670 likes | 1.01k Views
Technical Surveillance and You !. Standard security measures. Door and window locks Intruder alarm External and internal CCTV Manned reception/security Security fencing Firewalls. “THE FORTRESS MENTALITY”. All standard security measures are designed to
E N D
Standard security measures • Door and window locks • Intruder alarm • External and internal CCTV • Manned reception/security • Security fencing • Firewalls
“THE FORTRESS MENTALITY” All standard security measuresare designed to deter, defeat or detect an OVERTthreat or to keep out what is already out.
What is technical surveillance? The use of electronic devices to covertlyobserve,monitor, and record the conversations and movements of an individual or organisation without their knowledge or consent in order to ascertain their past, present, and future intentions.
REMEMBER! • Technical surveillance is often the key intelligence and information gathering tool and will be complimented by other covert tactics and used to corroborate intelligence and information gathered by other means. • It is the most cost effective way of obtaining direct information about the subject YOU or YOUR business
Technical surveillance urban myths • It is staff intensive. • It is resource intensive. • It is expensive. • It only happens on the TV or is conducted only by spies.
The urban myth Surveillance van exterior Surveillance van interior
The reality • Advances is technology have led to the provision of low cost, low technology user friendly devices. • Devices are obtainable from numerous sources. • A technical surveillance capability is now available to everyone including the man in the street.
Device supply in the UK • 50 online UK shops. • Major high street store with over 150 retail outlets in the UK. • Unknown number of electronic specialists building devices to order. • Delivery from an unknown number of online and high street outlets worldwide via courier.
Motivating factors • Money • Power • Influence
Where does it take place? Anywhere YOU, YOUR affairs, or YOUR businessis discussed or conductedieYOUR home, office, hotel, even in YOUR vehicle.
Categories of subject Domestic • Straying spouses, divorces, custody claims, estate settlements, family disputes. Celebrity • Any high profile individual, their friends, associates and staff.
Corporate • Large businesses, public sector organizations, any high profile or controversial organisation, those involved in research, contracts, mergers, and takeovers. Government • MP’s, civil servants, embassies and trade delegations.
What information do they seek? • Personal. Information about YOU! • Business. Information about YOUR business! • Leverage. Information which if disclosed would cause substantial embarrassment or loss of credibility to the subject YOU! This makes YOU vulnerable to blackmail or other forms of coercion.
Types of surveillance device • Improvised Built for another purpose • Dedicated Built specifically to obtain information
Dedicated surveillance devices • Microphone and listener • Microphone and recorder • Analogue and digital radio transmitters (RF and GSM) • Optical devices (laser/infra red) • Vibration devices (accelerometers) • Covert cable
REMEMBER! • Devices can recordaudio, visual or both. • Due to their size devices can be concealed: • On the person • In personal items • In furniture or office equipment • In fixtures and fittings such as electrical power points.
Device life expectancy Limited Life Device • Operates from a battery source. If undiscovered and dependant on usage can remain operational for up to SIX MONTHS. Infinity Device • Wired into the mains electricity. If undiscovered will transmit FOREVER subject to fair wear and tear of the device.
Surveillance in your workplace For the purposes of this scenario and ease of explanation we will use an office facility but the principal remains the same for the home, hotel and vehicle. Try to think of this as YOURoffice facility with YOURrooms full of YOURcompany’s possessions, IT, documentation, and staff.
Ask yourself • Who has access to your office facility? • Who is there legitimately? • Do you know where they go once inside? • Let us see who has access to your office.
Ask yourself. • Do you know who they really are? • Do you know what they really do and who they really work for? • Do you know their real circumstances?
REMEMBER! • People are not always what they appear to be. • Some including staff may have other motivating factors or another agenda. • If that is so what is it?
Adevice in your office? Think! • Where is it? • What does it look like? • Who put it there? • How long has it been there? • What are the consequences for you, your staff, and your business?
Concealment! • The previous images illustrated items that historically have been used to conceal covert electronic audio visual devices.
Consequences • The results of a successful technical surveillance operation on you or your business may be one or more of the following!