SlideShare a Scribd company logo
1 of 39
PRESENTED BY GURURAJ KULKARNI
GUEST FACULY KARNATAKA POLICE
TRAINING COLLEGE GULBARGA
SURVILLANCE DESCRIPTION
 Surveillance is the monitoring of behavior, activities,
or other changing information for the purpose of
influencing, managing, directing, or protecting people.
 This can include observation from a distance by
means of electronic equipment (such as closed-circuit
television (CCTV) cameras)or interception of
electronically transmitted information (such as Internet
traffic or phone calls).
 It can also include simple no- or relatively low-
technology methods such as human intelligence
agents and postal interception.
Meaning of Survillance
 The word surveillance comes from a French phrase
for "watching over" (surmeans "from above"
and veiller means "to watch") and is in contrast to
more recent developments such as sousveillance.
 Surveillance is used by governments for intelligence
gathering, prevention of crime, the protection of a
process, person, group or object, or the investigation
of crime.
 It is also used by criminal organisations to plan and
commit crimes, such as robbery and kidnapping, by
businesses to gather intelligence.
TYPES OF SURVILLANCE
 1. Computer surveillance
 2 Phone surveillance and Lawful interception.
 3. Closed-circuit television.
 4. Social network analysis.
 5. Biometrics.
 6. Aerial Survillance.
 7. Data mining and profiling.
 8. Data mining and profiling
 9. Corporate.
 10. Business Intelligence
 11. Intra-Corporate Surveillance
 12. Human operatives
 13. Satellite imagery
 14. Identification and credentials
 15. RFID and geolocation devices
 16. Global Positioning System
 17. Mobile phones
 18. Human microchips
 19. Devices
 20. Postal services
 21. Stakeout
COMPUTER SURVILLANCE
The vast majority of computer surveillance involves
the monitoring of data and traffic on the Internet.
All phone calls and broadband Internet traffic
(emails, web traffic, instant messaging, etc.) are
required to be available for unimpeded real-time
monitoring by LAW ENFORCEMENT AGENCY.
DATA MINING
 Data mining is the process of discovering
patterns in large data sets involving methods at
the intersection of machine learning, statistics,
and database systems.
 There is far too much data on the Internet for
human investigators to manually search through
all of it.
 Therefore, automated Internet surveillance
computers sift through the vast amount of
intercepted Internet traffic to identify and report to
human investigators the traffic that is considered
interesting or suspicious.
 Computers can be a surveillance target because
of the personal data stored on them. If someone
is able to install software, such as the FBI's Magic
Lantern and CIPAV, on a computer system, they
can easily gain unauthorized access to this data.
 Another form of computer surveillance, known
as van Eck phreaking, involves reading
electromagnetic emanations from computing
devices in order to extract data from them at
distances of hundreds of meters.
Phone surveillance and Lawful
interception
 It is the most useful surveillance method.
 The taping of telephones and collect the
information.
CAMERAS
Closed-circuit television
 Surveillance cameras are video cameras used for
the purpose of observing an area. They are often
connected to a recording device or IP network,
and may be watched by a security guard or law
enforcement officer
 Cameras and recording equipment used to be
relatively expensive and required human
personnel to monitor camera footage, but
analysis of footage has been made easier by
automated software that organizes digital video
footage into a searchable database, and by video
analysis software (such as VIRAT and HumanID).
 The amount of footage is also drastically reduced
by motion sensors which only record when motion
is detected.
Social network analysis
 One common form of surveillance is to create
maps of social networks based on data
from social networking sites such
as Facebook, MySpace, Twitter as well as
from traffic analysis information from phone call
records such as those in the NSA call
database,and others.
 These social network“ maps" are then data
mined to extract useful information such as
personal interests, friendships & affiliations,
wants, beliefs, thoughts, and activities
Biometric
 Biometric surveillance is a technology that
measures and analyzes human physical and/or
behavioral characteristics for authentication,
identification, or screening purposes.
