Surveillance Equipment & Uses
- The video camera is the most valuable piece of equipment in the PI's arsenal. Video cameras provide physical documentation of the PI's observations. In a vehicle, video cameras mount on tripods for mobile surveillance. For stationary surveillance, video cameras are hand-held. Video surveillance is admissible in criminal and civil court and workers' compensation hearings.
- Pinhole cameras, button cameras and micro-cameras are small, about the size of a dime, and placed in a variety of objects for covert surveillance. Pinhole cameras hide easily within a woman's purse, jacket or shirt pocket. A number of nondescript items, such as sunglasses and baseball caps may be purchased with a built-in camera. Pinhole cameras allow a PI to move about freely and even engage the investigative subject in conversation.
- State and federal wiretapping and eavesdropping laws govern the use of voice recorders. Recording telephone conversations is permissible if the call takes place in a one-party state. A one-party state requires consent of only one person directly involved in the conversation. Approximately 12 U.S. states are tw-party states, which require that both parties consent to the recording. Voice recorders can also record verbal statements from witnesses, victims and suspects.
- Private investigators use live GPS systems to track an investigative target's movements in real time. The GPS unit attaches to the subject's vehicle; the PI then uses a computer to observe and document the movements. Passive GPS systems record the subject's movements. Upon removal of the unit from the vehicle, the PI is then able to upload the recorded information to another computer. Data is viewable through a mapping program.
- Key loggers record activities on a computer. The key logger plugs into a USB port on the target's computer and installs a program. The program records and encrypts information about visited websites and keystrokes. Retrieving the data requires that the key logger be plugged back into the USB port; the information uploads directly to the key logger.