enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Surveillance abuse - Wikipedia

    en.wikipedia.org/wiki/Surveillance_abuse

    Surveillance abuse is the use of surveillance methods or technology to monitor the activity of an individual or group of individuals in a way which violates the social norms or laws of a society. During the FBI 's COINTELPRO operations, there was widespread surveillance abuse which targeted political dissidents , primarily people from the ...

  3. New York City Police Department corruption and misconduct

    en.wikipedia.org/wiki/New_York_City_Police...

    In spite of restrictions set by the Handschu agreement against police surveillance of peaceful citizen activities, like political organizing, law enforcement officials in New York have been able to weaken or violate the restrictions in order to carry out surveillance of the 2004 Republic National Convention protesters, [66] the Muslim community ...

  4. List of government mass surveillance projects - Wikipedia

    en.wikipedia.org/wiki/List_of_government_mass...

    ICREACH: Surveillance frontend GUI that is shared with 23 government agencies, including the CIA, DEA, and FBI, to search illegally collected personal records. Magic Lantern: A keystroke logging software deployed by the FBI in the form of an e-mail attachment. When activated, it acts as a trojan horse and allows the FBI to decrypt user ...

  5. Whistleblower protection in the United States - Wikipedia

    en.wikipedia.org/wiki/Whistleblower_protection...

    Employees who carry pesticide into the workplace from home violate the Hazard Communication Standard. [95] Managers may threaten to take disciplinary employment action if an employee fails to disclose criminal activity. Government employees also have Garrity rights, and must assert the following when questioned by management.

  6. Covert listening device - Wikipedia

    en.wikipedia.org/wiki/Covert_listening_device

    Due to privacy and human rights laws, using a listening or recording device to intrude on the reasonable expectation of privacy of an individual is highly illegal, i.e. placing gadgets in someone's home or car to which one does not have permitted access, or in a private area such as a bathroom.

  7. Computer and network surveillance - Wikipedia

    en.wikipedia.org/wiki/Computer_and_network...

    The vast majority of computer surveillance involves the monitoring of personal data and traffic on the Internet. [7] For example, in the United States, the Communications Assistance For Law Enforcement Act mandates that all phone calls and broadband internet traffic (emails, web traffic, instant messaging, etc.) be available for unimpeded, real-time monitoring by Federal law enforcement agencies.

  8. Proposed reforms of mass surveillance by the United States

    en.wikipedia.org/wiki/Proposed_reforms_of_mass...

    On January 25, the board released a "Report on the Telephone Records Program Conducted under Section 215of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court", a 238-page document on mass surveillance. A majority of the board "deemed the spying illegal and is calling for it to be shut down". [31]

  9. Targeted surveillance - Wikipedia

    en.wikipedia.org/wiki/Targeted_surveillance

    In the 2015 "Resolution 2045", the European Parliamentary Assembly "recognises the need for effective, targeted surveillance of suspected terrorists and other organised criminal groups" and states that "such targeted surveillance can be an effective tool for law enforcement and crime prevention", while at the same time "according to independent ...