8 minute read

Covert Cameras

Next Article
US Foreword

US Foreword

COVERT CAMERAS

By: Ben Gunn, Olchon & Associates Ltd

The deployment of a stand-alone covert camera is a specialised capability. Some practitioners with a military, intelligence, or police background have learnt their skills in some of the worlds’ sensitive areas, where compromise was not an option.

This is not to say there aren't excellent installers with a commercial background. For instance, CCTV installers who have developed a particular skill set, when installing additional cameras onto a CCTV network isn’t a viable option or practical. Not getting compromised remains an essential part of any covert task.

The history of who started installing covert cameras is unclear. However, the substantial gains in technology in recent years have certainly helped the modern-day experts who ply their trade in this security discipline. The digital age, smaller cameras, improved battery efficiency, smaller storage devices, near-global communications, and the readily available technology on the internet has undoubtedly assisted.

History

In 1865, a small (in comparison to what was available at the time) sliding box camera was designed and produced in France. This was likely to have been the first spy camera ever made, although there appears to be no evidence of it ever being used for espionage - why would there be? In the late 1890s, the Tico Expo Watch Camera was very popular and probably the most famous spy camera of that era. Looking very similar to a pocket watch, it was used by gentlemen in a semi-covert way by posturing to tell the time while conducting their surveillance activity – the wristwatch had not yet been invented. In the 1930s, and 40s, there were great strides made in camera design as the technology improved, and in the 1950s, the first button-hole camera was introduced. The design was very rudimentary and somewhat unsophisticated, yet the concept is still popular today.

In 1947, under the National Security Act in the USA, the formation of the CIA was instigated, and it mentions that acts of 'other functions and duties' could be carried out at the direction of the newly formed National Security Council. This was widely understood to mean covert activities, including eavesdropping and other acts of espionage, with the ‘possibility’ of deploying covert cameras, worn on the person or installed. I state ‘possibility’, as the camera technology was available, but not at the size and capability compared to that of the modern-day.

Even then, in 1947, to claim that a Government agency actually stipulated covert activities would have been detrimental to the host country, and other countries may have reprimanded them for ‘not playing with a straight bat’; an old-fashioned term referring to conduct carried out in an honest and simple way because you have traditional values and ideas.

Without a doubt, the cold war between the East and the West had considerable input into covert activities. The division between Russia in the East, and the USA and its allies in the West, including the sycophantic British, was a result of different ideologies; Communism in the East and Capitalism in the West – here ends the history lesson! The public sector on both sides of the divide were quick learners when it came to surreptitious behaviour and their supporting technology.

More recently, the emergence of covert camera installations in the private security sector has predominantly developed into an evidence gathering and monitoring capability, reacting to nefarious activities; usually, a product of unusual circumstances where maliciousness or immoral activity has occurred, is about to occur or continues to occur.

Unfortunately, the employment of covert cameras has had a particular stigma attached to it, with a common belief that someone who installs a covert camera is up to no good. This is probably due to negative media reporting, where accounts of voyeurism and perversion (upskirting and live video streaming onto illegal pornographic websites) often make the headlines, instead of how a professionally run covert camera task has aided in the capture of a criminal. The professional covert camera installer remains in the shadows of clandestine media reporting, not dissimilar to the equipment they install and extract!

In a recent documentary by the British investigative journalist Stacey Dooley, she researched and reported on the South Korean phenomenon called ‘Molka’. Molka is the deployment of covert cameras and mobile phone technology to capture live footage of women (and men) at their most vulnerable, or during acts of intimacy. If the perpetrators were not using smartphones, the covert cameras and supporting technology are often bought or built by individuals who are happy to exploit their victims. Changing rooms, toilet cubicles, and homes are targeted on an unbelievable scale for the offenders’ own pleasure. And also for acts of bribery, where the ability to make a few dollars (or to be factually correct in currency, the South Korean ‘won’) takes precedence. Unfortunately, with pornography being illegal and banned in South Korea, self-gratification and homemade porn films, made without the consent of the person of interest, has probably forced this issue. Fortunately, I’m reliably informed that the porn industry is thriving here in the West, and therefore acts of voyeurism are few and far between.

