Mass Surveillance
   HOME

TheInfoList



OR:

Mass surveillance is the intricate
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by
local Local may refer to: Geography and transportation * Local (train), a train serving local traffic demand * Local, Missouri, a community in the United States Arts, entertainment, and media * ''Local'' (comics), a limited series comic book by Bria ...
and
federal government A federation (also called a federal state) is an entity characterized by a political union, union of partially federated state, self-governing provinces, states, or other regions under a #Federal governments, federal government (federalism) ...
s or
governmental organizations A government agency or state agency, sometimes an appointed commission, is a permanent or semi-permanent organization in the machinery of government (bureaucracy) that is responsible for the oversight and administration of specific functions, s ...
, but it may also be carried out by corporations (either on behalf of governments or at their own initiative). Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of
totalitarian regimes These are examples of purported totalitarian regimes. They have been referred to in an academic context as "totalitarian", or the concept of totalitarianism has been applied to them. Totalitarian regimes are usually distinguished from authorita ...
. It is often distinguished from
targeted surveillance Targeted surveillance (or targeted interception) is a form of surveillance, such as wiretapping, that is directed towards specific persons of interest, and is distinguishable from mass surveillance (or bulk interception). Both untargeted and target ...
. Mass surveillance has often been cited by agencies like the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA) as necessary to fight
terrorism Terrorism, in its broadest sense, is the use of violence against non-combatants to achieve political or ideological aims. The term is used in this regard primarily to refer to intentional violence during peacetime or in the context of war aga ...
, prevent
crime In ordinary language, a crime is an unlawful act punishable by a State (polity), state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definiti ...
and
social unrest Civil disorder, also known as civil disturbance, civil unrest, civil strife, or turmoil, are situations when law enforcement and security forces struggle to Public order policing, maintain public order or tranquility. Causes Any number of thin ...
, protect
national security National security, or national defence (national defense in American English), is the security and Defence (military), defence of a sovereign state, including its Citizenship, citizens, economy, and institutions, which is regarded as a duty of ...
, and control the population. At the same time, mass surveillance has equally often been criticized for violating
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
rights, limiting civil and political rights and freedoms, and being illegal under some legal or constitutional systems. Another criticism is that increasing mass surveillance could potentially lead to the development of a surveillance state, an electronic police state, or a totalitarian state wherein
civil liberties Civil liberties are guarantees and freedoms that governments commit not to abridge, either by constitution, legislation, or judicial interpretation, without due process. Though the scope of the term differs between countries, civil liberties of ...
are infringed or
political dissent Political dissent is a dissatisfaction with or opposition to the policies of a governing body. Expressions of dissent may take forms from vocal disagreement to civil disobedience to the use of violence.COINTELPRO COINTELPRO (a syllabic abbreviation derived from Counter Intelligence Program) was a series of covert and illegal projects conducted between 1956 and 1971 by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltr ...
-like programs. In 2013, the practice of mass surveillance by world governments was called into question after
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
's 2013 global surveillance disclosure on the practices utilized by the NSA of the United States. Reporting based on documents Snowden leaked to various media outlets triggered a debate about civil liberties and the
right to privacy The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 185 national constitutions mention the right to privacy. Since the globa ...
in the
Digital Age The Information Age is a History by period, historical period that began in the mid-20th century. It is characterized by a rapid shift from traditional industries, as established during the Industrial Revolution, to an economy centered on info ...
. Mass surveillance is considered a global issue.
The Aerospace Corporation The Aerospace Corporation is an American nonprofit corporation that operates a federally funded research and development center (FFRDC). The corporation provides technical guidance and advice on all aspects of space missions to military, civil ...
of the United States describes a near-future event, the GEOINT Singularity, in which everything on Earth will be monitored at all times, analyzed by
artificial intelligence Artificial intelligence (AI) is the capability of computer, computational systems to perform tasks typically associated with human intelligence, such as learning, reasoning, problem-solving, perception, and decision-making. It is a field of re ...
systems, and then redistributed and made available to the general public globally in real time.


By country

Privacy International Privacy International (PI) is a UK-based registered charity that defends and promotes the right to privacy across the world. First formed in 1990, registered as a non-profit company in 2002 and as a charity in 2012, PI is based in London. Its ...
's 2007 survey, covering 47 countries, indicated that there had been an increase in surveillance and a decline in the performance of privacy safeguards, compared to the previous year. Balancing these factors, eight countries were rated as being 'endemic surveillance societies'. Of these eight,
China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
,
Malaysia Malaysia is a country in Southeast Asia. Featuring the Tanjung Piai, southernmost point of continental Eurasia, it is a federation, federal constitutional monarchy consisting of States and federal territories of Malaysia, 13 states and thre ...
and
Russia Russia, or the Russian Federation, is a country spanning Eastern Europe and North Asia. It is the list of countries and dependencies by area, largest country in the world, and extends across Time in Russia, eleven time zones, sharing Borders ...
scored lowest, followed jointly by
Singapore Singapore, officially the Republic of Singapore, is an island country and city-state in Southeast Asia. The country's territory comprises one main island, 63 satellite islands and islets, and one outlying islet. It is about one degree ...
and the
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of European mainland, the continental mainland. It comprises England, Scotlan ...
, then jointly by
Taiwan Taiwan, officially the Republic of China (ROC), is a country in East Asia. The main geography of Taiwan, island of Taiwan, also known as ''Formosa'', lies between the East China Sea, East and South China Seas in the northwestern Pacific Ocea ...
,
Thailand Thailand, officially the Kingdom of Thailand and historically known as Siam (the official name until 1939), is a country in Southeast Asia on the Mainland Southeast Asia, Indochinese Peninsula. With a population of almost 66 million, it spa ...
and the
United States The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
. The best ranking was given to
Greece Greece, officially the Hellenic Republic, is a country in Southeast Europe. Located on the southern tip of the Balkan peninsula, it shares land borders with Albania to the northwest, North Macedonia and Bulgaria to the north, and Turkey to th ...
, which was judged to have 'adequate safeguards against abuse'. Many countries throughout the world have already been adding thousands of surveillance cameras to their urban, suburban and even rural areas. For example, in September 2007 the
American Civil Liberties Union The American Civil Liberties Union (ACLU) is an American nonprofit civil rights organization founded in 1920. ACLU affiliates are active in all 50 states, Washington, D.C., and Puerto Rico. The budget of the ACLU in 2024 was $383 million. T ...
(ACLU) stated that we are "in danger of tipping into a genuine surveillance society completely alien to American values" with "the potential for a dark future where our every move, our every transaction, our every communication is recorded, compiled, and stored away, ready to be examined and used against us by the authorities whenever they want". On 12 March 2013,
Reporters Without Borders Reporters Without Borders (RWB; ; RSF) is an international non-profit and non-governmental organisation, non-governmental organization headquartered in Paris, which focuses on safeguarding the right to freedom of information. It describes its a ...
published a ''Special report on Internet Surveillance''. The report included a list of "State Enemies of the Internet", countries whose governments are involved in active, intrusive surveillance of news providers, resulting in grave violations of freedom of information and human rights. Five countries were placed on the initial list:
Bahrain Bahrain, officially the Kingdom of Bahrain, is an island country in West Asia. Situated on the Persian Gulf, it comprises a small archipelago of 50 natural islands and an additional 33 artificial islands, centered on Bahrain Island, which mak ...
,
China China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
,
Iran Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
,
Syria Syria, officially the Syrian Arab Republic, is a country in West Asia located in the Eastern Mediterranean and the Levant. It borders the Mediterranean Sea to the west, Turkey to Syria–Turkey border, the north, Iraq to Iraq–Syria border, t ...
(until December 2024), and
Vietnam Vietnam, officially the Socialist Republic of Vietnam (SRV), is a country at the eastern edge of mainland Southeast Asia, with an area of about and a population of over 100 million, making it the world's List of countries and depende ...
.''The Enemies of the Internet Special Edition : Surveillance''
, Reporters Without Borders, 12 March 2013


Australia


Bahrain

Bahrain Bahrain, officially the Kingdom of Bahrain, is an island country in West Asia. Situated on the Persian Gulf, it comprises a small archipelago of 50 natural islands and an additional 33 artificial islands, centered on Bahrain Island, which mak ...
is one of the five countries on Reporters Without Borders' March 2013 list of "State Enemies of the Internet", countries whose governments are involved in active, intrusive surveillance of news providers, resulting in grave violations of freedom of information and human rights. The level of Internet filtering and surveillance in Bahrain is one of the highest in the world. The royal family is represented in all areas of Internet management and has sophisticated tools at its disposal for spying on its subjects. The online activities of dissidents and news providers are closely monitored and the surveillance is increasing. Media reports published in July 2021 exposed the use of
NSO Group NSO Group Technologies (NSO standing for Niv, Shalev and Omri, the names of the company's founders) is an Israeli cyber-intelligence firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click surveillance ...
's phone malware software,
Pegasus Pegasus (; ) is a winged horse in Greek mythology, usually depicted as a white stallion. He was sired by Poseidon, in his role as horse-god, and foaled by the Gorgon Medusa. Pegasus was the brother of Chrysaor, both born from Medusa's blood w ...
, for spying on rights activists, lawyers, and journalists, globally, by authoritarian governments. Bahrain was among the many countries listed as the Israeli firm's clients accused of hacking and conducting unauthorized mass surveillance using phone malware despite a poor human rights record. The software is said to infect devices, allowing its operators to get access to the target's messages, photos, record calls, and activate the microphone and camera.


