+1 704 557 0088




Covert Investigations & Surveillance Technologies are excellent methods of acquiring information; however they require sound techniques and the use of experienced, trained investigators and state-of-the-art technology. They are closely related because in each instance, the investigator banishes his or her official standing to an obscure identity in order to accomplish the mission. In undercover operations, the investigator may assume an entirely different identity, often requiring extensive preparations. Because of the total involvement, and in some cases, danger to the investigator, surveillance and undercover operations are used when necessary as the best way or, as in many instances, the only way of achieving the desired results.

Undercover operations and surveillance are both employed in a variety of ways and require special skills and qualifications. There are several required skills that the surveillant must be trained in prior to going undercover: Observation and Description, Selection and Utilization of Informants, Techniques of Undercover and Surveillance Activities, Foot and Vehicular Surveillance Techniques, Airborne and Marine Surveillance, Visual Surveillance, Computer Surveillance, Electronic Surveillance, Technical Equipment, and Surveillance Log.

Surveillance can be also categorized according to function. There is, for example, intelligence-seeking surveillance where the investigator attempts to learn everything he or she can about a potential crime or an activity that takes place within any type of industrial environment.


Undercover operations and surveillance can be defined as the secretive, continuous, and sometimes periodic watching of persons, vehicles, and places or objects to obtain information concerning the activities and identities of individuals or groups. Oftentimes, surveillance is the only investigative technique available to identify the source, couriers, and recipients of illegal substances (drugs), stolen items and the co-defendants and co-conspirators in an operation.

This program provides information and techniques for establishing and implementing covert investigative and surveillance activities within any industrial environment.


  • Familiarize participants with the basic principles of informant selection and control
  • Explain management and relationship of the informant and investigator
  • Determine the legal status of obtaining information
  • Discuss the procedures used in preserving and documenting information during informant and surveillance operations
  • Explain appearance and function of the Surveillant
  • Describe surveillant planning, Procedures and Methods of Surveillance
  • Discuss loose and close Surveillance Techniques and Procedures
  • Discuss Foot and Vehicular Surveillance methods and techniques
  • Demonstrate specialized Tools of the Trade and established “Tradecraft” practices.
  • Understand Technical Surveillance where Physical, Mechanical, Electronic, Telephone, Computer, or other Devices are used to Intercept Contents of Wire/Oral Communications & follow activities of Target


Instruction includes practical hands on demonstrations of devices

used in undercover and surveillance activities.

Practical exercises in surveillance will be conducted.




This course is designed for Security and Law Enforcement personnel whose job requires them to conduct investigations. It is beneficial to Detectives, Private Investigators, Public Defenders, Security Managers, Security Supervisors and other security personnel responsible for Investigations and Surveillance Activities.


Continuing Education Units (CEUs) are nationally recognized units in qualified programs which allow participants to document all non-academic credi work completed. CEUs may be used as evidence of increased performance capabilities and for job advancement, and are recognized by many professional organizations and companies.



Documentation of attendance at these programs may be submitted to the ASIS Professional Certification Board for consideration of recertification credit by qualified Certified Protection Professionals.




This “Covert Investigation & Surveillance Technologies”  program has been reviewed and is “Approved by the North Carolina Private Protective Services Board”. This Board regulates and licenses all Private Investigative, Security, & Counterintelligence activity within the State.




Zach Grove

Stephen Komorek

Gregory Scott


Additional instruction may be provided by other faculty members, which might include



CIST – Covert Investigation & Surveillance Technologies




CIST-01    Covert Techniques and Procedure


Development of Surveillance Technologies

Reasons for Covert Investigations

Preparation for Covert Operations


CIST-02    Informants

Selection of Sources & Informants

Motives of Sources & Informants

Source & Informant Management

Source &Informant Control

Meeting with Sources & Informants

Treatment of Sources & Informants


Legal Status of Source & Informant Information


CIST-03    Observation, Description & Identification


– Persons

– Objects

– Places

– Events

Techniques of Description                    Techniques of Identification


CIST-04    Surveillance

Types of Surveillance

– Techniques of Foot Surveillance

– Techniques of Vehicle Surveillance

– Techniques of Alternate Mobile Surveillance

– Automobile

– Truck

– Boat

– Aircraft

– Techniques of Fixed Surveillance


Methods of Surveillance


CIST-05    Technical Monitoring Methods

Communications Integrity

Surveillance Vans

Command Post Management


CIST-06    Tools of the Trade


Tool Kits


Trade Craft


CIST-07    Electrical Theory & Safety


Schematic Symbols

Basic Circuits

Measurements & Calculations


Batteries & Power Supplies

High Voltage Precautions

Electrical Safety


CIST-08   Wire Attacks & Communication Intercepts


Acoustics & Microphones


Types & Operation of Taps


Wire Tracing & Recording

Installation Practices & Entry Bypass

Countermeasures – TSCM



CIST-09   Audio Surveillance

RF Spectrum                    Wave Propagation                    Modulation                    Types of Transmitters                    Types of Receivers & Recorders                    Antennas                    Audio Filters & Equalization                    Countermeasures


CIST-10    Visual Surveillance

Types of Transmitters

Types of Receivers & Recorders                    Antennas                    Countermeasures


CIST-11    Tracking Surveillance

Types of Transmitters                    Types of Receivers                    Antennas                    Countermeasures


CIST-12    Telecommunications Surveillance

Types of Intercepts

– Hardware

– Software



CIST-13    Computer-based Surveillance

Types of Intercepts

– Hardware

– Software



CIST-14    Countermeasure Concerns

Moral & Ethical Issues                    Legal Responsibilities


CIST-15    Reference  Resources

Statistical data                    Technical Specifications                    Publications                    Equipment Providers                    Sources of Information                    Training Schools                    Certifications                    Associations                    Conferences & Exhibitions                    Glossary of Terms






Day 108:00 AM Registration & Check-in

Training Site


8:30 AM Welcome & Introduction

Executive Director
World Institute for Security Enhancement

Each Day Seminar  Format
08:00 – 12:00 Lecture / Discussion
12:00 Noon Lunch
13:00 – 17:00 PM Lecture / Discussion
17:00 PM Adjourn


The above timetable approximates the schedule for this course.

Instructors may choose to vary the program and any changes will be announced.



General Information:


World Institute for Security Enhancement courses are provided at our training sites across the United States and throughout the World. Most Open Session Courses  have been reviewed and are “Approved by the North Carolina Private Protective Services Board”.  This Board regulates and licenses all Private investigative, Security and Counterintelligence activity within the State of North Carolina.

ENROLLMENT:  Classroom space is limited. Please reserve your place now!

COURSE FEE:  $1,950.00 USD


FEE INCLUDES:  The course registration fee includes a attendee Reference Manual, Program Materials, a Mounted Certificate, and Daily Refreshments for most programs held at our United States training sites.


PAYMENT:  Payment in U. S. dollars is required with your registration form and must be received at least thirty (30) days prior to the beginning of the Class. Payment not received on time will automatically be placed in the next scheduled class.  Payment by Check or Money Order drawn on a U. S. Bank, in U. S. Dollars (USD), are accepted. Purchase orders or Training Requisition Forms Do Not constitute payment. Bank Transfers are Not accepted.


MEALS:  Lunches will not be provided.


DRESS:  Business casual is the recommended daily attire.


REFUNDS / CANCELLATIONS:   The Institute reserves the right to amend any program should circumstances warrant such action. In the event of course postponement or cancellation, the Institute will reschedule the course, or apply the fee payment to any other program offered in the next twelve months. Liability for course cancellation is specifically limited to the amount of prepaid course fees and excludes any incidental or consequential damages. Attendees must confirm cancellations or substitutions, in writing, at least THIRTY (30) days prior to the initial class date. Substitutions may be made, with written notice to the Institute, at least thirty (30) days prior to class commencement. There will be a 10% administrative fee for such a cancellation. Otherwise, fees are not refundable but may be transferred to another program of your choosing.


LODGING:  Lodging is NOT included. Each attendee is responsible for their own travel arrangements and lodging costs. Please make your room reservation at least three weeks prior to the initial class date.



INSTRUCTION:  While every effort is made to assure that scheduled instructors, equipment and training materials are present, unforeseen circumstances may occur. Therefore, the Institute reserves the right to substitute personnel and curriculum as required.