Data mining is a communication interception technique that uses a computer system to investigate data. It involves utilizing computer programs to search large quantities of data in order to profile individual communications deemed suspicious by the program. Unlike other interception techniques that target individuals with suspicious tendencies, data mining targets all communication, and then hones in on an individual whose communication has raised an alarm. This technique acts as a fishing net that is put in place to geographically trap communication such as communication emanating from one country to another.
Wiretapping, commonly known as phone tapping, refers to the interception of phone conversations by the installation of a device that is able to record or transmit the details of a conversation. The methods used to intercept phone conversations have evolved from manual tapping to computerized techniques. Traditional phone tapping involved manual installation of an electronic device known as a pen register trap that tracked details of an incoming call but not the conversation details. Today, the process has been made easier by the use of computer program that selects information and transmits it back to the telecommunication company, which in return prints the call details for the security agencies.
Internet interception includes the ability to access and unscramble encrypted messages. The Internet has greatly influenced communication with more users opting to communicate online instead of using phones. Because of this, federal and national security forces have floated a bill that requires all communication service providers that use encrypted messages and social networks to have the ability to wiretap their messages if asked to do so. The bill also requires Internet service providers to install programs that have the ability to intercept and decipher encoded communications.
Video surveillance is installation of video cameras to spy on people's actions and conversations. The use of video surveillance requires authorization by a court, i.e., a security force that wishes to use this method must submit an application to the court and prove that the information can only be obtained through this method. Video surveillance technology has been greatly enhanced by the use of sensors that notify law enforcement agents of suspicious human activity. Since most video surveillance cameras record silent pictures, the use of audio recording devices are used hand in hand with them to strengthen this interception technique.