Towards the end of every year, there’s a fantastic Close Protection Conference which is organized by the International Protective Security Board (IPSB). In the conference a couple of years ago, I was hugely honored to do a ‘Tac-Talk’ (think TED Talk, just for security professionals) about surveillance detection, and I thought it might be a good idea to put the central points I covered in writing.
Before I get into it, though, I wanted to give a big shout-out to the board members of the IPSB. I think it’s an extremely important organization—one that’s going to shape the future of the protective security industry. And to anyone who hasn’t yet signed up, consider this your personal invitation to do so. (Right away…)
The goal of this article (and the ‘Tac-Talk’ it was based on) is to touch on a few central points regarding surveillance detection and to spark people’s curiosity about it. I want to get you interested in SD so that you can then go and find out more about it: read up about it, talk to people about it and figure out how you can gain value from it.
Surveillance detection vs follow-up
At its core, Surveillance Detection is the attempt to provide a Yes/No answer to a Yes/No question—is hostile surveillance being conducted? People often assume that SD should do more than just answer that question since it doesn’t make sense to detect something like hostile surveillance and then not do anything about it. And though it’s true that you should definitely do something about hostile surveillance, whatever you end up doing is no longer part of your detection efforts. It’s going to be a follow-up step.
One of the more common follow-ups that gets conflated with SD is counter surveillance (CS). Counter surveillance (as I’ve explained in an earlier article) is when you turn the tables on a hostile surveillant that’s been detected; it’s when you go on the offensive and start surveilling them back, following them, collecting intel’ on them, etc.
It’s an easy enough conflation to make since the same operators can seamlessly flow from surveillance detection to counter surveillance (provided they’re trained on both), but there’s a very important line you’d be crossing; one that has operational and legal implications. SD is basically a defensive measure, one that falls in the preview of protective operations. But as soon as you go on the offensive with CS, you cross into the realm of investigations, which means you’ll need a Private Investigator license, and will be taking on new risks, liabilities and logistical requirements.
I’m not saying that counter surveillance (or any other follow-up step) should be avoided, I’m just saying that it should be understood as a follow-up step to SD, and executed correctly and responsibly.
The purpose of SD
The first thing to understand here is that hostile surveillance is not the primary threat we should be worried about. Our primary concern is an actual attack. But attacks don’t just come out of nowhere, they come as a result of hostile planning. And one of the most important parts in hostile planning—the one we have the best chance to detect—is hostile surveillance. This is because it might be the only part of the hostile planning process where someone has to actually show up. It’s the only part that necessitates physical presence in the area of the target. All the other parts could be conducted remotely (possibly even in a different country).
SD is therefore not an attempt to detect hostile surveillance for its own sake; it’s our attempt to detect hostile planning that can lead to an attack.
Field Protective intelligence
Surveillance detection more or less straddles the two realms of security and intelligence, which makes it a form of protective intelligence. But unlike most other types of protective intelligence that are collected remotely, SD is conducted in the field. This is why I view it as a form of Field Protective Intelligence. It’s not meant to replace physical protection, it’s there to augment it by adding an external intelligence layer around it.
Interestingly enough, SD can be employed by a physical protection program that sends operators out to take positions around it (from the inside, out); or it can be employed by a protective intelligence program that sends operators to the field, to be closer to the action (from the outside, in). I’ve actually done it both ways for corporate clients; in some cases reporting to the physical protection team, and in others, reporting to the protective intelligence center.
There’s no definite right or wrong way to do it. It just depends on the situation (and on client requirements), but I think field protective intelligence can provide a great way to bridge the gap between the physical protectors in the field and the protective intelligence analysts in the office.
The SD equation
The general way to detect hostile surveillance is to detect people who correlate to the target (discussed at length here and here). There are various ways someone can correlate to a target, be it by observing it, moving in conjunction with it, and more.
A good way to visualize the situation is as an equation, with the target on one side and the hostile surveillant on the other. The correlation is what connects the two sides. So if we have a correlation of observation (a surveillant observing the target), we can look at the surveillant’s line of sight as the correlation. If a surveillant is following a target, their deliberate movements in conjunction with those of the target can be seen as a correlation of movement. And in some cases, even with no movement or direct observation, the mere presence of a surveillant in the area of the target (for long enough periods of time) can be seen as a correlation. If the surveillant’s presence is then detected in multiple locations, with the common denominator to those locations being the presence of the target (principal), then this can be seen as a correlation over time and distance.
Be the “bad guy”
An important part of learning how to detect hostile surveillants is to first experience what it’s like to be a hostile surveillant yourself. Not just to learn about it—to actually experience what it’s like.
There are a number of reasons why you’ll gain value from this. First, by looking at your client from the outside—as a target—you can notice certain vulnerabilities that would not have otherwise occurred to you if you just view things from the inside out. If, when you do this, you want to also maintain covertness (as is usually the case), then you’ll have to look for good vantage points that will provide cover. These are important locations for SD operators to pay attention to, and you might not know where they are if you don’t first do your best to find them as a hostile surveillant.
Another important thing you learn from “being the bad guy” is a certain “X-Factor” about hostile surveillance—the difficult to describe feelings and psychological pressures that are involved in hostile surveillance, especially on a well-protected target. Hostile surveillance is way more stressful than most people realize, and these types of stresses tend to manifest themselves in various ways; even if just in nuanced ones. These could be nervous tics, shuffles, double-takes and various other idiosyncrasies that would not be apparent to those who have not gone through the relevant experience themselves. We want to experience these things in order to then be able to detect them in others. And while these might not be correlations to the target per se, if we see them in people who are occupying vantage points (that we now know about), we can pay more attention to them and raise our chances of spotting correlations to the target if they occur.
Where to look from?
Keeping the SD equation idea going, the ideal way to detect a correlation to the target is to observe both sides of the equation—simultaneously if possible. If you want to do this while remaining unseen by a surveillant, the areas you’ll want to occupy will be behind the surveillance vantage points (outside the surveillance “Red Zone” as we sometimes put it).
This takes some getting used to because it puts the SD operator at a weird angle for detecting a correlation (looking along the equation/correlation line rather than seeing it perpendicularly). It also involves much longer distances, and it necessitates that you let a potential hostile surveillant be closer to your client than you are (something that’s very difficult for protection-minded professionals to get used to). This is where you have to remind yourself that SD is not physical protection but rather a form of field protective intelligence. The value SD brings to the table is in the form of information; implementing the age old idea that Knowledge Is Power.
This article has hopefully clarified a few fundamental principles regarding SD, but I mostly hope it opened up more questions than it answered. If it has, Good! Now it’s your turn to go and find out more about it and figure out in what specific way you can gain value from surveillance detection.
Get my book, Surveillance Zone now!
Go behind the scenes of corporate surveillance detection & covert special operations. Get a first-person account of actual covert operations I’ve participated in. Learn the secrets of the trade and discover a hidden world that’s all around you.
6 thoughts on “Let’s Talk About Surveillance Detection”
Thank you for an excellent overview of the topic, including the need to carry out surveillance in order to be able to detect it.
Thank you for taking the time to prepare and share this follow up article to the central points you discussed at the IPSB conference last week – it is very much appreciated!! (as are all the articles you write and share with the rest of us.)
I attended your “tac-talk” at the conference, which was excellent – I just wish it had been longer….hopefully next time :).
Thank you, thank you, thank you for taking the time to clarify and educate the Protection community. I was unable to attend the IPSB Conference, but heard great things about your presentation. Far too many times in the Protection community, I see the incorrect use of the terms “surveillance”, “counter-surveillance” and “surveillance-detection” and even bigger lack of understanding the concepts. Thank you!
Thank you for reading and commenting, guys. It is much appreciated.
Ami, I enjoyed your “Tac Talk” at the Close Protection Conference and was happy to see this expanded article on the topic of SD. Thank you for your efforts and time, it is appreciated.
Exellent article Ami! Your ideas are taking the ” Art” of SD to the next level. Your book is the next on my reading list. I cant wait to crack open your book.