INFORMATION

Site Map - Surveillance

Will Use of UAVs Take Off?

- Tests are underway to assess whether unmanned aerial vehicles could be safety used by police in metropolitan areas.

Surveillance

- The FBI Law Enforcement Bulletin lays out the finer points of surveillance.

Wiretaps

- Under a new proposed rule issued by the Federal Communications Commission (FCC), Internet phone calls--voice over Internet protocol, or VoIP--would be subject to federal laws governing wiretaps. This means that VoIP providers would have to equip their devices to allow law enforcement to intercept calls in cases where a court order is issued for surveillance.

Miami Police to Test Drones

- The Miami-Dade Police Department will begin testing unmanned drones as law enforcement tools.

The Terrorist Recognition Handbook.

- The book contains 18 chapters sectioned into four parts: Know the Terrorist, Identifying Cells, Detection of Activities, and Predicting Attacks. When the author discusses the detection of terrorist cells and activities, he is at his best. He explores surveillance, supply chains, cell integration and dis-integration, and various other pertinent topics, both from a high-level intel perspective and a street-level cop-on-the-beat viewpoint.

Advanced Surveillance

- This title, Advanced Surveillance, is for private investigators and others whose primary focus is conducting surveillance. Author Peter Jenkins clearly knows his subject well and offers a broad range of information about the topic. While word usage and spelling are obviously British, the issues Jenkins raises, including the difficulties and frustrations of surveillance, are universal.

Privacy

- Malaysia and Japan use video surveillance to oversee public places. Italy uses the technology to monitor transportation. And Germany uses it to collect tolls. That's just a small sample of countries adopting public-area surveillance, notes an annual report by watchdog group Privacy International.SM Online takes you to the report.

Where Trouble Meets the Road

- The Utah Department of Transportation is going digital to improve statewide traffic surveillance.

Data Mining

- The Senate has agreed to consider a bill (S. 236) introduced by Sen. Russ Feingold (D-WI) that would monitor government use of data mining. The bill has been approved by the Senate Judiciary Committee.

Surveillance

- A bill (H.B. 1392)introduced in the Arkansas Legislature would allow nursing home residents to have CCTV cameras installed in their rooms at the discretion of family members. The bill, called the Willie Mae Ryan Act, was named for a murder victim—an 81-year-old nursing home resident who was beaten to death in her room in August 2003.

Secrets of Computer Espionage: Tactics and Countermeasures

- Just who is spying on whom? The author explains that the typical person might be a target of bosses, friends, family members, hackers, and many others. Even people with nothing confidential or of value on their computers risk getting caught up in espionage and other cyber capers. For instance, hackers can use their computers as vehicles for staging attacks or as a location for storing illicit files, such as child pornography. And as more cell phones and PDAs connect to the Internet, the risks multiply.

Surveillance powers

- The House Judiciary Committee has held several hearings on the expanded police powers included in the Patriot Act, which will be expiring at the end of this year. The first (S. 318), introduced by Sen. Russell Feingold (D-WI), would amend and make permanent the expiring computer trespass provision of the Patriot Act. Another bill (S. 737), introduced by Sen. Larry Craig (R-ID), would limit the use of the surveillance powers more so than is the case currently in the Patriot Act.

Monitoring workers

- A quarter of companies surveyed have fired workers for misusing the Internet or e-mail, according to the 2005 Electronic Monitoring & Surveillance Survey, cosponsored by the American Management Association and The ePolicy Institute. The survey of 526 U.S. companies also revealed that 51 percent use video monitoring to counter theft, violence, and sabotage (up from 33 percent in 2001), while 85 percent of those who videotape employees notify those employees of the practice. @An executive summary of the surveyis at SM Online.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.