a security team to remove the client from danger or deter and disrupt the potential
attackers.
SWOT Analysis
By identifying a target’s strengths and weaknesses, the hostiles will then be able to identify their
own Opportunities and Threats. This intelligence-gathering model will help them answer the
following questions:
1. Can we kidnap our target?
2. How can we kidnap our target?
3. When could we kidnap our target?
4. Should we kidnap this target?
Point four identifies that the hostiles may want to carry out the kidnap but realize that it is a hard
target and therefore not worth the risk, OR as can be seen in the case study below, they may just
adapt their attack and exploit the weaknesses they have identified.
In March 1978, Former Italian Prime Minister Aldo Moro was being driven to work in a two-car
motorcade in Rome, accompanied by five bodyguards. His Motorcade was ambushed and eleven
members of the Red Brigade terrorist group ambushed him.
As the motorcade approached a stop sign a car pulled in front and stopped suddenly. Moro’s car
was following too close and struck the car, then Moro’s follow vehicle, also traveling too close,
rammed into Moro’s car pinning his vehicle with no chance of immediate escape.
Two men got out of the blocking vehicle and shot with pistols through the front side windows of
Moro’s car killing his driver and bodyguard. Concurrently, a second attack element consisting of
four men dressed in Air Italia uniforms that were stood on the pavement as if waiting for a bus
pulled weapons from their flight bags and proceeded to fire at the remaining bodyguards.
A third attack element of two terrorists jumped out from behind bushes (possibly within a car)
and pulled Moro from the car and put him into a waiting vehicle. The terrorists then escaped with
preplanned and strategically positioned vehicles.
The whole operation lasted no more than 30 seconds, involved eleven terrorists who fired
between 80 and 90 rounds and killed five bodyguards. Yet the build-up and preparation were far
more detailed and time-consuming.
Through prolonged covert surveillance and potentially a mix of human intelligence sources the
terrorists had identified the strengths and weaknesses of Moro and his security team and utilized
these to focus on the opportunities and threats.
The terrorists identified a pattern of life and common route that Moro and his team used. They
had also noted that the drivers of both his motorcade drove too close to each other and tailgated
other vehicles and the Red Brigade planned to exploit that. They also noted that many airline
personnel lived in the area of attack so adopted the air uniforms for cover.
The terrorists did several other things that would have been gained through intelligence
gathering operations. They slashed the tires of the flower vendor whose normal place of work
was near the attack site, telephone lines were overloaded during the attack and vehicles were
positioned for a getaway.
There are many conspiracy theories surrounding his capture and detention, whatever the true
story, fifty-five days after his abduction Aldo Moro was found shot to death in the trunk of a car
in Central Rome.
It is interesting to note that according to later terrorist declarations, in the months before the
kidnapping they had instead envisaged the possibility of kidnapping another leader, Giulio
Andreotti. This was abandoned once they deemed that Andreotti’s police protection was too
strong.
Sourced from: Just2Seconds: Using Time And Space To Defeat Assassins. 2008, Gavin De Becker,
Tom Taylor and Jeff Marquart.
This case study identifies how focused surveillance can be utilized to identify and exploit
weaknesses and enable efficient and successful attack planning, even against a defended ‘hard’
target such as a Former Italian Prime Minister.
Capability and Limitations
The quality and type of hostile surveillance can vary greatly, it may be quick and basic
observations by untrained and opportunistic gangs looking for the best time to strike, or it could
be professional, criminal organizations carrying out effective and focused intelligence gathering
prior to a kidnap or assault.
There are of course a number of potential limitations to a hostile surveillance team, these will
affect the quality and capability of the surveillance. Examples of limitations are:
 Training
 Capability
 Resources – Human and Technical
 Finances
 Environment
Scoping for Opportunity
Why would kidnappers put a person or group under surveillance prior to an attack? What would
the hostile surveillance teams be trying to achieve? Business executives when planning strategy
utilizes the SWOT analysis model. This same model can be engineered to help identify what
hostile individuals or groups will be looking for.
Intelligence Gathering
Just as the Red Brigade terrorist group did in the case study, hostiles will be trying to gather as
much intelligence services on the target’s pattern of life as possible, asking themselves the
following questions and many more:
 Is there security, are they aware, are they armed, are they any good?
 How do they travel and by what means? Do they drive, what do they drive, is it armored?
 Do they have good travel security in place?
 What routes do they take to work, events, school? Do they vary routes? Are they forced
to take the same routes?
 Do they have a family, is there family an easier target?
 Are they creatures of habit? Is there a pattern forming? If so what is the pattern? What
are the weaknesses?
 Do they have employees, can we use them, can they provide us information, can we
corrupt them?
The hostiles, however, must have the capability to gather this information, it cannot just be
plucked from the air. Where intelligence gathering and surveillance operations come into play,
there are always limitations.
All the above factors will determine how capable a group is of carrying out effective and covert
surveillance without detection, whilst still obtaining all the necessary information.
Many terrorist and criminal organizations may not have the technical and practical expertise to
carry out a high level of surveillance that is required to defeat good anti and counter surveillance
procedure. They may only have one or two people with limited skills and resources to observe
their target compared to the ten or twenty that a government team has available.
Numbers do not necessarily mean results though, a team of three well-trained surveillance
operatives with time and resources would be able to glean a surprising amount of intelligence,
perhaps even within a few days. Specifically, when dealing with high-risk clients it must always
be taken into account that a hostile group may in-fact have a good capability and a small
professional team with time, patience and resources.
The large range of limiting factors will, however, normally provide the security transportation
team a much greater chance of identifying hostile surveillance, but two major factors must be
taken into consideration. The first is that terrorist and criminal organizations normally have time
and dedication on their side. They can pop in and pop out, they can choose their times and
methods, they can also utilize human sources and agents. All the time slowly building up their
intelligence picture. The second and most important to acknowledge and understand though is
that accurately and covertly identifying surveillance is far from easy.
Skills and Drills
There are two factors that must be taken into account when dealing with hostile surveillance
detection:
1. The skills, experience, knowledge, and resources of the person or group carrying out the
hostile surveillance.
BUT ALSO…
2. The skills, experience, knowledge, and resources of the person or group carrying out the
anti and counter-surveillance.
If there is a major gap between either of these then one side will falter.
Whilst attempting to identify hostile surveillance it is important that tactics are undertaken to a
high standard, but also covertly. This is just one of the reasons why intensive training and
specialist counter-surveillance teams should always be considered, especially for high-risk
clientele.
Whatever the level of hostile surveillance being conducted, whether it be rudimentary or highly
professional it is important that hostile surveillance does not realize that anti and counter-
surveillance measures are in place and being utilized. There are two main reasons:
 If hostile surveillance is unaware of the counter-measures in place they are far more likely
to make a mistake, use sloppy tradecraft or become complacent and therefore be
identified easier and quicker.
 If hostile surveillance becomes aware that they have been spotted it can lead to a number
of possible actions including, impulsive behavior and an increased risk of action or attack.
But, and this is more likely, they may just take a step back to then take two steps forward
in the future, with better skills and resources. As we mentioned dedicated and
professional teams will spot poor anti and counter surveillance early, they will drop out
and only come back when they feel it is safe to do so.
It is clear that a hostile surveillance detection is a vital tool in trying to minimize the risk of kidnap.
Those that wish harm on others, especially professional and dedicated terrorist or criminal
organizations will strive to gather intelligence on their targets. With this intelligence, they will
look to exploit the weaknesses of a target and turn these into opportunities for a successful
attack.
Remember, if there is a gap between the skills, experience, knowledge, and resources of the
hostile surveillance team and those of the security team for investigations, one side will falter.
Social Profiles
Facebook| Twitter| Linkedin| YouTube
Email:-
info@ets-riskmanagement.com

