C H A P T E R 1INTRODUCTIONTOSURVEILLANCECOUNTER-MEASURESThis book was originally publishedduring the last decade ofthe 20th century. Since that time,there has been an unanticipated proliferationof hostile covert elementsthat has significantly increased thethreat <strong>to</strong> citizens, businesses, andnational security interests of theUnited States and other democraticnations, both at home and abroad. Forthis reason, this book’s applicabilityhas broadened significantly from theoriginal target audience of a smallcore of security professionals <strong>to</strong> virtuallyeveryone.The techniques in this work weredocumented shortly after the conclusionof the Cold War and were in largepart intended as a tribute <strong>to</strong> the legacyof the cloak-and-dagger intrigue thatcharacterized that era. In those bipolardays, adversaries generally exercisedmutual pro<strong>to</strong>cols in a highstakesgentlemen’s game of spy versusspy. Even in the world of internationalterrorism during the previous era,there was a relatively rigid distinctionbetween what were considered “legitimate”targets and off-limit targets(such as innocent civilians) thatwould result in negative sentiments<strong>to</strong>ward the terrorist cause.Today, terrorist and espionageoperatives are less discriminate aboutthe individuals they target, and criminalorganizations have become lessrestrained in order <strong>to</strong> compete in theincreasingly unscrupulous globalcrime market. These fac<strong>to</strong>rs, coupled1
with the dynamics of globalization, are responsible for a muchmore dangerous world for many more people. As a general rule,there are no rules, and no one is exempt.The new reality of the contemporary environment is characterizedby a wide range of unconstrained and asymmetric threatsthat act with relatively less regard <strong>to</strong> consequence. In the past 15years, we have experienced the development of a much more pervasiveand dangerous “underworld”—one that threatens a muchbroader stratum of society. Now there is a plethora of acutethreats <strong>to</strong> the personal privacy and security of average citizens,including common criminals and stalkers, private and corporateinvestigative elements, international crime and terrorist organizations,government-sponsored espionage agencies, and, ofcourse, radical Islamic terrorists who view all nonbelievers ofIslam as infidels and enemies and therefore legitimate targets.In virtually all cases, the elements that threaten individual,corporate, or national security conduct surveillance operations <strong>to</strong>further their objectives or as the primary means <strong>to</strong> an end. In<strong>to</strong>day’s hazardous environment, security professionals mustunderstand the threat and be able <strong>to</strong> advise clients regarding theappropriate countermeasures <strong>to</strong> protect against a hostile surveillanceeffort. The average citizen, <strong>to</strong>o, has a vested interest inunderstanding the concepts of surveillance countermeasures thatcan enhance personal security.At the most basic level, criminals will “case” potential targets <strong>to</strong>develop information <strong>to</strong> maximize their probability of success incommitting a crime. Sophisticated criminal organizations will conductmore extensive surveillance efforts <strong>to</strong> develop information onindividuals they intend <strong>to</strong> intimidate, exploit, or terminate.Terrorist organizations conduct comprehensive preoperational surveillance<strong>to</strong> maximize the probability of successful attacks. Inpreparation for criminal or terrorist acts, surveillance is employed<strong>to</strong> determine when and where the target is most vulnerable.Methods of international espionage have become much moreaggressive <strong>to</strong>ward nonmilitary and nongovernment targets. To alarge degree, the intelligence services of foreign countries, bothfriend and foe, are competing in a global war based on economics.With less emphasis on military advantage and more on economicstrength, the number of individuals who are vulnerable <strong>to</strong> espionage2 <strong>Surveillance</strong> <strong>Countermeasures</strong>