-->

Tuesday, September 26, 2017

Countersurveillance refers to measures undertaken to prevent surveillance, including covert surveillance. Countersurveillance may include electronic methods such as bug sweeping, the process of detecting surveillance devices, including covert listening devices, visual surveillance devices as well as Countersurveillance software to thwart unwanted attempts by cyber crooks to access computing and mobile devices for various nefarious reasons (e.g. theft of financial, personal or corporate data). More often than not, countersurveillance will employ a set of actions (countermeasures) that, when followed, reduce the risk of surveillance. Countersurveillance should not be confused with sousveillance (inverse surveillance) as the latter does not necessarily aim to prevent or reduce surveillance.

Types of Countersurveillance



source : topsy.one

Electronic countermeasures

For main article, see Technical surveillance counter-measures

Most bugs emit some form of electromagnetic radiation, usually radio waves. The standard counter-measure for bugs is therefore to "sweep" for them with a receiver, looking for the radio emissions. Professional sweeping devices are very expensive. Low-tech sweeping devices are available through amateur electrical magazines, or they may be built from circuit designs on the Internet.

Sweeping is not foolproof. Advanced bugs can be remotely operated to switch on and off, and some even rapidly switch frequencies according to a predetermined pattern in order to make location with sweepers more difficult. A bug that has run out of power may not show up during a sweep, which means that the sweeper will not be alerted to the surveillance. Also some devices have no active parts, an example is the Great Seal given to the US Ambassador to Moscow which hid a device (the Thing).

Software countermeasures

Amidst concerns over privacy, software countermeasures have emerged to prevent cyber-intrusion, the un-authorized act of spying, snooping, and stealing personally identifiable information or other proprietary assets (e.g. images) through cyberspace.

Popular interest in Countersurveillance and has been growing given media coverage of privacy violations:

  • 2013 mass surveillance disclosures (Snowden/NSA PRISM).
  • Cyber crook who captured nude photos of Miss Teen USA 2013 by infiltrating thru the webcam in her home.
  • ABC News program baby monitor hacked in the bedroom of a Houston toddler.

Human countermeasures

For main article, see Counterintelligence

Most surveillance, and most counter-surveillance, involves human rather than electronic methods since people are generally more vulnerable and more capable of reacting creatively to surveillance situations.

Human countermeasures include:

  • Evasion: avoiding risky locations, being discreet or circumspect, using code words
  • Being 'situation-aware' (looking over-your-shoulder)
  • Leaving the area without being seen or followed e.g. getting 'lost in the crowd' so that followers lose contact
  • Hiding in secure locations
  • Concealing your identity

Such activities make it harder to track surveillance subjects. Following steady, easy-to-predict schedules before employing aforementioned countermeasures may make the surveillance detail complacent and thus easier to lose. If you suspect your followers are working for a nation state, avoid known residences (including known associates and family). Electronic surveillance (e.g. phone and network tracking) often accompanies physical tracking, so discard mobile phones, bank cards, identity cards and other portable computer devices as untrustworthy, and avoid contact by all conventional means (phone, email, SMS/text messages, IM etc.).

Countersurveillance by countries



source : howelawfirm.com

See List of counterintelligence organizations

In the United States military

The United States military refers to electronic countersurveillance as "technical surveillance counter-measures" (TSCM) and relates it to signal intelligence and electronic countermeasures.

The United States Department of Defense defines a TSCM survey ("bug sweeping") as a service provided by qualified personnel to detect the presence of technical surveillance devices and hazards and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility. A TSCM survey provides a professional evaluation of the facility's technical security posture and normally consists of a thorough visual, electronic, and physical examination in and about the surveyed facility.

This definition is however lacking some of the technical scope involved. Communications security, information technology security and physical security are also a major part of the work in the modern environment. The advent of multimedia devices and remote control technologies allow huge scope for removal of massive amounts of data in very secure environments by the staff employed within, with or without their knowledge.

In Canada

In 2011, Defence Minister Peter MacKay authorized a program to search telephone and internet usage for suspicious activities. This program searches for and collects meta-data of Canadians across the country.

Canadian Movements

There are minimal anti-surveillance movements specifically targeted in Canada at present.

Transparent Lives is a prominent Canadian organization that aims to "demonstrate dramatically just how visible we have all become to myriad organizations and what this meansâ€"for better or for worseâ€"for how we conduct our everyday lives."

International movements currently active In Canada

Amnesty International runs a campaign called #UnfollowMe that "calls on governments to ban mass surveillance and unlawful intelligence sharing", inspired by Edward Snowden leaking thousands of NSA documents that revealed information about mass surveillance in the U.S. This campaign is active worldwide.

See also



source : en.wikipedia.org

  • Computer security
  • Communications security
  • Espionage
  • Privacy
  • Sousveillance
  • Dead drop
  • Cut-out (espionage)
  • Cyber security and countermeasure
  • Common Vulnerabilities and Exposures
  • Privacy
  • Privacy-enhancing technologies
  • Sousveillance
  • Personally identifiable information
  • Countermeasure (computer)

References



source : www.pinterest.com



source : es.scribd.com

 
Sponsored Links