More Related Content

Similar to Enhancing Personal Security through Surveillance Detection Techniques

An Underground education
An Underground educationAn Underground education
An Underground education
grugq
 
Jason Anthony Smith - thesis short summary v1.0
Jason Anthony Smith - thesis short summary v1.0Jason Anthony Smith - thesis short summary v1.0
Jason Anthony Smith - thesis short summary v1.0
Jason Smith
 
The evolution of terrorism after paris
The evolution of terrorism after parisThe evolution of terrorism after paris
The evolution of terrorism after paris
Graeme Cross
 
A Counterintelligence Analysis Typology
A Counterintelligence Analysis TypologyA Counterintelligence Analysis Typology
A Counterintelligence Analysis Typology
Sara Alvarez
 
Clean CT Class - Copy
Clean CT Class - CopyClean CT Class - Copy
Clean CT Class - Copy
Mark Leslie
 
Cyberwarfare
CyberwarfareCyberwarfare
Coolest careers in Cyber Security
Coolest careers in Cyber SecurityCoolest careers in Cyber Security
Coolest careers in Cyber Security
JasminaKadi1
 
Kenya AMC Presentation 2
Kenya AMC Presentation 2Kenya AMC Presentation 2
Kenya AMC Presentation 2
Felix Maromo, CFE, CPFA, MSc
 
APT Research Project.pptx
APT Research Project.pptxAPT Research Project.pptx
APT Research Project.pptx
UsamaAliLone3
 
Red Team vs. Blue Team
Red Team vs. Blue TeamRed Team vs. Blue Team
Red Team vs. Blue Team
EC-Council
 
Mass transit security awareness white paper
Mass transit security awareness white paperMass transit security awareness white paper
Mass transit security awareness white paper
zcelik
 
The Library of Sparta
The Library of SpartaThe Library of Sparta
The Library of Sparta
Lancope, Inc.
 
ASIS NYC InT Presentation
ASIS NYC InT PresentationASIS NYC InT Presentation
ASIS NYC InT Presentation
Daniel McGarvey
 
UNVEILING THE THREAT ACTOR FOR CYBERSECURITY ASSIGNMENT.pptx
UNVEILING THE THREAT ACTOR FOR CYBERSECURITY ASSIGNMENT.pptxUNVEILING THE THREAT ACTOR FOR CYBERSECURITY ASSIGNMENT.pptx
UNVEILING THE THREAT ACTOR FOR CYBERSECURITY ASSIGNMENT.pptx
chrisdeming24
 
Threat Hunters
Threat HuntersThreat Hunters
Threat Hunters
infosec train
 
403 9
403 9403 9
IS2 - Adamec
IS2 - AdamecIS2 - Adamec
IS2 - Adamec
Zdenek Adamec
 
The United States Central Intelligence Agency, FBI, and National Sec.pdf
The United States Central Intelligence Agency, FBI, and National Sec.pdfThe United States Central Intelligence Agency, FBI, and National Sec.pdf
The United States Central Intelligence Agency, FBI, and National Sec.pdf
isenbergwarne4100
 
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxOutsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
manas23pgdm157
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision Makers
Deborah Osborne
 

Similar to Enhancing Personal Security through Surveillance Detection Techniques (20)

An Underground education
An Underground educationAn Underground education
An Underground education
 
Jason Anthony Smith - thesis short summary v1.0
Jason Anthony Smith - thesis short summary v1.0Jason Anthony Smith - thesis short summary v1.0
Jason Anthony Smith - thesis short summary v1.0
 
The evolution of terrorism after paris
The evolution of terrorism after parisThe evolution of terrorism after paris
The evolution of terrorism after paris
 
A Counterintelligence Analysis Typology
A Counterintelligence Analysis TypologyA Counterintelligence Analysis Typology
A Counterintelligence Analysis Typology
 
Clean CT Class - Copy
Clean CT Class - CopyClean CT Class - Copy
Clean CT Class - Copy
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Coolest careers in Cyber Security
Coolest careers in Cyber SecurityCoolest careers in Cyber Security
Coolest careers in Cyber Security
 
Kenya AMC Presentation 2
Kenya AMC Presentation 2Kenya AMC Presentation 2
Kenya AMC Presentation 2
 
APT Research Project.pptx
APT Research Project.pptxAPT Research Project.pptx
APT Research Project.pptx
 
Red Team vs. Blue Team
Red Team vs. Blue TeamRed Team vs. Blue Team
Red Team vs. Blue Team
 
Mass transit security awareness white paper
Mass transit security awareness white paperMass transit security awareness white paper
Mass transit security awareness white paper
 
The Library of Sparta
The Library of SpartaThe Library of Sparta
The Library of Sparta
 
ASIS NYC InT Presentation
ASIS NYC InT PresentationASIS NYC InT Presentation
ASIS NYC InT Presentation
 
UNVEILING THE THREAT ACTOR FOR CYBERSECURITY ASSIGNMENT.pptx
UNVEILING THE THREAT ACTOR FOR CYBERSECURITY ASSIGNMENT.pptxUNVEILING THE THREAT ACTOR FOR CYBERSECURITY ASSIGNMENT.pptx
UNVEILING THE THREAT ACTOR FOR CYBERSECURITY ASSIGNMENT.pptx
 
Threat Hunters
Threat HuntersThreat Hunters
Threat Hunters
 
403 9
403 9403 9
403 9
 
IS2 - Adamec
IS2 - AdamecIS2 - Adamec
IS2 - Adamec
 
The United States Central Intelligence Agency, FBI, and National Sec.pdf
The United States Central Intelligence Agency, FBI, and National Sec.pdfThe United States Central Intelligence Agency, FBI, and National Sec.pdf
The United States Central Intelligence Agency, FBI, and National Sec.pdf
 
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxOutsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
 
Intelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision MakersIntelligence Led Policing for Police Decision Makers
Intelligence Led Policing for Police Decision Makers
 

Recently uploaded

Bilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar - Resume 2024 - Digital MarketingBilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar
 
Solar powered Security Camera- Sun In One
Solar powered Security Camera- Sun In OneSolar powered Security Camera- Sun In One
Solar powered Security Camera- Sun In One
John McHale
 
Material Testing Lab Services in Dubai.pptx
Material Testing Lab Services in Dubai.pptxMaterial Testing Lab Services in Dubai.pptx
Material Testing Lab Services in Dubai.pptx
sandeepmetsuae
 
Top 10 Proven Ways for Optimizing a WordPress Website for SEO.pptx
Top 10 Proven Ways for Optimizing a WordPress Website for SEO.pptxTop 10 Proven Ways for Optimizing a WordPress Website for SEO.pptx
Top 10 Proven Ways for Optimizing a WordPress Website for SEO.pptx
e-Definers Technology
 
Generate Revenue with Contact Center Business Model Strategy
Generate Revenue with Contact Center Business Model StrategyGenerate Revenue with Contact Center Business Model Strategy
Generate Revenue with Contact Center Business Model Strategy
RNayak3
 
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptxBiomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
ECOSTAN Biofuel Pvt Ltd
 
How Do Love Spells Really Work? The Secret to Get Your Ex Back Fast, Powerful...
How Do Love Spells Really Work? The Secret to Get Your Ex Back Fast, Powerful...How Do Love Spells Really Work? The Secret to Get Your Ex Back Fast, Powerful...
How Do Love Spells Really Work? The Secret to Get Your Ex Back Fast, Powerful...
Traditional Healer, Love Spells Caster and Money Spells That Work Fast
 
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
Alexa Bale
 
Siddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TXSiddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TX
gaurisiddhivinayakte
 
Material Testing Lab Services in Dubai.pdf
Material Testing Lab Services in Dubai.pdfMaterial Testing Lab Services in Dubai.pdf
Material Testing Lab Services in Dubai.pdf
sandeepmetsuae
 
DOJO Training room | Training DOJO PPT
DOJO Training room | Training DOJO   PPTDOJO Training room | Training DOJO   PPT
DOJO Training room | Training DOJO PPT
Himanshu
 
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdfThe best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
tonytkelly6
 
Understanding Love Compatibility or Synastry: Why It Matters
Understanding Love Compatibility or Synastry: Why It MattersUnderstanding Love Compatibility or Synastry: Why It Matters
Understanding Love Compatibility or Synastry: Why It Matters
AstroForYou
 
Best Immigration Consultants in Amritsar- SAGA Studies
Best Immigration Consultants in Amritsar- SAGA StudiesBest Immigration Consultants in Amritsar- SAGA Studies
Best Immigration Consultants in Amritsar- SAGA Studies
SAGA Studies
 
