Counter Surveillance
Student Performance Objectives
- This block of instruction is designed to:
- Advise participant of the various types of surveillance that can be used against you.
- Make them aware of the common tactics used by surveillance teams.
- Explain the tactics used to gather intelligence.
- Tactics for recognizing surveillance and operators.
- Tactics for evading surveillance teams.
- Methods used to recruit informants and assets.
Recognizing Surveillance
- Surveillance is one on the first steps taken in every situation.
From when you look out the window to see what your child is doing to
someone watching when you leave your house so they can break-in.
- This program is designed to alert you to real world surveillance
techniques that are being used to compromise you, your company and your
families security.
Security
- Security n. 1. Measures adopted to guard against attack, theft or
disclosure. 2. Something that gives or assures safety &confidence…
- As noted, the purpose of security is to protect our movement.
- A vital part of this is to limit or deny the flow of information to enemy forces.
4 Rules of Security
- 1. Do not send or discuss sensitive information over any form of
telecommunications (phone, cell, internet, etc.), all of which are
vulnerable to interception. Cell Phones can be made into active
listening devices and should have their batteries removed before
discussing any secret information.
- 2. Never discuss sensitive information in any enclosed area
vulnerable to listening devices (i.e., homes, vehicles, cafes, etc.).
- 3. Follow the Need-to-Know-Only Rule: If a person is not involved
in the information, then they do not need to know its contents. The
less a person knows, the less danger there is they can tell others.
- 4. Avoid those unable to follow basic security codes. They are a
danger to you and the movement. This includes persons who talk too
much, who do not take security seriously, alcoholics, etc.
Things to Remember
- The first thing that you need to realize is that you have to be Systematically un Systematic.
- Never do the same thing twice.
- Don’t take the same route to work each day.
- Vary your schedule.
- Don’t make it easy.
- There is no such thing as a coincidence!
- Do not minimalize things that are out of the norm.
- When something seems unusual make a note of it and discuss it with your co-workers and see if they have had the same problem.
- Make notes if you need to.
Good and Bad Surveillance
- Whether it be a kidnapping, bank robbery, terror attack, rape or mugging they all start with surveillance.
- Human Intelligence and asset development also start with surveillance.
Risk of Surveillance
- For the point of this presentation we are focusing on the bad surveillance or the surveillance that someone may conduct on you.
- Three things determine how successful the surveillance will be.
- You must ask yourself how much time access and money do the people that may want to watch you have.
Surveillance
- Surveillance is the continuous, secretive observation of persons, places, things or objects, in order to gain information.
- There are two Categories of surveillance: Physical & Technical.
Physical Surveillance
- Physical surveillance is carried out by enemy personnel on foot and/or by vehicle.
- It is the only way a target person can be continuously observed over an extended period of time.
Technical surveillance
- Technical surveillance is far more common.
- With widespread use of telecommunications (phone, cell, pager,
internet, fax), technical surveillance is a main source of intelligence
on a person’s day to day activities, contacts, personal relationships,
etc.
- More generally, it consists of technical devices to record,
document or monitor a target individual’s movements, conversations, or
activities.
Surveillance Operators & Vehicles
- Surveillance operators can be of any race, sex, ethnicity, size,
shape, etc., wearing any style of clothing, listening to any type of
music, etc.
- Likewise, vehicles used by surveillance teams can be of any model, year, condition, color, etc.
- Appearance by itself will rarely reveal a sophisticated surveillance effort.
Fixed Surveillance
- Fixed surveillance (meaning it doesn't move) is set up around a
target’s home, a business, etc., to observe activities, patterns of
movement, associations, or even to begin surveillance of a target
expected to appear at the location (stakeout). Another term for a fixed
surveillance position is:
- Observation Post (OP). It is usually conducted from overlooking
positions such as hills, buildings, apartments, or vehicles parked in
the area. Fixed surveillance can change into mobile surveillance with
operators pre-positioned and ready to follow.
Fixed Surveillance
- If the persons watching you have the time and you are a high level target they will establish fixed surveillance on you.
- It could be renting a flat overlooking yours, putting cameras in
Utility boxes or renting the flat next to yours so that they can drill
holes in your walls and have access to your phone and electrical
wiring.
- If you are important enough of a target they will utilize all
methods of surveillance to include room audio and or video as well as
wire taps and communication monitoring on your internet, faxes and
phones.
Mobile Surveillance
- Once a target person has been observed and is leaving the location, the Surveillance then becomes mobile.
- On foot or by vehicle, the target is followed until he/she stops.
- A surveillance box is again set up with one operator having direct
line of sight on the vehicle or location (this is the trigger, who
alerts other operators as to actions of target).
High Priority Cases
- As the targeted individual re-appears on the move, the fixed surveillance box again transitions to a mobile surveillance.
- In high-priority cases, the surveillance box will cover all known
routes in and out of an area and can literally surround the target.
Mobile Foot Surveillance
- If a person drives, stops and walks around, surveillance vehicles will also drop off foot operators.
- They will then position themselves in a box around the target’s
vehicle, or assist in the foot surveillance by picking up and dropping
off operators.
- For their part, foot operators may change jackets, hats, and other items of clothing in order to avoid detection.
- Once detected, they will be removed from the operation and replaced.
Other Forms of Physical Surveillance
- Mail: although not used as much as email, police and intelligence
agencies have a long history of intercepting postal deliveries,
including letters and packages.
- Agents can gain authorization to intercept mail, which is then
delayed from delivery while they open it, check the contents, and then
re-seal it.
- It is not a secure form of communications or transporting items.
- Checking the mail in your box can provide them with information
such as who lives there, what cell company you use, banking
information, etc. as well as indicating if you are away from home and
how long.
- If you think you are a target a P.O. Box or Mail Service Box would be a good suggestion.
Going through your Trash
- Investigators can recover a tremendous amount of information in trash.
- This includes old notes, letters, bills, invoices, receipts,
flyers, prescriptions, drawings, etc., all of which can provide
personal or business information.
- Credit card or financial information.
- Drafts of work documents.
- Travel itinerary's and housing information.
- Photos.
- Contacts.
- Garbage can also be a source of forensic evidence (residue, chemicals, bodily fluids, hair, etc.).
Moving Surveillance
- When time for planning is not available your predator will have to use mobile surveillance.
- This is the hardest for him and the easiest for you to recognize and counter.
- The techniques used are only restricted by their imagination and budget.
GPS Tracking
- GPS Is being uses around the world to assist surveillance teams. You need to be aware of this.
- Hitting a railroad track at about 50 MPH has a tendency to knock off the magnetic mount GPS units.
Surveillance of your home
- On a quick surveillance they will have to use what ever is at hand.
- Someone walking a dog in front of your house.
- Parking up the street.
- Using a utility truck, joggers or bikers.
- One of my favorite techniques is to have a male and female
operative's have a loud domestic dispute in front of the targets house
with lots of screaming ending with the women exiting the car and the
driver spinning their tires leaving her behind. She then walks to the
door and asked to use the phone. Giving her access to the inside of the
house to observe, get the house phone number, plant a bug and obtain
information such as the frame of mind of the subject.
Surveillance of your home
- You must be aware of activities around you.
- Look up and down your street to determine if there is a vehicle with someone inside.
- If so why are they there?
- When going home never drive to your house if you feel you are being followed.
Using Children
- I have used my daughter on surveillances more times that I can count.
- People have a tendency to dismiss anyone with a child from being a threat.
- Children have also been used to get close to someone to plant a bug or tracking device.
A Couple in a Car
- One common technique that is used is putting a couple in a car on the street in front of the target house.
- When they see you looking at them they just act like a kissing couple.
Telephone Calls
- It is common for them to call you with a wrong number phone call or sales call to obtain information.
- You are providing information anytime you are in contact with them if it is only letting them know that you are home.
- They also use delivery people that will show up at the door with acting as if they have a wrong address.
- They are attempting to determine if you are there, who else is there and what you are doing.
Protect your Data
- When traveling to areas where you may be at risk buy a new laptop
with nothing on the hard drive to reduce the chance of proprietary
information loss.
- Weigh your laptop before and after your trip to see if there has been anything hardware modifications.
- Carry your data on a memory card. You can now get 256 GB memory cards in micro.
- Keep it separate from your computer so if the computer is stolen you do not lose your information.
Computer Theft
- There have been cases of men with assault rifles stopping people
leaving a hotel to take their laptops while not taking their Rolex
watches and money.
- Laptops stolen from Airport security or baggage claim.
- Laptops switched by cab or bus drivers.
- Assessing your laptop and data while your computer is in your hotel room.
Telephones
- Telephones can be made into active listening devices through a technique known as a hook switch bypass, even when not in use.
- Cellular & cordless phones are among the least secure forms of
communication as they can be intercepted by commercially available
scanners or online monitors.
Internet & Computer
- Like cell phones, the Internet is a very insecure form of communications.
- Emails you send, or web sites you visit on your personal computer, can be intercepted just like a phone call.
- If your computer is ever seized or stolen they can access large
amounts of data (i.e., emails, website visits, documents, photos) even
if you have deleted it.
- We are seeing more and more of this at airports both in the US and abroad.
Hot Spots and WiFi Hackers
- There are many fake Wi-Fi networks especially in the airport set up
to have you log into a network designed to steal your info like your
hotel and car rental info, or bank and credit card info.
- Some use it just for the fee and your credit card numbers.
- Others use WiFi sniffers that will capture your password and provide access to your computer and all your information on it.
- This will also provide them with access to your company network depending on your configuration.
Internet Risk
- Keystroke loggers can be installed on computers, enabling surveillance to read everything you've typed.
- When you are online with your computer, software programs may be
covertly downloaded onto your computer that enable another computer to
access it and gather information.
- Anytime you go online to check your email, that location may be traced through Internet Protocol (IP) addresses.
- The FBI has a program they can download to your computer via email that provides access to your internet activity.
- These methods have been used to arrest people making internet threats.
Social Networking Sites
- Social sites can be one of your biggest security risk.
- You need to always be aware of what you are posting and who you are friending. (Guilt by Association)
- Your location can be determined by your photos and unlimited amounts of intelligence may be obtained from your photos.
- While you may be aware of OPSEC your family and friends may not be
and they will become a source of intelligence for the person watching
you.
- You need to check your company’s policies on Social Sites.
Listening Devices
- Audio surveillance is one of the main methods of recording
conversations for both intelligence gathering as well as criminal
charges.
- In fact, multi-million dollar investigations and trials are often
based almost entirely on recorded conversations (people caught making
incriminating statements to either undercover cops or informants).
- Listening devices, also known as bugs, are usually small
microphones attached to a transmitter & an energy source that are
placed in a residence, workplace, vehicle, etc.
Avoiding RF Transmit ion
- As a general rule, all enclosed spaces should be considered
vulnerable to surveillance by listening devices, especially in those
areas used or frequented by Executives, R&D, Estimating, Legal or
other high level staff.
- Board Rooms and Executive offices are high value areas.
Laser and Parabolic Mic’s
- Laser devices are also used to collect window vibrations and
convert them into audio signals, thereby recording conversations in
offices, apartments, etc.
- Parabolic Microphones are designed to eavesdrop on conversations
over a long distance. Also referred to as a ‘bionic ear’, parabolic
mics are hand-held devices usually with a boom mic and a round disc
attached.
- The operator wears ear-phones. Some parabolic mics have effective ranges of 300 meters.
Surveillance Techniques
- Surveillance teams can be comprised of two persons in one vehicle,
or a dozen operators in six vehicles (or even more, of course).
- In addition, motorcycles, bikes, planes & helicopters may also be used.
- The latest technique is to use drones that can be as small as a flying insect.
Human Intelligence Gathering
- In this category we must also consider informants, infiltrators & collaborators.
- They may be police agents, civilians recruited by police, or former comrades.
- This form of physical surveillance is the main source of intelligence on people’s thoughts, plans & activities.
Surveillance by Someone Close by
- Because of the sensitive nature of personal information they are
able to gather, and their ability to influence events, infiltrators
& informants are especially dangerous.
- Being close to you they can not only report your actions but have
the access to place Technical Surveillance devices to monitor you.
State of the Art Electronics
- This includes listening devices in homes & cars, tapped
telephones, monitoring of internet activity, CCTV video, tracking
devices, night-vision devices, etc.
- Micro Audio and Video recorders are now common and found in such items as Key chains, alarm remotes and sunglasses.
Telecommunications
- Phones, cells, Internet, fax, and pager are especially vulnerable
to surveillance due to their control by government & corporations,
and the use of computerized digital technology in telecommunications
systems.
- This allows for greater access, storage, retrieval and analysis of
communications, without the need for physical access to a residence or
workplace.
Cell Phones and Spoofing Cards
- If you do not have your voicemail protected with a password,
meaning you just dial number 1 and go straight into it, a person can
easily use one of the several spoofing companies (Spoofcard out of NYC
etc) to dial your phone with your number.
- If you do not pick up the phone, your cell phone recognizes your
number calling the phone the same as you pushing 1 and takes me
straight into your voicemail.
- Once it was set up there was no passcode on Visual Voicemail, Apple has since fixed that.
- Most people for convenience and speed don't have passcode on their cell phone voicemail.
Gov. Sponsored Cyber Attacks
- A new report says the US is under attack – economic attack – from
Russian and Chinese cyber-spies! According to the FBI, over 100
American companies have had their data compromised, including
technology, intellectual property, and other trade secrets. Officials
in both Russia and China.
- It has been reported that China, Russia and Iran have active cyber programs against American Businesses.
Urban Environment
- The urban environment is far more conducive to surveillance, due to
the large masses of people, communications & electrical systems,
structures, & vehicles in which operators & devices can be
concealed. In the city, there are also tens of thousands of CCTV video
cameras, in stores, banks, malls, offices, schools, transit, streets
& intersections.
Taxi Cabs bugged
- It was reported last year that over 7,000 taxis in China had been
equipped with recording devices to monitor the conversations of their
passengers.
Limo and Bus Drivers
- People have a tendency to forget that drivers have ears. Even
though they may not tell you that they speak English they may be very
proficient.
- They can gain information on your schedule, your location, work
information and are in a position to switch your bag or put something
in your bag.
Restaurant Staff
- There is a Hotel in Costa Rica that caters to American Business
men. They have a deli bar with a Russian waitress that is a location
frequented by Americans each morning. While speaking to her about
Russia she revealed that one of the waiters spent 9 years at the
University of Moscow and speaks 11 languages.
- I wonder why he chooses to work there for $ 125 a week but drives a new $45,000 SUV.
Guest in Your Room
- Keep in mind that intelligence is a game of strategy.
- If I wanted to make an attempt on the President’s life what better
way to increase my chances than to have the entire team relieved of
duty so that an inexperienced team would be protecting him.
- You also run the risk of being embarrassed or maybe even arrested.
Drugged by your Guest
- One techniques that is being used right now is that the girl puts
“Special K” (horse tranquilizer) on her neck or other places and when
you kiss it you pass out giving her access to your computer, smartphone
or things.
- I have known hotel security to sell the master password to the room safes to the girls.
Business Centers
- Last year a major Hotel Chain found that people were going into
their business centers in the morning and plugging in Key Stroke
monitors on their computers and then the people would return at the end
of the day and retrieve the monitor.
- In many countries this is a state run operation.
Airplanes
- Working on your laptop on an airplane makes you susceptible to
shoulder surfing. If you must use your laptop for business on the plane
be sure to invest in a privacy screen.
- The French Intelligence service invited 350 CEO’s and CFO’s to the
opening of a new plant in France. They then installed video and audio
recorders on each of the seats on the plane so they could listen to the
executives conversations.
Use of other Peoples Office Equipment
- Most copiers now have internal memory. When you make a copy of a document it is held in the memory of the copier.
- There was a hotel in France that would provide a shredder for
business guest. It was found that the shredder had a scanner built in
to copy all of the items shredded.
Cleaning or Maintenance Staff
- We have a tendency to ignore workers around us.
- I know of a case where a company purchased the largest cleaning
company in the city to give them access to their competitors offices
and information.
- With night time access and control of the building it gave them the opportunity to bug and search the facility on a daily basis.
Satellite
- Satellites are used by military, intelligence and commercial
agencies for a variety of purposes, including digital imaging,
communications, navigation, etc..
- The most advanced spy satellites are those deployed by the US, including the 'Key Hole' (KH) series of imaging satellites.
- The KH-12 and KH-13 versions can identity objects as small as 5” on the ground (from hundreds of miles in space).
- They also use radar, lasers, infrared and electro magnetic sensors
to see through cloud cover, forest canopies, and even concrete
structures, to create images or gather data.
Rural Surveillance
- In rural areas, physical surveillance is more often necessary due to the lack of telecommunications, roads, etc.
- Low population densities also serve to identify surveillance operators as ‘outsiders’.
Out of place
- Physical surveillance in rural areas often requires either
long-range observation (by ground teams, aircraft, or satellite in high
priority situations).
- Other options are to put someone on the ground and have them infiltrate the location.
Finding a way not to be noticed
- Advantages and disadvantages to rural surveillance are many.
- While the urban areas give operatives lots of places to blend in the country gives them lots of places to hide.
Rural surveillance
- In many cases utility trucks or construction equipment and workers are placed in an area as a fixed surveillance site.
- One favorite technique of mine is to have a construction trailer
placed on the side of the road. We then put fliers on mailboxes stating
that we were with the state university conducting a traffic study of
the area for future highway expansion. We provided an 800 number and
requested comments or suggestions. No one ever bothered us as they
thought that they knew what we were doing.
Developing Assets
- The first thing that I do when developing an asset inside a
business is drive through the parking lot and look for an old car with
a car seat or two.
- This would indicate that they need money.
- I then follow them until I can get next to them in a store and start a conversation offering her a part time job.
- Once working for me and trusting me it is easy to get her to start talking about things in her business.
Detection of
Physical Surveillance
- The key to successful surveillance detection is awareness and
observation of one’s surroundings, including persons and vehicles.
- In identifying potential operators, make note of their clothing,
size, mannerisms, and facial features (including hair style &
color, shape of head & face, mustache, marks, etc.).
- In particular, any distinguishing marks or features can greatly
assist in retention & the ability to later identify the same
individual or vehicle.
- Most operators will attempt to blend in and to minimize any attention being drawn to them.
- Colorful or odd clothing, hairstyles, etc. will be avoided due to
the involuntary attention they attract. Therefore, most operators will
be marked by their ‘unnoticeable’ and normal appearance.
Identifying Possible Operators
- Begin by observing those around you. Assume that all are potential operators.
- Begin eliminating those who are most likely to not be engaged in surveillance, in order to focus on those that are.
- Keep in mind that some surveillance teams consist of persons who
look as if they could not pass a basic physical fitness test, and can
include old Asian ladies, fat short men, etc. Undercover police have
also infiltrated biker gangs, facilitated in part by their own personal
interest in tattoos, growing their hair long, and not shaving.
- It is most important to evaluate what people do and their behavior, not their appearance or what they look like.
- Vehicles can be observed by their color, shape, model, noticeable
marks/dents, and license plates. At night, the silhouette of the
vehicle and the position of its headlights can assist in identifying
possible surveillance operators.
Locating and Detecting Surveillance Teams
- The following slides will address how to locate and avoid surveillance teams.
- The most important thing to remember is to be observant and not dismiss things that you notice as being normal.
- Listen to your sixth sense. If something does not feel right take
counter actions. Cross the street make an unexpected turn and if you
still feel that something is wrong drive to a fire station. There is
always someone there and they will help you.
General Characteristics of
Surveillance Operators (Foot & Vehicle):
- Can be of any race or ethnicity, any size or shape, young or old.
- They will usually avoid eye contact and can even appear awkward in their efforts to do so.
- They may appear out of place, nervous & tense (because they are).
- Can be heard or observed speaking into chest microphones, adjusting
ear-pieces, or using hand-held devices to adjust volume or signal team
members (contained in pocket).
- Can be observed signaling (by hand, head nod, etc.) or directly talking to other team members.
Detection Techniques
- One of the best times to detect surveillance is when a surveillance box has been established around a location.
- Surveillance teams are most vulnerable to detection during this phase of an operation.
- In some cases, they may sit for hours waiting for the target to move or appear.
Locating an Observation Post
- Observation Posts in overlooking apartments or houses can often be
identified by their apparent lack of activity, drawn blinds or
curtains, or some other coverings over windows. Although they want to
see out, they do not want you to see in.
- In order to see out, all they may require is a slight opening for a camera lens or telescope.
Observing OP Locations
- Possible OP locations can be observed from within the target
location (using the method described above) as well as when
leaving/entering the area.
- For surveillance teams, the ideal location has good line-of-sight observation of the target’s front door and vehicle.
Know your Environment
- The more familiar one is with their neighborhood, the easier it is
to identify new vehicles & even neighbors, both of which could be
potential surveillance.
- Sometimes, it is impractical for them to rent out apartments or use the homes of civilians.
- Then, a vehicle Observation Post is used.
Vehicle Observation Post
- If a vehicle is used, it is usually a van, mini-van, camper home,
or cube truck—large enough to contain operators & surveillance
equipment.
- Like the apartment scenario, a vehicle OP will be marked by its
lack of activity and by an inability to see into the rear compartment
area.
- Curtains or some other cover are also placed on the windows.
Vehicle OP’s
- Vehicle OP’s can remain parked for days or be moved around and replaced.
- A possible indicator of surveillance is the near-constant presence
of some kind of vehicle with a rear compartment in the vicinity.
Vehicle Techniques
- If a vehicle matching these descriptions is parked & the driver
walks away, then gets into another vehicle, the parked vehicle is a
potential surveillance post.
- In some cases, they have parked a normal passenger car with an operator hidden in the trunk.
- The operator can monitor a transmitter and/or video record activities through a peep hole.
OP Variation
- A variation of the vehicle OP is the parking of a vehicle with
either a device and receiver to record a nearby transmitter (in a
building or on a person) or with a mini-CCTV video camera installed.
- The operator leaves the car for the duration of the surveillance operation then retrieves it later.
Doubling Back
- A person can also walk around the neighborhood and observe for
possible surveillance. Leaving and then returning (double-back)-- as if
something was forgotten-- can force operators to re-establish a
surveillance box, potentially exposing themselves.
Vulnerable to Detection
- Another time when surveillance operators are vulnerable to
detection is during the transition from foot to vehicle, or vice/versa.
- Observe for persons who rush unexpectedly to enter a vehicle, or who exit abruptly, etc.
- During mobile surveillance, it is often the reactions by operators which reveal their activity.
- Some of this is subconscious and becomes part of the routine of surveillance operations.
Mirroring Surveillance
- Mirroring is when a surveillance operator duplicates your actions as they follow your lead, especially in vehicle surveillance.
- Pacing is when they maintain the same constant distance between
themselves & the target, slowing down and speeding up to keep pace.
- By taking certain routes or actions, surveillance operators can also be caught off guard.
Channelized Terrain
- Channelized terrain can expose surveillance operators to observation.
- Channelized terrain is when all traffic (foot or vehicle) must pass through a restricted passage or opening.
- A bridge is an example of such terrain, a tunnel, etc.
- In order to keep command, a surveillance team must commit to entering & crossing the terrain.
U-Turns on Foot
- On foot, a target could walk to the middle of a bridge, stop as if
to enjoy the view, then turn and walk back (U-turn) to note the
response of other foot traffic.
- When walking or driving, sudden and abrupt U-turns can force a
surveillance operator to respond, thereby revealing their activity.
- Poorly trained operators or overt surveillance will quickly U-turn
as well & resume the follow. A well-trained operator will continue
past and then turn off, handing command over to another
vehicle/operator.
Standard Response to a U-Turn:
- The standard response to a U-Turn is for the command vehicle
continues straight, back-up vehicle or vehicles pulls off to begin
following subject.
Blind Turns
- When walking or driving, a blind turn can be used to force an unexpected response by surveillance operators.
- A blind turn is a sudden turn at a corner in which the target then
stops and waits to observe the actions of potential surveillance
operators.
- A standard response by surveillance will be to continue past the
corner while glancing to observe the whereabouts of the target.
Jaywalking
- On foot, the only opportunity to discreetly observe to the rear is when crossing an intersection.
- Sudden crossings in the middle of the street (jaywalk) also allow for rear views and may catch operators off guard.
Public Locations
- Entering public locations, such as malls, office complexes, etc.,
can force surveillance to enter with you and expose themselves to
closer observation.
- Going up or down a series of escalators allows for logical 180-degree turns to observe to the rear.
- Elevators could force operators into even closer proximity.
- Multiple levels also enable a target to observe large areas from a dominant & overlooking position.
Public transit can be used for detection purposes.
- Getting on buses or subways can force operators to get into close proximity with the target or risk losing command.
- When operators must get on transit with a target, this provides
good exposure of facial features and can force unnatural responses from
operators.
Observe People Riding the Bus
- Observe those who arrive at bus stop after you and board the same
bus, as well as those already on the bus and seated to the rear, and
those who board at subsequent stops.
- Foot operators may also be dropped off after the target gets off,
therefore if the same vehicle is seen near bus stops en route, or even
following the bus, this is a possible indicator of surveillance.
On Highways
- On highways, pulling off onto the shoulder prior to a rest area may force surveillance vehicles to pull off and wait.
- On highways you may also take an exit and at the top drive over the
road and back onto the entrance ramp. If you drive slowly it will force
the surveillance team to commit to your exit and expose themselves when
you reenter the highway.
- Driving through the rest area, a target can observe which vehicles are there and then identify them at subsequent locations.
- Drive slowly through a rest area without completely stopping and then continuing back onto the freeway.
- Like subways, highways are characterized by high speeds which can catch surveillance operators off-guard.
Highway Maneuvers
- Exit ramps, turn offs, rest areas, u-turns, blind-turns, etc. can all be exploited on highways.
- Highways also offer observation over longer ranges and for extended periods of time.
- In both foot & vehicle surveillance, command may be shifted frequently to minimize exposure of operators.
- Often, unpredictable or sudden moves can force surveillance teams to react.
Covert Detection of Surveillance
- Detection of surveillance is best done as covertly as possible. In a vehicle, use rear-view mirrors.
- Wrap-around sun glasses can also aid in discreet observation by shielding the eyes.
Identifying Rural Surveillance
- From one’s location, potential OP’s can be identified.
- They must have line-of-sight observation.
- The only way to find possible OP’s is to physically walk the area.
Locating Rural OP Sites
- OP sites can be identified by flattened out or disturbed areas used
for sitting or sleeping, as well as tracks, litter, equipment dropped
by operators, etc.
- Knowledge of tracking can greatly assist in identifying potential OP sites.
- Longer term OP's may consist of a hide left in place.
- Detection can be greatly assisted by dogs, as well as observing the responses of animals & birds.
Aerial Surveillance & Night Vision
- To evade aerial surveillance go inside malls, apartment buildings,
transit stations, or any building that has multiple exits and large
crowds.
- Change jacket and hat if possible.
- To evade night time aerial surveillance (i.e., night
vision/thermal) in an urban or suburban area, go into large buildings,
under concrete bridges, under vehicles, into sewage or tunnel systems,
etc.
Avoiding Arial Surveillance in Rural Areas
- In rural areas go under bridges, drainage pipes, underwater, under
rocky over crops, thick forest, tunnels, etc. to evade aerial vehicles
at night.
- One danger in hiding in a fixed position is if you're already being
tracked by aerial surveillance they will see this and direct ground
units to your location.
Evading Aerial Surveillance
- You may not be aware you are being observed due to aerial surveillance being conducted at an altitude beyond your hearing range.
- Some measures reportedly used to counter infra-red and thermal
imagery include the use of 'survival blankets', a sheet of foil that
traps body heat (and reduces thermal signature) and water immersion
(which also reduces thermal signature).
Preparing for Anti Surveillance
- When preparing for anti-surveillance, a targeted individual should
consider their patterns of movement & activities over the previous
time period.
- This identifies possible times, locations, or methods by which to evade surveillance.
- After a long time doing surveillance, operators may themselves fall
victim to this routine and become vulnerable to anti surveillance
actions.
Evading your Surveillance
- The main goal of anti-surveillance is to evade those watching you.
- If able to escape the initial stakeout or surveillance box, for
example, the target then defeats surveillance and can move without
threat of being observed.
- Techniques used to detect surveillance, such as U-turns, double
backs, blind corners, etc., can also be used & built upon in order
to evade surveillance.
Evading Stakeouts
- Evading stakeouts or surveillance boxes can be done from any location and need not begin with one’s residence.
- Public locations with multiple & even hidden exits can be used.
- Public transit can be utilized to break up surveillance teams en route to a suitable public location, etc.
Using Disguises
- Disguises can greatly enhance anti-surveillance actions.
- Operators must recognize the target in order to follow him/her.
- Although facial features are the best way to identify specific individuals, operators also rely on form, dress, and mannerisms.
- Photo at bottom right are two of Adolf Hitler's photos while in disguise. Would you have recognized him?
Altering your Physical Appearance
- One’s physical appearance can be altered in a number of ways:
- Baggy or loose-fitting clothing can alter form.
- Filling them out can make a person look larger & bulkier.
- Changing clothing style & colors.
- Changing one’s posture & pace.
- Use of wigs and theatre make-up.
Consequences if caught while Evading Surveillance
- If the use of disguise is detected, surveillance operators will
assume the target is intent on evading their efforts and is preparing
to carry out some protected activity.
- Great care & planning should be put into any anti-surveillance action, and disguises must be effective.
- Consideration should also be given to changing shoes.
Evading Surveillance on Foot
- In an urban environment, anti-surveillance actions carried out on
foot have more likelihood of success than those done by vehicle.
- There are a limited number of areas a vehicle can travel (streets, highways, alleys, garages, etc.).
- In addition, they could have tracking devices attached, so no
matter how many turns & U-turns are used, operators still know
where the vehicle is.
- In contrast, foot travel is almost limitless.
Using Public Transit
- Targets moving on foot can exploit terrain & routes of travel to break up or elude surveillance teams.
- Public transit, especially subways, are difficult for operators to
follow on, due to the high-speeds, ability to change directions,
multiple exits from stations, etc.
- Public location such as malls, office complexes, etc., are also
difficult due to multiple exits, different floor levels, elevators,
escalators, etc. In an emergency (i.e., a fire alarm) operators would
have even more difficulty following a target.
Use the Night and Weather
- Evading surveillance is best done at night or in bad weather (i.e., a rain-storm,), in order to limit visibility.
- In an urban setting, and in public locations, it is often the most
illogical moves which can identify surveillance operators or limit
their ability to follow (which may also alert operators that you are
carrying out some kind of anti surveillance actions).
Evading Tactics
- Taking an elevator one floor and then walking back down is illogical, and any one else doing so would be highly suspicious
- Waiting at transit stops as buses or subway trains pass by can
force operators to board at least one of these, or risk exposure.
- Taking a bus or train to the end of the line and then returning can also identify potential operators.
- Getting on & off transit repeatedly can further break up a surveillance team.
Informants and infiltrators
- Informants and infiltrators are spies who gather information on the
resistance & provide it to the enemy. They may also take a more
active role.
- These acts can result in capture, arrests, imprisonment, and death.
- The term collaborator is used for any member or citizen who aids or assists our enemy.
- Could be the mailman, store clerk, waitress, dancers, hookers or anyone that may come in contact with you.
Informants can provide emotional information.
- Informants & infiltrators provide unique & special human
intelligence (i.e., emotional states, plans, intentions, etc.) which
can be gained in no other way.
- In addition, infiltrators & collaborators can physically disrupt & sabotage your activities.
- They can also be wearing a wire and have recordings of your conversations
Informants
- They can spread disinformation & poisonous gossip, creating division and paranoia.
- They can also record incriminating statements and actions.
- Overall, they are an essential & active element in counter-insurgency operations as well as criminal investigations.
How Informants are Recruited
- They are civilians, usually friends or associates of the target person or group.
- They could be embittered comrades or co-workers who feel isolated or even betrayed by the group.
- Or, they could be genuine friends that have been and subject to pressure.
Recruiting Informants
- A standard method of recruiting informants is to find people (in or near the group) with problems.
- Persons most vulnerable to becoming informants are those seeking
protection, those seeking revenge, drug addicts, alcoholics, those
suffering from trauma or mental illness, those facing long prison
sentences, & those in compromised situations (blackmail).
- Intimidation & coercion may also be used to make a person become an informant.
- Money can also be a motivating factor in making a person turn
informant, and in maintaining their services over an extended period of
time.
Potential Informants
- Potential informants may also be identified through surveillance.
- Personal relationships, drug or money problems, sexual activities,
personality conflicts, internal power struggles, etc., are all analyzed
in order to find an opening through which to exert pressure on a
potential informant.
Conclusion
- The most important thing to remember is that you must be observant
of your surroundings. With enough time and money it is possible to get
any information that you need from anyone. In todays technological
world just about anything is possible. If you want to keep your
information safe you need to make it harder for them to get the
information from you than from someone else.