Surveillance abuse

Last updated

Surveillance abuse is the use of surveillance methods or technology, including targeted surveillance and mass surveillance, to monitor the activity of an individual or group of individuals in ways that violate social norms, laws, or human rights.

Contents

Patterns

To align with the Universal Declaration of Human Rights, use of communications surveillance must be lawful, have legitimate aims such as public safety or national security, be necessary and proportional to the legitimate aims, be monitored against abuse by judicial authority, respect due process, and provide appropriate public transparency, among other principles. [1] [2] [3]

Governments have abused surveillance technologies to target protestors and dissidents in ways that result in restricting their civil and political rights, profile people on the basis of ethnicity or race in ways that support discrimination, and undermine people's right to privacy, among other impacts. [4]

Examples

During the U.S. FBI's COINTELPRO operations between 1956 and 1971, there was widespread surveillance abuse which targeted political dissidents, primarily people from the political left and civil rights movement. The Church Committee investigated and reported on these abuses in 1975–1976. [5]

The 2013 Snowden disclosures included evidence of "LOVEINT", the practice of U.S. National Security Agency employees using their extensive monitoring capabilities to spy on a love interest or spouse. [6] [7]

In the 2010s and 2020s, the Pegasus Project revealed governments' espionage on journalists, opposition politicians, activists, business people and others using the private Pegasus spyware developed by the Israeli technology and cyber-arms company NSO Group. [8] In 2025, Citizen Lab found evidence that the Italian government had targeted three European investigative journalists with Paragon Solutions spyware on their devices. [9]

The Chinese government's persecution of Uyghurs in China (2014–present) has involved deployment of mass surveillance systems, including cellphone surveillance and biometric data, in ways that support political repression and violate human rights. [10] [11]

Surveillance abuse also happens on a smaller scale. In 2005, government workers in Liverpool used street CCTV pan-tilt-zoom cameras to spy on a woman in her flat. [12] [13] In Robbins v. Lower Merion School District (2010), parents in Pennsylvania sued their son's school for allegedly watching him through his laptop's webcam while he was at home and unaware he was being observed. [14]

A device which may be used to abuse surveillance, called an IMSI-catcher or Stingray phone tracker, acts and looks similar to a cellphone tower but tricks mobile devices into connecting with it. After connection, an operator can intercept phone calls and text messages from anyone in the relevant area or as part of an investigation of a particular person nearby. [15] These devices have been exported to countries with histories of abusing surveillance technologies. [16]

Canada's Communications Security Establishment (CSE) has spied on Canadians through the public wireless internet connections in an airport in the country. Through this they gathered information on who people called or texted and where they were when they communicated with others. The CSE searched through approximately 10-15 million downloads daily. [17] [18] [19]

See also

Further reading

References

  1. "Necessary & Proportionate: International Principles on the Application of Human Rights Law to Communications Surveillance". Necessary and Proportionate. Electronic Frontier Foundation. May 2014. Retrieved 6 February 2026.
  2. "Necessary & Proportionate: International Principles on the Application of Human Rights Law to Communications Surveillance - Background and Supporting International Legal Analysis" (PDF). Office of the United Nations High Commissioner for Human Rights . May 2014. Retrieved 6 February 2026.
  3. "Legality, Necessity and Proportionality". Privacy International . Retrieved 6 February 2026.
  4. "A/HRC/60/45: The right to privacy in the digital age - Report of the Office of the United Nations High Commissioner for Human Rights". Office of the United Nations High Commissioner for Human Rights . 29 August 2025. Retrieved 2026-02-07.
  5. "Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities (The Church Committee)". U.S. Senate. Retrieved 2026-02-07.
  6. Gorman, Siobhan (August 23, 2013). "NSA Officers Spy on Love Interests". The Wall Street Journal.
  7. Brandeisky, Kara (2014-01-17). "Four Questionable Claims Obama Has Made on NSA Surveillance". ProPublica. Retrieved 2026-02-07.
  8. Brackett, Sara Ann; Roberts, Jen (2025-09-30). "404 Accountability not found: Spyware accountability through software liability". Atlantic Council. Retrieved 2026-02-07.
  9. Kinetz, Erika; Santalucia, Paolo (June 12, 2025). "US-backed Israeli company's spyware used to target European journalists, Citizen Lab finds". AP News. Retrieved 7 February 2026.
  10. "China: Phone Search Program Tramples Uyghur Rights". Human Rights Watch . 2023-05-04. Retrieved 2026-02-07.
  11. Goudarzi, Sara (2022-10-27). "China's high-tech surveillance drives oppression of Uyghurs". Bulletin of the Atomic Scientists . Retrieved 2026-02-07.
  12. Cavailaro, Andrea (2007-03-31). "Privacy in Video Surveillance [In the Spotlight]". IEEE Signal Processing Magazine. 24 (2): 168–166. doi:10.1109/MSP.2007.323270. ISSN   1558-0792.
  13. "Peeping tom CCTV workers jailed". BBC News. 2006-01-13. Retrieved 2026-02-07.
  14. "Abuses of surveillance cameras". Surveillance Camera Players. 2010-04-12. Retrieved 2026-02-07.
  15. Braga, Matthew. "The Covert Cellphone Tracking Tech the RCMP and CSIS Won't Talk about." The Globe and Mail. N.p., 15 Sept. 2014. Web. 28 Oct. 2015.
  16. Cox, Joseph (2016-08-26). "British Companies Are Selling Advanced Spy Tech to Authoritarian Regimes". VICE. Retrieved 2026-02-07.
  17. Alexander, Julia (8 July 2013). "How the Canadian Government Can Spy on Your Online Activities". Toronto Sun.
  18. Brown, Jesse (May 1, 2014). "Where Is Canada's Rage over Digital Surveillance?". Toronto Star.
  19. Hildebrant, Ambera; Dave Seglins and Michael Pereira (February 25, 2015). "CSE Monitors Millions of Canadian Emails to Government". CBC News Canada.{{cite web}}: CS1 maint: multiple names: authors list (link)