0% found this document useful (0 votes)
60 views6 pages

Types of Surveillance Techniques

The document outlines the concepts and techniques of surveillance and monitoring in intelligence activities, emphasizing the importance of discreet observation to gather information on individuals or groups. It distinguishes between surveillance and tracking, detailing various methods such as fixed, mobile, and mixed surveillance, as well as the legal framework governing these activities. Additionally, it describes the purpose of follow-up operations and the types of information that can be obtained through these intelligence techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views6 pages

Types of Surveillance Techniques

The document outlines the concepts and techniques of surveillance and monitoring in intelligence activities, emphasizing the importance of discreet observation to gather information on individuals or groups. It distinguishes between surveillance and tracking, detailing various methods such as fixed, mobile, and mixed surveillance, as well as the legal framework governing these activities. Additionally, it describes the purpose of follow-up operations and the types of information that can be obtained through these intelligence techniques.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

SURVEILLANCE MONITORING AND INTERROGATION

Surveillance:
It is an intelligence activity through which from a fixed and safe point one
carry out a continuous and discrete observation of a person, place, vehicle
or fact, with the purpose of identifying the routines and situations of interest for the
intelligence that is generated there, avoiding being discovered.

Surveillance is considered a technique and an art that uses both observation


(fixed surveillance) and monitoring (mobile surveillance). It is an ancient form of
to obtain data. The term surveillance is often confused with that of tracking.

In practice, there is a very subtle difference: tracking is mobile surveillance.


on foot, or by vehicle. In the judicial field, surveillance consists of the systematic and
permanent secret observation exercised over people, places, or things,
carried out by the judicial police authorities who are conducting a
research, with the aim of discovering elements and verifying situations and/or
useful or necessary behaviors for the clarification of crimes.

Through surveillance, the researcher scrutinizes the movements of the observed.


study their behavior, framed in various circumstances of manner, time
and place, and analyze the reactions to the stimuli that the condition of suspect
consenting, or unaware of it, imposes it or advises it. The investigation, in fact, does not
it is exhausted in the reconstruction of facts whose effects are produced, or are

they prolong, in time, but also refers to many others whose


effects have already been demanded (a typical example is homicide, in which the author does not

despite having already committed the criminal act, adopts certain behaviors,
whose analysis by the researcher can facilitate the discovery of
accomplices, motives of the crime, the place where the loot is located, etc.).

1
It is ordered by the prosecutor when there are reasonably founded grounds to
inferring that the accused or the defendant may lead to obtaining useful information
for the research.

Follow-up
It consists of the intelligence activity by which control is exercised over
a moving target, which can move on foot, by vehicle or
combined, with the purpose of identifying the routine, that is to say the starting point, the
frequented places, the visited people, the vehicles used for
displacement, security measures, and the arrival point, aiming to
obtain all the relevant information. The success of the follow-up lies in not being
detected, in maintaining control from the starting point to the point of
arrival and in obtaining all possible information, which is why it must
there must be proper coordination among the team members.

Passive monitoring is conducted to know the activities they are engaged in.
the people they associate with and the places they go to, being careful not to
affect the orbit of the intimacy of the accused or indicted, nor of third parties. The order
it has a maximum validity of one (1) year, after which it is canceled if not obtained
results. However, it may be issued again if new reasons arise.

Sonsacamiento:
Intelligence technique that allows the acquisition of information through
dialogue between the intelligence agent and the case chief, who must not notice
neither from its exploitation, nor from the agent's intention.

The people who can carry out surveillance are those groups that have these
functions that are attributes by law, to help dismantle gangs that
comment on punishable acts "An individual cannot carry out a
surveillance because it is watching the intimacy of the other

2
Types of Surveillance and Monitoring are classified by position, by medium.
employee and by the way.
Due to the position, they are fixed (when the observation is made from one or more
fixed points (watch posts) to know what is happening in the area below
surveillance, mobile (it is the tracking with movement according to the movement
from the observed objective and is done on foot or by vehicle, mixed or combined (is
the combined use of fixed and mobile.

By the means used, they are on "foot" (one or more intelligence agents, in
"vehículos" (terrestre: automóvil, bicicleta, motos), "aéreo" (helicópteros),
maritime (boats and hovercrafts).

Due to the way it is, it is nearby or close surveillance (when the subject being monitored is kept watch over,

very close) or at a distance or loose (the target is monitored from a distance). The surveillance at

distance is the classic where the tracking must be as discreet as possible and not
It is important not to lose sight of the subject.

It is used in tracking important goals.


It is the type of surveillance that is most frequently used in operations of
intelligence.

Another type of surveillance is by stages or "frog."


It consists of gradually controlling the subject's activities until finding out
finally all his movements. This way he will be monitored for a while at home, then
in his office, during his travels; then all the gathered information is compiled
around the subject.

These measures are used to prevent detection of tracking. It is


professional and technical when it consists of searching for and locating a target or objective,

previously selected. From there, their attitudes and behaviors are studied,
schedule, travel routes, security measures adopted, his routine, etc.

3
Once the target has been selected and located, it is a task of analysis and research.
basic and the planning is carried out, designating the team that will be present
task of controlling all movements of the target until knowing their contacts
and establish the network of the entire organization reaching the head or leadership, place
where the blow should be struck to dismantle the organization.

What does the follow-up consist of?


The following consists of physically and discreetly exhaling at an individual.
(suspect, investigated, accused, witness, etc. In the commission of a crime), in
public places, in order to control their movements, to know their whereabouts
places they frequent, the people they interact with, the activities they engage in
develop, etc.

Ordinarily, monitoring is of two types:


a. On-foot surveillance by a single person.
b. The tracking of a vehicle, aboard another.

According to the purpose of monitoring or following up, the techniques are


numerous and serve to protect people. obtain proof or evidence of
a crime, locating the subject, monitoring family hideouts, friends, accomplices,
linked to the subject, or according to the circumstances of the investigation, locate
the residence or residences of the subject, determine the activity and/or contacts of
subject, to discover the identity of all those involved in a certain fact,
obtain necessary evidence to obtain a search warrant
obtain usable photographs, gather data that serves as a basis for a
interrogation, prevent the escape of a suspect from the country, locate witnesses,
apprehend those who are committing it, verify the information provided
by the victim, complainant, or confidential informant, etc.

4
GLOSSARY
1. Psychological actions: It refers to any action that has a meaning.
for those who carry it out, affecting the behavior of others, directing it towards
action mentioned by said affectation
2. Analysis: It involves considering the causes and sources of the risk, their
consequences and the probability that such consequences may occur
occur.
Threat: It is the confrontation of one's own vulnerability with an action.
enemy, carried out by one or several initiators. These threats are
considered from a General Strategy perspective, not implying by
force, at least initially, a military-type threat, although this
it may appear later when the different actions are chained and
reactions.
4. White: Code that the police use to indicate that the suspect is not
has a criminal record.
5. Public order white: It is the situation of normal functioning of the
public and private institutions, where the authorities exercise their
own attributions and people exercise their rights peacefully and
freedoms.
6. Work folder:
7. Intelligence Cycle: The Intelligence Cycle is understood as the sequence
through which information is obtained, transformed into intelligence and
makes available to users
8. Collaborator: Process that involves the work of several people in
set both to achieve a result that is very difficult to accomplish
individually.
9. Biographical component: It is the biographical study of reliability of a
person.
10. Cryptography: Science that encompasses all systems for converting into
secret an unreadable written message, using special characters
combinations of letters, numbers or other signs.

5
[Link]: Analysis system of propaganda that includes the study of
the source, content, audience, medium of dissemination and effect. It corresponds to
the formula called that way by the first letters of each element of the
elements of analysis.
12. Infiltration: A technique by which the activities of a
Blank determined with the use of an intelligence agent(s) that
manages to get close to a target while hiding their true identity.
13. Informant: Person who provides information about an event or people to
the police. Informant.
[Link] Core: Refers to the violence generated in a cultural environment,
economic, political or social that materializes in the dynamics of the groups
to diversify in terms of its indicators.
15. Polygraph: The machine of truth or polygraph is a particular type of
measurement instrument used for recording physiological responses.
16. Sabotage: It consists of the destruction of tools, machinery, materials
cousins, etcetera, of the company, carried out by the workers as
consequence of a labor-related conflict that lies between them;
pursues a collective purpose, a social effect.
[Link]: The hidden or unknown. The reserved. Reserve. Secrecy. Knowledge
personal, exclusive, of a medium or procedure in any science or
art.
18. Monitoring: Intelligence activity through which control is exercised.
about a person or element in motion and it can be carried out in
vehicle or on foot.
[Link]: It is the natural person who declares before the bodies in charge of
the procurement or administration of justice, what he knows and attests to
relationship with the criminal act, because it was perceived through the senses.
20. Surveillance: A continuous and discreet observation of a person, place,
vehicle or fact, in order to establish routines and other situations of
interest.

You might also like