.

Saturday, April 20, 2019

The use of covert human information sources within an investigation Essay

The practice of covert human information sources within an investigation - Essay ExampleCHISs use different methods of superintendence to obtain intelligence or information from the targets such as interception of their communication, communications data, or directed and inquisitive surveillance (Freedom from Suspicion Surveillance Reform for a Digital Age, 2011, p.18). While directed surveillance does not involve any intrusion on ones private property, the latter involves the same and warrantor forces may use methods such as tapping of telephone, or fitting of electronic devices etc for surveillance of the premises. Law enforcement agencies overly use technology for collecting intelligence from their sources or targets. However, when a suspect is not actually gnarly in any complicity, the security forces come under criticism for violation of privacy. Human beings must cook the right to privacy and it is in the collective interest of all citizens to maintain a society in which personal privacy is protected (p.20). Therefore, the governments of nations have a responsibility to ensure that only in cases where the field security has a chance of being breached, they should endorse the use of CHIS. In the modern world, criminal activities, specially terrorism, have risen to such a utmost magnitude that countries are forced to implement compressed preventive policies for maintaining law and order. Under the scenario, the deployment of CHIS to obtain germane(predicate) intelligence has assumed considerable priority. This is especially germane(predicate) in the case of countries like the US, UK, India etc, which are vertex targets for terrorist groups as can be evidenced from the WTC, capital of the United Kingdom Bombings and Mumbai terror strikes.... In the modern world, criminal activities, especially terrorism, have risen to such a high magnitude that countries are forced to implement stringent preventive policies for maintaining law and order. Under t he scenario, the deployment of CHIS to obtain relevant intelligence has assumed considerable priority. This is especially relevant in the case of countries like the US, UK, India etc, which are prime targets for terrorist groups as can be evidenced from the WTC, London Bombings, and Mumbai terror strikes. On the other hand, as state earlier, countries also have a responsibility to ensure that the right to privacy of their citizens remains protected and no unwarranted intrusions occur on their private property or persons. Therefore, national governments in these countries need to do work utmost discretion while deploying CHIS for obtaining intelligence. On the other hand, the United Arab Emirates, a country in the shopping mall East, constitutionally protects prohibits any arbitrary interference with privacy, family, home or correspondence of their citizens.

No comments:

Post a Comment