Furthermore, the CCTV gadgets today have been improved in such a way that the administrator or the operator at the control and surveillance room can zoom in and out images and videos as they get transmitted. The today’s CCTVs also have speakers which allow the administrators to communicate to people at some short distances using the speakers attached to the cameras. Just as it was illustrated in the previous sections, CCTVs have obtained high usage in many sectors such as in maintenance of the perimeter securities, in monitoring of traffic flow, and obtaining a video record of activities of people such as in offices, towns, in banks, shopping malls, inside vehicles and planes among other places where human beings associate.
As much as CCTV has been widely used to survey public places, privacy concerns which are a basic ri2ght of human beings have been compromised, and this has been contested in many parts of the world. Surveillance in the Age of Information Available technology has greatly been used by surveillance officers for security or monitoring nefarious and malicious acts of people. In the olden days, people relied solely on telescopes to aid them to carry out such activities (Burton, 2016). However, today there is various sophisticated equipment which has to be used such as night vision aids, video and photographic gears, sound detectors, beacons, as well as scanners which are programmable to help the security personnel to carry out their work effectively (Burton, 2016).
All these have been made possible courtesy of the personal computers which can database and analyze information to finer details and also the internet which has tremendously revolutionized how information is gathered. Without any doubt, the modern technology has greatly improved and enhanced surveillance. As much as the technology has been highly applied in surveillance, still there is a section which it has not fully replaced (Burton, 2016). Physical pre-operational surveillance has not been rendered obsolete by embracement of modern technology in surveillance (Burton, 2016).
Meaning, besides leveraging technology in surveillance, still an individual has to be present to take part in surveillance proactively. In other words, technology has only been used to enhance but not to fully replace human effort in surveillance. The internet has been widely used as a tool to gain surveillance information about people. For example, if the target in the surveillance operation is an individual, then the internet can give information about the person’s age, occupation, family members, spouse, hobbies, health history, participation in various events such as charity and humanitarian activities among other pieces of information being sought.
Other public records about a person can also be retrieved from the internet such as driver license issuance date, voter’s card registration number, passport number, criminal records, and data about property tax and tax return records among others. The internet is also able to provide both aerial photographs and videos about certain targeted areas of surveillance. Satellite cameras have made it easy to capture aerial photographs and transmit to various sites on the internet where they can be accessed (Burton, 2016).
Hence this explains precisely how the internet has been a useful source of information in surveillance. As much as the internet has been used ass source of information for surveillance intensively, it has to be noted that the internet has various limitations. First, the internet has a lot of erroneous data which does not hold any truth about a person or place being searched. The internet could also be full of untrue information due to what is known as lag time (Cabling Plus 2014). Lag time is the period between the event and when it is posted on the internet for the public.
Therefore, it is important that before any information is gathered from the internet for surveillance purposes, it has to be confirmed for validity and authenticity.
Read More