About: Surveillance abuse     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : yago:WikicatSurveillanceScandals, within Data Space : dbpedia.org associated with source document(s)
QRcode icon
http://dbpedia.org/c/6KX9rTXo6x

Surveillance abuse is the use of surveillance methods or technology to monitor the activity of an individual or group of individuals in a way which violates the social norms or laws of a society. During the FBI's COINTELPRO operations, there was widespread surveillance abuse which targeted political dissidents, primarily people from the political left and civil rights movement. Other abuses include "LOVEINT" which refers to the practice of secret service employees using their extensive monitoring capabilities to spy on their love interest or spouse.

AttributesValues
rdf:type
rdfs:label
  • Abus de surveillance (fr)
  • Surveillance abuse (en)
rdfs:comment
  • L'abus de surveillance est l'utilisation de méthodes ou de technologies de surveillance afin de surveiller l'activité d'un individu ou d'un groupe d'individu de sorte que cela viole des normes sociales ou des lois de la société. (fr)
  • Surveillance abuse is the use of surveillance methods or technology to monitor the activity of an individual or group of individuals in a way which violates the social norms or laws of a society. During the FBI's COINTELPRO operations, there was widespread surveillance abuse which targeted political dissidents, primarily people from the political left and civil rights movement. Other abuses include "LOVEINT" which refers to the practice of secret service employees using their extensive monitoring capabilities to spy on their love interest or spouse. (en)
dct:subject
Wikipage page ID
Wikipage revision ID
Link from a Wikipage to another Wikipage
Link from a Wikipage to an external page
sameAs
dbp:wikiPageUsesTemplate
has abstract
  • Surveillance abuse is the use of surveillance methods or technology to monitor the activity of an individual or group of individuals in a way which violates the social norms or laws of a society. During the FBI's COINTELPRO operations, there was widespread surveillance abuse which targeted political dissidents, primarily people from the political left and civil rights movement. Other abuses include "LOVEINT" which refers to the practice of secret service employees using their extensive monitoring capabilities to spy on their love interest or spouse. There is no prevention in the amount of unauthorized data collected on individuals and this leads to cases where cameras are installed inappropriately. “For instance, according to the BBC, four council workers in Liverpool used a street CCTV pan-tilt-zoom camera to spy on a woman in her apartment.” (Cavallaro, 2007). This is just one case where culprits have been caught; however, there are still many common acts such as this. Another incident of inappropriate installation now has “Pennsylvania parents suing their son's school, alleging it watched him through his laptop's webcam while he was at home and unaware he was being observed.” (Surveillance Camera Players, 2010). This leads to the misconception of surveillance, as it once was a tool to monitor and make sure citizens abide by the law, it has now created even more problems. With cameras only becoming more advanced and more common, it is difficult to determine whether these surveillance cameras are helping to ensure a safe society or leading to bigger issues altogether. With the growing of Web 2.0 and social networking sites, surveillance may be more easily and commonly abused in many situations for a variety of reasons. For example, the Communications Security Establishment (CSE), formerly known as Communications Security Establishment Canada (CSEC), has previously spied on Canadians through the public wireless internet connections in an airport in the country. Through this they gathered information on who people called or texted and where they were when they communicated with others. The CSE search through approximately 10-15 million downloads daily. An example of where surveillance may have been abused is where Facebook and Apple have admitted to allowing government officials to access personal information of their account users. A device which may be used to abuse surveillance, called a Stingray, acts and looks similar to a cellphone tower but it tricks mobile devices into connecting with it. After connected an operator can take information stored on the device, sometimes intercepting phone calls and text messages. This method of surveillance can be used on random civilians or in an investigation of a particular person. (en)
  • L'abus de surveillance est l'utilisation de méthodes ou de technologies de surveillance afin de surveiller l'activité d'un individu ou d'un groupe d'individu de sorte que cela viole des normes sociales ou des lois de la société. (fr)
gold:hypernym
prov:wasDerivedFrom
page length (characters) of wiki page
foaf:isPrimaryTopicOf
is Link from a Wikipage to another Wikipage of
is Wikipage redirect of
Faceted Search & Find service v1.17_git147 as of Sep 06 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 08.03.3331 as of Sep 2 2024, on Linux (x86_64-generic-linux-glibc212), Single-Server Edition (378 GB total memory, 69 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software