The Hidden Camera Epidemic

Boyfriends, ex-boyfriends, alarm company personnel, landlords, neighbors.  These are a few of the culprits that have been in the news in just the last few months as having illegally placed hidden cameras.  Technology has made this risk greater than it’s ever been before.

So, how do you protect yourself?  First, you must be ever vigilant and honestly you can’t trust anyone where this is concerned, meaning you have to consider anybody and everybody a potential suspect.

It’s important to understand that these devices are so small, they can be hidden almost anywhere.  A camera lens can be almost as small as the head of a pin.  Wow!  The perpetrator does not always need access to your space to monitor a hidden camera feed.  In this scenario, the suspect places the camera and connects it to Wi-Fi that they have placed or may even be bold enough to connect it to your own Wi-Fi if they’ve been able to gain your confidence or illicitly obtain your credentials.  So be cautious about who has access to your Wi-Fi information and pay special attention if your internet provider sends you notifications that someone is connecting a device to your network.

But just because the bad guy does not have access to your Wi-Fi, it does not mean you are safe!  The device they are using may simply contain a small memory card (SD card or micro SD card for example) .  In this situation, the person usually has regular access to your space and may be simply changing out the memory card from time to time.  Watch for people who have regular access to your space and who may be coming up with reasons why the need access.

Another way access may be obtained to a hidden camera feed is through Bluetooth.  In this case, the person connects via their own Bluetooth connection and doesn’t need access to any information from you.  They must be in fairly close proximity to the device in order to monitor the feed.  However, it’s entirely possible to monitor/record it from in a vehicle outside your home or apartment.  So, beware of anyone known or unknown who is lurking around. 

Be aware of people who seem to know what’s going on with you.  Are there too many coincidences with some people you know?  Are they showing up at places you go too often or do they know things about your personal life of schedule that your are sure you didn’t share?  Most hidden devices have audio capability as well as video, so its very possible the person will give themselves away at some point if you are paying attention.

Think about gifts you’ve been given or work you’ve had done in your space.  For example you may have been given a plush teddy bear or other item and the giver places it in a strategic location.  Or a technician has worked on or replaced batteries in a smoke detector.  Watch for suspicious behavior on the part of either of these types of situations.

If a landlord lives adjacent to you, do they have access to your attic space or to an adjoining wall where they could place a device in a mirror

To narrow things down, consider the most vulnerable locations and the most common devices that are used.  Bedrooms, bathrooms and dressing areas are the target for this criminal.  And although there are varying levels of sophistication as far as devices go, in most cases they can be found since the majority of suspects are limited by price and technical ability.  Clocks, mirrors, phone chargers, room fresheners that plug in, and on and on. 

Devices are marketed for the purpose of finding these items but are of limited effectiveness.  The best approach addresses the key elements outlined above coupled with a actual search to locate the device.

There may be companies that can assist you in your area if you have a suspicion but would be more comfortable with help.  It’s important to use a firm that understands all elements of the practice and is careful to preserve evidence for law enforcement should a device be identified.  No service can identify every threat, but professional consultation minimizes the threat.

We can help in the Tulsa, Oklahoma metro area.  www.myprivacy hawk.com

Next
Next

Blog Post Title Two