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report –  What the Certified Fraud Examiner Should KnowThe Fraud Examiner’s Report –  What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Electrical Testing Lab Services in Dubai.pdf
Electrical Testing Lab Services in Dubai.pdfElectrical Testing Lab Services in Dubai.pdf
Electrical Testing Lab Services in Dubai.pdf
sandeepmetsuae
 
Exceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in MelbourneExceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in Melbourne
Outdoor Home Decor Company
 
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptxTop Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Merchantech - Payment Processing Services
 
Enhance Your Home with Professional Painting Services
Enhance Your Home with Professional Painting ServicesEnhance Your Home with Professional Painting Services
Enhance Your Home with Professional Painting Services
Perfect Industrial
 
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptxTop 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
e-Definers Technology
 

Recently uploaded (20)

Bilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar - Resume 2024 - Digital MarketingBilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar - Resume 2024 - Digital Marketing
 
Solar powered Security Camera- Sun In One
Solar powered Security Camera- Sun In OneSolar powered Security Camera- Sun In One
Solar powered Security Camera- Sun In One
 
Material Testing Lab Services in Dubai.pptx
Material Testing Lab Services in Dubai.pptxMaterial Testing Lab Services in Dubai.pptx
Material Testing Lab Services in Dubai.pptx
 
Top 10 Proven Ways for Optimizing a WordPress Website for SEO.pptx
Top 10 Proven Ways for Optimizing a WordPress Website for SEO.pptxTop 10 Proven Ways for Optimizing a WordPress Website for SEO.pptx
Top 10 Proven Ways for Optimizing a WordPress Website for SEO.pptx
 
Generate Revenue with Contact Center Business Model Strategy
Generate Revenue with Contact Center Business Model StrategyGenerate Revenue with Contact Center Business Model Strategy
Generate Revenue with Contact Center Business Model Strategy
 
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptxBiomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
Biomass Briquettes A Sustainable Solution for Energy and Waste Management..pptx
 
How Do Love Spells Really Work? The Secret to Get Your Ex Back Fast, Powerful...
How Do Love Spells Really Work? The Secret to Get Your Ex Back Fast, Powerful...How Do Love Spells Really Work? The Secret to Get Your Ex Back Fast, Powerful...
How Do Love Spells Really Work? The Secret to Get Your Ex Back Fast, Powerful...
 
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
How Long Does Vinyl Siding Last and What Impacts Its Life Expectancy?
 
Siddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TXSiddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TX
 
Material Testing Lab Services in Dubai.pdf
Material Testing Lab Services in Dubai.pdfMaterial Testing Lab Services in Dubai.pdf
Material Testing Lab Services in Dubai.pdf
 
DOJO Training room | Training DOJO PPT
DOJO Training room | Training DOJO   PPTDOJO Training room | Training DOJO   PPT
DOJO Training room | Training DOJO PPT
 
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdfThe best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
 
Understanding Love Compatibility or Synastry: Why It Matters
Understanding Love Compatibility or Synastry: Why It MattersUnderstanding Love Compatibility or Synastry: Why It Matters
Understanding Love Compatibility or Synastry: Why It Matters
 
Best Immigration Consultants in Amritsar- SAGA Studies
Best Immigration Consultants in Amritsar- SAGA StudiesBest Immigration Consultants in Amritsar- SAGA Studies
Best Immigration Consultants in Amritsar- SAGA Studies
 
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report –  What the Certified Fraud Examiner Should KnowThe Fraud Examiner’s Report –  What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
 
Electrical Testing Lab Services in Dubai.pdf
Electrical Testing Lab Services in Dubai.pdfElectrical Testing Lab Services in Dubai.pdf
Electrical Testing Lab Services in Dubai.pdf
 
Exceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in MelbourneExceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in Melbourne
 
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptxTop Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
 
Enhance Your Home with Professional Painting Services
Enhance Your Home with Professional Painting ServicesEnhance Your Home with Professional Painting Services
Enhance Your Home with Professional Painting Services
 
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptxTop 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
 

