{"title":"Surveillance Methods","authors":"E. Mahoney","doi":"10.32388/kau9jp","DOIUrl":null,"url":null,"abstract":"This chapter examines the surveillance methods used by the MI5. It is a curious feature of MI5’s mandate that it included nothing about the methods to be used for the purposes of the defence of the realm, which was its core task. The Security Service would obtain information about individuals and organizations in a number of ways, which might be described as volunteers who spontaneously reported fellow citizens; monitoring by Special Branch, infiltration, and the use of informers; watching and following; interrogation and questioning; and the interception of communications (mail, telegrams, and telephones); as well as the use of secret microphones hidden in various locations; and foreign security and intelligence agencies. The chapter also looks at the different circumstances in which these different forms of surveillance were used: a contrast between routine and intense surveillance; between passive and active surveillance; and between constant and periodic surveillance.","PeriodicalId":235253,"journal":{"name":"MI5, the Cold War, and the Rule of Law","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"MI5, the Cold War, and the Rule of Law","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32388/kau9jp","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
This chapter examines the surveillance methods used by the MI5. It is a curious feature of MI5’s mandate that it included nothing about the methods to be used for the purposes of the defence of the realm, which was its core task. The Security Service would obtain information about individuals and organizations in a number of ways, which might be described as volunteers who spontaneously reported fellow citizens; monitoring by Special Branch, infiltration, and the use of informers; watching and following; interrogation and questioning; and the interception of communications (mail, telegrams, and telephones); as well as the use of secret microphones hidden in various locations; and foreign security and intelligence agencies. The chapter also looks at the different circumstances in which these different forms of surveillance were used: a contrast between routine and intense surveillance; between passive and active surveillance; and between constant and periodic surveillance.