Electronic listening devices, surreptitious video cameras, and surveillance carried out via the Internet can provide a wealth of information as well as create potentially dangerous security breaches. Students in this course will learn to describe different methods of technical surveillance and explain their capabilities. They will learn to identify signs of their use against a target, and to determine the appropriate countermeasures to apply. The class will also discuss the major legal issues involved in technical surveillance and describe current policy issues related to this subject.
Identify, describe and critical-ly evaluate information sources and applicable intelli-gence technologies to re-search aspects of technical surveillance
Appraise the threats, chal-lenges and issues related to technical surveillance
Analyze specific security ap-plications for technical sur-veillance and research ad-vantages,disadvantages, methods, etc.
Identify and explain the legal and ethical issues raised by the use of electronic surveil-lance
Develop general professional written and oral reports and presentations on the subject of technical surveillance.
To request an application or get information about any of our strategic security programs, fill out the form below. An Admissions Advisor will be in touch within one business day to answer your questions. Or contact us directly at 888-852-8746
email@example.com ext. 1