| Part ofa series on |
| Global surveillance |
|---|
| Disclosures |
| Systems |
| Selected agencies |
| Places |
| Laws |
| Proposed changes |
| Concepts |
| Related topics |
Surveillance abuse is the use ofsurveillance methods or technology, includingtargeted surveillance andmass surveillance, to monitor the activity of an individual or group of individuals in ways that violatesocial norms,laws, orhuman rights.
This sectionneeds expansion. You can help byadding missing information.(February 2026) |
To align with theUniversal Declaration of Human Rights, use of communications surveillance must belawful, have legitimate aims such aspublic safety ornational security, be necessary and proportional to the legitimate aims, be monitored against abuse by judicial authority, respectdue process, and provide appropriatepublic transparency, among other principles.[1][2][3]
Governments have abusedsurveillance technologies to targetprotestors anddissidents in ways that result in restricting theircivil and political rights, profile people on the basis ofethnicity orrace in ways that supportdiscrimination, and undermine people'sright to privacy, among other impacts.[4]
This sectionneeds expansion. You can help byadding missing information.(February 2026) |
During the U.S.FBI'sCOINTELPRO operations between 1956 and 1971, there was widespread surveillance abuse which targeted politicaldissidents, primarily people from thepolitical left andcivil rights movement. TheChurch Committee investigated and reported on these abuses in 1975–1976.[5]
The 2013Snowden disclosures included evidence of "LOVEINT", the practice of U.S.National Security Agency employees using their extensive monitoring capabilities to spy on a love interest or spouse.[6][7]
In the 2010s and 2020s, thePegasus Project revealed governments'espionage on journalists,opposition politicians,activists, business people and others using the privatePegasusspyware developed by theIsraeli technology andcyber-arms companyNSO Group.[8] In 2025,Citizen Lab found evidence that the Italian government had targeted three Europeaninvestigative journalists withParagon Solutions spyware on their devices.[9]
The Chinese government'spersecution of Uyghurs in China (2014–present) has involved deployment of mass surveillance systems, includingcellphone surveillance andbiometric data, in ways that supportpolitical repression and violate human rights.[10][11]
Surveillance abuse also happens on a smaller scale. In 2005, government workers inLiverpool used streetCCTV pan-tilt-zoom cameras to spy on a woman in her flat.[12][13] InRobbins v. Lower Merion School District (2010), parents inPennsylvania sued their son's school for allegedly watching him through his laptop's webcam while he was at home and unaware he was being observed.[14]
A device which may be used to abuse surveillance, called anIMSI-catcher orStingray phone tracker, acts and looks similar to a cellphone tower but tricks mobile devices into connecting with it. After connection, an operator can intercept phone calls and text messages from anyone in the relevant area or as part of an investigation of a particular person nearby.[15] These devices have been exported to countries with histories of abusing surveillance technologies.[16]
Canada'sCommunications Security Establishment (CSE) has spied on Canadians through the public wireless internet connections in an airport in the country. Through this they gathered information on who people called or texted and where they were when they communicated with others. The CSE searched through approximately 10-15 million downloads daily.[17][18][19]
{{cite web}}: CS1 maint: multiple names: authors list (link)