SECRET intelligence South African Secret Servnce REPUBLIC OF SOUTH AFRICA TECHNICAL INTELLIGENCE PROFILE SW 1.I TECHINT OPPORTUNITY ASSESSMENT Mark the services required with (xlf) Room Eavesdropping AudioSurveillance Room EavesdroppinL - VideoSurveillance Mobile Phone Interception Fax Interception Telephone Interception Computer Hard drive Cloning& Analysis PC Activity Monitoring Interception Photographic Services 2. NUMBER OF TARGETS Specify targets, both human and area/place Total number of Targets Names of target as perpriority level (1 being the highest priority level) 3. 4 Will it be possible to remotely monitor the Target? YES NO If YES, from where can monitoring be performed? From parked vehicle outside the Target area From another room in the same building From another building in the vicinity I ACCESS TO THE TARGET SECRET SECRET How is the access into and exit from the Target area going to be achieved Access Keys/Card Available Contact Support Agent to be Used Team to arrange for access Other means 5. LAYOUT OF THE TARGET AREA Attach photos of the target area Type of furniture in the room Is there any Bed Yes No Couch Yes No Chairs Yes No Air Yes No Other (Specify): Setup of electrical appliances and TV Yes No elecmc Air Conditioner Yes No Side Lamps Other (Specify): Emergency exits Are there any additional Brochure(s) Yes No attachments to assist in visualizing the target place available, If YES Ph?t?s(s) Yes No please attach. Video Clip(s) Yes No 6. NEED FOR TRANSLATION Translation needed? YES NO If YES what Ian ua e? Translator available? YES PROFILE OF TARGET Please fill in all the fields Name(s) Surname Country of origin SECRET SECRET Preferred Language Home Telephone number(s) Work Telephone number(s) Fax Number(s) Mobile Phone number(s) Satellite Phone number Email Address Vehicle Make, Colour, and Car Registration Employer Position Other 8. SECURITY AWARENESS OF TARGET Security I technology consciousness of the Target Any counter measures methods/techniques performed Eavesdropping Devices - Audio and Video Surveillance 9. RISK ASSESSMENT What are the chances of compromise and the risks involved? State below. 1d COVER FOR ACTION What is the Cover for action story? State below. Should the Technical Team use the same Cover for action story as YES NO the Applicant? 11 AVAILABLE TIME FOR DEVICE INSTALLATION Mark the appropriate option with (XIV) Minutes Hours Days Weeks SECRET SECRET 1A DURATION OF THE OPERATION Mark the ap oropriate option with Hours Days Weeks Months Years 13? POSSIBILITIES OF IN THE TARGET AREA Mark the appropriate TECHINT opportunity How often is the place "swept" What are the security measures used? E9 Surveillance cameras, security guard, ect. DATE: Client) NOT RECOMMENDED DATE: GENERAL MANAGER (Client) NOT APPROVED DATE: DEPUTY DIRECTOR GENERAL SECRET