The Security Consultantâs Handbook by Richard Bingley
Author:Richard Bingley [Bingley, Richard]
Language: eng
Format: azw3
ISBN: 9781849287517
Publisher: IT Governance Publishing
Published: 2015-09-28T00:00:00+00:00
Case study
A surveillance operator was approached by two young adult males while driving past a taxi companyâs offices. The car being driven was a large saloon and resembled the taxis used in the area. The situation was such that it would have been unwise to offer them a lift, the operator therefore mimed that they werenât a taxi and continued on their way. Here the third party was not only the two males but also the locals who by the nature of the underlying threat took notice of what went on in their locality. The surveillance task was in a âroughâ estate and the local âneighbourhood watchâ was very effective at monitoring unusual activity too.
The case study illustrates an aspect of surveillance, that of third party awareness. Should the subject become aware of surveillance, the team (and it is unusual for a surveillance task to be conducted solely by an individual) may notice another aspect of surveillance â anti surveillance. Here it is necessary to distinguish the difference between two similar terms, counter surveillance and anti surveillance.
Although they would appear to mean the same, in surveillance terminology they have different applications.
Anti surveillance: is an action, or series of actions, carried out by the subject in order to detect or defeat surveillance being carried out against the subject. An aware subject (cognisant of surveillance and its methods) will carry out routine anti surveillance (AS) as a matter of course. An alert team will become aware of this and adapt their behaviour accordingly.
Counter surveillance: is the act of imposing surveillance, on behalf of the subject by a third party, against a person or persons suspected of monitoring the subject. In brief they are âwatching the watchersâ. Counter surveillance (CS) is an aspect of tradecraft that takes ability and skill, as the CS team will be working against âawareâ targets.
Covert surveillance: The subjects of a surveillance task are usually people. However, vehicles, places and objects can also be monitored. In the trade, the reason for surveillance can be boiled down to the following pattern of questions, known as the â5Ws and Howâ.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
What's Done in Darkness by Kayla Perrin(26274)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(18805)
Shot Through the Heart by Mercy Celeste(18686)
The Fifty Shades Trilogy & Grey by E L James(18578)
The Subtle Art of Not Giving a F*ck by Mark Manson(13900)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(13841)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(12768)
Scorched Earth by Nick Kyme(12509)
Drei Generationen auf dem Jakobsweg by Stein Pia(10738)
Suna by Ziefle Pia(10671)
Scythe by Neal Shusterman(10020)
International Relations from the Global South; Worlds of Difference; First Edition by Arlene B. Tickner & Karen Smith(9281)
Successful Proposal Strategies for Small Businesses: Using Knowledge Management ot Win Govenment, Private Sector, and International Contracts 3rd Edition by Robert Frey(9096)
This is Going to Hurt by Adam Kay(8727)
Dirty Filthy Fix: A Fixed Trilogy Novella by Laurelin Paige(7342)
How to Make Love to a Negro Without Getting Tired by Dany LaFerrière(6748)
He Loves Me...KNOT by RC Boldt(6630)
Unleashing the Power of UX Analytics: Proven techniques and strategies for uncovering user insights [Team-IRA] [True PDF] by Jeff Hendrickson(6300)
Interdimensional Brothel by F4U(6086)
