Tuesday, February 7, 2017

On Urban Covert-Surveillance in Australia


    For more information you're welcome to contact the Author. 
    This Author can arrange on a fee-paying basis counter-surveillance consultation for group and individual safety i.e. how to detect and prevent intrusive and hostile surveillance, including screening for and detection of 'moles', traitors, under-cover operatives. The prevalence of these operatives embedded in controversial  / activist groups cannot be exaggerated!
    Counter-surveillance consultation will include using telecommunications safely and their massive evolving surveillance applications. 
    Emerging micro / nano technology along with satellite applications may also be covered.
    DISCLAIMER: this service is not available to groups or individuals explicitly claiming to engage in unlawful activities.

    Substantial consultation fees apply, please contact this Author for further details. Consultation can be arranged across Australia - travel expenses incur.

    Consultation can be arranged either in-situ or via telecommunications.  In terms of privacy and safety in-situ consultation is preferable. 
    Enquiries fpanaia@gmail.com # (please see below for further information on secure contact access)

    In the meantime please enjoy  the following pro-bono presentation authored by Anonymous. 

    On Urban Covert-Surveillance in Australia

    Always over-estimate, rather than under-estimate, the James Bond technology commanded by enemy government regimes (Author).


"psst I'm wearing ladies underwear" 

“Hence that General is skillful in attack whose opponent does not know what to defend; and he is skillful in defense whose opponent does not know what to attack.” ~ Sun Tzu


With the above disclaimer in mind, the Blog is published for individuals and groups, who through their social activism and or general discontent have become targets for State (domestic) surveillance.  Surveillance is a vast and ever increasing industry in terms of technology, methods and motive. This Blog can only prick the surface of this opaque craft.


"bugger, me eyeliner's been tampered with"
What is Covert Surveillance?
Targeted covert directed or intrusive surveillance is the secret collection of intelligence on individuals and groups, without the knowledge or consent of those individuals and groups.  Typical information collected include: movements, activities, associates, communications, opinions, plans, patterns and other behaviour or conduct which increases the intelligence base for data analysis.

Simply put, covert surveillance aims to secretly obtain knowledge and understanding of a target in order to manipulate, control, disable or destroy the same target and or people / assets within the relationship sphere of the same target. Essentially surveillance is a hostile act against the target.

Most people have spied or engaged in some form of surveillance during their lifetimes. Peeking at a private letter, or peeping in the neighbour’s window technically constitute spying, because the intent of  the backyard ‘spy’ was to access information on their victim without the victim’s consent or knowledge. Expand letter peeking and peeping tom to a career to make an intel agency and surveillance officer.spying.jpg

"peekaboo I can see you"
Why Surveillance?
Stealing glances at the enemy’s war plan is a powerful counter-strategy dating back to the dawn of civilisation and by extension human conflict. The treachery of the Spartan Ephialtes who sold out his tribe to the Persian King Xerxes by guiding the enemy behind the lines to ambush the Spartans is a classic example of how gathered intelligence either from spying or surveillance can produce devastating consequences.  This circumstance has not changed.

"did the package include a work chariot Ephialites?
‘Know thy Enemy’ whether a nation of fundamentalists or the bellicose shoeshine boy on the street corner remains the best counter-offence strategy for all militarised entities. Then follow the weapons.
Espionage between Nation States and domestic spying on citizens (i.e. the shoeshine boy) is not too dissimilar as people may think. Foreign spies spy on people as an undercover cop spies on a drug supplier. The methods and objectives differ but the surveillance is targeted towards an individual to understand, predict and control either the individual’s behaviour or what the individual represents and commands.untitled.bmp
shoeshiners: the real threat to national security
Subjects of Domestic Surveillance
Almost everyone knows in many western nations, fundamentalists and those suspected of being such are heavily monitored by domestic spy agencies. Strange as it sounds this cohort provide easy targets to infiltrate and watch. Firstly fundamentalists (with exceptions) are relatively easily identifiable, along with their madcap murderous plots. Slipping into the network of these groups, though certainly a delicate task, is fairly straightforward. Member recruitment is also obvious. Perhaps the main weakness of these groups is the fact they are groups or cells which offer more risk for leakage and penetration than say individual targets or to use government newspeak "Lone Wolves". Surveillance against fundamentalists is arguably little different from standard police operations against organised crime – the objective is to prevent or punish imminent crimes against society.

"I started off as a shoeshine boy"
Spying on foreign diplomats (their families & associates) political dissidents, (including demob immigrants from foreign conflicts) activists, enemy spies, cults, rogue intellectuals including scientists, industrialists, politicians and the garden variety malcontent is the traditional mainstay of domestic spy agencies. Unlike the fundamentalists, these groups and individuals are generally watched more for the protection of government and elites as opposed to the community. The spook motive is political, ideological, commercial, elitist, and in many cases indecipherable, if indeed not misguided.

The Spies
Rule of the thumb is field agents are morphologically or physiognomically common, easily blending into the background and crowd. Ordinary looking people doing the leg work are crucial for avoiding detection. Most bystanders remember and ‘spy’ the dwarf and giant passers-by, or heavily bearded bloke, or heavy chested jade. These types may have their place in the field but for orthodox tailing, they’re not much use. An excellent candidate for foot surveillance is that person whose facial features and body type are so typical and banal, it’s forgotten the moment it disappears from the landscape.
 resize.jpg
for that extra reach over perimeter fences  
Generally, most agents are university educated from a broad spectrum of disciplines, hail from working and middle class backgrounds. Many are recruited early on in their working life, early 20s and up. Apart from their unusual and specialist career they’re not much different than the average bloke at the local boozer. These public servants receive continuous and strong training from the moment of initial recruitment. They are well informed and materially supported by their respective bureaucracies. The importance of training needs to be stressed here. No one is born with natural or excellent talents in surveillance and spying, it is a learnt skill. Some are better than others in applying these skills (usually the more mature agents >40 ). * The point is your typical domestic spy is an ordinary citizen and bears no resemblance to the mythical nonsense espoused by Hollywood media (although technology is a different matter).

"Moneypenny, james-bond.jpgI said 2 sugars with my tea!"
* Even the so-called senior surveillance officer can give the game away. A real case-scenario involved a surveillance officer following a target through a department store. The target was oblivious of the surveillance until he spotted or rather captured  the solitary male trawling through the girls underwear section. This abnormality took several seconds  to register in the target's head. Indeed the same 'shopper' tailed the target throughout the store and then into another store where a form of enemy contact was established. The critical message of this 'tale' (no pun intended)  is, targets should always register abnormal / unusual activity and behavior in their environment and not ignore the same - your life could depend on it!  

A man shopping for girls underwear is as conspicuous 
as an elephant strolling down main street.

Your typical government spook earns his crust, services a mortgage and puts away a portion of his income into his Super every fortnight. Your typical (well-adjusted) agent treats his work in a professional objective manner as would a fireman or garbage collector. They look forward to retirement as we all do, and as with most Australians, fantasise about mega lotto wins. Nothing mythical or James Bond about that. Therefore the people to watch out for are as ordinary as the folks living next door or indeed across the road in the abandoned building on the fourth floor.

your cover is as safe as houses 

Foot surveillance – still a common method in today’s high tech world. It’s a boring tedious task for officers, but so is the indispensable chore of garbage collection. Australians, as with the Yanks, love cars and the convenience of the same. If a target can be tailed by motor vehicle then this would be the preferred method over foot. For obvious reasons vehicular (including aerial) surveillance is not always possible.

"Target is on the move - agent [pant] in hot delirous pursuit" 
Telephony –  this form of surveillance ‘speaks’ for itself. Modern mobile phones and fixed digital lines are a boon for government spies. Gone are the days when agents had to tamper with tangled phone lines or install stand alone listening / video devices while the target occupant was distracted or away.

start with the red wire 
Most bugging can be seamlessly conducted from a remote location, usually in partnership with the sycophantic Telco provider, for example installing a dedicated feeder line at the telephone exchange. Of course mobile telephones* provide the added benefit of triangulation allowing surveillance to track the location of the target anytime anywhere on the grid. Text and other data communicated through handheld devices are also easily collected. A Wiki article also claims 'law enforcement' can remotely activate the microphone on a target's mobile phone - the capture potential of this trick is self-evident.  Assume this 'trick' applies to computer mics and cams - Orwells "telescreen" could be nearer than you think, bought and installed by the citizen.

Switching off a portable device does not necessarily mean the device can no longer be tracked, manipulated or hijacked. Most devices come with internal batteries to secure memory retention. Refer to Edward Snowden's posts for  more information.

SOURCE ALERT 2017
Wikileaks recently dumped leaked CIA files on the many ways smart phones, smart televisions and tabs can be completely hijacked, including the cloaking of the hijacking itself. These Wikileak dumps continue to validate the information provided in this dated blog.  Readers should also understand the US routinely share and trade spy technology with their minion anglophile counterparts, including Australia. For more information regarding the parasitical relationship between Australia and the USA refer to the 5 Eyes agreement (also known as UKASA)  involving NZ, Canada, Britain, Australia and the USA.

Additionally Readers should also note, given the cultural evolution of anglo-celtic Australia, her spy agencies are vastly less transparent and accountable than her UKASA equivalents.  This is largely due to the culture of privileged secrecy Australia agencies operate in and a near absence of legislative oversight.

*The Payphone Shuffle
common counter-strategy against phone bugging is of course the corner payphone. Targets who develop predictable routines accessing same boxes at same times risk easy exposure. Little effort is required to 'fix' the payphone/s routinely accessed by targets. Larger indiscriminate and targetted voice recognition technologies should also be understood. High priority targets should assume all payphones within base walking range are covered.

Airport payphones have traditionally been used by criminals / drug traffickers in transit. Avoid using these phones.


So-called sanitised mobile phones (i.e. cheap disposables) are an effective option, though voice recognition programs may still capture targeted communications. Always over-estimate, rather than under-estimate, the James Bond technology commanded by enemy government regimes.

"I know theres a bug here somewherespyingsdc.jpg"


Internet Cafes - Think Again
Internet Cafes have long been [erroneously] regarded by many as 'safe havens' or sanitised zones for secret and anonymous communications. Think again. Advancements in IT technology enable spy regimes to 'infect' every single internet café business. In Australia this is more likely to be the case given its comparative small population and ergo manageable volume of internet café businesses to  tackle. 

There are likely to be 2 methods in which internet cafes are infected by government: (1) remote distribution of malware to the businesses (2) physical onsite installation of malware. Alternatively, intel regimes may simply collaborate with the Telco providers of internet cafes.

Additionally most internet café business, along with local libraries, college campuses have CCTV surveillance on their premises - so think again.

Further credible information can be read at wikileaks.

Safe as a ladder made from twigs

Dead and wrong number calls – the telephone just keeps on giving. Simple bogus phone calls to a targets mobile or landline can reveal operational information. An obvious ploy is determining a targets location in real time by false calling his landline. The target himself can volunteer excellent intel by unwittingly entertaining a false ‘cold caller’ or ‘wrong dialler’. Impersonating tradespeople and public officials by phone is another effective ruse to draw information and or manipulate / confuse the target with false claims.

"angry-phone-caller.jpgGudday Im a total stranger please tell me your safe combination"  
Computers (internet) – very much provide the same surveillance applications as telephony in terms of data capture techniques, including browsing histories, uploads, downloads, social networking and chatting. Every data byte on the target’s PC can be captured including supposedly deleted files which can be easily resurrected with the right software. Targets must assume all data on live computers is captured and analysed in real time.


“Be extremely subtle, even to the point of formlessness. Be extremely mysterious, even to the point of soundlessness. Thereby you can be the director of the opponent’s fate.” ~Sun Tzu 

Make no mistake, telephony and internet providers are required by law to cooperate (conspire) with law enforcement – the notion of consumer privacy is nonsense. It is common knowledge the trade / relationship between communications providers and the intelligence community is very strong. Recall the stenography scam of the Hewlett and Packer printers which were programmed to  mark each page with an invisible to the naked eye bar-code to allow document traceability.

its called the world wide web for a reason
Encryption technology – Federal government slipped in legislation forcing ‘suspects’ (i.e. technically any citizen) to reveal passwords for encrypted files under the pain of jail. This means there is absolutely no privacy on a person’s computer / data device irrespective how well hidden or encrypted or indeed personal the data is.internet-security.jpg  The same government is currently introducing additional totalitarian laws forcing ISPs to filter and block websites unacceptable to government.

unlock or be locked up
Tracking devices & whiz bang gadgets – in the digital microchip world, tiny genius devices are being invented to aid covert surveillance. Audio / optical and tracking gadgets are logically the most common. Assume micro or nano technology is near invisible to the naked eye or disguised / embedded in such a manner to render invisibility. Assume also new technology and their applications are impossible to anticipate given development / deployment secrecy.

"now where to insert the Duracell"
tiny-microchip.jpg
Little old ladies – this group are excellent for innocuously approaching targets, where other demographic types might arouse suspicion. There are a number of operational reasons why an agent would seek to discreetly breach the personal space of the target. two-little-old-ladies.jpg

 "oo he's heavily armed"
Best mates – a target’s best mate could in fact be his worst mate. They are easily tripped (if they don’t trip themselves up first) with common sense and subtle techniques. Because they are ‘best mates’ they are part-time spies at 'best', poorly trained and careless, usually recruited for one purpose only. Many targets have been betrayed by ‘best mates’, who embraced recruitment not from a position of morality (irrespective how warped the morality) but rather from the thrill and handouts treacherous espionage offers.

"your dandruff is spotting my jersey"
New mates – a new mate is generally a fully trained and tailored agent, thoroughly briefed on the target. As with best mates, they can be discovered, though with more difficulty. Never reveal you know or suspect to the ‘mate’. It is unwise to take offence or confront the betrayal -  sanctimony serves no purpose other than revealing your hand. Operationally isolate the ‘mate’ or use the betrayal to your advantage - feed them defective intelligence in complete contrast to your real ambitions. Exploit and love the under-cover agent, as he could in fact, become your most valuable operational asset.

Acting on suspicions and conjecture alone without solid evidence is unwise and can ruin genuine relationships.hand-shaking.jpg

"your hand lotion is smooth, which product is it?" 
Luck – given covert surveillance is not a perfect science (yet), it benefits much from ‘fortune’. Lucky communications / chatter captured from careless associates or spouses are common. The real luck though is largely manufactured by the target himself. He goes overseas, leaving his property unguarded. He imports or exports personal effects – easily intercepted and contaminated. He sends out his PC or mobile or vehicle for repairs and so on. His car is parked on the street, not garaged. He hosts open parties. His blatant cyber / digital behaviour and tracks etc.

The more the target commercially / socially / politically engages the community, the more capture opportunities he provides and the more vulnerable his cover succumbs to penetration.
 luck.jpg
goes well with potatoes 

Distraction – an ancient and time tested technique in the 'art' of stalking. A myriad of surveillance operational needs and tasks may require a target be distracted for a few moments through to several days. Methods / ruses to distract are limited only by the imagination - though are still crafted to inconspicuously fit the target's unique circumstances. The 'trick' is to spy the distraction for what it is.

"Im dying of thirst"

Getting Inside – a significant role of surveillance staff is getting inside the target's personal territory. This typically means a target's residence and employment. Given agency control of  vast tax-funded resources, secretly accessing these areas is common, involving little effort by and risk to surveillance staff. As a general rule an insertion of a target's metropolitan residence is conducted as follows -

Once a target's routine is confirmed through standard external surveillance methods, surveillance teams conspire to invade the residence. Timing of insertion is largely informed by the established routine of the target, for example, if the target is employed at a separate work site during weekdays then logically insertion will be planned around this routine (mid afternoons or mid mornings are optimal time-frames as the risk of surprise returns by the occupant is reduced). Complications arise when there are multiple occupiers in the same residence creating multiple routines to negotiate during the controlled insertion.

Assuming there are 2 occupiers - the target and a neutral party - surveillance will deploy 2 teams to verify the separate routines, while a 3rd team will simultaneously conduct the domicile insertion. Verification teams generally remain with the occupiers until  insertion is completed.

Insertion teams come well equipped and can easily negotiate standard household locks and latches (these are typically identified prior to insertion). Coded intruder alarms are also easily overcome. Most if not all major manufacturers of domestic security products such as CHUBB, programme products with a MASTER manufacturers PIN. * These master PINs or codes may be shared with domestic security services. 

Nosy neighbours and visitors are the most common uncontrolled variables during intrusions. Canines can also pose risk, though most dogs are typically locked out at the back when the house is unoccupied. 

Insertion teams may perform the following tasks inside a targets domicile:

  • image the interior / exterior and contents / documents 
  • clone all data devices and hard drives
  • install "spyware" on computers and digital devices
  • install surveillance devices
  • analyse and modify locking / electronic  mechanisms to facilitate future ingress
  • plant incriminating material (evidence) to secure leverage for future operations
  • specifically search for weapons and or material designed for planned resistance
  • sabotage and or corrupt material to debilitate the target or retard activities
  • collect DNA samples
  • duplicate keys stored in the domicile 
  • modify and or contaminate telephones
  • fishing expedition

      Known intrusion plans into a target's domicile can be strategically inverted. The premises can be laced with 'decoy evidence' or defective intelligence, directing the manipulated agents to fantasy plots far removed from a target's real agenda. Intelligence gathered in this classic 'spy' manner will be highly regarded, possibly taking precedence over all other data so far captured. Counter-controlling intrusions into a target's personal space (domicile, vehicle, employment) is the strategic equivalent of accessing and tampering with a target's intelligence record - the target dictates the intelligence script.

      When master vendor codes or override keys are unavailable, then agency / contracted technicians will find alternative solutions: essentially, standard civilian domestic security systems will be defeated.

      the mega-rich Australian regime is no match for this suburban obstacle
      THE MORMON COVER - Creativity is the key when its comes to intrusive surveillance. Domestic spy agencies have disguised themselves as Mormons et al in order to approach / breach a target's urban domicile or space.

      Think about it: whenever you see these characters peddling or parading down your neighbourhood street, what immediately comes to mind? You think harmless, though irritating Mormons to then return to your TV for more indoctrination. Its an excellent cover.

      Remember never underestimate the audacity, the ingenuity, the creativity, the sheer cheek of your local spook regime. Out-spying, 'out-smarting' their targets is their bread and butter - its what they do day in, day out.


      Regime Goons will search ceiling lofts first,
      followed by wall and floor cavities.
      SEARCH WARRANTS - Most citizens fail to understand the accumulated knowledge cops / agents possess (in addition to search and discovery technology) when they raid domiciles / property in search for revolutionary material. Your local pig precinct has been conducting property / site searches for over 50 years: this means they are cognizant to every conceivable hiding spot. In other words, where ever you're hiding the 'contraband', it has been hidden in similar cavities many  times before, by folk just like you. 

      Attics, lofts, white goods (fridges, tvs and washing machines), chair and couch seating cushions, lounge arm rests, table tops - underneath, wall and floor cavities, barbecues and kennels, and even dustbins or rubbish receptacles,  have long been popular sites for concealment. And the cops know this. They know where to look. They possess the technology / training / experience to effectively conduct the search.


      YOU WILL BE BUSTED!

      The only way to be safe is to NOT store material inside or outside your property - it will be discovered irrespective how clever and covert you believe the concealment. Therefore re-evaluate the risk of concealing resistance material within your private domain. This applies to encrypted data, as Regime Goons will seize all data devices and mobiles, including any belonging to children, to 'forensically' examine the devices. If encrypted files are discovered, in Australia at least, you are compelled to provide decryption keys to the Regime under the pain of imprisonment. This is a federal law!

      Consider concealing revolutionary material completely off-site, or better still, do NOT retain and gather material until deployment is imminentSelf-storage is an option, but it should be arranged through an uncontaminated 3rd party. Uncontaminated requires that the 3rd party is never contacted electronically, and is largely unknown to all associates of the target.


      The Unabomber's (Ted Kaczynski)  shack was extirpated from the
      forest floor and warehoused at FBI headquarters for dissection.
      VEHICLES - The same goes for vehicular searches: engine bays, door, ceiling and interior panelling, tyres and tyre rims and boot cavities have all been tried and tested. Depending on how serious cops are, your vehicle will be lifted onto blocks, stripped to its very axel.

      Again DO NOT underestimate the cops they have the advantage of some 50 years of accumulated experience and knowledge in discovering concealments. You are NOT smarter than the goons: they have training, technology and decades of experience on their side, while you have a fallible ego only.

      WHEN GOONS STRIKE AT 3AM - All serious enemies of the State should prepare for the worst case scenario, the early morning flash-bang raid.  The following is a summary of how and why typical Sleeping Beauty ambushes are executed, and how to safely respond in order to maximize your chances of survival.

      Flash-Bang or Sleeping Beauty Ambush
      When a domicile has been targeted by the goons for a Sleeping beauty raid they will generally proceed as follows:

      (1) Goons will identify insertion points prior to raid - days or even weeks prior to the event.
      (2) Goons generally conduct raids between the hours of 3 - 5am, in order to maximize the terror and stun factor
      (3) Goons will synchronize smashing multiple entry portals (windows and doors) to maximize the terror and disorient factor
      (4) Once inside, goons will discharge flash  bang hardware to intensify the terror and paralysis factor
      (5) Once inside, multiple goons will scream (a) obscenities and (b) threats to kill to enhance the paralysis effect 
      (6) Once goons locate target, they will aim their pea-shooters at the target, while continually screaming obscenities and threats to kill. Goons may also discharge tasers.
      (7) Goons will typically  be masked, again to increase the level of terror
      (8) Up to 8 helmeted, bullet-proof vested goons, armed with automatic weapons and side-arms, will be deployed against you.

      Surviving The Goon Ambush
      (1) Train your body and mind to prepare for a 3am shattering ear-splitting invasion. Set your alarm clock for 3 or 4am and undertake repeated training procedures. When the alarm sounds, imagine it is the goon invasion and follow a set procedure until it becomes automatic nature.
      (2) Ninety nine per cent of the time, the target will be asleep in his bed, ergo Sleeping Beauty. When the goons strike, roll off your bed onto the floor. Lie face down, with face on the side. Place both your hands behind head, elbows tucked in to absorb the inevitable goon boot to your head. 
      (3) Do not move. 
      (4) Do not raise your head to respond to or look at the storming goons. 
      (5) Remain absolutely prostrate. 
      (6) Do NOT remove your hands from the surrender position until the goons hand-cuff you. They will MURDER (shoot) you if you move your hands, and they will not be accountable.
      (7) Do not be fooled from the multiple and  conflicting screams and commands by the Goons. This is intentional to fuck you up. Observe the closest and loudest goon only. Focus on only one goon and follow his instructions, while keeping your head against the floor, and hands behind your head. 


      REMEMBER DO NOT REMOVE YOUR HANDS FROM THE SURRENDER POSITION - THE GOONS ARE DESPERATE TO SHOOT YOU AT THE FIRST OPPORTUNITY.

      (8) Do not roll off your bed to lie face up - you will be hurt by the goons. Roll onto your stomach and remain still. REMEMBER: Goons are reluctant to shoot a target in his back because of the extra paperwork and bullshitting required to cover up the obvious post-mortem tell-tale sign of execution.
      (9) If you surrender your hands by thrusting them above your head, whether on the floor, or in an upright position, ensure your hands are open and fingers apart. Do NOT surrender with closed hands  / fists.
      (10) Do NOT answer or attempt to answer the maniacal screams of the goons - observe, obey and remain FLAT against the floor. 
      (11) Do not exhaust or further traumatize yourself by attempting to reason with goons. THEY WILL NOT LISTEN TO YOU. THEY WILL IGNORE YOU. THEY WILL KILL YOU. Remain silent and still. REMEMBER: The Goons are not storming your domicile at 3am for a fucking chit-chat and coffee. The Goons have ambushed you for 1 of 2 reasons: (1) to kill you or (2) to abduct [arrest] you. 

      If you follow the above procedures, you increase the chances of your survival i.e. not being shot dead by the homicidal goons, who view you as a dirty wild animal to be hunted and put down.

      The alternative response plan is to return fire. Given you will be outnumbered by at least 8 to 1, serious military-grade hardware will be required. 


      THE SLEEPING BEAUTY AMBUSH
      when  Goons storm your domicile at 3am,
      they're not visiting for coffee and cake.
       Goons are ambushing you for 1 of 2 reasons
      (1) kill you; or (2) abduct [arrest] you.
      Briefing the Goons
      Try to understand how the goons are psychologically prepared before they strike your domicile at 3am.  The first factor to understand is this: goons love conducting flash-bang raids. Not withstanding the copious overtime they receive, the chance of ambushing a demonized human, greatly thrills them. This is their moment to LEGALLY murder another man. The joy of ambushing another man, while sleeping, is for the goons, better than sex.

      During the station or staging area briefing, the target is demonized and exaggerated to absurd dimensions. The gullible goons adopt a mind-set they are about to ambush Leonidas, Military Leader of the immortal Spartans.  Prepare and prevail. Study the suburban ambush technique, it is identical across the anglosphere i.e the USA, NZ, UK, Canada and Australia.

      Collateral Occupants: the Goons care not whether 1 or 100 children are present during the Sleeping Beauty ambush. Killing, wounding and traumatizing children and women during the ambush is simply regarded as collateral damage - the Goons will NOT be liable for their deaths and or injury. Neither are the Goons legally restricted and or prohibited from violently ambushing domiciles, because infants, children and women are present. The law is ALWAYS on the side of the Goons. When children are confirmed occupants, Goons may modify the ambush insertion points, by avoiding the kids' bedrooms, however, this decision is entirely their prerogative.


      REMEMBER: WAILING FOR MERCY, YELLING INDIGNATION, MOANING "WHY ME" OR IM INNOCENT, ONLY INTENSIFIES THE THRILL FOR THE GOONS - PICTURE A PACK OF HYENAS RIPPING APART A SCREAMING GAZELLE - ITS THE SAME PACK MENTALITY OF THE GOONS. STAY SILENT AND STAY STILL - THE GOONS WILL HATE YOU FOR IT.

      When Goons Ambush a Man in his Bed at 3am
      its the same as Hyenas Ripping Apart a Gazelle: 
      DON'T RESIST, DON'T PROTEST
      Resistance and Fear only Excites and Enhances the Goon Pleasure.
      DOCUMENTATION - simple rule, never RECORD nor RETAIN data on anything eg. names, targets, dates, places, ideas, theories and  details of any kind, in either code or non-code form. Nature gave you the facility to mentally internalise data retention, use it. Forget about encrypting and codifying 'James Bond' style plans and schemes. Once the Regime seizes such data, your goose is cooked, even, if in the very rare circumstance, they are unable to decipher your amatuer code, you're still stuffed.

      If you must resort to using codified records, because of the difficult complexity involved, then follow the Sicilian method, (scrittini - though this is still not 100 per cent fail-safe), apply data (your private anecdotal memory bytes) known only to you to the paired equivalent. For example: your comrade's name is really Bernardo Provenzano, then disguise his identity by applying an utterly asymmetrical illogical  tag, such as IGLOO or Eskimo or T-Rex or SHREK etc. It goes without saying these codified tags must NEVER be communicated electronically.

      Surveillance Response & Discovery
      A complex area to expand upon, though these simple suggestions may be of interest.

      If surveillance is suspected, try to independently and secretly confirm the circumstance. It goes without saying, gossip, guesses and gut-feelings from colleagues / associates / comrades is not enough. The circumstance needs to be validated by the alleged target. There are a number of common sense methods to achieve verification. In special cases the target can petition the court for a discovery order, though this is rare, prone to failure while placing the other party on alert.
      Alternatively, and of more strategic value, assume surveillance is being deployed and operate within the parameters (albeit highly restricted) to the target’s advantage.
      Approaching or antagonising surveillance staff  is not advised. This behaviour achieves no advantage and can place a target at further risk to vindictive shamed officers.
      Discovering a tail (surveillance officer) is achievable using common sense methods, though seasoned >40 year old  agents are often cleverer, calmer and significantly less conspicuous. >40  year old agents typically have perfected the art of close range  / intrusive surveillance unlike their testy juvenile colleagues who jerk all over creation in enthusiasm and excitement.  Junior officers have a tendency to underestimate the target and over-estimate their own tracking abilities, while a competent senior officer will not do this. On the flip side, the target should always over-estimate the abilities (and audacity *) of the tail and agency.

      Desisting from the activity causing offense to the regime is another option, though there is no guarantee government will reciprocate and withdraw from its surveillance.the-scream-edvard-munch.jpg

      "arrgh, I left the modem on and firewall off"
      Back Tracking – is an excellent common sense technique to aid discovery. The trick is to apply this technique without alerting the other party. Leaving behind tracks is not always avoidable regardless of agency training and authority.

      Forward Baiting  as with back tracking, surveillance can be discovered by intentional lures.

      Advanced Counter-Surveillance
      A target on the radar i.e. subject to surveillance, implies a major disadvantage, if not defeat, that is the circumstance of intrusive surveillance itself emasculates much potential activists possessed prior to exposure. Ideally urban insurgency or counter-establishment programs should match the secrecy and stealth of their opposites in order to achieve outcomes. The reality is most subversives, iconoclasts and insurrectionists of serious reckoning will be watched. This being the case, targets need to factor in the challenge of surveillance or the risk thereof in their operations and not leave the possibility of exposure to chance or afterthought.

      Surveillance and its disruptive or paralysing effects  can be mitigated somewhat with its counter-detection. Covertly discovering surveillance as a major operational objective may mean the difference between victory and defeat. Targets should  mimic their opposites matching the obsession with secrecy and obfuscation. A raison d'etre of most agencies is the analysis of and response to intercepted and gathered intelligence - the rest is just method. Secret counter-detection of surveillance can give the target a major advantage for several reasons, for example,  reciprocating regime subterfuge by concealing real intentions under the smoke of decoys or the feeding of corrupt intelligenceSecretly identifying the circumstance of surveillance is a powerful tool if managed correctly, this management includes verifying agency ignorance to their exposure. Verification can be achieved through observing the same agents / mechanisms persist following exposure. In most cases when individual agents become cognisant to their exposure they will return to base somewhat sheepish to be recycled.

      Sweeping – scanners and other detection gadgetry are available at retail outlets.  Purchasing of these type of consumer goods can be subject to 'monitoring'. Using this counter-technology can create a false sense of security -  these gizmos should be regarded as an additional tool, not a solution.

      CCTV or Counter-Surveillance Cameras - a dependable tool in capturing, and the prevention of, 'agents' sniffing around areas of vulnerability (e.g. domiciles and vehicles)  is the deployment of 'mickey mouse' surveillance cameras, available from most electronic retailers and at little cost.  However, given the ubiquitous presence of cameras across the community, it is highly probable governments devised technology to temporarily  jam standard security cameras, allowing their agents to invisibly operate. Such directed-energy counter-technology would have been a urgent priority for intel agencies many years ago, when the Orwellian pan-optic dystopia began to emerge in the Anglosphere.

      To assume the private sector can match or outpace government  / military in surveillance technology is ill advised.

       counter-surveillance specialist at work
       * The Boab for the Scrub
      Targets watching for byzantine (suspect) behaviour may miss the 'audacious' fat boab  in the scrub. Agents occasionally  conduct brazen collection tasks in the target's face rightly calculating the target will dismiss the task as harmless tomfoolery / coincidence / mishap / encounter  by a member of the public. This is a form of "reverse psychology" by using the tunnel vision of the target to the tail's advantage (tunnel vision syndrome is ironically common among over-cautious targets, who in search for the obscure, are blind to the obvious) .

       What tree!
      The Paranoia Complex
      Robust vigilance against hostile surveillance is ideal, though when this vigilance disrupts daily life or causes feelings of persecution or induces delusions of grandeur then it’s time to surrender. Surrender meaning arrest the pattern nourishing the 'persecution' and anxiety because a paranoia complex can prove more debilitative than the actual surveillance deployed against a subject. Washington DC is full of ‘persecuted’ souls (mainly mentally ill men) who drift in from around the States (and from around the planet) to confront the demons of their imagined persecution - the CIA and Pentagon. Here in Canberra, this Capital City must also accommodate people suffering the same disorder given most of the Intel agencies are headquartered here.

      one of those eyelashes is really an antenna 
      The Counter Paranoia Complex 
      When an agency has been discovered and exposed by a subject, a standard regime counter-claim is the subject is delusional and paranoid. This mandatory counter-strategy immediately deflects the focus away from the allegation of surveillance to the sanity of the accuser. In general uninitiated observers are more willing to believe an individual is delusional over his 'complaint' of surveillance no matter how conspicuous and aggressive the surveillance. 

      A powerful cognitive strategy, in both denying and concealing surveillance against solitary targets, is the casting of the  paranoia label.  Branding subjects paranoid, who complain of surveillance, typically induces self-doubt, inevitably tricking the subject to lower their guard. This psych-war weapon can be very effective, especially against those victims already uncertain to the circumstance of being subjected to surveillance. No sane person appreciates being identified as paranoid, and in most cases, will change their behaviour in order to repel the 'insult' against their intellect.

      When citizens are subjected to branding, they ought to identify, who is casting the aspersion, and who benefits, or as the Romans would ask "cui bono?"

      "no more shortblacks for me at night" 
      Strategic Advantage
      The covert surveillance industry along with espionage is often regarded as a male dominated profession. To a large extent this is very true, however, smart or 'intelligent' agencies are highly adaptable, versatile and dynamic in method. Effective covert surveillance largely depends on agency strategic advantage, that is agents are ahead of and pre-empt the target - both in the field and technology. Agencies have at their command a culturally and gender diverse crew of staff to meet the challenges and prejudices of a particular 'client' group.

      Whatever it Takes
      Proportional to the strategic value or threat posed by a target, agencies will mobilise any amount of resources and do whatever it takes to successfully conduct surveillance. Outmanoeuvring targets by identifying weaknesses and holes in lifestyles (and cover) is a core function of covert surveillance which logically leads to enhanced surveillance and deeper penetration. Potential targets for [politically motivated or despotic] surveillance need to carefully audit all aspects of lifestyle and habits / routines (private and public) identifying vulnerabilities for regime exploitation. It is suggested the first habit to jettison is the mobile phone.

      Espionage and the Malcontent
      Occasionally discontented activists seek to resist domestic regimes by approaching foreign posts peddling espionage like services. This is typically a last resort attempted by lone individuals. These espionage attempts almost always backfire on the malcontent because (a) the lone individual possesses little or no product to trade, and (b) most posts eagerly betray the malcontent back to the regime to buy and bargain favor.  In other words foreign entities calculate the trade off in betraying or recruiting walk ins. Strategically it is usually more beneficial to sell back the walk in than to recruit him. These 'exchanges'  are not uncommon.

      Individuals and or groups considering this pathway to resistance should consider:

      • what product can be offered 
      • authenticating buyer interest
      • negotiating recruitment 
      • negotiating first contact
      • feasibility of outcomes as they relate to regime resistance

        It is unwise to attempt this method without an attractive package and solid understanding of the foreign entity. Individuals who go down this path risk exposure and prosecution. It goes without saying those individuals 'caught out' will be marked forever. This is a 'mistake' i.e. tactical error, which can only be made once.

        Many major posts are contaminated, infiltrated by innocuous seeming employees trained to observe from afar and report back unusual activity and behaviour. Perimeter surveillance on selected posts is standard.

        In addition to the fact espionage and attempted espionage is against the law and for this reason alone is discouraged, the petitioned post can not be trusted and will invariably sell back the vendor to win favour from or feign benevolence to the host regime. 

        Alternatively these 'espionage approaches' can be conducted as ruses to swindle the host regime by distracting the same from the real objective. Again, this type of ruse can be used as an excellent conduit to feed disinformation and defective intelligence to the regime through the manipulated betrayal of the post. Under these circumstances, the recipient agency might absorb defective intelligence eagerly due to the believed 'surreptitious' collection method.


        BECOMING A TABLOID STATISTIC
        At All Costs Avoid Being COLD Shot by the Goons. Australian Goons, as with their homicidal US counterparts, are trained to shoot the disobedient in the chest and abdomen region – either from behind or front on. This means your chances of surviving a discharged police bullet, (typically calibre 45), is extremely slim.  Ninety nine per cent of all victims of goon shootings die because their vital organs e.g. lungs, liver and heart, were blown apart. The few survivors who beat the odds are left to vegetate on life support, bound to a wheel chair, defecating into a colostomy bag tethered to their trunk.

        The urban subversive must avoid unexpected or cold goon fire-fights, because unplanned exchanges always result in bullet-ridden citizens and gloating goons. Should you intend to engage the goons then do so on your terms – you set the agenda, not the goons. It is exactly the element of surprise that renders Sleeping Beauty raids so frequently lethal for the victim target.

        Pre-empt! Recall Micah Johnson from the USA and how he engaged the local goon squad under his terms, timing and place. The goons were so devastated by his surprise attack they were forced, (like the poltroons they are), to deploy an automated machine rigged with explosives to take him down. Micah was only 24 years! Imagine what a man, twice Micah’s age, could achieve.


        A Hero to Some...

        COUNTER- URBAN STALKING: THE FUNDAMENTALS
        Most stalking or tailing is remotely conducted digitally these days, even so, there will always be occasions requiring actual foot surveillance. Following is arguably the 2 most common methods for manually counter-detecting a live tail.

        1.    The Jerk
        For want of a better term, I call this method the Jerk. Generally speaking, when goons are on the footpath, tailing a target, they are tense and alert. Their head and body is focused on the subject. We are thus particularly interested in the behaviour of their eyes and torso that is, the sudden movement and reflexes of these body parts.

        When an agent is in danger of being observed by the target of foot surveillance, the spook will invariably respond in two ways: (1) quickly avert their eyes, and or, (2) sharply alter their body posture and gait. Even in a crowded area behind or to the side of the target, an alert subversive will apprehend this conspicuous and compulsive behaviour. For example, 100 random people (groups and individuals) are walking at varying paces behind the target. Only one of these ‘pedestrians’ radiates a tense movement when the target turns his head around. Invariably this sidewalk sneak is your “Where’s Wally”.



        You have discovered your tail simply because human nature being what it is, cannot always conceal the jerks produced by their own body language. Certainly, agents are conditioned to control their reflexes during such exchanges, however even the best trained agent cannot mute entirely his body language. There is always a tell-tale sign from the tail. You just have to know what to ‘catch’ in that 1 second glance as you rotate your peripheral gaze across the horizon behind and to the side.

        Many subversives are unaware that the arc of foot surveillance is not limited to the traditional rear of the target, but includes the perpendicular sides and occasionally the front.  On this point it is also noted, high priority targets can attract multiple tails. When multiple agents are deployed at staggered intervals to stalk a target, then counter-detection can be exceptionally difficult for the obvious reason, agents behind, at the side or front of the target are replaced with fresh faces and profiles. Continuity, a key clue for counter - detection, is thus disrupted. However this grade of serious surveillance is rarely deployed due to the resources required. Should you ever find yourself the subject of such heavy side-walk surveillance in Australia, then it is suggested you pause and reflect on your agenda, because you have become way too ‘popular’ with the wrong crowd.

        2.     Mirror Mirror on the Wall
        This 2nd fundamental should be anticipated by its title. In the urban environment, there are shinny surfaces all over the shop. These surfaces along, with real mirrors, (e.g. vehicle mirrors), provide the hunted with rear view vision. Several times, this Author has paused in front of a shop window to catch a glimpse of the spook hovering in the background waiting for his next move. The mirror like surface on smart phones can be used to this end. Eyes glasses can additionally be modified for the same function, though such effort is risking exaggeration.

        Remember: when a tail has been discovered, do NOT (a) alert the stalking agent to his exposure from your own body-language, and (b) confront, tease or challenge the agent (unless there is an operational motive to do so e.g. distraction and deception). Confronting discovered agents, sans operational objectives, is highly unprofessional and counter-productive, placing you at further risk of harm.

        THE GOLD STANDARD
        WHEN DISCOVERY OF INTRUSIVE SURVEILLANCE IS ACHIEVED (WHATEVER THE FORM) ALWAYS FEIGN IGNORANCE – THIS IS EXACTLY HOW THE ENEMY ALWAYS BEHAVE.

        NEVER GIFT THE AGENCY THE CRITICAL ADVANTAGE OF YOUR OPERATIONAL KNOWLEDGE OF THEIR SURVEILLANCE PROGRAMS AND LEVEL OF INTRUSION – UNLESS YOUR OPERATIONS REQUIRE GAME PLAYING I.E. MANIPULATION.

        CONVINCING THE ENEMY AGENCY, YOU ARE AN IGNORANT AMATEUR, POSSESSING A LOW I.Q. IS THE BEST COUNTER-STRATEGY YOU CAN CRAFT, IN ORDER TO INFLATE AGENCY ARROGANCE.  ARROGANT AGENTS ARE A GIFT. ARROGANT ENEMIES MAKE MISTAKES.

        COMMS FOR FLAGGED SUBVERSIVES ARE INTERCEPTED, RECORDED AND ANALYSED. USE THIS KNOWLEDGE TO YOUR ADVANTAGE BY DISSEMINATING CORRUPT INTELLIGENCE / CHATTER. BE SUBTLE!

        SMART PHONES AND TABS ETC POSSESSED BY SUBVERSIVES ARE MONITORED IN REAL TIME. USE THIS KNOWLEDGE TO YOUR ADVANTAGE – INVERT AND SUBVERT THEIR OWN WEAPONS. THE MORE GOVERNMENT RELY ON REMOTE SURVEILLANCE TECHNOLOGY THE MORE DEFECTIVE BULLSHIT (INTELLIGENCE) CAN BE FED TO THEM.


