SlideShare una empresa de Scribd logo
1 de 12
Surveillance By: Jennifer Howard
Different types of Surveillance Electronic Surveillance ,[object Object]
RFID (Radio Frequency Identification) tagging
Global Positioning System (GPS)Computer Surveillance ,[object Object],Facebook MySpace Twitter ,[object Object]
NarusInsight
 "Magic Lantern"
 CIPAV
 TEMPEST
 "Pinwale“
Data Mining and ProfilingEconomic Social Audio Surveillance ,[object Object],Wiretap  Bugs Multilateration  Pen Register TrapDevice  Trace Device
Different types of Surveillance Cont’d. Visual Surveillance ,[object Object]
Red Light Camera

Más contenido relacionado

La actualidad más candente

Surveillance Technology
Surveillance TechnologySurveillance Technology
Surveillance Technology
Blake Feldman
 
The positive effects of community policing
The positive effects of community policingThe positive effects of community policing
The positive effects of community policing
jvonschilling
 
Ppt chapter 2
Ppt chapter 2Ppt chapter 2
Ppt chapter 2
difordham
 
Contemporary crime reduction strategies[1]stu
Contemporary crime reduction strategies[1]stuContemporary crime reduction strategies[1]stu
Contemporary crime reduction strategies[1]stu
mattyp99
 

La actualidad más candente (20)

CSI and Evidence Collection
CSI and Evidence CollectionCSI and Evidence Collection
CSI and Evidence Collection
 
Forensic Science In Crime Investigation
Forensic Science In Crime InvestigationForensic Science In Crime Investigation
Forensic Science In Crime Investigation
 
Improving Police/Community Relations
Improving Police/Community RelationsImproving Police/Community Relations
Improving Police/Community Relations
 
Crime scene investigation
Crime scene investigationCrime scene investigation
Crime scene investigation
 
Police patrol preview
Police patrol previewPolice patrol preview
Police patrol preview
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primer
 
Surveillance Technology
Surveillance TechnologySurveillance Technology
Surveillance Technology
 
Polce organization and administration (demo presentation)
Polce organization and administration (demo presentation)Polce organization and administration (demo presentation)
Polce organization and administration (demo presentation)
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
Routine activity theory
Routine activity theoryRoutine activity theory
Routine activity theory
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
The positive effects of community policing
The positive effects of community policingThe positive effects of community policing
The positive effects of community policing
 
Police Power of Investigation
Police Power of InvestigationPolice Power of Investigation
Police Power of Investigation
 
Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1Fundamentalsof Crime Mapping 1
Fundamentalsof Crime Mapping 1
 
Ppt chapter 2
Ppt chapter 2Ppt chapter 2
Ppt chapter 2
 
Search and seizure ground rules
Search and seizure ground rulesSearch and seizure ground rules
Search and seizure ground rules
 
Pnp patrol plan_2030-guidebook
Pnp patrol plan_2030-guidebookPnp patrol plan_2030-guidebook
Pnp patrol plan_2030-guidebook
 
Survillance description
Survillance descriptionSurvillance description
Survillance description
 
Contemporary crime reduction strategies[1]stu
Contemporary crime reduction strategies[1]stuContemporary crime reduction strategies[1]stu
Contemporary crime reduction strategies[1]stu
 

Destacado (10)

Ecological study
Ecological studyEcological study
Ecological study
 
Public health surveillance
Public health surveillancePublic health surveillance
Public health surveillance
 
public health surveillance
public health surveillance public health surveillance
public health surveillance
 
Types of Surveillance Systems
Types of Surveillance Systems			Types of Surveillance Systems
Types of Surveillance Systems
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Surveillance
SurveillanceSurveillance
Surveillance
 
outbreak investigation - types of epidemics and investigating them
outbreak investigation - types of epidemics and investigating themoutbreak investigation - types of epidemics and investigating them
outbreak investigation - types of epidemics and investigating them
 
Outbreak Investigation
Outbreak InvestigationOutbreak Investigation
Outbreak Investigation
 
Outbreak – investigation & management
Outbreak – investigation & managementOutbreak – investigation & management
Outbreak – investigation & management
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Similar a Surveillance

10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
hyacinthshackley2629
 
1 Evaluate the role of managers in criminal justice planning and in.pdf
1 Evaluate the role of managers in criminal justice planning and in.pdf1 Evaluate the role of managers in criminal justice planning and in.pdf
1 Evaluate the role of managers in criminal justice planning and in.pdf
fms12345
 
Connotation In Le Message Photographique, By Roland Barthes
Connotation In Le Message Photographique, By Roland BarthesConnotation In Le Message Photographique, By Roland Barthes
Connotation In Le Message Photographique, By Roland Barthes
Amanda Reed
 
Criminalistics DB3NameClassDatePro.docx
Criminalistics DB3NameClassDatePro.docxCriminalistics DB3NameClassDatePro.docx
Criminalistics DB3NameClassDatePro.docx
faithxdunce63732
 
Using a listening device to identify direction of gunfire
Using a listening device to identify direction of gunfireUsing a listening device to identify direction of gunfire
Using a listening device to identify direction of gunfire
dplsurve
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
forensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
forensicsnation
 
Body Cameras For Police Could Be One Smart-Step
Body Cameras For Police Could Be One Smart-StepBody Cameras For Police Could Be One Smart-Step
Body Cameras For Police Could Be One Smart-Step
Brenda Thomas
 
For the safer world
For the safer worldFor the safer world
For the safer world
Tony TRAN
 

Similar a Surveillance (15)

10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
City Wide Surveillance Using Search Based Video
City Wide Surveillance Using Search Based VideoCity Wide Surveillance Using Search Based Video
City Wide Surveillance Using Search Based Video
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial Recognition
 
Surveilance documents
Surveilance documentsSurveilance documents
Surveilance documents
 
1 Evaluate the role of managers in criminal justice planning and in.pdf
1 Evaluate the role of managers in criminal justice planning and in.pdf1 Evaluate the role of managers in criminal justice planning and in.pdf
1 Evaluate the role of managers in criminal justice planning and in.pdf
 
Connotation In Le Message Photographique, By Roland Barthes
Connotation In Le Message Photographique, By Roland BarthesConnotation In Le Message Photographique, By Roland Barthes
Connotation In Le Message Photographique, By Roland Barthes
 
Criminalistics DB3NameClassDatePro.docx
Criminalistics DB3NameClassDatePro.docxCriminalistics DB3NameClassDatePro.docx
Criminalistics DB3NameClassDatePro.docx
 
Using a listening device to identify direction of gunfire
Using a listening device to identify direction of gunfireUsing a listening device to identify direction of gunfire
Using a listening device to identify direction of gunfire
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
Body Cameras For Police Could Be One Smart-Step
Body Cameras For Police Could Be One Smart-StepBody Cameras For Police Could Be One Smart-Step
Body Cameras For Police Could Be One Smart-Step
 
Drones and Crime
Drones and CrimeDrones and Crime
Drones and Crime
 
Pros and cons of today
Pros and cons of todayPros and cons of today
Pros and cons of today
 
For the safer world
For the safer worldFor the safer world
For the safer world
 

Último

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Último (20)

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Surveillance

  • 2.
  • 3. RFID (Radio Frequency Identification) tagging
  • 4.
  • 10.
  • 11.
  • 15.
  • 17. DNA
  • 19.
  • 20. An example of Computer Surveillance: Social Network Analysis Social network analysis is a type of surveillance in which a “map” is created. “These social network "maps" are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities” wiki surveillance Anything that is posted to the internet is public. Most people who use social networking sites such as Facebook, MySpace and Twitter post comments or pictures of their personal lives. Anything that is ever downloaded to the internet can be seen by anyone at any time. If you plan on having a professional career in the future I would stop posting personal comments and pictures that would make you look bad when the person who is interviewing you brings the topic up. I agree with my instructor, Mr. Grabowski, the best thing to do would be to delete any social networking site that you are currently a part of.
  • 21. An example of Audio Surveillance: Wiretap Wiretapping is pretty basic. Anyone can do it. All you need is a “listening device” and to know who it is that you are wanting to listen to. Then, you would connect the “listening device to the circuit carrying information between phones” howstuffworkswiretapping “A total of 3,194 wiretaps were authorized by federal and state courts during 2010. Only one wiretap application was denied in 2010” lawenforcementwiretapping increases
  • 22. An example of Visual Surveillance: Red Light Camera Surveillance Cities in States with Red Light Camera Surveillance Programs The ONLY automated red light camera intersection in Santa Rosa (Santa Rosa Avenue at Yolanda Avenue). “Local engineers determine the timing at traffic signals, including the length of the green, yellow, and red phases. A red light camera system is connected to a traffic signal and sensors buried in the pavement at a crosswalk or stop sign. In most cases, the system monitors the traffic signal and triggers the camera to photograph the tags of vehicles entering the intersection after the light has turned red. The camera is triggered by any vehicle passing over the sensors above a pre-set minimum speed and at a specified time after the signal has turned red” “The camera records the date, time, and speed of the vehicle, and a clear image is produced (under a wide range of light and weather conditions)”
  • 23. An example of Biometrical Surveillance: Gait (a person's manner of walking) or voice Sometimes you can tell what kind of a mood someone is in just by analyzing their body language. Professional analysts can figure out what someone is going to do before they do it based on that persons body language. “The gait of individuals checking in at an airport could…be compared with the database, perhaps even before they enter the airport concourse. Such data compared with CCTV footage might also be used to track suspect terrorists or criminals who may otherwise be disguising their features or be carrying forged documents” curebyte
  • 24. Are surveillance cameras a contributing factor to lower crime rates? The argument of whether or not video surveillance cameras are a contributing factor to lower crime rates is difficult. Some people say video surveillance cameras have helped, some people say they haven’t, and some people say they violate their constitutional rights. The truth is, it depends. It depends on the kind of person you are, where you live, and many other circumstances. If crime rates decrease as the amount of Police Officers patrolling the streets increase then, assuming that surveillance has contributed, in my opinion, would be a naïve assumption. The video surveillance cameras are purposely made to be very conspicuous. But, you cannot be certain that someone who was planning on committing a crime saw the surveillance camera, and decided not to go through with their plan. Total: 767 Year:2010 Total: 4,096 Some video surveillance cameras are just a decoy to make people think that the cameras are watching their every move. When, in reality, the cameras aren’t even active. I guess we would just have to ask the criminals who have been convicted of crimes (based on being caught on camera) if they saw the camera in the first place. Then, ask them if they would have committed the crime knowing that they were being recorded doing so.
  • 25. Greater surveillance powers for authorities Authorities have been given greater surveillance powers over the years. There are two different viewpoints that citizens share. First, some citizens share the same viewpoint as authorities. These citizens believe that in order for a safer Nation police need more power in order to outsmart the technological savvy criminals. Other citizens believe that authorities are breaking the rules of the Constitution. These citizens believe that by giving authorities such great surveillance power their civil rights are being violated in return. So, it’s really how you perceive this situation. Would you be willing to give up some of your constitutional rights in order to be more protected from terrorists and criminals? Or, do you feel as though your rights are being violated when you are under surveillance without your knowledge? It’s a give and take situation…
  • 26. Warrants An officer or any law enforcement official would need a warrant, based on probable cause, to put any law abiding citizen under any kind of surveillance if the person being surveilled has a reasonable expectation of privacy. If the person being surveilled does not have a reasonable expectation of privacy (i.e. in a public area) then a warrant is not neededeven if you are a law abiding citizen. With a warrant officers can use thermal imaging devices, video surveillance, audio surveillance, wiretaps, trap devices, tape devices, pen registers, etc. Basically, with a warrant officers can use any form of surveillance as long as they have probable cause and have stated so under oath.
  • 27. New technologies that the police are using to track criminals “Programmers are designing programs that can re-create the scene of a crime in three dimensional imagery, enabling investigators to examine every inch of the room from every angle -- down to a drop of blood -- with the movement of a mouse.” “Security camera video of a convenience store robbery -- until now, grainy and pixeled–- can be enhanced to reveal a clear picture of the bad guy’s face, even though he was standing fifty feet away.” “…Crime scene investigators are using space-aged flashlights to find traces of evidence invisible to the naked eye. A label from a grocery item, touched by a suspect in a crime would be unnoticeable until the investigator puts on special goggles with filtered lenses and shines the high-frequency colored light on it. Suddenly, a finger print appears.” crimetrackerstory There is also “…a new kind of fingerprinting method. There’s no ink. An offender simply touches a glass tray and a computer system registers his print and identity. He touches the pad again, and within one second, his picture and identifying information appear on the computer monitor. It may be the fastest way yet to track bad guys.”