I recently got a chance to talk with Alex Fox on The Capable Civilian podcast. Our conversation covered a whole range of topics, including (at the very end) an unofficial announcement about the book I’ve been working on, which I hope will be out in early 2017. Get my new book, Surveillance Zone now! Go… Read More The Capable Civilian Podcast
Probably the only thing Munich got right about real-world covert operations – the boring necessities of receipts and expense statements…
Circles of Security Circles of Security, as has been explained in a previous article, constitute one of the most important ideas in preventive security.This concept, which is most commonly applied to facilities and campuses, draws two general circles around the asset or property in question – the Inner Circle and the Outer Circle. The Inner… Read More The Inner & Outer Circle Relationship – Part 1: Access Control
One of the things that makes the security field so interesting is that it’s mostly about people. Security efforts (even if assisted by security systems) are usually directed at people, and largely executed by people for the protection of people. The most important assets are usually people, most of the highest risks we try to… Read More Inductive Observation
One of the ironies of employing a high-level, customer service oriented Outer Circle preventive strategy (discussed in a previous article), is that – for non-hostile individuals – it’s very difficult to understand how and why it works. The strategy does such a good job of preventing hostile attacks, and does it so subtly and unobtrusively,… Read More The Outer Circle – Perceptions and Misconceptions
In My last article, I explained why fundamental differences between facility security and executive protection should be reflected in surveillance detection training. In this article, I want to introduce a general strategy that can be specifically employed by facilities and campuses for detecting and mitigating hostile surveillance.
“Realistic” is a common word that often makes its way into the description of many security training courses. The presumption here is that the course in question will teach you about real-life problems and solutions, and will include exercises that mirror the reality of field operations. Surveillance Detection, being a relatively new field in the… Read More What Makes Training Realistic?
This is the second article in a two part series about mobile surveillance detection. My first article delved into mobile surveillance in order to explain the problem (hostile surveillance) that mobile surveillance detection is meant to detect. For those who haven’t done so, it might be best to start with my previous article first.… Read More Mobile Surveillance Detection
The following article is dedicated to mobile surveillance.The intention behind it is to explain how mobile surveillance generally works in order to later explain (in my next article) how mobile surveillance detection works. For this reason, the article isn’t meant to teach anyone how to conduct surveillance for the sake of conducting surveillance (articles can’t… Read More Mobile Surveillance
An important question that often comes up in regards to surveillance detection is how to handle it when it comes to traveling. We all know that traveling raises various safety and security concerns (ones that should obviously be addressed), but what about high level hostile surveillance? Those of you who have been following my articles… Read More Surveillance Detection – Trips And Routines