SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2604
Importance of Electronic Surveillance in Criminal Investigation
Utkarsha Ulhas Mirasdar1, Sumit Lalji Gupta2
12Student,Dept. of MCA, Bharati Vidyapeeth’s Institute of Management and Information
Technology,Maharashtra,India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The overall aim of this paper is to survey the
number of crimes happening in India and in other countries.
What exactly is the problem with India and the solutions has
been suggested. Basically the paper gives idea how the other
countries reduces numberofcrimesbyusing variouselectronic
surveillance. This paper describes what exactly electronic
surveillance is and the types of Electronic Surveillance in
Criminal Investigation.
Key Words: Surveillance, Cellular Device, device,
Electronic Surveillance, passive, active,cellphones.
1. INTRODUCTION
Electronic surveillance way of monitoring a home,
business or individual. Electronic surveillance is done
through computer or mobile phone. Mobile phone
surveillance is an important tool. Geographical location
tracks the location for finding where the subject is. Mobile
phone surveillance helps in a way that its text messages and
phone records can be used as evidence in the court. It is
actually use to stop or prevent crime and helps to keep
citizens safe. Computer and Phone Surveillance used for
investigation by providing personal or location data. Many
banks, business and companies are under surveillance to
keep companies and customers safe. Surveillance means
close observation of a person or a group especially the one
who are under suspicion or the act of observing or the
condition of being observed. Newly added surveillance
technologies are Internet Surveillance, CCTV Surveillance,
Telephone and Email Id Surveillance.
1.1 Types of Electronic Surveillance in Criminal
Investigations [2]
1.Electronic Monitoring
2.Fixed Surveillance
3.Stationary Technical Surveillance
4.Three Person Surveillance
5.UnderCover Operations
1. Electronic Monitoring: Electronic Monitoring refers to
email, fax, telephoneandinternetcommunication.According
to US Government Electronic Monitoring requires court
order. Criminal Justice Agencies can monitor an individual
location and alerted to any unauthorized movements. Three
Reasons why and where Electronic Monitoring is used:[3]
i.Detention: Detention also called as House Arrest/Home
Confinement.[3] It is like Prison time. It is confined by the
authorities to a certain residence. It is applied to criminal
cases where prison is not appropriate measure. The person
under detention is not allowedtocommunicate withanyone.
If communication happens it is directly monitored.
ii.Restriction: Individual does not enter in prohibited areas.
iii.Surveillance: Surveillance where Electronic Monitoring
use to keep surveillance on people without actually
restricting their movements.
2. Fixed Surveillance: Fixed Surveillance or stakeout
meaning Period of surveillance. Requires police officers to
observe secretively people and places from distance.
According to criminal justice Officer-Michael PalmiottoTwo
Person Approach considered more desirable. Two Person
Approach: It helps toswitchpositionsperiodicallysosuspect
cannot doubt on them. The subject is stationary. Surveillant
may move around for closer observations as they have to
maintain proper surveillance. It should be well-planned.
3. Stationary Technical Surveillance: The recording
equipment and camera is placed in parked car by the
investigator. Vehicle present in an area where lot of
attention can be gained such as parking lot. Sometimes also
called as Unmanned Surveillance.
4.Three-Person Surveillance: It is difficult but provide
advantages. Officers can frequently changethepositionsand
reduces the chances of detection. The technique use is ABC
Method: Person A is behind the suspect and then the second
officer Person B and Person C is to opposite side always
ahead or behind the suspect. It is complex technique but
effective.
5.UnderCover Operations:[3] In this officer plays active role
in revealing the criminal activities. To go undercover it is
needed to hide ones identity for the purpose of gaining the
trust of targeted individuals in order to gather information
or evidence.
2. Literature Survey
India is facing many problems relating to criminal
Investigation. As crimes is going on increasing day by day.
There are many problems because of which it is difficult to
stop the crime. The first problem is number and quality of
police force varies from state to state. Training of police
restricted to simple policing and not exposed to modern
technologies. Method and datacrimecontentrecordedvaries
from state to state this can be another problem. The criminal
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2605
cases such as of robbing , rape is increasing day by day. The
robbery cases are so much that the thief cannot be able to
track due to lack of technology. Many cases gets closed. This
small case is nothing but even the big criminal cases like
murder because of lack of investigation and evidence the
cases gets closed.
Solution: The first solution could be criminal profiling[4]and
data is to keep detailed records. The person who is brought
into police station as a suspect should be fully body scanned.
Keep all his data recorded such as bone structure, facial,
dental profile, iris scan, fingerprint, DNA profile. Today
software surveillance is done through camera located at
public places. Data captured on basis of bone structure and
facial recognition software. So if criminal or terroristpassing
through any public area we can pick them from the crowd of
real world.
National Security Agency (NSA) of United States used this
technique widely. But data should be pass to every agency.
From the USA TODAY it is known that the USA Policesecretly
track cellphones to solve routine crimes. The technique used
is Stingray:
2.1 Technique-Stingray
Stingray: A suitcase size device act as a take cell tower.
System installed in the vehicle so that, it can be moved
anywhere tricks all nearby phones into connecting to it and
feeding data to police. The Stingray is an IMSI-catcher with
both passive (digitalanalyzer) andactive(cellsitesimulator)
capabilities. [1]
Fig -1: Stingray
2.2 How Stingray Cellphone tracking device works
Fig -2: Stingray Technique
Device used in vehicle along with a computer with mapping
software. It detects cellphone tower and gets target phoneto
connect to it. Once phone is detected a phone signal strength
is measured. Vehicle then move toanotherlocationandagain
measures the signal strength. By getting signal strength the
system can map a phone location.
3. Methodology
How it works: Stingray equipment operate on both passive
and active mode.It works like wireless carrier cell tower.
This system is typically fit in a vehicle so that agents can
move in any place. It tracks all devices and it access using
law enforcement.[5]
Fig -3: How Stingray Works
Sample papragraphDefine abbreviations and acronyms the
first time they are used in the text, even after they have been
defined in the abstract. Abbreviations such as IEEE, SI, MKS,
CGS, sc, dc, and rms do not have to be defined. Do not use
abbreviations in the title or heads unless they are
unavoidable.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2606
The modes are explained below:
A. Passive mode A StingRay that works in passive mode
receive and analyze signals which is given by mobiledevices
and cell stations.Passive word itself explains that it does not
directly communicate with mobile devices. It extracts
information such as identification numbers, signal strength,
and signal coverage areas.It works like mobile phones.[5]
B.Active mode: StingRay working in active mode will force
each device in a predetermined area to disconnect from its
legitimate service provider cell site and help to build a new
connection with the attackers StingRay system.[5]
4. CONCLUSIONS
India has no choice but to learn and implement different
strategies if it were to seriously want crime prevention and
crime control. Data collection, availability and access is the
first tool in this battle. The second is to bring new
technologies like used in US and UK. This can help India to
reduce the number of crimes. So it should use new andlatest
surveillance technologies.
REFERENCES
[1] https://en.wikipedia.org/wiki/Stingray_phone_tracker
[2] http://work.chron.com/types-surveillance-criminal-
investigations- 9434.html [
[3] Matt Black and Russell G. Smith, May 2003, Electronic
Monitoring in the Criminal Justice System,AUSTRALIAN
INSTITUTEOFCRIMINOLOGY,trendsandissuesincrime
and criminal justice , http://www.aic.gov.au/media
library/publications/tandipdf/tandi254.pdf(viewed26
March 2017).
[4] http://www.mapsofindia.com/my-
india/government/problems-andsolutions-in-crime-
investigation-in-todays-india
[5] http://resources.infosecinstitute.com/stingray-
technology-governmenttracks-cellular-devices/gref

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
 
Data Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile SystemsData Mining For Intrusion Detection in Mobile Systems
Data Mining For Intrusion Detection in Mobile Systems
 
Irjet v7 i4693
Irjet v7 i4693Irjet v7 i4693
Irjet v7 i4693
 
IRJET- End to End Message Encryption using Biometrics
IRJET-  	  End to End Message Encryption using BiometricsIRJET-  	  End to End Message Encryption using Biometrics
IRJET- End to End Message Encryption using Biometrics
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
A survey on security measures implemented to detect burglary at the atm
A survey on security measures implemented to detect burglary at the atmA survey on security measures implemented to detect burglary at the atm
A survey on security measures implemented to detect burglary at the atm
 
Security Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesSecurity Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile Devices
 
I am secure android application
I am secure android applicationI am secure android application
I am secure android application
 
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesDetection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phones
 
Purushottam Sharma
Purushottam SharmaPurushottam Sharma
Purushottam Sharma
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - Testbytes
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - Testbytes
 
KawalPilpres2019: a highly secured real count voting escort architecture
KawalPilpres2019: a highly secured real count voting escort architectureKawalPilpres2019: a highly secured real count voting escort architecture
KawalPilpres2019: a highly secured real count voting escort architecture
 
Color Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnologyColor Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnology
 

Similar a Importance of Electronic Surveillance in Criminal Investigation

Similar a Importance of Electronic Surveillance in Criminal Investigation (20)

Real-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video SurveillanceReal-time Anomaly Detection and Alert System for Video Surveillance
Real-time Anomaly Detection and Alert System for Video Surveillance
 
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET-  	  Enhance Smart Cities Security by Mitigating IoT VulnerabilitiesIRJET-  	  Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
 
Cyber Investigation Portal
Cyber Investigation PortalCyber Investigation Portal
Cyber Investigation Portal
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection System
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
 
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of ThingIRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of Thing
 
Crime Record Management system with React Native and Google Cloud Services(Be...
Crime Record Management system with React Native and Google Cloud Services(Be...Crime Record Management system with React Native and Google Cloud Services(Be...
Crime Record Management system with React Native and Google Cloud Services(Be...
 
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatformsA Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
A Cohesive and Semantic Consistency of for Bot Attack on IoT and IIoTPlatforms
 
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural NetworksIRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
 
CYBER CRIMES IN INDIA
CYBER CRIMES IN INDIACYBER CRIMES IN INDIA
CYBER CRIMES IN INDIA
 
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft SystemIRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft System
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 
IRJET- A Survey on Vehicle Security System using IoT
IRJET- A Survey on Vehicle Security System using IoTIRJET- A Survey on Vehicle Security System using IoT
IRJET- A Survey on Vehicle Security System using IoT
 
IRJET - Review Paper on Identification of Theft using Xbox 360 in ML
IRJET - Review Paper on Identification of Theft using Xbox 360 in MLIRJET - Review Paper on Identification of Theft using Xbox 360 in ML
IRJET - Review Paper on Identification of Theft using Xbox 360 in ML
 
IRJET - Smart License Generation in RTO
IRJET - Smart License Generation in RTOIRJET - Smart License Generation in RTO
IRJET - Smart License Generation in RTO
 
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing ReviewIRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
 

Más de IRJET Journal

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Último (20)

CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 

Importance of Electronic Surveillance in Criminal Investigation

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2604 Importance of Electronic Surveillance in Criminal Investigation Utkarsha Ulhas Mirasdar1, Sumit Lalji Gupta2 12Student,Dept. of MCA, Bharati Vidyapeeth’s Institute of Management and Information Technology,Maharashtra,India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The overall aim of this paper is to survey the number of crimes happening in India and in other countries. What exactly is the problem with India and the solutions has been suggested. Basically the paper gives idea how the other countries reduces numberofcrimesbyusing variouselectronic surveillance. This paper describes what exactly electronic surveillance is and the types of Electronic Surveillance in Criminal Investigation. Key Words: Surveillance, Cellular Device, device, Electronic Surveillance, passive, active,cellphones. 1. INTRODUCTION Electronic surveillance way of monitoring a home, business or individual. Electronic surveillance is done through computer or mobile phone. Mobile phone surveillance is an important tool. Geographical location tracks the location for finding where the subject is. Mobile phone surveillance helps in a way that its text messages and phone records can be used as evidence in the court. It is actually use to stop or prevent crime and helps to keep citizens safe. Computer and Phone Surveillance used for investigation by providing personal or location data. Many banks, business and companies are under surveillance to keep companies and customers safe. Surveillance means close observation of a person or a group especially the one who are under suspicion or the act of observing or the condition of being observed. Newly added surveillance technologies are Internet Surveillance, CCTV Surveillance, Telephone and Email Id Surveillance. 1.1 Types of Electronic Surveillance in Criminal Investigations [2] 1.Electronic Monitoring 2.Fixed Surveillance 3.Stationary Technical Surveillance 4.Three Person Surveillance 5.UnderCover Operations 1. Electronic Monitoring: Electronic Monitoring refers to email, fax, telephoneandinternetcommunication.According to US Government Electronic Monitoring requires court order. Criminal Justice Agencies can monitor an individual location and alerted to any unauthorized movements. Three Reasons why and where Electronic Monitoring is used:[3] i.Detention: Detention also called as House Arrest/Home Confinement.[3] It is like Prison time. It is confined by the authorities to a certain residence. It is applied to criminal cases where prison is not appropriate measure. The person under detention is not allowedtocommunicate withanyone. If communication happens it is directly monitored. ii.Restriction: Individual does not enter in prohibited areas. iii.Surveillance: Surveillance where Electronic Monitoring use to keep surveillance on people without actually restricting their movements. 2. Fixed Surveillance: Fixed Surveillance or stakeout meaning Period of surveillance. Requires police officers to observe secretively people and places from distance. According to criminal justice Officer-Michael PalmiottoTwo Person Approach considered more desirable. Two Person Approach: It helps toswitchpositionsperiodicallysosuspect cannot doubt on them. The subject is stationary. Surveillant may move around for closer observations as they have to maintain proper surveillance. It should be well-planned. 3. Stationary Technical Surveillance: The recording equipment and camera is placed in parked car by the investigator. Vehicle present in an area where lot of attention can be gained such as parking lot. Sometimes also called as Unmanned Surveillance. 