Countering Hostile Surveillance - ACM - IV Security Services
Countering Hostile Surveillance - ACM - IV Security Services
INTRODUCTION
PART I
Surveillance and Surveillance
Countermeasures Overview
Chapter 1
The Hostile Surveillance Threat
Chapter 2
Introduction to Surveillance
Countermeasures
PART II
Surveillance Operations Techniques
Applications
Chapter 3
Surveillance Operations Overview
Chapter 4
Transition Stages
Chapter 5
Restrictive Terrain
PART III
Surveillance
Countermeasures Theory
Chapter 6
Surveillance Countermeasures,
Principles
Chapter 7
Surveillance Countermeasures
Concepts
Chapter 8
The Chaos Theory of Surveillance
PART IV
Surveillance
Countermeasures
Applications: Manipulation
Chapter 9
Isolation Overview
Chapter 10
Isolation Methods
Chapter 11
The Break in Contact
PART V
Surveillance Countermeasures
Applications: Exploitation
Chapter 12
Introduction to Surveillance
Countermeasures Procedures
Chapter 13
The Multiple Sightings Surveillance
Detection Procedure
Chapter 14
The Temporary Break in Contact
Chapter 15
The Break and Disappear
Antisurveillance Procedure
Chapter 16
The Temporary Break in Contact
Antisurveillance Procedure
INTRODUCTION
This is how the true security professional should view the applications of
advanced surveillance countermeasures principles, concepts, techniques, and
procedures. Ironically, these sophisticated aspects of art and science are easily
understood when they are broken down into their most basic elements. This manual
presents intricate concepts in a methodical manner that truly does make them appear
simple once broken into their components.
This manual is organized into five parts that must be studied in sequence in order
to develop the incremental basis of understanding and to fully appreciate the
principles and theory that translate to art, science, and execution. The information
herein is presented in a technical and straightforward manner, as the intent is to inform
and not to entertain. For this reason, the manual has been specifically designed as a
concise reference manual for security professionals that can serve as a relevant
framework for the development, training, and execution of security programs.
This concept is the essence of surveillance countermeasures. Every day and in all
parts of the world, hostile surveillance efforts are stalking and exploiting unwitting
prey. This manual demonstrates how the intended prey can employ expertise and
ingenuity to detect, evade, and if necessary, completely assume the role of the predator
in the neutralization of a hostile surveillance threat.
ENDNOTES
Surveillance
and
Surveillance
Countermeasures
Overview
CHAPTER 1
SURVEILLANCE TERMINOLOGY
SURVEILLANCE METHODOLOGY
Introduction to
Surveillance Countermeasures
Surveillance countermeasures consist of surveillance detection and
antisurveillance. Although surveillance detection and antisurveillance have two
different objectives, many principles and concepts apply equally to both. For the
purposes of this manual, the term surveillance countermeasures is used when the
concepts and applications being addressed apply to both surveillance detection and
antisurveillance.
Passive surveillance detection consists of the target (or a security detail escorting
the target) observing the surroundings to identify indications or instances of
surveillance without taking any active measures. A general understanding of
surveillance principles and tactics facilitates the effective application of passive
physical surveillance detection. In fact, passive observation techniques serve as a
basis for hostile surveillance threat awareness. Passive surveillance detection is
conducted during the course of normal activities and is primarily based on an
understanding of how a surveillance effort operates in order to identify activities or
tactics that are indicative of surveillance. Passive detection is conducted in a manner
that does not provide the surveillance effort, if present, with any indication that the
target is observing for a surveillance presence.
Passive surveillance detection is most feasible when the risk of violent activity
against the target is low, making the identification and neutralization of the
surveillance threat, if present, less urgent.
Although passive surveillance detection is not usually effective in quickly
identifying surveillance, it should always be employed in order to identify indications
of surveillance that may justify the employment of more aggressive (active)
surveillance detection techniques. In fact, personal security details continuously
practice passive surveillance detection as a minimum baseline procedure.
Countersurveillance
Antisurveillance
Surveillance
Operations
Techniquesand
Surveillance
Countermeasures
Applications
CHAPTER 3
SURVEILLANCE IMPERATIVES:
CONTACT AND MIRRORING
There are two overarching imperatives that any surveillance effort must adhere to
in order to execute an effective physical surveillance operation: maintaining contact
(observation) and mirroring. These two simple imperatives are the driving factors
for the development and execution of surveillance countermeasures ranging from the
most basic to the most sophisticated.
A surveillance effort must maintain contact with the target through observation in
order to ensure that the target is not lost and the surveillance can proceed effectively.
Simply stated, if a surveillance effort is unable to maintain contact with the target, the
objectives of that particular stage of the surveillance operation will not be achieved.
Although intuitively obvious, this simple fact is the driving concept behind the
development and execution of the most effective surveillance countermeasures tactics,
techniques, and procedures.
Mirroring
SURVEILLANCE STAGES
The Box
The Follow
Once the target begins to travel, the surveillance effort will transition to the follow
stage, which involves the transition from static positions in the box stage to a mobile
surveillance follow and continues throughout the mobile surveillance of the target
while traveling by foot or vehicle. A standard surveillance operation will consist of
a succession of transitions between the box and follow stages until the operation is
terminated. A given phase of a comprehensive surveillance operation will normally
terminate when the target reaches a terminal long-term stay location, such as a
residence at night or workplace during the day. In the meantime, the surveillance
effort will depart to “cool off ” and then return to establish the box when target pattern
analysis has indicated that the target can be expected to emerge from the location.
Most of a standard surveillance operation’s time and effort will be spent during
the actual follow phase. For this reason, it is during this phase that the target will
have the opportunity to employ the widest range of surveillance countermeasures. The
follow phase of a surveillance operation can be conducted either by vehicle or by foot.
Obviously, the target’s mode of travel will dictate the surveillance asset employed.
For our purposes here, the tactics for the mobile surveillance follow will be addressed
as they apply primarily to a vehicular surveillance. This is appropriate since most
targets’ travel is usually conducted by vehicle, and virtually all high-risk personnel
traveling under the protection of a security detachment will be restricted primarily to
vehicular travel.
Regardless of how many surveillance assets are employed in an operation, at any
given time there will always be at least one asset that maintains observation (contact)
of the target. Intermittent losses of contact based on anticipating the target’s actions,
temporary blind spots, and exchanges between assets are normal. However, a
surveillance effort will avoid letting the target go unobserved through options that
would allow the target multiple alternative routes of travel, unless the effort were
confident of the target’s destination based on target pattern analysis or other means.
During the course of a follow, the members of a surveillance effort with multiple
assets will hand off contact with the target among each other. The most basic example
of this hand-off process is when the target is traveling along a route and then takes
a turn onto another road. In this case, the surveillance asset traveling most closely
behind the target will continue straight at the intersection, while another surveillance
asset that is further out of observation range will take the turn and establish contact
(observation) with the target.
The surveillance follow should consist of a succession of handoffs in order to
minimize the amount of time that a single asset is exposed to the target for observation
and detection. This is also an effective method of disguising the fact that the
surveillance effort is mirroring the target’s movements. In virtually all cases, however,
there is a varying degree of time—normally seconds—when no asset will have contact
with the target as the hand-off is executed.
The floating box is a surveillance method that is characteristic of a more
sophisticated surveillance effort, as it generally requires multiple assets and a voice
communications capability between assets. This method requires a minimum of three
assets but is most effectively employed with four or more. Just as the term implies,
the floating box involves surveillance assets moving at a pace with the target while
traveling along parallel routes for a more secure and effective reaction to a turn in
either direction. Given the example of a standard city block in a vehicular surveillance,
the floating box would consist of at least one asset traveling behind the target on
the same road, while other surveillance vehicles travel along each of the two parallel
roads.
A complete floating box formation would also include a lead asset, alternatively
referred to as a cheating asset. In the example of the vehicular street surveillance,
the lead vehicle will travel ahead of the target on the same route and can warn the
surveillance effort of approaching hazards or options, and can be positioned ahead of
the potential obstacles in case the following surveillance assets are held up. In some
cases, the lead vehicle could be the asset responsible for contact (observation) with
the target at a given time.
Whether surveillance assets travel by foot or vehicle, the terrain and traffic
patterns will dictate their following distance. In open terrain, the surveillance effort
will generally increase following distance due to the greater range of observation for
both the surveillance effort and the target. In denser traffic, the surveillance effort
will normally follow more closely to maintain observation and be in the appropriate
position at critical points along the surveillance route—primarily at traffic options.
Any sophisticated surveillance effort operates based on an understanding of the
principles of observation, and will conform to what should be perceived as the norm
with respect to the surrounding environment. A surveillance effort must use cover and
concealment to protect its activities from observation by the target. The term cover
here is used in the classic espionage and investigative sense of cover for action, which
simply means blending in with the surroundings to appear normal. Concealment can
consist of a number of possibilities to include physical barriers, but generally, in a
surveillance operation the primary method of cover and concealment for surveillance
vehicles is other vehicles, and the primary method for surveillance operators on foot
is the surrounding pedestrian traffic.
Transition Stages
INTRODUCTION
Transition stages (points) present challenges to the surveillance effort from the
standpoint of maintaining contact with the target while avoiding detection.
The primary transition points in a surveillance operation are when the target
transitions from a static to mobile status and the surveillance effort transitions from a
box to a follow, or when the target transitions from a mobile to a static position and
the surveillance effort transitions from the follow to the box.
The transition stages of a surveillance operation present observable and
exploitable profiles that can result in unique vulnerabilities to surveillance
countermeasures. At the most basic level of observation and change detection, an
observant target is better able detect surveillance assets as they transition from a static
to mobile status, or from mobile to static status. This, coupled with a basic
understanding of how surveillance assets can be expected to position themselves to
establish a box and subsequently initiate a follow, is key to detecting surveillance.
Although not transitions associated with the transitions of a surveillance phase,
two other transition stages that may occur during the course of the follow are the
transition from vehicular surveillance to foot surveillance, and viceversa.
These are also elements of the surveillance follow that present a multitude of
surveillance countermeasures opportunities if properly exploited.
The positioning of a surveillance effort for a box involves the logical positioning
of surveillance assets to discreetly initiate the follow once the target either travels
through or emerges from within the box area. Obviously, the number of surveillance
assets available will dictate how the box is established. Depending on the number of
assets available, the surveillance effort will prioritize positioning based on the target’s
most likely routes of departure or transit.
This prioritization process is a key concept because if there are not enough
surveillance assets to cover all possible routes, then a corresponding number of routes
will not be covered based on the assessment that the target is least likely to take these
routes. If there is only one asset, that asset will need to be positioned in a location that
will ensure that it can both observe the target when he begins to move and initiate the
follow. If the number of surveillance assets available exceeds the number of routes,
the surveillance effort may opt to employ a trigger asset to alert the effort that the
target is moving, and to position other available assets sequentially along the possible
routes of departure as reinforcements.
When the target begins to emerge from a location where a surveillance effort
would establish a box, if present, he will observe for indications of surveillance. In
most cases, this will involve no active measures and will consist of passive
surveillance detection.
Observation for change detection purposes is most effective in areas where the
target is very familiar with the normal surroundings, such as the neighborhood he lives
in. The target will initially observe for vehicles or individuals who are conspicuously
placed to act as a potential trigger. Unusually placed trucks, vans, or vehicles with
tinted windows are particular indicators. As the target begins to move, he will observe
for individuals or vehicles that conspicuously transition from a static to a mobile
status. When the target departs the potential box location by vehicle, he will observe
for vehicles that are located in likely positions to pull out and assume the follow;
focusing primarily on vehicles that pull out behind the target from parallel parking
positions or from positions adjacent to the primary route, such as parking lots and
side streets. Although the list below is not all-inclusive, when observing for possible
surveillance vehicles parked along the route of travel or in adjacent areas, the target
will specifically look for vehicles exhibiting some of the following indications of
boxing surveillance vehicles:
This transition involves the target stopping during the course of the follow. It is
normally associated with a short-term stop, so in the case of vehicular surveillance,
the surveillance effort would likely not transition to a foot surveillance to cover the
target during the stop. Therefore, the primary objective for the surveillance effort is
to establish a box in preparation for when the target begins to move again.
An example of this transition is when the target pulls into a gas station to refuel.
This is a good example of a stop with an opportunity to observe surrounding traffic
while conducting a plausible activity (refueling). Regardless of the stop location, it
should provide a plausible reason for the stop (cover for action) and the opportunity
to observe inconspicuously for surveillance assets.
During this transition, there is an inherent vulnerability to detection as the
surveillance assets maneuver based on the target’s actions, and may be forced to pass
directly by the target’s position. This effort to establish a box hastily also presents
a window of opportunity for antisurveillance if the target begins to move before the
surveillance assets are established in their respective box positions.
Restrictive Terrain
RESTRICTIVE TERRAIN
INTRODUCTION
The terrain and other environmental factors dictate a large part of how a
surveillance effort conducts its follow of the target. Canalized terrain, choke points,
and traffic hazards are examples of restrictive terrain types that facilitate surveillance
countermeasures. Given the requirement to maintain contact with the target,
restrictive terrain will usually force the surveillance effort to assume additional risk
of detection in order to ensure that observation of the target is maintained.
Restrictive terrain is employed to isolate potential surveillance assets for
surveillance detection purposes, and also to conduct or to posture for the execution
of surveillance detection and antisurveillance measures. The key enabling concept of
restrictive terrain is that the target will force the surveillance effort into a situation
that restricts its freedom of movement, making it vulnerable to surveillance
countermeasures.
Although a significant enabler for surveillance countermeasures purposes,
restrictive terrain is a true double-edged sword for the target who actually suspects
surveillance, but does not know whether the intentions of the surveillance effort are
lethal or nonlethal. This is a critical consideration when determining whether to
employ these enablers, because in many cases the restrictive terrain that the target
can exploit for surveillance countermeasures purposes would likely be the very same
restrictive terrain that a hostile element would choose to execute an attack on the
target, if that were the intent.
Traffic Hazards
Traffic hazards are areas along a route of travel that can force a surveillance effort
to slow down or come to a halt, or areas that provide the target multiple options of
travel. Generally, if the target enters a traffic hazard ahead of the surveillance effort,
or when not under observation by the surveillance effort, the risk of losing the target
is significantly increased. Common traffic hazards include intersections with traffic
lights and areas of dense traffic. Such hazards can either cause the surveillance effort
to move into close proximity with the target or to lose contact altogether. The
surveillance countermeasures implications of traffic hazards are obvious, as they force
the surveillance effort into a slow-moving or static position that may be readily
observable by the target. Particularly when moving from a relatively open area into
an area with traffic hazards, the surveillance effort will tend to push in close to the
target to avoid losing contact. Traffic hazards support antisurveillance by serving as
obstacles to the surveillance effort as well. For example, the target may be able to
clear the traffic hazard and “break away” while the surveillance effort is held up.
A category of traffic hazard that requires additional consideration from the
surveillance countermeasures standpoint is traffic options. Although very common,
a location such as a street intersection that provides the target multiple options of
travel is a traffic hazard, because if the surveillance team does not have contact with
the target when he passes through the option, the surveillance effort will be forced
to initiate a lost contact drill, not knowing the target’s direction of travel from the
intersection. Although not necessarily restrictive in the physical sense, traffic options
in general do restrict a surveillance effort’s freedom of movement, as assets will
normally be compelled to reduce following distance when approaching the options in
anticipation of the target’s possible turn or change of direction.
Choke Points
Choke points are terrain features that generally cause traffic to slow down and
concentrate in density. Various examples of choke points include construction zones,
toll roads and toll booths, and areas where high-traffic, multiple-lane roads merge into
fewer lanes. Choke points provide a number of key enabling characteristics in regard
to surveillance countermeasures. For surveillance detection purposes, choke points
may cause a following surveillance effort to slow down and perhaps push in close to
the target, facilitating observation and detection.
As they apply primarily to antisurveillance, choke points can provide a degree
of separation between the target and the surveillance effort. For example, when the
target, traveling ahead of the surveillance effort, clears the choke point, he will be
able to break away from a following surveillance effort.
Canalized Terrain
Intrusion Points
Intrusion points are locations with a single primary point of entry and exit.
Basically stated, an intrusion point is a location that forces surveillance assets to either
“intrude” upon the target in close proximately or break contact and await the target’s
exit from the location. Common intrusion points are dead-end roads and cul-desacs
by vehicle, and small street-side business establishments by foot.
As it applies to vehicular surveillance, dead-end roads and culde- sacs are the
extreme in terms of choke points because they completely restrict movement once
committed. Again, restrictive terrain such as choke points will also serve to isolate the
target with the surveillance effort, making the target extremely vulnerable to attack
if that were the intent of the surveillance effort, or if the effort feels that it must act
based on being compromised (“fight-or-flight”).
By foot, intrusion points can be selected that enable the target to observe for
potential surveillance operators who choose not to enter but rather linger outside
awaiting the target’s exit. Intrusion points with a secondary exit, such as a back door
to a business, can be exploited to elude a surveillance effort, but such tactics would
be readily perceived as overt antisurveillance measures.
Open Terrain
Just as the term implies, open terrain consists of areas where there are no, or
relatively few, physical obstacles to obstruct observation for either the target or
surveillance effort. Open terrain is restrictive terrain from the standpoint that it negates
cover and concealment, and therefore restricts freedom of movement.
By drawing a surveillance effort into an area where there is little vehicular or
pedestrian cover and concealment, the target can better isolate and identify the
surveillance effort. The obvious risk, however, is that if there is a danger of attack
from the surveillance effort the target will have set himself up in a vulnerable position
by allowing the effort to isolate him in a secluded area.
Open terrain forces a surveillance effort to make a trade-off between line-of-sight
observation and how closely it chooses to maintain contact with the target. For
instance, if the surveillance effort chooses close contact over distance, it makes itself
immediately vulnerable to detection. Alternatively, the surveillance effort that
chooses to distance itself for security purposes makes itself much more vulnerable
to antisurveillance.
Surveillance
Countermeasures
Theory
CHAPTER 6
Surveillance
Countermeasures Principles
INTRODUCTION
SURVEILLANCE DETECTION
ENABLES ANTISURVEILLANCE
ANTISURVEILLANCE ENABLES
SURVEILLANCE DETECTION
Surveillance Countermeasures
Concepts
INTRODUCTION
Concept Summary
In most cases, and at least initially, it is to the target’s advantage that the
surveillance effort not suspect that the target is surveillance conscious or practicing
surveillance detection.
Generally, a surveillance effort will adjust its coverage based on how surveillance-
conscious the target is observed or perceived to be. If the surveillance effort assumes
that the target is not surveillanceconscious, it will likely be less security-conscious
in the employment of tactics and the exposure of assets. This should provide better
opportunities for the target to detect surveillance. Conversely, if the surveillance effort
suspects that the target may be surveillance-conscious, it will exercise greater
operational security and will provide the target fewer opportunities for passive
observation.
In most cases, a recognizable effort at surveillance detection or antisurveillance
will cause the surveillance effort to adjust its tactics or terminate the surveillance
altogether. In either case, the result may be counterproductive in the sense that, even
if the surveillance effort is not terminated, it may become more sophisticated and
much more difficult to detect. Since a primary objective of surveillance detection is to
isolate surveillance assets for observation, retention, and subsequent recognition, the
termination or enhancement of surveillance coverage could negate opportunities to
confirm surveillance by observing surveillance assets at subsequent times and
locations.
A final reason for remaining inconspicuous is that it sends a message to a
surveillance effort, if present. Any experienced surveillance effort will be very
cognizant of surveillance consciousness on the part of the target, unless surveillance
countermeasures are executed in a very subtle and effective manner. Generally,
surveillance is conducted against a target in order to develop some type of
information. A display of surveillance consciousness on the part of the target will be
perceived as an indication that he has something to hide.
A surveillance effort will likely intensify its coverage—and perhaps increase the
number of assets—if it perceives that the target does have something to hide, and
will generally assume a more secure and cautious posture if it suspects that the target
is surveillance- conscious. For this reason, any premature activity by the target that
heightens the surveillance effort’s sensitivities will be counterproductive, as it will
place the effort on alert and make it less susceptible and vulnerable to unexpected
surveillance countermeasures techniques and procedures.
Although the target may not have the luxury of “waiting out” a surveillance effort,
in many cases the best defense against a surveillance effort is to make it unprofitable.
Regardless of the surveillance effort’s motivation and capabilities, it will not
indefinitely sustain coverage of a target that does not demonstrate activity of
operational interest in support of the objectives of the surveillance operation.
Surveillance
Countermeasures
Applications:
Manipulation
CHAPTER 9
Isolation Overview
INTRODUCTION
Isolation Methods
Isolation is a primary component of the manipulation stages of the most effective
surveillance countermeasures procedures. Isolation techniques are initially executed
to identify potential surveillance assets, and then as the final form of manipulation in
order to exploit for definitive surveillance detection and antisurveillance purposes. As
they apply to surveillance countermeasures, isolation techniques have three distinct
isolation purposes:
The isolation purpose to identify potential surveillance assets (1) is the precursor
and the basis for follow-on isolation techniques in support of the most effective
surveillance detection (2) and antisurveillance (3) procedures. As it applies to
isolation purpose objective (3) above, a section of Part V (“The Break and Disappear
Antisurveillance Procedure”) will pull it all together into the definitive
antisurveillance procedure.
As they apply to surveillance detection, once potential surveillance assets are
isolated, the most effective procedures to exploit the potential assets involve using
one or a combination of the following exploitation methods:
Exploitation method (1) above (observe for retention and later comparison, or to
compare with previously identified suspected assets) is a standard surveillance
awareness practice and can stand as a key component of a surveillance detection
procedure that will be discussed further in Part V (“The Temporary Break in Contact
Surveillance Detection Procedure”).
Exploitation methods (2) and (3) apply to isolation purpose (2) above. The
amalgam of these aspects form the manipulate-to-exploit transition in the definitive
surveillance detection procedure, which will be detailed in Part V (“The Temporary
Break in Contact Surveillance Detection Procedure”).
This section addresses the techniques that are employed to isolate potential
surveillance assets and is a logical continuation of the isolation methodology
addressed in the previous section. Effective surveillance detection requires that
potential surveillance assets be isolated for detection. There are three primary
categories of techniques through which surveillance assets are isolated:
While the concepts behind these three techniques will be discussed in detail, recall
that Part II addressed the imperatives of contact and mirroring, transition stages, and
restrictive terrain with applications to surveillance countermeasures. To avoid
repetition, readers should refer to Part II as necessary to augment the information
provided as it applies specifically to isolation.
The imperatives of maintaining contact and mirroring are key guiding concepts
for surveillance countermeasures. The irony is that these are such simple concepts, but
they are the ones on which the advantage turns to either the “hunter” or the “hunted.”
The reality is that the imperatives of maintaining contact and mirroring are significant
constraints under which the surveillance effort must operate in order to succeed. In
fact, the only way that a surveillance effort can succeed under these conditions is if the
target is unaware and its efforts go undetected. With a surveillance-conscious target,
the constraints imposed by these two imperatives will guarantee that the operation
ends in either early termination or compromise.
Due to the nature and vulnerabilities of a surveillance operation, mirroring is the
most readily identifiable aspect for surveillance detection. At the passive surveillance
detection level, transition stages can force a surveillance effort into detectable
mirroring actions or other conspicuous actions to maintain contact, and restrictive
terrain can assist in facilitating the isolation and detection of mirroring assets as well.
To put it in terms of a mathematical formula, the first category of isolations techniques
(detection of mirroring) is the constant, and the other two categories (restrictive terrain
and transition stages) are variables that can be employed to exploit the imperatives
of contact and mirroring.
At the more active level, the target may maneuver in a manner that makes
mirroring actions by surveillance assets, if present, more pronounced and readily
detectable. The occurrence of transition stages in the target’s travels will have a
plausible purpose, but will actually be planned and orchestrated to support either
surveillance detection or antisurveillance. The target will also plan the use of
restrictive terrain in a manner that enables him to exploit it against the surveillance
effort in order to enhance surveillance detection, or support a break in contact with
the surveillance effort for surveillance detection or antisurveillance purposes.
Pacing
Acceleration
Transition Stages
Restrictive Terrain
Surveillance
Countermeasures
Applications:
Exploitation
CHAPTER 12
Introduction to Surveillance
Countermeasures Procedures
The final part of this manual consists of two surveillance detection procedures and
two antisurveillance procedures. It is important to note that of the procedures detailed,
the surveillance detection procedure (“The Temporary Break in Contact Surveillance
Detection Procedure”) and the antisurveillance procedure (“The Break and Disappear
Antisurveillance Procedure”) are endorsed as the most effective surveillance
countermeasures procedures available. The other surveillance detection procedure
(“The Multiple Sightings Surveillance Detection Procedure”) is a common one but it
also serves as a good contrast with the more progressive and effective procedures.
Two procedures can be viewed as ingenious in their simplicity, but are frequently
endorsed as the most effective available. One may question why all the technical
theories, principles, concepts, and techniques that have been presented in this manual
lead to only one definitive procedure for surveillance detection and one definitive
procedure for antisurveillance. At the most general level, the information detailed in
this manual is important for any security professional or individual with surveillance
countermeasures concerns.
More specifically, a procedure is a sequence of techniques executed within a
process to achieve a singular objective. As such, the procedures are broad in
application and can be executed employing the range of available isolation and
exploitation techniques. In fact, variations of these very procedures could be executed
repeatedly against the same surveillance effort, and if orchestrated properly, would
repeatedly provide plausible reasons for each episode. Once again, by playing on
the individual or collective psyche, and given a logically plausible explanation, a
surveillance effort will tend to rationalize and perceive these episodes as unanticipated
anomalies rather than surveillance countermeasures.
As a final note of introduction to Part V, the second antisurveillance procedure
(“The Temporary Break in Contact Antisurveillance Procedure”) is one that most
targets will choose not to employ, but it is a fitting conclusion as it truly epitomizes
the edict of “reducing the hunter to the hunted.” While this section does have great
instructional and anecdotal value, it is a radical departure from the rest of this manual.
In light of this, it is important to note that while this manual concludes with this
section, the primary emphasis of this manual is to demonstrate how the hostile
surveillance can be defeated with procedures that manipulate and exploit through
techniques driven by discretion, ingenuity, and sophistication, and not through
procedures employing overt actions and engagement.
CHAPTER 13
In the context of exploit and manipulate, this procedure involves the repetitive
execution of two basic steps:
1. Isolate (manipulate)
2. Observe (exploit)
Isolation can be a means to an end, but more likely will be the precursor to the
execution of situation-dependent surveillance detection maneuvers. The most
proactive and effective technique to facilitate isolation is the “temporary break in
contact.” For surveillance detection purposes, the most effective application of the
temporary break in contact is as an element of “the temporary break in contact
surveillance detection procedure.” To varying degrees, all the concepts addressed to
this point can be employed at some level to enable the execution of this procedure,
which is invariably the most important surveillance detection weapon in the arsenal.
It is important to note that while the concepts of “contact and mirroring,”
“transition stages,” and “restrictive terrain” apply directly to the isolation of potential
surveillance assets, they can also be employed to enable a temporary break in contact.
Even an understanding of target pattern analysis can be applied to determining when
and where a surveillance effort may be most vulnerable to efforts to “break contact.”
Of particular note, the relationship between The Chaos Theory of Surveillance
and the temporary break in contact surveillance detection procedure is tantamount to
applying theory to practice. Recall that if not for the serious nature of a potentially
hostile surveillance effort, the target could exercise elements of the Chaos Theory
to “toy with” (manipulate) a surveillance effort. There is no other application that
better reflects the characterization of “toy with” than the temporary break in contact
surveillance detection procedure, as it can truly make the target a “master of puppets”
in regard to potential surveillance assets. Like no other surveillance detection
procedure, this one manipulates the surveillance effort in a manner that transforms it
from the hunter to the hunted.
The most effective application of the temporary break in contact surveillance
detection procedure consists of the target, through his actions, creating a situation in
which the surveillance effort fears that it may not be able to observe the target as
he passes through a traffic option. The desired response that this should elicit is that
the surveillance effort reacts in an aggressive manner to avoid a “lost contact drill”
situation. It is this reaction to regain contact prior to the option, in an effort to avoid
a lost contact drill situation, that isolates the surveillance assets and sets the stage for
this most effective application of surveillance detection.
Recall from our “Isolation Overview” discussion in Part IV that the most effective
procedures to exploit the potential assets for surveillance detection purposes will
employ isolation techniques to either “elicit a compromising response” or “execute
a surveillance detection maneuver (or series of maneuvers) to elicit a compromising
response.” In the context of manipulate and exploit, the temporary break in contact
surveillance detection procedure can be summarized as follows:
1. Isolate (manipulate)
2. Break in contact (manipulate)
3. Isolate (manipulate)
4. Observe (exploit)
5. Directed action (exploit) as necessary
6. Observe (exploit) if directed action is employed
The “temporary break in contact” is perhaps the most effective means of isolating
surveillance assets, and in many cases, is a means to the end of confirming a
surveillance presence. It is important to understand that this measure does not directly
involve a surveillance effort’s execution of a lost contact drill. Rather, it exploits a
surveillance effort’s professional instincts, which are to avoid a lost contact situation
whenever possible. In fact, it is the surveillance effort’s reaction to the possibility of
losing contact with the target that renders it most vulnerable to active surveillance
detection. As previously noted, anytime there is a break in contact (observation) with
the target, there is a sense of urgency to regain contact in a timely manner and prior
to reaching a traffic option. Immediately upon a break in contact, the surveillance
effort will tend to accelerate in an effort to regain contact. This tendency essentially
generates a degree of “momentum” among surveillance assets that is employed
against them.
The age-old tactic of turning a “blind corner” and then waiting for the surprised
surveillance asset to find himself face to face with the target is a classic example of
a temporary break in contact that is as ageless as intrigue and espionage. Although
it can be perceived as an overt surveillance countermeasures method if not properly
executed, this basic tactical application is among the very most effective surveillance
detection methods, and also serves as a good example of the elements of a temporary
break in contact surveillance detection procedure. These elements are:
For perspective, the time elapsed between the break in contact and the isolation of
potential surveillance assets in the temporary break in contact surveillance detection
procedure is generally measured in seconds. By vehicle, the execution of this
technique may be a matter of less than 10 seconds from initiation to isolation and
detection. Obviously, the time involved will depend on the terrain and rate of speed,
but this perspective is important to the understanding that the blind spot is more of
an expedient than an elaborate set of circumstances. In fact, once the target enters
the blind spot, it will induce an immediate reaction from surveillance assets if the
procedure is properly executed. For this reason, the blind spot can be characterized
as any location or situation that causes a shortterm loss in contact (observation) that
requires movement or action by surveillance assets in order to reestablish contact.
The “blind corner” is a good example for illustration purposes, but tactics and
applications based on the same concepts are more accurately referred to as methods
that use a blind spot. This distinction is necessary, because there are many locations
other than a simple corner with physical structures preventing line of sight that are
suitable to create a blind spot that facilitates a temporary break in contact. Perhaps the
most common example that also has “detection” applications is that of the policeman
nested away with a radar gun in a blind spot where the speeders cannot see him until
they are already in range with their speeds recorded.
Recall that surveillance assets will conduct hand-offs to avoid mirroring and to
minimize exposure to the target. In fact, this is a standard tactic that is executed for
security when the target makes a turn. In virtually all cases, however, there is a varying
amount of time—normally seconds—in which no asset will have contact
(observation) with the target as the hand-off is executed. This simple factor alone can
facilitate any number of variations of the blind spot (“blind corner”) method.
The concept of pacing and the target’s manipulation of a surveillance effort’s
tempo in conjunction with the blind spot is the most effective means of isolation in
support of this procedure. While corners may be the most common options to create
a temporary break in contact and blind spot situation, there are many other options
that can be exploited with equal effect, and in many cases more discreetly. In fact,
suitable terrain that facilitates speed variations to manipulate and exploit the tempo
or momentum of surveillance assets enables some of the most effective applications
of the temporary break in contact surveillance detection procedure.
In areas where there are bends in the road that would force a following surveillance
asset to lose sight of the target temporarily (a blind spot), the target can travel at a
faster speed going into the blind bend, and then decrease speed when completing it.
If successful, this will result in the surveillance assets pursuing quickly around the
bend and then bearing down on the target as it completes the bend. This will force the
surveillance asset to either decrease its speed in an unnatural manner or pass the target.
A poorly disciplined surveillance asset may even decrease its speed to reestablish a
secure following distance, which will be highly indicative of surveillance.
This tactic can be used with the same effect when the target travels over the crest
of a hill that would temporarily blind following surveillance assets from observing
the target’s activities after cresting the hill. Although the blind bend “blind spot”
technique may seem intuitively simplistic, with very few exceptions, this technique
(or variations thereof) is the single most effective means of surveillance detection—
ingenious in its simplicity.
Although some of the best blind spot options have been cited as examples, the
possibilities are unlimited. However, for any temporary break in contact exploiting
a blind spot to be effective, there must be some type of traffic option at some point
within or after the blind spot that would compel following surveillance assets to
accelerate in an effort to regain contact. Among the more obvious reasons, a
surveillance effort uses maps to look ahead and anticipate hazards. If there is a traffic
option ahead of the target, the surveillance effort will be aware of this and react
accordingly in the case of a potential lost contact situation.
By foot, the blind spot options are generally more abundant than by vehicle due
to less restrictive movement options, but the temporary break in contact isolation
technique applications will normally take more time to orchestrate due to the slower
rate of speed.
EXPLOIT
The final stage (or stages) of the temporary break in contact surveillance detection
procedure is the actual surveillance detection technique that is employed against the
potential surveillance effort. Recall again that the purpose of isolating surveillance
assets through the temporary break in contact is to either elicit a compromising
response or execute a surveillance detection maneuver (or series of maneuvers) to
elicit a compromising response.
In many cases, the fact that the surveillance asset suddenly finds itself in a
vulnerable position is enough to elicit a compromising reaction. This can be
accomplished by simply isolating a surveillance asset in a situation where it feels
compelled to react hastily to avoid detection. If isolation alone does not sufficiently
compromise the potential asset, it still serves to isolate the asset in order to focus
the more active, overt, or aggressive detection measures. Once surveillance assets are
isolated, an immediate surveillance detection maneuver will be directed against the
suspected surveillance asset to elicit a compromising reaction and confirm it as such.
This constitutes the one-two punch that will normally force even the most savvy and
composed surveillance professionals to flinch in a detectable manner.
There are a wide range of possible surveillance detection maneuvers (tactics)
available, and the particular maneuver employed will be selected based on the specific
situation. The options for possible surveillance detection tactics are virtually infinite,
with the most common being well documented in references that deal with this less
sophisticated aspect of surveillance detection.
The most aggressive directed surveillance detection techniques are those that
essentially force surveillance assets into a conspicuous and detectable reaction. When
the target is under the protection of a security detail and this procedure is executed
using more aggressive directed techniques, it may be orchestrated in a manner that
gives any potential surveillance effort the impression that the target (the detail’s
principal) is with the detail, when in fact he is not. The fight-or-flight response has
been addressed in detail. The vast majority of surveillance efforts are intended to
function as covert and discreet efforts that remain undetected throughout the entire
course of a given surveillance operation.
Given this, the effectiveness of the temporary break in contact surveillance
detection procedure is based on the fact that the initial and natural reaction for the vast
majority of surveillance assets will be to choose “flight” without any consideration
given to a “fight” response. In fact, when faced with the prospect of close contact or
even a potential confrontation with the target, most surveillance assets will execute
“flight,” regardless of how conspicuous it may be, in order to avoid such a situation.
Although this direct confrontation approach must be tempered with caution, the closer
a surveillance asset suddenly finds itself to the target without plausible options for
cover, the more likely it becomes that a “flight” response will be forced upon that
asset in a manner that will be readily detected by the target.
As it applies to Chaos Theory, the psychological aspects of fear will very often
override any consideration regarding being compromised as a surveillance asset. Such
aspects range from the fear of detention to the fear of physical harm. While such
directed surveillance detection methods are relatively overt and aggressive, they can
still be executed in a plausible manner if incorporated with some type of logical
follow-through. For example, the target can act in a manner that indicates that he is
moving toward a confrontation with a potential surveillance asset, but then continue
the feign to a logical conclusion that falls short of, or bypasses, the surveillance asset.
From the surveillance detection perspective, this approach is the one that best
characterizes the concept of reducing the hunter to the hunted, but the antisurveillance
procedure detailed later (“The Break and Disappear Antisurveillance Procedure”)
takes this concept to its extreme manifestation.
CHAPTER 15
1. Isolate (manipulate).
2. Break in contact (manipulate).
3. Employ reverse logic (manipulate).
4. Evade (exploit).
5. Disappear (exploit).
The first stage involves the maneuver, or series of maneuvers, to break contact
with the surveillance effort. This translates to the first part of the methodology, which
consists of:
. . . breaking contact, enabled by measures that restrict the surveillance effort’s
freedom of movement as appropriate . . .
Earlier we addressed the break in contact as a key enabling element of
antisurveillance. Again, the maneuvers to effect a break in contact can be enabled by
the understanding and exploitation of concepts such as mirroring (pacing), transition
stages, and restrictive terrain. In addition to the other applicable concepts, an
understanding of The Chaos Theory of Surveillance will enable the target to expand
the effectiveness of antisurveillance efforts.
The second phase of the antisurveillance effort involves the actions taken to
further confound and elude the surveillance effort after initial contact is broken. If the
target is able to break contact and remain unobserved until reaching the first traffic
option that gives him multiple possible routes of travel, then the target enters the
second phase of an effective antisurveillance routine. This phase translates to the
second part of the methodology, which consists of:
. . . manipulating the understanding of how a surveillance effort will attempt to
regain contact after the target is lost.
