Surveillance Detection (SD) is a series of covert procedures and tactics that are designed and implemented in order to confirm or deny whether there is hostile surveillance of a principal, place or event. SD takes place over a given period of time and, where relevant, over distance. The aim of SD is to prevent a hostile act before it happens by identifying the surveillants and thus enabling disruption of the attack in the planning phase.

Hiring of an surveillance team is complicated.  This is why the RMS Surveillance teams are constantly evolving and adjusting techniques and equipment to allow us to remain the worlds leading provider of surveillance detection.

Why does SD matter?

Most attacks require pre-attack information to succeed. For that reason, hostiles need to be in the field to collect and/or verify information. The presence of hostiles in the field is the Surveillance Detection Agent’s (SDAs) or Surveillance Detection Enabled Agent’s (SDEAs) opportunity to detect them prior to the actual attack, and thus disrupt the attack before it happens.

What type of protected objects is SD suited for?

Any object (persons, fixed sites, events, etc.) that is under significant potential threat may be suitable for SD operations.

When and where should SD be conducted?

SD activities may be a 24/7 function or they may be conducted at select times. Often, SD activities are added to traditional corporate EP programs on an ad hoc basis due to heightened risk scenarios.

The addition of SD to a protective detail is particular to each assignment, so divulging the precise variables that warrant it should be considered an OPSEC violation.

Aren’t SD, counter surveillance and covert protection the same thing?

At the risk of splitting hairs, not exactly.  SD is responsible for actively discovering hostile surveillance, whereas counter surveillance (CS) is tasked with actively preventing hostile surveillance as well as conducting surveillance operations on the hostiles themselves. In other words, SD strives to detect hostile surveillance while CS aims to negate hostile surveillance. So while there is indeed some crossover, SD is more passive than CS.

For the most part, Surveillance Detection Agents (SDAs) or Surveillance Detection Enabled Agents (SDEAs) conduct SD operations based on the existing environment. Counter Surveillance Agents, on the other hand, often attempt to control or modify the environment to one extent or another in order to prevent hostile surveillance.

Covert protection refers to tactics used to protect the principal, place or event while concealing the true function of the agent. While the covert protection agents should indeed be aware of surveillance, they are primarily concerned with preventing a hostile act. Should an attack be imminent, they act as an interdictory force to create time and distance between a threat and the protected object.

I have come across some private sector details who refer to SD as CS as covert protection. This can be confusing to principals, detail managers, team leads and the agents themselves. Whereas a Surveillance Detection Enabled protection detail has the skill-set and knowhow to conduct SD operations, an SD agent is not equipped to, nor responsible for conducting protective operations as an interdiction force.

Who conducts SD at RMS?

SD operations are conducted by dedicated Surveillance Detection Agents (SDAs).  Most SD operations in corporate EP are conducted by protective agents who have undergone specialized SD training. Unfortunately, we also see private sector SD operations carried out by agents with no dedicated training; of course, such operations are largely ineffective against a genuine threat.

How is SD different in a corporate environment?

The dedicated SD agent is typically distanced from the principal, and observes the red zone from the outside in. This is in order to detect surveillance from outside the red zone, where surveillants may be. As such, the SDA is typically not in a position to react to imminent threats in an interdictory manner.

As most private sector EP programs do not possess the budgets required for dedicated SDUs, the concept of SD-enabled agents (SDEAs) was born and developed. Protective agents (whether they are covert, low-profile or overt) who are SD-enabled are trained to detect correlations over time and distance which may indicate hostile surveillance. They may detect surveillance while working in a close protection role, or they may be moved from a close protection role to outside the red zone if circumstances dictate. In other words, they are trained both to look outward to detect potential threats, and to look from the outside in as required.

What is the role of data analysis in SD?

The data analyst is key in mapping correlations which may indicate hostile surveillance. The data analyst may be a dedicated function within the unit, or it may be a field agent with additional responsibility. Lack of a data analysis greatly reduces the value of Surveillance Detection Reports (SDR’s) and reduces the effectiveness of the SD field effort. Consider the field agents as those tasked with bringing all the ingredients to the kitchen and the data analyst as the chef who knows how to transform the raw materials into a finished product.

Data analysis is the missing link of private sector SD. The RMS team utilizes multiple data analysts with specific abilities to assist the client.

SD is not the end all and be all of protection strategies

Protective strategies should be the outcome of thorough risk, threat and vulnerability analyses. There is no one-size-fits-all solution, and certainly no one has an unlimited budget.

The Security Master Plan is the document which describes in detail both the strategy and the tactics to be used in order to mitigate identified risks (as identified in the RTVA). SD may be a part of the Security Master Plan, but it is only one component of the overall strategy – and very seldom the entire strategy.

When used as an integrated element in corporate EP, corporate campus security or corporate events, however, the SD function can be a powerful means of enhancing the overall security of the principal.

To Speak with a member of our Surveillance Operations team Call Us Today: