Countersurveillance

Amidst concerns over privacy, software countermeasures[2] have emerged to prevent cyber-intrusion, which is the unauthorized act of spying, snooping, and stealing personally identifiable information or other proprietary assets (e.g. images) through cyberspace.

Following steady, easy-to-predict schedules before employing aforementioned countermeasures may make the surveillance detail complacent and thus easier to lose.

Another strategy is to utilize a room for safe conversations with these requirements: TSCM (technical surveillance counter-measures) is the original United States Federal government abbreviation denoting the process of bug-sweeping or electronic countersurveillance.

The advent of multimedia devices and remote control technologies allow huge scope for removal of massive amounts of data in very secure environments by the staff employed within, with or without their knowledge.

Lab and even field-quality receivers are very expensive and a good, working knowledge of RF theory is needed to operate the equipment effectively.

Another method is using very sensitive thermal cameras to detect residual heat of a bug, or power supply, that may be concealed in a wall or ceiling.

A combination of existing techniques and resonance sweeps can often pick up even a defunct or "dead" bug in this way by measuring recent changes in the electromagnetic spectrum.

[12] In 2011, Defence Minister Peter MacKay authorized a program to search telephone and internet usage for suspicious activities.

"[15] Amnesty International runs a campaign called #UnfollowMe that "calls on governments to ban mass surveillance and unlawful intelligence sharing", inspired by Edward Snowden leaking thousands of NSA documents that revealed information about mass surveillance in the U.S.