Surveillance and Threat Detection

  • ID: 2685406
  • Book
  • 264 Pages
  • Elsevier Science and Technology
1 of 4

Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.

Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs.

Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, fixed site facility can be integrated into an overall security footprint for any organization.

  • Understand the terrorist/criminal cycle and how to interrupt that cycle to prevent an attack
  • Understand how to encapsulate criminal and terrorist surveillance, analyze suspicious activity reports, and use an all-hazard, threat-based surveillance detection protection program
  • Access a full ancillary package, including instructor's manual, test banks, and student study exams

Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.

Note: Product cover images may vary from those shown
2 of 4

Preface

Section I: Introduction

Chapter 1: Definitions

Chapter 2 Scope

Chapter 3 Use Case Assumptions

Chapter 4 Executive Summary of the Surveillance and Threat Detection Methodology

Section 2: Overview and Understanding

Chapter 5 Historical Overview of Surveillance, Counter Surveillance, and Surveillance Detection

Chapter 6 The Terrorist Attack Cycle

Section 3: Case Studies

Chapter 7 Criminals

Chapter 8 Terrorists

Section 4: Conducting Surveillance Detection

Chapter 9 The Basics

Section 5: Advanced Surveillance and Threat Detection Applications

Chapter 10 Infusion of Surveillance Detection into Current Operations

Chapter 11 Incorporation of Video Technology

Chapter 12 Surveillance Detection Training

Chapter 13 Surveillance Detection on the Horizon

Chapter 14 Surveillance Detection over the Horizon

Appendices

Note: Product cover images may vary from those shown
3 of 4

Loading
LOADING...

4 of 4
Kirchner, Richard
Richard "Rik” Kirchner, Jr. possess over 25 years of combined U.S. military, law enforcement, and professional security experience coupled with many years in business management ranging from Operations Manager of large scale contract security operations to V.P. of Marketing & Sales. For the past eight years he has been employed by the U.S. Department of Defense as an Antiterrorism Officer and Counterintelligence Officer and, most recently, as Chief of the Office of Threat Detection at the U.S. Pentagon.

Mr. Kirchner has provided actionable protective intelligence, counterintelligence, and criminal intelligence with corresponding countermeasures with an emphasis on proactive threat identification, abatement, mitigation, and neutralization to reduce risk. Mr. Kirchner provided overall guidance and advice to program managers in development and assessment at the DOD. He was detailed to the FBI National Threat Review Unit and represented Dept. of Defense interests to the National Joint Terrorism Task Force.

Note: Product cover images may vary from those shown
5 of 4
Note: Product cover images may vary from those shown
Adroll
adroll