OPSEC: Physical Surveillance Detection & Counter-Surveillance Basics
Difficulty: Advanced
Time to Complete: 60-90 minutes
Overview
Physical surveillance is real and detectable. This tutorial covers recognizing when you are being followed, basic counter-surveillance techniques, and when to seek professional help.
UNDERSTANDING SURVEILLANCE
Who Conducts Surveillance:
- Law enforcement (with or without warrant)
- Private investigators
- Corporate security
- Stalkers and harassers
- Foreign intelligence services
- Cybercriminals (digital only)
Types of Surveillance:
| Type | Description | Detection Difficulty |
|---|---|---|
| Static | Fixed position observation | Medium |
| Mobile | Following on foot/vehicle | Medium |
| Technical | Cameras, bugs, trackers | Hard |
| Digital | Online tracking, metadata | Very Hard |
| Combined | Multiple methods together | Very Hard |
SURVEILLANCE INDICATORS
On Foot:
- Same person seen multiple times in different locations
- People appearing to take interest in your activities
- Vehicles parked for extended periods
- Workers in area that seems unusual
- People avoiding eye contact or suddenly looking away
- Someone mirroring your movements
While Driving:
- Same vehicle behind you for multiple turns
- Vehicle pulls out when you pull out
- Headlights appear in mirrors consistently
- Unfamiliar vehicle at your regular destinations
- Cars pacing you (one ahead, one behind)
At Home:
- Unfamiliar vehicles in neighborhood
- People walking dogs repeatedly past your house
- Workers in area you do not recognize
- Signs of entry when you return home
- Items slightly moved from where you left them
- Unusual sounds on phone line
SURVEILLANCE DETECTION ROUTE (SDR)
Purpose: Determine if you are being followed
Foot SDR:
- Start from normal location (coffee shop, store)
- Take route with multiple direction changes
- Include at least 4 turns (right, left, right, left)
- Pass by reflective surfaces (store windows)
- Stop unexpectedly, observe who stops
- Enter crowded area, observe who enters
- Use public transit (get on/off quickly)
- End at secure location
Vehicle SDR:
- Drive normal route initially
- Make 4+ turns in residential area
- Include at least one right turn followed by left
- Use multiple lanes, observe mirrors
- Stop at 4-way stops (observe who stops)
- Drive slightly below speed limit
- Take route unfamiliar to most drivers
- End at secure location (not your home)
Timing:
- Should take 15-30 minutes
- Long enough to reveal pattern
- Short enough to be practical
COUNTER-SURVEILLANCE TECHNIQUES
Natural Behaviors:
- Act normally (surveillance expects nervous behavior)
- Do not constantly check mirrors
- Maintain regular speed and patterns
- Use peripheral vision for observation
Observation Points:
- Shop windows (reflective surfaces)
- Elevated positions (parking garages)
- Intersections with good visibility
- Public places with multiple exits
Ambush Technique:
- Turn corner, immediately stop
- Observe who appears in next few seconds
- Anyone turning same corner = suspect
Public Transit:
- Get on just before doors close
- Get off at unexpected stop
- Change cars mid-route
- Use stations with multiple exits
TECHNICAL SURVEILLANCE DETECTION
Vehicle Trackers:
Common Locations:
- Wheel wells (magnetic)
- Under bumpers
- Inside bumpers
- Under hood (wired)
- OBD-II port (wired)
- Inside vehicle (bluetooth)
Detection:
- Visual inspection weekly
- Run hand along wheel wells
- Check OBD-II port (under dash)
- Look for new scratches on exterior
- Use RF detector for active trackers
Removal:
- Photograph before removing
- Wear gloves (preserve evidence)
- Bag and document
- Consider reporting to authorities
Bugs/Listening Devices:
Signs:
- Phone battery draining faster
- Unusual sounds on calls
- Electronics interfering with each other
- Finding unfamiliar devices
Detection:
- Sweep with RF detector
- Check for new objects in room
- Look for moved items
- Professional TSCM sweep for high-risk
DIGITAL SURVEILLANCE INDICATORS
Phone:
- Battery draining unusually fast
- Phone warm when not in use
- Background noise on calls
- Delayed shutdown
- Apps you do not recognize
- Increased data usage
Computer:
- Webcam light turning on unexpectedly
- Cursor moving on its own
- Programs opening/closing
- Slow performance
- Unusual network activity
- Antivirus disabled
Response:
- Do not use compromised device
- Factory reset or replace
- Change passwords from clean device
- Enable 2FA on all accounts
IF YOU CONFIRM SURVEILLANCE
Immediate Actions:
- Do not confront - Confirms you have noticed
- Go to safe location - Police station, crowded area
- Document everything - Photos, descriptions, times
- Change patterns - Different routes, times
- Inform trusted contacts - Let someone know
- Consider legal options - Restraining order, police report
When to Seek Help:
- Surveillance continues for days
- You feel physically threatened
- Home has been entered
- Devices are compromised
- You are a high-value target
Professional Resources:
- Private security firms (TSCM sweeps)
- Digital forensics experts
- Legal counsel
- Law enforcement (if appropriate)
SAFE MEETING PRACTICES
Location Selection:
- Public places with multiple exits
- Moderate crowd (not empty, not packed)
- Good lighting
- Away from surveillance cameras if possible
- Not your regular locations
- Not near your home or work
Timing:
- Vary meeting times
- Do not establish patterns
- Arrive separately, leave separately
- Have cover story if needed
Communication:
- Use encrypted messaging
- Confirm meeting day-of
- Have backup location
- Establish check-in protocol
LEGAL CONSIDERATIONS
What is Legal:
- Walking/driving normal routes
- Observing your surroundings
- Photographing public spaces
- Installing cameras on YOUR property
- Recording conversations (one-party consent states)
What is NOT Legal:
- Trespassing on private property
- Wiretapping without consent
- Installing trackers on vehicles you do not own
- Harassment or stalking
- Breaking and entering
Your Rights:
- Right to photograph in public
- Right to refuse consent to search
- Right to remain silent
- Right to attorney
- Right to ask if you are free to leave
QUICK REFERENCE: Surveillance Checklist
Daily Habits:
- Vary your routes and times
- Check vehicle for trackers weekly
- Monitor phone/computer for anomalies
- Be aware of surroundings
- Note recurring faces/vehicles
If Suspicious:
- Document observations (time, location, description)
- Conduct surveillance detection route
- Change your patterns
- Inform trusted contact
- Consider professional help
High-Risk Situations:
- Use secure communication only
- Meet in public locations
- Vary all routines
- Consider relocation temporarily
- Seek professional security advice
OPSEC Fundamentals Series - Vivaed @ endscenar.io
Related Guides:
- OPSEC Fundamentals: Protecting Yourself in a Digital Surveillance State
- OPSEC Guide: Digital Footprint Reduction & Data Broker Removal
Sources: Former Intelligence Community Professionals, Private Security Industry Standards, Electronic Frontier Foundation, ACLU Know Your Rights