Counter Surveillance
   HOME

TheInfoList



OR:

Countersurveillance refers to measures that are usually undertaken by the public to prevent
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as c ...
, including
covert surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as c ...
. Countersurveillance may include electronic methods such as technical surveillance counter-measures, which is the process of detecting surveillance devices. It can also include covert listening devices, visual surveillance devices, and countersurveillance software to thwart unwanted cybercrime, such as accessing computing and mobile devices for various nefarious reasons (e.g. theft of financial, personal or corporate data). More often than not, countersurveillance will employ a set of actions (countermeasures) that, when followed, reduce the risk of surveillance. Countersurveillance is different from sousveillance (inverse surveillance), as the latter does not necessarily aim to prevent or reduce surveillance.


Types


Technical surveillance counter-measures


Electronic countermeasures

Most bugs emit some form of electromagnetic radiation, usually
radio wave Radio waves are a type of electromagnetic radiation with the longest wavelengths in the electromagnetic spectrum, typically with frequencies of 300 gigahertz (GHz) and below. At 300 GHz, the corresponding wavelength is 1 mm (short ...
s. The standard counter-measure for bugs is, therefore, to "sweep" for them with a receiver, looking for the radio emissions. Professional sweeping devices are very expensive. Low-tech sweeping devices are available through amateur electrical
magazine A magazine is a periodical publication, generally published on a regular schedule (often weekly or monthly), containing a variety of content. They are generally financed by advertising, purchase price, prepaid subscriptions, or by a combinatio ...
s, or they may be built from circuit designs on the Internet. Sweeping is not foolproof. Advanced bugs can be remotely operated to switch on and off, and some may even rapidly switch frequencies according to a predetermined pattern in order to make location with sweepers more difficult. A bug that has run out of power may not show up during a sweep, which means that the sweeper will not be alerted to the surveillance. Also some devices have no active parts, and an example is the Great Seal given to the
US Ambassador Ambassadors of the United States are persons nominated by the president to serve as the country's diplomatic representatives to foreign nations, international organizations, and as ambassadors-at-large. Under Article II, Section 2 of the U.S. ...
to Moscow which hid a device (the Thing).


Software countermeasures

Amidst concerns over privacy, software countermeasures have emerged to prevent cyber-intrusion, which is the unauthorized act of spying, snooping, and stealing
personally identifiable information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely accepted in the United States, but the phrase it abbreviates ha ...
or other proprietary assets (e.g. images) through
cyberspace Cyberspace is a concept describing a widespread interconnected digital technology. "The expression dates back from the first decade of the diffusion of the internet. It refers to the online world as a world 'apart', as distinct from everyday rea ...
. Popular interest in countersurveillance has been growing given media coverage of
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
violations: *
2013 mass surveillance disclosures Thirteen or 13 may refer to: * 13 (number), the natural number following 12 and preceding 14 * One of the years 13 BC, AD 13, 1913, 2013 Music * 13AD (band), an Indian classic and hard rock band Albums * ''13'' (Black Sabbath album), 2013 * ...
(
Snowden Snowden may refer to: * Snowden (surname), a given name and a family name People * Edward Snowden, former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013 Music * Snowden ...
/
NSA The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
PRISM). * Cyber crook who captured nude photos of Miss Teen USA 2013 by infiltrating through the webcam in her home. * ABC News program baby monitor hacked in the bedroom of a Houston toddler.


Human countermeasures

Most surveillance, and most countersurveillance, involves human methods rather than electronic methods since people are generally more vulnerable and more capable of reacting creatively to surveillance situations. Human countermeasures include: * Evasion: avoiding risky locations, being discreet or circumspect, using code words * Being situation-aware ("looking over your shoulder") * Leaving the area without being seen or followed e.g. getting "lost in the crowd" so that followers lose contact * Hiding in secure locations * Concealing one's identity Such activities make it harder to track surveillance subjects. Following steady, easy-to-predict schedules before employing aforementioned countermeasures may make the surveillance detail complacent and thus easier to lose.


