We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
SAINTCON 2024 - Day 2 - Livestream
Learn how to detect hidden surveillance devices, understand their technical limitations, and develop effective countermeasures in this comprehensive security talk from SAINTCON 2024.
-
Many modern surveillance devices rely on power sources and internet connectivity, making power outlets and cables potential indicators of hidden devices
-
Human senses have limitations compared to surveillance technology - machines can detect infrared, radio waves, and other signals imperceptible to humans
-
Basic surveillance countermeasures include:
- Physical inspection of unknown devices/cables
- Using phone cameras to detect IR emissions
- Monitoring for unexpected network traffic
- Understanding typical surveillance device limitations (power, range, etc.)
-
Key properties affecting surveillance capabilities:
- Distance/range limitations
- Material barriers and signal interference
- Power source requirements
- Environmental factors (lighting, weather, etc.)
-
Threat modeling helps prioritize surveillance concerns by:
- Identifying likely surveillance motivations
- Understanding technical capabilities and limitations
- Assessing personal/organizational risk factors
- Determining appropriate countermeasures
-
Common surveillance motivations include:
- Commercial tracking/analytics
- Law enforcement
- Personal revenge
- Competitive intelligence
- Crime/fraud
-
Modern surveillance increasingly combines multiple sensor types:
- Audio + video
- IR + visible light
- Radio frequency monitoring
- Movement/presence detection
-
Small form factor and innocuous appearance make modern surveillance devices harder to detect compared to traditional obvious cameras
-
Data collection is the primary purpose of surveillance - understanding the intended use helps assess risk
-
Privacy protection requires ongoing awareness as surveillance technology continues advancing rapidly