Surveillance abuse

Surveillance abuse is the use of surveillance methods or technology to monitor the activity of an individual or group of individuals in a way which violates the social norms or laws of a society.

During the FBI's COINTELPRO operations, there was widespread surveillance abuse which targeted political dissidents, primarily people from the political left and civil rights movement.

Other abuses include "LOVEINT" which refers to the practice of secret service employees using their extensive monitoring capabilities to spy on their love interest or spouse.

There is no prevention in the amount of unauthorized data collected on individuals and this leads to cases where cameras are installed inappropriately. “For instance, according to the BBC, four council workers in Liverpool used a street CCTV pan-tilt-zoom camera to spy on a woman in her apartment.” (Cavallaro, 2007). This is just one case where culprits have been caught; however, there are still many common acts such as this. Another incident of inappropriate installation now has “Pennsylvania parents suing their son's school, alleging it watched him through his laptop's webcam while he was at home and unaware he was being observed.” (Surveillance Camera Players, 2010). This leads to the misconception of surveillance, as it once was a tool to monitor and make sure citizens abide by the law, it has now created even more problems. With cameras only becoming more advanced and more common, it is difficult to determine whether these surveillance cameras are helping to ensure a safe society or leading to bigger issues altogether.

With the growing of Web 2.0 and social networking sites, surveillance may be more easily and commonly abused in many situations for a variety of reasons. For example, the Communications Security Establishment (CSE), formerly known as Communications Security Establishment Canada (CSEC), has previously spied on Canadians through the public wireless internet connections in an airport in the country. Through this they gathered information on who people called or texted and where they were when they communicated with others. The CSE search through approximately 10-15 million downloads daily. An example of where surveillance may have been abused is where Facebook and Apple have admitted to allowing government officials to access personal information of their account users.

A device which may be used to abuse surveillance, called a Stingray, acts and looks similar to a cellphone tower but it tricks mobile devices into connecting with it. After connected an operator can take information stored on the device, sometimes intercepting phone calls and text messages. This method of surveillance can be used on random civilians or in an investigation of a particular person.