Enhancing Personal Security through Surveillance Detection Techniques

  • 1. Minimizing Kidnap Risk Hostile surveillance detection is one of the few security techniques that preempts danger. As the name suggests it is the art of identifying an individual or group that is attempting to obtain intelligence by placing your client under surveillance. Its main advantage as a security tool is that it is proactive rather than reactive. The global kidnap industry is booming and no longer is the focus predominantly on Latin America. It is prevalent throughout the world and for a successful kidnap, hostiles will normally conduct some degree of pre-attack intelligence gathering. The early and covert identification of this intelligence gathering by security teams can significantly minimize the risk of kidnap. To provide security transport services it is imperative that security teams and the ‘at-risk’ individuals themselves learn how to identify the signs that may precede an attack. By identifying a threat early, and proactively working in unison to increase awareness, the risk of a successful kidnap is drastically reduced. The preemptive action and early identification of possible hostile intent allow a security team to remove the client from danger or deter and disrupt the potential attackers.
  • 2. SWOT Analysis By identifying a target’s strengths and weaknesses, the hostiles will then be able to identify their own Opportunities and Threats. This intelligence-gathering model will help them answer the following questions: 1. Can we kidnap our target? 2. How can we kidnap our target? 3. When could we kidnap our target? 4. Should we kidnap this target? Point four identifies that the hostiles may want to carry out the kidnap but realize that it is a hard target and therefore not worth the risk, OR as can be seen in the case study below, they may just adapt their attack and exploit the weaknesses they have identified. In March 1978, Former Italian Prime Minister Aldo Moro was being driven to work in a two-car motorcade in Rome, accompanied by five bodyguards. His Motorcade was ambushed and eleven members of the Red Brigade terrorist group ambushed him.
  • 3. As the motorcade approached a stop sign a car pulled in front and stopped suddenly. Moro’s car was following too close and struck the car, then Moro’s follow vehicle, also traveling too close, rammed into Moro’s car pinning his vehicle with no chance of immediate escape. Two men got out of the blocking vehicle and shot with pistols through the front side windows of Moro’s car killing his driver and bodyguard. Concurrently, a second attack element consisting of four men dressed in Air Italia uniforms that were stood on the pavement as if waiting for a bus pulled weapons from their flight bags and proceeded to fire at the remaining bodyguards. A third attack element of two terrorists jumped out from behind bushes (possibly within a car) and pulled Moro from the car and put him into a waiting vehicle. The terrorists then escaped with preplanned and strategically positioned vehicles. The whole operation lasted no more than 30 seconds, involved eleven terrorists who fired between 80 and 90 rounds and killed five bodyguards. Yet the build-up and preparation were far more detailed and time-consuming. Through prolonged covert surveillance and potentially a mix of human intelligence sources the terrorists had identified the strengths and weaknesses of Moro and his security team and utilized these to focus on the opportunities and threats. The terrorists identified a pattern of life and common route that Moro and his team used. They had also noted that the drivers of both his motorcade drove too close to each other and tailgated other vehicles and the Red Brigade planned to exploit that. They also noted that many airline personnel lived in the area of attack so adopted the air uniforms for cover.
  • 4. The terrorists did several other things that would have been gained through intelligence gathering operations. They slashed the tires of the flower vendor whose normal place of work was near the attack site, telephone lines were overloaded during the attack and vehicles were positioned for a getaway. There are many conspiracy theories surrounding his capture and detention, whatever the true story, fifty-five days after his abduction Aldo Moro was found shot to death in the trunk of a car in Central Rome. It is interesting to note that according to later terrorist declarations, in the months before the kidnapping they had instead envisaged the possibility of kidnapping another leader, Giulio Andreotti. This was abandoned once they deemed that Andreotti’s police protection was too strong. Sourced from: Just2Seconds: Using Time And Space To Defeat Assassins. 2008, Gavin De Becker, Tom Taylor and Jeff Marquart. This case study identifies how focused surveillance can be utilized to identify and exploit weaknesses and enable efficient and successful attack planning, even against a defended ‘hard’ target such as a Former Italian Prime Minister.
  • 5. Capability and Limitations The quality and type of hostile surveillance can vary greatly, it may be quick and basic observations by untrained and opportunistic gangs looking for the best time to strike, or it could be professional, criminal organizations carrying out effective and focused intelligence gathering prior to a kidnap or assault. There are of course a number of potential limitations to a hostile surveillance team, these will affect the quality and capability of the surveillance. Examples of limitations are:  Training  Capability  Resources – Human and Technical  Finances  Environment Scoping for Opportunity Why would kidnappers put a person or group under surveillance prior to an attack? What would the hostile surveillance teams be trying to achieve? Business executives when planning strategy utilizes the SWOT analysis model. This same model can be engineered to help identify what hostile individuals or groups will be looking for. Intelligence Gathering Just as the Red Brigade terrorist group did in the case study, hostiles will be trying to gather as much intelligence services on the target’s pattern of life as possible, asking themselves the following questions and many more:  Is there security, are they aware, are they armed, are they any good?  How do they travel and by what means? Do they drive, what do they drive, is it armored?  Do they have good travel security in place?  What routes do they take to work, events, school? Do they vary routes? Are they forced to take the same routes?  Do they have a family, is there family an easier target?  Are they creatures of habit? Is there a pattern forming? If so what is the pattern? What are the weaknesses?  Do they have employees, can we use them, can they provide us information, can we corrupt them? The hostiles, however, must have the capability to gather this information, it cannot just be plucked from the air. Where intelligence gathering and surveillance operations come into play, there are always limitations. All the above factors will determine how capable a group is of carrying out effective and covert surveillance without detection, whilst still obtaining all the necessary information.
  • 6. Many terrorist and criminal organizations may not have the technical and practical expertise to carry out a high level of surveillance that is required to defeat good anti and counter surveillance procedure. They may only have one or two people with limited skills and resources to observe their target compared to the ten or twenty that a government team has available. Numbers do not necessarily mean results though, a team of three well-trained surveillance operatives with time and resources would be able to glean a surprising amount of intelligence, perhaps even within a few days. Specifically, when dealing with high-risk clients it must always be taken into account that a hostile group may in-fact have a good capability and a small professional team with time, patience and resources. The large range of limiting factors will, however, normally provide the security transportation team a much greater chance of identifying hostile surveillance, but two major factors must be taken into consideration. The first is that terrorist and criminal organizations normally have time and dedication on their side. They can pop in and pop out, they can choose their times and methods, they can also utilize human sources and agents. All the time slowly building up their intelligence picture. The second and most important to acknowledge and understand though is that accurately and covertly identifying surveillance is far from easy. Skills and Drills There are two factors that must be taken into account when dealing with hostile surveillance detection: 1. The skills, experience, knowledge, and resources of the person or group carrying out the hostile surveillance. BUT ALSO… 2. The skills, experience, knowledge, and resources of the person or group carrying out the anti and counter-surveillance. If there is a major gap between either of these then one side will falter. Whilst attempting to identify hostile surveillance it is important that tactics are undertaken to a high standard, but also covertly. This is just one of the reasons why intensive training and specialist counter-surveillance teams should always be considered, especially for high-risk clientele. Whatever the level of hostile surveillance being conducted, whether it be rudimentary or highly professional it is important that hostile surveillance does not realize that anti and counter- surveillance measures are in place and being utilized. There are two main reasons:  If hostile surveillance is unaware of the counter-measures in place they are far more likely to make a mistake, use sloppy tradecraft or become complacent and therefore be identified easier and quicker.
  • 7.  If hostile surveillance becomes aware that they have been spotted it can lead to a number of possible actions including, impulsive behavior and an increased risk of action or attack. But, and this is more likely, they may just take a step back to then take two steps forward in the future, with better skills and resources. As we mentioned dedicated and professional teams will spot poor anti and counter surveillance early, they will drop out and only come back when they feel it is safe to do so. It is clear that a hostile surveillance detection is a vital tool in trying to minimize the risk of kidnap. Those that wish harm on others, especially professional and dedicated terrorist or criminal organizations will strive to gather intelligence on their targets. With this intelligence, they will look to exploit the weaknesses of a target and turn these into opportunities for a successful attack. Remember, if there is a gap between the skills, experience, knowledge, and resources of the hostile surveillance team and those of the security team for investigations, one side will falter. Social Profiles Facebook| Twitter| Linkedin| YouTube Email:- info@ets-riskmanagement.com