Structural countermeasures

Another strategy is to utilize a room for safe conversations with these requisites: * Strict
access control In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of ''accessing'' may mean consuming ...
with locks and burglar alarm * Absence of windows or windows that cannot be reached by a laser microphone * Electromagnetic shielding through the realization of a
Faraday cage A Faraday cage or Faraday shield is an enclosure used to block electromagnetic fields. A Faraday shield may be formed by a continuous covering of conductive material, or in the case of a Faraday cage, by a mesh of such materials. Faraday cage ...
which covers doors, windows and walls * No or little electronic equipment, which must be sealed after being used * Few cables that can be easily controlled * Minimal furniture, preferably made of transparent materials * Prohibition of introduction of electronic equipment * Acoustic isolation * Regular inspections


Countersurveillance by countries

:''See List of counterintelligence organizations''


United States

TSCM (technical surveillance counter-measures) is the original United States Federal government
abbreviation An abbreviation (from Latin ''brevis'', meaning ''short'') is a shortened form of a word or phrase, by any method. It may consist of a group of letters or words taken from the full version of the word or phrase; for example, the word ''abbrevia ...
denoting the process of bug-sweeping or electronic countersurveillance. It is related to ELINT, SIGINT and electronic countermeasures (ECM). The United States Department of Defense defines a TSCM survey as a service provided by qualified personnel to detect the presence of technical
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as c ...
devices and hazards and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility. A TSCM survey will provide a professional evaluation of the facility's technical security posture and normally will consist of a thorough visual, electronic, and physical examination in and about the surveyed facility. However, this definition lacks some of the technical scope involved. COMSEC (communications security), ITSEC (information technology security) and physical security are also a major part of the work in the modern environment. The advent of multimedia devices and remote control technologies allow huge scope for removal of massive amounts of data in very secure environments by the staff employed within, with or without their knowledge. Technical Surveillance Countermeasures (TSCM) can best be defined as The systematic physical and electronic examination of a designated area by properly trained, qualified and equipped persons in an attempt to discover electronic eavesdropping devices, security hazards or security weaknesses.


Methodology


=Radio frequencies

= Most bugs transmit information, whether data, video, or voice, through the air by using radio waves. The standard counter-measure for bugs of this nature is to search for such an attack with a radio frequency (RF) receiver. Lab and even field-quality receivers are very expensive and a good, working knowledge of RF theory is needed to operate the equipment effectively. Counter-measures like burst transmission and spread spectrum make detection more difficult. The timing of detection surveys and location scans is critical to success, and varies with the type of location being scanned. For permanent facilities, scans and surveys must take place during working hours to detect remotely switchable devices that are turned off during non-working hours to defeat detection.


=Devices that do not emit radio waves

= Instead of transmitting conversations, bugs may record them. Bugs that do not emit radio waves are very difficult to detect, though there are a number of options for detecting such bugs. Very sensitive equipment could be used to look for
magnetic field A magnetic field is a vector field that describes the magnetic influence on moving electric charges, electric currents, and magnetic materials. A moving charge in a magnetic field experiences a force perpendicular to its own velocity and to ...
s, or for the characteristic
electrical noise In electronics, noise is an unwanted disturbance in an electrical signal. Noise generated by electronic devices varies greatly as it is produced by several different effects. In particular, noise is inherent in physics, and central to the ...
emitted by the computerized technology in digital tape recorders; however, if the place being monitored has many
computer A computer is a machine that can be programmed to Execution (computing), carry out sequences of arithmetic or logical operations (computation) automatically. Modern digital electronic computers can perform generic sets of operations known as C ...
s, photocopiers, or other pieces of
electrical equipment Electric(al) devices are devices that functionally rely on electric energy ( AC or DC) to drive their core parts (electric motors, transformers, lighting, rechargeable batteries, control electronics). They can be contrasted with traditional mech ...
installed, it may become very difficult. Items such as audio recorders can be very difficult to detect using electronic equipment. Most of these items will be discovered through a physical search. Another method is using very sensitive thermal cameras to detect residual heat of a bug, or power supply, that may be concealed in a wall or ceiling. The device is found by locating a hot spot the device generates that can be detected by the thermal camera. A method does exist to find hidden recorders, as these typically use a well known frequency for the clock which can never be totally shielded. A combination of existing techniques and resonance sweeps can often pick up even a defunct or "dead" bug in this way by measuring recent changes in the electromagnetic spectrum.


