skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 136818 Find in a Library
Title: On the Lookout for Suspicious Signals
Journal: Security Management  Volume:36  Issue:5  Dated:(May 1992)  Pages:42-45
Author(s): A J Scotti
Date Published: 1992
Page Count: 4
Type: Training (Aid/Material)
Format: Article
Language: English
Country: United States of America
Annotation: This article discusses the importance and techniques of detecting terrorist surveillance of targeted individuals to prevent planned terrorist attacks.
Abstract: Terrorists typically plan their operations meticulously; and if allowed to complete their plans, they rarely fail. Plans are based on terrorist surveillance of targets, usually in the vicinity of the target's home or office. The detection of such surveillance should have high priority in any security program for potential terrorist targets. A basic surveillance-detection program has a number of steps. The first step is to determine what is normal in the vicinity of the home, office, and "choke" points (locations the target cannot avoid). These areas must then be constantly observed by persons trained in what to look for. Observations must be regularly communicated to supervisors. Once the surveillance information is obtained, it must be compared to the activities of the normal working environment. Computer programs are available for this analysis. If there is evidence of change in the normal environment, the system should identify this change. Information on specific changes must go to operatives in the field along with recommended actions.
Main Term(s): Protection of public figures
Index Term(s): Counter-terrorism tactics; Surveillance
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.