HOME

TheInfoList



OR:

Surveillance abuse is the use of
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as ...
methods or technology to monitor the activity of an individual or group of individuals in a way which violates the social norms or laws of a society. During the FBI's
COINTELPRO COINTELPRO (syllabic abbreviation derived from Counter Intelligence Program; 1956–1971) was a series of covert and illegal projects actively conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltratin ...
operations, there was widespread surveillance abuse which targeted political
dissident A dissident is a person who actively challenges an established political or religious system, doctrine, belief, policy, or institution. In a religious context, the word has been used since the 18th century, and in the political sense since the ...
s, primarily people from the
political left Left-wing politics describes the range of political ideologies that support and seek to achieve social equality and egalitarianism, often in opposition to social hierarchy. Left-wing politics typically involve a concern for those in soci ...
and
civil rights Civil and political rights are a class of rights that protect individuals' freedom from infringement by governments, social organizations, and private individuals. They ensure one's entitlement to participate in the civil and political life of ...
movement. Other abuses include " LOVEINT" which refers to the practice of secret service employees using their extensive monitoring capabilities to spy on their love interest or spouse. There is no prevention in the amount of unauthorized data collected on individuals and this leads to cases where cameras are installed inappropriately. “For instance, according to the BBC, four council workers in
Liverpool Liverpool is a city and metropolitan borough in Merseyside, England. With a population of in 2019, it is the 10th largest English district by population and its metropolitan area is the fifth largest in the United Kingdom, with a populat ...
used a street
CCTV Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly ...
pan-tilt-zoom camera to spy on a woman in her apartment.” (Cavallaro, 2007). This is just one case where culprits have been caught; however, there are still many common acts such as this. Another incident of inappropriate installation now has “
Pennsylvania Pennsylvania (; (Pennsylvania Dutch: )), officially the Commonwealth of Pennsylvania, is a state spanning the Mid-Atlantic, Northeastern, Appalachian, and Great Lakes regions of the United States. It borders Delaware to its southeast, ...
parents suing their son's school, alleging it watched him through his laptop's webcam while he was at home and unaware he was being observed.” (Surveillance Camera Players, 2010). This leads to the misconception of surveillance, as it once was a tool to monitor and make sure citizens abide by the law, it has now created even more problems. With cameras only becoming more advanced and more common, it is difficult to determine whether these surveillance cameras are helping to ensure a safe society or leading to bigger issues altogether. With the growing of
Web 2.0 Web 2.0 (also known as participative (or participatory) web and social web) refers to websites that emphasize user-generated content, ease of use, participatory culture and interoperability (i.e., compatibility with other products, systems, a ...
and social networking sites, surveillance may be more easily and commonly abused in many situations for a variety of reasons. For example, the Communications Security Establishment (CSE), formerly known as Communications Security Establishment Canada (CSEC), has previously spied on Canadians through the public wireless internet connections in an airport in the country. Through this they gathered information on who people called or texted and where they were when they communicated with others. The CSE search through approximately 10-15 million downloads daily. An example of where surveillance may have been abused is where
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin Mosk ...
and
Apple An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple trees are cultivated worldwide and are the most widely grown species in the genus ''Malus''. The tree originated in Central Asia, where its wild ancestor ...
have admitted to allowing government officials to access personal information of their account users. A device which may be used to abuse surveillance, called a
Stingray Stingrays are a group of sea rays, which are cartilaginous fish related to sharks. They are classified in the suborder Myliobatoidei of the order Myliobatiformes and consist of eight families: Hexatrygonidae (sixgill stingray), Plesiobatidae ...
, acts and looks similar to a cellphone tower but it tricks mobile devices into connecting with it. After connected an operator can take information stored on the device, sometimes intercepting phone calls and text messages. This method of surveillance can be used on random civilians or in an investigation of a particular person.Braga, Matthew.
The Covert Cellphone Tracking Tech the RCMP and CSIS Won't Talk about
" ''The Globe and Mail''. N.p., 15 Sept. 2014. Web. 28 Oct. 2015.


See also

*
COINTELPRO COINTELPRO (syllabic abbreviation derived from Counter Intelligence Program; 1956–1971) was a series of covert and illegal projects actively conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltratin ...
*
Secret police Secret police (or political police) are intelligence, security or police agencies that engage in covert operations against a government's political, religious, or social opponents and dissidents. Secret police organizations are characteristic of ...
* Communist Stasi (Ministry for State Security/State Security Service) * Nazi Gestapo (Secret State Police) * The Lives of Others (2006) (film) * Enemy of the State (1998) (film) *
Mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizatio ...
*
Police misconduct Police misconduct refers to inappropriate conduct and illegal actions taken by police officers in connection with their official duties. Types of misconduct include among others: coerced false confession, intimidation, false arrest, false impriso ...
*
Police state A police state describes a state where its government institutions exercise an extreme level of control over civil society and liberties. There is typically little or no distinction between the law and the exercise of political power by the ...
*
Political repression Political repression is the act of a state entity controlling a citizenry by force for political reasons, particularly for the purpose of restricting or preventing the citizenry's ability to take part in the political life of a society, thereb ...
*
Qihoo 360 Qihoo 360 (; approximate pronunciation CHEE-hoo), full name 360 Security Technology Inc., is a Chinese internet security company that has developed the antivirus software programs 360 Safeguard and 360 Mobile Safe, the Web browser 360 Secure Brows ...
IP-Camera shutdown *
Religious Police Religious police are any police force responsible for the enforcement of religious norms and associated religious laws. Most religious police in modern society are Islamic and can be found in countries with large Muslim population, such as Saud ...
*
Stalking Stalking is unwanted and/or repeated surveillance by an individual or group toward another person. Stalking behaviors are interrelated to harassment and intimidation and may include following the victim in person or monitoring them. The ter ...
* Surveillance scandals


References

* Davis, James Kirkpatrick. (1997).
Assault on the Left: The FBI and the Sixties Antiwar Movement
'' Westport, CT: Praeger. * Donner, Frank J. (1980).

'. New York: Alfred A. Knopf. * Donner, Frank J. (1990).

'. Berkeley: University of California Press. * Fijnaut, Cyrille and Gary T. Marx. (1995).

'' The Hague: Kluwer Law International. * Marx, Gary T. (1988).

'. Berkeley: Twentieth Century Fund/University of California Press. * Ney York Civil Liberties Union. (2006).
Who's Watching
' * O'Reilly, Kenneth. (1988). '

'. New York: Free Press. * Staples, William G. (2000).

'. Lanham, MD: Rowman & Littlefield. * Cavallaro, Andrea. (March 2007). Privacy in Video Surveillance. IEEE Xplore - Signal Processing Magazine. Retrieved from http://ssli.ee.washington.edu/courses/ee299/hws/hw4_files/privacy.pd. Retrieved May 3, 2013. * Surveillance Camera Players (2010, April 12). Abuse of Surveillance Cameras. Retrieved from http://www.notbored.org/camera-abuses.html. Retrieved May 3, 2013. * Alexander, Julia.
How the Canadian Government Can Spy on Your Online Activities
" ''Toronto Sun''. N.p., 8 July 2013. Web. 28 Oct. 2015. * Braga, Matthew.
The Covert Cellphone Tracking Tech the RCMP and CSIS Won't Talk about
" ''The Globe and Mail''. N.p., 15 Sept. 2014. Web. 28 Oct. 2015. * Brown, Jesse.

''The Star''. N.p., 1 May 2014. Web. 28 Oct. 2015. * Hildebrandt, Amber, Dave Seglins, and Michael Pereira.
CSE Monitors Millions of Canadian Emails to Government
" ''CBC News Canada''. N.p., 25 Feb. 2015. Web. 28 Oct. 2015. * Lievrouw, Leah A. ''Alternative and Activist New Media''. Cambridge, UK: Polity, 2011. Print. {{DEFAULTSORT:Surveillance Abuse Law enforcement Human rights abuses