Technology used

Technology most commonly used for a bug sweep includes but is not limited to: * Broadband receivers to detect radiating hostile radio frequency transmissions in the near field. *
Flashlight A flashlight ( US, Canada) or torch ( UK, Australia) is a portable hand-held electric lamp. Formerly, the light source typically was a miniature incandescent light bulb, but these have been displaced by light-emitting diodes (LEDs) since the ...
one of the most important tools to have beside a ladder for providing a competent sweep. * Frequency scanner with a range of
antenna Antenna ( antennas or antennae) may refer to: Science and engineering * Antenna (radio), also known as an aerial, a transducer designed to transmit or receive electromagnetic (e.g., TV or radio) waves * Antennae Galaxies, the name of two collid ...
s and filters for checking the electromagnetic spectrum for signals that should not be there. * GSM detection equipment * WiFi and broadband detection equipment * Lens detectors to detect the lenses of wired or wireless concealed covert cameras. * Multimeters for general measurements of power supplies and device components. * Nonlinear junction detector (NLJD) to detect components associated with hidden eavesdropping devices. *
Oscilloscope An oscilloscope (informally a scope) is a type of electronic test instrument that graphically displays varying electrical voltages as a two-dimensional plot of one or more signals as a function of time. The main purposes are to display repetiti ...
for visualisation of signals. * Spectrum analyzer and
vector signal analyzer A vector signal analyzer is an instrument that measures the magnitude and phase of the input signal at a single frequency within the Intermediate frequency, IF Bandwidth (signal processing), bandwidth of the instrument. The primary use is to make i ...
for more advanced analysis of threatening and non threatening RF signals. * Thermal imagers to help find hot spots and areas higher in temperature than the ambient area temperature. Finds heat generated from active electronic components. * Time-domain reflectometer (TDR) for testing the integrity of copper telephone lines and other communication cables. * Tools for manual disassembling of objects and walls in order to visually check their content. This is the most important, most laborious, least glamorous and hence most neglected part of a check. *
Videoscope A flexible Videoscope or Video Borescope is an advanced type of borescope that houses a very small image sensor embedded into the tip of the scope. The video image is relayed from the distal tip and focusable lens assembly back to the display vi ...
s to inspect small or inaccessible spaces, such as wall spaces, HVAC components, vehicle crevices, etc. * Portable x-ray machine for checking the inside of objects and walls. * Electromagnetic pulse generators and directed energy uses high voltage and high current surges to temporarily disrupt or permanently disable electronic equipment. Many companies create the hardware and software necessary to engage in modern countersurveillance including Kestrel TSCM, SignalHound, 3dB Labs, Arcale, and many others.


Canada

In 2011, Defence Minister Peter MacKay authorized a program to search telephone and internet usage for suspicious activities. This program searches for and collects meta-data of Canadians across the country.


Canadian Movements

There are minimal anti-surveillance movements specifically targeted to Canada at present. Transparent Lives is a prominent Canadian organization that aims to "demonstrate dramatically just how visible we have all become to myriad organizations and what this means—for better or for worse—for how we conduct our everyday lives."


International movements currently active In Canada

Amnesty International Amnesty International (also referred to as Amnesty or AI) is an international non-governmental organization focused on human rights, with its headquarters in the United Kingdom. The organization says it has more than ten million members and sup ...
runs a campaign called #UnfollowMe that "calls on governments to ban mass surveillance and unlawful intelligence sharing", inspired by
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
leaking thousands of NSA documents that revealed information about mass surveillance in the U.S. This campaign is active worldwide.


See also

* Computer security * Communications security * Espionage *
Privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
* Sousveillance *
Dead drop A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals (e.g., a case officer and an agent, or two agents) using a secret location. By avoiding direct meetings, individuals ca ...
*
Cut-out (espionage) In espionage parlance, a cutout is a mutually trusted intermediary, method or channel of communication that facilitates the exchange of information between agents. Cutouts usually know only the source and destination of the information to be trans ...
*
Cyber security and countermeasure Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
* Common Vulnerabilities and Exposures * Privacy-enhancing technologies *
Personally identifiable information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely accepted in the United States, but the phrase it abbreviates ha ...
*
Countermeasure (computer) In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so ...
* Covert listening device * Encryption * Espionage *
Interagency Training Center The Interagency Training Center (ITC), also known as the Fort Washington Facility, is a National Security Agency (NSA) Central Security Service (CSS) school and training facility for technical surveillance counter-measures (TSCM) located in Fort Wa ...
, the U.S. government's TSCM training facility * Military intelligence *
Secure telephone A secure telephone is a telephone that provides Secure voice, voice security in the form of end-to-end encryption for the telephone call, and in some cases also the mutual authentication of the call parties, protecting them against a man-in-the-mi ...
*
Security engineering Security engineering is the process of incorporating security controls into an information system so that the controls become an integral part of the system’s operational capabilities. It is similar to other systems engineering activities in tha ...
* Telephone tapping


References

{{Intelligence cycle management Counterintelligence Espionage techniques Surveillance Espionage Covert listening devices