StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The use of covert human information sources within an investigation - Essay Example

Cite this document
Summary
The use of covert human information sources in the investigation of various criminal cases is a practice in vogue among law enforcement agencies of all countries across the globe. The practice has derived from the fact that when a police officer directly approaches people for the collection of information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
The use of covert human information sources within an investigation
Read Text Preview

Extract of sample "The use of covert human information sources within an investigation"

?The Use of Covert Human Information Sources within an Investigation The use of covert human information sources in the investigation of various criminal cases is a practice in vogue among law enforcement agencies of all countries across the globe. The practice has apparently derived from the fact that when a police officer directly approaches people for the collection of information, they may be hesitant to impart with any information. On the other hand, it is relatively easy for private citizens to collect such information. Similarly, criminals, terrorists etc. do not discuss or divulge any information when they notice the presence of police officials, which pre-empts the latter from overhearing any information being shared among the antisocial elements. In contrast, private citizens have the opportunity to receive such information as they appear harmless to criminals. Therefore, the use of paid or unpaid human informants, as well as undercover police officers, “has long been an essential feature of criminal investigations” (Freedom from Suspicion: Surveillance Reform for a Digital Age, 2011, p.115). On the other hand, protection of privacy remains a concern and therefore, in order to eliminate any misuse, certain regulations have been placed on this process by the government. However, in the context of public interest and for the expediency of police investigations, the use of covert human resources by law enforcement agencies is justifiable. In the UK, the Regulation of Investigatory Powers Act (RIPA) has been introduced in the year 2000, which defines covert human intelligence source (CHIS) as a person who “establishes or maintains a personal or other relationship” of a secret nature for facilitating information or to “provide access to information” or “covertly disclose information” to another person (Covert Human Intelligence Sources, 2010, p.7). Such informants are used to collect intelligence or any relevant information by police officers, which can be used in criminal investigations. However, the relevant regulations stipulate that public authorities, while authorizing the use of CHIS need to ensure that an “individual’s right under Section 8” is not compromised (p.9). However, public officers who voluntarily imparts information, or sources that provide information “within their personal knowledge” do not fall in the category of CHIS (p.9-10). CHISs use different methods of surveillance to obtain intelligence or information from the targets such as interception of their communication, communications data, or “directed and intrusive surveillance” (Freedom from Suspicion: Surveillance Reform for a Digital Age, 2011, p.18). While directed surveillance does not involve any intrusion on one’s private property, the latter involves the same and security forces may use methods such as tapping of telephone, or fitting of electronic devices etc for surveillance of the premises. Law enforcement agencies also use technology for collecting intelligence from their sources or targets. However, when a suspect is not actually involved in any complicity, the security forces come under criticism for violation of privacy. Human beings must have the right to privacy and it is in the “collective interest” of all citizens to maintain a “society in which personal privacy is protected” (p.20). Therefore, the governments of nations have a responsibility to ensure that only in cases where the national security has a chance of being breached, they should endorse the use of CHIS. In the modern world, criminal activities, especially terrorism, have risen to such a high magnitude that countries are forced to implement stringent preventive policies for maintaining law and order. Under the scenario, the deployment of CHIS to obtain relevant intelligence has assumed considerable priority. This is especially relevant in the case of countries like the US, UK, India etc, which are prime targets for terrorist groups as can be evidenced from the WTC, London Bombings and Mumbai terror strikes. On the other hand, as stated earlier, countries also have a responsibility to ensure that the right to privacy of their citizens remains protected and no unwarranted intrusions occur on their private property or persons. Therefore, national governments in these countries need to exercise utmost discretion while deploying CHIS for obtaining intelligence. On the other hand, the United Arab Emirates, a country in the Middle East, constitutionally protects prohibits any “arbitrary interference with privacy, family, home or correspondence” of their citizens (United Arab Emirates, n.d., p.7). However, as opposed to UK, UAE’s primary concern derives not from being a target of terrorist attacks but from the possibility of some of their citizens sponsoring terrorism. As such they focus on instituting laws that criminalize terrorist financing, such as the Criminalization of Financing of Terrorism (CFT) law, 2004. Article 12 of the said law states that any person who “gains, provides, collects, carries, or transfers property, directly or indirectly, with the intention to be used” for aiding or abetting terrorism will be liable for punishment with “life or provisional imprisonment” (Mutual Evaluation Report: Anti-Money Laundering and Combating the Financing of Terrorism, 2008, p.27). However, the country does not seem to have any specific guidelines regarding the use of CHIS as in the case of UK though they seem to using strategies such as surveillance for collection of intelligence for monitoring the law and order situation in the country especially in the case of immigrants. Thus, overall it transpires that countries across the world use human sources to collect intelligence for the use of criminal investigations. Countries like UK have the major problem to deal with, in terms of increased criminal activities and especially to counter terrorism. However, the national government also has to take into consideration the aspects of human rights and the privacy of their citizens and, thus, they have to exercise a high level of discretion to ensure that the use of CHIS do not compromise the privacy of their citizens. On the other hand, citizens will have to understand that whatever efforts the UK government is making are directed towards the sole purpose of national security and support the state in its fight against terrorism. In contrast, the primary concern of countries like UAE is the possibility of some of its citizens sponsoring terrorism and the country’s law enforcement focuses on instituting laws and regulations for the prevention of such funding. In the modern world, where criminal activities and terrorism have become so rampant, the use of CHIS by government and security agencies for the purpose of collecting intelligence is justified and the citizens should not be overly concerned with the aspect of privacy in the compromise of their basic safety. On the other hand, national governments need to use discretion when using CHIS for obtaining intelligence. References Covert Human Intelligence Sources: Code of Practice. (2010). TSO Information and Publishing Solutions. Available at Freedom from Suspicion: Surveillance Reform for a Digital Age. (2011). Justice. Available at Mutual Evaluation Report: Anti-Money Laundering and Combating the Financing of Terrorism. (2008). Middle East and North African Financial Action Task Force. Available at United Arab Emirates. (n.d.). Available at Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The use of covert human information sources within an investigation Essay”, n.d.)
The use of covert human information sources within an investigation Essay. Retrieved from https://studentshare.org/law/1465916-the-use-of-covert-human-information-sources-within-an-investigation
(The Use of Covert Human Information Sources Within an Investigation Essay)
The Use of Covert Human Information Sources Within an Investigation Essay. https://studentshare.org/law/1465916-the-use-of-covert-human-information-sources-within-an-investigation.
“The Use of Covert Human Information Sources Within an Investigation Essay”, n.d. https://studentshare.org/law/1465916-the-use-of-covert-human-information-sources-within-an-investigation.
  • Cited: 0 times

CHECK THESE SAMPLES OF The use of covert human information sources within an investigation

Anti-Forensic Technologies

Most of the researchers do not put into consideration the use of forensics as a method of ensuring the safety of one's personal data or information.... It is due to the rise in the use of this technology that many researchers have undertaken to conduct research and study on this form of technology (Lim, 2008).... Innovatively, there are anti-investigation techniques, aimed at making information collected by automated tools as well as fresh-and-blood investigators....
12 Pages (3000 words) Essay

UK Security Management Practice and Regulatory Acts

In the UK, several national government agencies are entrusted with investigations including the ordinary police or the criminal investigation division or Scotland Yard and the secret intelligence agencies.... This paper makes a conclusion that security management as practised by both public and private investigators is thus confronted by many obstacles as they seek research or information on individuals in addition to when doing other security duties particularly due to the proliferation of many indistinct rules that grant much advantage to subjects under investigation and even criminal elements that are protected by these legislative Acts....
15 Pages (3750 words) Essay

Use of CCTV in Crime Prevention

the use of CCTV is “one of the most common forms of video lance” and the technology involves the deployment of cameras by public authorities for detecting and preventing criminal activities in designated areas (Carli, 2008).... the use of CCTV enables the authorities as well as private parties to monitor and exercise surveillance on the activities within and around their premises and other sensitive areas that are vulnerable to the threat of attack by criminals....
13 Pages (3250 words) Essay

A Hierarchical, Objectives-Based Framework for the Digital Investigations Process

nbsp; The sample data is taken from existing studies, in this case, a study from the National Crime Panel that details the determination of available data from mapped an unmapped information sources in crime investigation settings.... The purpose of the paper is to determine just how effectively data on crimes are being identified, collected, and made use of to solve crimes.... Such data is then factored into analyses of the effectiveness of law enforcement use of data and information to solve crimes....
11 Pages (2750 words) Research Paper

Meaning and Definition of Logic

The example for this can be the human anatomy.... The paper “Meaning and Definition of Logic” looks at the main conception of logic, which is related to the fundamentals of Mathematics as understood by various theorems and formulae of the subject.... However, the meaning of logic in the terms of philosophy relates to good reasoning on any topic....
16 Pages (4000 words) Research Paper

Law and Criminology: Ability to Conduct an Investigation

The paper “Law and Criminology: Ability to Conduct an investigation” seeks to evaluate the data protection act 1998, which came into force with the sole purpose of protecting the fundamental rights and freedom of natural persons.... life or death); part of a criminal investigation; legitimate interests of the data controller with the rights of the subject.... The data protection act 1998 was framed which specified the limits up to which data can be collected and used, the new amended act has included CCTV footage and data information stored manually within its ambit and also implementation is stringent so much so that security personnel is also covered within the ambit of this law....
15 Pages (3750 words) Research Paper

Cybercrime - Investigating High-Technology Computer Crime

hellip; The perpetrator seeks to refuse users of these networks the ability to access and use available information for their benefit.... Cracking is defined as unauthorized entry and destruction of information contained in individual or organizational computers....
17 Pages (4250 words) Literature review

Examining a Hypothesized Link between Adverse Health Outcomes and Human Exposure

If the investigation starts with an exposure (like the use of oral contraceptive) and follows females for some years to determine outcomes (like ovarian cancer) then the study is considered a cohort study.... On the contrary, if the analytical investigation starts with an outcome (ovarian cancer) and traces the exposure, like oral contraceptive use, then this study is considered a case-control study.... If the investigation has a control or comparison cluster it is considered analytical, if not then it is considered descriptive (Liamputtong, 2010)....
11 Pages (2750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us