Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: August 13th, 2022

CJ-468 Electronic Surveillance Report

Submit electronic surveillance report. Propose the appropriate electronic surveillance methods for collecting the necessary intelligence. What electronic surveillance method(s) would be most appropriate? Where would the surveillance occur? What is the timeframe for the surveillance activity? Would the surveillance you propose be done overtly (openly; for example, from information in newspapers or from traffic security cameras), covertly (in secret; for example, through listening devices or satellite image), or by using a combination of methods? What resources (financial, equipment, facilities, and manpower) would be needed for the surveillance activities you have proposed?
Electronic Surveillance Report
Name
CJ-468
Date

NAME: __________________________
DATE: ________________________
AGENCY: Southern New Hampshire University Intelligence Agency

Abu Ubaidah, Moktar Ali, Yusuf Jiis are suspects for criminal and terrorist against citizens and organizations of important interest in the United States. The suspects have been considered to conduct other transnational crimes against the United States telecommunication companies, conducting cybercrime that tends to suggest the acts are in the interest of the Chinese state and also are suspected to be aiding and abetting Al Qaeda. The recent intelligence has revealed that the three suspects were planning an attack on a communication company located in New York. The suspects have proved to be hard to locate with their current whereabouts remaining unknown, with other important information that could help in locating them, such as their phone numbers. With lack of such information, surveillance is necessary to collect more information essential in determining the suspects’ exact intention.
The electronic surveillance method that would be used is real-time video surveillance. The real-time video surveillance method will involve the use of facial recognition technology that will be conducted in the areas that the three suspects were last spotted, and those they are likely to be seen are found based on the intelligence that was collected. Since the suspects in pursuing are considered to be highly intelligent, the surveillance will be conducted covertly. Using covertly will ensure the suspects would not be aware that they are bring watched until enough intelligence is gathered.
The three suspects’ timetable is currently unknown. However, based on the previous intelligence, the suspects were spotted two months ago at New York-New York Resort & Casino. Therefore, it is of great importance for the surveillance to start as soon as possible upon the filing of this request for surveillance, since the three suspects are considered to be in the processes of organizing an attack that might negatively impact the United States security. Although the suspects’ timetable and locations are currently unknown, the prior intelligence has provided enough information that can support conducting real-time video surveillance. The information regarding the suspects that is currently available includes where they have previously been and the locations that the suspects are likely to return. The locations will be used as the main sites where the proposed electronic surveillance will be conducted. The sites selected sites for the real-time video surveillance include a residence of Ubaidah’s sister-in-law located in Phoenix, AZ; Jiis’s family has two agricultural farms in Las Vegas area, which will be under surveillance; another site of surveillance is the John F. Kennedy International Airport in New York; the New York-New York Resort & Casino where the three suspects were last spotted; and two communication companies in New York.
The other important information at hand is how the three suspects look like. With the combination of information on where the suspects have been and where they are likely to go, the proposed real-time video surveillance with facial recognition ability is key to finding the suspects. Since the main aim is establishing the current locations of the suspects, video surveillance, when deployed in the surveillance sites, has the ability to identify the suspects among groups of people (Collins, 2019). Once the suspects’ locations have been acquired, other surveillance methods will be initiated to understand more about their intentions. The movement of the suspects will be monitored closely once located to ensure they do not attempt to conduct an attack, with appropriate response mechanisms being ready at each given time of monitoring.
The surveillance operation is expected to begin upon the approval of this surveillance request. The operation will be composed of three components. The first is the installation of relevant CCTV and traffic cameras close to the surveillance sites selected. The CCTV and traffic cameras will incorporate facial recognition program that will identify the suspects and automatically alert officials when the match is identified. The second component of the operation will involve fitting facial recognition with relevant CCTV cameras at the airport and the two communication companies. The last component of the operation will involve the response mechanism when the video surveillance alerts the officials about a possible suspect match. The response will include the officials personally reviewing the sighting for confirmation. Upon the confirmation of the suspects’ facial recognition match, a drone preloaded with the suspects’ identity and facial recognition program will be deployed to monitor the suspects when the move in a range not covered by CCTV or traffic cameras (Koebler, 2012).
The resources needed for the surveillance operation include a facial recognition software program that is already available within the agency along with the three suspect’s pictures that will be installed on the CCTV and traffic cameras in the selected surveillance sites. The facial recognition software is freely available, including the Rekognition software of Amazon or Face ID developed by Apple (Thales Group, 2020). The financial costs regarding the use of the facial recognition software are already incorporated in the salary for officers responsible for installing and operating the software program and the surveillance operation.

Signature of Agent__________________________
Printed Name of Agent__________________________

References
Collins, T. (2019). Facial recognition: do you really control how your face is used? USA Today. Retrieved from https://www.usatoday.com/story/tech/2019/11/19/police-technology-and-surveillance-politics-of-facial-recognition/4203720002/
Koebler, J. (2012). Police to use drones for spying on citizens. U.S. News. Retrieved from https://www.usnews.com/news/articles/2012/08/23/docs-law-enforcement-agencies-plan-to-use-domestic-drones-for-surveillance
Thales Group. (2020). Facial recognition – fascinating and intriguing. Retrieved from https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/biometrics/facial-recognition

Order | Check Discount

Tags: CJ-468, Electronic Surveillance Report

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.