
Surveillance and Threat Detection
Prevention versus Mitigation
- 1st Edition - December 21, 2013
- Imprint: Butterworth-Heinemann
- Author: Richard Kirchner
- Language: English
- Hardback ISBN:9 7 8 - 0 - 1 2 - 4 0 7 7 8 0 - 5
- eBook ISBN:9 7 8 - 0 - 1 2 - 4 0 7 8 3 5 - 2
Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists an… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteSurveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.
Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs.
Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, fixed site facility can be integrated into an overall security footprint for any organization.
- Understand the terrorist/criminal cycle and how to interrupt that cycle to prevent an attack
- Understand how to encapsulate criminal and terrorist surveillance, analyze suspicious activity reports, and use an all-hazard, threat-based surveillance detection protection program
- Access a full ancillary package, including instructor's manual, test banks, and student study exams
- Digital Assets
- For the Instructor
- For the Student
- Acknowledgments
- 1. Preface and Introduction
- Abstract
- 1.1 Definitions
- 1.2 Scope
- 1.3 Audience and Use Case Assumptions
- 1.4 Executive Summary
- 2. Overview and Understanding
- Abstract
- 2.1 Historical Overview of Surveillance, Countersurveillance, and Surveillance Detection
- 2.2 The Terrorist Attack Cycle
- 3. Case Studies
- Abstract
- 3.1 Criminals
- 3.2 Terrorists
- 4. Conducting Surveillance Detection
- Abstract
- 4.1 The Basics—Exploiting the Terrorist Preattack and Attack Methodology
- 4.2 Incorporation of Video Technology
- 4.3 Surveillance Detection on the Horizon
- Glossary
- Index
- Edition: 1
- Published: December 21, 2013
- No. of pages (Hardback): 264
- No. of pages (eBook): 264
- Imprint: Butterworth-Heinemann
- Language: English
- Hardback ISBN: 9780124077805
- eBook ISBN: 9780124078352
RK
Richard Kirchner
Mr. Kirchner has provided actionable protective intelligence, counterintelligence, and criminal intelligence with corresponding countermeasures with an emphasis on proactive threat identification, abatement, mitigation, and neutralization to reduce risk. Mr. Kirchner provided overall guidance and advice to program managers in development and assessment at the DOD. He was detailed to the FBI National Threat Review Unit and represented Dept. of Defense interests to the National Joint Terrorism Task Force.