12.07.2015 Views

Surveillance Countermeasures: A Serious Guide to ... - Paladin Press

Surveillance Countermeasures: A Serious Guide to ... - Paladin Press

Surveillance Countermeasures: A Serious Guide to ... - Paladin Press

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CONTENTS1Introduction <strong>to</strong><strong>Surveillance</strong> <strong>Countermeasures</strong> 12<strong>Surveillance</strong><strong>Countermeasures</strong> Overview 53<strong>Surveillance</strong> Principles and Tactics 114Observation 335Passive Physical<strong>Surveillance</strong> Detection 476Active Physical <strong>Surveillance</strong>Detection Overview 777Active Stakeout and ObservationPost Detection Measures 878Active Vehicular<strong>Surveillance</strong> Detection 1019Active Foot<strong>Surveillance</strong> Detection 11510Countersurveillance 127V


11Technical <strong>Surveillance</strong> Detection 13912Physical Antisurveillance 15513Antitechnical <strong>Surveillance</strong> 177VI<strong>Surveillance</strong> <strong>Countermeasures</strong>


C H A P T E R 1INTRODUCTIONTOSURVEILLANCECOUNTER-MEASURESThis book was originally publishedduring the last decade ofthe 20th century. Since that time,there has been an unanticipated proliferationof hostile covert elementsthat has significantly increased thethreat <strong>to</strong> citizens, businesses, andnational security interests of theUnited States and other democraticnations, both at home and abroad. Forthis reason, this book’s applicabilityhas broadened significantly from theoriginal target audience of a smallcore of security professionals <strong>to</strong> virtuallyeveryone.The techniques in this work weredocumented shortly after the conclusionof the Cold War and were in largepart intended as a tribute <strong>to</strong> the legacyof the cloak-and-dagger intrigue thatcharacterized that era. In those bipolardays, adversaries generally exercisedmutual pro<strong>to</strong>cols in a highstakesgentlemen’s game of spy versusspy. Even in the world of internationalterrorism during the previous era,there was a relatively rigid distinctionbetween what were considered “legitimate”targets and off-limit targets(such as innocent civilians) thatwould result in negative sentiments<strong>to</strong>ward the terrorist cause.Today, terrorist and espionageoperatives are less discriminate aboutthe individuals they target, and criminalorganizations have become lessrestrained in order <strong>to</strong> compete in theincreasingly unscrupulous globalcrime market. These fac<strong>to</strong>rs, coupled1


with the dynamics of globalization, are responsible for a muchmore dangerous world for many more people. As a general rule,there are no rules, and no one is exempt.The new reality of the contemporary environment is characterizedby a wide range of unconstrained and asymmetric threatsthat act with relatively less regard <strong>to</strong> consequence. In the past 15years, we have experienced the development of a much more pervasiveand dangerous “underworld”—one that threatens a muchbroader stratum of society. Now there is a plethora of acutethreats <strong>to</strong> the personal privacy and security of average citizens,including common criminals and stalkers, private and corporateinvestigative elements, international crime and terrorist organizations,government-sponsored espionage agencies, and, ofcourse, radical Islamic terrorists who view all nonbelievers ofIslam as infidels and enemies and therefore legitimate targets.In virtually all cases, the elements that threaten individual,corporate, or national security conduct surveillance operations <strong>to</strong>further their objectives or as the primary means <strong>to</strong> an end. In<strong>to</strong>day’s hazardous environment, security professionals mustunderstand the threat and be able <strong>to</strong> advise clients regarding theappropriate countermeasures <strong>to</strong> protect against a hostile surveillanceeffort. The average citizen, <strong>to</strong>o, has a vested interest inunderstanding the concepts of surveillance countermeasures thatcan enhance personal security.At the most basic level, criminals will “case” potential targets <strong>to</strong>develop information <strong>to</strong> maximize their probability of success incommitting a crime. Sophisticated criminal organizations will conductmore extensive surveillance efforts <strong>to</strong> develop information onindividuals they intend <strong>to</strong> intimidate, exploit, or terminate.Terrorist organizations conduct comprehensive preoperational surveillance<strong>to</strong> maximize the probability of successful attacks. Inpreparation for criminal or terrorist acts, surveillance is employed<strong>to</strong> determine when and where the target is most vulnerable.Methods of international espionage have become much moreaggressive <strong>to</strong>ward nonmilitary and nongovernment targets. To alarge degree, the intelligence services of foreign countries, bothfriend and foe, are competing in a global war based on economics.With less emphasis on military advantage and more on economicstrength, the number of individuals who are vulnerable <strong>to</strong> espionage2 <strong>Surveillance</strong> <strong>Countermeasures</strong>


