Essay Undergraduate 1,260 words Human Written

Law Enforcement and Surveillance

Last reviewed: ~6 min read Law › Law Enforcement
80% visible
Read full paper →
Paper Overview

Surveillance - Types, Methods, When to Conduct on Terrorist Surveillance can simply be defined as the observations undertaken to obtain information. This simple description contains a wealth of methods and techniques that can be seen as forms of surveillance. Law enforcement officials can use a "roving" monitor to "follow" an individual and...

Full Paper Example 1,260 words · 80% shown · Sign up to read all

Surveillance - Types, Methods, When to Conduct on Terrorist Surveillance can simply be defined as the observations undertaken to obtain information. This simple description contains a wealth of methods and techniques that can be seen as forms of surveillance. Law enforcement officials can use a "roving" monitor to "follow" an individual and legally intercept that individual's communications with one court instruction. All UAV's function as midair surveillance podiums and have potent video cameras armed with thermal and night-vision.

UAV's can be best utilized when carrying out operations in an enemy territory. Intelligence agencies use satellites for a range of purposes, comprising of communications, navigation, etc. The application of distinctive personal physiological traits, for example iris scanning, facial recognition, fingerprints, walk and posture, voice recognition, full body imaging, etc. and lastly, employing of digital cameras and 35mm camera remains a vital instrument in surveillance. It is particularly suitable for identifying and documenting locations, vehicles individuals etc.

Surveillance i Introduction Surveillance can be defined simply as the observations carried out to obtain information. This simple description contains a wealth of methods and techniques seen as forms of surveillance. Several of these can be recognized through common insight created by popular beliefs. The most common techniques include technical surveillance (typically covert audio recording or video or audio), electronic surveillance (keystroke counting, digital observations), and many others (Davis, Mcgarrity & Williams, 2014).

Almost anyone can indulge in surveillance when properly educated and trained; people using the different methods of surveillance vary from private investigators collecting evidence to use in civil court to federal officials attempting to save people from criminals and terrorists. Surveillance types and when to conduct them Roving Wiretaps Federal officials tasked with law enforcement have the power, subject to the approval of a court, to conduct electronic surveillance and wiretaps on individuals suspected of federal crimes.

"Roving" wiretap permits law enforcement officials to "follow" an individual and legally intercept that individual's communications with one court order whether the subject tries to avoid surveillance by switching telephones or any other communication devices (Bjelopera, 2013).

Before roving wiretaps had become possible, federal law enforcement officers and prosecutors had to depend on substantial resources and time in gaining a different wiretap order for all other telephone that a subject used at the time of the investigation, this frequently led to loss of valued evidence through wasted wiretap conversations associated to the illegal activity being observed. Afore the United States PATRIOT Act, the idea behind the roving wiretaps didn't apply to FISA (Foreign Intelligence Surveillance Act).

United States PATRIOT Act adjusted the electronic surveillance part of the FISA to permit government officials to sustain surveillance even when the monitored subject switched from a device such as a telephone associated with a particular service provider to another device associated with another provider. Unmanned Aerial Vehicles (UAV's) Military agents usually employ UAV's for reconnaissance and surveillance. There are numerous kinds of UAV's, however they all function as aerial surveillance mechanisms and have potent video cameras armed with thermal and night-vision.

An operator who monitors the flight area and path by means of the UAV's camera controls them remotely. Small types, for instances the Skylark, Eaglescan, or Raven are comparable to miniature airplanes. They can be launched manually. They do not have a longer flying-duration and are supposed to be employed by forefront combat agents who need a reconnaissance of a region. Larger UAV's, for instance the Heron and Predator can be compared to a smaller aircraft. They can fly for almost an entire day and hover over long altitudes.

Additionally, they can fly over high altitudes. The bigger UAV's may also be armed with short-range missiles and can be employed in targeted killings by U.S. as well as forces. They are best employed when carrying out operations in an enemy territory e.g., in the combat against terrorists in ISIS held portions of Syria and Iraq. Satellite Satellites happen to be utilized by intelligence, commercial and military organizations for a range of functions, including communication, navigation, digital imaging, etc.

They are deployed into particular orbits, where they are maintained during their lifetime (which can reach up to 10 years). There are numerous satellites orbiting the earth. The most sophisticated detective satellites are the ones launched by the United States, comprising the KH (Key Hole) series satellites for imaging. The Key Hole 12 and Key Hole 13 versions can discern items on the ground as tiny as 5" (from a very long distance in space).

In addition, they use lasers, radar, electromagnetic sensors, and infrared for seeing through forest canopies or thick clouds, as well as concrete structures, in order to gather data or make images. Satellites for imaging are mainly used for intelligence by the military to check the movement of troops, bases, weapons positions, cargo ships, and ports among others (SPENCER, 2015).

They have limited individual surveillance use since they are within the orbit and have no capacity to move around a particular place, and hence they cannot give real-time visuals of a particular location. Aerial head top views are not that helpful as well. Other satellites for surveillance are the ones which are used for signal intelligence (SIGINT) which monitor mobile phone and radio traffic. About 100 United States national satellites for security are in orbit. 6-7 of the satellites are for imaging, while 9-11 are SIGINT.

Other associated states such as Canada have the same intelligence as the U.S. There are networks used to connect them, e.g. Echelon, which allow sharing of data even from the spy satellites of the U.S. Satellites are important in carrying out high-level monitoring in places where UAVs cannot reach and large areas, for instance across countries (Gardeazabal & Sandler, 2015). Biometrics These include the utilization of special individual physiological features like facial recognition, voice recognition, iris scanning, walk and posture and complete body imaging among others.

Because of technological and computer advances, utilization of biometrics to track and identify people has grown more widely. With regard to surveillance, biometrics can be applied in the identification of persons.

252 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
5 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Law Enforcement And Surveillance" (2016, November 19) Retrieved April 21, 2026, from
https://www.paperdue.com/essay/law-enforcement-and-surveillance-2163126

Always verify citation format against your institution's current style guide.

80% of this paper shown 252 words remaining