Friday, February 20, 2009

The "E" in S.E.T.S. stands for Elicitation

Continuing with our S.E.T.S discussion, Auxiliarist Douthett provides a good explanation of Elicitation:

Have you ever had a conversation with someone and after you had some time to think about it you say to yourself "Hmmmm that was weird".

Elicitation, the second indicator in S.E.T.S., is someone asking seemingly unrelated questions about things or subjects to gain otherwise hidden information for illicit use.

Elicitation as it pertains to terrorism should leave you with that feeling of ‘why are they asking about that. However, in some cases, the person initiating the query for elicitation may be so well versed in their trade that you may not be aware that you have divulged important or useful information. The realization may come well after the conversation has ended or after an incident has occurred.

When having a conversation, if the person asks a question several different ways throughout the conversation, or continues to ask questions concerning a specific subject such as security, response time, or monitoring, you should suspect possible elicitation.

More to come

Lynwood D. Douthett
Marine Inspector
AUX Sector MDA Coordinator
Prevention Division
Sector Los Angeles - Long Beach

Wednesday, February 4, 2009

The "S" in S.E.T.S. stands for SURVEILLANCE

From our favorite Auxilarists, Mr. Lenny Douthett, comes the next installment of our S.E.T.S. explination:

The S.E.T.S. program defines surveillance as photographing, videotaping, drawing, mapping, and/or other means of monitoring a potential target.

In the simplest terms, each of us has engaged in surveillance at some point in time. Have you ever done internet research on where you're staying or things to do before going on a trip? Have you ever visited a marina or checked out a fishing spot before a weekend on the boat? Ever drawn a map, or marked a chart for someone to help them get to where they are going?

The moment we take a picture or record observed information about a particular area, person, place or thing, we are engaging in surveillance. The purpose for the recorded information dictates the type and the depth of the surveillance performed. This is the challenge in identifying when surveillance should be observed as a possible indicator of terrorist activity.

Surveillance as related to terrorist activity is usually the first identifiable step in a terrorist's plan to carry out an incident. But, how do we identify when we are actually observing possible terrorist surveillance activity?

As a rule, any time you observe a person photographing and taking notes, videotaping and taking notes or using other means of monitoring followed by note taking directed at critical infrastructure (such as bridges, tunnels, wharfs and terminals, etc...) you should record the activity and report it.

The S.E.T.S. program goes more in-depth on the subject of surveillance, the different kinds of surveillance and how to discern the difference between "innocent" surveillance that we all engage in on a daily basis.

More to come

-Lynwood D. Douthett, Aux