Return to Article Details Covert surveillance applications Download Download PDF