• Organization of surveillance;
• Provision of quick radio communication;
• Provision of special technical equipment, such as: arched metal detectors, introscopes, hand-held metal detectors, etc.;
• Identification of technical channels of information leakage.