U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Covert Surveillance and Electronic Penetration

NCJ Number
96546
Editor(s)
W B Moran
Date Published
1983
Length
50 pages
Annotation
This text provides an overview of surveillance and discusses various types of surveillance equipment.
Abstract
The two general types of surveillance -mobile and fixed -- are considered; techniques of each are described. Attention focuses on the two types of night viewing devices: the active type puts out its own light source, allowing the user to see in total darkness; the passive type amplifies existing light, such as moonlight, starlight, or sky glow. Further, the application and functioning of undercover communications equipment are addressed; standards that should be used in the selection, evaluation, and procurement of such equipment are identified. The types of telephone tapping transmitters usable for monitoring both sides of a telephone conversation are examined. In general, they are not crystal controlled and have a power output ranging from a few miliwatts to about one-quarter watt; many of them use the telephone line as an antenna. The method used to connect a parallel transmitter to a telephone line is described. Interceptions of a suburban residential telephone, a business's data communication to a computer service, and conversations over the direct distance dialing network between two specific individuals in different cities are explored. Categories of telephone bugging, based on how a microphone is connected to a listening post, are noted: the direct connection, the hookswitch bypass, and the third-wire or spare-pair. Finally, Federal laws applicable to wiretapping and electronic eavesdropping are included. An annotated bibliography of 26 books on electronic surveillance is provided, as are 29 figures and 2 tables.