There are times and situations when security executives or law enforcement need to mount a covert investigation or monitoring event that may include cameras, sometimes infrared and low light, or audio.
Not personal spy cameras or listen-in devices, which may have legal ramifications and are geared to consumers, enterprises use covert technology to protect assets and alert to intrusions. One example is an infrared camera connected to a PIR motion detector that alerts to intrusion and sends video via cellular to a monitoring service or end user.