Canada


China


East Germany

Before the Digital Revolution, one of the world's biggest mass surveillance operations was carried out by the
Stasi The Ministry for State Security (, ; abbreviated MfS), commonly known as the (, an abbreviation of ), was the Intelligence agency, state security service and secret police of East Germany from 1950 to 1990. It was one of the most repressive pol ...
, the
secret police image:Putin-Stasi-Ausweis.png, 300px, Vladimir Putin's secret police identity card, issued by the East German Stasi while he was working as a Soviet KGB liaison officer from 1985 to 1989. Both organizations used similar forms of repression. Secre ...
of the former
East Germany East Germany, officially known as the German Democratic Republic (GDR), was a country in Central Europe from Foundation of East Germany, its formation on 7 October 1949 until German reunification, its reunification with West Germany (FRG) on ...
. By the time the state collapsed in 1989, the Stasi had built up an estimated civilian network of 189,000 informants, who monitored even minute hints of political dissent among other citizens. Many West Germans visiting friends and family in East Germany were also subject to Stasi spying, as well as many high-ranking West German politicians and persons in the public eye. Most East German citizens were well aware that their government was spying on them, which led to a culture of mistrust: touchy political issues were only discussed in the comfort of their own four walls and only with the closest of friends and family members, while widely maintaining a façade of unquestioning followership in public.


European Union

The right to
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
is a highly developed area of law in Europe. The Data Protection Directive used to regulate the processing of personal data within the
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are Geography of the European Union, located primarily in Europe. The u ...
, before it was replaced by the
GDPR The General Data Protection Regulation (Regulation (EU) 2016/679), abbreviated GDPR, is a European Union regulation on information privacy in the European Union (EU) and the European Economic Area (EEA). The GDPR is an important component of ...
. For comparison, the US has no data protection law that is comparable to this; instead, the US regulates data protection on a sectoral basis. Since early 2012, the European Union has been working on a
General Data Protection Regulation The General Data Protection Regulation (Regulation (EU) 2016/679), abbreviated GDPR, is a European Union regulation on information privacy in the European Union (EU) and the European Economic Area (EEA). The GDPR is an important component of ...
to replace the Data Protection Directive and harmonise data protection and privacy law. On 20 October 2013, a committee at the
European Parliament The European Parliament (EP) is one of the two legislative bodies of the European Union and one of its seven institutions. Together with the Council of the European Union (known as the Council and informally as the Council of Ministers), it ...
backed the measure, which, if it is enacted, could require American companies to seek clearance from European officials before complying with United States warrants seeking private data. The vote is part of efforts in Europe to shield citizens from online surveillance in the wake of revelations about a far-reaching spying program by the U.S. National Security Agency. European Union justice and rights commissioner Viviane Reding said "The question has arisen whether the large-scale collection and processing of personal information under US surveillance programmes is necessary and proportionate to meet the interests of national security." The EU is also asking the US for changes to US legislation to match the legal redress offered in Europe; American citizens in Europe can go to the courts if they feel their rights are infringed but Europeans without right of residence in America cannot. When the EU / US arrangement to implement International Safe Harbor Privacy Principles were struck down by the European Court of Justice, a new framework for transatlantic data flows, called the " EU-US Privacy Shield", was adopted in July 2016. The
legislative body A legislature (, ) is a deliberative assembly with the legal authority to make laws for a political entity such as a country, nation or city on behalf of the people therein. They are often contrasted with the executive and judicial powers o ...
of the
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are Geography of the European Union, located primarily in Europe. The u ...
passed the Data Retention Directive on 15 December 2005. It required that telecommunication operators retain metadata for telephone, Internet, and other telecommunication services for periods of not less than six months and not more than two years from the date of the communication as determined by each EU member state and, upon request, to make the data available to various governmental bodies. Access to this information is not limited to investigation of serious crimes, nor was a warrant required for access. In April 2014, the European Court of Justice declared invalid the EU Data Retention Directive. The Court said it violates two basic rights – respect for private life and protection of personal data. Undertaken under the ''
Seventh Framework Programme The Framework Programmes for Research and Technological Development, also called Framework Programmes or abbreviated FP1 to FP9, are funding programmes created by the European Union/European Commission to support and foster research in the Europe ...
'' ''for research and technological development'' (FP7 - Science in Society) some multidisciplinary and mission oriented mass surveillance activities (for example INDECT an
HIDE
were funded by the
European Commission The European Commission (EC) is the primary Executive (government), executive arm of the European Union (EU). It operates as a cabinet government, with a number of European Commissioner, members of the Commission (directorial system, informall ...
in association with industrial partners. The INDECT Project ("Intelligent information system supporting observation, searching and detection for security of citizens in urban environment")INDECT project homepage
, AGH - University of Science and Technology (Poland). Retrieved 17 September 2013.
develops an intelligent urban environment observation system to register and exchange operational data for the automatic detection, recognition and intelligent processing of all information of abnormal behaviour or violence."INDECT: Intelligent information system supporting observation, searching and detection for security of citizens in urban environment"
, EU Research Projects, Community Research and Development Information Service (CORDIS), European Commission, 4 September 2013. Retrieved 17 September 2013.

Ian Johnston, ''The Telegraph'' (UK), 19 September 2009. Retrieved 17 September 2013.
The main expected results of the INDECT project are: * Trial of intelligent analysis of video and audio data for threat detection in urban environments, * Creation of tools and technology for privacy and data protection during storage and transmission of information using quantum cryptography and new methods of digital watermarking, * Performing computer-aided detection of threats and targeted crimes in Internet resources with privacy-protecting solutions, * Construction of a search engine for rapid semantic search based on watermarking of content related to child pornography and human organ trafficking, * Implementation of a distributed computer system that is capable of effective intelligent processing. HIDE ("Homeland Security, Biometric Identification & Personal Detection Ethics") was a research project funded by the European Commission within the scope of the Seventh RTD Framework Programme (FP7). The consortium, coordinated by Emilio Mordini, explored the
ethical Ethics is the philosophical study of moral phenomena. Also called moral philosophy, it investigates normative questions about what people ought to do or which behavior is morally right. Its main branches include normative ethics, applied e ...
and
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
implications of
biometrics Biometrics are body measurements and calculations related to human characteristics and features. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used t ...
and personal detection technologies, focusing on the continuum between personal detection, authentication, identification and mass surveillance.


France


Germany

In 2002 German citizens were tipped off about wiretapping when a software error led to a phone number allocated to the German Secret Service being listed on mobile telephone bills.


India

The Indian parliament passed the Information Technology Act of 2008 with no debate, giving the government fiat power to tap all communications without a court order or a warrant. Section 69 of the act states "Section 69 empowers the Central Government/State Government/ its authorized agency to intercept, monitor or decrypt any information generated, transmitted, received or stored in any computer resource if it is necessary or expedient so to do in the interest of the sovereignty or integrity of India, defence of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence or for investigation of any offence." India is setting up a national intelligence grid called NATGRID, which would be fully set up by May 2011 where each individual's data ranging from land records, Internet logs, air and rail PNR, phone records, gun records, driving license, property records, insurance, and income tax records would be available in real time and with no oversight. With a UID from the Unique Identification Authority of India being given to every Indian from February 2011, the government would be able track people in real time. A national population registry of all citizens will be established by the 2011 census, during which fingerprints and iris scans would be taken along with GPS records of each household. As per the initial plan, access to the combined data will be given to 11 agencies, including the Research and Analysis Wing, the Intelligence Bureau, the
Enforcement Directorate The Enforcement Directorate (ED) is a law enforcement and economic intelligence agency of the Government of India. Established on 1 May 1956, it is responsible for enforcing economic laws and combating financial crimes. The ED operates under th ...
, the
National Investigation Agency The National Investigation Agency (NIA) is the principal counter-terrorism law enforcement agency in India. Established under the National Investigation Agency Act, 2008, it is tasked with investigating and combating offenses related to terroris ...
, the
Central Bureau of Investigation The Central Bureau of Investigation (CBI) is the domestic crime investigating agency of India. It operates under the jurisdiction of the Ministry of Personnel, Public Grievances and Pensions. Originally set up to investigate bribery and gover ...
, the Directorate of Revenue Intelligence and the Narcotics Control Bureau. Several states within India have already installed CCTV surveillance systems with face matching capabilities using biometrics in Aadhaar. Andhra Pradesh and Telangana are using information linked with Aadhaar across different agencies to create a 360-degree profile of a person, calling it the Integration Information Hub. Other states are now planning to follow this model.


Iran

Iran Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
is one of the five countries on Reporters Without Borders' March 2013 list of "State Enemies of the Internet", countries whose governments are involved in naturally active efforts to news providers . The government runs or controls almost all of the country's institutions for regulating, managing or legislating on telecommunications. The Supreme Council for Cyberspace, which was headed by President Ahmadinejad, was established in March 2012 and now determines digital policy. The construction of a parallel "Iranian Internet", with a high connection speed but fully monitored and censored, is almost complete. The tools used by the Iranian authorities to monitor and control the Internet include data interception tools capable of
deep packet inspection Deep packet inspection (DPI) is a type of data processing that inspects in detail the data (Network packet, packets) being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep ...
. Interception products from leading Chinese companies such as ZTE and
Huawei Huawei Technologies Co., Ltd. ("Huawei" sometimes stylized as "HUAWEI"; ; zh, c=华为, p= ) is a Chinese multinational corporationtechnology company in Longgang, Shenzhen, Longgang, Shenzhen, Guangdong. Its main product lines include teleco ...
are in use. The products provided by Huawei to Mobin Net, the leading national provider of mobile broadband, can be used to analyze email content, track browsing history and block access to sites. The products that ZTA sold to the Telecommunication Company of Iran (TCI) offer similar services plus the possibility of monitoring the mobile network. European companies are the source of other spying and data analysis tools. Products designed by
Ericsson (), commonly known as Ericsson (), is a Swedish multinational networking and telecommunications company headquartered in Stockholm, Sweden. Ericsson has been a major contributor to the development of the telecommunications industry and is one ...
and Nokia Siemens Networks (later Trovicor) are in use. These companies sold
SMS Short Message Service, commonly abbreviated as SMS, is a text messaging service component of most telephone, Internet and mobile device systems. It uses standardized communication protocols that let mobile phones exchange short text messages, t ...
interception and user location products to Mobile Communication Company of Iran and Irancell, Iran's two biggest mobile phone companies, in 2009 and they were used to identify Iranian citizens during the post-election uprising in 2009. The use of Israeli surveillance devices has also been detected in Iran. The network traffic management and surveillance device NetEnforcer was provided by Israel to Denmark and then resold to Iran. Similarly, US equipment has found its way to Iran via the Chinese company ZTE. In September 2023 The Iranian government approved a law enabling it to have instant undeniable access every single thing in digital online life of citizens including location /photos, data and other vital record tied to people's real identity, The persistent monitoring system is part of Iranian seventh quinquennial development program bill package.


Malaysia

In July 2018, the Malaysian police announced the creation of the Malaysian Intercept Crimes Against Children Unit (icacu) that is equipped with real-time mass internet surveillance software developed in the United States and is tasked with the monitoring of all Malaysian internet users, with a focus on pornography and child pornography. The system creates a "data library" of users which includes details such as IP addresses, websites, locations, duration and frequency of use and files uploaded and downloaded.


Mexico

After struggling with drug trafficking and criminal groups for decades Mexico has been strengthening their military mass surveillance. Approximately half of the population in Mexico does not support democracy as a form of government, and believe an authoritarian system is better if social matters are solved through it. The relevance of these political beliefs may make it easier for mass surveillance to spread within the country. "This does not necessarily mean the end of democratic institutions as a whole—such as free elections or the permanence of critical mass media—but it means strengthening the mechanisms for exercising power that exclude dialogue, transparency and social agreement."


Netherlands

According to a 2003 report, the Netherlands has the second highest number of wiretaps per capita in the Western world. The Dutch military intelligence service MIVD operates a satellite ground station to intercept foreign satellite links and also a facility to eavesdrop on foreign high-frequency radio traffic. An example of mass surveillance carried out by corporations in the Netherlands is an initiative started by five Dutch banks (ABN AMRO, ING, Rabobank, Triodos Bank and de Volksbank). In July 2020 these five banks have decided to establish Transaction Monitoring Netherlands (TMNL) in the collective fight against money laundering and the financing of terrorism. The goal of TMNL-organization is to gather all transaction information provided by Dutch banks in a centralized database to enable full-scale collective transaction monitoring. Preparations have been started but the actual monitoring by TMNL can start after an amendment of the Dutch Anti-Money Laundering and Anti-Terrorist Financing Act.


North Korea

Having attained the nickname 'surveillance state', North Korea's government has complete control over all forms of telecommunications and Internet. It is routine to be sent to a prison camp for communicating with the outside world. The government enforces restrictions around the types of appliances North Koreans may own in their home, in case radio or TV sets pick up signals from nearby South Korea, China and Russia. There is no attempt to mask the way this government actively spies on their citizens. In North Korea, an increasing number of citizens do have smartphones. However, these devices are heavily controlled and are being used to censor and observe everything North Koreans do on their phones. Reuters reported in 2015 that Koryolink, North Korea's official mobile phone network, has around 3 million subscribers in a country of 24 million.


Russia

The SORM (and SORM-2) laws enable complete monitoring of any
communication Communication is commonly defined as the transmission of information. Its precise definition is disputed and there are disagreements about whether Intention, unintentional or failed transmissions are included and whether communication not onl ...
, electronic or traditional, by eight state agencies, without warrant. These laws seem to be in conflict with Article 23 of the
Constitution of Russia The Constitution of the Russian Federation () was adopted by national referendum on 12 December 1993 and enacted on 25 December 1993. The latest significant reform occurred in 2020, marked by extensive amendments that altered various sections ...
which states:"Chapter 2. Rights and Freedoms of Man And Citizen"
''Constitution of Russia''. Retrieved 17 September 2013.
# Everyone shall have the right to the inviolability of private life, personal and family secrets, the protection of honour and good name. # Everyone shall have the right to privacy of correspondence, of telephone conversations, postal, telegraph and other messages. Limitations of this right shall be allowed only by court decision.
In 2015, the European Court for Human Rights ruled that the legislation violated
Article 8 of the European Convention on Human Rights Article 8 of the European Convention on Human Rights provides a right to respect for one's " private and family life, his home and his correspondence", subject to certain restrictions that are "in accordance with law" and "necessary in a democrat ...
('' Zakharov v. Russia''). СAMERTON is a global vehicle tracking system, control and tracking, identification of probable routes and places of the most frequent appearance of a particular vehicle, integrated with a distributed network of radar complexes of photo-video fixation and road surveillance camera. Developed and implemented by th
"Advanced Scientific - Research Projects"
enterprise St. Petersburg. Within the framework of the practical use of the system of the Ministry of Internal Affairs of the Russian Federation, it has made it possible to identify and solve grave and especially grave crimes, the system is also operated by other state services and departments;


Singapore

Singapore Singapore, officially the Republic of Singapore, is an island country and city-state in Southeast Asia. The country's territory comprises one main island, 63 satellite islands and islets, and one outlying islet. It is about one degree ...
is known as a city of sensors. Singapore's surveillance structure spreads widely from
closed-circuit television Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific place on a limited set of monitors. It differs from broadcast television in that the signa ...
(CCTV) in public areas even around the neighbourhood, internet monitoring/traffic monitoring and to the use of surveillance
metadata Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive ...
for government initiatives. In Singapore, SIM card registration is mandatory even for prepaid card. Singapore's government have the rights to access communication data. Singapore's largest telecompany,
Singtel Singapore Telecommunications Limited, trading as Singtel, is a Singaporean telecommunications conglomerate, the country's principal fixed-line operator and one of the four major mobile network operators operating in the country. Overview T ...
, has close relations to the government and Singapore's laws are broadly phrased to allow the government to obtain sensitive data such as text-messages, email, call logs, and web surfing history from its people without the need for court permission. The installation of mass surveillance cameras in Singapore is an effort to act as a deterrence not only for terror attacks but also for public security such as loan sharks, illegal parking, and more. As part of Singapore's Smart Nation initiative to build a network of sensors to collect and connect data from city life (including the citizen's movement), the Singapore government rolled out 1000 sensors ranging from computer chips to surveillance cameras, to track almost everything in Singapore from air quality to public safety in 2014. In 2016, in a bid to increase security, the
Singapore Police Force The Singapore Police Force (SPF) is the national and principal Police, law enforcement agency responsible for the prevention of crime and law enforcement in the Republic of Singapore. It is the country's lead agency against organised crime; hum ...
installed 62,000 police cameras in 10,000
Housing and Development Board The Housing & Development Board (HDB; often referred to as the Housing Board; ; ; ), is a Statutory boards of the Singapore Government, statutory board under the Ministry of National Development (Singapore), Ministry of National Developmen ...
(HDB) blocks covering the lifts and multi-storey car parks. With rising security concerns, the number of CCTV cameras in public areas such as monitoring of the public transport system and commercial/ government buildings in Singapore is set to increase. In 2018, the Singapore government rolled out new and more advanced surveillance systems. Starting with Singapore's maritime borders, new panoramic electro-optic sensors were put in place on the north and south coasts, monitoring a 360-degree view of the area. A tethered
unmanned aerial vehicle An unmanned aerial vehicle (UAV) or unmanned aircraft system (UAS), commonly known as a drone, is an aircraft with no human pilot, crew, or passengers onboard, but rather is controlled remotely or is autonomous.De Gruyter Handbook of Dron ...
(UAV) was unveiled by the Singapore Police Force to be used during search and rescue operations including hostage situations and public order incidents.


Spain

According to a 2017 report by
Privacy International Privacy International (PI) is a UK-based registered charity that defends and promotes the right to privacy across the world. First formed in 1990, registered as a non-profit company in 2002 and as a charity in 2012, PI is based in London. Its ...
, Spain may be part of a group of 21 European countries that is withholding information, also known as data retention. In 2014, many defense lawyers tried to overturn multiple cases that used mass storage as their evidence to convict, according to the European Agency for Fundamental Rights.


Sweden

Prior to 2009, the National Defence Radio Establishment (FRA) was limited to wireless
signals intelligence Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly u ...
(SIGINT), although it was left largely unregulated. In December 2009, new legislation went into effect, allowing the FRA to monitor cable bound signals passing the Swedish border. Communications service providers are legally required, under confidentiality, to transfer cable communications crossing Swedish borders to specific "interaction points", where data may be accessed after a court order. The FRA has been contested since the change in its legislation, mainly because of the public perception the change would enable mass surveillance. The FRA categorically deny this allegation, as they are not allowed to initialize any surveillance on their own, and has no direct access to communication lines. All SIGINT has to be authorized by a
special court An extraordinary court, or special court, is a type of court that is established outside of ordinary judiciary, composed of irregularly selected judges or applying irregular procedure for judgment. Since extraordinary courts can be abused to infr ...
and meet a set of narrow requirements, something Minister for Defence Sten Tolgfors have been quoted as saying, "should render the debate on mass surveillance invalid". Due to the architecture of Internet backbones in the Nordic area, a large portion of Norwegian and Finnish traffic will also be affected by the Swedish wiretapping.


Syria

Ba'athist government of Syria has been ruling the country as a totalitarian surveillance state, policing every aspect of Syrian society for decades. Commanders of government's security forces – consisting of Syrian Arab Army,
secret police image:Putin-Stasi-Ausweis.png, 300px, Vladimir Putin's secret police identity card, issued by the East German Stasi while he was working as a Soviet KGB liaison officer from 1985 to 1989. Both organizations used similar forms of repression. Secre ...
, Ba'athist paramilitaries – directly implement the executive functions of the Syrian state, with scant regard for legal processes and
bureaucracy Bureaucracy ( ) is a system of organization where laws or regulatory authority are implemented by civil servants or non-elected officials (most of the time). Historically, a bureaucracy was a government administration managed by departments ...
. Security services shut down civil society organizations, curtail freedom of movement within the country and bans non-Ba'athist political literature and symbols. During the Ba'athist rule,
militarization Militarization, or militarisation, is the process by which a society organizes itself for military conflict and violence. It is related to militarism, which is an ideology that reflects the level of militarization of a state. The process of mil ...
of the Syrian society intensified. The number of personnel in the
Syrian military The Syrian Armed Forces () are the military forces of Syria. Up until the fall of Bashar al-Assad's Arab Socialist Ba'ath Party – Syria Region, Ba'ath Party Ba'athist Syria, regime in December 2024, the Syrian Arab Armed Forces were the sta ...
and various intelligence entities expanded drastically from 65,000 in 1965 to 530,000 in 1991; and surpassed 700,000 in 2004. Ba'athist secret police consists of four wings: general intelligence and the
political security Political security is one of five sectors of analysis under the framework of the Copenhagen School of security studies. As a Human Security Approach, the concept of political security was briefly defined in the 1994 Human Development Report (HDR) ...
directorates, which are supervised by the Syrian Ministry of Interior;
military intelligence Military intelligence is a military discipline that uses information collection and analysis List of intelligence gathering disciplines, approaches to provide guidance and direction to assist Commanding officer, commanders in decision making pr ...
and the air force intelligence directorates, which are supervised by the Syrian Ministry of Defence. The four directorates are directly controlled by the National Security Bureau of the Arab Socialist Ba'ath Party, and heads of the four branches report directly to the Syrian president, who is also the secretary general of the Ba'ath party. The surveillance system of the '' Mukhabarat'' is pervasive, and over 65,000 full-time officers were estimated to be working in its various branches during the 2000s. In addition, there are hundreds of thousands of part-time employees and informers in various Syrian intelligence departments. According to estimates, there is one member of various branches of the Ba'athist secret police for every 158 citizens, which is one of the largest ratios in the world. The general intelligence,
political security Political security is one of five sectors of analysis under the framework of the Copenhagen School of security studies. As a Human Security Approach, the concept of political security was briefly defined in the 1994 Human Development Report (HDR) ...
, and
military intelligence Military intelligence is a military discipline that uses information collection and analysis List of intelligence gathering disciplines, approaches to provide guidance and direction to assist Commanding officer, commanders in decision making pr ...
divisions of the Ba'athist secret police have several branches in all governorates controlled by the Assad regime, with headquarters in Damascus. With state impunity granted by the Assad government, ''Mukhabarat'' officers wield pervasive influence over local bodies, civil associations, and bureaucracy, playing a major role in shaping Ba'athist administrative decisions. Additionally, intense factional rivalries and power struggles exist among various branches of the secret police. Several academics have described the military, bureaucratic, and secret police apparatus of the Ba'athist state as constituting a pyramidal socio-political structure with an
Orwellian ''Orwellian'' is an adjective which is used to describe a situation, an idea, or a societal condition that 20th-century author George Orwell identified as being destructive to the welfare of a free and open society. It denotes an attitude and ...
surveillance system designed to neutralize independent civic activities and political dissent from its very onset.
Syria Syria, officially the Syrian Arab Republic, is a country in West Asia located in the Eastern Mediterranean and the Levant. It borders the Mediterranean Sea to the west, Turkey to Syria–Turkey border, the north, Iraq to Iraq–Syria border, t ...
is one of the five countries on Reporters Without Borders' March 2013 list of "State Enemies of the Internet", countries whose governments are involved in active, intrusive surveillance of news providers, resulting in grave violations of freedom of information and human rights. Syria has stepped up its web censorship and cyber-monitoring as the country's civil war has intensified. At least 13 Blue Coat proxy servers are in use,
Skype Skype () was a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for IP-based videotelephony, videoconferencing and voice calls. It also had instant messaging, file transfer, ...
calls are intercepted, and social engineering techniques,
phishing Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
, and
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
attacks are all in use.


United Arab Emirates

In October 2016, '' The Intercept'' released a report detailing the experience of an Italian security researcher Simone Margaritelli, of allegedly being hired for mass surveillance operations run by
United Arab Emirates The United Arab Emirates (UAE), or simply the Emirates, is a country in West Asia, in the Middle East, at the eastern end of the Arabian Peninsula. It is a Federal monarchy, federal elective monarchy made up of Emirates of the United Arab E ...
. According to Margaritelli, he was called for an interview with the
Abu Dhabi Abu Dhabi is the capital city of the United Arab Emirates. The city is the seat of the Abu Dhabi Central Capital District, the capital city of the Emirate of Abu Dhabi, and the UAE's List of cities in the United Arab Emirates, second-most popu ...
-based
cybersecurity Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
firm called DarkMatter. Margaritelli says he declined the offer and instead wrote a blog post titled "How the United Arab Emirates Intelligence Tried to Hire Me to Spy on Its People". In response to The Intercept inquiries, DarkMatter responded by stating: "No one from DarkMatter or its subsidiaries have ever interviewed Mr. Margaritelli." Kevin Healy, director of communications for DarkMatter, wrote in an email responding to The Intercept that the man Margaritelli says interviewed him was previously only an advisory consultant to DarkMatter and is currently no longer an advisor to the company. Dark Matter responded by saying "While we respect an author's right to express a personal opinion, we do not view the content in question as credible, and therefore have no further comment." In January 2019,
Reuters Reuters ( ) is a news agency owned by Thomson Reuters. It employs around 2,500 journalists and 600 photojournalists in about 200 locations worldwide writing in 16 languages. Reuters is one of the largest news agencies in the world. The agency ...
released a detailed account of a 2014 state-surveillance operation – dubbed as Project Raven – led by the
United Arab Emirates The United Arab Emirates (UAE), or simply the Emirates, is a country in West Asia, in the Middle East, at the eastern end of the Arabian Peninsula. It is a Federal monarchy, federal elective monarchy made up of Emirates of the United Arab E ...
with the help of former NSA officials like Lori Stroud, an ex-NSA cyberspy.
Counter-terrorism Counterterrorism (alternatively spelled: counter-terrorism), also known as anti-terrorism, relates to the practices, military tactics, techniques, and strategies that governments, law enforcement, businesses, and intelligence agencies use to co ...
strategy was the primary motive of setting up the unit. However, soon the project began being used as a
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
program to spy on rival leaders, critical
dissidents A dissident is a person who actively challenges an established political or religious system, doctrine, belief, policy, or institution. In a religious context, the word has been used since the 18th century, and in the political sense since the 2 ...
and journalists. In December 2019, Google Play Store and
Apple App Store The App Store is an app marketplace developed and maintained by Apple, for mobile apps on its iOS and iPadOS operating systems. The store allows users to browse and download approved apps developed within Apple's iOS SDK. Apps can be download ...
removed an Emirati messaging application called ToTok following allegations that it was a state surveillance application, according to ''
The New York Times ''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'' report. The application's privacy policy clearly stated that it may share personal data of the users with "regulatory agencies, law enforcement, and other lawful access requests". The allegations were denied by the co-founders of ToTok, Giacomo Ziani and Long Ruan, respectively. The application was restored on Google Play Store later on. In July 2020, the United Arab Emirates came under renewed questions about mass surveillance amidst the coronavirus outbreak. Experts highlighted that the country has one of the highest per capita concentrations of surveillance cameras in the world. In a statement, the Emirati government acknowledged that cameras are used to counter the threat of terrorism and have helped the country rank as one of the safest countries in the world.


United Kingdom

State surveillance in the
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of European mainland, the continental mainland. It comprises England, Scotlan ...
has formed part of the public consciousness since the 19th century. The postal espionage crisis of 1844 sparked the first panic over the privacy of citizens. However, in the 20th century, electronic surveillance capabilities grew out of wartime signal intelligence and pioneering code breaking. In 1946, the
Government Communications Headquarters Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primari ...
(GCHQ) was formed. The United Kingdom and the United States signed the bilateral UKUSA Agreement in 1948. It was later broadened to include Canada, Australia and New Zealand, as well as cooperation with several "third-party" nations. This became the cornerstone of Western intelligence gathering and the "
Special Relationship The Special Relationship is an unofficial term for relations between the United Kingdom and the United States. Special Relationship also may refer to: * Special relationship (international relations), other exceptionally strong ties between nat ...
" between the UK and the US. After the growth of the Internet and development of the
World Wide Web The World Wide Web (WWW or simply the Web) is an information system that enables Content (media), content sharing over the Internet through user-friendly ways meant to appeal to users beyond Information technology, IT specialists and hobbyis ...
, a series of media reports in 2013 revealed more recent programs and techniques involving GCHQ, such as Tempora. The use of these capabilities is controlled by laws made in the
UK Parliament The Parliament of the United Kingdom of Great Britain and Northern Ireland is the supreme legislative body of the United Kingdom, and may also legislate for the Crown Dependencies and the British Overseas Territories. It meets at the Palace of ...
. In particular, access to the content of private messages (that is, interception of a communication) must be authorized by a warrant signed by a Secretary of State. In addition European Union
data privacy Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data ...
law applies in UK law. The UK exhibits governance and safeguards as well as use of electronic surveillance. The Investigatory Powers Tribunal, a judicial oversight body for the intelligence agencies, ruled in December 2014 that the legislative framework in the United Kingdom does not breach the
European Convention on Human Rights The European Convention on Human Rights (ECHR; formally the Convention for the Protection of Human Rights and Fundamental Freedoms) is a Supranational law, supranational convention to protect human rights and political freedoms in Europe. Draf ...
. However, the Tribunal stated in February 2015 that one particular aspect, the
data sharing Data sharing is the practice of making data used for scholarly research available to other investigators. Many funding agencies, institutions, and publication venues have policies regarding data sharing because transparency and openness are consid ...
arrangement that allowed UK Intelligence services to request data from the US surveillance programs Prism and Upstream, had been in contravention of human rights law prior to this until two paragraphs of additional information, providing details about the procedures and safeguards, were disclosed to the public in December 2014. In its December 2014 ruling, the Investigatory Powers Tribunal found that the legislative framework in the United Kingdom does not permit mass surveillance and that while GCHQ collects and analyses data in bulk, it does not practice mass surveillance. A report on Privacy and Security published by the
Intelligence and Security Committee of Parliament The Intelligence and Security Committee of Parliament (ISC) is a statutory joint committee of the Parliament of the United Kingdom, appointed to oversee the work of the UK intelligence community. The committee was established in 1994 by the In ...
also came to this view, although it found past shortcomings in oversight and said the legal framework should be simplified to improve transparency. This view is supported by independent reports from the Interception of Communications Commissioner. However, notable civil liberties groups continue to express strong views to the contrary and plan to appeal the ruling to the
European Court of Human Rights The European Court of Human Rights (ECtHR), also known as the Strasbourg Court, is an international court of the Council of Europe which interprets the European Convention on Human Rights (ECHR). The court hears applications alleging that a co ...
, while others have criticised these viewpoints in turn.; The
Regulation of Investigatory Powers Act 2000 The Regulation of Investigatory Powers Act 2000 (citation of United Kingdom legislation, c. 23) (RIP or RIPA) is an Act of parliament, Act of the Parliament of the United Kingdom, regulating the powers of public bodies to carry out surveillanc ...
(RIP or RIPA) is a significant piece of legislation that granted and regulated the powers of public bodies to carry out surveillance and investigation."Regulation of Investigatory Powers Act 2000"
2000 Chapter 23, UK Government Legislation. Retrieved 28 September 2013.
In 2002 the UK government announced plans to extend the Regulation of Investigatory Powers Act so that at least 28 government departments would be given powers to access
metadata Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive ...
about citizens' web, e-mail, telephone and fax records, without a warrant and without a subject's knowledge. The
Protection of Freedoms Act 2012 The Protection of Freedoms Act 2012 is an Act of the Parliament of the United Kingdom. As the Protection of Freedoms Bill, it was introduced in February 2011, by the Home Secretary, Theresa May. The bill was sponsored by the Home Office. On Tuesd ...
includes several provisions related to controlling and restricting the collection, storage, retention, and use of information in government databases."Protection of Freedoms Bill"
Home Office, 11 February 2011. Retrieved 28 September 2013.
Supported by all three major political parties, the UK Parliament passed the Data Retention and Investigatory Powers Act in July 2014 to ensure police and security services retain existing powers to access phone and Internet records. This was superseded by the Investigatory Powers Act 2016, a comprehensive statute which made public a number of previously secret powers (equipment interference, bulk retention of metadata, intelligence agency use of bulk personal datasets), and enables the Government to require internet service providers and mobile phone companies to maintain records of (but not the content of) customers' Internet connections for 12 months. In addition, it created new safeguards, including a requirement for judges to approve the warrants authorised by a Secretary of State before they come into force. The Act was informed by two reports by David Anderson QC, the UK's Independent Reviewer of Terrorism Legislation: A Question of Trust (2015) and the report of his Bulk Powers Review (2016), which contains a detailed appraisal (with 60 case studies) of the operational case for the powers often characterised as mass surveillance. It may yet require amendment as a consequence of legal cases brought before the
Court of Justice of the European Union The Court of Justice of the European Union (CJEU) ( or "''CJUE''"; Latin: Curia) is the Judiciary, judicial branch of the European Union (EU). Seated in the Kirchberg, Luxembourg, Kirchberg quarter of Luxembourg City, Luxembourg, this EU ins ...
and the
European Court of Human Rights The European Court of Human Rights (ECtHR), also known as the Strasbourg Court, is an international court of the Council of Europe which interprets the European Convention on Human Rights (ECHR). The court hears applications alleging that a co ...
. Many advanced nation-states have implemented laws that partially protect citizens from unwarranted intrusion, such as the
Human Rights Act 1998 The Human Rights Act 1998 (c. 42) is an Act of Parliament (United Kingdom), Act of Parliament of the United Kingdom which received royal assent on 9 November 1998, and came into force on 2 October 2000. Its aim was to incorporate into UK law the ...
, the
Data Protection Act 1998 The Data Protection Act 1998 (c. 29) (DPA) was an act of Parliament of the United Kingdom designed to protect personal data stored on computers or in an organised paper filing system. It enacted provisions from the European Union (EU) Data Pr ...
, (updated as the Data Protection Act 2018, to include the
General Data Protection Regulation The General Data Protection Regulation (Regulation (EU) 2016/679), abbreviated GDPR, is a European Union regulation on information privacy in the European Union (EU) and the European Economic Area (EEA). The GDPR is an important component of ...
), and the
Privacy and Electronic Communications (EC Directive) Regulations 2003 The Privacy and Electronic Communications (EC Directive) Regulations 2003 is a law in the United Kingdom which made it unlawful to, amongst other things, transmit an automated recorded message for direct marketing purposes via a telephone, without ...
in the United Kingdom, and laws that require a formal warrant before private data may be gathered by a government. The vast majority of video surveillance cameras in the UK are not operated by government bodies, but by private individuals or companies, especially to monitor the interiors of shops and businesses. According to 2011 Freedom of Information Act requests, the total number of local government operated CCTV cameras was around 52,000 over the entirety of the UK. The prevalence of video surveillance in the UK is often overstated due to unreliable estimates being requoted; for example one report in 2002 extrapolated from a very small sample to estimate the number of cameras in the UK at 4.2 million (of which 500,000 in London). More reliable estimates put the number of private and local government operated cameras in the United Kingdom at around 1.85 million in 2011.


United States

Historically, mass surveillance was used as part of wartime censorship to control communications that could damage the war effort and aid the enemy. For example, during the world wars, every international telegram from or to the United States sent through companies such as
Western Union The Western Union Company is an American multinational financial services corporation headquartered in Denver, Denver, Colorado. Founded in 1851 as the New York and Mississippi Valley Printing Telegraph Company in Rochester, New York, the co ...
was reviewed by the US military. After the wars were over, surveillance continued in programs such as the
Black Chamber The Black Chamber, officially the Cable and Telegraph Section and also known as the Cipher Bureau, was the first peacetime cryptanalytic organization in the United States, operating from 1917 to 1929. It was a forerunner of the National Security ...
following World War I and project Shamrock following World War II.
COINTELPRO COINTELPRO (a syllabic abbreviation derived from Counter Intelligence Program) was a series of covert and illegal projects conducted between 1956 and 1971 by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltr ...
projects conducted by the U.S. Federal Bureau of Investigation (FBI) between 1956 and 1971 targeted various "subversive" organizations, including peaceful anti-war and racial equality activists such as
Albert Einstein Albert Einstein (14 March 187918 April 1955) was a German-born theoretical physicist who is best known for developing the theory of relativity. Einstein also made important contributions to quantum mechanics. His mass–energy equivalence f ...
and
Martin Luther King Jr. Martin Luther King Jr. (born Michael King Jr.; January 15, 1929 – April 4, 1968) was an American Baptist minister, civil and political rights, civil rights activist and political philosopher who was a leader of the civil rights move ...
Billions of dollars per year are spent, by agencies such as the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA) and the
Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
(FBI), to develop, purchase, implement, and operate systems such as
Carnivore A carnivore , or meat-eater (Latin, ''caro'', genitive ''carnis'', meaning meat or "flesh" and ''vorare'' meaning "to devour"), is an animal or plant Plants are the eukaryotes that form the Kingdom (biology), kingdom Plantae; they ar ...
,
ECHELON Echelon may refer to: * A level formation ** A level or rank in an organization, profession, or society ** A military sub-subunit smaller than a company but larger than a platoon ** Echelon formation, a step-like arrangement of units * ECHELO ...
, and NarusInsight to intercept and analyze the immense amount of data that traverses the Internet and telephone system every day. Under the Mail Isolation Control and Tracking program, the U.S. Postal Service photographs the exterior of every piece of paper mail that is processed in the United States – about 160 billion pieces in 2012. The U.S. Postmaster General stated that the system is primarily used for mail sorting, but the images are available for possible use by law enforcement agencies."AP Interview: USPS takes photos of all mail"
, Associated Press (AP), 2 August 2013.
Created in 2001 following the anthrax attacks that killed five people, it is a sweeping expansion of a 100-year-old program called " mail cover" which targets people suspected of crimes."U.S. Postal Service Logging All Mail for Law Enforcement"
Ron Nixon, ''The New York Times'', 3 July 2013. Retrieved 25 September 2013.
The FBI developed the computer programs "
Magic Lantern The magic lantern, also known by its Latin name , is an early type of image projector that uses pictures—paintings, prints, or photographs—on transparent plates (usually made of glass), one or more lens (optics), lenses, and a light source. ...
" and CIPAV, which they can remotely install on a computer system, in order to monitor a person's computer activity. The NSA has been gathering information on financial records, Internet surfing habits, and monitoring e-mails. They have also performed extensive analysis of
social networks A social network is a social structure consisting of a set of social actors (such as individuals or organizations), networks of dyadic ties, and other social interactions between actors. The social network perspective provides a set of meth ...
such as
Myspace Myspace (formerly stylized as MySpace, currently myspace; and sometimes my␣, with an elongated Whitespace character#Substitute images, open box symbol) is a social networking service based in the United States. Launched on August 1, 2003, it w ...
. The PRISM special source operation system legally immunized private companies that cooperate voluntarily with U.S. intelligence collection. According to ''The Register'', the FISA Amendments Act of 2008 "specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant" when one of the parties is outside the U.S. PRISM was first publicly revealed on 6 June 2013, after classified documents about the program were leaked to ''The Washington Post'' and ''The Guardian'' by American
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs. Born in 1983 in Elizabeth ...
. The Communications Assistance for Law Enforcement Act (CALEA) requires that all U.S. telecommunications and Internet service providers modify their networks to allow easy
wiretapping Wiretapping, also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connecti ...
of telephone, VoIP, and broadband Internet traffic. In early 2006, ''
USA Today ''USA Today'' (often stylized in all caps) is an American daily middle-market newspaper and news broadcasting company. Founded by Al Neuharth in 1980 and launched on September 14, 1982, the newspaper operates from Gannett's corporate headq ...
'' reported that several major telephone companies were providing the telephone call records of U.S. citizens to the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA), which is storing them in a large database known as the NSA call database. This report came on the heels of allegations that the U.S. government had been conducting electronic surveillance of domestic telephone calls without warrants. In 2013, the existence of the Hemisphere Project, through which AT&T provides telephone call data to federal agencies, became publicly known. Traffic cameras, which were meant to help enforce traffic laws at intersections, may be used by law enforcement agencies for purposes unrelated to traffic violations. Some cameras allow for the identification of individuals inside a vehicle and license plate data to be collected and time stamped for cross reference with other data used by police. The
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior, home, or public security ministries in other countries. Its missions invol ...
is funding networks of surveillance cameras in cities and towns as part of its efforts to combat terrorism. The
New York City Police Department The City of New York Police Department, also referred to as New York City Police Department (NYPD), is the primary law enforcement agency within New York City. Established on May 23, 1845, the NYPD is the largest, and one of the oldest, munic ...
infiltrated and compiled dossiers on protest groups before the 2004 Republican National Convention, leading to over 1,800 arrests. Modern surveillance in the United States was thought of more of a wartime effort before Snowden disclosed in depth information about the National Security Agency in June 2013.van der Vlist, Fernando N. 2017. Counter-Mapping Surveillance: A Critical Cartography of Mass Surveillance Technology After Snowden. Surveillance & Society 15(1): 137-157. The constant development and improvements of the Internet and technology has made it easier for mass surveillance to take hold. Such revelations allow critical commentators to raise questions and scrutinize the implementation, use, and abuse of networking technologies, devices, and software systems that partake in a "global surveillant assemblage" (Bogard 2006; Collier and Ong 2004; Haggerty and Ericson 2000; Murakami Wood 2013). The NSA collected millions of Verizon user's telephone records in between 2013 and 2014. The NSA also collected data through Google and Facebook with a program called 'Prism'. Journalists through Snowden published nearly 7,000 top-secret documents since then, yet the information disclosed is less than 1% of the entire information.


Vietnam

Vietnam Vietnam, officially the Socialist Republic of Vietnam (SRV), is a country at the eastern edge of mainland Southeast Asia, with an area of about and a population of over 100 million, making it the world's List of countries and depende ...
is one of the five countries on Reporters Without Borders' March 2013 list of "State Enemies of the Internet", countries whose governments are involved in active, intrusive surveillance of news providers, resulting in grave violations of freedom of information and human rights. Most of the country's 16 service providers are directly or indirectly controlled by the Vietnamese Communist Party. The industry leader, Vietnam Posts and Telecommunications Group, which controls 74 per cent of the market, is state-owned. So is
Viettel The Military Industry and Telecoms Group (), Trade name, trading as Viettel or Viettel Group (), is a Vietnamese State-owned enterprise, state-owned multinational corporation, multinational telecommunications, technology and manufacturing C ...
, an enterprise of the Vietnamese armed forces. FPT Telecom is a private firm, but is accountable to the Party and depends on the market leaders for bandwidth. Service providers are the major instruments of control and surveillance. Bloggers monitored by the government frequently undergo
man-in-the-middle attack In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communi ...
s. These are designed to intercept data meant to be sent to secure (https) sites, allowing passwords and other communication to be intercepted. According to a July 2012
Freedom House Freedom House is a nonprofit organization based in Washington, D.C. It is best known for political advocacy surrounding issues of democracy, Freedom (political), political freedom, and human rights. Freedom House was founded in October 1941, wi ...
report, 91 percent of survey respondents connected to the Internet on their mobile devices believe that the government monitors conversations and tracks the calls of "activists" or "reactionaries". In 2018, the Vietnam National Assembly also passed a cybersecurity law closely resembling one passed in China, requiring localisation of user data and censorship of anti-state content.


Commercial mass surveillance

As a result of the
digital revolution The Information Age is a History by period, historical period that began in the mid-20th century. It is characterized by a rapid shift from traditional industries, as established during the Industrial Revolution, to an economy centered on info ...
, many aspects of life are now captured and stored in digital form. Concern has been expressed that governments may use this information to conduct mass surveillance on their populations. Commercial mass surveillance often makes use of
copyright A copyright is a type of intellectual property that gives its owner the exclusive legal right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, ...
laws and " user agreements" to obtain (typically uninformed) 'consent' to surveillance from consumers who use their software or other related materials. This allows gathering of information which would be technically illegal if performed by government agencies. This data is then often shared with government agencies, thereby, in practice, defeating the purpose of such privacy protections. One of the most common forms of mass surveillance is carried out by commercial organizations. Many people are willing to join supermarket and grocery
loyalty card A loyalty program or rewards program is a marketing strategy designed to encourage customers to continue to shop at or use the services of one or more businesses associated with the program. Single-company vs. coalition programs Loyalty prog ...
programs, trading their personal information and surveillance of their shopping habits in exchange for a discount on their groceries, although base prices might be increased to encourage participation in the program. Through programs like
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
's
AdSense Google AdSense is a program run by Google through which website publishers in the Google Network of content sites serve text, images, video, or interactive media advertisements that are targeted to the site content and audience. These adver ...
, OpenSocial and their increasing pool of so-called "web gadgets", "social gadgets", and other Google-hosted services many web sites on the Internet are effectively feeding user information about sites visited by the users, and now also their social connections, to Google.
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
also keep this information, although its acquisition is limited to page views within Facebook. This data is valuable for authorities, advertisers and others interested in profiling users, trends and web site marketing performance. Google, Facebook and others are increasingly becoming more guarded about this data as their reach increases and the data becomes more all inclusive, making it more valuable. New features like
geolocation Geopositioning is the process of determining or estimating the geographic position of an object or a person. Geopositioning yields a set of Geographic coordinate system, geographic coordinates (such as latitude and longitude) in a given map datum ...
give an even increased admission of monitoring capabilities to large service providers like Google, where they also are enabled to track one's physical movements while users are using mobile devices, especially those which are syncing without any user interaction. Google's
Gmail Gmail is the email service provided by Google. it had 1.5 billion active user (computing), users worldwide, making it the largest email service in the world. It also provides a webmail interface, accessible through a web browser, and is also ...
service is increasingly employing features to work as a stand-alone application which also might activate while a web browser is not even active for synchronizing; a feature mentioned on the
Google I/O Google I/O, or simply I/O, is an annual developer conference held by Google in Mountain View, California. The name "I/O" is taken from the number googol, with the "I" representing the first digit "1" in a googol and the "O" representing the s ...
2009 developer conference while showing the upcoming
HTML5 HTML5 (Hypertext Markup Language 5) is a markup language used for structuring and presenting hypertext documents on the World Wide Web. It was the fifth and final major HTML version that is now a retired World Wide Web Consortium (W3C) recommend ...
features which Google and others are actively defining and promoting. In 2008 at the
World Economic Forum The World Economic Forum (WEF) is an international non-governmental organization, international advocacy non-governmental organization and think tank, based in Cologny, Canton of Geneva, Switzerland. It was founded on 24 January 1971 by German ...
in
Davos Davos (, ; or ; ; Old ) is an Alpine resort town and municipality in the Prättigau/Davos Region in the canton of Graubünden, Switzerland. It has a permanent population of (). Davos is located on the river Landwasser, in the Rhaetian ...
, Google CEO Eric Schmidt, said: "The arrival of a truly mobile Web, offering a new generation of location-based advertising, is set to unleash a 'huge revolution'". At the Mobile World Congress in Barcelona on 16 February 2010, Google presented their vision of a new business model for mobile operators and trying to convince mobile operators to embrace
location-based service Location-based service (LBS) is a general term denoting software service (economics), services which use geographic data and information to provide services or information to users. LBS can be used in a variety of contexts, such as health, indoor ...
s and advertising. With Google as the advertising provider, it would mean that every mobile operator using their location-based advertising service would be revealing the location of their mobile customers to Google. Organizations like the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties. It provides funds for legal defense in court, ...
are constantly informing users on the importance of privacy, and considerations about technologies like geolocation. Computer company
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
patented in 2011 a product distribution system with a camera or capture device that monitors the viewers that consume the product, allowing the provider to take "remedial action" if the actual viewers do not match the distribution license. Reporters Without Borders' March 2013 ''Special report on Internet Surveillance'' contained a list of "Corporate Enemies of the Internet", companies that sell products that are liable to be used by governments to violate human rights and freedom of information. The five companies on the initial list were: Amesys (France),
Blue Coat Systems __FORCETOC__ Blue Coat Systems, Inc., was a company that provided hardware, software, and services designed for cybersecurity and network management. In 2016 it was acquired by and folded into Symantec and in 2019 as part of Symantec’s Enterpri ...
(U.S.), Gamma Group (UK and Germany), Hacking Team (Italy), and Trovicor (Germany), but the list was not exhaustive and is likely to be expanded in the future. EFF found that a company by the name of Fog Data Science purchases location data from apps and sells it to the law enforcement agencies in the U.S. without requiring a warrant or a court order.


Surveillance state

A surveillance state is a country where the government engages in pervasive surveillance of large numbers of its citizens and visitors. Such widespread surveillance is usually justified as being necessary for
national security National security, or national defence (national defense in American English), is the security and Defence (military), defence of a sovereign state, including its Citizenship, citizens, economy, and institutions, which is regarded as a duty of ...
, such as to prevent crime or acts of terrorism, but may also be used to stifle criticism of and opposition to the government. Examples of early surveillance states include the former
Soviet Union The Union of Soviet Socialist Republics. (USSR), commonly known as the Soviet Union, was a List of former transcontinental countries#Since 1700, transcontinental country that spanned much of Eurasia from 1922 until Dissolution of the Soviet ...
and the former
East Germany East Germany, officially known as the German Democratic Republic (GDR), was a country in Central Europe from Foundation of East Germany, its formation on 7 October 1949 until German reunification, its reunification with West Germany (FRG) on ...
, which had a large network of informers and an advanced technology base in computing and spy-camera technology. However, these states did not have today's technologies for mass surveillance, such as the use of
database In computing, a database is an organized collection of data or a type of data store based on the use of a database management system (DBMS), the software that interacts with end users, applications, and the database itself to capture and a ...
s and
pattern recognition Pattern recognition is the task of assigning a class to an observation based on patterns extracted from data. While similar, pattern recognition (PR) is not to be confused with pattern machines (PM) which may possess PR capabilities but their p ...
software to cross-correlate information obtained by wire tapping, including
speech recognition Speech recognition is an interdisciplinary subfield of computer science and computational linguistics that develops methodologies and technologies that enable the recognition and translation of spoken language into text by computers. It is also ...
and telecommunications
traffic analysis Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted. In general, the greater the number of messages observ ...
, monitoring of financial transactions,
automatic number plate recognition Automatic number-plate recognition (ANPR; see also other names below) is a technology that uses optical character recognition on images to read vehicle registration plates to create vehicle location data. It can use existing closed-circuit ...
, the tracking of the position of mobile telephones, and
facial recognition system A facial recognition system is a technology potentially capable of matching a human face from a digital image or a Film frame, video frame against a database of faces. Such a system is typically employed to authenticate users through ID verif ...
s and the like which recognize people by their appearance,
gait Gait is the pattern of Motion (physics), movement of the limb (anatomy), limbs of animals, including Gait (human), humans, during Animal locomotion, locomotion over a solid substrate. Most animals use a variety of gaits, selecting gait based on s ...
,
DNA profiling DNA profiling (also called DNA fingerprinting and genetic fingerprinting) is the process of determining an individual's deoxyribonucleic acid (DNA) characteristics. DNA analysis intended to identify a species, rather than an individual, is cal ...
, etc.


Smart cities

The development of smart cities has seen the increased adoption of surveillance technologies by governments, although the primary purpose of surveillance in such cities is to use information and communication technologies to control the urban environment. The implementation of such technology by a number of cities has resulted in increased efficiencies in urban infrastructure as well as improved community participation. Sensors and systems monitor a smart city's infrastructure, operations and activities and aim to help it run more efficiently. For example, the city could use less electricity; its traffic run more smoothly with fewer delays; its citizens use the city with more safety; hazards can be dealt with faster; citizen infractions of rules can be prevented, and the city's infrastructure; power distribution and roads with traffic lights for example, dynamically adjusted to respond to differing circumstances. The development of smart city technology has also led to an increase in potential unwarranted intrusions into privacy and restrictions upon autonomy. The widespread incorporation of information and communication technologies within the daily life of urban residents results in increases in the surveillance capacity of states – to the extent that individuals may be unaware of what information is being accessed, when the access occurs and for what purpose. It is possible that such conditions could give rise to the development of an electronic police state. Shanghai, Amsterdam, San Jose, Dubai, Barcelona, Madrid, Stockholm, and New York are all cities that use various techniques from smart city technology.


Electronic police state

An electronic
police state A police state describes a state whose government institutions exercise an extreme level of control over civil society and liberties. There is typically little or no distinction between the law and the exercise of political power by the exec ...
is a
state State most commonly refers to: * State (polity), a centralized political organization that regulates law and society within a territory **Sovereign state, a sovereign polity in international law, commonly referred to as a country **Nation state, a ...
in which the government aggressively uses electronic technologies to record, collect, store, organize, analyze, search, and distribute information about its citizens. The first use of the term "electronic police state" was likely in a posting by Jim Davis. Electronic police states also engage in mass government surveillance of
landline A landline is a physical telephone connection that uses metal wires or optical fiber from the subscriber's premises to the network, allowing multiple phones to operate simultaneously on the same phone number. It is also referred to as plain old ...
and cellular telephone traffic, mail, email, web surfing, Internet searches, radio, and other forms of electronic communication as well as widespread use of video surveillance. The information is usually collected in secret. The crucial elements are not politically based, so long as the government can afford the technology and the populace will permit it to be used, an electronic police state can form. The continual use of electronic mass surveillance can result in constant low-level fear within the population, which can lead to
self-censorship Self-censorship is the act of censoring or classifying one's own discourse, typically out of fear or deference to the perceived preferences, sensibilities, or infallibility of others, and often without overt external pressure. Self-censorship is c ...
and exerts a powerful coercive force upon the populace.Kingsley Ufuoma OMOYIBO, Ogaga Ayemo OBARO (2012)
"Applications of Social Control Theory: Criminality and Governmentality"
, ''International Journal of Asian Social Science'', Vol. 2, No. 7, pp.1026-1032.


In popular culture

The concept of being monitored by our governments collects a large audience of curious citizens. Mass surveillance has been prominently featured in a wide array of books, films, and other media. Advances in technology over the last century have led to possible social control through the Internet and the conditions of late capitalism. Many directors and writers have been enthralled with the potential stories that could come from mass surveillance. Perhaps the most iconic example of fictional mass surveillance is
George Orwell Eric Arthur Blair (25 June 1903 – 21 January 1950) was an English novelist, poet, essayist, journalist, and critic who wrote under the pen name of George Orwell. His work is characterised by lucid prose, social criticism, opposition to a ...
's 1949 novel ''
Nineteen Eighty-Four ''Nineteen Eighty-Four'' (also published as ''1984'') is a dystopian novel and cautionary tale by the English writer George Orwell. It was published on 8 June 1949 by Secker & Warburg as Orwell's ninth and final completed book. Thematically ...
'', which depicts a
dystopia A dystopia (lit. "bad place") is an imagined world or society in which people lead wretched, dehumanized, fearful lives. It is an imagined place (possibly state) in which everything is unpleasant or bad, typically a totalitarian or environmen ...
n surveillance state. Here are a few other works that focus on mass surveillance: * '' We'', a 1920 novel by Russian author Yevgeny Zamyatin, that predates ''
Nineteen Eighty-Four ''Nineteen Eighty-Four'' (also published as ''1984'') is a dystopian novel and cautionary tale by the English writer George Orwell. It was published on 8 June 1949 by Secker & Warburg as Orwell's ninth and final completed book. Thematically ...
'' and was read by its author
George Orwell Eric Arthur Blair (25 June 1903 – 21 January 1950) was an English novelist, poet, essayist, journalist, and critic who wrote under the pen name of George Orwell. His work is characterised by lucid prose, social criticism, opposition to a ...
. * '' Little Brother'' is a novel by
Cory Doctorow Cory Efram Doctorow (; born 17 July 1971) is a Canadian-British blogger, journalist, and science fiction author who served as co-editor of the blog ''Boing Boing''. He is an activist in favour of liberalising copyright laws and a proponent of th ...
, and is set in San Francisco after a major terrorist attack. The DHS uses technologies such as RFIDs and surveillance cameras to create a totalitarian system of control. * ''
The Lives of Others ''The Lives of Others'' (, ) is a 2006 German drama film written and directed by Florian Henckel von Donnersmarck marking his feature film directorial debut. The plot is about the monitoring of East Berlin residents by agents of the Stasi, Ea ...
'', is a 2006 German drama film, which conveys the impact that relentless surveillance has on the emotional well-being and the outcome of individuals subjected to it. * ''
The Hunger Games ''The Hunger Games'' are a series of Young adult fiction, young adult Dystopian fiction, dystopian novels written by American author Suzanne Collins. The series consists of a trilogy that follows teenage protagonist Katniss Everdeen, and two ...
'' by
Suzanne Collins Suzanne Collins (born August 10, 1962) is an American author and television writer who is best known as the author of the young adult literature, young adult Dystopian fiction, dystopian book series ''The Hunger Games''. She is also the author ...
is a trilogy in which 'the Capitol' has totalitarian surveillance and control over all aspects of the other 'districts'. * ''
Digital Fortress ''Digital Fortress'' is a techno-thriller novel written by American author Dan Brown and published in 1998 by St. Martin's Press. The book explores the theme of government surveillance of electronically stored information on the private lives of ...
'', novel by
Dan Brown Daniel Gerhard Brown (born June 22, 1964) is an American author best known for his Thriller (genre), thriller novels, including the Robert Langdon (book series), Robert Langdon novels ''Angels & Demons'' (2000), ''The Da Vinci Code'' (2003), '' ...
, involving an NSA code breaking machine called 'TRANSLTR'. The machine read and decrypted email messages, with which the NSA used to foil terrorist attacks and mass murders. * Valve's 2004 video game ''
Half-Life 2 ''Half-Life 2'' is a 2004 first-person shooter game developed and published by Valve Corporation. It was published for Windows on Valve's digital distribution service, Steam. Like the original ''Half-Life'' (1998), ''Half-Life 2'' is played ent ...
'' is set in City 17, a fictional police state in
Eastern Europe Eastern Europe is a subregion of the Europe, European continent. As a largely ambiguous term, it has a wide range of geopolitical, geographical, ethnic, cultural and socio-economic connotations. Its eastern boundary is marked by the Ural Mountain ...
in which citizens are under constant surveillance. * The
Ubisoft Ubisoft Entertainment SA (; ; formerly Ubi Soft Entertainment SA) is a French video game publisher headquartered in Saint-Mandé with development studios across the world. Its video game franchises include '' Anno'', '' Assassin's Creed'', ' ...
video game series '' Watch Dogs'' is set in the near future with AI connected cities that use surveillance systems to monitor their people in increasingly invasive ways. In particular, '' Watch Dogs: Legion'' is set in a dystopian
London London is the Capital city, capital and List of urban areas in the United Kingdom, largest city of both England and the United Kingdom, with a population of in . London metropolitan area, Its wider metropolitan area is the largest in Wester ...
where an oppressive regime has taken power and incorporates heavy use of surveillance software to control the populace following a series of terrorist attacks.


See also

* 2013 global surveillance disclosures * Broken windows theory, a controversial theory that maintaining and monitoring urban environments in a well-ordered condition may stop further vandalism and escalation into more serious crime. * Cellphone surveillance *
Closed-circuit television Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific place on a limited set of monitors. It differs from broadcast television in that the signa ...
(CCTV) *
Computer and network surveillance Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be comple ...
* COVID-19 surveillance *
Data privacy Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data ...
*
Data retention Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998. The differe ...
* '' Discipline and Punish: The Birth of the Prison'', a 1975 book by the French philosopher
Michel Foucault Paul-Michel Foucault ( , ; ; 15 October 192625 June 1984) was a French History of ideas, historian of ideas and Philosophy, philosopher who was also an author, Literary criticism, literary critic, Activism, political activist, and teacher. Fo ...
. * *
Global surveillance Global mass surveillance can be defined as the mass surveillance of entire populations across national borders. Its existence was not widely acknowledged by governments and the mainstream media until the global surveillance disclosures by Edw ...
*
Government databases A government database collects information for various reasons, including climate monitoring, securities law compliance, geological surveys, patent applications and grants, surveillance, national security, border control, law enforcement, public he ...
* IT-backed authoritarianism * Lawful interception * List of government surveillance projects *
National security National security, or national defence (national defense in American English), is the security and Defence (military), defence of a sovereign state, including its Citizenship, citizens, economy, and institutions, which is regarded as a duty of ...
* Network analysis *
Nothing to hide argument The nothing to hide argument is a logical fallacy which states that individuals have no reason to fear or oppose surveillance programs unless they are afraid it will uncover their own illicit activities. An individual using this argument may clai ...
*
Pen register A pen register, or dialed number recorder (DNR), is a device that records all numbers called from a particular telephone line. The term has come to include any device or program that performs similar functions to an original pen register, includin ...
, originally an electronic device that records numbers (but not the audio) called from a particular telephone line, more recently any device or program that performs this function for electronic mail, other digital communications, and particularly communications over the Internet. * Phone surveillance *
Police state A police state describes a state whose government institutions exercise an extreme level of control over civil society and liberties. There is typically little or no distinction between the law and the exercise of political power by the exec ...
*
Radio-frequency identification Radio-frequency identification (RFID) uses electromagnetic fields to automatically Automatic identification system, identify and Tracking system, track tags attached to objects. An RFID system consists of a tiny radio transponder called a tag, ...
(RFID), the wireless identification and tracking of tags attached to objects. *
Right to privacy The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 185 national constitutions mention the right to privacy. Since the globa ...
* Security culture * Schengen Cloud *
Signals intelligence Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly u ...
(SIGINT) * Sousveillance, the recording of an activity by a participant in the activity, cameras (or other sensors) affixed to property, or surveillance done by non-authorities. *
Stakeholder theory The stakeholder theory is a theory of organizational management and business ethics that accounts for multiple constituencies impacted by business entities like employees, suppliers, local communities, creditors, and others. It addresses morals ...
*
Surveillance capitalism Surveillance capitalism is a concept in political economics which denotes the widespread collection and commodification of personal data by corporations. This phenomenon is distinct from government surveillance, although the two can be mutuall ...
* Telephone tapping in the Eastern Bloc *
Tracking system A tracking system or locating system is used for Surveillance, tracking persons or objects that do not stay in a fixed location, and supplying a time-ordered sequence of positions (track). Applications A myriad of tracking systems exist. ...
*
Traffic analysis Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted. In general, the greater the number of messages observ ...
* Dataveillance


References


External links

*
"The State and Surveillance: Fear and Control"
Didier Bigo and Mireille Delmas-Marty, ''La Clé des Langues'', 23 September 2011, . {{DEFAULTSORT:Mass Surveillance * Human rights Security National security Law enforcement Law enforcement techniques Crime prevention Counterterrorism