This concept is based on the understanding that a surveillance effort will continue
efforts to regain contact with the target after it has been broken. For this reason, it is
necessary to follow any successful break in contact with immediate follow-on
measures to ensure that even the most relentless surveillance efforts are unable to
recover.
Once contact is broken with the surveillance effort (actual or suspected), the true
“art” of the game comes into play. Again, this is the process of understanding how a
surveillance effort thinks and reacts. The “lost contact reaction” concept is the guiding
factor behind this second and conclusive evasion phase of antisurveillance
methodology.
ANTISURVEILLANCE PROCEDURE:
PRACTICAL APPLICATION
For perspective, it is interesting to understand the metrics of how rapidly the break
and disappear antisurveillance procedure degrades a surveillance effort’s capability.
With this simple example, every option (points in the figure) through which the target
remains unsighted would require multiples of three in available surveillance assets.
For instance, to conduct a minimally effective lost contact drill at the first option
(Point A) the surveillance effort would require a minimum of three assets. Any fewer
than this, and the target will evade surveillance without contest, again assuming that
the surveillance effort searches in the target’s most likely routes of travel. When the
target remains unsighted at the next option, it requires that the surveillance effort have
a minimum of nine surveillance assets to conduct a minimally effective lost contact
drill at Point D, again assuming that Points B and C were given the priority and have
six assets (three at each) dedicated to searching from those two options.
Therefore, by remaining unsighted through Point D, the target will have exhausted
the capability of even the most resourceful surveillance efforts. To further make the
point, by remaining unsighted through Point E, an effective lost contact drill would
require 27 surveillance assets, which exceeds virtually all possible feasibilities. This
example demonstrates how the number of required surveillance assets increases by
multiples of three at each option—from three to nine to 27 . . .
Although a sophisticated surveillance effort with the resources to conduct a
floating box is generally uncommon, the purpose of employing advanced surveillance
techniques such as these is to posture for instances of lost contact as detailed in the
practical application above. When the target does have reason to believe that the
adversarial surveillance effort (suspected or detected) may possess such capabilities,
then a variation of the break and disappear antisurveillance procedure will be executed
in a location that would restrict the surveillance effort’s freedom of movement to
employ advanced surveillance techniques.
Accordingly, targets or security details that operate on a “worstcase” basis would
plan to execute this procedure in an area with appropriate restrictive terrain as a
standard practice. Among the many examples of canalized or other appropriate terrain
to restrict such a capability is for the target to travel on a one-way road with the parallel
routes being one-way roads in the opposite direction. The employment of this or any
number of other such restrictive measures would likely require some variation to the
practical application provided above, but this should require only minor adjustments
based on the best available alternatives for the application of reverse logic.
CHAPTER 16
A general theme throughout this manual has been the employment of intelligence
and finesse to defeat a hostile intelligence threat (brains over brawn). Although this
procedure employs the aspects of manipulation that make the temporary break in
contact surveillance detection procedure the most effective one available, this
procedure is a radical departure from the “finesse” that is characteristic of the exploit
stages of the other surveillance countermeasure procedures. To this point,
antisurveillance has been addressed primarily as a means to elude or evade a hostile
surveillance effort. This is in keeping with the requirements and capabilities of most
targets. However, there is one other element of antisurveillance that is best generically
referred to as “neutralization.”
The term “neutralization” has a number of meanings, but as it applies to the
temporary break in contact antisurveillance procedure, by neutralizing the
surveillance effort the target renders the effort no longer capable of continuing the
surveillance. This procedure is designed and intended to force decisive confrontation
with the surveillance effort that will terminate the hostile surveillance threat. Potential
confrontations may consist of verbal warnings by the target, or the procedure may
involve the orchestration of a confrontation with law enforcement elements. Of
course, more aggressive confrontations may involve shooting out the tires on
surveillance vehicles, sending another type of life-threatening message to surveillance
assets such as warning shots, or to the extreme, which is to neutralize the surveillance
effort in the most decisive and conclusive manner. Regardless of the method of
neutralization employed, this is the surveillance countermeasures procedure that
definitively “reduces the hunter to the hunted.”
When this procedure is executed by a protective security detail, it will invariably
be orchestrated in a manner that gives any potential surveillance effort the impression
that the target (the detail’s principal) is with the detail, when in fact he is not.
ANTISURVEILLANCE PROCEDURE:
MANIPULATE
ANTISURVEILLANCE PROCEDURE:
EXPLOIT
1. Neutralize (exploit).
The target or security detail will only plan to execute a measure of neutralization
that he or they are fully prepared for and capable of executing. The techniques
executed in the manipulation stage of the procedure will give the target an immediate
advantage over the surveillance effort’s assets, but the neutralization technique must
be decisive and precise, because this advantage may only be momentary against a
capable element that is prepared to rapidly assume the “fight.” As opposed to the
other surveillance countermeasures procedures, the range of potential neutralization
techniques is more finite, with the final in a succession of escalating options being
“extreme prejudice.”
Although such applications are rare and exercised only in the most extreme
circumstances, this procedure does epitomize the concept of “reducing the hunter to
the hunted.” As a testament to The Chaos Theory of Surveillance, the execution of
this procedure with the integration of chaos-inducing techniques is antisurveillance
in its purest form, as it immediately, decisively, and without indication terminates the
surveillance threat—game over, and they never saw it coming . . .