Saturday, September 7, 2019

The use of covert human information sources within an investigation Essay

The use of covert human information sources within an investigation - Essay Example CHISs use different methods of surveillance to obtain intelligence or information from the targets such as interception of their communication, communications data, or â€Å"directed and intrusive surveillance† (Freedom from Suspicion: Surveillance Reform for a Digital Age, 2011, p.18). While directed surveillance does not involve any intrusion on one’s private property, the latter involves the same and security forces may use methods such as tapping of telephone, or fitting of electronic devices etc for surveillance of the premises. Law enforcement agencies also use technology for collecting intelligence from their sources or targets. However, when a suspect is not actually involved in any complicity, the security forces come under criticism for violation of privacy. Human beings must have the right to privacy and it is in the â€Å"collective interest† of all citizens to maintain a â€Å"society in which personal privacy is protected† (p.20). Therefore, the governments of nations have a responsibility to ensure that only in cases where the national security has a chance of being breached, they should endorse the use of CHIS. In the modern world, criminal activities, especially terrorism, have risen to such a high magnitude that countries are forced to implement stringent preventive policies for maintaining law and order. Under the scenario, the deployment of CHIS to obtain relevant intelligence has assumed considerable priority. This is especially relevant in the case of countries like the US, UK, India etc, which are prime targets for terrorist groups as can be evidenced from the WTC, London Bombings and Mumbai terror strikes.... In the modern world, criminal activities, especially terrorism, have risen to such a high magnitude that countries are forced to implement stringent preventive policies for maintaining law and order. Under the scenario, the deployment of CHIS to obtain relevant intelligence has assumed considerable priority. This is especially relevant in the case of countries like the US, UK, India etc, which are prime targets for terrorist groups as can be evidenced from the WTC, London Bombings, and Mumbai terror strikes. On the other hand, as stated earlier, countries also have a responsibility to ensure that the right to privacy of their citizens remains protected and no unwarranted intrusions occur on their private property or persons. Therefore, national governments in these countries need to exercise utmost discretion while deploying CHIS for obtaining intelligence. On the other hand, the United Arab Emirates, a country in the Middle East, constitutionally protects prohibits any â€Å"arbitr ary interference with privacy, family, home or correspondence† of their citizens.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.