Countersurveillance

Last updated

Countersurveillance refers to measures that are usually undertaken by the public to prevent surveillance, [1] including covert surveillance. Countersurveillance may include electronic methods such as technical surveillance counter-measures, which is the process of detecting surveillance devices. It can also include covert listening devices, visual surveillance devices, and countersurveillance software to thwart unwanted cybercrime, such as accessing computing and mobile devices for various nefarious reasons (e.g. theft of financial, personal or corporate data). More often than not, countersurveillance will employ a set of actions (countermeasures) that, when followed, reduce the risk of surveillance. Countersurveillance is different from sousveillance (inverse surveillance), as the latter does not necessarily aim to prevent or reduce surveillance.

Contents

Types

Technical surveillance counter-measures

Electronic countermeasures

Most bugs emit some form of electromagnetic radiation, usually radio waves. The standard counter-measure for bugs is, therefore, to "sweep" for them with a receiver, looking for the radio emissions. Professional sweeping devices are very expensive. Low-tech sweeping devices are available through amateur electrical magazines, or they may be built from circuit designs on the Internet.

Sweeping is not foolproof. Advanced bugs can be remotely operated to switch on and off, and some may even rapidly switch frequencies according to a predetermined pattern in order to make location with sweepers more difficult. A bug that has run out of power may not show up during a sweep, which means that the sweeper will not be alerted to the surveillance. Also, some devices have no active parts, such as the Great Seal given to the US Ambassador to Moscow which hid a device (the Thing).

Software countermeasures

Amidst concerns over privacy, software countermeasures [2] have emerged to prevent cyber-intrusion, which is the unauthorized act of spying, snooping, and stealing personally identifiable information or other proprietary assets (e.g. images) through cyberspace.

Popular interest in countersurveillance has been growing given media coverage of privacy violations: [3] [4]

Human countermeasures

Most surveillance, and most countersurveillance, involves human methods rather than electronic methods since people are generally more vulnerable and more capable of reacting creatively to surveillance situations.

Human countermeasures include:

  • Evasion: avoiding risky locations, being discreet or circumspect, using code words
  • Being situation-aware ("looking over your shoulder")
  • Leaving the area without being seen or followed e.g. getting "lost in the crowd" so that followers lose contact
  • Hiding in secure locations
  • Concealing one's identity

Such activities make it harder to track surveillance subjects. Following steady, easy-to-predict schedules before employing aforementioned countermeasures may make the surveillance detail complacent and thus easier to lose.

Structural countermeasures

Another strategy is to utilize a room for safe conversations with these requirements:

  • Strict access control with locks and burglar alarm
  • Absence of windows or windows that cannot be reached by a laser microphone
  • Electromagnetic shielding through the realization of a Faraday cage which covers doors, windows and walls
  • No or little electronic equipment which must be sealed after being used
  • Few cables that can be easily controlled
  • Minimal furniture, preferably made of transparent materials
  • Prohibition of introduction of electronic equipment
  • Acoustic isolation
  • Regular inspections [8] [9]

Countersurveillance by countries

See List of counterintelligence organizations

United States

TSCM (technical surveillance counter-measures) is the original United States Federal government abbreviation denoting the process of bug-sweeping or electronic countersurveillance. It is related to ELINT, SIGINT and electronic countermeasures (ECM). [10]

The United States Department of Defense defines a TSCM survey as a service provided by qualified personnel to detect the presence of technical surveillance devices and hazards and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility. A TSCM survey will provide a professional evaluation of the facility's technical security posture and normally will consist of a thorough visual, electronic, and physical examination in and about the surveyed facility.

However, this definition lacks some of the technical scope involved. COMSEC (communications security), ITSEC (information technology security) and physical security are also a major part of the work in the modern environment. The advent of multimedia devices and remote control technologies allow huge scope for removal of massive amounts of data in very secure environments by the staff employed within, with or without their knowledge.

Technical Surveillance Countermeasures (TSCM) can best be defined as The systematic physical and electronic examination of a designated area by properly trained, qualified and equipped persons in an attempt to discover electronic eavesdropping devices, security hazards or security weaknesses.

Methodology

Radio frequencies

Most bugs transmit information, whether data, video, or voice, through the air by using radio waves. The standard counter-measure for bugs of this nature is to search for such an attack with a radio frequency (RF) receiver. Lab and even field-quality receivers are very expensive and a good, working knowledge of RF theory is needed to operate the equipment effectively. Counter-measures like burst transmission and spread spectrum make detection more difficult.

