...

2 views

Law Enforcement Tactics
1. Law enforcement today are more cunning and sneaky than the average police department. The difference is being able to afford high tech technology including ultrasound. Ultrasound is a machine- driven, high- decibal sound-generator that generates sound waves. These sound waves then travel through the air and send back particle readings as they pass through objects. High-density objects produce a more-dense portrait of the object it passes through. For example: when ultrasound passes through antimate objects, it shows the movement of that object. Store security systems no longer depend on cameras as ultrasound generators also identify body-language. If you don't have a record of body-language stored somewhere in a data-base, no problem. Courts can issue a mandate to force someone to follow an exercise regime allowing experts to examine similarities in movement. Then it can be determined whether or not your particle prints are a match .
2. Law enforcement are using these technologies in Traphouses, or SCE - Secure-Contained-Environment where actual people reside .. a home, house, du-plex, trailer house, etc. In these preequipped dwellings have monitoring cameras, audio microphones, panic buttons, recording equipment and whatever else the investigative team deems necessary.
Let's say an individual just happened to know a person residing in one of these dwellings. And say, that person has been on the radar for awhile now and law enforcement officers want to manipulate a move to this location by the individual on their radar. "A"- =Tennant, B= Suspect, and "C" = Law Enforcement. ["A" and "C" are communicatiing via a group texting app. " C" let's "A" knows that they are interested in surveiling this "Mark", so " A" locates "B"
and intices him to come by sometime.] (One of the reliabilities that law enforcement can depend on is Vagrancy. Drug users would be the highest likelyhood for Vagrancy because they've burnt so many person's there's noone to call and get a couch from. When they do have the money for a motel it's usually only for 1 or two nights, then bach to the elements they go!), unless someone invites them over . That's where the officers have opportunity for surveillance at a Trraphouse.
Officers usually communicate to the Tennant any dangers, thefts and manipulation techniques they need to reach the end goal.
Law Enforcement are also better able to control any violence, or situations that would pose a threat to the informant. Anything taken from the home is judicial evidence, already inventoried,
logged and monitoried.
3. Hightech drones are also used to monitor activities. These drones are capable of zooming in on a mole on a person's body from a distance of 45 miles. They also are equipped with infrared cameras that can spot person's in the dark. They are capable of penetrating a roof and walls on a house. Police drones are used to secure an area by setting up a parimeter.
4. Also used frequently are hand held radar devices that, when held next to a wall, can locate individuals in a structure and read their body-language. It can tell the officers how many and their location.
5. Indoscopes are a device that has a 4 to 6 ft. Cable with a camera attached to the front end. Placed through any crack or hole as small as 3 centimeters, it can be twisted and turned into position to see inside.
6. Perhaps the most amazing tool police use is a hand-drone about the size of a playing card. If a situation presents itself with an opening as small as 3 in . Wide by a half in. high, the small drone can be released and probe the interior of a structure with stealth, for the rotors make minimal sound.
7. To temperaruly go back to Ultrasound let's display the differences. One frequency used, usually between 16,000 and 22,000 dcbl, is a non-repetitive wave that sounds like thousands of crickets magnified. This is the standard wave for light movement. Another is a steady, searing wave adjusted to around 20,000 dcbl and can be uncomfortable to the ears. It's used for more sparatic movement. And still another is a low hum, or vibrating uuummmm at around 600 dcbl, which can pull sounds and magnetic fields into a decipher machine which deciphers equipment and/or weapons.
8. Satillites are interactive with both visibility and location .
Therefore, the biggest tool they have is, that's right, your cell phone. Most 4g and 5g cells have not only gps for location in maps and location history, but also have built-in gps units that cannot be deactivated by turning off you phone, or removing the battery, thus leaving you wide open for any pin-point accuracy. Your phone automatically keeps a record of the tower location minute by minute.
9. Another hinderance to privacy is the "Stingray Operation that is performed from the back of any van. The van is equipped with a small computer, sometimes only a laptop, and sends out a signal that fools your phone into thinking that it's a receiving tower. Once your signal is rerouted it goes through a data robber that collects the information on your phone, including, and not limited to passwords, non- encrypted codes and url's, or a Uniform Resource Locator. It also reads location history and search history!
10. In this chapter I will give a counter-measure example for phone Surveillance. Keep in mind that Android and iOS systems are the most vulnerable because they are easier to root than the classical "Jailhouse Break"
Spy's use a mobile spy app that uses the data connection to send remote logs to the person spying on you. These logs include "calls", "text messages", "data from social media sites like fb, Twitter, etc", and "location tracking data". Some smartphones send data back to a remote server for analysis while others may include activation of the phones microphone. A smartphone spying app will not have an obvious user interface. It can access the logs remotely without having contact with the smartphone again. The best Malware App is Malwarebytes on Play Store.

© Bar7RRanch@1