Posted: August 13th, 2022
CJ-468 Electronic Surveillance Report
Submit electronic surveillance report. Propose the appropriate electronic surveillance methods for collecting the necessary intelligence. What electronic surveillance method(s) would be most appropriate? Where would the surveillance occur? What is the timeframe for the surveillance activity? Would the surveillance you propose be done overtly (openly; for example, from information in newspapers or from traffic security cameras), covertly (in secret; for example, through listening devices or satellite image), or by using a combination of methods? What resources (financial, equipment, facilities, and manpower) would be needed for the surveillance activities you have proposed?
Electronic Surveillance Report
Name
CJ-468
Date
NAME: __________________________
DATE: ________________________
AGENCY: Southern New Hampshire University Intelligence Agency
Abu Ubaidah, Moktar Ali, Yusuf Jiis are suspects for criminal and terrorist against citizens and organizations of important interest in the United States. The suspects have been considered to conduct other transnational crimes against the United States telecommunication companies, conducting cybercrime that tends to suggest the acts are in the interest of the Chinese state and also are suspected to be aiding and abetting Al Qaeda. The recent intelligence has revealed that the three suspects were planning an attack on a communication company located in New York. The suspects have proved to be hard to locate with their current whereabouts remaining unknown, with other important information that could help in locating them, such as their phone numbers. With lack of such information, surveillance is necessary to collect more information essential in determining the suspects’ exact intention.
The electronic surveillance method that would be used is real-time video surveillance. The real-time video surveillance method will involve the use of facial recognition technology that will be conducted in the areas that the three suspects were last spotted, and those they are likely to be seen are found based on the intelligence that was collected. Since the suspects in pursuing are considered to be highly intelligent, the surveillance will be conducted covertly. Using covertly will ensure the suspects would not be aware that they are bring watched until enough intelligence is gathered.
The three suspects’ timetable is currently unknown. However, based on the previous intelligence, the suspects were spotted two months ago at New York-New York Resort & Casino. Therefore, it is of great importance for the surveillance to start as soon as possible upon the filing of this request for surveillance, since the three suspects are considered to be in the processes of organizing an attack that might negatively impact the United States security. Although the suspects’ timetable and locations are currently unknown, the prior intelligence has provided enough information that can support conducting real-time video surveillance. The information regarding the suspects that is currently available includes where they have previously been and the locations that the suspects are likely to return. The locations will be used as the main sites where the proposed electronic surveillance will be conducted. The sites selected sites for the real-time video surveillance include a residence of Ubaidah’s sister-in-law located in Phoenix, AZ; Jiis’s family has two agricultural farms in Las Vegas area, which will be under surveillance; another site of surveillance is the John F. Kennedy International Airport in New York; the New York-New York Resort & Casino where the three suspects were last spotted; and two communication companies in New York.
The other important information at hand is how the three suspects look like. With the combination of information on where the suspects have been and where they are likely to go, the proposed real-time video surveillance with facial recognition ability is key to finding the suspects. Since the main aim is establishing the current locations of the suspects, video surveillance, when deployed in the surveillance sites, has the ability to identify the suspects among groups of people (Collins, 2019). Once the suspects’ locations have been acquired, other surveillance methods will be initiated to understand more about their intentions. The movement of the suspects will be monitored closely once located to ensure they do not attempt to conduct an attack, with appropriate response mechanisms being ready at each given time of monitoring.
The surveillance operation is expected to begin upon the approval of this surveillance request. The operation will be composed of three components. The first is the installation of relevant CCTV and traffic cameras close to the surveillance sites selected. The CCTV and traffic cameras will incorporate facial recognition program that will identify the suspects and automatically alert officials when the match is identified. The second component of the operation will involve fitting facial recognition with relevant CCTV cameras at the airport and the two communication companies. The last component of the operation will involve the response mechanism when the video surveillance alerts the officials about a possible suspect match. The response will include the officials personally reviewing the sighting for confirmation. Upon the confirmation of the suspects’ facial recognition match, a drone preloaded with the suspects’ identity and facial recognition program will be deployed to monitor the suspects when the move in a range not covered by CCTV or traffic cameras (Koebler, 2012).
The resources needed for the surveillance operation include a facial recognition software program that is already available within the agency along with the three suspect’s pictures that will be installed on the CCTV and traffic cameras in the selected surveillance sites. The facial recognition software is freely available, including the Rekognition software of Amazon or Face ID developed by Apple (Thales Group, 2020). The financial costs regarding the use of the facial recognition software are already incorporated in the salary for officers responsible for installing and operating the software program and the surveillance operation.
Signature of Agent__________________________
Printed Name of Agent__________________________
References
Collins, T. (2019). Facial recognition: do you really control how your face is used? USA Today. Retrieved from https://www.usatoday.com/story/tech/2019/11/19/police-technology-and-surveillance-politics-of-facial-recognition/4203720002/
Koebler, J. (2012). Police to use drones for spying on citizens. U.S. News. Retrieved from https://www.usnews.com/news/articles/2012/08/23/docs-law-enforcement-agencies-plan-to-use-domestic-drones-for-surveillance
Thales Group. (2020). Facial recognition – fascinating and intriguing. Retrieved from https://www.thalesgroup.com/en/markets/digital-identity-and-security/government/biometrics/facial-recognition
Order | Check Discount
Sample Homework Assignments & Research Topics
Tags:
CJ-468,
Electronic Surveillance Report