4.Three-Person Surveillance: It is difficult but provide advantages. Officers can frequently changethepositionsand reduces the chances of detection. The technique use is ABC Method: Person A is behind the suspect and then the second officer Person B and Person C is to opposite side always ahead or behind the suspect. It is complex technique but effective. 5.UnderCover Operations:[3] In this officer plays active role in revealing the criminal activities. To go undercover it is needed to hide ones identity for the purpose of gaining the trust of targeted individuals in order to gather information or evidence. 2. Literature Survey India is facing many problems relating to criminal Investigation. As crimes is going on increasing day by day. There are many problems because of which it is difficult to stop the crime. The first problem is number and quality of police force varies from state to state. Training of police restricted to simple policing and not exposed to modern technologies. Method and datacrimecontentrecordedvaries from state to state this can be another problem. The criminal
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2605 cases such as of robbing , rape is increasing day by day. The robbery cases are so much that the thief cannot be able to track due to lack of technology. Many cases gets closed. This small case is nothing but even the big criminal cases like murder because of lack of investigation and evidence the cases gets closed. Solution: The first solution could be criminal profiling[4]and data is to keep detailed records. The person who is brought into police station as a suspect should be fully body scanned. Keep all his data recorded such as bone structure, facial, dental profile, iris scan, fingerprint, DNA profile. Today software surveillance is done through camera located at public places. Data captured on basis of bone structure and facial recognition software. So if criminal or terroristpassing through any public area we can pick them from the crowd of real world. National Security Agency (NSA) of United States used this technique widely. But data should be pass to every agency. From the USA TODAY it is known that the USA Policesecretly track cellphones to solve routine crimes. The technique used is Stingray: 2.1 Technique-Stingray Stingray: A suitcase size device act as a take cell tower. System installed in the vehicle so that, it can be moved anywhere tricks all nearby phones into connecting to it and feeding data to police. The Stingray is an IMSI-catcher with both passive (digitalanalyzer) andactive(cellsitesimulator) capabilities. [1] Fig -1: Stingray 2.2 How Stingray Cellphone tracking device works Fig -2: Stingray Technique Device used in vehicle along with a computer with mapping software. It detects cellphone tower and gets target phoneto connect to it. Once phone is detected a phone signal strength is measured. Vehicle then move toanotherlocationandagain measures the signal strength. By getting signal strength the system can map a phone location. 3. Methodology How it works: Stingray equipment operate on both passive and active mode.It works like wireless carrier cell tower. This system is typically fit in a vehicle so that agents can move in any place. It tracks all devices and it access using law enforcement.[5] Fig -3: How Stingray Works Sample papragraphDefine abbreviations and acronyms the first time they are used in the text, even after they have been defined in the abstract. Abbreviations such as IEEE, SI, MKS, CGS, sc, dc, and rms do not have to be defined. Do not use abbreviations in the title or heads unless they are unavoidable.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2606 The modes are explained below: A. Passive mode A StingRay that works in passive mode receive and analyze signals which is given by mobiledevices and cell stations.Passive word itself explains that it does not directly communicate with mobile devices. It extracts information such as identification numbers, signal strength, and signal coverage areas.It works like mobile phones.[5] B.Active mode: StingRay working in active mode will force each device in a predetermined area to disconnect from its legitimate service provider cell site and help to build a new connection with the attackers StingRay system.[5] 4. CONCLUSIONS India has no choice but to learn and implement different strategies if it were to seriously want crime prevention and crime control. Data collection, availability and access is the first tool in this battle. The second is to bring new technologies like used in US and UK. This can help India to reduce the number of crimes. So it should use new andlatest surveillance technologies. REFERENCES [1] https://en.wikipedia.org/wiki/Stingray_phone_tracker [2] http://work.chron.com/types-surveillance-criminal- investigations- 9434.html [ [3] Matt Black and Russell G. Smith, May 2003, Electronic Monitoring in the Criminal Justice System,AUSTRALIAN INSTITUTEOFCRIMINOLOGY,trendsandissuesincrime and criminal justice , http://www.aic.gov.au/media library/publications/tandipdf/tandi254.pdf(viewed26 March 2017). [4] http://www.mapsofindia.com/my- india/government/problems-andsolutions-in-crime- investigation-in-todays-india [5] http://resources.infosecinstitute.com/stingray- technology-governmenttracks-cellular-devices/gref