Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Security & Counter-Surveillance

Security & Counter-Surveillance

Ratings: (0)|Views: 35|Likes:

More info:

Categories:Types, Research, History
Published by: James Allen Isaacs Jr. on Dec 15, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





Security &Counter-Surveillance
Revised & Updated:
Surveillance Technology & Techniques
Section on Informant & Infiltration Operations
Information Against the Police State
2009 edition; Vancouver, Canada/Coast Salish Territory
2. Surveillance
3. Security
4. Principles of Surveillance
5. Physical Surveillance
 ______________4Operator's & Vehicles4Fixed Surveillance4Mobile Surveillance4Four Phases of Mobile_____________5Other Forms5
6. Technical Surveillance
5 Telecommunications5Listening Devices__________________6Parabolic Mics6Video Cameras____________________7Still Photography7 Tracking Devices7Night Vision & Thermal7Biometrics_________________________8UAV's8Satellite8
7. Surveillance Detection
 _____________9Physical Surveillance9 Technical Surveillance____________10Security Against Technical 10
8. Surveillance and Evasion
9. Informants & Infiltrators
13Dealing with/_____________________15
10. FBI Cointel-Pro
 __________________ 16Cointel-Pro Techniques 16Cointel-Pro Case Studies_________ 18
11. Case Studies of Informantsand Infiltrators_________________
12. Security Guidelines
2Big Brother is watching, more thanever before
In countless ways, surveillance isemerging as the dominant way themodern world organizes itself.B
ritain now has an estimated 4.2 millionCCTV cameras—one for every 14 citizens.People in central London are now caught oncamera about 300 times a day.Surveillance is a condition of modernity,integral to the development of the nation-state and capitalism...More than ever before, our lives are visibleto others, from government agencies andsecurity services to the owners of thewebsites we surf and the stores where weshop. They track us in public, inworkplaces and online, compiling ourpersonal information in massive databasesand sorting us into categories of risk, valueand trustworthiness.CCTV cameras are just one of their tools.Others include radio frequencyidentification (RFID) chips, GPS locationtrackers, website cookies, facial recognitionsoftware and store loyalty cards. Computerprograms used by security services canmonitor and analyze billions of phone callsand e-mails in real time. We even make iteasier for our trackers by willinglydisclosing pieces of our lives on socialnetworking sites like Facebook or in onlinecontests & questionnaires.In one form or another, surveillance hasalways been a part of human society.What's new is computer technology thathas made it possible to integrate vast anddiverse bits of information. As well, ourpost-9/11 obsession with eliminating riskhas produced an architecture of masssurveillance in which everyone is treated asa suspect.
Don Butler, “Big Brother is watching, more than everbefore”,
Vancouver Sun 
, Feb. 3, 2009
And for those who really are 'suspects', read on...
"Those in authority fear themask for their power partlyresides in identifying, stampingand cataloguing: in knowing whoyou are... our masks are not toconceal our identity but to revealit...”
Text on inside of 9,000 masksdistributed at the Carnival AgainstCapitalism, London, June 1999
1. Introduction
Security is vital to the success & survival of theresistance movement. This is because we have an enemy whoactively works to undermine, neutralize, & ultimately destroyus. Failure to remain aware of security concerns can mean thedifference between victory or defeat, freedom or imprisonment,life or death. Not only for yourself, but others around you.Information gathered from various sources, & that issubjected to analysis & comparison, is called
. Thegathering of intelligence is a vital part of counter-insurgencyoperations, without which the enemy does not know who, what,where or when to strike.Security & Counter-Surveillance measures aredesigned to limit & deny the flow of information to enemyforces. It is based on the principle that counter-insurgency is a permanent part of society and that those engaged in resistanceare always vulnerable to surveillance & repression.
2. Surveillance
is the continuous, secretive observation of  persons, places, things or objects, in order to gain information.
There are two types of surveillance: physical & technical.Physical surveillance
is carried out by enemy personnelon foot and/or by vehicle. It is the only way a target person can be continuously observed over an extended period of time.Surveillance teams can be comprised of two persons in onevehicle, or a dozen operators in six vehicles (or even more, of course). In addition, motorcycles, bikes, planes & helicoptersmay also be used.In this category we must also consider informants,infiltrators & collaborators. They may be police agents,civilians recruited by police, or former comrades. This form of  physical surveillance is the main source of intelligence on people’s thoughts, plans & activities. It is sometimes referredto as ‘human intelligence’. Because of the sensitive nature of  personal information they are able to gather, and their ability toinfluence events, infiltrators & informants are especiallydangerous.
Technical surveillance
is far more common. Withwidespread use of telecommunications (phone, cell, pager,internet, fax), technical surveillance is a main source of intelligence on a persons day to day activities, contacts, personal relationships, etc. More generally, it consists of technical devices to record, document or monitor a targetindividual’s movements, conversations, or activities. Thisincludes listening devices in homes & cars, tapped telephones,monitoring of internet activity, CCTV video, tracking devices,night-vision devices, etc.The urban environment is far more conducive tosurveillance, due to the large masses of people,communications & electrical systems, structures, & vehicles inwhich operators & devices can be concealed. In the city, thereare also tens of thousands of CCTV videocameras, in stores, banks, malls, offices, schools, transit, streets& intersections.In rural areas, physical surveillance is more oftennecessary due to the lack of telecommunications, roads, etc.Low population densities also serve to identify surveillanceoperators as ‘outsiders’. For these reasons, physicalsurveillance in rural areas often requires long-range observation(by ground teams, aircraft, or satellite in high prioritysituations). In some cases, police in military-style camouflagesecretly conduct surveillance at a much closer range.
3. Security
1. Measures adopted to guard against attack, theftor disclosure. 2. Something that gives or assures safety &confidence…As noted, the purpose of security is to protect our movement. A vital part of this is to limit or deny the flow of information to enemy forces. The following 4 principles should be seen as basic & fundamental security guidelines:
Do not send or discuss sensitive information overany form of telecommunications
(phone, cell,internet, etc.), all of which are vulnerable tointerception.
Cell Phones
can be made into activelistening devices and should have their batteriesremoved before discussing any secret information.
Never discuss sensitive information in any enclosedarea
vulnerable to listening devices (i.e., homes,vehicles, cafes, etc.).
Follow the
If a person isnot involved in the information, then they do not needto know its contents. The less a person knows, the lessdanger there is they can tell others.
Avoid those unable to follow basic security codes.
They are a danger to you and the movement. Thisincludes persons who talk too much, who do not takesecurity seriously, alcoholics, etc.
4. Principles of Surveillance
As noted, surveillance is the secretive, continuouswatching of a person, place, vehicle, or object in order to gaininformation. In order to be effective, surveillance must gounnoticed and be undetected. As soon as the target is aware he/she is under surveillance, they will alter their behavior &conceal any ‘suspicious’ activities, as well as stop the flow of information. For this reason, surveillance can be difficult todetect because it strives to be covert & hidden.Developing information through surveillance is a progressive & often lengthy process. It is from many pieces of information that an overall picture of the target’s patterns isdeveloped.Surveillance will normally begin with limitedinformation on a targeted individual’s activities, a residence or workplace, etc. More info will be developed in order toidentify times, locations, routes of travel, or activities on which

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->