O'Reilly logo

Surveillance and Threat Detection by Richard Kirchner

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

4

Conducting Surveillance Detection

Abstract

By now you should be familiar with the terrorist preattack and attack methodology and their tactics, techniques, and procedures (TTPS)—indicators of preattack operations—and are now ready to understand the paradigm shift in surveillance and threat detection: to go from a reactive to a proactive security posture. We discuss proactive measures and learn how to exploit the vulnerabilities in terrorist and criminal’s TTPs and how to stop them during their preattack operations.

Keywords

assessment; elicitation; infrastructure; observation; risk; security; surroundings; vulnerability

Chapter Outline

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required