ecause of business affiliations is vastly increased. This expandingthreat is further compounded by the ever-increasing practice ofindustrial espionage conducted between competing businesses.Criminal, terrorist, and espionage organizations also employ surveillancein support of efforts <strong>to</strong> recruit or coerce individuals <strong>to</strong> provideinformation or other types of support. To this end, surveillanceis employed <strong>to</strong> develop exploitable information on unwitting individuals.Those confronted with exploitable evidence developedthrough surveillance may be forced <strong>to</strong> cooperate rather than riskhaving the information disclosed <strong>to</strong> their families, employers, or thepublic. Attributes and vices such as infidelity, homosexuality, alcoholism,and drug abuse are some common examples of the limitlessoptions possible for such blackmail operations. As a corollary, themajority of surveillance activities conducted by private investigativeagencies are undertaken <strong>to</strong> confirm or deny whether an individual isconducting similar types of activities. Even individuals with noreadily exploitable attributes can be manipulated in<strong>to</strong> compromisingsituations <strong>to</strong> develop the leverage necessary for coercion.Regardless of the nature of the threat, surveillance can bedetected and defeated through the effective use of surveillancecountermeasures. This book addresses the principles that havedeveloped in<strong>to</strong> time-proven methods of countering the mostsophisticated surveillance techniques. Importantly in this age ofterrorism, the very same surveillance countermeasures that areapplicable <strong>to</strong> the detection of preoperational surveillance canprove critical when hostile elements are actually in the act of acrime or attack. This is the point when opera<strong>to</strong>rs must exposethemselves and are consequently most vulnerable <strong>to</strong> detection.Proficiency in the techniques of observation and surveillancecountermeasures is an effective means <strong>to</strong> prevent the act orenable individuals <strong>to</strong> avoid the threat when in harm’s way.<strong>Surveillance</strong> countermeasures can be categorized as either surveillancedetection or antisurveillance. The former is employed <strong>to</strong>detect the presence of a possible or suspected surveillance, whilethe latter is employed <strong>to</strong> elude a suspected or detected surveillance.Both methods are further categorized in<strong>to</strong> distinct disciplines.In general terms, surveillance can be categorized as either physicalor technical. Accordingly, surveillance countermeasures can beeither physical or technical, based on the nature of threat. PhysicalIntroduction <strong>to</strong> <strong>Surveillance</strong> <strong>Countermeasures</strong>3


surveillance requires the direct involvement of the human element,which simply means that it must involve physical observation of thetarget by an individual or a team of surveillants. For this reason,physical surveillance assumes a degree of exposure of the effort <strong>to</strong>the individual under surveillance. <strong>Surveillance</strong> countermeasures areemployed <strong>to</strong> maximize this exposure or <strong>to</strong> force surveillance opera<strong>to</strong>rs<strong>to</strong> terminate contact in order <strong>to</strong> avoid exposure. Technical surveillanceuses such equipment as remotely moni<strong>to</strong>red video cameras,listening devises or “bugs,” telephone moni<strong>to</strong>rs or “taps,” andmotion-moni<strong>to</strong>ring beaconing devices <strong>to</strong> observe, moni<strong>to</strong>r, orrecord the target’s activities. Technical surveillance devices are vulnerable<strong>to</strong> both physical inspection and technical detection.While the technical-surveillance concepts detailed in thisbook are still largely relevant, based on the emergent threat environmentthe physical surveillance countermeasures addressedherein have become invaluable. Many elements that conduct surveillanceactivities are either unable or unwilling <strong>to</strong> rely heavilyon technical surveillance means, primarily because of the sophisticationof technical detection capabilities and the unacceptablerisk of compromise. For this reason, the majority rely exclusivelyon the time-tested physical techniques that involve human opera<strong>to</strong>rswho can think, react, and terminate the surveillance if necessaryrather than compromise an operation.Again, based on the new reality, the techniques documented inthis book are more widely applicable <strong>to</strong> security professionals andvulnerable citizens than when originally presented in 1994. In fact,the U.S. National Intelligence Council’s 2020 Project, titled“Mapping the Global Future,” predicts a steady increase in threats <strong>to</strong>a wide range of individuals based on the disturbing trend of “pervasiveinsecurity”—one that is expected <strong>to</strong> continue well in<strong>to</strong> the secondquarter of the 21st century. As a parting and practical example,in May 2000, an al Qaeda terrorist organization training manual wasseized in a safe house in Europe. One of the manual’s chapters is dedicated<strong>to</strong> covert surveillance and addresses the development and utilizationof exploitable information as a primary method of coercingindividuals in<strong>to</strong> support of the cause. As a testament <strong>to</strong> the enduringrelevance of this text, each of the surveillance techniques addressedin the terrorist training manual are detailed in this book, with correspondingand exacting countermeasures.4 <strong>Surveillance</strong> <strong>Countermeasures</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!