Menu
Log in


INTERNATIONAL FOUNDATION FOR
CULTURAL PROPERTY PROTECTION

Log in

Webinar #6 - Hostile Surveillance Detection (recording)

  • May 05, 2020
  • 9:00 AM
  • December 31, 2025
  • ifcpp.org

Registration

  • We know that ISIS has been operating in all 50 U.S. States and many other countries. We also know that terrorist organizations have a planning cycle which includes conducting hostile surveillance for weeks, months and even years prior to an attack. This seminar will inform participants on the terrorist planning cycle, what hostile surveillants look for, how hostile surveillance is conducted and what preventive security counter measures can be taken to identify hostile surveillance and prevent attacks.
  • We know that ISIS has been operating in all 50 U.S. States and many other countries. We also know that terrorist organizations have a planning cycle which includes conducting hostile surveillance for weeks, months and even years prior to an attack. This seminar will inform participants on the terrorist planning cycle, what hostile surveillants look for, how hostile surveillance is conducted and what preventive security counter measures can be taken to identify hostile surveillance and prevent attacks.

Register

Hostile Surveillance Detection for Critical Infrastructures and Soft Targets and Preventive Techniques to Mitigate Risk

We know that ISIS has been operating in all 50 U.S. States and many other countries. We also know that terrorist organizations have a planning cycle which includes conducting hostile surveillance for weeks, months and even years prior to an attack. This seminar will inform participants on the terrorist planning cycle, what hostile surveillants look for, how hostile surveillance is conducted and what preventive security counter measures can be taken to identify hostile surveillance and prevent attacks.

Participants of this one-hour webinar will learn:

  • Terrorist Trends
  •  Surveillance Detection as a security strategy
  • Activities indicative of hostile surveillance
  • Terrorist planning cycle
  • Techniques/Ruses used by hostile surveillants
  • Hostile surveillants requirements
  • Best times in the terrorist planning cycle to identify and report surveillance
  • Brief review of a comprehensive process to protect your facility
  • Who should be trained in hostile surveillance

    Developed and Presented by: Jim McGuffey, M.A. CPP, PSP, PCI

     Webinar Length: 40 minutes

  
 

1305 Krameria, Unit H-129, Denver, CO  80220  Local: 303.322.9667
Copyright © 1999 International Foundation for Cultural Property Protection.  All Rights Reserved