← Back to blog
Privacy April 13, 2026

Why Defence Needs Counter-Surveillance Technology

The surveillance industry is worth $130 billion globally. The counter-surveillance industry barely exists.

This asymmetry has consequences. Foreign intelligence services deploy surveillance infrastructure in allied nations. State-sponsored actors use commercially available tools for espionage. Adversaries can purchase the same facial recognition, ALPR, and signal intelligence tools that law enforcement uses, and deploy them against allied personnel, diplomats, and defence contractors.

There is no consumer-grade tool that lets you know what’s watching you.

The problem for defence

Defence and intelligence personnel face surveillance threats in their daily lives:

Physical surveillance. CCTV cameras, ALPR readers, and facial recognition systems track movement patterns. An adversary who can access commercial surveillance data can build a complete pattern-of-life for a target, all from legally purchased data.

Electronic surveillance. IMSI catchers (cell-site simulators) can intercept communications within range. Hidden cameras and audio bugs in hotel rooms, offices, and vehicles are standard espionage tradecraft. Bluetooth trackers like AirTags can be planted in seconds.

Digital surveillance. Browser fingerprinting, tracking cookies, and data brokers create detailed profiles. Location data from apps is commercially available for purchase. Social media monitoring is automated.

None of these threats require state-level capability. All of them are commercially available.

What counter-surveillance looks like

We are building the Symvek stack: layered counter-surveillance technology from the browser to the physical world.

Sentinel is a surveillance awareness map that aggregates 458,500+ records from FLOCK (the Ringmast4r/FLOCK community dataset), EFF Atlas of Surveillance, OpenStreetMap, DeFlock, and 20+ government open-data feeds across 183 countries. Symvek’s contribution is operational integration, deduplication, daily refresh, and search, not raw collection. Live in production. Know what’s watching you before you walk into it.

Shield is a privacy browser extension. 22,000+ tracker domains blocked, cookie consent automation, fingerprint protection. Chrome MV3 and Firefox MV2. Currently in Chrome Web Store review.

Watchpoint is the desktop perception agent (Q3 2026). A continuous-perception agent that detects nearby surveillance trackers, unfamiliar devices on your network, drone-vendor signatures, and the surveillance camera density around you. Tauri shell, Python sensing engines, local SQLite. No data leaves your machine. The desktop layer of the Symvek stack, and the consumer-accessible alternative to enterprise TSCM hardware.

Research outputs are the open contribution to the defence-adjacent space. Position papers on counter-surveillance and counter-UAS architecture, including cryptographic-provenance multi-sensor fusion (a security profile complementary to NATO’s SAPIENT open architecture) and evaluation methodology for civilian-tier counter-UAS systems. Published at /research. Engineered to be cited, forked, and extended by others.

The dual-use opportunity

Every one of these tools serves both civilian privacy and defence security:

  • Journalists investigating organized crime need to know where cameras are before meeting a source
  • Human rights workers operating in surveillance-heavy environments need TSCM-grade awareness on consumer hardware
  • Defence contractors travelling to high-risk regions need counter-surveillance tools that do not require a security clearance to purchase
  • Allied military personnel living off-base are targets for adversary intelligence collection using commercial surveillance infrastructure

The technology gap is real. The market for TSCM equipment is $6.4 billion and growing, but almost all of it is enterprise-grade hardware priced for government procurement. To our knowledge, no integrated open architecture exists that spans browser, desktop, and physical-world counter-surveillance with customer-owned hardware and no data egress. We propose one.

What makes this different

Most surveillance mapping tools are academic projects or activist tools that stopped being maintained years ago. Most TSCM equipment costs thousands of dollars and requires training.

We are building tools that work for everyone: a free surveillance awareness map (already live), a desktop perception agent that costs less than enterprise TSCM by orders of magnitude, and a counter-UAS layer designed for civil operators rather than surveillance-state command stacks. The same tools that protect a journalist’s source also protect a defence contractor’s travel patterns.

The architectural pattern matters as much as any individual product. Edge-only. Customer-owned. No data egress. Open and auditable where verification is required. Defence operators should be able to detect real threats without becoming surveillance infrastructure themselves. That is the gap the Symvek stack is built to close.

Counter-surveillance shouldn’t require a security clearance or a procurement contract. It should be as accessible as the surveillance it defends against.

Learn more

Explore Sentinel to see what’s watching in your area. Follow our progress on the rest of the Symvek stack on this blog.