DefCon: Advice on Evading Black Helicopters

eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

In the modern post-Snowden world, the idea that we’re all constantly being watched is not as farfetched as it once was. But how does an individual who thinks they are being watched all the time avoid being watched?

Speaking at last week’s Defcon security conference, Philip Polstra, associate professor of Digital Forensics at Bloomsburg University of Pennsylvania, detailed some best practices for those who believe they are being watched, followed or bugged.

“It could be national or local authorities, stalkers or even people that just don’t like you,” Polstra said of the people who might follow an individual.

He provided a number of low-cost actions that people can take to avoid surveillance.

Dodging Digital Cameras

While everyone has a camera on their phones, Polstra noted there can also be hidden cameras placed in homes or businesses. He suggested using an infrared TV remote controller, which can sometimes be used to trigger hidden night vision cameras, to see if such cameras are present.

Even when hidden, cameras still typically require WiFi access in order to communicate. So paranoid people should be on the lookout for unknown WiFi networks, Polstra said.

Foiling Followers

What about being followed, or tailed, by a car? Polstra noted that while non-government adversaries will choose any kind of vehicle they want, the government typically uses black SUVs and Ford Crown Victorias.

A tail is considered to be blown if the subject has three suspicious impressions, he said, suggesting that individuals “look around” at other cars. “Maybe they’re going the same way, maybe not,” he said.

Cars can also be tailed through the use of “bumper beepers” that track a car’s location. Simply turning on the AM radio in a car and scanning all the channels for one that is just broadcasting a single strong tone can indicate a beeper is present, Polstra suggested.

For individuals hoping to avoid being tailed, Polstra advised taking unusual routes, driving through residential areas and occasionally simply parking for no reason.

Styming Stakeouts

For those who think their offices or homes are being monitored or staked out, Polstra offered a test: “If someone has a view of all your exits, that’s probably not coincidental and it could be a stakeout,” he said.

Bugs placed inside hardware are another potential risk for the paranoid. One way to detect bugs, Polstra said, is to look for power drains on things that should not be running.

“In summary choose your level of paranoia,” Polstra said. “If you’re paranoid and not rich, you can test things without financial ruin.”

Sean Michael Kerner is a senior editor at eSecurityPlanet and InternetNews.com. Follow him on Twitter @TechJournalist.

Sean Michael Kerner Avatar

Subscribe to Cybersecurity Insider

Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.

This field is required This field is required

Get the free Cybersecurity newsletter

Strengthen your organization’s IT security defenses with the latest news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

This field is required This field is required