SAINTCON 2024 - Day 2 - Livestream

Learn how to detect hidden surveillance devices, understand their technical limitations, and develop effective countermeasures in this comprehensive security talk from SAINTCON 2024.

Key takeaways
  • Many modern surveillance devices rely on power sources and internet connectivity, making power outlets and cables potential indicators of hidden devices

  • Human senses have limitations compared to surveillance technology - machines can detect infrared, radio waves, and other signals imperceptible to humans

  • Basic surveillance countermeasures include:

    • Physical inspection of unknown devices/cables
    • Using phone cameras to detect IR emissions
    • Monitoring for unexpected network traffic
    • Understanding typical surveillance device limitations (power, range, etc.)
  • Key properties affecting surveillance capabilities:

    • Distance/range limitations
    • Material barriers and signal interference
    • Power source requirements
    • Environmental factors (lighting, weather, etc.)
  • Threat modeling helps prioritize surveillance concerns by:

    • Identifying likely surveillance motivations
    • Understanding technical capabilities and limitations
    • Assessing personal/organizational risk factors
    • Determining appropriate countermeasures
  • Common surveillance motivations include:

    • Commercial tracking/analytics
    • Law enforcement
    • Personal revenge
    • Competitive intelligence
    • Crime/fraud
  • Modern surveillance increasingly combines multiple sensor types:

    • Audio + video
    • IR + visible light
    • Radio frequency monitoring
    • Movement/presence detection
  • Small form factor and innocuous appearance make modern surveillance devices harder to detect compared to traditional obvious cameras

  • Data collection is the primary purpose of surveillance - understanding the intended use helps assess risk

  • Privacy protection requires ongoing awareness as surveillance technology continues advancing rapidly