United States Attorneys' Manual


Book Description




Electronic Surveillance Manual


Book Description

Designed to assist federal prosecutors and investigative agents in the preparation of federal electronic surveillance applications made pursuant to 18 U.S.C. 2510-2521 (Title III).







The Big Black Book of Electronic Surveillance


Book Description

The "Big Black Book of Electronic Surveillance" opens the door to the world of intelligence arms merchants whose work shapes advanced government surveillance. These companies hail from Austria, Australia, Canada, China, the Czech Republic, Denmark, Dubai, France, Germany, India, Israel, Italy, Japan, Korea, The Netherlands, Singapore, Slovenia, South Africa, Spain, Sweden, Switzerland, Taiwan, Ukraine, the United Arab Emirates, the United Kingdom, the United States and many other nations. This volume presents the market leaders and the surveillance solutions and services they provide to governments: packet monitoring, analytics, offensive cyber, mobile location and forensics, lawful intercept, social media intelligence (SOCMINT), facial recognition, voice biometrics and other forms of open source intelligence (OSINT), plus relevant forms of artificial intelligence that automate performance. Also included: military-focused technologies that deliver or intercept intelligence at the tactical edge, such as forward-looking infrared (FLIR), RF monitoring, Electro-Optical/Infrared, eLoran, and systems with the power to take control of critical infrastructure. "The Big Black Book of Electronic Surveillance" is at once a textbook, a manual for government agencies charged with safeguarding national security, and an encyclopedia on this vital industry. Surveillance is a business. Among the largest players are IT and communications industry giants that quietly develop and profit from surveillance solutions. Laws that authorize and govern their work are quite similar from one country to the next. Democratic nations such as the USA, UK, France, Germany, Italy and The Netherlands are little more constrained in deploying surveillance solutions than are Russia, China, Iran, North Korea and other authoritarian regimes. For the most part, government agencies are not technology innovators, but rather, end-users of solutions developed and deployed by Intelligence Systems Support (ISS) vendors. The power that governments exercise via current modes of electronic surveillance will be dwarfed by what comes next: advances in artificial intelligence and quantum computing that take surveillance to the next level.




Electronic Surveillance Manual: Procedures and forms


Book Description

Designed to assist federal prosecutors and investigative agents in the preparation of federal electronic surveillance applications made pursuant to 18 U.S.C. 2510-2521 (Title III).




Identifying the Culprit


Book Description

Identifying the Culprit: Assessing Eyewitness Identification makes the case that better data collection and research on eyewitness identification, new law enforcement training protocols, standardized procedures for administering line-ups, and improvements in the handling of eyewitness identification in court can increase the chances that accurate identifications are made. This report explains the science that has emerged during the past 30 years on eyewitness identifications and identifies best practices in eyewitness procedures for the law enforcement community and in the presentation of eyewitness evidence in the courtroom. In order to continue the advancement of eyewitness identification research, the report recommends a focused research agenda.




Legal Division Handbook


Book Description

"The mission of the Federal Law Enforcement Training Center (FLETC) is to serve as the federal government's leader for and provider of world-class law enforcement training.




Model Rules of Professional Conduct


Book Description

The Model Rules of Professional Conduct provides an up-to-date resource for information on legal ethics. Federal, state and local courts in all jurisdictions look to the Rules for guidance in solving lawyer malpractice cases, disciplinary actions, disqualification issues, sanctions questions and much more. In this volume, black-letter Rules of Professional Conduct are followed by numbered Comments that explain each Rule's purpose and provide suggestions for its practical application. The Rules will help you identify proper conduct in a variety of given situations, review those instances where discretionary action is possible, and define the nature of the relationship between you and your clients, colleagues and the courts.




Proskauer on Privacy


Book Description

This comprehensive reference covers the laws governing every area where data privacy and security is potentially at risk -- including government records, electronic surveillance, the workplace, medical data, financial information, commercial transactions, and online activity, including communications involving children.




Fundamentals of Physical Surveillance


Book Description

This introductory text covers the many fundamental topics involved with physical surveillance for uniformed and plainclothes law enforcement personnel. Physical surveillance is one of the most essential resources available to investigators and officers for detecting criminal activities and building a case against the suspected offenders. As such, it is important to build the skills necessary for observing criminal suspects while remaining undetected. The first chapter explains that physical surveillance is the 3direct observation of people, vehicles, or activity taking place at some given location for the purpose of obtaining information.4 According to the authors, physical surveillance remains more of an art form than a series of techniques; however, it is possible to offer guidance toward the successful completion of physical surveillance. As such, the authors offer instruction, in various chapters, on how to plan for a surveillance job as well as how to best carry out vehicle surveillance, foot surveillance, stationary surveillance, and undercover surveillance. Particular applications of surveillance are also discussed, including physical surveillance for private investigators and process servers, surveillance for drug investigations, night-time surveillance, and electronic surveillance. Other topics covered in the text are surveillance techniques for terrorism investigations and prostitution investigations. The authors offer a chapter on how to read the environment, including how to recognize and read environmental behavioral clues, neighborhood dynamics, and the routine behaviors of people and animals. Another chapter deals with the issue of vision and vision-aid equipment for surveillance officers. Similarly, the following chapter takes up the topic of surveillance photography and offers tips on types of cameras, video cameras, and film, as well as how to handle infrared photography. Final chapters offer tips for writing surveillance reports and the basics of the laws involving the use of physical and electronic surveillance. The authors caution that the techniques set forth in this text are best applied with variations that should be adapted to each individual setting of surveillance and the intended goal of the investigation.