Freshly Printed - allow 10 days lead
Surveillance and Threat Detection
Prevention versus Mitigation
The most definitive surveillance and threat detection resource to date containing never before published security prevention methodologies from an expert specialist in the field
Richard Kirchner (Author)
9780124077805, Elsevier Science
Hardback, published 26 February 2014
264 pages, 50 illustrations
22.9 x 15.1 x 2.2 cm, 0.5 kg
"...a thin, readable tome filled with insights about the topic...has collected case histories about past terrorist attacks and placed them into an actionable format." --Security Letter, Surveillance and Threat Detection "...effectively examines the tactics, techniques, and procedures used by terrorists and criminals to understand the pre-attack and attack planning process...well organized and can be used for classroom instruction or as a quality reference for professionals..." --Security Management (online), February 2, 2015 "…when the topic is threat detection, and the author has been Chief of the Office of Threat Detection at the US Pentagon, the man is worth a hearing. Put another way, the book is about identifying the bad guys; the threat actors, in the jargon… Kirchner suggests that we think of security ‘as concentric models of suspicious behaviour’, which can be note-taking or a last-minute dress rehearsal." --Professional Security Magazine Online, May 28, 2014
Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, fixed site facility can be integrated into an overall security footprint for any organization.
Preface Section I: Introduction Chapter 1: Definitions Chapter 2 Scope Chapter 3 Use Case Assumptions Chapter 4 Executive Summary of the Surveillance and Threat Detection Methodology Section 2: Overview and Understanding Chapter 5 Historical Overview of Surveillance, Counter Surveillance, and Surveillance Detection Chapter 6 The Terrorist Attack Cycle Section 3: Case Studies Chapter 7 Criminals Chapter 8 Terrorists Section 4: Conducting Surveillance Detection Chapter 9 The Basics Section 5: Advanced Surveillance and Threat Detection Applications Chapter 10 Infusion of Surveillance Detection into Current Operations Chapter 11 Incorporation of Video Technology Chapter 12 Surveillance Detection Training Chapter 13 Surveillance Detection on the Horizon Chapter 14 Surveillance Detection over the Horizon Appendices
Subject Areas: Computer security [UR], Causes & prevention of crime [JKVC]