The Surveillance Detection Program consists of two days of intensive training. The first day is dedicated to classroom activities over-viewing the fundamental principles and theories of pre-attack planning, surveillance, and surveillance detection. The techniques discussed during this portion of the program are based upon exhaustive studies of historical attacks from which common themes can be discerned. During the remaining day, the participants will complete practice field exercises involving trip advancing, route selection, and surveillance detection.
Participants will learn how targets are selected and attacks planned. The security problem is defined as well as the security solution. The goal will be to understand the general methods attackers use to make these decisions.
Participants will learn the initial advantages of the terrorist and how they plan to exploit them. The stages of a terrorist attack are examined as well as specific terrorist surveillance methods.
Before an attack, assailants will perform an in-depth reconnaissance of their target’s routines and common movements. The attackers will produce a great deal of information based on these surveillance programs. Participants will learn how surveillance is conducted with specific examples and techniques discussed.
Effective observation requires a conscious and continuous effort. We must be able to retain descriptions of people, vehicles, and activities for future recognition. Participants will learn how to effectively observe their environment for maximum retention.
Surveillance detection is used to identify the presence of surveillance. Participants will learn when the surveillance team is vulnerable to detection and specific methods that can be utilized to detect the presence of surveillance.
Participants will learn how to properly conduct a route survey and a travel and location advance.
The second day of the surveillance detection program will be dedicated to field exercises in which participants will be trained to become familiar with the environment their principal moves through. Participants will learn to conduct a reconnaissance of the principal’s routes. They will develop safe havens, alternate route plans, and an emergency evacuation plan. Using the case studies method, participants will learn to identify pre-incident indicators. They will learn what to look for and where to look for it. The course will culminate with a simulated protection detail with a high threat principal whose potential attackers are conducting surveillance.