 Examples of physical characteristics include
fingerprints, DNA, and facial patterns. Examples
of mostly behavioral characteristics include gait (a
person's manner of walking) or voice.
 Facial Recognisation is the use of the unique
configuration of a person's facial features to
accurately identify them, usually from surveillance
video.
FACE RECOGNISATION
MACHINE
Surveillance aircraft Micro Air Vehicle
with attached surveillance camera.
 Aerial surveillance is the gathering of
surveillance, usually visual imagery or video, from
an airborne vehicle—such as an unmanned aerial
vehicle, helicopter, or spy plane.
 Military surveillance aircraft use a range of
sensors (e.g. radar) to monitor the battlefield.
Corporate
 Corporate surveillance is the monitoring of a
person or group's behavior by a corporation. The
data collected is most often used for marketing
purposes or sold to other corporations, but is also
regularly shared with government agencies.
 It can be used as a form of business intelligence.
Human operatives
 Organizations that have enemies who wish to
gather information about the groups' members or
activities face the issue of infiltration.
 In addition to operatives' infiltrating an
organization, the surveilling party may exert
pressure on certain members of the target
organization to act as informants.
Identification and credentials
 One of the simplest forms of identification is the
carrying of credentials. Some nations have
an identity card system to aid identification, whilst
others are considering it but face public
opposition. Other documents, such as passports,
driver's licenses, library cards, banking or credit
cards are also used to verify identity.
RFID and geolocation devices
 RFID tagging:
 Hand with planned insertion point for Verichip device
 Radio Frequency Identification (RFID) tagging is the use of
very small electronic devices (called "RFID tags") which
are applied to or incorporated into a product, animal, or
person for the purpose of identification and tracking using
radio waves. The tags can be read from several meters
away. They are extremely inexpensive, costing a few cents
per piece, so they can be inserted into many types of
everyday products without significantly increasing the
price, and can be used to track and identify these objects
for a variety of purposes.
Satellite imagery
 The satellites and aircraft sensors will be able to
penetrate cloud cover, detect chemical traces,
and identify objects in buildings and "underground
bunkers", and will provide real-time video at much
higher resolutions than the still-images produced
by programs such as Google Earth.
Global Positioning System
 Several cities are running pilot projects to require
parolees to wear GPS devices to track their
movements when they get out of prison.
 Mobile phones are also commonly used to collect
geolocation data. The geographical location of a
mobile phone (and thus the person carrying it)
can be determined easily (whether it is being
used or not), using a technique
known multilateration to calculate the differences
in time for a signal to travel from the cell phone to
each of several cell towers near the owner of the
phone.
Human microchips
 Microchip implant (human):
 A human microchip implant is an identifying
integrated circuit device or RFID transponder
encased in silicate glass and implanted in the
body of a human being. A sub dermal implant
typically contains a unique ID number that can be
linked to information contained in an external
database, such as personal identification, medical
history, medications, allergies, and contact
information.
Devices
 Covert listening devices and video devices, or
"bugs", are hidden electronic devices which are
used to capture, record, and/or transmit data to a
receiving party such as a law enforcement
agency.
Stakeout
 A stakeout is the coordinated surveillance of a
location or person. Stakeouts are generally
performed covertly and for the purpose of
gathering evidence related to criminal activity.
The term derives from the practice by land
surveyors of using survey stakes to measure out
an area before the main building project is
commenced.
Postal services
 As more people use faxes and e-mail the
significance of surveilling the postal system is
decreasing, in favor of Internet and telephone
surveillance. But interception of post is still an
available option for law enforcement and
intelligence agencies, in certain circumstances
TYPES OF SURVEILLANCE TECHNIQUES

More Related Content

What's hot

Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic pptSuchita Rawat
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensicsnoorashams
 
Crime scene investigation lecture
Crime scene investigation  lectureCrime scene investigation  lecture
Crime scene investigation lectureSaurabh Bhargava
 
Crime scenes presentation
Crime scenes presentationCrime scenes presentation
Crime scenes presentationMaria Donohue
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - NotesKranthi
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
Crime scene management
Crime scene managementCrime scene management
Crime scene managementHafeez Bhutta
 
Types of Crime Scenes
Types of Crime ScenesTypes of Crime Scenes
Types of Crime ScenesDon Caeiro
 
Admissibility of forensic evidence in the court of law
Admissibility of forensic evidence in the court of lawAdmissibility of forensic evidence in the court of law
Admissibility of forensic evidence in the court of lawRajshree Sable
 
Crime scene preservation
Crime scene preservationCrime scene preservation
Crime scene preservationgillyann
 
Criminal Law - Indian Evidence Act
Criminal Law - Indian Evidence ActCriminal Law - Indian Evidence Act
Criminal Law - Indian Evidence Actjeremiah_justus
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 

What's hot (20)

Crime scene investigation
Crime scene investigationCrime scene investigation
Crime scene investigation
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Csi ppt
Csi  pptCsi  ppt
Csi ppt
 
Crime Scene DOCUMENTATION
Crime Scene DOCUMENTATION Crime Scene DOCUMENTATION
Crime Scene DOCUMENTATION
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
Crime scene investigation lecture
Crime scene investigation  lectureCrime scene investigation  lecture
Crime scene investigation lecture
 
Crime scenes presentation
Crime scenes presentationCrime scenes presentation
Crime scenes presentation
 
04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes04 Evidence Collection and Data Seizure - Notes
04 Evidence Collection and Data Seizure - Notes
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Crime scene management
Crime scene managementCrime scene management
Crime scene management
 
Forensic Ballistics
Forensic BallisticsForensic Ballistics
Forensic Ballistics
 
Types of Crime Scenes
Types of Crime ScenesTypes of Crime Scenes
Types of Crime Scenes
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Admissibility of forensic evidence in the court of law
Admissibility of forensic evidence in the court of lawAdmissibility of forensic evidence in the court of law
Admissibility of forensic evidence in the court of law
 
Crime scene preservation
Crime scene preservationCrime scene preservation
Crime scene preservation
 
Criminal Law - Indian Evidence Act
Criminal Law - Indian Evidence ActCriminal Law - Indian Evidence Act
Criminal Law - Indian Evidence Act
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 

Similar to TYPES OF SURVEILLANCE TECHNIQUES

EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...
EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...
EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...London Metropolitan - UK
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensicsijtsrd
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance SocietyKaren Moxley
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholderskevinwetzel
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile applicationAlexander Decker
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxrichardnorman90310
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing rightblogzilla
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & CyberPaul Andrews
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1ehab_madda
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptYäsh Chaudhary
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
 
Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptxAlAsad4
 

Similar to TYPES OF SURVEILLANCE TECHNIQUES (20)

Surveillance
SurveillanceSurveillance
Surveillance
 
EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...
EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...
EC-Council University (Cyber Talks) - THE BIGGEST CYBER HAWK AND PRYING EYE T...
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholders
 
Surveillance Software.docx
Surveillance Software.docxSurveillance Software.docx
Surveillance Software.docx
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
 
ContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docxContentsMobile Forensic3Introduction3What It Is3How I.docx
ContentsMobile Forensic3Introduction3What It Is3How I.docx
 
Getting the social side of pervasive computing right
Getting the social side of pervasive computing rightGetting the social side of pervasive computing right
Getting the social side of pervasive computing right
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
 
Surveillance
SurveillanceSurveillance
Surveillance
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
Cyber crime - and digital device.pptx
Cyber crime - and digital device.pptxCyber crime - and digital device.pptx
Cyber crime - and digital device.pptx
 

More from gururaj lulkarni

Stress management practical classes
Stress management practical classesStress management practical classes
Stress management practical classesgururaj lulkarni
 
Principles of crowd control
Principles of crowd controlPrinciples of crowd control
Principles of crowd controlgururaj lulkarni
 
Dying declaration a critical study
Dying declaration a critical studyDying declaration a critical study
Dying declaration a critical studygururaj lulkarni
 
Narcotic drugs types, properties and effects
Narcotic drugs types,  properties and effectsNarcotic drugs types,  properties and effects
Narcotic drugs types, properties and effectsgururaj lulkarni
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and historygururaj lulkarni
 
ಒತ್ತಡ ನಿರ್ವಹಣಾ ತಂತ್ರಗಳು
ಒತ್ತಡ ನಿರ್ವಹಣಾ ತಂತ್ರಗಳುಒತ್ತಡ ನಿರ್ವಹಣಾ ತಂತ್ರಗಳು
ಒತ್ತಡ ನಿರ್ವಹಣಾ ತಂತ್ರಗಳುgururaj lulkarni
 
Stress management presented by gururaj
Stress management presented by gururajStress management presented by gururaj
Stress management presented by gururajgururaj lulkarni
 
Departmental inquiries (enforcement of attendance of witness
Departmental inquiries (enforcement of attendance of witnessDepartmental inquiries (enforcement of attendance of witness
Departmental inquiries (enforcement of attendance of witnessgururaj lulkarni
 
Stress management presented by gururaj
Stress management presented by gururajStress management presented by gururaj
Stress management presented by gururajgururaj lulkarni
 
Narcotic drugs and psychotropic substance act 1985
Narcotic drugs and psychotropic substance act 1985Narcotic drugs and psychotropic substance act 1985
Narcotic drugs and psychotropic substance act 1985gururaj lulkarni
 
ಗುಂಪು ಚಾಲಕ ಮತ್ತು ತಂಡ ರಚನೆ ತಯಾರಿಸಿದವರು ಮತ್ತು ಪ್ರಸ್ತುತಪಡಿಸಿದವರು ಶ್ರೀ.ಗುರುರಾಜ ಕ...
ಗುಂಪು ಚಾಲಕ ಮತ್ತು ತಂಡ ರಚನೆ ತಯಾರಿಸಿದವರು ಮತ್ತು ಪ್ರಸ್ತುತಪಡಿಸಿದವರು  ಶ್ರೀ.ಗುರುರಾಜ ಕ...ಗುಂಪು ಚಾಲಕ ಮತ್ತು ತಂಡ ರಚನೆ ತಯಾರಿಸಿದವರು ಮತ್ತು ಪ್ರಸ್ತುತಪಡಿಸಿದವರು  ಶ್ರೀ.ಗುರುರಾಜ ಕ...
ಗುಂಪು ಚಾಲಕ ಮತ್ತು ತಂಡ ರಚನೆ ತಯಾರಿಸಿದವರು ಮತ್ತು ಪ್ರಸ್ತುತಪಡಿಸಿದವರು ಶ್ರೀ.ಗುರುರಾಜ ಕ...gururaj lulkarni
 

More from gururaj lulkarni (19)

Maritime law
Maritime lawMaritime law
Maritime law
 
Stress management practical classes
Stress management practical classesStress management practical classes
Stress management practical classes
 
Parole in india
Parole in indiaParole in india
Parole in india
 
Principles of crowd control
Principles of crowd controlPrinciples of crowd control
Principles of crowd control
 
Confession an analysis
Confession an analysisConfession an analysis
Confession an analysis
 
Psychosis and neurosis.2
Psychosis and neurosis.2Psychosis and neurosis.2
Psychosis and neurosis.2
 
Dying declaration a critical study
Dying declaration a critical studyDying declaration a critical study
Dying declaration a critical study
 
Personality development
Personality developmentPersonality development
Personality development
 
Narcotic drugs types, properties and effects
Narcotic drugs types,  properties and effectsNarcotic drugs types,  properties and effects
Narcotic drugs types, properties and effects
 
Pocso rules 2012
Pocso rules 2012Pocso rules 2012
Pocso rules 2012
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Crowd management
Crowd managementCrowd management
Crowd management
 
ಒತ್ತಡ ನಿರ್ವಹಣಾ ತಂತ್ರಗಳು
ಒತ್ತಡ ನಿರ್ವಹಣಾ ತಂತ್ರಗಳುಒತ್ತಡ ನಿರ್ವಹಣಾ ತಂತ್ರಗಳು
ಒತ್ತಡ ನಿರ್ವಹಣಾ ತಂತ್ರಗಳು
 
Stress management presented by gururaj
Stress management presented by gururajStress management presented by gururaj
Stress management presented by gururaj
 
Departmental inquiries (enforcement of attendance of witness
Departmental inquiries (enforcement of attendance of witnessDepartmental inquiries (enforcement of attendance of witness
Departmental inquiries (enforcement of attendance of witness
 
Stress management presented by gururaj
Stress management presented by gururajStress management presented by gururaj
Stress management presented by gururaj
 
Narcotic drugs and psychotropic substance act 1985
Narcotic drugs and psychotropic substance act 1985Narcotic drugs and psychotropic substance act 1985
Narcotic drugs and psychotropic substance act 1985
 
ಗುಂಪು ಚಾಲಕ ಮತ್ತು ತಂಡ ರಚನೆ ತಯಾರಿಸಿದವರು ಮತ್ತು ಪ್ರಸ್ತುತಪಡಿಸಿದವರು ಶ್ರೀ.ಗುರುರಾಜ ಕ...
ಗುಂಪು ಚಾಲಕ ಮತ್ತು ತಂಡ ರಚನೆ ತಯಾರಿಸಿದವರು ಮತ್ತು ಪ್ರಸ್ತುತಪಡಿಸಿದವರು  ಶ್ರೀ.ಗುರುರಾಜ ಕ...ಗುಂಪು ಚಾಲಕ ಮತ್ತು ತಂಡ ರಚನೆ ತಯಾರಿಸಿದವರು ಮತ್ತು ಪ್ರಸ್ತುತಪಡಿಸಿದವರು  ಶ್ರೀ.ಗುರುರಾಜ ಕ...
ಗುಂಪು ಚಾಲಕ ಮತ್ತು ತಂಡ ರಚನೆ ತಯಾರಿಸಿದವರು ಮತ್ತು ಪ್ರಸ್ತುತಪಡಿಸಿದವರು ಶ್ರೀ.ಗುರುರಾಜ ಕ...
 
Interpol
InterpolInterpol
Interpol
 

Recently uploaded

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 

Recently uploaded (20)

GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 

TYPES OF SURVEILLANCE TECHNIQUES

  • 1. PRESENTED BY GURURAJ KULKARNI GUEST FACULY KARNATAKA POLICE TRAINING COLLEGE GULBARGA SURVILLANCE DESCRIPTION
  • 2.  Surveillance is the monitoring of behavior, activities, or other changing information for the purpose of influencing, managing, directing, or protecting people.  This can include observation from a distance by means of electronic equipment (such as closed-circuit television (CCTV) cameras)or interception of electronically transmitted information (such as Internet traffic or phone calls).
  • 3.  It can also include simple no- or relatively low- technology methods such as human intelligence agents and postal interception.
  • 4. Meaning of Survillance  The word surveillance comes from a French phrase for "watching over" (surmeans "from above" and veiller means "to watch") and is in contrast to more recent developments such as sousveillance.  Surveillance is used by governments for intelligence gathering, prevention of crime, the protection of a process, person, group or object, or the investigation of crime.
  • 5.  It is also used by criminal organisations to plan and commit crimes, such as robbery and kidnapping, by businesses to gather intelligence.
  • 6. TYPES OF SURVILLANCE  1. Computer surveillance  2 Phone surveillance and Lawful interception.  3. Closed-circuit television.  4. Social network analysis.  5. Biometrics.  6. Aerial Survillance.  7. Data mining and profiling.
  • 7.  8. Data mining and profiling  9. Corporate.  10. Business Intelligence  11. Intra-Corporate Surveillance  12. Human operatives  13. Satellite imagery  14. Identification and credentials
  • 8.  15. RFID and geolocation devices  16. Global Positioning System  17. Mobile phones  18. Human microchips  19. Devices  20. Postal services  21. Stakeout
  • 9. COMPUTER SURVILLANCE The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet. All phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by LAW ENFORCEMENT AGENCY.
  • 11.  Data mining is the process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.
  • 12.  There is far too much data on the Internet for human investigators to manually search through all of it.  Therefore, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic to identify and report to human investigators the traffic that is considered interesting or suspicious.
  • 13.  Computers can be a surveillance target because of the personal data stored on them. If someone is able to install software, such as the FBI's Magic Lantern and CIPAV, on a computer system, they can easily gain unauthorized access to this data.
  • 14.  Another form of computer surveillance, known as van Eck phreaking, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters.
  • 15. Phone surveillance and Lawful interception  It is the most useful surveillance method.  The taping of telephones and collect the information.
  • 16. CAMERAS Closed-circuit television  Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer
  • 17.  Cameras and recording equipment used to be relatively expensive and required human personnel to monitor camera footage, but analysis of footage has been made easier by automated software that organizes digital video footage into a searchable database, and by video analysis software (such as VIRAT and HumanID).
  • 18.  The amount of footage is also drastically reduced by motion sensors which only record when motion is detected.
  • 19.
  • 21.  One common form of surveillance is to create maps of social networks based on data from social networking sites such as Facebook, MySpace, Twitter as well as from traffic analysis information from phone call records such as those in the NSA call database,and others.
  • 22.  These social network“ maps" are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities
  • 23. Biometric  Biometric surveillance is a technology that measures and analyzes human physical and/or behavioral characteristics for authentication, identification, or screening purposes.  Examples of physical characteristics include fingerprints, DNA, and facial patterns. Examples of mostly behavioral characteristics include gait (a person's manner of walking) or voice.
  • 24.  Facial Recognisation is the use of the unique configuration of a person's facial features to accurately identify them, usually from surveillance video.
  • 26. Surveillance aircraft Micro Air Vehicle with attached surveillance camera.
  • 27.  Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle—such as an unmanned aerial vehicle, helicopter, or spy plane.  Military surveillance aircraft use a range of sensors (e.g. radar) to monitor the battlefield.
  • 28. Corporate  Corporate surveillance is the monitoring of a person or group's behavior by a corporation. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies.  It can be used as a form of business intelligence.
  • 29. Human operatives  Organizations that have enemies who wish to gather information about the groups' members or activities face the issue of infiltration.  In addition to operatives' infiltrating an organization, the surveilling party may exert pressure on certain members of the target organization to act as informants.
  • 30. Identification and credentials  One of the simplest forms of identification is the carrying of credentials. Some nations have an identity card system to aid identification, whilst others are considering it but face public opposition. Other documents, such as passports, driver's licenses, library cards, banking or credit cards are also used to verify identity.
  • 31. RFID and geolocation devices  RFID tagging:  Hand with planned insertion point for Verichip device  Radio Frequency Identification (RFID) tagging is the use of very small electronic devices (called "RFID tags") which are applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. The tags can be read from several meters away. They are extremely inexpensive, costing a few cents per piece, so they can be inserted into many types of everyday products without significantly increasing the price, and can be used to track and identify these objects for a variety of purposes.
  • 32. Satellite imagery  The satellites and aircraft sensors will be able to penetrate cloud cover, detect chemical traces, and identify objects in buildings and "underground bunkers", and will provide real-time video at much higher resolutions than the still-images produced by programs such as Google Earth.
  • 34.  Several cities are running pilot projects to require parolees to wear GPS devices to track their movements when they get out of prison.  Mobile phones are also commonly used to collect geolocation data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily (whether it is being used or not), using a technique known multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone.
  • 35. Human microchips  Microchip implant (human):  A human microchip implant is an identifying integrated circuit device or RFID transponder encased in silicate glass and implanted in the body of a human being. A sub dermal implant typically contains a unique ID number that can be linked to information contained in an external database, such as personal identification, medical history, medications, allergies, and contact information.
  • 36. Devices  Covert listening devices and video devices, or "bugs", are hidden electronic devices which are used to capture, record, and/or transmit data to a receiving party such as a law enforcement agency.
  • 37. Stakeout  A stakeout is the coordinated surveillance of a location or person. Stakeouts are generally performed covertly and for the purpose of gathering evidence related to criminal activity. The term derives from the practice by land surveyors of using survey stakes to measure out an area before the main building project is commenced.
  • 38. Postal services  As more people use faxes and e-mail the significance of surveilling the postal system is decreasing, in favor of Internet and telephone surveillance. But interception of post is still an available option for law enforcement and intelligence agencies, in certain circumstances