Tracking the Asymmetric Threat - Operational Requirements and Technical Solutions for Security Applications