This article will introduce a number of techniques to detect if someone is conducting surveillance on you. Before we get started, I want to make it clear that my knowledge and experience in this come from the private sector, and not from any clandestine government agency work. Though the principles and techniques I’ll be discussing… Read More How To Detect if You’re Under Surveillance
Since the term Visual Control can mean different things to different people, let’s start by defining what I mean by it here. I define visual control as the ability of an operator to visually keep track of an area of interest – usually an Outer Circle to a property of interest. It’s not that you’re… Read More How To Establish Visual Control
After going over the hostile planning process and reviewing a number of case studies, our next goal is to figure out the vulnerabilities of this process and figure out who can tackle which vulnerability.
Once a general grasp of the terrorist hostile planning process is attained, the important role of case studies is to take this subject out of mere theoretics and show how the planning process was actually, physically, conducted in real life. The classic type of terrorist case study seminar or article has, for obvious reasons, become quite… Read More Terrorism Case Studies