SlideShare uma empresa Scribd logo
1 de 12
Surveillance By: Jennifer Howard
Different types of Surveillance Electronic Surveillance ,[object Object]
RFID (Radio Frequency Identification) tagging
Global Positioning System (GPS)Computer Surveillance ,[object Object],Facebook MySpace Twitter ,[object Object]
NarusInsight
 "Magic Lantern"
 CIPAV
 TEMPEST
 "Pinwale“
Data Mining and ProfilingEconomic Social Audio Surveillance ,[object Object],Wiretap  Bugs Multilateration  Pen Register TrapDevice  Trace Device
Different types of Surveillance Cont’d. Visual Surveillance ,[object Object]
Red Light Camera

Mais conteúdo relacionado

Mais procurados

Sexual harassment in higher education (1)
Sexual harassment in higher education (1)Sexual harassment in higher education (1)
Sexual harassment in higher education (1)
sashaveiga
 
police force ppt.pptx
police force ppt.pptxpolice force ppt.pptx
police force ppt.pptx
Paul Senthil
 
juvenile justice
juvenile justicejuvenile justice
juvenile justice
anandhjose
 

Mais procurados (20)

Survillance description
Survillance descriptionSurvillance description
Survillance description
 
Information Gathering in Intelligence Agencies
Information Gathering in Intelligence AgenciesInformation Gathering in Intelligence Agencies
Information Gathering in Intelligence Agencies
 
Sexual harassment in higher education (1)
Sexual harassment in higher education (1)Sexual harassment in higher education (1)
Sexual harassment in higher education (1)
 
Functions, Roles and Duties of Police in General
Functions, Roles and Duties of Police in GeneralFunctions, Roles and Duties of Police in General
Functions, Roles and Duties of Police in General
 
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniInvestigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
 
Vehicle Search 101
Vehicle Search 101Vehicle Search 101
Vehicle Search 101
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
GROUP 2 TOPIC 2.ppt
GROUP 2 TOPIC 2.pptGROUP 2 TOPIC 2.ppt
GROUP 2 TOPIC 2.ppt
 
Basic intelligence
Basic intelligenceBasic intelligence
Basic intelligence
 
Criminal Investigations (Part One)
Criminal Investigations (Part One)Criminal Investigations (Part One)
Criminal Investigations (Part One)
 
Matrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video SurveillanceMatrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video Surveillance
 
police force ppt.pptx
police force ppt.pptxpolice force ppt.pptx
police force ppt.pptx
 
World's Top 6 Intelligence Agencies
World's Top 6 Intelligence AgenciesWorld's Top 6 Intelligence Agencies
World's Top 6 Intelligence Agencies
 
Espionage (m)
Espionage (m)Espionage (m)
Espionage (m)
 
juvenile justice
juvenile justicejuvenile justice
juvenile justice
 
Fourth Amendment
Fourth AmendmentFourth Amendment
Fourth Amendment
 
Police patrol preview
Police patrol previewPolice patrol preview
Police patrol preview
 
3 handcuffing foxtroot
3 handcuffing foxtroot3 handcuffing foxtroot
3 handcuffing foxtroot
 
Artificial Intelligence for Policing
Artificial Intelligence for PolicingArtificial Intelligence for Policing
Artificial Intelligence for Policing
 
The PEACE Model of Investigative Interviewing
The PEACE Model of Investigative InterviewingThe PEACE Model of Investigative Interviewing
The PEACE Model of Investigative Interviewing
 

Destaque (10)

Ecological study
Ecological studyEcological study
Ecological study
 
Public health surveillance
Public health surveillancePublic health surveillance
Public health surveillance
 
public health surveillance
public health surveillance public health surveillance
public health surveillance
 
Types of Surveillance Systems
Types of Surveillance Systems			Types of Surveillance Systems
Types of Surveillance Systems
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Surveillance
SurveillanceSurveillance
Surveillance
 
outbreak investigation - types of epidemics and investigating them
outbreak investigation - types of epidemics and investigating themoutbreak investigation - types of epidemics and investigating them
outbreak investigation - types of epidemics and investigating them
 
Outbreak Investigation
Outbreak InvestigationOutbreak Investigation
Outbreak Investigation
 
Outbreak – investigation & management
Outbreak – investigation & managementOutbreak – investigation & management
Outbreak – investigation & management
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Semelhante a Surveillance

