ITS Tactical

PSD Concepts: How to Detect Surveillance and Counter

Surveillance Main
2 of 4 in the series PSD Concepts

There are  many types of  surveillance detection  and today we’ll be continuing to apply concepts and tactics used by Personal Security Detail (PSD) teams, with ways to detect  static and mobile surveillance along your routes.

In our last article  about Route Surveys we focused on going from home to work and we’ll be doing the same in this article.

I’m sure everyone wants to dive right into how you can ditch a “tail” and other counter surveillance techniques, but before you can do that you have to have a understanding how the surveillance process works.

What is Surveillance?

One definition I like is “The secret, continuous, periodic watching of persons, vehicles, places or objects to obtain information concerning the activities and identities of individuals.” It’s all about information gathering.

As I stated in the first article, you probably  won’t to have to worry about a well organized group of terrorists following you from home to work, but even common burglars use basic surveillance methods  to figure out when the best time to break into a residence is.

When we talk about terrorists or other  organized criminals, they use a planning process that assures their success. If you are attacked they have already assessed your physical  security and  routines. Surveillance detection  is using countermeasures to deny them information during the selecting and collecting phases. You also want to appear as a hard target, so they move on to someone else.

There is a common sequence of events that takes place during surveillance:

  1. Attackers  select a potential victim and begin collecting information.
  2. Surveillance continues as the attack is planned and practiced.
  3. Attackers deploy according to the information received.

Surveillance is also used to confirm your arrival immediately prior to an attack. Once the attack has begun the attackers have a huge advantage. They have set the time and place that you are the most vulnerable and most exposed. The key to  beating them is to identify and exploit their information gathering process (the surveillance itself)  and hopefully end the attack before it begins. Make them move on to the easy target or make them realize they are going to have a fight on their hands. I know I keep saying “make them move on to someone else”, but that is exactly what you want to have happen.

Surveillance may take weeks, months, or even years. During the collection phase attackers are vulnerable to detection. This is also where you can use misinformation to confuse  and delay their information gathering.

The duration of  the surveillance is a major factor and shows why it’s difficult to detect the common burglar or crime of opportunity. Their surveillance is normally just hours and  they may not be open to detection over that short  period of time. This is where being a hard target comes into play.

Detection Techniques

Your driveway

The take-away

En route

The arrival

So what does all of this accomplish? If you can deny information gathering and show yourself as a hard target you will force the attackers to make a couple of choices.

Wrap-up

The take home message from this article is that if you suspect surveillance you should alter your route and times to avoid a possible attack. This will cause unpredictability and confuse the attackers. You should also take notes of suspicious activity, vehicles and persons. This will let you put the pieces of the puzzle together and confirm your suspicions.

If warranted contact the police and report the suspicious activities. You may just catch that burglar during his surveillance  after all!

I would highly recommend taking a class on how to conduct  surveillance from a reputable source such as SCG International. This will help you immensely and only through truly understanding how surveillance works can you learn how to counter it.

When Bryan and I discussed writing this series of articles I had to think carefully about  what information I was going to put out, as I want this information to be used to keep you and your family safe and have it become an important part of your overall security plan. That is the intent of these articles and discussing ways to keep you safe is the foundation of ITS Tactical.

That being said, there are plenty of places on the Internet where you can find information on how to conduct surveillance and surveillance detection. “Bad guys” have a  lot of resources and I don’t feel writing these articles will help them any more than they can already help themselves.

Stay tuned for our next article on attack recognition and post up any questions in the comments below.

Exit mobile version