Surveillance Detection Briefing
Facility Security
- Rings of Security:
Physical-(Visible)
- Walls, Fences, Gates, Guards &
Plantings
Procedural- (Visible)
- ID Checks, Entry Badges,
Coded Entry, Alarm systems,
CCT and Cameras
Informational Ring-(Not Visible)
Information about the threat
that comes from the outside.
Information that the opposition
does not know you have.
** More difficult to defeat **
Facility Vulnerability Analysis
- The FVA is a method used to determine facility vulnerability as well as predictable activity surrounding the facility.
Outside Looking In
- Observing the vulnerabilities from the “outside looking in” helps us to see the situation as the attackers would/will and could ultimately enable us to thwart their plans.
Weaknesses from Attackers View
- It is important to view the facility and its weaknesses from the perspective of the attacker (from the outside in).
Surveillance Detection
- Case studies have revealed that surveillance is the weakest link in
the attack cycle. Very often, initial surveillance is poorly executed
due to lack of discipline or training of the surveillance team.
Surveillance Detection
- Surveillance Detection is an ongoing process by which we focus
various assets on the identified Red Zone area to detect surveillance
in those areas
Reporting
- The importance of timely reporting cannot be overstated.
- It is important so that security and/or Law Enforcement can use the information and act in a timely fashion.
- WHO is doing WHAT?
- WHEN did they do it?
- WHERE did they do it from?
- HOW did they do it?
- WHY were they doing what they did?
- It is more than seeing; it is knowing what you see and comprehending its significance.
- Identify distinguishing physical characteristics
- Identify changing physical features
- Identify changing details of appearance or behavior
- Recall factors the affect observation skills and recall.
- Practice method for improving observation skills an memory
The Four D’s of Security
Deter
- DETER – You want to deter the “Bad” guys from
having any interest in your business or location. This can be done
variety of ways ranging from physical security barriers to something as
simple as keeping your information secure.
Deny
- DENY – If they are interested, you want to deny them access. And that can be done with alarm systems, security guards, etc.
Detect
- DETECT – If they do gain access, you want to detect them ASAP. This can be done with things like alarms, cameras, etc,.
Delay
- DELAY - If they gain access to the site and what
they are looking for, you want the delay them from escaping. The longer
they are at scene the more likely they are to be caught by security
personnel or Law Enforcement
Suspicious Vehicle
- Keeping a pair of binoculars near the front desk will assist in
getting details of vehicles that are seen in the red zones or target
area.
- CCTV or photos should be taken
Suspicious Person
- It is important to make your notes as soon as possible before you forget the details of the description.
- Make note of unchangeable items such as tattoos and scars
Bomb Threat Card
- The Bomb Threat Card should be kept near the phone and or switchboard operator.
- Copies should be with anyone that calls would be routed to.