Countering Ubiquitous Technical Surveillance
Previously aired on Wednesday, March 4, 2026
Protecting Law Enforcement Operations and Officer Safety in a Data-Saturated World
Ubiquitous Technical Surveillance (UTS) has become an existential threat to U.S. law enforcement. The aggregation of travel, digital, electronic, financial, and physical surveillance data is used by criminal enterprises and foreign actors to identify, track, and target officers and confidential human sources. This compromises investigations, sensitive operations, and the safety of communities. Recent cases demonstrate the use of readily available tools and open data sources including mobile devices, social media, online databases, radios, and emerging technologies.
In this webinar, we explored:
- How UTS is leveraged across digital, physical, and electronic domains to target law enforcement.
- Why traditional operational security practices are no longer sufficient.
- Practical steps agencies can take to reduce exposure, including cybersecurity controls, mobile and radio policies, online hygiene, and structured counter-UTS programming.
- Available resources from the MS-ISAC to help agencies operationalize these protections.
This webinar was designed for law enforcement executives and command staff, intelligence unit leaders and analysts, fusion center personnel, investigators working sensitive operations, and IT/cybersecurity managers.
Missed the live event?
Watch this brief excerpt to explore key insights on emerging surveillance threats and practical steps organizations can take to strengthen their defenses.
Access More Insights in the Full Webinar

To support a collaborative defense network, this webinar is hosted by the Center for Internet Security® and Multi-State Information Sharing and Analysis Center, in partnership with the Major County Sheriffs of America (MCSA) and the Association of Law Enforcement Intelligence Units (LEIU).