Without a doubt, the cold war between the East and the West had considerable input into covert activities.

I believe that the covert camera world is split into two main categories. Firstly, the body-borne capability, which also includes the use of a Trojan horse carrying aid like a bag, briefcase or handbag. And secondly, the temporary installation, be it into a vehicle, building, or structure.

The word 'covert' is significant, rather than referring to the ubiquitous, overt body and head cams that other personnel in the security industry are often seen to be using. The temporary covert installations are either a cost-effective rental system or the readily available and easy to deploy covert camera purchased from the internet or a spy shop. I accept that it is not uncommon for a business to purchase the equipment instead of hiring it.

Internet purchases have their pros and cons; however, I’m still not convinced that some of these are a credible option for a covert task. Most of the equipment will not be conducive to the surroundings, or the area of interest, that they are to be installed in, and on that basis, I still have some reservations. Lest we forget, one crucial element of a covert camera is not to get caught! A new clock or new smoke detector suddenly appearing on a wall or ceiling may be spotted by a diligent individual – game over!

No matter what the requirement is, and considering what an unprofessional covert camera system could be deployed for, the four main professional deliberations to be considered are:

Is it legal or intrusive?

This is probably the first and most important consideration at the early stages in dialogue with a potential covert deployment. Some questions to pose could be; are you breaking any laws in attempting to prove that a law has been broken? Are permissions required from landlords, landowners, or other stakeholders in the business? Are you going to trespass to gain an advantage or enter a facility to carry out the installation without the necessary permission?

The other important factor where individuals struggle to determine the legality of their actions is what does the client intend to do with the data (the evidence)? If the intentions are to convict the potential criminal by engaging with the local Police, or to have a disciplinary hearing, or to prove that a crime has been committed, then the covert installation could be deemed as reasonable. It is not uncommon to involve the Police or a legal advisor at these very early stages. This will be explained in Issue 54, where I’ll explain the planning process.

Is the deployment reasonable and proportionate to the task objective?

The objective should tie in with the above paragraph. The deployment of a covert camera (or plural) is for individuals or businesses that require essential evidence gathering in the detection of crime and the monitoring of suspicious activity. If the objective is anything different, then you may have to reconsider or advise the client on the legalities.

What are the other options for the client?

Unfortunately, my transparency or lack of unscrupulous business prowess has let me down on occasions, where I’ve talked myself out of a covert installation. For example, if there is an existing CCTV system installed, why can’t another, semi-covert camera be added? What other measures could be put in place to eradicate the problem?

Once these fundamental questions have been asked, and the conclusive answers lead the client to consider a covert camera task, then the following four phases should commence. For the purposes of this article, I’ll be concentrating on a temporary installation:

Phase 1: Planning

Phase 2: Installation

Phase 3: Extraction

Phase 4: Collation of Evidence and Reporting.

Of particular note is the Planning phase, where some of the original questions posed above, may be reconfirmed, especially if you are bringing in new stakeholders like the Police. The attention to detail, and ensuring the client’s expectations are met, or at least discussed, are essential in the planning of a successful covert task.

In Issue 54, the followup article will explain the four phases in detail. I will also attempt to clarify the legislation, governance, and all the other concerns that a professional covert camera installer will consider before Phase 2, the installation, commences.

Ben is a former member of the British Army spending 29 years out of a 33-year military career in UK Special Forces – 19 years in the Regulars and a further 10 years in the Reserve. He had a unique military career; initially expeditionary and latterly, 4 years seconded to Intelligence and a further 4 years in a Counter Terrorism liaison role.

Ben is a businessman, incorporating a UK Special Forces tenet into his business planning; ‘the unrelenting pursuit of excellence’ and as such, has established under his directorship, a truly global company based in London, offering a multi-service approach to the security of any asset; protecting People, Property (including Intellectual Property), and Possessions.

E: ben.gunn@olchon.co.uk T: +44 (0)203 1903030 W: www.olchon.co.uk

This article is from: