We live in a troubled world. Organised criminals and groups prepare to use violent methods to achieve their ends are making our public places vulnerable to vandalism, robbery and acts of terror. This has led police and military forces to keep a close watch on society using new technology. The new system in place in the British City of Middlesbrough enables security officers not only to monitor the behaviour of people in the central area, but also to speak direct to individuals they can see on their screens. Middlesbrough's existing closed-circuit TB network has been modified, and now eight out of 150 CCTV cameras across the city have loudspeakers attached to them. Surveillance officers control the camera's individually and have the authority to intervene when they see antisocial behaviour taking place. That could be anything from dropping litter, cycling where it's forbidden or committing petty threats. Surveillance officers use direct and firm directions to warn offenders but they are always polite. The city has three CCTV operators who sit in the main control room monitoring the cameras. Offenders are asked to pick up rubbish, told to leave an area for loitering or sent the verbal warning 'we are watching you'. But some people are concerned that projects like this infringe upon the public's civil liberties. They argue that Britain has a huge privacy invasion problem and projects like this one will only serve to make people paranoid. Middlesbrough Council and the city's police have worked closely on the project. Police officers say the new CCTV cameras act as a deterrent to people thinking about committing crime. Council officials claim the cameras reassure the public that crime and antisocial behaviour are being impeded. They claim a 100% success rate for the CCTV project and are planning to invest in seven more cameras by the end of the year. Even if the talking cameras are preventing crime, one factor that is sure to become an issue is whether law-abiding citizens going about their business will want to hear an amplified running commentary regarding misdemeanors carried out in the immediate area. That's why police officers on the ground are still regarded as important. A report published in November 2006 found that there are an estimated 5 million closed-circuit television cameras in Britain. That's 20% of the world's total, one camera for every 12 people. The report was produced by a group of academics called the Surveillance Studies Network and was commissioned by the UK's Information Commission. The British capital is also monitored from a state-of-the-art CCTV control centre which operates 24 hours a day every day. The latest cameras here can recognise car registration numbers and even faces, but recent studies show they have done little to reduce crime. The UK's Information Commissioner Richard Thomas instigated the new report into the growing number of security cameras. And now he says there should be a public debate in Britain on the future of surveillance. The report predicts that by 2016 surveillance will be even more common. However, Metropolitan Police Superintendent David Morgan says that they do help police to respond to emergencies faster. The growth of CCTV surveillance in Britain has been rapid in recent years. The Information Commissioner's office is an independent body that has a legal duty to promote public access to official information and to protect personal details. However, we are constantly told we live in a new age of terrorism and many may feel reassured about the people watching our lives. Night vision images of the apprehension of people who have illegally crossed the United States' southern border. Now, the US government is hoping to go high-tech in order to improve national security and stem the flow of illegal immigrants. The world's largest aerospace company Boeing has just won a large contract to install a high-tech virtual fence along the Mexican border with Arizona. The Border Patrol's Tucson sector encompasses about three-quarters of the Arizona-Mexico border and has long been the nation's busiest entry point for illegal immigrants. The new contract calls for the use of cameras, sensors and even unmanned planes. America's Homeland Security Secretary Michael Cheartoff says the program is just one of the many steps the department is taking to reduce illegal immigration. Boeing was among several major defense contractors competing for the job. While other companies relied on using flying drones to patrol the border, Boeing focused on a network of up to 1,800 high-tech towers equipped with cameras, motion detectors and radar. And then security's aim is to build a 21st-century virtual fence to be placed on a 45-kilometer stretch of border near Tucson. Pilotless aircraft will also play a part in the program. The US is concerned that people other than poor unemployed Mexicans could be trying to gain access to the country through what is seen as a weak spot. The final cost for the secure border initiative is unknown, but industry experts say it could exceed two billion US dollars over six years. One advantage of airborne security platforms is their ability to monitor suspicious vehicles or even boats over long distances. When equipped with infrared cameras, they can easily track vehicles in the dead of night. Boeing and its corporate partners are expected to begin operating a Tucson-area project in months. The president of the National Border Patrol Council, the union that represents border agents, said he was skeptical of any plan that relies on technology. He believes that the US Congress needs to pass legislation to stop the employment magnet that brings illegal immigrants from Mexico to the United States. On a remote military base in the Mojave Desert in California, forces have gathered from the US, UK, Canada and Australia to test their data sharing abilities. The military call it the Empire Challenge, and it's designed to test techniques for intelligence planes to ingest, compress and pass on data to all of the nations involved. There could be a full motion video from a surveillance aircraft like the RAF's Nimrod that can be distributed to a ground station for dissemination to soldiers in the field. The focus of the exercise is to make sure information can be sent in a common fashion directly to workers on the ground. Mobile ground stations have been set up to test-receive the surveillance data. The RAF is proclaiming first in real-time data sharing between the coalition partners. The exercise is also set up to verify that the data can be received securely by all of the partners. It's important that intelligence information is not able to be intercepted by any outside parties. The US showed off its unmanned surveillance vehicle from Boeing, which is called the Scann Eagle. It's a small, propeller-driven aircraft which can fly for 15 hours and has a camera mounted in a forward turret. Ultimately, the aim is to use these new techniques in real military situations. The HMS 7 is one of the Royal Navy's Riverclass offshore patrol vessels. As part of the Fishery's protection fleet, it has a wide range of duties patrolling the seas around Britain. The UK has one of the largest fishing fleets in Europe and some of the richest fishing grounds. Fishing raises hundreds of millions of pounds for the UK economy every year, and the Royal Navy is entrusted with the important role of protecting both fishermen and fish stocks. The Royal Navy Fishery's protection fleet has to keep a close eye on all fishing vessels to make sure they're sticking to their quotas. Sustainable fishing is essential to maintaining fish stocks for future generations, and the industry must be tightly controlled to prevent overfishing. The highly trained crew of the HMS 7 conducts patrols around British waters in all weather conditions, including forced nine gales, often for weeks at a time. As the Royal Navy fleet has a constant presence in UK waters, they're often called upon to help in times of crisis. Fishery's protection is one of the many vital tasks undertaken by the Royal Navy. Around the world, there are many other key roles where the British Navy is called upon for its expertise. HMS 7 has been moored on the Thames in London as part of a goodwill exercise. North Korea's capital, Pyongyang, is a showpiece city filled with monuments glorifying its ruling socialist regime. The North Korean government still focuses on the fight against the USA, dating back to the Korean War in the early 1950s. One interesting Pyongyang landmark is the captured U.S. Navy spy ship Pueblo. In 1968, the North Korean Navy seized the Pueblo in North Korean waters. Since 1998, it has been moored on Pyongyang's Taedong River. School children are regularly brought to visit the ship. Park in Ho, a veteran involved in the capture of the spy ship, now has the job of telling visitors the Pueblo story. On board the Pueblo, visiting school children see the ship's flag and other memorabilia displayed together with a room full of electronic listening equipment. The United States Navy acknowledges that the Pueblo was involved in the electronic intelligence collection but denies that it violated North Korea's territorial waters. Park in Ho shows visitors bullet holes from gunfire when the North Korean Navy boarded the ship. This year, the government put a new piece of naval hardware on display. It is said to be a U.S. unmanned mini spy submarine captured off the North Korean coast in 2004. The spy submarine looks like a torpedo, but a U.S. military spokesman said there is no way of verifying whether it is a U.S. vessel. North Korea held the Pueblo's crew captive for 11 months before expelling them. At schools in North Korea, children are surrounded by images depicting the U.S. as an aggressor. Posters show U.S. missiles aimed at Korea while other posters list alleged U.S. crimes. The population is told that America started the Korean War and that it ended with a North Korean victory. North Koreans are told from an early age that the U.S. is an imperialist aggressor. Another major Pyongyang landmark is the Fatherland Liberation War Museum. The museum dedicated to the remembrance of the war that is technically still only in a ceasefire. As well as artifacts from the 1950s conflict, the museum contains the documents and displays about the Pueblo and other incidents demonstrating the government's stance. Relations between North Korea and the U.S. have started to thaw recently with a new agreement regarding North Korea's stopping its high-end nuclear program in return for much-needed fuel oil, but both sides remain wary. A little more than 20 years ago, this smudgy piece of X-ray film was the first DNA fingerprint. It was a breakthrough, used first in a 1985 case to prevent a boy from being deported from the U.K. The ability to compare individuals DNA became an indispensable technique. A technique was used to independently verify the origin of Don the first clone ship. Zar Nicholas, his wife Zarina and their five children were shot in 1918 by Bolshevik revolutionaries. There was a long-running debate about the identity of the bodies dug up after the fall of the Soviet Union. DNA testing was used to prove beyond doubt that the bodies were those of the Russian royal family. DNA and human tissue, such as blood or hair, is converted into a pattern of lines like a barcode. Then it's just a matter of comparing the results to find a match. The chances of an incorrect match are just one in a bull. From DNA identification to footprint identification, it's a new forensic tool being pressed into service in the U.K. Police forces and forensic services across the country have started piloting the new FIT online footwear database program. New legislation has given British police forces the power to take and keep footwear impressions from any person they have arrested. Footprint impressions can now be used as evidence in a court of law. The FIT database is a store of these footprint impressions. Footwear prints are a difficult evidence time to catalogue as there are no uniform patterns or characteristics, but for forensic services, hope the FIT computer system will have a significant impact on the number of convictions in the U.K. Shoe prints can be taken from crime scenes, studied in laboratories, then entered into the database. The police can then log on to the database and identify shoe prints from more than 4,000 profiles. The new FIT program is two systems in one. One section will index all known footwear patterns by their characteristics and name. The second section will link known criminal shoe prints to shoe prints found at crime scenes. The FIT computer system allows the user to search for shape, length and make of shoe along with any distinctive wear patterns. Wear marks are the second most common type of evidence left by criminals. By the end of the program's trial, more than 14,000 prints will have been archived. Daniel Craig plays the world's most famous spy, James Bond, in the blockbuster movie Casino Royale. The secret agent has access to the latest spy gadgets. Now there's a growing demand for real-life spy gadgets, especially in Hollywood. When cameras hidden in ties and brooches to hidden microphones, the Hollywood spy shop sells a range of personal espionage equipment. The manager Peter Ong Rang says his main customers are women concerned that their man has been unfaithful. He tells them if you suspect your partner is cheating, he probably is. Major cameras or microphones can be embedded inside small ordinary objects, such as glasses, ties, buttons, brooches or pens. The store also offers a variety of other electrical accessories ranging from night vision security cameras to intricate vehicle alarms and even air pressure sensors. This ordinary looking tie has a video camera built into it. Due to the technology of the shop is designed to function with the internet, and one of the store's most popular products is a small surveillance camera that can be placed anywhere and connected wirelessly to the internet. Using a password, an observer can log on and see the target area 24 hours a day. However, this type of observation can be a serious invasion of privacy and it may trigger several laws concerning the expectation of privacy. This bugged phone jack and a similar power board are illegal. In most places in the United States, it is illegal for members of the public to record people without their consent and buyers of this type of secret surveillance systems are advised that the technology should be used wisely. Belgium plans to issue electronic identification cards for the under-12s to help reunite lost children with their parents. Kockelberg is one of the municipalities participating in the Pilot Child ID card scheme where parents can request an electronic identification card. If a child goes missing a parent dials a number on the back of the card, enters the child ID card number and are given up to 7 phone numbers in the order in which they should be called. If no one answers the last number to ring is that of child focus, a 24-hour call centre. Over the past decade or so, Belgium has suffered from a string of child abductions that have ended in tragedy. The Mayor of Kockelberg is pleased to be taking part in the Pilot scheme and hopes that the child ID cards will be introduced nationwide. Child Focus says the child ID card may also help protect children on the web by denying access to unwanted persons trying to enter children's chat rooms. There are a number of protected chat sites that only work when this card is employed. This site is guaranteed that there is nobody over 18 able to get access. Internet chat rooms are popular worldwide and problems with predatory adults, masquerading online friends have commonly led to inappropriate contact, sometimes ending in disaster. This new ID card will allow children to enjoy this simple past time and safety, but its prime function is to quickly alert a wide range of people in the community if a child goes missing. In the summer of 2006, Belgium was shot by the disappearance of two young girls, Natalie May and Stacey Lemons in the eastern city of Leige. Their bodies were later found stuffed into a storm drain. Their deaths revived painful memories for Belgians. Riela Costa was trying to sell her car on eBay when she got a notice from the online auctioneer saying her account was about to be suspended. The message went on to say that to prevent the suspension she needed to verify some particulars. She sent her credit card, bank accounts, social security and PIN numbers only to learn that suspension notice was not from eBay but from an imposter. La Costa had been conned. Many thieves set up phony websites, usually impersonating banks or internet service providers, then send out emails hoping to dupe recipients into divulging personal information. It's called phishing and some of the bogus websites are put up and taken down within hours. Last year 1.8 million online consumers took the bait, half of them became victims of financial fraud and identity theft. The first security Europe at London's Olympia recently presented the latest in cyber security. Keeping information secure is important. Computer Associates provides technology to Formula One team McLaren to enable them to secure their real-time data flow between their cars on the track and the pits. The principal and the technology is the same for users at home or for smaller-scale businesses. The common complaint is spam or unsolicited email, but what most people don't realise is that their computer can be caught up in a mass mailout designed to clog corporate systems. Far from being a petty annoyance, large-scale spam exercises can amount to sabotage. One fundamental rule is to keep information secure, whether you're a home user or a global corporation. To order a DVD or video of this program, call 1-800-876-2447. Or visit our website at www.chiptailer.com.