Surveillance Methods

E. Mahoney
{"title":"Surveillance Methods","authors":"E. Mahoney","doi":"10.32388/kau9jp","DOIUrl":null,"url":null,"abstract":"This chapter examines the surveillance methods used by the MI5. It is a curious feature of MI5’s mandate that it included nothing about the methods to be used for the purposes of the defence of the realm, which was its core task. The Security Service would obtain information about individuals and organizations in a number of ways, which might be described as volunteers who spontaneously reported fellow citizens; monitoring by Special Branch, infiltration, and the use of informers; watching and following; interrogation and questioning; and the interception of communications (mail, telegrams, and telephones); as well as the use of secret microphones hidden in various locations; and foreign security and intelligence agencies. The chapter also looks at the different circumstances in which these different forms of surveillance were used: a contrast between routine and intense surveillance; between passive and active surveillance; and between constant and periodic surveillance.","PeriodicalId":235253,"journal":{"name":"MI5, the Cold War, and the Rule of Law","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"MI5, the Cold War, and the Rule of Law","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32388/kau9jp","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

This chapter examines the surveillance methods used by the MI5. It is a curious feature of MI5’s mandate that it included nothing about the methods to be used for the purposes of the defence of the realm, which was its core task. The Security Service would obtain information about individuals and organizations in a number of ways, which might be described as volunteers who spontaneously reported fellow citizens; monitoring by Special Branch, infiltration, and the use of informers; watching and following; interrogation and questioning; and the interception of communications (mail, telegrams, and telephones); as well as the use of secret microphones hidden in various locations; and foreign security and intelligence agencies. The chapter also looks at the different circumstances in which these different forms of surveillance were used: a contrast between routine and intense surveillance; between passive and active surveillance; and between constant and periodic surveillance.
监测方法
本章探讨军情五处使用的监视方法。军情五处的任务规定有一个奇怪的特点,那就是它的核心任务--保卫国家--中没有任何关于使用方法的规定。安全局将通过多种方式获取有关个人和组织的情报,这些方式可以被描述为:自发举报同胞的志愿者;特别处的监控、渗透和使用线人;监视和跟踪;审讯和质询;截获通信(邮件、电报和电话);以及使用隐藏在不同地点的秘密麦克风;外国安全和情报机构。本章还探讨了使用这些不同监视形式的不同情况:例行监视和密集监视之间的对比;被动监视和主动监视之间的对比;持续监视和定期监视之间的对比。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信