Countering Ubiquitous Technical Surveillance
Wednesday, March 4, 2026 | 3:00 P.M. E.T.
Protecting Law Enforcement Operations and Officer Safety in a Data-Saturated World
Ubiquitous Technical Surveillance (UTS) has become an existential threat to U.S. law enforcement. The aggregation of travel, digital, electronic, financial, and physical surveillance data is used by criminal enterprises and foreign actors to identify, track, and target officers and confidential human sources. This compromises investigations, sensitive operations, and the safety of communities. Recent cases demonstrate the use of readily available tools and open data sources including mobile devices, social media, online databases, radios, and emerging technologies.
Join us to explore how to counter UTS with practical, real‑world steps your agency can take now to safeguard officers, protect operations, and strengthen public trust in an era of pervasive surveillance.
By attending this webinar, you'll learn:
- How UTS is leveraged across digital, physical, and electronic domains to target law enforcement.
- Why traditional operational security practices are no longer sufficient.
- Practical steps agencies can take to reduce exposure, including cybersecurity controls, mobile and radio policies, online hygiene, and structured counter-UTS programming.
- Available resources from the MS-ISAC to help agencies operationalize these protections.
Who Should Attend
This webinar is designed for law enforcement executives and command staff, intelligence unit leaders and analysts, fusion center personnel, investigators working sensitive operations, and IT/cybersecurity managers.

To support a collaborative defense network, this webinar is hosted by the Center for Internet Security® and Multi-State Information Sharing and Analysis Center, in partnership with the Major County Sheriffs of America (MCSA) and the Association of Law Enforcement Intelligence Units (LEIU).