10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
hyacinthshackley2629
 
1 Evaluate the role of managers in criminal justice planning and in.pdf
1 Evaluate the role of managers in criminal justice planning and in.pdf1 Evaluate the role of managers in criminal justice planning and in.pdf
1 Evaluate the role of managers in criminal justice planning and in.pdf
fms12345
 
Connotation In Le Message Photographique, By Roland Barthes
Connotation In Le Message Photographique, By Roland BarthesConnotation In Le Message Photographique, By Roland Barthes
Connotation In Le Message Photographique, By Roland Barthes
Amanda Reed
 
Criminalistics DB3NameClassDatePro.docx
Criminalistics DB3NameClassDatePro.docxCriminalistics DB3NameClassDatePro.docx
Criminalistics DB3NameClassDatePro.docx
faithxdunce63732
 
Using a listening device to identify direction of gunfire
Using a listening device to identify direction of gunfireUsing a listening device to identify direction of gunfire
Using a listening device to identify direction of gunfire
dplsurve
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
forensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
forensicsnation
 
Body Cameras For Police Could Be One Smart-Step
Body Cameras For Police Could Be One Smart-StepBody Cameras For Police Could Be One Smart-Step
Body Cameras For Police Could Be One Smart-Step
Brenda Thomas
 
For the safer world
For the safer worldFor the safer world
For the safer world
Tony TRAN
 

Semelhante a Surveillance (16)

10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
City Wide Surveillance Using Search Based Video
City Wide Surveillance Using Search Based VideoCity Wide Surveillance Using Search Based Video
City Wide Surveillance Using Search Based Video
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial Recognition
 
Surveilance documents
Surveilance documentsSurveilance documents
Surveilance documents
 
1 Evaluate the role of managers in criminal justice planning and in.pdf
1 Evaluate the role of managers in criminal justice planning and in.pdf1 Evaluate the role of managers in criminal justice planning and in.pdf
1 Evaluate the role of managers in criminal justice planning and in.pdf
 
Connotation In Le Message Photographique, By Roland Barthes
Connotation In Le Message Photographique, By Roland BarthesConnotation In Le Message Photographique, By Roland Barthes
Connotation In Le Message Photographique, By Roland Barthes
 
Criminalistics DB3NameClassDatePro.docx
Criminalistics DB3NameClassDatePro.docxCriminalistics DB3NameClassDatePro.docx
Criminalistics DB3NameClassDatePro.docx
 
Using a listening device to identify direction of gunfire
Using a listening device to identify direction of gunfireUsing a listening device to identify direction of gunfire
Using a listening device to identify direction of gunfire
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primer
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
Body Cameras For Police Could Be One Smart-Step
Body Cameras For Police Could Be One Smart-StepBody Cameras For Police Could Be One Smart-Step
Body Cameras For Police Could Be One Smart-Step
 
Drones and Crime
Drones and CrimeDrones and Crime
Drones and Crime
 
Pros and cons of today
Pros and cons of todayPros and cons of today
Pros and cons of today
 
For the safer world
For the safer worldFor the safer world
For the safer world
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

