OPSEC Guide: Physical Surveillance Detection & Counter-Surveillance

OPSEC: Physical Surveillance Detection & Counter-Surveillance Basics

Difficulty: Advanced
Time to Complete: 60-90 minutes


Overview

Physical surveillance is real and detectable. This tutorial covers recognizing when you are being followed, basic counter-surveillance techniques, and when to seek professional help.


UNDERSTANDING SURVEILLANCE

Who Conducts Surveillance:

  • Law enforcement (with or without warrant)
  • Private investigators
  • Corporate security
  • Stalkers and harassers
  • Foreign intelligence services
  • Cybercriminals (digital only)

Types of Surveillance:

Type Description Detection Difficulty
Static Fixed position observation Medium
Mobile Following on foot/vehicle Medium
Technical Cameras, bugs, trackers Hard
Digital Online tracking, metadata Very Hard
Combined Multiple methods together Very Hard

SURVEILLANCE INDICATORS

On Foot:

  • Same person seen multiple times in different locations
  • People appearing to take interest in your activities
  • Vehicles parked for extended periods
  • Workers in area that seems unusual
  • People avoiding eye contact or suddenly looking away
  • Someone mirroring your movements

While Driving:

  • Same vehicle behind you for multiple turns
  • Vehicle pulls out when you pull out
  • Headlights appear in mirrors consistently
  • Unfamiliar vehicle at your regular destinations
  • Cars pacing you (one ahead, one behind)

At Home:

  • Unfamiliar vehicles in neighborhood
  • People walking dogs repeatedly past your house
  • Workers in area you do not recognize
  • Signs of entry when you return home
  • Items slightly moved from where you left them
  • Unusual sounds on phone line

SURVEILLANCE DETECTION ROUTE (SDR)

Purpose: Determine if you are being followed

Foot SDR:

  1. Start from normal location (coffee shop, store)
  2. Take route with multiple direction changes
  3. Include at least 4 turns (right, left, right, left)
  4. Pass by reflective surfaces (store windows)
  5. Stop unexpectedly, observe who stops
  6. Enter crowded area, observe who enters
  7. Use public transit (get on/off quickly)
  8. End at secure location

Vehicle SDR:

  1. Drive normal route initially
  2. Make 4+ turns in residential area
  3. Include at least one right turn followed by left
  4. Use multiple lanes, observe mirrors
  5. Stop at 4-way stops (observe who stops)
  6. Drive slightly below speed limit
  7. Take route unfamiliar to most drivers
  8. End at secure location (not your home)

Timing:

  • Should take 15-30 minutes
  • Long enough to reveal pattern
  • Short enough to be practical

COUNTER-SURVEILLANCE TECHNIQUES

Natural Behaviors:

  • Act normally (surveillance expects nervous behavior)
  • Do not constantly check mirrors
  • Maintain regular speed and patterns
  • Use peripheral vision for observation

Observation Points:

  • Shop windows (reflective surfaces)
  • Elevated positions (parking garages)
  • Intersections with good visibility
  • Public places with multiple exits

Ambush Technique:

  1. Turn corner, immediately stop
  2. Observe who appears in next few seconds
  3. Anyone turning same corner = suspect

Public Transit:

  • Get on just before doors close
  • Get off at unexpected stop
  • Change cars mid-route
  • Use stations with multiple exits

TECHNICAL SURVEILLANCE DETECTION

Vehicle Trackers:

Common Locations:

  • Wheel wells (magnetic)
  • Under bumpers
  • Inside bumpers
  • Under hood (wired)
  • OBD-II port (wired)
  • Inside vehicle (bluetooth)

Detection:

  • Visual inspection weekly
  • Run hand along wheel wells
  • Check OBD-II port (under dash)
  • Look for new scratches on exterior
  • Use RF detector for active trackers

Removal:

  • Photograph before removing
  • Wear gloves (preserve evidence)
  • Bag and document
  • Consider reporting to authorities

Bugs/Listening Devices:

Signs:

  • Phone battery draining faster
  • Unusual sounds on calls
  • Electronics interfering with each other
  • Finding unfamiliar devices

Detection:

  • Sweep with RF detector
  • Check for new objects in room
  • Look for moved items
  • Professional TSCM sweep for high-risk

DIGITAL SURVEILLANCE INDICATORS

Phone:

  • Battery draining unusually fast
  • Phone warm when not in use
  • Background noise on calls
  • Delayed shutdown
  • Apps you do not recognize
  • Increased data usage

Computer:

  • Webcam light turning on unexpectedly
  • Cursor moving on its own
  • Programs opening/closing
  • Slow performance
  • Unusual network activity
  • Antivirus disabled

Response:

  • Do not use compromised device
  • Factory reset or replace
  • Change passwords from clean device
  • Enable 2FA on all accounts

IF YOU CONFIRM SURVEILLANCE

Immediate Actions:

  1. Do not confront - Confirms you have noticed
  2. Go to safe location - Police station, crowded area
  3. Document everything - Photos, descriptions, times
  4. Change patterns - Different routes, times
  5. Inform trusted contacts - Let someone know
  6. Consider legal options - Restraining order, police report

When to Seek Help:

  • Surveillance continues for days
  • You feel physically threatened
  • Home has been entered
  • Devices are compromised
  • You are a high-value target

Professional Resources:

  • Private security firms (TSCM sweeps)
  • Digital forensics experts
  • Legal counsel
  • Law enforcement (if appropriate)

SAFE MEETING PRACTICES

Location Selection:

  • Public places with multiple exits
  • Moderate crowd (not empty, not packed)
  • Good lighting
  • Away from surveillance cameras if possible
  • Not your regular locations
  • Not near your home or work

Timing:

  • Vary meeting times
  • Do not establish patterns
  • Arrive separately, leave separately
  • Have cover story if needed

Communication:

  • Use encrypted messaging
  • Confirm meeting day-of
  • Have backup location
  • Establish check-in protocol

LEGAL CONSIDERATIONS

What is Legal:

  • Walking/driving normal routes
  • Observing your surroundings
  • Photographing public spaces
  • Installing cameras on YOUR property
  • Recording conversations (one-party consent states)

What is NOT Legal:

  • Trespassing on private property
  • Wiretapping without consent
  • Installing trackers on vehicles you do not own
  • Harassment or stalking
  • Breaking and entering

Your Rights:

  • Right to photograph in public
  • Right to refuse consent to search
  • Right to remain silent
  • Right to attorney
  • Right to ask if you are free to leave

QUICK REFERENCE: Surveillance Checklist

Daily Habits:

  • Vary your routes and times
  • Check vehicle for trackers weekly
  • Monitor phone/computer for anomalies
  • Be aware of surroundings
  • Note recurring faces/vehicles

If Suspicious:

  • Document observations (time, location, description)
  • Conduct surveillance detection route
  • Change your patterns
  • Inform trusted contact
  • Consider professional help

High-Risk Situations:

  • Use secure communication only
  • Meet in public locations
  • Vary all routines
  • Consider relocation temporarily
  • Seek professional security advice

OPSEC Fundamentals Series - Vivaed @ endscenar.io

Related Guides:

Sources: Former Intelligence Community Professionals, Private Security Industry Standards, Electronic Frontier Foundation, ACLU Know Your Rights

3 Likes