HOME

TheInfoList



OR:

Countersurveillance refers to measures that are usually undertaken by the public to prevent surveillance, including covert surveillance. Countersurveillance may include electronic methods such as technical surveillance counter-measures, which is the process of detecting surveillance devices. It can also include
covert listening device A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and ...
s, visual surveillance devices, and countersurveillance software to thwart unwanted
cybercrime A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing th ...
, such as accessing computing and mobile devices for various nefarious reasons (e.g. theft of financial, personal or corporate data). More often than not, countersurveillance will employ a set of actions (countermeasures) that, when followed, reduce the risk of surveillance. Countersurveillance is different from
sousveillance Sousveillance ( ) is the recording of an activity by a member of the public, rather than a person or organisation in authority, typically by way of small wearable or portable personal technologies. The term, coined by Steve Mann, stems from th ...
(inverse surveillance), as the latter does not necessarily aim to prevent or reduce surveillance.


Types


Technical surveillance counter-measures


Electronic countermeasures

Most bugs emit some form of
electromagnetic radiation In physics, electromagnetic radiation (EMR) consists of waves of the electromagnetic (EM) field, which propagate through space and carry momentum and electromagnetic radiant energy. It includes radio waves, microwaves, infrared, (visible) li ...
, usually radio waves. The standard counter-measure for bugs is, therefore, to "sweep" for them with a receiver, looking for the radio emissions. Professional sweeping devices are very expensive. Low-tech sweeping devices are available through amateur electrical magazines, or they may be built from circuit designs on the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
. Sweeping is not foolproof. Advanced bugs can be remotely operated to switch on and off, and some may even rapidly switch frequencies according to a predetermined pattern in order to make location with sweepers more difficult. A bug that has run out of power may not show up during a sweep, which means that the sweeper will not be alerted to the surveillance. Also some devices have no active parts, and an example is the Great Seal given to the
US Ambassador Ambassadors of the United States are persons nominated by the president to serve as the country's diplomatic representatives to foreign nations, international organizations, and as ambassadors-at-large. Under Article II, Section 2 of the U.S ...
to Moscow which hid a device (the
Thing Thing or The Thing may refer to: Philosophy * An object * Broadly, an entity * Thing-in-itself (or ''noumenon''), the reality that underlies perceptions, a term coined by Immanuel Kant * Thing theory, a branch of critical theory that focuse ...
).


Software countermeasures

Amidst concerns over privacy,
software Software is a set of computer programs and associated software documentation, documentation and data (computing), data. This is in contrast to Computer hardware, hardware, from which the system is built and which actually performs the work. ...
countermeasures have emerged to prevent cyber-intrusion, which is the unauthorized act of spying, snooping, and stealing personally identifiable information or other proprietary assets (e.g. images) through cyberspace. Popular interest in countersurveillance has been growing given media coverage of privacy violations: *
2013 mass surveillance disclosures Thirteen or 13 may refer to: * 13 (number), the natural number following 12 and preceding 14 * One of the years 13 BC, AD 13, 1913, 2013 Music * 13AD (band), an Indian classic and hard rock band Albums * ''13'' (Black Sabbath album), 2013 * ...
( Snowden/
NSA The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
PRISM Prism usually refers to: * Prism (optics), a transparent optical component with flat surfaces that refract light * Prism (geometry), a kind of polyhedron Prism may also refer to: Science and mathematics * Prism (geology), a type of sedimentary ...
). * Cyber crook who captured nude photos of Miss Teen USA 2013 by infiltrating through the webcam in her home. *
ABC News ABC News is the news division of the American broadcast network ABC. Its flagship program is the daily evening newscast ''ABC World News Tonight, ABC World News Tonight with David Muir''; other programs include Breakfast television, morning ...
program baby monitor hacked in the bedroom of a Houston toddler.


Human countermeasures

Most surveillance, and most countersurveillance, involves human methods rather than electronic methods since people are generally more vulnerable and more capable of reacting creatively to surveillance situations. Human
countermeasure A countermeasure is a measure or action taken to counter or offset another one. As a general concept, it implies precision and is any technological or tactical solution or system designed to prevent an undesirable outcome in the process. The fi ...
s include: * Evasion: avoiding risky locations, being discreet or circumspect, using code words * Being situation-aware ("looking over your shoulder") * Leaving the area without being seen or followed e.g. getting "lost in the crowd" so that followers lose contact * Hiding in secure locations * Concealing one's identity Such activities make it harder to track surveillance subjects. Following steady, easy-to-predict schedules before employing aforementioned countermeasures may make the surveillance detail complacent and thus easier to lose.


Structural countermeasures

Another strategy is to utilize a room for safe conversations with these requisites: * Strict access control with
locks Lock(s) may refer to: Common meanings *Lock and key, a mechanical device used to secure items of importance *Lock (water navigation), a device for boats to transit between different levels of water, as in a canal Arts and entertainment * ''Lock ...
and
burglar alarm A security alarm is a system designed to detect intrusion, such as unauthorized entry, into a building or other areas such as a home or school. Security alarms used in residential, commercial, industrial, and military properties protect against ...
* Absence of
window A window is an opening in a wall, door, roof, or vehicle that allows the exchange of light and may also allow the passage of sound and sometimes air. Modern windows are usually glazed or covered in some other transparent or translucent mat ...
s or windows that cannot be reached by a
laser microphone A laser microphone is a surveillance device that uses a laser beam to detect sound vibrations in a distant object. It can be used to eavesdrop with minimal chance of exposure. The object is typically inside a room where a conversation is taking p ...
*
Electromagnetic shielding In electrical engineering, electromagnetic shielding is the practice of reducing or blocking the electromagnetic field (EMF) in a space with barriers made of conductive or magnetic materials. It is typically applied to enclosures, for isolatin ...
through the realization of a Faraday cage which covers doors, windows and walls * No or little electronic equipment, which must be sealed after being used * Few cables that can be easily controlled * Minimal furniture, preferably made of transparent materials * Prohibition of introduction of electronic equipment * Acoustic isolation * Regular inspections


Countersurveillance by countries

:''See
List of counterintelligence organizations Counterintelligence organizations and agencies attempt to prevent foreign intelligence organizations from successfully gathering and collecting intelligence against the governments they serve. Active counterintelligence organizations Currentl ...
''


United States

TSCM (technical surveillance counter-measures) is the original
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territori ...
Federal government abbreviation denoting the process of bug-sweeping or electronic countersurveillance. It is related to
ELINT Signals intelligence (SIGINT) is intelligence-gathering by interception of '' signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication ...
,
SIGINT Signals intelligence (SIGINT) is intelligence-gathering by interception of '' signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication ...
and
electronic countermeasures An electronic countermeasure (ECM) is an electrical or electronic device designed to trick or deceive radar, sonar, or other detection systems, like infrared (IR) or lasers. It may be used both offensively and defensively to deny targeting info ...
(ECM). The
United States Department of Defense The United States Department of Defense (DoD, USDOD or DOD) is an executive branch department of the federal government charged with coordinating and supervising all agencies and functions of the government directly related to national sec ...
defines a TSCM survey as a service provided by qualified personnel to detect the presence of technical surveillance devices and hazards and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility. A TSCM survey will provide a professional evaluation of the facility's technical security posture and normally will consist of a thorough visual, electronic, and physical examination in and about the surveyed facility. However, this definition lacks some of the technical scope involved. COMSEC (communications security), ITSEC (information technology security) and physical security are also a major part of the work in the modern environment. The advent of multimedia devices and remote control technologies allow huge scope for removal of massive amounts of data in very secure environments by the staff employed within, with or without their knowledge. Technical Surveillance Countermeasures (TSCM) can best be defined as The systematic physical and electronic examination of a designated area by properly trained, qualified and equipped persons in an attempt to discover electronic eavesdropping devices, security hazards or security weaknesses.


Methodology


=Radio frequencies

= Most bugs transmit information, whether data, video, or voice, through the air by using radio waves. The standard counter-measure for bugs of this nature is to search for such an attack with a
radio frequency Radio frequency (RF) is the oscillation rate of an alternating electric current or voltage or of a magnetic, electric or electromagnetic field or mechanical system in the frequency range from around to around . This is roughly between the ...
(RF) receiver. Lab and even field-quality receivers are very expensive and a good, working knowledge of RF theory is needed to operate the equipment effectively. Counter-measures like
burst transmission In telecommunication, a burst transmission or data burst is the broadcast of a relatively high-bandwidth transmission over a short period. Burst transmission can be intentional, broadcasting a compressed message at a very high data signaling rate ...
and
spread spectrum In telecommunication and radio communication, spread-spectrum techniques are methods by which a signal (e.g., an electrical, electromagnetic, or acoustic signal) generated with a particular bandwidth is deliberately spread in the frequency d ...
make detection more difficult. The timing of detection surveys and location scans is critical to success, and varies with the type of location being scanned. For permanent facilities, scans and surveys must take place during working hours to detect remotely switchable devices that are turned off during non-working hours to defeat detection.


=Devices that do not emit radio waves

= Instead of transmitting conversations, bugs may record them. Bugs that do not emit radio waves are very difficult to detect, though there are a number of options for detecting such bugs. Very sensitive equipment could be used to look for magnetic fields, or for the characteristic
electrical noise In electronics, noise is an unwanted disturbance in an electrical signal. Noise generated by electronic devices varies greatly as it is produced by several different effects. In particular, noise is inherent in physics, and central to the ...
emitted by the computerized technology in digital tape recorders; however, if the place being monitored has many computers,
photocopier A photocopier (also called copier or copy machine, and formerly Xerox machine, the generic trademark) is a machine that makes copies of documents and other visual images onto paper or plastic film quickly and cheaply. Most modern photocopiers ...
s, or other pieces of electrical equipment installed, it may become very difficult. Items such as audio recorders can be very difficult to detect using electronic equipment. Most of these items will be discovered through a physical search. Another method is using very sensitive
thermal camera A thermal column (or thermal) is a rising mass of buoyant air, a convective current in the atmosphere, that transfers heat energy vertically. Thermals are created by the uneven heating of Earth's surface from solar radiation, and are an example ...
s to detect residual heat of a bug, or power supply, that may be concealed in a wall or ceiling. The device is found by locating a hot spot the device generates that can be detected by the thermal camera. A method does exist to find hidden recorders, as these typically use a well known frequency for the clock which can never be totally shielded. A combination of existing techniques and resonance sweeps can often pick up even a defunct or "dead" bug in this way by measuring recent changes in the electromagnetic spectrum.