Surveillance

  • 2.
  • 3. RFID (Radio Frequency Identification) tagging
  • 4.
  • 10.
  • 11.
  • 15.
  • 17. DNA
  • 19.
  • 20. An example of Computer Surveillance: Social Network Analysis Social network analysis is a type of surveillance in which a “map” is created. “These social network "maps" are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities” wiki surveillance Anything that is posted to the internet is public. Most people who use social networking sites such as Facebook, MySpace and Twitter post comments or pictures of their personal lives. Anything that is ever downloaded to the internet can be seen by anyone at any time. If you plan on having a professional career in the future I would stop posting personal comments and pictures that would make you look bad when the person who is interviewing you brings the topic up. I agree with my instructor, Mr. Grabowski, the best thing to do would be to delete any social networking site that you are currently a part of.
  • 21. An example of Audio Surveillance: Wiretap Wiretapping is pretty basic. Anyone can do it. All you need is a “listening device” and to know who it is that you are wanting to listen to. Then, you would connect the “listening device to the circuit carrying information between phones” howstuffworkswiretapping “A total of 3,194 wiretaps were authorized by federal and state courts during 2010. Only one wiretap application was denied in 2010” lawenforcementwiretapping increases
  • 22. An example of Visual Surveillance: Red Light Camera Surveillance Cities in States with Red Light Camera Surveillance Programs The ONLY automated red light camera intersection in Santa Rosa (Santa Rosa Avenue at Yolanda Avenue). “Local engineers determine the timing at traffic signals, including the length of the green, yellow, and red phases. A red light camera system is connected to a traffic signal and sensors buried in the pavement at a crosswalk or stop sign. In most cases, the system monitors the traffic signal and triggers the camera to photograph the tags of vehicles entering the intersection after the light has turned red. The camera is triggered by any vehicle passing over the sensors above a pre-set minimum speed and at a specified time after the signal has turned red” “The camera records the date, time, and speed of the vehicle, and a clear image is produced (under a wide range of light and weather conditions)”
  • 23. An example of Biometrical Surveillance: Gait (a person's manner of walking) or voice Sometimes you can tell what kind of a mood someone is in just by analyzing their body language. Professional analysts can figure out what someone is going to do before they do it based on that persons body language. “The gait of individuals checking in at an airport could…be compared with the database, perhaps even before they enter the airport concourse. Such data compared with CCTV footage might also be used to track suspect terrorists or criminals who may otherwise be disguising their features or be carrying forged documents” curebyte
  • 24. Are surveillance cameras a contributing factor to lower crime rates? The argument of whether or not video surveillance cameras are a contributing factor to lower crime rates is difficult. Some people say video surveillance cameras have helped, some people say they haven’t, and some people say they violate their constitutional rights. The truth is, it depends. It depends on the kind of person you are, where you live, and many other circumstances. If crime rates decrease as the amount of Police Officers patrolling the streets increase then, assuming that surveillance has contributed, in my opinion, would be a naïve assumption. The video surveillance cameras are purposely made to be very conspicuous. But, you cannot be certain that someone who was planning on committing a crime saw the surveillance camera, and decided not to go through with their plan. Total: 767 Year:2010 Total: 4,096 Some video surveillance cameras are just a decoy to make people think that the cameras are watching their every move. When, in reality, the cameras aren’t even active. I guess we would just have to ask the criminals who have been convicted of crimes (based on being caught on camera) if they saw the camera in the first place. Then, ask them if they would have committed the crime knowing that they were being recorded doing so.
  • 25. Greater surveillance powers for authorities Authorities have been given greater surveillance powers over the years. There are two different viewpoints that citizens share. First, some citizens share the same viewpoint as authorities. These citizens believe that in order for a safer Nation police need more power in order to outsmart the technological savvy criminals. Other citizens believe that authorities are breaking the rules of the Constitution. These citizens believe that by giving authorities such great surveillance power their civil rights are being violated in return. So, it’s really how you perceive this situation. Would you be willing to give up some of your constitutional rights in order to be more protected from terrorists and criminals? Or, do you feel as though your rights are being violated when you are under surveillance without your knowledge? It’s a give and take situation…
  • 26. Warrants An officer or any law enforcement official would need a warrant, based on probable cause, to put any law abiding citizen under any kind of surveillance if the person being surveilled has a reasonable expectation of privacy. If the person being surveilled does not have a reasonable expectation of privacy (i.e. in a public area) then a warrant is not neededeven if you are a law abiding citizen. With a warrant officers can use thermal imaging devices, video surveillance, audio surveillance, wiretaps, trap devices, tape devices, pen registers, etc. Basically, with a warrant officers can use any form of surveillance as long as they have probable cause and have stated so under oath.
  • 27. New technologies that the police are using to track criminals “Programmers are designing programs that can re-create the scene of a crime in three dimensional imagery, enabling investigators to examine every inch of the room from every angle -- down to a drop of blood -- with the movement of a mouse.” “Security camera video of a convenience store robbery -- until now, grainy and pixeled–- can be enhanced to reveal a clear picture of the bad guy’s face, even though he was standing fifty feet away.” “…Crime scene investigators are using space-aged flashlights to find traces of evidence invisible to the naked eye. A label from a grocery item, touched by a suspect in a crime would be unnoticeable until the investigator puts on special goggles with filtered lenses and shines the high-frequency colored light on it. Suddenly, a finger print appears.” crimetrackerstory There is also “…a new kind of fingerprinting method. There’s no ink. An offender simply touches a glass tray and a computer system registers his print and identity. He touches the pad again, and within one second, his picture and identifying information appear on the computer monitor. It may be the fastest way yet to track bad guys.”