Surveillance and threat detection prevention versus mitigation

Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks,...

Full description

Saved in:
Bibliographic Details
Main Author: Kirchner, Richard, Jr (Author)
Format: Book
Language:English
Published: Waltham, MA Butterworth-Heinemann © 2014
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 i 4500
001 100801
003 MY-KLNDU
005 20241220025558.0
008 221104 2014 maua i 000 0 eng d
020 |a 9780124077805 
020 |a 0124077803 
039 9 |a 202211041126  |b VLOAD  |c 201411171643  |d faezah  |c 201411171643  |d faezah  |c 201410132030  |d syarifuddin  |y 201410132030  |z syarifuddin 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a HV 7432  |b .K57 2014 
100 1 |a Kirchner, Richard, Jr.  |e author 
245 1 0 |a Surveillance and threat detection  |b prevention versus mitigation  |c Richard Kirchner, Jr. 
264 1 |a Waltham, MA  |b Butterworth-Heinemann  |c © 2014 
300 |a ix, 253 pages  |b illustrations  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
500 |a Includes index 
505 0 |a Chapter 1. Preface and Introduction -- Definitions -- Scope -- Audience and Use Case Assumptions -- Executive Summary -- Chapter 2. Overview and Understanding -- Historical Overview of Surveillance, Countersurveillance, and Surveillance Detection -- The Terrorist Attack Cycle -- Chapter 3. Case Studies -- Criminals -- Terrorists -- Chapter 4. Conducting Surveillance Detection -- The Basics : Exploiting the Terrorist Preattack and Attack Methodology -- Incorporation of Video Technology -- Surveillance Detection on the Horizon 
520 |a Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate 
592 |a 00013726  |b 04/11/2014  |c RM 279.80  |h PVK 
650 0 |a Crime prevention  |z United States 
650 0 |a Terrorism  |z United States  |x prevention 
650 0 |a Surveillance detection 
650 0 |a National security  |z United States 
650 0 |a Internal security  |z United States 
999 |a vtls000052946  |c 100801  |d 100801