Monday, September 24, 2012

Use A Pager For Audio Surveillance

Pagers can be intercepted with a warrant and specialized technology.


Whenever pagers are important devices for communication, they are also important law enforcement tools for surveillance. Criminal organizations often use pagers to send short, coded messages containing information regarding plans and organizational structure. The ability to intercept pager messages is crucial, and to do so requires the use of specialized technology.


Instructions








1. Purchase a pager intercept system. A pager intercept system allows law enforcement agents to intercept messages sent to or from an individual pager once the phone number associated with the pager has been identified.


2. Obtain a wiretap warrant from a judge under whose jurisdiction your law enforcement agency operates. With the exception of cases of national security, judicial warrants are needed to execute any kind of wiretap, including pager interception. You must have opened an investigation and have grounds for investigating certain people before you can obtain a wiretap to legally intercept pages from those people.


3. Acquire the phone number assigned to the pager(s) you are interested in. If you have information on the person you are investigating -- home phone number, person's nickname -- you may run a search for pager messages containing that information. Interception systems have a variety of techniques for finding a pager's phone number and CAP code, or Channel Access Protocol, the pager's unique electronic three-digit code.








4. Leave the interception machine running for a period of time. If you do not know important dates and times when the pager may be in use, simply leave the machine running for several days or weeks. If you do know when the person or people under investigation use pagers for business, just run the interception program during those times. As a general rule, it is best to collect as much information as possible when conducting a wiretap.


5. Save intercepted communications as text files on a regular basis. Most modern interception systems save intercepted data as electronic documents; thus, they can be copied onto a word processor, retrieved and searched at a later date. In addition to providing you with an organized system for data retrieval, this will also provide you with data should the interception system encounter technical difficulties.

Tags: phone number, intercept system, machine running, messages containing, pager intercept, pager intercept system