Jump to ratings and reviews
Rate this book

Countering Hostile Surveillance: Detect, Evade, and Neutralize Physical Surveillance Threats

Rate this book
From the author of the highly regarded training manuals Secrets of Surveillance and Surveillance Countermeasures comes the next course in identifying and evading hostile surveillance in the real world.

Every day in all parts of the world, hostile surveillance forces are stalking and exploiting unwitting prey -- be they private citizens, corporate employees or national security agents. This book demonstrates how the intended prey can detect, evade and, if necessary, turn the tables and assume the role of the predator to neutralize this threat.

This is not a book on evading garden-variety physical surveillance. Instead, this important manual provides the security professional with the tools he needs to operate at a master's level in the field of surveillance countermeasures. In step-by-step detail, it explains concepts, techniques and procedures that have been proven effective against the spectrum of surveillance capabilities ranging from the very basic to the world's most sophisticated.

Security professionals who want to be on top of their game, as well as private citizens seeking to protect themselves and their families, need the street-tested information in this book.

132 pages, Paperback

First published January 1, 2008

4 people are currently reading
57 people want to read

About the author

ACM IV Security Services

7 books4 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
3 (21%)
4 stars
5 (35%)
3 stars
3 (21%)
2 stars
2 (14%)
1 star
1 (7%)
Displaying 1 of 1 review
Profile Image for Greg.
Author 2 books11 followers
August 6, 2011
The information in the book was fine, it was just written in such a dry, verbose, academic manner that made me want to give up. They actually had a chapter trying to equate chaos theory to counter surveillance! The whole book could be shortened to explain 2 valuable techniques that most people could probably figure out on their own.

Displaying 1 of 1 review

Can't find what you're looking for?

Get help and learn more about the design.