The timing of detection surveys and location scans is critical to success, and varies with the type of location being scanned. For permanent facilities, scans and surveys must take place during working hours to detect remotely switchable devices that are turned off during non-working hours to defeat detection. [11]

Devices that do not emit radio waves

Instead of transmitting conversations, bugs may record them. Bugs that do not emit radio waves are very difficult to detect, though there are a number of options for detecting such bugs.

Very sensitive equipment could be used to look for magnetic fields, or for the characteristic electrical noise emitted by the computerized technology in digital tape recorders; however, if the place being monitored has many computers, photocopiers, or other pieces of electrical equipment installed, it may become very difficult. Items such as audio recorders can be very difficult to detect using electronic equipment. Most of these items will be discovered through a physical search.

Another method is using very sensitive thermal cameras to detect residual heat of a bug, or power supply, that may be concealed in a wall or ceiling. The device is found by locating a hot spot the device generates that can be detected by the thermal camera.

A method does exist to find hidden recorders, as these typically use a well known frequency for the clock which can never be totally shielded. A combination of existing techniques and resonance sweeps can often pick up even a defunct or "dead" bug in this way by measuring recent changes in the electromagnetic spectrum.

Technology used

Technology most commonly used for a bug sweep includes but is not limited to:

  • Broadband receivers to detect radiating hostile radio frequency transmissions in the near field.
  • Flashlight one of the most important tools to have beside a ladder for providing a competent sweep.
  • Frequency scanner with a range of antennas and filters for checking the electromagnetic spectrum for signals that should not be there.
  • GSM detection equipment
  • WiFi and broadband detection equipment
  • Lens detectors to detect the lenses of wired or wireless concealed covert cameras.
  • Multimeters for general measurements of power supplies and device components.
  • Nonlinear junction detector (NLJD) to detect components associated with hidden eavesdropping devices.
  • Oscilloscope for visualisation of signals.
  • Spectrum analyzer and vector signal analyzer for more advanced analysis of threatening and non threatening RF signals.
  • Thermal imagers to help find hot spots and areas higher in temperature than the ambient area temperature. Finds heat generated from active electronic components.
  • Time-domain reflectometer (TDR) for testing the integrity of copper telephone lines and other communication cables.
  • Tools for manual disassembling of objects and walls in order to visually check their content. This is the most important, most laborious, least glamorous and hence most neglected part of a check.
  • Videoscopes to inspect small or inaccessible spaces, such as wall spaces, HVAC components, vehicle crevices, etc.
  • Portable x-ray machine for checking the inside of objects and walls.
  • Electromagnetic pulse generators and directed energy uses high voltage and high current surges to temporarily disrupt or permanently disable electronic equipment.

Many companies create the hardware and software necessary to engage in modern countersurveillance including Kestrel TSCM, SignalHound, 3dB Labs, Arcale, and many others. [12]

Canada

In 2011, Defence Minister Peter MacKay authorized a program to search telephone and internet usage for suspicious activities. [13] This program searches for and collects meta-data of Canadians across the country. [14]

Canadian Movements

There are minimal anti-surveillance movements specifically targeted to Canada at present.

Transparent Lives is a prominent Canadian organization that aims to "demonstrate dramatically just how visible we have all become to myriad organizations and what this means—for better or for worse—for how we conduct our everyday lives." [15]

International movements currently active In Canada

Amnesty International runs a campaign called #UnfollowMe that "calls on governments to ban mass surveillance and unlawful intelligence sharing", inspired by Edward Snowden leaking thousands of NSA documents that revealed information about mass surveillance in the U.S. This campaign is active worldwide.

See also

Related Research Articles

<span class="mw-page-title-main">Signals intelligence</span> Intelligence-gathering by interception of signals

Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of signals, whether communications between people or from electronic signals not directly used in communication. As classified and sensitive information is usually encrypted, signals intelligence may necessarily involve cryptanalysis. Traffic analysis—the study of who is signaling to whom and in what quantity—is also used to integrate information, and it may complement cryptanalysis.

<span class="mw-page-title-main">Electronic warfare support measures</span> Electronic intelligence gathering method

In military telecommunications, electronic support (ES) or electronic support measures (ESM) gather intelligence through passive "listening" to electromagnetic radiations of military interest. They are an aspect of electronic warfare involving actions taken under direct control of an operational commander to detect, intercept, identify, locate, record, and/or analyze sources of radiated electromagnetic energy for the purposes of immediate threat recognition or longer-term operational planning. Thus, electronic support provides a source of information required for decisions involving electronic protection (EP), electronic attack (EA), avoidance, targeting, and other tactical employment of forces. Electronic support data can be used to produce signals intelligence (SIGINT), communications intelligence (COMINT) and electronics intelligence (ELINT).

