One of the objectives is to assess the capabilities of existing security systems and discern weaknesses for potential exploitation. Terrorists closely examine security procedures, such as shift changes, access control, and roving patrols, alertness of security guards, models and types of locks, presence of closed-circuit cameras, response measures and guard dogs. After identifying weaknesses, terrorists usually plan their attack options at the point or points of greatest vulnerability.
Terrorist surveillance is one of the topics covered in the one-day Corporate Response to Terrorism Workshop (3 July 2008 and 16 October 2008), which forms part of Security Management Stage 2. Contact Janet for details.