Sunday, June 9, 2019

The use of covert human information sources within an investigation Essay

The use of covert human information sources within an investigation - Essay ExampleCHISs use different methods of surveillance to obtain intelligence or information from the targets such as interception of their communication, communications data, or directed and intrusive surveillance (Freedom from Suspicion Surveillance Reform for a Digital Age, 2011, p.18). While directed surveillance does not involve any intrusion on ones private property, the latter involves the same and trade protection forces may use methods such as tapping of telephone, or fitting of electronic devices etc for surveillance of the premises. Law enforcement agencies also use technology for collecting intelligence from their sources or targets. However, when a suspect is not actually involved in any complicity, the security forces come under criticism for violation of privacy. Human beings must begin the right to privacy and it is in the collective interest of all citizens to maintain a society in which perso nal privacy is protected (p.20). Therefore, the governments of nations have a responsibility to attend that only in cases where the national security has a chance of being breached, they should endorse the use of CHIS. In the modern world, criminal activities, particularly terrorism, have risen to such a high magnitude that countries are forced to implement strict preventive policies for maintaining law and order. Under the scenario, the deployment of CHIS to obtain applicable intelligence has assumed considerable priority. This is especially relevant in the case of countries like the US, UK, India etc, which are efflorescence targets for terrorist groups as can be evidenced from the WTC, capital of the United Kingdom Bombings and Mumbai terror strikes.... In the modern world, criminal activities, especially terrorism, have risen to such a high magnitude that countries are forced to implement stringent preventive policies for maintaining law and order. Under the scenario, the d eployment of CHIS to obtain relevant intelligence has assumed considerable priority. This is especially relevant in the case of countries like the US, UK, India etc, which are prime targets for terrorist groups as can be evidenced from the WTC, London Bombings, and Mumbai terror strikes. On the other hand, as stated earlier, countries also have a responsibility to ensure that the right to privacy of their citizens remains protected and no unwarranted intrusions occur on their private property or persons. Therefore, national governments in these countries need to employment utmost discretion while deploying CHIS for obtaining intelligence. On the other hand, the United Arab Emirates, a country in the Middle East, constitutionally protects prohibits any arbitrary interference with privacy, family, sept or correspondence of their citizens.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.