Knowledge

Countersurveillance

Source 📝

517: 25: 140:, such as accessing computing and mobile devices for various nefarious reasons (e.g. theft of financial, personal or corporate data). More often than not, countersurveillance will employ a set of actions (countermeasures) that, when followed, reduce the risk of surveillance. Countersurveillance is different from 185:
Sweeping is not foolproof. Advanced bugs can be remotely operated to switch on and off, and some may even rapidly switch frequencies according to a predetermined pattern in order to make location with sweepers more difficult. A bug that has run out of power may not show up during a sweep, which means
456:
The timing of detection surveys and location scans is critical to success, and varies with the type of location being scanned. For permanent facilities, scans and surveys must take place during working hours to detect remotely switchable devices that are turned off during non-working hours to defeat
423:
However, this definition lacks some of the technical scope involved. COMSEC (communications security), ITSEC (information technology security) and physical security are also a major part of the work in the modern environment. The advent of multimedia devices and remote control technologies allow
419:
devices and hazards and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility. A TSCM survey will provide a professional evaluation of the facility's technical security posture and normally will consist of a thorough visual,
503:
A method does exist to find hidden recorders, as these typically use a well known frequency for the clock which can never be totally shielded. A combination of existing techniques and resonance sweeps can often pick up even a defunct or "dead" bug in this way by measuring recent changes in the
427:
Technical Surveillance Countermeasures (TSCM) can best be defined as The systematic physical and electronic examination of a designated area by properly trained, qualified and equipped persons in an attempt to discover electronic eavesdropping devices, security hazards or security weaknesses.
174:. The standard counter-measure for bugs is, therefore, to "sweep" for them with a receiver, looking for the radio emissions. Professional sweeping devices are very expensive. Low-tech sweeping devices are available through amateur electrical 676:
Transparent Lives is a prominent Canadian organization that aims to "demonstrate dramatically just how visible we have all become to myriad organizations and what this means—for better or for worse—for how we conduct our everyday lives."
886: 291:
Such activities make it harder to track surveillance subjects. Following steady, easy-to-predict schedules before employing aforementioned countermeasures may make the surveillance detail complacent and thus easier to lose.
263:
Most surveillance, and most countersurveillance, involves human methods rather than electronic methods since people are generally more vulnerable and more capable of reacting creatively to surveillance situations.
499:
to detect residual heat of a bug, or power supply, that may be concealed in a wall or ceiling. The device is found by locating a hot spot the device generates that can be detected by the thermal camera.
932: 1067: 492:
installed, it may become very difficult. Items such as audio recorders can be very difficult to detect using electronic equipment. Most of these items will be discovered through a physical search.
441:
Most bugs transmit information, whether data, video, or voice, through the air by using radio waves. The standard counter-measure for bugs of this nature is to search for such an attack with a
633:
for manual disassembling of objects and walls in order to visually check their content. This is the most important, most laborious, least glamorous and hence most neglected part of a check.
465:
Instead of transmitting conversations, bugs may record them. Bugs that do not emit radio waves are very difficult to detect, though there are a number of options for detecting such bugs.
445:(RF) receiver. Lab and even field-quality receivers are very expensive and a good, working knowledge of RF theory is needed to operate the equipment effectively. Counter-measures like 132:. Countersurveillance may include electronic methods such as technical surveillance counter-measures, which is the process of detecting surveillance devices. It can also include 653:
Many companies create the hardware and software necessary to engage in modern countersurveillance including Kestrel TSCM, SignalHound, 3dB Labs, Arcale, and many others.
665:
authorized a program to search telephone and internet usage for suspicious activities. This program searches for and collects meta-data of Canadians across the country.
1385: 929: 1598: 649:
Electromagnetic pulse generators and directed energy uses high voltage and high current surges to temporarily disrupt or permanently disable electronic equipment.
1149: 1075: 1395: 621:
to help find hot spots and areas higher in temperature than the ambient area temperature. Finds heat generated from active electronic components.
971: 916: 424:
huge scope for removal of massive amounts of data in very secure environments by the staff employed within, with or without their knowledge.
1528: 1192: 1175: 1142: 186:
that the sweeper will not be alerted to the surveillance. Also, some devices have no active parts, such as the Great Seal given to the
688:
runs a campaign called #UnfollowMe that "calls on governments to ban mass surveillance and unlawful intelligence sharing", inspired by
1591: 1232: 365: 89: 61: 1420: 1390: 1135: 693: 1573: 846:, presented by Daniel Wietzner, Director MIT Computer Science and Artificial Intelligence Laboratory, uploaded July 16, 2013 1222: 746: 68: 42: 756: 412: 207: 206:
countermeasures have emerged to prevent cyber-intrusion, which is the unauthorized act of spying, snooping, and stealing
1166: 225: 1639: 1030: 827: 741: 108: 75: 1523: 1515: 187: 1089: 1533: 856: 57: 1464: 1289: 1204: 751: 281:
Leaving the area without being seen or followed e.g. getting "lost in the crowd" so that followers lose contact
46: 1624: 1158: 1619: 236: 528: 242:
Cyber crook who captured nude photos of Miss Teen USA 2013 by infiltrating through the webcam in her home.
1581: 997: 776: 596: 1046: 415:
defines a TSCM survey as a service provided by qualified personnel to detect the presence of technical
405: 761: 639:
to inspect small or inaccessible spaces, such as wall spaces, HVAC components, vehicle crevices, etc.
624: 328: 167: 975: 1496: 1227: 572: 385: 245: 233: 191: 144:(inverse surveillance), as the latter does not necessarily aim to prevent or reduce surveillance. 1548: 1538: 1486: 1217: 766: 711: 393: 163: 133: 82: 35: 551:
Broadband receivers to detect radiating hostile radio frequency transmissions in the near field.
1563: 1501: 1481: 1430: 1187: 612: 309: 1629: 1450: 782: 685: 477: 1553: 1491: 1377: 1333: 1318: 1267: 1212: 792: 489: 673:
There are minimal anti-surveillance movements specifically targeted to Canada at present.
8: 1586: 1460: 1277: 1250: 891: 869: 736: 627:(TDR) for testing the integrity of copper telephone lines and other communication cables. 258: 129: 557:
one of the most important tools to have beside a ladder for providing a competent sweep.
1634: 1558: 1543: 1435: 1410: 1348: 1299: 1284: 446: 1025:(1993 ed.). Aspen, Colorado: ESI Education Development Corporation. p. 147. 300:
Another strategy is to utilize a room for safe conversations with these requirements:
1400: 1026: 904:
Taken together, the revelations have brought to light a global surveillance system...
823: 797: 706: 608: 568: 949: 1455: 1405: 787: 473: 323: 136:, visual surveillance devices, and countersurveillance software to thwart unwanted 887:"Edward Snowden, after months of NSA revelations, says his mission's accomplished" 587:
Lens detectors to detect the lenses of wired or wireless concealed covert cameras.
275:
Evasion: avoiding risky locations, being discreet or circumspect, using code words
1343: 1272: 564: 560: 450: 442: 217:
Popular interest in countersurveillance has been growing given media coverage of
1440: 1260: 882: 689: 496: 469: 305: 268: 229: 843: 547:
Technology most commonly used for a bug sweep includes but is not limited to:
1613: 1358: 1338: 1323: 936: 726: 313: 141: 1445: 1363: 1353: 1294: 662: 618: 602: 416: 389: 332: 125: 1127: 1255: 917:"New Miss Teen USA claims she was the victim of an online extortion plot" 818:
Walsh, James P. (2019). "Countersurveillance". In Deflem, Mathieu (ed.).
615:
for more advanced analysis of threatening and non threatening RF signals.
599:(NLJD) to detect components associated with hidden eavesdropping devices. 485: 420:
electronic, and physical examination in and about the surveyed facility.
516: 124:
refers to measures that are usually undertaken by the public to prevent
1328: 771: 636: 590: 554: 338:
No or little electronic equipment which must be sealed after being used
211: 171: 137: 1107: 1309: 1304: 1242: 870:"Information Security Expert to Host Seminar on Counter Surveillance" 731: 716: 680: 24: 1313: 692:
leaking thousands of NSA documents that revealed information about
481: 203: 179: 175: 844:"The Family of Technologies That Could Change The Privacy Dynamic" 721: 593:
for general measurements of power supplies and device components.
218: 248:
program baby monitor hacked in the bedroom of a Houston toddler.
401: 319: 396:-sweeping or electronic countersurveillance. It is related to 1068:"Data-collection program got green light from MacKay in 2011" 643: 581: 397: 630: 344:
Minimal furniture, preferably made of transparent materials
152: 1599:
Counterintelligence and counter-terrorism organizations
460: 1090:"Confirmed: Canada Has NSA-Style Surveillance Program" 646:
machine for checking the inside of objects and walls.
842:
International Association of Privacy Professionals.
278:
Being situation-aware ("looking over your shoulder")
974:[Eavesdropping] (in German). Archived from 468:Very sensitive equipment could be used to look for 357: 347:
Prohibition of introduction of electronic equipment
178:, or they may be built from circuit designs on the 49:. Unsourced material may be challenged and removed. 681:International movements currently active In Canada 210:or other proprietary assets (e.g. images) through 480:; however, if the place being monitored has many 1611: 1047:"SCEPTRE Signal Processing Software – 3dB Labs" 822:. John Wiley & Sons Ltd. pp. 374–388. 881: 779:, the U.S. government's TSCM training facility 1143: 295: 157: 998:"MSA Technical Surveillance Countermeasures" 1157: 197: 16:Measures undertaken to prevent surveillance 1150: 1136: 476:emitted by the computerized technology in 952:[Preventive measures] (in German) 366:List of counterintelligence organizations 109:Learn how and when to remove this message 341:Few cables that can be easily controlled 252: 1564:Scientific & Technical intelligence 1020: 930:"Baby monitor hacked in toddler's room" 495:Another method is using very sensitive 382:technical surveillance counter-measures 322:or windows that cannot be reached by a 153:Technical surveillance counter-measures 1612: 1065: 1131: 817: 668: 575:for signals that should not be there. 335:which covers doors, windows and walls 1386:By alliances, nations and industries 747:Common Vulnerabilities and Exposures 511: 461:Devices that do not emit radio waves 436: 47:adding citations to reliable sources 18: 859:, New York Magazine, July 29, 2013. 757:Personally identifiable information 696:This campaign is active worldwide. 413:United States Department of Defense 208:personally identifiable information 13: 507: 226:2013 mass surveillance disclosures 190:to Moscow which hid a device (the 14: 1651: 742:Cyber security and countermeasure 584:and broadband detection equipment 515: 372: 358:Countersurveillance by countries 23: 1534:Words of estimative probability 1396:Operational platforms by nation 1100: 1082: 1059: 1039: 1014: 990: 453:make detection more difficult. 34:needs additional citations for 1023:The Executive Protection Bible 964: 942: 922: 909: 875: 862: 849: 836: 820:The Handbook of Social Control 811: 752:Privacy-enhancing technologies 431: 202:Amidst concerns over privacy, 1: 1108:"Welcome | Transparent Lives" 804: 694:mass surveillance in the U.S. 605:for visualisation of signals. 331:through the realization of a 1066:Freeze, Colin (2013-06-10). 472:, or for the characteristic 7: 1582:Intelligence cycle security 1021:Braunig, Martha J. (1993). 928:ABC-News Boston (WCVB-TV). 857:"The Surveillance Free Day" 777:Interagency Training Center 699: 597:Nonlinear junction detector 10: 1656: 661:In 2011, Defence Minister 504:electromagnetic spectrum. 406:electronic countermeasures 296:Structural countermeasures 284:Hiding in secure locations 256: 158:Electronic countermeasures 1572: 1514: 1474: 1419: 1376: 1241: 1203: 1183: 1174: 1165: 868:The Wall Street Journal. 762:Countermeasure (computer) 656: 625:Time-domain reflectometer 329:Electromagnetic shielding 287:Concealing one's identity 168:electromagnetic radiation 1640:Covert listening devices 1112:surveillanceincanada.org 573:electromagnetic spectrum 392:denoting the process of 198:Software countermeasures 147: 134:covert listening devices 1549:Intelligence assessment 1539:All-source intelligence 1159:Intelligence management 767:Covert listening device 712:Communications security 578:GSM detection equipment 1233:Operational techniques 1188:Special reconnaissance 613:vector signal analyzer 478:digital tape recorders 915:New York Daily News. 885:(December 24, 2013). 783:Military intelligence 686:Amnesty International 488:, or other pieces of 253:Human countermeasures 58:"Countersurveillance" 1625:Espionage techniques 1554:Medical intelligence 1524:Competing hypotheses 1334:Industrial espionage 1319:Denial and deception 950:"Präventivmaßnahmen" 793:Security engineering 490:electrical equipment 43:improve this article 1620:Counterintelligence 1587:Counterintelligence 1502:Technical (TECHINT) 1497:Open-source (OSINT) 1487:Geospatial (GEOINT) 1461:Casualty estimation 1094:The Huffington Post 1002:www.msasecurity.net 892:The Washington Post 737:Cut-out (espionage) 388:Federal government 353:Regular inspections 259:Counterintelligence 130:covert surveillance 122:Countersurveillance 1559:Military geography 1544:Basic intelligence 1482:Financial (FININT) 1423:signature (MASINT) 1349:One-way voice link 1285:Concealment device 1072:The Globe and Mail 978:on 20 October 2020 919:, August 14, 2013. 669:Canadian Movements 527:. You can help by 447:burst transmission 384:) is the original 350:Acoustic isolation 166:emit some form of 1607: 1606: 1510: 1509: 1401:Direction finding 1391:In modern history 1372: 1371: 798:Telephone tapping 707:Computer security 609:Spectrum analyzer 571:for checking the 561:Frequency scanner 545: 544: 437:Radio frequencies 119: 118: 111: 93: 1647: 1406:Traffic analysis 1378:Signals (SIGINT) 1213:Asset recruiting 1181: 1180: 1172: 1171: 1152: 1145: 1138: 1129: 1128: 1122: 1121: 1119: 1118: 1104: 1098: 1097: 1086: 1080: 1079: 1074:. Archived from 1063: 1057: 1056: 1054: 1053: 1043: 1037: 1036: 1018: 1012: 1011: 1009: 1008: 994: 988: 987: 985: 983: 968: 962: 961: 959: 957: 946: 940: 926: 920: 913: 907: 906: 901: 899: 879: 873: 866: 860: 853: 847: 840: 834: 833: 815: 788:Secure telephone 563:with a range of 540: 537: 519: 512: 474:electrical noise 324:laser microphone 114: 107: 103: 100: 94: 92: 51: 27: 19: 1655: 1654: 1650: 1649: 1648: 1646: 1645: 1644: 1610: 1609: 1608: 1603: 1568: 1506: 1492:Imagery (IMINT) 1470: 1431:Electro-optical 1422: 1421:Measurement and 1415: 1368: 1344:Numbers station 1273:Black operation 1237: 1199: 1161: 1156: 1126: 1125: 1116: 1114: 1106: 1105: 1101: 1096:. 10 June 2013. 1088: 1087: 1083: 1064: 1060: 1051: 1049: 1045: 1044: 1040: 1033: 1019: 1015: 1006: 1004: 996: 995: 991: 981: 979: 970: 969: 965: 955: 953: 948: 947: 943: 927: 923: 914: 910: 897: 895: 880: 876: 867: 863: 854: 850: 841: 837: 830: 816: 812: 807: 802: 702: 683: 671: 659: 619:Thermal imagers 541: 535: 532: 525:needs expansion 510: 508:Technology used 497:thermal cameras 470:magnetic fields 463: 451:spread spectrum 443:radio frequency 439: 434: 375: 360: 298: 269:countermeasures 261: 255: 200: 160: 155: 150: 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 1653: 1643: 1642: 1637: 1632: 1627: 1622: 1605: 1604: 1602: 1601: 1596: 1595: 1594: 1584: 1578: 1576: 1570: 1569: 1567: 1566: 1561: 1556: 1551: 1546: 1541: 1536: 1531: 1529:Target-centric 1526: 1520: 1518: 1512: 1511: 1508: 1507: 1505: 1504: 1499: 1494: 1489: 1484: 1478: 1476: 1472: 1471: 1469: 1468: 1458: 1453: 1451:Radiofrequency 1448: 1443: 1438: 1433: 1427: 1425: 1417: 1416: 1414: 1413: 1408: 1403: 1398: 1393: 1388: 1382: 1380: 1374: 1373: 1370: 1369: 1367: 1366: 1361: 1356: 1351: 1346: 1341: 1336: 1331: 1326: 1321: 1316: 1307: 1302: 1297: 1292: 1287: 1282: 1281: 1280: 1270: 1265: 1264: 1263: 1258: 1247: 1245: 1239: 1238: 1236: 1235: 1230: 1225: 1220: 1215: 1209: 1207: 1201: 1200: 1198: 1197: 1196: 1195: 1184: 1178: 1176:Human (HUMINT) 1169: 1163: 1162: 1155: 1154: 1147: 1140: 1132: 1124: 1123: 1099: 1081: 1078:on 2013-06-30. 1058: 1038: 1031: 1013: 989: 972:"Lauschabwehr" 963: 941: 935:2013-08-22 at 921: 908: 883:Barton Gellman 874: 861: 855:Roose, Kevin. 848: 835: 828: 809: 808: 806: 803: 801: 800: 795: 790: 785: 780: 774: 769: 764: 759: 754: 749: 744: 739: 734: 729: 724: 719: 714: 709: 703: 701: 698: 690:Edward Snowden 682: 679: 670: 667: 658: 655: 651: 650: 647: 640: 634: 628: 622: 616: 606: 600: 594: 588: 585: 579: 576: 558: 552: 543: 542: 522: 520: 509: 506: 462: 459: 438: 435: 433: 430: 374: 371: 370: 369: 359: 356: 355: 354: 351: 348: 345: 342: 339: 336: 326: 316: 306:access control 297: 294: 289: 288: 285: 282: 279: 276: 257:Main article: 254: 251: 250: 249: 243: 240: 199: 196: 159: 156: 154: 151: 149: 146: 117: 116: 31: 29: 22: 15: 9: 6: 4: 3: 2: 1652: 1641: 1638: 1636: 1633: 1631: 1628: 1626: 1623: 1621: 1618: 1617: 1615: 1600: 1597: 1593: 1592:organizations 1590: 1589: 1588: 1585: 1583: 1580: 1579: 1577: 1575: 1574:Dissemination 1571: 1565: 1562: 1560: 1557: 1555: 1552: 1550: 1547: 1545: 1542: 1540: 1537: 1535: 1532: 1530: 1527: 1525: 1522: 1521: 1519: 1517: 1513: 1503: 1500: 1498: 1495: 1493: 1490: 1488: 1485: 1483: 1480: 1479: 1477: 1473: 1466: 1462: 1459: 1457: 1454: 1452: 1449: 1447: 1444: 1442: 1439: 1437: 1434: 1432: 1429: 1428: 1426: 1424: 1418: 1412: 1409: 1407: 1404: 1402: 1399: 1397: 1394: 1392: 1389: 1387: 1384: 1383: 1381: 1379: 1375: 1365: 1362: 1360: 1359:Steganography 1357: 1355: 1352: 1350: 1347: 1345: 1342: 1340: 1339:Interrogation 1337: 1335: 1332: 1330: 1327: 1325: 1324:Eavesdropping 1322: 1320: 1317: 1315: 1311: 1308: 1306: 1303: 1301: 1298: 1296: 1293: 1291: 1288: 1286: 1283: 1279: 1276: 1275: 1274: 1271: 1269: 1266: 1262: 1259: 1257: 1254: 1253: 1252: 1249: 1248: 1246: 1244: 1240: 1234: 1231: 1229: 1228:Direct action 1226: 1224: 1223:Covert action 1221: 1219: 1216: 1214: 1211: 1210: 1208: 1206: 1202: 1194: 1193:organizations 1191: 1190: 1189: 1186: 1185: 1182: 1179: 1177: 1173: 1170: 1168: 1164: 1160: 1153: 1148: 1146: 1141: 1139: 1134: 1133: 1130: 1113: 1109: 1103: 1095: 1091: 1085: 1077: 1073: 1069: 1062: 1048: 1042: 1034: 1032:0-9640627-0-4 1028: 1024: 1017: 1003: 999: 993: 977: 973: 967: 951: 945: 938: 937:archive.today 934: 931: 925: 918: 912: 905: 894: 893: 888: 884: 878: 872:July 10, 2013 871: 865: 858: 852: 845: 839: 831: 829:9781119372356 825: 821: 814: 810: 799: 796: 794: 791: 789: 786: 784: 781: 778: 775: 773: 770: 768: 765: 763: 760: 758: 755: 753: 750: 748: 745: 743: 740: 738: 735: 733: 730: 728: 727:Sousveillance 725: 723: 720: 718: 715: 713: 710: 708: 705: 704: 697: 695: 691: 687: 678: 674: 666: 664: 654: 648: 645: 641: 638: 635: 632: 629: 626: 623: 620: 617: 614: 610: 607: 604: 601: 598: 595: 592: 589: 586: 583: 580: 577: 574: 570: 566: 562: 559: 556: 553: 550: 549: 548: 539: 530: 526: 523:This section 521: 518: 514: 513: 505: 501: 498: 493: 491: 487: 483: 479: 475: 471: 466: 458: 454: 452: 448: 444: 429: 425: 421: 418: 414: 409: 407: 403: 399: 395: 391: 387: 386:United States 383: 379: 373:United States 368: 367: 362: 361: 352: 349: 346: 343: 340: 337: 334: 330: 327: 325: 321: 317: 315: 314:burglar alarm 311: 307: 303: 302: 301: 293: 286: 283: 280: 277: 274: 273: 272: 270: 265: 260: 247: 244: 241: 238: 235: 231: 227: 224: 223: 222: 221:violations: 220: 215: 213: 209: 205: 195: 193: 189: 188:US Ambassador 183: 181: 177: 173: 169: 165: 145: 143: 142:sousveillance 139: 135: 131: 127: 123: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 1630:Surveillance 1364:Surveillance 1354:Resident spy 1295:Cryptography 1115:. Retrieved 1111: 1102: 1093: 1084: 1076:the original 1071: 1061: 1050:. Retrieved 1041: 1022: 1016: 1005:. Retrieved 1001: 992: 980:. Retrieved 976:the original 966: 954:. Retrieved 944: 939:Aug 14, 2013 924: 911: 903: 898:December 25, 896:. Retrieved 890: 877: 864: 851: 838: 819: 813: 684: 675: 672: 663:Peter MacKay 660: 652: 603:Oscilloscope 546: 533: 529:adding to it 524: 502: 494: 486:photocopiers 467: 464: 455: 440: 426: 422: 417:surveillance 410: 390:abbreviation 381: 377: 376: 363: 333:Faraday cage 299: 290: 266: 262: 216: 201: 184: 161: 128:, including 126:surveillance 121: 120: 105: 96: 86: 79: 72: 65: 53: 41:Please help 36:verification 33: 1436:Geophysical 1218:Cell system 1205:Clandestine 982:6 September 956:6 September 637:Videoscopes 591:Multimeters 457:detection. 432:Methodology 318:Absence of 172:radio waves 99:August 2013 1614:Categories 1465:earthquake 1329:False flag 1167:Collection 1117:2015-11-26 1052:2022-11-01 1007:2023-10-13 805:References 772:Encryption 555:Flashlight 212:cyberspace 170:, usually 138:cybercrime 69:newspapers 1635:Espionage 1456:Materials 1310:Defection 1305:Dead drop 1278:black bag 1243:Espionage 732:Dead drop 717:Espionage 642:Portable 536:June 2008 482:computers 271:include: 176:magazines 1516:Analysis 1314:Turncoat 1261:handling 933:Archived 700:See also 565:antennas 246:ABC News 204:software 180:Internet 1463: ( 1441:Nuclear 1411:TEMPEST 722:Privacy 569:filters 408:(ECM). 320:windows 304:Strict 230:Snowden 219:privacy 83:scholar 1300:Cutout 1251:Agents 1029:  826:  657:Canada 402:SIGINT 267:Human 85:  78:  71:  64:  56:  1475:Other 1446:Radar 1290:Cover 1268:Asset 1256:field 644:x-ray 631:Tools 398:ELINT 310:locks 308:with 237:PRISM 192:Thing 162:Most 148:Types 90:JSTOR 76:books 1027:ISBN 984:2020 958:2020 900:2013 824:ISBN 611:and 582:WiFi 567:and 449:and 411:The 404:and 378:TSCM 364:See 312:and 164:bugs 62:news 531:. 394:bug 234:NSA 194:). 45:by 1616:: 1312:/ 1110:. 1092:. 1070:. 1000:. 902:. 889:. 484:, 400:, 239:). 214:. 182:. 1467:) 1151:e 1144:t 1137:v 1120:. 1055:. 1035:. 1010:. 986:. 960:. 832:. 538:) 534:( 380:( 232:/ 228:( 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"Countersurveillance"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
surveillance
covert surveillance
covert listening devices
cybercrime
sousveillance
bugs
electromagnetic radiation
radio waves
magazines
Internet
US Ambassador
Thing
software
personally identifiable information
cyberspace
privacy
2013 mass surveillance disclosures
Snowden
NSA

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.