Dustin K MacDonald

Menu
  • Home
  • About
  • Economic and Community Development
  • Nonprofit Management
    • Counselling and Service Delivery
    • Suicide Prevention / Crisis Intervention
  • Politics and Governance
  • Math and Statistics
  • Salesforce
Menu

Introduction to Surveillance and Countersurveillance

Posted on July 23, 2017November 23, 2019 by Dustin

Surveillance is defined as “close watch kept over someone or something (as by a detective).” Surveillance may be undertaken by police, intelligence organizations, or even in the military.

Surveillance on foot is sometimes called dismounted surveillance, in comparison to surveillance in a vehicle which may be called mounted or mobile surveillance.

The goal of surveillance is to collect information in order to further a goal, and should always be done in accordance with the law.

Table of Contents

Before Surveillance

Before you begin surveillance it’s important to develop a cover story. This is a plausible reason for what you’re doing in the area that you are found, in case you get stopped by police or other security personnel.

A cover story for foot surveillance may be that you’re headed to a specific destination on foot, while mobile surveillance can include a variety of other scenarios related to employment or personal life.

Stationary Surveillance

Stationary or static surveillance is the use of video cameras or other techniques in order to record an individual without the active use of individuals beyond what it takes to place the device in the location.

Foot Surveillance

Foot surveillance is performed by individuals who watch others, sometimes with the use of a body-camera. While following an individual, you should aim to stay a fair distance behind an individual. It’s also important to seek cover behind buildings, parked vehicles, or blend into groups of pedestrians.

Vehicle Surveillance

Vehicle surveillance can be performed by a single vehicle but is usually performed with a team of three or four. These individuals form an ABC triangle around the individual being surveilled.

In a very large or complex surveillance operation there will be multiple sets of agents performing the surveillance which means that it’s impossible to identify them or break out of the surveillance.

There are at minimum three vehicles in use

  1. Command Vehicle – This is the vehicle that maintains visual contact with the individual under surveillance and is usually behind the vehicle in order to update the other members of the team.
  2. Backup Vehicle – The backup vehicle is switched out at times with the command vehicle in order to decrease the chances that the command vehicle gets “made” or discovered.
  3. Advance Vehicle – The advance vehicle is usually ahead of the command vehicle (and the individual under surveillance), to warn of upcoming hazards and.
  4. Outrider Vehicle – In addition to the three main vehicle, outrider vehicles will patrol the perimeter to make sure the target does not escape the box, and will also switch out with the other vehicles in order to make sure the subject does not escape surveillance

Counter-surveillance

Counter-surveillance involves looking for patterns. The quote ” Once is happenstance. Twice is coincidence. Three times is enemy action” illustrates this well. You may notice before getting into your vehicle that you are surrounded by four others (at least one in each direction.) This is because the surveillance team wants to be prepared to follow you whichever way you take.

Unfortunately for them, that also means that you can identify them by taking notes of a vehicle that has suddenly started moving as soon as you have.

Surveillance is another skill that is best learned in person but these resources will help you begin to hone your skills.
Further Reading
  • Warrior Publications: Surveillance and Countersurveillance
  • FM 19-20 Investigative Process, Chapter 2: Surveillance, Undercover and Task Force Operations
  • Public Safety Intelligence Operations Certificate, Perform Foot Surveillance

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Privacy Policy

See here for our privacy policy. This site uses affiliate links and Adsense ads to provide targeted advertising.

Tags

analytical technique assessment city council communication community development counselling crisis chat crisis intervention data science eastern university economic development education empathy evaluation forecasting fundraising governance humint intelligence intelligence analysis keokuk county language learning legal local government management peer support personal development politics professional development protective factors psychosocial risk factors safety planning salesforce sigourney social media statistics suicide suicide assessment suicide risk assessment technology terrorism training violence risk assessment youth

Recommended Posts

  • Conducting Psychosocial Assessments
  • DCIB Model of Suicide Risk Assessment
  • ABC Model of Crisis Intervention
  • My Friend is Suicidal - What do I do?

Recent Posts

  • University of the Cumberlands PhD in Information Technology
  • Joining the US Coast Guard Auxiliary
  • What is a Salesforce Business Analyst?
  • Why I Joined Mensa
  • NCCM Documentation

Archives

  • March 2023 (1)
  • February 2023 (2)
  • January 2023 (4)
  • December 2022 (2)
  • May 2022 (1)
  • April 2022 (2)
  • March 2022 (1)
  • February 2022 (1)
  • December 2021 (1)
  • October 2021 (1)
  • August 2021 (2)
  • May 2021 (3)
  • December 2020 (1)
  • November 2020 (4)
  • July 2020 (1)
  • June 2020 (1)
  • April 2020 (1)
  • March 2020 (4)
  • February 2020 (7)
  • January 2020 (1)
  • November 2019 (1)
  • October 2019 (2)
  • September 2019 (4)
  • August 2019 (2)
  • March 2019 (1)
  • February 2019 (1)
  • January 2019 (1)
  • December 2018 (4)
  • November 2018 (3)
  • October 2018 (3)
  • September 2018 (19)
  • October 2017 (2)
  • September 2017 (2)
  • August 2017 (1)
  • July 2017 (39)
  • May 2017 (3)
  • April 2017 (4)
  • March 2017 (4)
  • February 2017 (4)
  • January 2017 (5)
  • December 2016 (4)
  • November 2016 (4)
  • October 2016 (5)
  • September 2016 (4)
  • August 2016 (5)
  • July 2016 (5)
  • June 2016 (5)
  • May 2016 (3)
  • April 2016 (2)
  • March 2016 (2)
  • February 2016 (2)
  • January 2016 (4)
  • December 2015 (2)
  • November 2015 (2)
  • October 2015 (2)
  • September 2015 (2)
  • August 2015 (1)
  • June 2015 (2)
  • May 2015 (5)
  • April 2015 (3)
  • March 2015 (8)
  • February 2015 (12)
  • January 2015 (28)

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • Dustin on Eastern University Master of Science in Data Science Half-way Review
  • Joly on Eastern University Master of Science in Data Science Half-way Review
  • Dustin on Crisis Triage Rating Scale (CTRS)
  • thomas mahek on Crisis Triage Rating Scale (CTRS)
  • Dustin on Eastern University MS in Data Science 2022 Review

Tags

analytical technique assessment city council communication community development counselling crisis chat crisis intervention data science eastern university economic development education empathy evaluation forecasting fundraising governance humint intelligence intelligence analysis keokuk county language learning legal local government management peer support personal development politics professional development protective factors psychosocial risk factors safety planning salesforce sigourney social media statistics suicide suicide assessment suicide risk assessment technology terrorism training violence risk assessment youth
© 2023 Dustin K MacDonald | Powered by Minimalist Blog WordPress Theme