Site icon Survival Dispatch

Counter Intel & Surveillance Preparedness

BLUF: Countering Intel/Surveillance can be loosely categorized into 4 categories; Deception (disinformation) and Neutralization (taking people or resources off the board), both  offensive actions, as well as Detection(surveillance and investigations) and Deterrence (security systems and procedures), both defensive actions.

》Detection of the surveillance or intel gathering activities can be done by investigation, security procedures, notification by a third party, or by luck (though we don’t recommend relying on this one). Running Surveillance Detection Routes (SDR) when you are mobile can help to spot a “tail” (someone who is following you). Random perimeter/property sweeps of your house or property can help to spot electronic surveillance (bugs) or a nearby eavesdropping team. Both are easy to implement. Depending on the situation; private investigators, law enforcement, or a security consultant may be necessary. An obvious on the street example is maintaing awareness or your surrounds with a disrceet glance over the should, a NON-OBVIOUS glance.

》Deterrence is an overt show of force. Your security procedures and precautions may need to be observeable IOT deter anyone. Being gray, not being outwardly cautions, may make it appear as if you’re not aware or you don’t have protection.  Sometimes it’s best to become a hard target by flexing your “muscle”. Let others know you’re watching, “burn” them. Let then know the police have been called or that you carry a weapon, or that you know they’re watching you. THIS COULD ACTUALLY MEAN BEING OBVIOUSE WITH A COMPLETE STOP ON THE SIDEWALK FOLLOWED BY A STARE AT THEM, MAKING THEM AWARE YOU KNOW THEY’RE FOLLOWING.

Consider security cameras, proper landscaping, high walls, fences, dead bolt locks, barred windows, guard dogs, controlled access points, or if you’re on a budget, even a sign that says you have any of these things can be a deterrent.

》Deception or disinformation is an offensive form of counter-intelligence. In simple terms; lying, distractions, and false fronts.

On the personal level, for most, the biggest threat here is data aggregators and brokers. Others may research or “skip trace” using these online resources.  Use it against them by entering false or misleading information when you create website accounts, or fill out surveys. Sign-up for various services or websites and enter semi-factual info, enough so that it can be scraped by Spokeo or MyLife, (people search databases). You can also create accounts and edit your profiles on many of the aggregate pages IOT to edit data they’ve already discovered.

Also make it seem like there is someone home when you’re not (lights on and TV going). Make it appear there are more people living on your property than there really are (additional cars, clothes on a clothesline).

》Neutralization is an offensive action and it can mean lethal force IF NECESSARY. This is rarely the case. Unless your life or someone else’s is in danger and non-lethal force is not an option, avoid it.

Neutralization can also mean, removing an enemy’s pieces from the board. Taking them out of play in some manner (blackmail, restraining order, threats) or making it so that they are no longer effective. This can be done in a wide range of ways based on the situation ranging from covert to completely overt. However in most situations, to remain legal, this will be done by involving some kind of law enforcement.

Debrief: Which of the 4 categories you use will depend on your situation and should be based on your evaluation of the threat. However, a layered approach of deception, detection, and deterrence will be most successful in prevention. Neutralization is to be saved in the event the other approaches fail.

If you become aware of a threat to your life or your family; you should involve law enforcement (LE) as soon as possible (as long as rule of law remains). Even if they can’t immediately do anything, due to no crime being committed, they may be able to offer some protection (deterrence) or investigative (detection) help. If criteria is met, they could pursue charges of stalking, harassment, etc. If LE can’t aid; follow the 4 steps.

The real question is why are you being watched? Answer that first! Then resolve the root cause.

This article was originally written by the Grayman Briefing. Stay in the know, sign up for Intel and Situational Awareness alerts pushed to your phone on emerging threats and preparedness warnings. Click HERE to subscribe to the Grayman Briefing.

Exit mobile version
Skip to toolbar