Covert Tradecraft and Surveillance Training
With a team of experts drawn from the UK government and security agencies, Special Forces, military, police and the National Crime Agency (NCA) we provide an extensive range training in covert tradecraft, agent recruitment and running, expeditionary surveillance, foot and mobile surveillance, technical surveillance, close target reconnaissance, covert rural surveillance (CROPS), covert method of entry and associated disciplines.
Running and managing covert operations is a highly specialised area requiring a range of skills, abilities, covert equipment, and other covert assets.
Having an effective covert capability brings with it significant operational advantages and provides options for operational managers not otherwise available, enabling intelligence gathering operations and investigations to be delivered more effectively. Futurum supports clients in developing and maintaining an effective skill base and infrastructure to run these operations.
We cover all aspects of covert operations including conventional surveillance, foot and mobile surveillance, technical surveillance, covert method of entry, reconnaissance, close target reconnaissance (CTR), agent (also referred to as CHIS, informants, covert sources) recruitment running and management. We also have an extensive intelligence, social media and open source exploitation and analysis, and Internet investigation portfolio that is designed to help develop the analysis skills alongside, and integral to the covert capability.
Covert and Operational Surveillance Training Courses
- Foot and public transport surveillance - A one-week course designed to equip delegates with basic surveillance tradecraft skills. This includes surveillance aims and objectives, dress and mannerisms, requirements of a surveillance operative, glossary of terms/surveillance language, observation points, foot principles, anti and counter surveillance tactics, trigger or short term observation points, reconnaissance of the plot, operational orders, cover, compromise drills, public transport, photography / video recording tactics and technical equipment, evidence recovery, log keeping and surveillance management.
- Mobile surveillance - A two-week course designed to equip delegates with basic vehicle surveillance tradecraft skills. This includes mobile surveillance theory, mobile glossary and language, map reading, mobile surveillance tactics, boxing, stop and plot, extending the plot, total loss procedures, motorways/highways, mobile surveillance log keeping, photography and video recording tactics.
- Technical surveillance (vehicles) - A two-week course covering vehicle surveillance using technical aides.
- Technical surveillance (concealments in vehicles and premises) - A three-week course designed to equip delegates with skills and tradecraft to deploy technical surveillance equipment. This includes aims and objectives of the technical surveillance, technical equipment, protection teams, vehicle types, planning operations, reconnaissance, deployments, concealments, impromptu changes, urban and rural deployments, residential deployments.
- Technical surveillance (persons) - A one-week course designed to equip delegates with skills and tradecraft to deploy personal related technical surveillance equipment. This includes aims and objectives of the surveillance, technical equipment, concealment types, evidence and intelligence integrity.
- Close target reconnaissance (CTR) – the acquisition of intelligence on an intended target through close surveillance.
- Covert forensic recovery – Surveillance operatives will often be required to recover potential physical evidence or intelligence during surveillance operations. This course will provide the delegates with the skills to do this covertly and to a UK evidential standard.
- Covert method of entry (CME) – This course will provide the delegates with the skills, tradecraft and tools needed to support technical surveillance operations and gain entry to premises or vehicles covertly.
- The recruitment and handling of agents – This course will equip delegates with the skills and tradecraft required to recruit and run agents and includes the types of agent and agent motivations, targeting operations, recruitment, cover, planning meetings, counter surveillance, risk assessments and agent debriefing skills.
- Covert Rural Observation Post Operatives (CROPS) – The skills, tradecrafts and tools to conduct rural surveillance and remain under cover for protracted periods.
- Managing covert operations - This is a two-week course. Week one will cover the theoretical aspects of planning and running covert operations. Week two will be focused on a scenario-based series of practical exercises aimed at replicating in the classroom the planning and leading of a covert intelligence operation.
- Establishing and managing covert monitoring posts – This course will equip delegates with the knowledge and skills needed to effective run covert monitoring posts and handle to product form technical surveillance operations to a UK evidential standard.
- Covert elicitation – Elicitation is the art of using of conversation to subtly acquire information about a person, their life and background, future plans, work and projects they are engaged on, and about their work colleagues. Elicitation is an effective way to gain knowledge without raising suspicion and will appear to be normal conversation where the target will not realise he or she has provided useful information.
- Covert Internet/online investigations – A one-week course aimed and providing delegates with the skills and tools required to conduct online investigations and recover intelligence and evidence to a UK evidential standard with full audit trail.
- Undercover operatives – Our covert operatives training covers foundation level through to advanced and will enable delegates to undertake test purchase and decoy operations through to full covert infiltrations.
- Operational security (OPSY) – This course is designed to cover all aspects of operational security to limit the likelihood of operational compromise, and to provide a framework on how to respond in the event of a compromise.