Countersurveillance
Encyclopedia
Countersurveillance refers to measures undertaken to prevent surveillance
Surveillance
Surveillance is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes done in a surreptitious manner...

, including covert surveillance. Countersurveillance may include electronic methods such as bug sweeping, the process of detecting surveillance devices, including covert listening device
Covert listening device
A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, is a common technique in surveillance, espionage and in police investigations.A bug does not have to be a device...

s and visual surveillance devices. More often than not, countersurveillance will employ a set of actions (countermeasures) that, when followed, reduce the risk of surveillance. Countersurveillance should not be confused with sousveillance
Sousveillance
Sousveillance refers to the recording of an activity by a participant in the activity typically by way of small wearable or portable personal technologies.Sousveillance has also been described as "inverse surveillance", i.e...

 (inverse surveillance) as the latter does not necessarily aim to prevent or reduce surveillance.

Electronic countermeasures

For main article, see Technical surveillance counter-measures
Technical Surveillance Counter-Measures
TSCM is the original United States Federal government abbreviation denoting the process of bug-sweeping or electronic countersurveillance...



Most bugs emit some form of electromagnetic radiation
Electromagnetic radiation
Electromagnetic radiation is a form of energy that exhibits wave-like behavior as it travels through space...

, usually radio wave
Radio Wave
Radio Wave may refer to:*Radio frequency*Radio Wave 96.5, a radio station in Blackpool, UK...

s. The standard counter-measure for bugs is therefore to "sweep" for them with a receiver, looking for the radio emissions. Professional sweeping devices are very expensive. Low-tech sweeping devices are available through amateur electrical magazine
Magazine
Magazines, periodicals, glossies or serials are publications, generally published on a regular schedule, containing a variety of articles. They are generally financed by advertising, by a purchase price, by pre-paid magazine subscriptions, or all three...

s, or they may be built from circuit designs on the Internet
Internet
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide...

.

Sweeping is not foolproof. Advanced bugs can be remotely operated to switch on and off, and some even rapidly switch frequencies according to a predetermined pattern in order to make location with sweepers more difficult. A bug that has run out of power may not show up during a sweep, which means that the sweeper will not be alerted to the surveillance. Also some devices have no active parts, an example is the Great Seal given to the US Ambassador to Moscow which hid a device (the Thing
Thing (listening device)
The Thing, also known as the Great Seal bug, was one of the first covert listening devices to use passive techniques to transmit an audio signal...

).

Human countermeasures

For main article, see Counter-intelligence
Counter-intelligence
Counterintelligence or counter-intelligence refers to efforts made by intelligence organizations to prevent hostile or enemy intelligence organizations from successfully gathering and collecting intelligence against them. National intelligence programs, and, by extension, the overall defenses of...



Most surveillance uses human, rather than electronic methods.

The methods of countersurveillance come straight from the movies and television. Some of these are:
  • Leave the area without surveillance assets following - slip in a subway train, catch other transportation that cannot be followed.
  • Get lost in the crowd - lose contact
  • Hiding
  • Simply looking "over-your-shoulder"

In the United States military

The United States military refers to electronic countersurveillance as "technical surveillance counter-measures" (TSCM) and relates it to ELINT, SIGINT
SIGINT
Signals intelligence is intelligence-gathering by interception of signals, whether between people , whether involving electronic signals not directly used in communication , or combinations of the two...

 and ECM
Electronic countermeasures
An electronic countermeasure is an electrical or electronic device designed to trick or deceive radar, sonar or other detection systems, like infrared or lasers. It may be used both offensively and defensively to deny targeting information to an enemy...

.

The United States Department of Defense
United States Department of Defense
The United States Department of Defense is the U.S...

 defines a TSCM survey as a service provided by qualified personnel to detect the presence of technical surveillance
Surveillance
Surveillance is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes done in a surreptitious manner...

 devices and hazards and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility. A TSCM survey will provide a professional evaluation of the facility's technical security posture and normally will consist of a thorough visual, electronic, and physical examination in and about the surveyed facility.

This definition is however lacking some of the technical scope involved. COMSEC (communications security), ITSEC (information technology security) and physical security are also a major part of the work in the modern environment. The advent of multimedia devices and remote control technologies allow huge scope for removal of massive amounts of data in very secure environments by the staff employed within, with or without their knowledge.

See also

  • Communications security
    Communications security
    Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients. In the United States Department of Defense culture, it is often referred to by the abbreviation...

  • Espionage
    Espionage
    Espionage or spying involves an individual obtaining information that is considered secret or confidential without the permission of the holder of the information. Espionage is inherently clandestine, lest the legitimate holder of the information change plans or take other countermeasures once it...

  • Privacy
    Privacy
    Privacy is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively...

  • Sousveillance
    Sousveillance
    Sousveillance refers to the recording of an activity by a participant in the activity typically by way of small wearable or portable personal technologies.Sousveillance has also been described as "inverse surveillance", i.e...

  • Dead drop
    Dead drop
    A dead drop or dead letter box is a method of espionage tradecraft used to pass items between two individuals by using a secret location and thus does not require them to meet directly. Using a dead drop permits a Case Officer and his Agent to exchange objects and information while maintaining...

  • Cut-out (espionage)
    Cut-out (espionage)
    In espionage parlance, a cutout is a mutually trusted intermediary, method or channel of communication, facilitating the exchange of information between agents. Cutouts usually only know the source and destination of the information to be transmitted, but are unaware of the identities of any other...

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK