Your email address will be used for Wildy’s marketing materials only. We will never give your email address to any third party.
Special Discounts for Pupils, Newly Called & Students
Browse Secondhand Online
Wildy's will be closed on Monday 29th May and will re-open on Tuesday 30th May.
Online book orders received during the time we are closed will be processed as soon as possible once we re-open on Tuesday.
As usual Credit Cards will not be charged until the order is processed and ready to despatch.
Any non-UK eBook orders placed after 5pm on the Friday 26th May will not be processed until Tuesday 30th May. UK eBook orders will be processed as normal.
October 2005 - Publication Abandoned
Covert policing allows law enforcement agencies to obtain evidence and information without the cooperation of the suspect. The practice has burgeoned in recent years, driven by the development of information technologies, new trends in policing styles, the ability to obtain high quality evidence and a desire for rapid results.
The technique us principally regulated by the 2000 Act that was passed following several high profile cases against the UK in the European Court of Human Rights. Consideration must be given not only to the human rights of those under surveillance but also people whose privacy may be affected collaterally.
The 2000 Act provides for and about the interception of communications, the acquisition and disclosure of communications data, the carrying out of surveillance, the use of covert human intelligence sources (informants and undercover officers) and the acquisition of the means by which electronic data protected by encryption or passwords may be decrypted or accessed. It also provides an accountability framework with limited access to the courts. Local and central government agencies, the police, customs and excise and secret service branches all have powers that allow them to engage in covert policing.
In a world in which police powers and actions are increasingly intrusive in the interests of public protection and safety, this text provides a guide to the use of surveillance both human and technical, the interception of telephone and internet communications and the monitoring of financial and computerised transactions as well as controversial data protection and exchange provisions and genetic monitoring.