Infographic: A Guide to Counter Surveillance and Physical Surveillance

Infographic: A Guide to Counter Surveillance and Physical Surveillance

The more time we spend on our digital devices for work, entertainment, and communication, the more doors open for bad actors to access our information.

Counter surveillance helps protect you from malicious behavior and you probably do some form of it already. For example, the code, password, or fingerprint you use to unlock your smartphone is a form of counter surveillance. Even so, outsiders continue to find new ways to access you and your information.

That’s why organizations, experts, and private citizens constantly develop and adopt new tools and tactics to maintain personal security. This infographic provides best practices for both electronic and physical counter surveillance. Follow the best practices to set up stronger device protection or anticipate and counter targeted physical surveillance.

Right-click and "Save Image As..." to download and share.

When it comes to keeping your personal details, data, professional work, or sources safe from surveillance, there is no final step or end destination. Hackers, harassers, and other bad actors look for new ways to access private information, so it’s a good idea to review your counter surveillance measures regularly to keep yourself safe.

Full resources and sources list

  1. 1Password
  2. “Two-factor authentication: How and why to use it,” CNET
  3. “Using security keys to secure accounts against phishing,” CPJ
  4. “How to Encrypt All the Things,” WIRED
  5. “How Do I Protect Myself Against Malware?,” Surveillance Self Defense
  6. Tor Browser
  7. “Choosing the VPN That's Right for You,” Surveillance Self Defense
  8. “Laptop Privacy Filters: What to Look For and Why You Need One,” Business News Daily
  9. “Keeping Your Data Safe,” Surveillance Self Defense
  10. “Bug Sweep, Bug Detection, and TSCM,” PINow.com
  11. OnlineSOS Action Center
  12. Surveillance Self Defense, Electronic Frontier Foundation
  13. “The Motherboard Guide to Avoiding State Surveillance,” Motherboard