Circles of Security Circles of Security, as has been explained in a previous article, constitute one of the most important ideas in preventive security. This concept, which is most commonly applied to facilities and campuses, draws two general circles around the asset or property in question – the Inner Circle and the Outer Circle.… Read More The Inner & Outer Circle Relationship – Part 1: Access Control
One of the things that makes the security field so interesting is that it’s mostly about people. Security efforts (even if assisted by security systems) are usually directed at people, and largely executed by people for the protection of people. The most important assets are usually people, most of the highest risks we try… Read More Inductive Observation
One of the ironies of employing a high-level, customer service oriented Outer Circle preventive strategy (discussed in a previous article), is that – for non-hostile individuals – it’s very difficult to understand how and why it works. The strategy does such a good job of preventing hostile attacks, and does it so subtly and… Read More The Outer Circle – Perceptions and Misconceptions
In My last article, I explained why fundamental differences between facility security and executive protection should be reflected in surveillance detection training. In this article, I want to introduce a general strategy that can be specifically employed by facilities and campuses for detecting and mitigating hostile surveillance.
“Realistic” is a common word that often makes its way into the description of many security training courses. The presumption here is that the course in question will teach you about real-life problems and solutions, and will include exercises that mirror the reality of field operations. Surveillance Detection, being a relatively new field in the… Read More What Makes Training Realistic?
This is the second article in a two part series about mobile surveillance detection. My first article delved into mobile surveillance in order to explain the problem (hostile surveillance) that mobile surveillance detection is meant to detect. For those who haven’t done so, it might be best to start with my previous article first.… Read More Mobile Surveillance Detection
The following article is dedicated to mobile surveillance. The intention behind it is to explain how mobile surveillance generally works in order to later explain (in my next article) how mobile surveillance detection works. For this reason, the article isn’t meant to teach anyone how to conduct surveillance for the sake of conducting surveillance (articles… Read More Mobile Surveillance
An important question that often comes up in regards to surveillance detection is how to handle it when it comes to traveling. We all know that traveling raises various safety and security concerns (ones that should obviously be addressed), but what about high level hostile surveillance? Those of you who have been following my articles… Read More Surveillance Detection – Trips And Routines
This article is a follow-up to some of my earlier articles on the subject of surveillance and surveillance detection. For those of you who haven’t done so, it might be best to start with those earlier articles, since they explain more about the fundamentals of SD and covert operations. For those who have read… Read More Tips & Suggestions For Surveillance Detection Operators
Whenever you consider adding a layer of field intelligence to your preventative security efforts, it’s important to ask what goals you’re actually looking to achieve. This might sound like it goes without saying, but from my experience, as soon as terms like surveillance, surveillance detection and counter surveillance get thrown around, simple fundamentals like goals,… Read More Surveillance, Surveillance Detection And Counter Surveillance