        DIGITAL DEVICES MAY STILL BE ENEMY ACTIVATED EVEN WHEN THE DEVICE IS SHUT DOWN AND OR THE MAIN BATTERY IS EXHAUSTED.

        WHEN STRANGERS / PEDESTRIANS ACCOST (PHYSICAL CONTACT) YOUR PERSON IN A PUBLIC SPACE, YOU HAVE BEEN E TAGGED. MAINTAIN IGNORANCE.

        UNDERSTAND VOICE RECOGNITION APPLICATIONS.

        UNDERSTAND THE SOPHISTICATION OF FACIAL AND GENERAL APPEARANCE DISGUISES ADOPTED BY THE ENEMY.

        UNDERSTAND EMERGING URBAN SURVEILLANCE POTENTIAL OF DRONES.

        UNDERSTAND THERMAL IMAGING TECHNOLOGY AND THEIR AIREAL SURVEILLANCE APPLICATIONS.

        UNDERSTAND EVOLVING BIO-METRIC IDENTIFICATION APPLICATIONS.

        UNDERSTAND EMERGING AND EXISTENT DIRECTED ENERGY TECHNOLOGY.

        UNDERSTAND THE PREVALENCE OF INFILTRATORS, INFORMERS AND TRAITORS.

        UNDERSTAND THE MINDSET AND CULTURE OF NATIONAL INTELLIGENCE AGENCIES. NEVER ASSUME. NEVER UNDER-ESTIMATE. THIS INCLUDES UNDERSTANDING POLICIES AND PROCEDURES AND PARLIAMENTARY ACTS PERTAINING TO POLICIES AND PROCEDURES.

        UNDERSTAND THE DECEPTIVE CURRENCY OF COUNTER-SUBTERFUGE AND CONSPIRACY. AGENCY GOONS ARE RELATIVELY EASY TO MANIPULATE. MOST SPOOKS ARE DOGMATIC, TRAINED TO RESPOND TO SCRIPTED SCENARIOS.

        SPIES ARE NOT AS ‘INTELLIGENT’ OR ‘LATERAL’ AS THEY WOULD HAVE US BELIEVE.  A REAL CASE EXAMPLE INVOLVED THE AUTHOR WHO WAS BEING ‘FOLLOWED’ THROUGH A CITY DEPARTMENT STORE BECAUSE A HIGH PROFILE POLITICIAN WAS NEARBY. THE SOLITARY AGENT WAS SO UNPROFESSIONAL, HE WAS OBSERVED TRAWLING THROUGH THE GIRLS UNDERWEAR SECTION AS COVER FOR AN INNOCENT SHOPPER. UNDERSTANDABLY THIS AUTHOR INSTANTLY IDENTIFIED THIS ABNORMALITY. IT’S UNCERTAIN WHETHER THIS GOON, ALSO SPORTING A CONSPICUOUS MICHAEL JACKSON GLOVE, WAS STANDARD POLICE OR DISPATCHED FROM THE AGENCY. IT’S LIKELY HE WAS A STANDARD POLICE GOON AS IT IS INCONCEIVABLE CANBERRA WOULD EMPLOY SUCH AMATEUR BUFFOONS. THEN AGAIN…

        UNDERSTAND GOONS ARE BIASED: EXPLOIT THEIR BIAS’.

        UNDERSTAND MANY INTRUSIVE SURVEILLANCE APPLICATIONS REMAIN CLASSIFIED, AND ERGO ARE UNKNOWN AND UNKNOWABLE / UNIDENTIFIABLE.

        UNDERSTAND INTRUSIVE SURVEILLANCE TECHNOLOGY CONTINUALLY EVOLVE IN BOTH APPLICATION AND DESIGN.

        UNDERSTAND THE DECLASSIFICATION GAP OF DECADES CONCEALING MILITARY TECHNOLOGY.

        UNDERSTAND THE BEST COUNTER-STRATEGY AGAINST INTRUSIVE SURVEILLANCE IS TO STAY INVISIBLE I.E. UN-FLAGGED. HOWEVER NEVER ASSUME YOU ARE INVISIBLE TO THE GOONS. UNDERTAKE DECOY PROJECTS TO ASCERTAIN FLAGGED / VISIBILITY STATUS. THIS MAY INCLUDE ASSESSING THE INTENSITY (SCALE) OF INTRUSIVE SURVEILLANCE DEPLOYED.

        UNDERSTAND THE DEFINITION OF SUBTLE AND APPLY SUBTLY TO ALL YOUR COUNTER-OPERATIONS AGAINST INTRUSIVE SURVEILLANCE. DEPLOY HEAVY TECHNIQUE WHEN DOUBLE-DECEPTION IS REQUIRED.

        UNDERSTAND THE SUBTLE DISSEMINATION OF DEFECTIVE AND DECOY DATA IS YOUR MOST POWERFUL COUNTER-WEAPON. SHOULD YOU NOT UNDERSTAND THIS FUNDAMENTAL THEN CONSIDER FLIPPING BURGERS FOR A CAREER – YOU’LL BE HAPPIER AND SAFER.

        UNDERSTAND NINETY PER CENT OF ALL INTRUSIVE SURVEILLANCE IS CONDUCTED DIGITALLY AND REMOTELY.


        ****************************************************************************************************** NOTA BENE: SECURE  ELECTRONIC CONTACT ACCESS FOR AUTHOR
        # contacting the Author by email is not a guarantee of access, as Author's email accounts are obviously regime accessible. In order to ensure digital contact with bona-fide Author, please research and use Author's other digital records e.g. Facebook, YouTube, Twitter. Access through alternative media is likely to be more reliable than cold 3rd party monitored email communications.

        # please do not email details of group / individual operations or  agendas

        # please do not pose hypothetical questions on counter-surveillance issues, as this type of conjecture is a dead give away.

        PANAIA


        "If your enemy is secure at all points, be prepared for him. If he is in superior strength, evade him. If your opponent is temperamental, seek to irritate him. Pretend to be weak, that he may grow arrogant. If he is taking his ease, give him no rest. If his forces are united, separate them. If sovereign and subject are in accord, put division between them. Attack him where he is unprepared, appear where you are not expected." Sun Tzu


        -----------------------------------------------------------------------------------------------------------