Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Surveillance abuse

From Wikipedia, the free encyclopedia
Unsanctioned or illegal monitoring of a person or group
Part ofa series on
Global surveillance
Disclosures
Systems
Selected agencies
Places
Laws
Proposed changes
Concepts
Related topics

Surveillance abuse is the use ofsurveillance methods or technology, includingtargeted surveillance andmass surveillance, to monitor the activity of an individual or group of individuals in ways that violatesocial norms,laws, orhuman rights.

Patterns

[edit]
[icon]
This sectionneeds expansion. You can help byadding missing information.(February 2026)

To align with theUniversal Declaration of Human Rights, use of communications surveillance must belawful, have legitimate aims such aspublic safety ornational security, be necessary and proportional to the legitimate aims, be monitored against abuse by judicial authority, respectdue process, and provide appropriatepublic transparency, among other principles.[1][2][3]

Governments have abusedsurveillance technologies to targetprotestors anddissidents in ways that result in restricting theircivil and political rights, profile people on the basis ofethnicity orrace in ways that supportdiscrimination, and undermine people'sright to privacy, among other impacts.[4]

Examples

[edit]
[icon]
This sectionneeds expansion. You can help byadding missing information.(February 2026)

During the U.S.FBI'sCOINTELPRO operations between 1956 and 1971, there was widespread surveillance abuse which targeted politicaldissidents, primarily people from thepolitical left andcivil rights movement. TheChurch Committee investigated and reported on these abuses in 1975–1976.[5]

The 2013Snowden disclosures included evidence of "LOVEINT", the practice of U.S.National Security Agency employees using their extensive monitoring capabilities to spy on a love interest or spouse.[6][7]

In the 2010s and 2020s, thePegasus Project revealed governments'espionage on journalists,opposition politicians,activists, business people and others using the privatePegasusspyware developed by theIsraeli technology andcyber-arms companyNSO Group.[8] In 2025,Citizen Lab found evidence that the Italian government had targeted three Europeaninvestigative journalists withParagon Solutions spyware on their devices.[9]

The Chinese government'spersecution of Uyghurs in China (2014–present) has involved deployment of mass surveillance systems, includingcellphone surveillance andbiometric data, in ways that supportpolitical repression and violate human rights.[10][11]

Surveillance abuse also happens on a smaller scale. In 2005, government workers inLiverpool used streetCCTV pan-tilt-zoom cameras to spy on a woman in her flat.[12][13] InRobbins v. Lower Merion School District (2010), parents inPennsylvania sued their son's school for allegedly watching him through his laptop's webcam while he was at home and unaware he was being observed.[14]

A device which may be used to abuse surveillance, called anIMSI-catcher orStingray phone tracker, acts and looks similar to a cellphone tower but tricks mobile devices into connecting with it. After connection, an operator can intercept phone calls and text messages from anyone in the relevant area or as part of an investigation of a particular person nearby.[15] These devices have been exported to countries with histories of abusing surveillance technologies.[16]

Canada'sCommunications Security Establishment (CSE) has spied on Canadians through the public wireless internet connections in an airport in the country. Through this they gathered information on who people called or texted and where they were when they communicated with others. The CSE searched through approximately 10-15 million downloads daily.[17][18][19]

See also

[edit]

Further reading

[edit]

References

[edit]
  1. ^"Necessary & Proportionate: International Principles on the Application of Human Rights Law to Communications Surveillance".Necessary and Proportionate.Electronic Frontier Foundation. May 2014. Retrieved6 February 2026.
  2. ^"Necessary & Proportionate: International Principles on the Application of Human Rights Law to Communications Surveillance - Background and Supporting International Legal Analysis"(PDF).Office of the United Nations High Commissioner for Human Rights. May 2014. Retrieved6 February 2026.
  3. ^"Legality, Necessity and Proportionality".Privacy International. Retrieved6 February 2026.
  4. ^"A/HRC/60/45: The right to privacy in the digital age - Report of the Office of the United Nations High Commissioner for Human Rights".Office of the United Nations High Commissioner for Human Rights. 29 August 2025. Retrieved2026-02-07.
  5. ^"Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities (The Church Committee)".U.S. Senate. Retrieved2026-02-07.
  6. ^Gorman, Siobhan (August 23, 2013)."NSA Officers Spy on Love Interests".The Wall Street Journal.
  7. ^Brandeisky, Kara (2014-01-17)."Four Questionable Claims Obama Has Made on NSA Surveillance".ProPublica. Retrieved2026-02-07.
  8. ^Brackett, Sara Ann; Roberts, Jen (2025-09-30)."404 Accountability not found: Spyware accountability through software liability".Atlantic Council. Retrieved2026-02-07.
  9. ^Kinetz, Erika; Santalucia, Paolo (June 12, 2025)."US-backed Israeli company's spyware used to target European journalists, Citizen Lab finds".AP News. Retrieved7 February 2026.
  10. ^"China: Phone Search Program Tramples Uyghur Rights".Human Rights Watch. 2023-05-04. Retrieved2026-02-07.
  11. ^Goudarzi, Sara (2022-10-27)."China's high-tech surveillance drives oppression of Uyghurs".Bulletin of the Atomic Scientists. Retrieved2026-02-07.
  12. ^Cavailaro, Andrea (2007-03-31)."Privacy in Video Surveillance [In the Spotlight]".IEEE Signal Processing Magazine.24 (2):168–166.doi:10.1109/MSP.2007.323270.ISSN 1558-0792.
  13. ^"Peeping tom CCTV workers jailed".BBC News. 2006-01-13. Retrieved2026-02-07.
  14. ^"Abuses of surveillance cameras".Surveillance Camera Players. 2010-04-12. Retrieved2026-02-07.
  15. ^Braga, Matthew. "The Covert Cellphone Tracking Tech the RCMP and CSIS Won't Talk about."The Globe and Mail. N.p., 15 Sept. 2014. Web. 28 Oct. 2015.
  16. ^Cox, Joseph (2016-08-26)."British Companies Are Selling Advanced Spy Tech to Authoritarian Regimes".VICE. Retrieved2026-02-07.
  17. ^Alexander, Julia (8 July 2013)."How the Canadian Government Can Spy on Your Online Activities".Toronto Sun.
  18. ^Brown, Jesse (May 1, 2014)."Where Is Canada's Rage over Digital Surveillance?".Toronto Star.
  19. ^Hildebrant, Ambera; Dave Seglins and Michael Pereira (February 25, 2015)."CSE Monitors Millions of Canadian Emails to Government".CBC News Canada.{{cite web}}: CS1 maint: multiple names: authors list (link)

External links

[edit]
Types
Related topics
Principles
Privacy laws
Data protection authorities
Areas
Information privacy
Advocacy organizations
See also
Retrieved from "https://en.wikipedia.org/w/index.php?title=Surveillance_abuse&oldid=1337172434"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp