NCJ Number
171534
Journal
FBI Law Enforcement Bulletin Volume: 67 Issue: 6 Dated: (June 1998) Pages: 10-13
Date Published
1998
Length
4 pages
Annotation
This article describes how criminals can use remote-controlled surreptitious audio surveillance devices against law enforcement organizations, and what can be done to counter the threat.
Abstract
Any computer equipped with sound capability, a modem, and the appropriate software can be converted into an intercept device. After capturing intercepted audio, the computer can transmit it anywhere in the world via landline or cellular telephones. Criminals can use these devices to circumvent laws against possession of eavesdropping equipment, as a warning system to protect their illegal activities, or to manipulate law enforcement. The first officers at a crime scene must know what to look for, how to use criminals' remote-controlled computerized audio systems against them, and how to lawfully use the illegal surveillance device to their own advantage. Law enforcement management must develop and implement effective procedures for these officers to follow. Officers should consult with appropriate legal advisors concerning liability issues that might arise concerning unknowing and innocent users of a suspect's computer. Since it is virtually impossible to look at a computer and determine that it is being used as a surreptitious audio device, all law enforcement personnel should be circumspect in their conversations when in the vicinity of any potentially remote-controlled computer. Notes