How to protect yourself from Surveillance

Monitoring and Surveillance
How to shield yourself from surveillance and evade spies

Is the government spying on you? Gather some intelligence!
President Trump's now famous tweet with rabbit ears was a
wakeup call to the world about surveillance capabilities. The
Orwellian Big Brother really is watching you, or at least watching
interesting people. Yes, spy non-fiction is alive and well in
America and there is some credence to President Trump's claims
when you consider
the CIA's hacking abilities.











The thing is, it's not just the government spying on you.
Employers have been spying on their people at work for decades
(see creepy spy tactic #10 below). Companies are spying on
consumers, too. Keep reading on how this monitoring and
surveillance in your daily life is real.

Creepy Ways Someone Can Spy on You
There are many ways the government, corporations, advertisers,
credit agencies or other entities else can spy on you...

Creepy Spy Tactic #1: RFID (chip card spying).
Is RFID tracking you? CNN.com says yes. That little chip in your
debit card or credit card is a way for entities to track you ~
nefarious or otherwise, and it's technology that's been around for
decades.

Creditors have always had the ability to monitor your spending,
but now the Radio-frequency Identification (RFID) expands their
capabilities. RFID is the acronym for
microchips, which contains
memory about product codes and more. RFID not only provides a
profile about your spending habits, but it can track your physical
location. It can be read from a distance without your knowledge.
RFID readers lurk everywhere.
Smaller than a grain of rice or even sand, RFID chips have
infiltrated our daily lives. They are spy chips!

  • Credit cards RFID spying. RFID readers track your grocery
    store and mall spending habits, but also ever airplane ticket,
    hotel room, rental car, restaurant and tank of gas you buy
    with it. This paints a picture of where you've been and where
    you're going, and you better believe that this data is
    available to the government if you are a person of interest to
    them and if they have a secret subpoena.

  • Inventory management spying. Companies like Wal-Mart
    use RFID chips in their inventory management system ~
    some of these inventory management RFID chips, which can
    cost as little as a penny in bulk, can make way into your
    home giving the retail giant an opportunity to discover where
    their customers live and work. Gilette also has spy chips
    inserted their razors. Soon these chips could replace the bar
    codes!


  • The future of RFID tracking. Radio-frequency Identification
    has begun. The first phase was to get you to microchip your
    dog and livestock. Then the technology was applied to credit
    cards and now also it's being attached to product packaging,
    or even the product itself, as with clothes or a bicycle, for
    example. Next, it will be you! Injected under the skin, there
    is a plot to get you to willingly have a microchip inserted so
    that doctors can access your medical history. There's a dark
    side and preppers should avoid getting a microchip implant.
    If you get a chip inserted, there will be no place to hide!

Creepy Spy Tactic #2: Computer monitoring.
Even when your computer isn't in use it can spy on you. The
Silcon Valley is even creating backdoors specifically enabling the
U.S. National Security Agency (NSA) to monitor you if necessary.

  • Computer camera. Perpetrators can use the camera on your
    computer even if you think the computer is off through
    spyware. They can take a snapshot of your screen, use your
    camera to take a snapshot of you and monitor your Skype
    interactions.

  • Computer microphone. Your computer makes an easy
    listening device as well. Perpetrators need only access your
    audio remotely.

  • Internet use. Internet tracking is another way to garner
    potential information about you. It's not only about the
    pages you visit, but about voice recognition technologies. Be
    careful what you say while visiting sites; and know that
    government entities can potentially confirm who is visiting
    the site based on the camera in your computer.

  • Browser cookies. Most Internet browsers enable use of
    cookies, which are small files of stored data on your
    computer. Supposedly, cookies are data collection
    points to improve user experience, but they bring a lot
    of concern about your security. Essentially, there's a
    lack of credibiltity associated as it poses risks to web
    encryption. Are cookies letting Big Brother into your PC?
    Well, yes. Cookies can track your movements across
    multiple sites, according to howstuffworks.com.



  • Search engine spying (Google). Certainly Google has
    collected details about your IP address and who you
    contact through the Internet by e-mail and where you
    visit on the Internet. This is how they "improve user
    experience." It not only enables them to provide quality
    content specific to your needs, but for their advertisers.
    Isn't it creepy how the same advertisements keep
    popping as you explore different Web sites? This same
    technology is also how they determine nefarious activity
    from their Google Adsense programs. This protects their
    advertising clients from those who want to click their
    way to Internet wealth. InfoWorld.com says someone is
    spying on your Google searches, but it's not who you
    may think.

    The list goes on. Hulu, Google.docs, NetFlix, Twitter,
    YouTube -- every shopping, social media, or cloud-connected
    site is potentially tracking you.

Creepy Spy Tactic #3: Surveillance through phones.
Phones are an easy way to get information on you. Your home
phone and your cell phone present a problem for you in terms of
privacy and security in many ways:

  • Phone calls. You already knew that your land line is
    vulnerable to tapping in, but surveillance, but you may not
    know that since the 1990s the government has kept tabs on
    who is calling who, and how long conversations last on land
    lines and smart phones.

  • Voicemail. The FBI has huge data warehouses of collected
    voicemail data. If need be they can access it.

  • GPS Tracking. Smart phones leave footprints for snooping,
    including geo-tracking, which by design were intended to
    help protect the consumer at least in theory. For example,
    the GPS tracking device has helped Apple IPad owners track
    their stolen devices.

  • Video and pictures. Smart phones also potentially can  
    collect data you store including the snapshots and video you
    take.

  • Instant messaging. Data you send by texting (instant
    messaging) is captured for posterity in the same way the
    government collects voicemail on you.

  • Social media. When it comes to monitoring Twitter,
    Facebook and the like, the government will key in on certain
    sensitive words in the interest of homeland security. Some of
    those words are "Terror, attacks or security."
------------------------------------------------- Revised on 03/23/17
(
C) Copyright  2012-2017 by
HappyPreppers.com. All rights reserved. The site happily targets concerned citizens
who are self-reliant survivalists, preppers and homesteaders with original content on survival following societal
collapse. You may link to our site, but
you may NOT reproduce any part of our content, or store our content in any
retrieval system to represent it as your own. Further, you may not transmit content in any other form or by any
means, including (but not limited to) electronic, photocopy, mechanical, or recording without written consent.
HappyPreppers.com makes no warranties.

HappyPreppers.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising
program designed to provide a means for sites to earn advertising fees by advertising and linking to amazon.com,
amazonsupply.com, or myhabit.com. Amazon is a great place to buy emergency supplies. In other words, we
recommend prepping gear sold on Amazon. It's a great place to shop.

Get prepared! Read more emergency preparedness information on our home page.

This
article on monitoring and surveillance and the creepy ways someone can spy on you has been archived by the
waybackmachine.org. This helps protect our copyright.

Do not copy. Linking is okay, but please do not steal our copy. That's plagiarism and illegal. It's NEVER okay to
steal.
Happy Preppers site for survivalists + preppers
happypreppers.com
Facebook: happypreppers.com
Pinterest: happypreppers.com
Google + happypreppers.com
Twitter happypreppers.com
Review of popular ration bars
Everyday carry
How to survive Radiation fallout
Best prepper protein source: meat
Checklist for building a first responder kit
Meals Ready to eat
Flashlights for preppers
RFID protector
Patriotic Prepping
Situational Survival Guide
Surveillance Tradecraft
How to use Mylar Bags for food and more
One gallon mylar bags with oxygen absorbers
#5: Block your computer and "Smart" devices.
Your computers, your phones, your cars, your credit cards and
more are spying devices. Even when your computer, phone or car
is off, perpetrators can use data to record your voice, your image
and your whereabouts. The same is true of credit cards that
you're not using.

As technology gets more sophisticated, preppers will need to be
as well. You'll need to be more aggressive about finding ways to
block the perpetrators.

Ways to block "Smart" devices:
Want to avoid cell phone tracking? If you have a bunker, leave
your cell phone somewhere other than the bunker or employ
these techniques...

  • Get an RFID blocking container. Blocking sleeves for your
    credit cards and passports are readily available. Specially
    designed cases are available for your Smartphone, too but
    you must carefully read their limits and capabilities to know
    how well you will be protected. Right, you will also find RFID
    blocking backpack for guarding your computer and other
    devices.

  • Use Mylar! Pack your computer or phone in Mylar when
    you're not using it. Mylar bags are something you may likely
    already have in your preps. Mylar can block signals and help
    you make a Faraday cage as it can help you also protect your
    food. Mylar can also help you survive a cold night in the
    woods if you know how to use Mylar properly.

  • Ammo cans. Another mainstay of prepper supply items are
    ammo cans. Think of an ammo can like a Faraday cage. It
    can sufficiently block communications on your devices as a
    cheap solution, but they are only as good as you choose to

#6: Safeguard your credit cards, debit cards,
passports and photo ID cards.

Things you can do to prevent credit card surveillance:
  • Get an RFID protector. The wallet, right, is equipped with
    advanced unique proprietary blocking material, which keeps
    Identification Thief away from you and protect your personal
    information with inside rfid blocking shield material under
    frequence 13.56MHZ. Unfortunately, the signal of some ID
    badges, access cards and hotel room cards which works in
    125 KHz, can not be blocked by this wallet.

#7: Keep your computer safe.
It goes without saying that you need to keep your computer safe.
one of the easi

Things you can do to prevent someone from spying on you
through the computer:

  • Microphone. Disable the audio microphone in your control
    panel (e.g., "manage audio devices.")

  • Camera. Find the camera in the monitor and put a sticker
    over it, then locate the imaging devices (e.g HP Truvision HD
    which is the Hewlett Packard Web Cam).

  • Control panel. Monitor your Web windows credentials in the
    control panel.

  • Firewall. Establish firewall protocols. Ensure your firewall is
    working properly and get firewall security software and use it
    regularly.

  • Privacy screen. Get an anti-glare privacy screen as another
    level of protection. An anti-spy screen protector will protect
    your privacy from peeping eyes.

  • Passwords. Change passwords often. One of the most basic
    things you can do is to change your password. Remember to
    restart your computer as well.
  • Cookies. Remember to clear the cookies and restart your
    machine. That alone clears the system making it more
    difficult for someone to spy on you.

  • Use anti-spy software. Leading Internet Secuirty software
    like Norton Utilities or McAffee aren't foolproof, but they
    provide a head start to keeping you safe from hacking.

WikiLeaks founder Julian Assange, a journalist, computer
programmer and activist, pledged in October 2016 to publish
significant information about mass surveillance in the United
States. Where did he get the information? Likely from an
unsecured mobile phone.

#8: Fully understand The NSA's wire tapping abilities.
What would you do if you found out that someone had your  
"wires tapped"? Wait, spying on Americans is illegal, right? Not
so fast!

While it's true that The
fourth amendment protects you from
unreasonable searches and seizures. It was the
New York Times
who first reported in 2005 that President George W. Bush signed
a secret executive order in 2002 that allowed domestic spying
through the National Security Agency (NSA). This meant that the
NSA could spy on Americans without a court order! It came in the
wake of 9-11 and allowed the NSA a license to eavesdrop. The
idea was that the NSA would potentially intercept international
communications to catch any potential links with al Qaeda or
other terrorist threats.

Can you stop the government from spying on you? Probably not.
You see, the NSA spies on billions of communications worldwide!
Though it's barred from domestic spying, the NSA can get
warrants through the Foreign Intelligence Surveillance Act (FISA)
Court. Thankfully also the FISA warrants, which allow U.S.
Intelligence agencies to spy on Americans, are only issued for
dire national security threats, and it requires a court order.

The NSA likely can track users with “device fingerprinting” and like
the CIA probably has the capability of replacing the “fingerprint”
of cyber-attacks with those of another state actor. In other
words, they may both have the ability to leave finger prints from
foreign entities. They can give a false flag that hacking is from
Russia, when it's really an inside job!

So there you have it, Trump could have been tapped!
Yes, Trump could have been tapped as he has claimed, and as
House Intelligence Chairman Devin Nunes has told the press.
Trump was perhaps not the direct target of a tap, but ancillary to
another investigation. In other words, Trump's communication
potentially was part of '
incidental collection.'

It's true also that Clinton's camp fell victim to cyber attack.
WikiLeaks source of cyber thieves stole sensitive documents, e-
mails, donor information, and even voice mails from the
Democratic National Committee, and they can steal from you
unless you do something about it!

Happy endings...
It's empowering to have your eyes wide open, but now that your
eyes are wider with curiosity than they ever were before, it's time
to take action. You really need to know how to think and act like
surveillance professional so you know how to find the people who
may be doing their surveillance on you!

Get a GPS Tracker. A GPS Tracker allows you to track and map
(with Google Maps) in real-time over the Internet. lAlows you to
track your loved ones and valuables when you can’t be around.
Whether it’s your child coming home from school, a suspicious
spouse, a teenage driver, or valuable company assets, the
STI_GL300, with cutting-edge GPS technology, keeps you up to
date in real time.

Related articles...

Prepare to live happily ever after with us at happypreppers.com - the emergency
preparedness Web site of prepping, survival,
homesteading, and self-reliance.
Creepy ways someone can spy on you
The CIA's hacking ability
according to the
New York
Times
, includes surveillance
through many forms
including:
  1. Smartphones (both
    Apple and Android)
  2. Computers (audio
    and message traffic)
  3. Internet connected
    televisions (even
    when it appears
    turned off it is covert
    listening device
    operating as a bug)
  4. Internet Explorer
  5. Skype
  6. WiFi Networks
  7. Commerical
    antivirus programs
RFID backpack
GPS Tracker
Above, Grant Suneson of Newsy, shares the CIA's hacking abilities.

Creepy Spy Tactic #4: Stingrays.
Stingrays download data directly from a device, such as a cell
phone, using radio waves. Surveillance through cell phones is
legal in emergencies!

In emergency situations, the U.S. Department of Justice has the
right to deploy use of "Stingrays," which can pinpoint a phone’s
physical location. Under ordinary circumstance, this requires a
warrant, but when
Martial Law is declared, this means your
cellphone can be tracked without a warrant.

Will they use Stingrays on you? Probably not, but that's only
because
Stingrays are pricey --  The Atlantic reports Stingrays
cost between $100,000-$400,000.

Creepy Spy Tactic #5: Spying through "Smart Home"
Assistants.
Voice-enabled products are creeping into the market. You may
have heard about Smart Assistants, like Amazon's Alexa Echo,
but did you know that Whirpool and Samsung are getting in the
action too?

Data security is a formidable problem. You can laugh, but it's true
that your washing machine, television or refrigerator might
overhear you. Samsung recently unveiled apps that can be
controlled by voice recognition. It's the hands-free voice control
that has hidden capabilties. Laundry machines,
dishwashers,
refrigerators, and yes, even
microwaves as Kellyanne Conway has
suggested are being built with extraordinary spy capabilities.

Smart assistants with cloud-based software are raising privacy
fears:

  • Amazon's Alexa spying. Alexa is a smart assistant that's
    raising privacy concerns. According to Amazon, "Alexa lives
    in the cloud so it’s always getting smarter, and updates are
    delivered automatically. The more you talk to Alexa, the
    more it adapts to your speech patterns, vocabulary, and
    personal preferences. Alexa comes included with Echo and
    other Alexa devices."

  • Apple's Siri. It's pretty creepy that Apple's Siri can monitor
    even the background noises around you. It continually scans
    and it means that Apple is likely storing data about you,
    possibly the television stations you're watching, the radio
    stations or music you're listening to and more to learn about
    you as a consumer.


  • Microsoft's Cortana. Microsoft is apparently interested in
    capturing your calender data, contacts, location, text and
    email content. The important thing to note is that you can't
    shut if off! The only thing you can do is cripple the operating
    system. Microsoft has removed the spying capability only
    from the classroom, everyone else watch out.

  • Internet connected televisions. Even when it appears
    turned off, an internet connected television is a covert
    listening device operating as a bug.

  • Appliances. Manufacturers like Samsung and Whirpool are
    including voice recognition in their products. With the voice
    recognition comes voice recording as manufacturers claim to
    improve use experience.

Creepy Spy Tactic #6: Photo ID cards.
Passports, driver's licenses and other photographic identification
cards are a potential source of information gathering on you.
Facial recognition software is becoming a threat on your personal
security as some government agencies can use it to spy on you.
If they can use it, then so can foreign agencies or domestic
hackers.

The technolog is getting so sophisticated that government
agencies can potentially pick you out of a crowd, run a data mach
and get all the personal information on you they need to identify
you as a threat.

Creepy Spy Tactic #7: Spying Through License Plate
readers.
Law enforcement has radar and can get all sorts of data from you
as you drive by, but license Plate readers also heavily patrol you
as you drive through bridges, tollways and highways. These  
readers may scan for toll, but they can also build up a record of
where you've been and when you've been there. This establishes
a bit of a profile about you. Creepy, eh?

Creep Spy Tactic #8: Driving aids.
New cars go beyond GPS tracking and have added technology in
recent years to increase the ability to spy on you. It's truly creepy
when you think of the ways the government and others can spy
on you in a car.

  • Ignition key. RFID chips often are in the ignition key. While
    they are a good anti-theft device (they have an immobilizer
    which is like a kill switch to keep the car from being mobile),
    they also are extremely vulnerable to hacking, according to
    wired.com. This makes for keyless car entry and thieves can
    get  car records in the glove compartment, toll readers or
    whatever is in your car to steal.

  • Navigation black boxes: Equipped with satellite navigation
    your car not only help you get where you need to go, but
    they can aid law enforcement and aid in security, fleet
    management, tracking of goods and more. In other words,
    they operate in both directions. Discovery is possible about
    your driving habits and whereabouts.

Creepy Spy Tactic #9: Public Cameras.
You'll find cameras in airports, malls, schools, public transit,
street intersections and more. All these kinds of cameras
accessible by the government (yes, Big Brother is watching you),
but what's more creepy is that the cameras also record sound.

Creepy Spy Tactic #10. Work surveillance.
Many employees know that there company does not allow using
company time for personal pleasure on the Internet and yet they
are naive as to how work surveillance can take place. It's not only
legal, but it's commonplace!

For decades companies have had network software capabiliteis to
can capture images of your screen to see if you're watching porn
while "working from home" or whether you're just surfing the
Internet searching for another job or shopping. They can discover
your habits, such as using work time to
visit prepper web sites,
get dinner recipes, or look at your Fantasy Football pool.

Now you know that surveillance is real...
Big Brother really is watching you. Learn to detect and evade
surveillance efforts that threaten your personal security with the
guide, pictured right,
Surveillance Counter Measures, 192 pages,
by ACM IV Security Services. This is a serious guide to detecting,
evading and eluding threats to personal privacy. The book
discusses:

  • surveillance detection ~ discovering an entity or person is
    following or watching you;
  • surveillance avoidance  ~ eluding the perpetrators following
    you; and
  • counter surveillance  ~ following those who are following you.

These time-tested tactics of observation, detection and evasion
are proven effective against the most sophisticated surveillance
techniques used in the world.

So what can you do about surveillance?
Enroll yourself in prepper spy school! You can improve your
situational awareness and learn about the available and
surveillance tactics and how to combat them.

You can't get rid of the threat entirely, but you can make it more
difficult for others to monitor you. Here's a prepper's guide on
what to do...

#1: Understand situational awareness.
Situational awareness is, like the name implies, a deep
understanding of your environment. It involves continually
assessing your viscinity for emerging threats.

The Coast Guard defines situational awareness as the "
ability to
identify, process, and comprehend the critical elements of
information about what is happening to the team with regards to
the mission."

In
The Ultimate Situational Survival Guide, pictured right, expert
Robert Richardson, will help you survive a cyber attacks and more
on the basic premise of having a good situational awareness.

#2: Get educated with books.
Welcome to prepper spy school! While this article is a start to
understanding surveillance techniques employed, there's so much
more information out there. If you want to learn how to avoid
being followed or observed, then read books about surveillance,
and watch videos.

Learn surveillance tradecraft.
Get yourself a copy of Surveillance Tradecraft: The Professional's
Guide to Surveillance Training
, right, by Peter Jenkins. In this
comprehensive guide, by a former British surveillance
professional, you'll find gear lists, explanations of gear, much
more in an overview of surveillance worthy of amateurs as well as
those seeking a professional career. The author spent a career in
the Royal Marines with various roles on reconnaissance,
intelligence, and counter terrorism. The manual contains over 470
pages with 500 color photographs and graphics. It's a "must read"
for anyone considering carrying out surveillance training or for the
serious prepper who wants to improve his or her situational
awareness.

#3: Understand how hacking works.
Defend against the ongoing wave of malware and rootkit assaults
with the
Hacking Exposed Malware and Rootkits Secrets and
Solutions
, right, by Michael A. Davis.

Real-world case studies and examples reveal how today's hackers
use readily available tools to infiltrate and hijack systems.  In his
book the author shows you how to detect and eliminate malicious
embedded code, block pop-ups and websites, prevent keylogging,
and terminate rootkits.

This important guide covers the latest intrusion detection,
firewall, honeynet, antivirus, anti-rootkit, anti-spyware
technologies and much more.
  • Learn how hackers use archivers, encryptors, and packers to
    obfuscate code;
  • Defend against keylogging, redirect, click fraud, and identity
    theft threats;
  • Detect, kill, and remove virtual, user-mode, and kernel-mode
    rootkits
  • Prevent malicious website, phishing, client-side, and
    embedded-code exploits; and
  • Protect hosts using the latest antivirus, pop-up blocker, and
    firewall software.

#4: Go to YouTube spy school.
There are loads of credible resources on surveillance available on
YouTube. Search YouTube and you will find many resources, but
remember that they are tracking what you watch (LOL). The video
below gives you an overview of surveillance tactics to help give
you a better understanding:
Microchip to help you get stray dogs home again
RFID protector
The cure for a personal cyber attack: Norton
Prepper Deal Alerts Check
our
daily deals for prepping
gear and food storage.
RFID backpack
Pack of three IOSAT Nukepills