1 / 59

Technical Surveillance and You !

Technical Surveillance and You !. Standard security measures. Door and window locks Intruder alarm External and internal CCTV Manned reception/security Security fencing Firewalls. “THE FORTRESS MENTALITY”. All standard security measures are designed to

varden
Télécharger la présentation

Technical Surveillance and You !

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Technical Surveillance and You!

  2. Standard security measures • Door and window locks • Intruder alarm • External and internal CCTV • Manned reception/security • Security fencing • Firewalls

  3. “THE FORTRESS MENTALITY” All standard security measuresare designed to deter, defeat or detect an OVERTthreat or to keep out what is already out.

  4. What is technical surveillance? The use of electronic devices to covertlyobserve,monitor, and record the conversations and movements of an individual or organisation without their knowledge or consent in order to ascertain their past, present, and future intentions.

  5. REMEMBER! • Technical surveillance is often the key intelligence and information gathering tool and will be complimented by other covert tactics and used to corroborate intelligence and information gathered by other means. • It is the most cost effective way of obtaining direct information about the subject YOU or YOUR business

  6. Technical surveillance urban myths • It is staff intensive. • It is resource intensive. • It is expensive. • It only happens on the TV or is conducted only by spies.

  7. The urban myth Surveillance van exterior Surveillance van interior

  8. The reality • Advances is technology have led to the provision of low cost, low technology user friendly devices. • Devices are obtainable from numerous sources. • A technical surveillance capability is now available to everyone including the man in the street.

  9. The reality

  10. Device supply in the UK • 50 online UK shops. • Major high street store with over 150 retail outlets in the UK. • Unknown number of electronic specialists building devices to order. • Delivery from an unknown number of online and high street outlets worldwide via courier.

  11. Motivating factors • Money • Power • Influence

  12. Where does it take place? Anywhere YOU, YOUR affairs, or YOUR businessis discussed or conductedieYOUR home, office, hotel, even in YOUR vehicle.

  13. Categories of subject Domestic • Straying spouses, divorces, custody claims, estate settlements, family disputes. Celebrity • Any high profile individual, their friends, associates and staff.

  14. Corporate • Large businesses, public sector organizations, any high profile or controversial organisation, those involved in research, contracts, mergers, and takeovers. Government • MP’s, civil servants, embassies and trade delegations.

  15. What information do they seek? • Personal. Information about YOU! • Business. Information about YOUR business! • Leverage. Information which if disclosed would cause substantial embarrassment or loss of credibility to the subject YOU! This makes YOU vulnerable to blackmail or other forms of coercion.

  16. Types of surveillance device • Improvised Built for another purpose • Dedicated Built specifically to obtain information

  17. Improvised surveillance devices

  18. Dedicated surveillance devices • Microphone and listener • Microphone and recorder • Analogue and digital radio transmitters (RF and GSM) • Optical devices (laser/infra red) • Vibration devices (accelerometers) • Covert cable

  19. Probe and parabolic microphones

  20. GSM UHF

  21. Optical Vibration

  22. REMEMBER! • Devices can recordaudio, visual or both. • Due to their size devices can be concealed: • On the person • In personal items • In furniture or office equipment • In fixtures and fittings such as electrical power points.

  23. Device life expectancy Limited Life Device • Operates from a battery source. If undiscovered and dependant on usage can remain operational for up to SIX MONTHS. Infinity Device • Wired into the mains electricity. If undiscovered will transmit FOREVER subject to fair wear and tear of the device.

  24. Surveillance in your workplace For the purposes of this scenario and ease of explanation we will use an office facility but the principal remains the same for the home, hotel and vehicle. Try to think of this as YOURoffice facility with YOURrooms full of YOURcompany’s possessions, IT, documentation, and staff.

  25. Your office facility

  26. Your main office area

  27. Your conference room

  28. Your office

  29. Ask yourself • Who has access to your office facility? • Who is there legitimately? • Do you know where they go once inside? • Let us see who has access to your office.

  30. Management and staff

  31. Maintenance staff

  32. Contractors and sub contractors

  33. Clients

  34. Others

  35. Ask yourself. • Do you know who they really are? • Do you know what they really do and who they really work for? • Do you know their real circumstances?

  36. REMEMBER! • People are not always what they appear to be. • Some including staff may have other motivating factors or another agenda. • If that is so what is it?

  37. Adevice in your office? Think! • Where is it? • What does it look like? • Who put it there? • How long has it been there? • What are the consequences for you, your staff, and your business?

  38. Where is it?

  39. What does it look like?

  40. How long has it been there?

  41. What are the consequences?

  42. Concealment! • The previous images illustrated items that historically have been used to conceal covert electronic audio visual devices.

  43. Who may have put it there?

  44. Unscrupulous media

  45. P.I. Pressure Group

  46. Criminals Competitors

  47. Expartners Coerced staff

  48. TerroristsForeignpowers

  49. Consequences • The results of a successful technical surveillance operation on you or your business may be one or more of the following!

  50. Adverse media coverage and loss of court settlements.

More Related