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and police investigations.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

<span class="mw-page-title-main">Tempest (codename)</span> Espionage using electromagnetic leakage

TEMPEST is a U.S. National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations. TEMPEST covers both methods to spy upon others and how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of communications security (COMSEC). The reception methods fall under the umbrella of radiofrequency MASINT.

<span class="mw-page-title-main">Eavesdropping</span> Act of secretly listening to the private conversation of others

Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information.

Van Eck phreaking, also known as Van Eck radiation, is a form of network eavesdropping in which special equipment is used for a side-channel attack on the electromagnetic emissions of electronic devices. While electromagnetic emissions are present in keyboards, printers, and other electronic devices, the most notable use of Van Eck phreaking is in reproducing the contents of a cathode ray tube (CRT) display at a distance.

In computer security, a side-channel attack is any attack based on extra information that can be gathered because of the fundamental way a computer protocol or algorithm is implemented, rather than flaws in the design of the protocol or algorithm itself or minor, but potentially devastating, mistakes or oversights in the implementation. Timing information, power consumption, electromagnetic leaks, and sound are examples of extra information which could be exploited to facilitate side-channel attacks.

<span class="mw-page-title-main">Radar detector</span> Electronic device

A radar detector is an electronic device used by motorists to detect if their speed is being monitored by police or law enforcement using a radar gun. Most radar detectors are used so the driver can reduce the car's speed before being ticketed for speeding. In general sense, only emitting technologies, like doppler RADAR, or LIDAR can be detected. Visual speed estimating techniques, like ANPR or VASCAR can not be detected in daytime, but technically vulnerable to detection at night, when IR spotlight is used. There are no reports that piezo sensors can be detected. LIDAR devices require an optical-band sensor, although many modern detectors include LIDAR sensors. Most of today's radar detectors detect signals across a variety of wavelength bands: usually X, K, and Ka. In Europe the Ku band is common as well. The past success of radar detectors was based on the fact that radio-wave beams can not be narrow-enough, so the detector usually senses stray and scattered radiation, giving the driver time to slow down. Based on a focused laser-beam, LIDAR technology does not suffer this shortcoming; however it requires precise aiming. Modern police radars incorporate formidable computing power, producing a minimum number of ultra-short pulses, reusing wide beams for multi-target measurement, which renders most detectors useless. But, mobile Internet allows GPS navigation devices to map police radar locations in real-time. These devices are also often called "radar detectors", while not necessary carrying an RF sensor.

<span class="mw-page-title-main">Nonlinear junction detector</span>

The non-linear junction detector, or an NLJD, is a device that illuminates a small region of space with high-frequency RF energy. Any "non linear junction" in the vicinity—for example, and particularly, the p–n junction—will receive this energy, and because of the asymmetric response of the junction to an electric field, it will mangle it, re-emitting some of it on multiples of the illumination frequency. The detector has a sensitive receiver tuned to these harmonics, as well as appropriate processing and displays to make their presence known to the user of the device. Because the basis of almost all semiconductor electronics is the p-n junction, an NLJD is correspondingly capable of detecting almost any unshielded electronic device containing semiconductors, whether the electronics are actively powered or not.

<span class="mw-page-title-main">Special Collection Service</span> Classified joint CIA–NSA program to insert eavesdropping equipment in difficult places

The Special Collection Service (SCS), codenamed F6, is a highly classified joint U.S. Central Intelligence Agency–National Security Agency program charged with inserting eavesdropping equipment in difficult-to-reach places, such as foreign embassies, communications centers, and foreign government installations. Established in the late 1970s and headquartered in Beltsville, Maryland, the SCS has been involved in operations ranging from the Cold War to the Global War on Terrorism.

Radiofrequency MASINT is one of the six major disciplines generally accepted to make up the field of Measurement and Signature Intelligence (MASINT), with due regard that the MASINT subdisciplines may overlap, and MASINT, in turn, is complementary to more traditional intelligence collection and analysis disciplines such as SIGINT and IMINT. MASINT encompasses intelligence gathering activities that bring together disparate elements that do not fit within the definitions of Signals Intelligence (SIGINT), Imagery Intelligence (IMINT), or Human Intelligence (HUMINT).

<span class="mw-page-title-main">The Thing (listening device)</span> Covert listening device

The Thing, also known as the Great Seal bug, was one of the first covert listening devices to use passive techniques to transmit an audio signal. It was concealed inside a gift given by the Soviet Union to W. Averell Harriman, the United States Ambassador to the Soviet Union, on August 4, 1945. Because it was passive, needing electromagnetic energy from an outside source to become energized and active, it is considered a predecessor of radio-frequency identification (RFID) technology.

Radio frequency sweep or frequency sweep or RF sweep apply to scanning a radio frequency band for detecting signals being transmitted there. A radio receiver with an adjustable receiving frequency is used to do this. A display shows the strength of the signals received at each frequency as the receiver's frequency is modified to sweep (scan) the desired frequency band.

Computer security compromised by hardware failure is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. Such secret information could be retrieved by different ways. This article focus on the retrieval of data thanks to misused hardware or hardware failure. Hardware could be misused or exploited to get secret data. This article collects main types of attack that can lead to data theft.

<span class="mw-page-title-main">Counter-IED equipment</span>

Counter-IED equipment are created primarily for military and law enforcement. They are used for standoff detection of explosives and explosive precursor components and defeating the Improvised Explosive Devices (IEDs) devices themselves as part of a broader counter-terrorism, counter-insurgency, or law enforcement effort.

<span class="mw-page-title-main">Cellphone surveillance</span> Interception of mobile phone activity

Cellphone surveillance may involve tracking, bugging, monitoring, eavesdropping, and recording conversations and text messages on mobile phones. It also encompasses the monitoring of people's movements, which can be tracked using mobile phone signals when phones are turned on.

In cryptography, electromagnetic attacks are side-channel attacks performed by measuring the electromagnetic radiation emitted from a device and performing signal analysis on it. These attacks are a more specific type of what is sometimes referred to as Van Eck phreaking, with the intention to capture encryption keys. Electromagnetic attacks are typically non-invasive and passive, meaning that these attacks are able to be performed by observing the normal functioning of the target device without causing physical damage. However, an attacker may get a better signal with less noise by depackaging the chip and collecting the signal closer to the source. These attacks are successful against cryptographic implementations that perform different operations based on the data currently being processed, such as the square-and-multiply implementation of RSA. Different operations emit different amounts of radiation and an electromagnetic trace of encryption may show the exact operations being performed, allowing an attacker to retrieve full or partial private keys.

The GSOC bugging scandal in February 2014 involved revelations that the offices of the Garda Síochána Ombudsman Commission, Ireland's independent police watchdog, were under covert electronic surveillance by an unknown party. John Mooney, security correspondent for The Sunday Times, first published the story alleging that GSOC had been the subject of surveillance by an unidentified party using "government level technology" to hack into its emails, Wi-Fi and telephone systems. The espionage operation was uncovered by a private British counter-surveillance firm, Verrimus, whom GSOC hired after its suspicions became aroused of outside spying on the organisation and its activities.

References

  1. Walsh, James P. (2019). "Countersurveillance". In Deflem, Mathieu (ed.). The Handbook of Social Control. John Wiley & Sons Ltd. pp. 374–388. ISBN   9781119372356.
  2. International Association of Privacy Professionals. "The Family of Technologies That Could Change The Privacy Dynamic", presented by Daniel Wietzner, Director MIT Computer Science and Artificial Intelligence Laboratory, uploaded July 16, 2013
  3. Roose, Kevin. "The Surveillance Free Day", New York Magazine, July 29, 2013.
  4. The Wall Street Journal. "Information Security Expert to Host Seminar on Counter Surveillance" [ permanent dead link ] July 10, 2013
  5. Barton Gellman (December 24, 2013). "Edward Snowden, after months of NSA revelations, says his mission's accomplished". The Washington Post . Retrieved December 25, 2013. Taken together, the revelations have brought to light a global surveillance system...
  6. New York Daily News. "New Miss Teen USA claims she was the victim of an online extortion plot", August 14, 2013.
  7. ABC-News Boston (WCVB-TV). "Baby monitor hacked in toddler's room" Archived 2013-08-22 at archive.today Aug 14, 2013
  8. "Präventivmaßnahmen" [Preventive measures] (in German). Retrieved 6 September 2020.
  9. "Lauschabwehr" [Eavesdropping] (in German). Archived from the original on 20 October 2020. Retrieved 6 September 2020.
  10. "MSA Technical Surveillance Countermeasures". www.msasecurity.net. Retrieved 2023-10-13.
  11. Braunig, Martha J. (1993). The Executive Protection Bible (1993 ed.). Aspen, Colorado: ESI Education Development Corporation. p. 147. ISBN   0-9640627-0-4.
  12. "SCEPTRE Signal Processing Software – 3dB Labs" . Retrieved 2022-11-01.
  13. Freeze, Colin (2013-06-10). "Data-collection program got green light from MacKay in 2011". The Globe and Mail. Archived from the original on 2013-06-30.
  14. "Confirmed: Canada Has NSA-Style Surveillance Program". The Huffington Post. 10 June 2013.
  15. "Welcome | Transparent Lives". surveillanceincanada.org. Retrieved 2015-11-26.