Surveillance Detection Specialist


Book Description

"Dan Sommer's new book Surveillance Detection Specialist should be compulsory reading for every security professional, security consultant and close protection officer seriously engaged in countering international terrorism. With lots of examples and illustrations, Dan studies in detail the mind of the terrorist and examines how, with proper surveillance detection, many of the appalling instances of global terrorism could have actually been prevented.Dan explains in detail the work of the Surveillance Detection Specialist and the essential importance his role is within the security detail. Chapters include observation skills, logistics, surveillance methods, operations, reporting and administration, hostile surveillance, briefings, training and threat identification." Robin Barratt - Founder of the World Federation of Bodyguards and author of "How To Find Work As A Bodyguard" The "Grey Book" and "Doing The Doors"




Terrorist Modus Operandi


Book Description

For its candid examination of the historical, political and sociological contexts of international terrorism, Terrorist Modus Operandi is a valuable addition to counter terrorism classics. It is in the category of "must read" for anyone who wants to understand the ideology and causes behind terrorism and how we can and should respond to acts of terrorism. Terrorism Modus Operandi covers the history and development of terrorism and explains in detail the full terrorist planning process from its "Original Cause" through the 8-Phases of the terrorist planning process to execution, and escape and exploitation. Including case studies and in-depth researched statistics of international terrorism incidents and specific terror groups. The final chapters explain the similarities between terrorism and organized crime and explain the best methods for detecting the terrorist planning process. According to Dan Sommer, an understanding of the mindset of terrorists is vital to success in the war on terror.




Eforensics and Signal Intelligence for Everyone


Book Description

This book discusses the process of investigating and analyzing electronic equipment, detecting devices, wireless signals, and the prosecution and prevention of high tech crime. The coauthors are from private industry and academia and really provide a wide variety of perspectives on the detection of electronic eavesdropping devices, wiretaps, various electronic signals, and the collection and examination of information from laptops, desktop computers, and PDAs. Kenneth Bruno does an excellent job teaching the reader about all the equipment used in electronic eavesdropping detection. We also introduce the reader to various pieces of electronic equipment used to detect and identify explosives, biochemical weapons, as well as historic unexploded ordinance. The reader is also introduced to the legal system by Mr. Joel Liebesfeld who does corporate investigations and is often employed by clients who are in the legal profession or insurance industry. Mr. Joel Liebesfeld and Dr. Doherty discuss the process of becoming an expert witness who may testify to what was found using scientific methods in combination with electronic signal detection or computer forensic equipment. We hope that the readership of the book will include high school students considering a career in private industry, law enforcement, intelligence agencies, or the military. A background in electronics, math, and computer science is helpful but not necessary in reading this book. Lockards Principle of Exchange specifies that two objects or people that come in contact with each other will change. We hope that this book changes you by increasing your understanding of electronic devices, investigation, and the justice system.




Introduction to Executive Protection


Book Description

Since its original publication in 1998, Introduction to Executive Protection has been considered the bible of the executive security industry. Now in its 4th edition, this new volume, conceived and developed by Dale L. June, drawing from his experiences in the United States Secret Service, law enforcement & the private sector, has been reworked and revised with new content, chapters, and input with over 60% new material. Much more than simply an introduction, this book is a powerful learning tool, with the author now joined by Elijah Shaw, one of the foremost experts in working globally with celebrities and other high net-worth VIP’s. The authors include real world examples of bodyguards working with politicians and religious figures, and dealing with everything from stalking to assassination attempts. This volume further digs into the tactics and the mindset necessary for protectors to mitigate the risk of it happening to their clients. Packed with tips for successfully navigating the corporate, celebrity & dignitary sectors, the reader will find in-depth discussions on a variety of topics, ranging from setting up estate security plans, to working in and around private jets. The world is changing daily, and as both an educational and resource tool, this book is sure to provide new outlooks for both the experienced and the newcomer alike. ** What the Industry is Saying about the New Edition ** "A comprehensive look at executive protection, the profession, and methods of practice. This 4th edition is worth the read." Monica Duperon Rodriguez Sr. Manager, Global Corporate Security and Risk Management (Executive Protection & Solutions) LinkedIn "It is important we don't forget the basic principals & foundations. This book is a great reminder." Charles Randolph LTC (RET) President, International Protective Security Board (IPSB) Dale and Elijah have forgotten more about the business of Protective Services than most will ever learn." Mark 'SIX' James Author, Defensive Handgun II "This is absolutely one of the top books I point to for people who are interested in getting into the profession." Harlan 'Hucky' Austin Founder, Bodyguard Careers




AIDCO Marketing - 5 Steps to Business Success


Book Description

Make yourself a brand name by following Dan Sommer's simple 5-Step Marketing plan that will take you from obscurity to success. Dan is a successful Consultant who provides Career Coaching to security entrepreneurs and small business managers. He teaches Success strategies to entrepreneurs, with a focus on differentiation & innovation in both Marketing & Business Management. The AIDCO Marketing 5-Steps to Business Success manual, will teach you how to make it in the global world of small business. Dan writes directly from his own experience and in his easy to understand "unedited and candid" language. If you want quick results from your marketing campaigns but you don't have a big marketing budget, then let Dan teach you how to do it. Dan will show you how you can grow your small business on a minimal budget through his simple 5-Step AIDCO Marketing Strategy. If you are a small business owner or entrepreneur, then you will soon come to regard the AIDCO Manual as your best marketing ally.




Surveillance and Threat Detection


Book Description

Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, fixed site facility can be integrated into an overall security footprint for any organization. - Understand the terrorist/criminal cycle and how to interrupt that cycle to prevent an attack - Understand how to encapsulate criminal and terrorist surveillance, analyze suspicious activity reports, and use an all-hazard, threat-based surveillance detection protection program - Access a full ancillary package, including instructor's manual, test banks, and student study exams




Army Chemical Review


Book Description




SEC Docket


Book Description




The Protection Specialist's Guide to Stalking & Harassment Threat Management


Book Description

This book provides a working standard and a set of guidelines to professionals working in the field of close personal protection or private investigation and who deal with clients who are victims of stalking and harassment. This book also provides the victims themselves, with a set of useful guidelines to assist in removing the threat of harm from a stalker or other violent offender.




To Catch a Spy


Book Description

In To Catch a Spy: The Art of Counterintelligence, former Chief of CIA counterintelligence James M. Olson offers a wake-up call for the American public, showing how the US is losing the intelligence war and how our country can do a better job of protecting its national security and trade secrets.