COLUMNS

Minding the Gaps: The Risks and Rewards of Information

Sep 15, 2016 | 08:00 GMT

Countersurveillance is one of the best tools a security professional can use to disrupt plots by terrorist operatives.
By identifying and monitoring information found only through surveillance, security teams can detect plots soon enough to stop them.

(ADAM BERRY/Getty Images)

In last week's Security Weekly, I talked about the threat posed by skilled and imaginative terrorists who are capable of conceiving, planning and conducting sophisticated attacks. Countering these novel means and tactics, in turn, takes an equally creative approach to crafting security measures. This idea dovetails nicely with a presentation I gave Sept. 14 at an InfraGard conference in Orlando on the dangers and limitations of using information found on the internet. The key point of my talk was that although a lot of data is available online and can be used by those planning an attack, there are also critical pieces of information that cannot be found on any website and can only be gleaned through physical surveillance. Where these two topics intersect is the terrorist attack cycle. No matter how innovative a terrorist planner is or how sophisticated his tradecraft, he is still bound by the constraints inherent to...

Keep Reading

Register to read three free articles

Proceed to sign up

Register Now

Already have an account?

Sign In