Technology used

Technology most commonly used for a bug sweep includes but is not limited to: * Broadband receivers to detect radiating hostile radio frequency transmissions in the near field. * Flashlight one of the most important tools to have beside a ladder for providing a competent sweep. * Frequency scanner with a range of antennas and
filter Filter, filtering or filters may refer to: Science and technology Computing * Filter (higher-order function), in functional programming * Filter (software), a computer program to process a data stream * Filter (video), a software component tha ...
s for checking the
electromagnetic spectrum The electromagnetic spectrum is the range of frequencies (the spectrum) of electromagnetic radiation and their respective wavelengths and photon energies. The electromagnetic spectrum covers electromagnetic waves with frequencies ranging fro ...
for signals that should not be there. * GSM detection equipment *
WiFi Wi-Fi () is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio wa ...
and broadband detection equipment * Lens detectors to detect the lenses of wired or wireless concealed covert cameras. *
Multimeter A multimeter is a measuring instrument that can measure multiple electrical properties. A typical multimeter can measure voltage, resistance, and current, in which case it is also known as a volt-ohm-milliammeter (VOM), as the unit is equipped w ...
s for general measurements of power supplies and device components. *
Nonlinear junction detector The non-linear junction detector, or an NLJD, is a device that illuminates a small region of space with high-frequency RF energy. Any "non linear junction" in the vicinity—for example, and particularly, the p-n junction—will receive this e ...
(NLJD) to detect components associated with hidden eavesdropping devices. * Oscilloscope for visualisation of signals. *
Spectrum analyzer A spectrum analyzer measures the magnitude of an input signal versus frequency within the full frequency range of the instrument. The primary use is to measure the power of the spectrum of known and unknown signals. The input signal that most co ...
and
vector signal analyzer A vector signal analyzer is an instrument that measures the magnitude and phase of the input signal at a single frequency within the IF bandwidth of the instrument. The primary use is to make in-channel measurements, such as error vector magnitud ...
for more advanced analysis of threatening and non threatening RF signals. * Thermal imagers to help find hot spots and areas higher in temperature than the ambient area temperature. Finds heat generated from active electronic components. *
Time-domain reflectometer A time-domain reflectometer (TDR) is an electronic instrument used to determine the characteristics of electrical lines by observing reflected waveforms. It can be used to characterize and locate faults in metallic cables (for example, twisted pa ...
(TDR) for testing the integrity of copper telephone lines and other communication cables. *
Tool A tool is an object that can extend an individual's ability to modify features of the surrounding environment or help them accomplish a particular task. Although many animals use simple tools, only human beings, whose use of stone tools dates ba ...
s for manual disassembling of objects and walls in order to visually check their content. This is the most important, most laborious, least glamorous and hence most neglected part of a check. * Videoscopes to inspect small or inaccessible spaces, such as wall spaces, HVAC components, vehicle crevices, etc. * Portable
x-ray An X-ray, or, much less commonly, X-radiation, is a penetrating form of high-energy electromagnetic radiation. Most X-rays have a wavelength ranging from 10  picometers to 10  nanometers, corresponding to frequencies in the range 30&nb ...
machine for checking the inside of objects and walls. * Electromagnetic pulse generators and directed energy uses high voltage and high current surges to temporarily disrupt or permanently disable electronic equipment. Many companies create the hardware and software necessary to engage in modern countersurveillance including Kestrel TSCM, SignalHound, 3dB Labs, Arcale, and many others.


Canada

In 2011, Defence Minister
Peter MacKay Peter Gordon MacKay (born September 27, 1965) is a Canadian lawyer and politician. He was a Member of Parliament from 1997 to 2015 and has served as Minister of Justice and Attorney General (2013–2015), Minister of National Defence (2007� ...
authorized a program to search telephone and internet usage for suspicious activities. This program searches for and collects meta-data of Canadians across the country.


Canadian Movements

There are minimal anti-surveillance movements specifically targeted to Canada at present. Transparent Lives is a prominent Canadian organization that aims to "demonstrate dramatically just how visible we have all become to myriad organizations and what this means—for better or for worse—for how we conduct our everyday lives."


International movements currently active In Canada

Amnesty International runs a campaign called #UnfollowMe that "calls on governments to ban mass surveillance and unlawful intelligence sharing", inspired by Edward Snowden leaking thousands of NSA documents that revealed information about mass surveillance in the U.S. This campaign is active worldwide.


See also

*
Computer security Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
* Communications security *
Espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangib ...
* Privacy *
Sousveillance Sousveillance ( ) is the recording of an activity by a member of the public, rather than a person or organisation in authority, typically by way of small wearable or portable personal technologies. The term, coined by Steve Mann, stems from th ...
* Dead drop * Cut-out (espionage) * Cyber security and countermeasure *
Common Vulnerabilities and Exposures The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States' National Cybersecurity FFRDC, operated by The MITRE Corporation, mainta ...
*
Privacy-enhancing technologies Privacy-enhancing technologies (PET) are technologies that embody fundamental data protection principles by minimizing personal data use, maximizing data security, and empowering individuals. PETs allow User (computing), online users to protect the ...
* Personally identifiable information *
Countermeasure (computer) In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so ...
*
Covert listening device A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and ...
*
Encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can de ...
*
Espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangib ...
* Interagency Training Center, the U.S. government's TSCM training facility *
Military intelligence Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to assist commanders in their decisions. This aim is achieved by providing an assessment of data from a ...
* Secure telephone * Security engineering *
Telephone tapping Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitorin ...


References

{{Intelligence cycle management Counterintelligence Espionage techniques Surveillance Espionage Covert listening devices