Surveillance abuse is the use of
surveillance
Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
methods or technology to monitor the activity of an individual or group of individuals in a way which violates the social
norms or laws of a society.
During the
FBI
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
's
COINTELPRO
COINTELPRO (a syllabic abbreviation derived from Counter Intelligence Program) was a series of covert and illegal projects conducted between 1956 and 1971 by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltr ...
operations, there was widespread surveillance abuse which targeted political
dissident
A dissident is a person who actively challenges an established political or religious system, doctrine, belief, policy, or institution. In a religious context, the word has been used since the 18th century, and in the political sense since the 2 ...
s, primarily people from the
political left
Left-wing politics describes the range of political ideologies that support and seek to achieve social equality and egalitarianism, often in opposition to social hierarchy either as a whole or of certain social hierarchies. Left-wing politi ...
and
civil rights
Civil and political rights are a class of rights that protect individuals' political freedom, freedom from infringement by governments, social organizations, and private individuals. They ensure one's entitlement to participate in the civil and ...
movement.
Other abuses include "
LOVEINT" which refers to the practice of secret service employees using their extensive monitoring capabilities to spy on their love interest or spouse.
There is no prevention in the amount of unauthorized data collected on individuals and this leads to cases where cameras are installed inappropriately. βFor instance, according to the
BBC
The British Broadcasting Corporation (BBC) is a British public service broadcaster headquartered at Broadcasting House in London, England. Originally established in 1922 as the British Broadcasting Company, it evolved into its current sta ...
, four council workers in
Liverpool
Liverpool is a port City status in the United Kingdom, city and metropolitan borough in Merseyside, England. It is situated on the eastern side of the River Mersey, Mersey Estuary, near the Irish Sea, north-west of London. With a population ...
used a street
CCTV
Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific place on a limited set of monitors. It differs from broadcast television in that the signa ...
pan-tilt-zoom camera to spy on a woman in her apartment.β (Cavallaro, 2007). This is just one case where culprits have been caught; however, there are still many common acts such as this. Another incident of inappropriate installation now has β
Pennsylvania
Pennsylvania, officially the Commonwealth of Pennsylvania, is a U.S. state, state spanning the Mid-Atlantic (United States), Mid-Atlantic, Northeastern United States, Northeastern, Appalachian, and Great Lakes region, Great Lakes regions o ...
parents
suing their son's school, alleging it watched him through his laptop's webcam while he was at home and unaware he was being observed.β (Surveillance Camera Players, 2010). This leads to the misconception of surveillance, as it once was a tool to monitor and make sure citizens abide by the law, it has now created even more problems. With cameras only becoming more advanced and more common, it is difficult to determine whether these surveillance cameras are helping to ensure a safe society or leading to bigger issues altogether.
With the growing of
Web 2.0
Web 2.0 (also known as participative (or participatory) web and social web) refers to websites that emphasize user-generated content, ease of use, participatory culture, and interoperability (i.e., compatibility with other products, systems, a ...
and social networking sites, surveillance may be more easily and commonly abused in many situations for a variety of reasons. For example, the Communications Security Establishment (CSE), formerly known as
Communications Security Establishment Canada
The Communications Security Establishment (CSE; , ''CST''), formerly (from 2008-2014) called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national cryptologic agency. It is responsible for foreign signa ...
(CSEC), has previously spied on Canadians through the public wireless internet connections in an airport in the country. Through this they gathered information on who people called or texted and where they were when they communicated with others. The CSE search through approximately 10-15 million downloads daily. An example of where surveillance may have been abused is where
Facebook
Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
and
Apple
An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
have admitted to allowing government officials to access personal information of their account users.
A device which may be used to abuse surveillance, called a
Stingray
Stingrays are a group of sea Batoidea, rays, a type of cartilaginous fish. They are classified in the suborder Myliobatoidei of the order Myliobatiformes and consist of eight families: Hexatrygonidae (sixgill stingray), Plesiobatidae (deepwate ...
, acts and looks similar to a cellphone tower but it tricks mobile devices into connecting with it. After connected an operator can take information stored on the device, sometimes intercepting phone calls and text messages. This method of surveillance can be used on random civilians or in an investigation of a particular person.
[Braga, Matthew.]
The Covert Cellphone Tracking Tech the RCMP and CSIS Won't Talk about
" ''The Globe and Mail''. N.p., 15 Sept. 2014. Web. 28 Oct. 2015.
See also
*
COINTELPRO
COINTELPRO (a syllabic abbreviation derived from Counter Intelligence Program) was a series of covert and illegal projects conducted between 1956 and 1971 by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltr ...
*
Secret police
image:Putin-Stasi-Ausweis.png, 300px, Vladimir Putin's secret police identity card, issued by the East German Stasi while he was working as a Soviet KGB liaison officer from 1985 to 1989. Both organizations used similar forms of repression.
Secre ...
*
Communist Stasi (Ministry for State Security/State Security Service)
*
Nazi Gestapo (Secret State Police)
*
The Lives of Others (2006) (film)
*
Enemy of the State (1998) (film)
*
Mass surveillance
Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
*
Police misconduct
Police misconduct is inappropriate conduct and illegal actions taken by police officers in connection with their official duties. Types of misconduct include among others: sexual offences, false confession, coerced false confession, intimidation, ...
*
Police state
A police state describes a state whose government institutions exercise an extreme level of control over civil society and liberties. There is typically little or no distinction between the law and the exercise of political power by the exec ...
*
Political repression
Political repression is the act of a state entity controlling a citizenry by force for political reasons, particularly for the purpose of restricting or preventing the citizenry's ability to take part in the political life of a society, thereby ...
*
Qihoo 360
Qihoo 360 (; approximate pronunciation CHEE-hoo), full name 360 Security Technology Inc., is a Chinese internet security company that has developed the antivirus software programs 360 Safeguard and 360 Mobile Safe, the Web browser 360 Secure Bro ...
IP-Camera shutdown
*
Religious Police
Religious police are any Police, police force responsible for the enforcement of religious norms and associated religious laws. Nearly all religious police organizations in modern society are Islamic and can be found in countries with a large Mu ...
*
Stalking
Stalking is unwanted and/or repeated surveillance or contact by an individual or group toward another person. Stalking behaviors are interrelated to harassment and intimidation and may include following the victim in person or monitorin ...
*
Surveillance scandals
*
Emergency data request
References
* Davis, James Kirkpatrick. (1997).
Assault on the Left: The FBI and the Sixties Antiwar Movement'' Westport, CT: Praeger.
* Donner, Frank J. (1980).
'. New York: Alfred A. Knopf.
* Donner, Frank J. (1990).
'. Berkeley: University of California Press.
* Fijnaut, Cyrille and Gary T. Marx. (1995).
'' The Hague: Kluwer Law International.
* Marx, Gary T. (1988).
'. Berkeley: Twentieth Century Fund/University of California Press.
* Ney York Civil Liberties Union. (2006).
Who's Watching'
* O'Reilly, Kenneth. (1988). '
'. New York: Free Press.
* Staples, William G. (2000).
'. Lanham, MD: Rowman & Littlefield.
* Cavallaro, Andrea. (March 2007). Privacy in Video Surveillance. IEEE Xplore - Signal Processing Magazine. Retrieved from http://ssli.ee.washington.edu/courses/ee299/hws/hw4_files/privacy.pd. Retrieved May 3, 2013.
* Surveillance Camera Players (2010, April 12). Abuse of Surveillance Cameras. Retrieved from http://www.notbored.org/camera-abuses.html. Retrieved May 3, 2013.
* Alexander, Julia.
How the Canadian Government Can Spy on Your Online Activities" ''Toronto Sun''. N.p., 8 July 2013. Web. 28 Oct. 2015.
* Braga, Matthew.
The Covert Cellphone Tracking Tech the RCMP and CSIS Won't Talk about" ''The Globe and Mail''. N.p., 15 Sept. 2014. Web. 28 Oct. 2015.
* Brown, Jesse.
''The Star''. N.p., 1 May 2014. Web. 28 Oct. 2015.
* Hildebrandt, Amber, Dave Seglins, and Michael Pereira.
CSE Monitors Millions of Canadian Emails to Government" ''CBC News Canada''. N.p., 25 Feb. 2015. Web. 28 Oct. 2015.
* Lievrouw, Leah A. ''Alternative and Activist New Media''. Cambridge, UK: Polity, 2011. Print.
External links
*
{{DEFAULTSORT:Surveillance Abuse
Law enforcement
Human rights abuses