Skip to main content

Lamson Library


Open today:  
(full hours)

Emerging Technology in Criminal Justice

Surveillance

Surveillance devices allow law enforcement and corrections officers to watch (and thus safeguard) particular locations remotely. Such devices permit officers to observe or find individuals who otherwise might not be visible because of obstructions or darkness. Current technologies include closed-circuit television security systems, a variety of night vision devices using infrared and available light sources, and through-the-wall surveillance devices. The latter have great potential in effectively resolving critical incidents (section II), such as hostage taking. Camera, Spy, Pigeon, Surveillance, Security, Video

Required Reading

Surveillance

  1. Introduction:
     
    1. Electronic surveillance. (2010). In D. Batten (Ed.), Gale Encyclopedia of American Law (3rd ed., Vol. 4, pp. 117-121). Detroit: Gale. Retrieved from http://libproxy.plymouth.edu/login?url=http://go.galegroup.com.libproxy.plymouth.edu/ps/i.do?id=GALE%7CCX1337701563&v=2.1&u=plysc_main&it=r&p=GVRL&asid=7810c97aa965e4e60179f770ec4e6b3b
       
  2. Resources
     
    1. National Institute of Justice. (2007). Special report: Investigative uses of technology: Devices, tools, and technologies (pp. 1-165) (United States, U.S. Department of Justice, Office of Justice Programs). Washington, DC: National Institute of Justice. Retrieved from https://www.ncjrs.gov/pdffiles1/nij/213030.pdf
       
    2. Nieto, M. (1997). Public video surveillance: Is it an effective crime prevention tool? (Rep. No. CRB-97-005). Sacramento, CA: California Research Bureau, California State Library. Retrieved from http://www.library.ca.gov/CRB/97/05/
       
    3. Trottier, D. (2015). Open source intelligence, social media and law enforcement: Visions, constraints and critiques. European Journal Of Cultural Studies, 18(4/5), 530-547. doi:10.1177/1367549415577396
      http://www.plymouth.edu/webapp/db/http://search.ebscohost.com.libproxy.plymouth.edu/login.aspx?direct=true&db=aph&AN=103279310&site=ehost-live
       
    4. Kearon, T. (2013). Surveillance technologies and the crises of confidence in regulatory agencies. Criminology & Criminal Justice: An International Journal, 13(4), 415-430. doi:10.1177/1748895812454747
      http://www.plymouth.edu/webapp/db/http://search.ebscohost.com.libproxy.plymouth.edu/login.aspx?direct=true&db=aph&AN=89890598&site=ehost-live
       
    5. Stephens, G. (2013). Crime in the year 2030. Futurist, 47(1), 27-32.
      http://www.plymouth.edu/webapp/db/http://search.ebscohost.com.libproxy.plymouth.edu/login.aspx?direct=true&db=aph&AN=84022832&site=ehost-live
       
    6. Pittman, E. (2010). Police departments connect to school district camera feeds to aid incident response. Education Digest, 76(3), 62-64.
      http://www.plymouth.edu/webapp/db/http://search.ebscohost.com.libproxy.plymouth.edu/login.aspx?direct=true&db=aph&AN=54571237&site=ehost-live
       
    7. United States Department of Justice, National Institute of Justice, Office of Justice Programs. (2016, May 3). Research on body-worn cameras and law enforcement. Retrieved May 3, 2016, from http://www.nij.gov/topics/law-enforcement/technology/pages/body-worn-cameras.aspx
       
    8. United States Department of Justice. Office of Justice Programs, National Institute of Justice. (2012, August 9). Detection and surveillance technologies. Retrieved May 3, 2016, from http://www.nij.gov/topics/technology/detection-surveillance/pages/welcome.aspx
       
    9. United States Department of Justice. Office of Justice Programs. National Institute of Justice. (2007, October). ​Through-the-wall surveillance: A new technology for saving lives. Retrieved May 3, 2016, from http://www.nij.gov/journals/258/pages/through-the-wall-surveillance.aspx

Recommended Reading

Additional Resources