emergent new-age threat we face. It is an unfortunate reality, but therealists among us understand that we have entered a dangerous stage inour society wherein we are not far from a relatively chaotic time to includea wide proliferation of suicide vest and vehicle bombing attacks in thestreets of the US, Canada, and Europe.Based on terrorist doctrine and the post-event examination of terroristoperations, we know that two of the primary stages in the terroristoperational process are "Intelligence and Surveillance" and "Pre-attackSurveillance and Planning". Target surveillance activity is arguably themost important portion of the terrorist attack cycle. This also representsthe periods during which terrorist operatives are exposed and at theirgreatest risk of detection. Regardless of the internet research resourcesand technical stand-off surveillance capabilities, actual "eyes-on"surveillance remains a critical aspect of pre-operational planning, andplaces terrorist operatives in their most vulnerable positions. Therefore,the identification of terrorist surveillance efforts prior to final missionexecution is the most effective means of threat detection andneutralization. Terrorist operatives and other such bad actors who conductphysical surveillance to facilitate their activities, however, operate underthe hope and assumption that they are operating against unwitting,unaware, and non-surveillance conscious targets. Therefore, anawareness of the threat and the ability to perform surveillance detectionand anti-surveillance are critical to countering these adversarial efforts.This book demonstrates the techniques to effectively counter the mostsophisticated physical surveillance methods employed by traditionaladversaries. Interestingly, the most notorious terrorist training manual thatis widely available over the internet has a chapter that deals largely withthe methods of physical surveillance that are a regurgitation of the time-proven techniques that are common to the world's most sophisticatedpractitioners of surveillance. Coincidentally, "SurveillanceCountermeasures" details exacting and effective methods to counter eachof the specific methods endorsed in this and other known terrorist trainingresources.I do not want to be misleading by implying that this book is writtenspecifically to address the terrorist threat. However, it is widely applicableto the terrorist threat and the myriad criminal enterprises that endeavor todevelop the information necessary to effectively execute violent attacksand assassinations as a means to achieve their operational objectives.And of course, it remains an unparalleled resource for investigators andcounter-espionage professionals, as well as those responsible for VIP orcritical asset protection.
For More 5 Star Customer Reviews and Lowest Price: