{"id":85578,"date":"2022-12-03T16:03:35","date_gmt":"2022-12-03T20:03:35","guid":{"rendered":"https:\/\/www.shortform.com\/blog\/?p=85578"},"modified":"2022-12-06T15:41:55","modified_gmt":"2022-12-06T19:41:55","slug":"what-is-mass-surveillance","status":"publish","type":"post","link":"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/","title":{"rendered":"What Is Mass Surveillance? An 80-Year Historical Review"},"content":{"rendered":"\n<p>What is mass surveillance and how did it begin? How has mass surveillance changed over the years?<\/p>\n\n\n\n<p>Mass surveillance has become a daily part of life, as corporations and governments around the world openly collect data about who we are and how we live our lives. Increasingly more sophisticated methods have taken hold since the onset of mass surveillance over 80 years ago.<\/p>\n\n\n\n<p>Keep reading to learn what mass surveillance is, how it works, and how it has evolved in society.<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-mass-surveillance\">What Is Mass Surveillance?<\/h2>\n\n\n\n<p>Nowadays, <a href=\"https:\/\/www.businessinsider.com\/invasion-of-data-privacy-online-in-person-examples-2020-1\" target=\"_blank\" rel=\"noreferrer noopener\">governments<\/a> and <a href=\"https:\/\/www.businessnewsdaily.com\/10625-businesses-collecting-data.html\" target=\"_blank\" rel=\"noreferrer noopener\">corporations<\/a> around the world openly collect data on who we are and how we live our lives\u2014but what is mass surveillance, exactly? To understand why (and how) mass surveillance has become commonplace, we have to look at its origins (indiscriminately watching and collecting data on everyone) and the histories of government agencies across the world that practice it.<\/p>\n\n\n\n<p>In this article, we\u2019ll show how over the past 80 years, intelligence agencies used technology, law, and brute force to go from wartime spying to running permanent and massive surveillance operations. We\u2019ll mainly focus on domestic surveillance\u2014a government watching its own people\u2014and how trends in mass surveillance impacted countries across the world. Keep in mind that for this topic, <strong>less readily available information about an intelligence agency doesn\u2019t necessarily mean less activity<\/strong>\u2014many intelligence documents from the last 80 years remain classified.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-surveillance-post-world-war-ii-1945-1969\">Surveillance Post-World War II (1945-1969)<\/h3>\n\n\n\n<p>We\u2019ll start by discussing mass surveillance and intelligence agencies in the years following the Second World War. While mass surveillance did exist before this\u2014government officials in <a href=\"https:\/\/www.historyandpolicy.org\/policy-papers\/papers\/surveillance-privacy-and-history\" target=\"_blank\" rel=\"noreferrer noopener\">Victorian England regularly opened personal mail, for example<\/a>\u2014it was far less widespread and consistent. Tension ramped up quickly between the United States and Soviet Union following the end of World War II, and in response, many countries chose to continue using parts (or all) of their wartime spy agencies. During this period, most of these agencies operated as they had during the war\u2014with absolute secrecy and no oversight from non-military portions of the government.<\/p>\n\n\n\n<p>In this section, we\u2019ll discuss the methods and political trends that defined mass surveillance in the decades following World War II.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-methods\">Methods<\/h4>\n\n\n\n<p><strong>Wiretapping\/bugs: <\/strong>Wiretaps allow governments to <a href=\"https:\/\/www.newyorker.com\/magazine\/1938\/06\/18\/tapping-the-wires\" target=\"_blank\" rel=\"noreferrer noopener\">listen in on phone calls and telegrams<\/a>, while bugs are small recording devices used to monitor <a href=\"https:\/\/www.wired.com\/story\/surveillance-history-wiretapping-brian-hochman\/\" target=\"_blank\" rel=\"noreferrer noopener\">in-person conversations.<\/a> Often, telephone companies or governments built telephone infrastructure that allowed for <a href=\"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/\">government surveillance<\/a>.&nbsp;<\/p>\n\n\n\n<p><strong>Film cameras: <\/strong>The<strong> <\/strong>Stasi, or Eastern German secret police, in particular, used film <a href=\"https:\/\/www.imaging-resource.com\/news\/2013\/09\/19\/a-look-at-the-incredible-hidden-cameras-of-the-stasi\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cspy cameras\u201d to secretly take still photos of citizens.<\/a> However, cameras at the time were bulky and could only take a limited number of pictures.<\/p>\n\n\n\n<p><strong>Informant networks: <\/strong>Informants are either government employees or citizens who report \u201csuspicious\u201d behavior to the government. Informants often actively work to infiltrate organizations targeted by their governments.&nbsp;<\/p>\n\n\n\n<p><strong>Public opinion: <\/strong>Intelligence agencies also sought to monitor and control public opinion using polls, data collection, and propaganda. This meant anything from <a href=\"https:\/\/www.jstor.org\/stable\/24914162\" target=\"_blank\" rel=\"noreferrer noopener\">covertly<\/a> (or <a href=\"https:\/\/www.theatlantic.com\/science\/archive\/2018\/12\/project-troy-science-cold-war-psychological-warfare\/576847\/\" target=\"_blank\" rel=\"noreferrer noopener\">explicitly<\/a>) funding research to <a href=\"https:\/\/www.wilsoncenter.org\/blog-post\/operation-denver-kgb-and-stasi-disinformation-regarding-aids\" target=\"_blank\" rel=\"noreferrer noopener\">actively promoting disinformation<\/a>.<\/p>\n\n\n\n<p><strong>Lists and information banks: <\/strong>Governments used large-scale file systems to collect and store information about citizens\u2014their private lives, public lives, what was in their garbage, and so on. In particular, countries including the U.S. used information banks <a href=\"https:\/\/vault.fbi.gov\/cointel-pro\" target=\"_blank\" rel=\"noreferrer noopener\">to collect data on suspected \u201cdissidents.\u201d<\/a>&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-cold-war-escalation\">Cold War Escalation<\/h3>\n\n\n\n<p>In the years following World War II, the Cold War between the United States and the Soviet Union quickly escalated worldwide. In response, countries all over the world expanded their espionage and counter-espionage efforts\u2014efforts that also included mass surveillance.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-examples\">Examples<\/h4>\n\n\n\n<p><strong>France: <\/strong>The Fourth French Republic\u2019s intelligence agency SDECE used <a href=\"https:\/\/www.amazon.com\/Spy-Book-Encyclopedia-Norman-Palmer\/dp\/0679425144\" target=\"_blank\" rel=\"noreferrer noopener\">large-scale assassination campaigns<\/a> along with torture to control dissent in France itself as well as in French colonies like Vietnam and Algeria.<\/p>\n\n\n\n<p><strong>East Germany: <\/strong>Throughout its existence, Soviet-backed Stasi secret police conducted enormous amounts of surveillance. <a href=\"https:\/\/www.spiegel.de\/international\/germany\/east-german-spies-new-study-finds-more-stasi-spooks-a-540771.html\" target=\"_blank\" rel=\"noreferrer noopener\">Gigantic networks of wiretaps, informants, and disinformation campaigns<\/a> allowed members of the Stasi to monitor and control East German citizens indiscriminately.&nbsp;<\/p>\n\n\n\n<p><strong>The Soviet Union: <\/strong>After the Second World War, the Soviet Union\u2019s intelligence agencies (mainly the KGB) continued using their massive surveillance networks to monitor, imprison, and torture Soviet citizens. The Soviet Union (particularly under Joseph Stalin) in particular used vast networks of informants, encouraging citizens to watch and report each other in part by <a href=\"https:\/\/www.researchgate.net\/publication\/236718555_Getting_to_Know_You_The_Soviet_Surveillance_System_1939-57\" target=\"_blank\" rel=\"noreferrer noopener\">making it illegal to not report \u201ctreason and counterrevolutionary crimes.\u201d<\/a> After Stalin, subsequent Soviet leaders eased some of the KGB\u2019s more repressive and brutal tactics.<\/p>\n\n\n\n<p><strong>The United States:<\/strong> Following World War II, American intelligence agencies like the FBI under J. Edgar Hoover and <a href=\"https:\/\/www.shortform.com\/blog\/the-cia-operations-technology-langley\/\">the CIA<\/a> under Alan Dulles conducted mass surveillance operations. The FBI\u2019s <a href=\"https:\/\/vault.fbi.gov\/cointel-pro\" target=\"_blank\" rel=\"noreferrer noopener\">COINTELPRO<\/a> used <a href=\"https:\/\/www.ojp.gov\/ncjrs\/virtual-library\/abstracts\/fbi-secrets-agents-expose\" target=\"_blank\" rel=\"noreferrer noopener\">wiretaps, informants, misinformation campaigns, and assassinations<\/a> to monitor, suppress, evict, fire, and murder American citizens deemed \u201csuspicious\u201d (particularly members of leftist groups, the civil rights and Black Panther movements, and labor unions). In addition to its extensive operations abroad, the CIA also allegedly infiltrated and influenced <a href=\"https:\/\/www.carlbernstein.com\/the-cia-and-the-media-rolling-stone-10-20-1977?rq=the%20cia%20and%20the%20media\" target=\"_blank\" rel=\"noreferrer noopener\">media organizations<\/a> and <a href=\"https:\/\/www.nytimes.com\/1967\/02\/16\/archives\/ramparts-says-cia-received-student-report-magazine-declares-agency.html\" target=\"_blank\" rel=\"noreferrer noopener\">student groups<\/a> through <a href=\"https:\/\/spartacus-educational.com\/JFKmockingbird.htm\" target=\"_blank\" rel=\"noreferrer noopener\">Operation Mockingbird<\/a><strong> <\/strong>and other projects.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-decolonization\">Decolonization<\/h3>\n\n\n\n<p>In the decades following the end of World War II, mass surveillance tactics also became common in colonies or newly independent nations across Africa and Asia\u2014either as a way for colonizers to suppress dissent or for new post-colonial regimes to tighten their grip on power. In particular, the American CIA and Soviet KGB (and the agencies that preceded them) trained and outfitted other intelligence agencies across the globe.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-examples-1\">Examples<\/h4>\n\n\n\n<p><strong>India:<\/strong> India\u2019s Intelligence Bureau was active in the years following India\u2019s <a href=\"https:\/\/www.shortform.com\/blog\/maturity-continuum-7-habits\/\">independence<\/a> from Britain. In the following decades, <a href=\"https:\/\/hindupost.in\/history\/the-kgb-papers-it-seemed-like-the-entire-country-was-for-sale-indira-gandhi\/\" target=\"_blank\" rel=\"noreferrer noopener\">the IB received training and support from the KGB<\/a>. However, what the IB did or didn\u2019t do is uncertain, since they have declassified almost no documents from this (or any other) period.<\/p>\n\n\n\n<p><strong>Iran: <\/strong>After a 1953 CIA coup installed Mohammad Reza Pahlavi as the Shah of Iran, he (with resources and training from the CIA and Israel\u2019s intelligence agency Mossad) established the intelligence agency SAVAK. <a href=\"https:\/\/www.refworld.org\/docid\/3ae6aaa724.html\" target=\"_blank\" rel=\"noreferrer noopener\">SAVAK infiltrated unions, newspapers, and student groups, using widespread brutality and surveillance to limit dissent<\/a> and maintain the Shah\u2019s power.<\/p>\n\n\n\n<p><strong>Iraq: <\/strong>Run by Saddam Hussein (before he became dictator), the Iraqi Intelligence Service (IIS) received training from the Egyptian SSIS in the 1960s. The <a href=\"https:\/\/www.rand.org\/content\/dam\/rand\/pubs\/notes\/2007\/N1524.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">KGB supported Saddam a few years later.<\/a><\/p>\n\n\n\n<p><strong>Israel: <\/strong>Intelligence agencies like the Israeli Security Agency (also known as Shin Bet) <a href=\"https:\/\/interactive.aljazeera.com\/aje\/palestineremix\/phone\/inside-shin-bet.html\" target=\"_blank\" rel=\"noreferrer noopener\">started as secret paramilitary groups in Israel<\/a>, and the Israeli government adopted portions of them after gaining independence from the United Kingdom. Israeli intelligence agencies frequently cooperated with the CIA and operated with very little civilian government oversight. In addition, they commonly used (and still use) methods like torture and unlawful imprisonment.<\/p>\n\n\n\n<p><strong>South Africa:<\/strong> Established in the \u201960s, The Bureau of State Security used <a href=\"https:\/\/www.justice.gov.za\/trc\/report\/finalreport\/Volume%202.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">violence and widespread surveillance<\/a> to enforce the Afrikaaner white <a href=\"https:\/\/www.shortform.com\/blog\/trevor-noah-apartheid\/\">apartheid<\/a> regime. Evidence suggests that the BSS was very likely connected to the CIA.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-surveillance-in-the-late-cold-war-1970-1991\">Surveillance in the Late Cold War (1970-1991)<\/h3>\n\n\n\n<p>The late Cold War saw drastic changes in the global political landscape as the result of the Soviet Union\u2019s decline as well as the consequences of foreign intervention in post-colonial nations. Throughout these changes, many intelligence agencies went from tools for \u201cfighting\u201d the Cold War to more permanent fixtures of government.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-methods-1\">Methods<\/h4>\n\n\n\n<p><strong>Spy Satellites: <\/strong>Spy satellites orbit the Earth and can take photos from space and <a href=\"https:\/\/web.archive.org\/web\/20070103071501\/http:\/\/duncan.gn.apc.org\/echelon-dc.htm\" target=\"_blank\" rel=\"noreferrer noopener\">intercept phone calls, radio signals, and other forms of telecommunication<\/a>. Initially developed for international Cold War spying in the 1950s, over time these satellites were used increasingly for domestic surveillance through programs like <a href=\"https:\/\/techcrunch.com\/2015\/08\/03\/uncovering-echelon-the-top-secret-nsa-program-that-has-been-watching-you-your-entire-life\/\" target=\"_blank\" rel=\"noreferrer noopener\">ECHELON<\/a>.&nbsp;<\/p>\n\n\n\n<p><strong>Video surveillance: <\/strong>While it had existed previously, video surveillance (through security cameras, for example) became widespread with the <a href=\"https:\/\/books.google.com\/books?id=DaQY8CrmqFcC&amp;pg=PA276#v=onepage&amp;q&amp;f=false\" target=\"_blank\" rel=\"noreferrer noopener\">development of the VCR in the \u201970s<\/a>\u2014the new technology made recording and storing footage easier and more efficient.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Surveillance in the Internet Age (1991-Present)<\/h3>\n\n\n\n<p>With the collapse of the Soviet Union and the <a href=\"https:\/\/www.shortform.com\/blog\/importance-of-the-fall-of-the-berlin-wall\/\">end of the Cold War<\/a>, many intelligence agencies lost their original justifications for the use of mass surveillance. However, they soon found new justifications for its expanded use\u2014and new technologies to conduct surveillance on a larger scale than ever before.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Methods<\/h4>\n\n\n\n<p><strong>Video surveillance: <\/strong>Modern security cameras create a higher-quality image and can store far more footage. Governments <a href=\"https:\/\/www.aclu.org\/other\/whats-wrong-public-video-surveillance\" target=\"_blank\" rel=\"noreferrer noopener\">often use traffic cameras and can take footage from security cameras of private businesses.<\/a><\/p>\n\n\n\n<p><strong>GPS Tracking: <\/strong>Improvements in satellite technology and the prevalence of smartphones <a href=\"https:\/\/www.pbs.org\/newshour\/politics\/how-an-obscure-cellphone-tracking-tool-provides-police-mass-surveillance-on-a-budget\" target=\"_blank\" rel=\"noreferrer noopener\">allow governments to track people\u2019s locations and movements.<\/a>&nbsp;<\/p>\n\n\n\n<p><strong>Internet activity: <\/strong>Governments can <a href=\"https:\/\/theworld.org\/stories\/2013-07-09\/17-disturbing-things-snowden-has-taught-us-so-far\" target=\"_blank\" rel=\"noreferrer noopener\">survey people\u2019s internet activity<\/a>\u2014the messages they send, the websites they visit, and the applications or programs they use.&nbsp;<strong>Algorithms and artificial intelligence: <\/strong>Governments can use computer algorithms and artificial intelligence to detect patterns of behavior, learn about people, and even predict what they\u2019ll do next. These programs can analyze things like <a href=\"https:\/\/epic.org\/issues\/surveillance-oversight\/face-surveillance\/\" target=\"_blank\" rel=\"noreferrer noopener\">biometric data<\/a> (faces, voices, gait, fingerprints, DNA) and <a href=\"https:\/\/freedomhouse.org\/report\/freedom-on-the-net\/2019\/the-crisis-of-social-media\/social-media-surveillance\" target=\"_blank\" rel=\"noreferrer noopener\">online posts and pictures<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is mass surveillance and how did it begin? How has mass surveillance changed over the years? Mass surveillance has become a daily part of life, as corporations and governments around the world openly collect data about who we are and how we live our lives. Increasingly more sophisticated methods have taken hold since the onset of mass surveillance over 80 years ago. Keep reading to learn what mass surveillance is, how it works, and how it has evolved in society.<\/p>\n","protected":false},"author":19,"featured_media":85592,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[39,24],"tags":[727],"class_list":["post-85578","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-history","category-society","tag-articles","","tg-column-two"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.3 (Yoast SEO v24.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is Mass Surveillance? An 80-Year Historical Review - Shortform Books<\/title>\n<meta name=\"description\" content=\"What is mass surveillance? Read an 80-year historical analysis of the origins and evolution of massive surveillance operations worldwide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Mass Surveillance? An 80-Year Historical Review\" \/>\n<meta property=\"og:description\" content=\"What is mass surveillance? Read an 80-year historical analysis of the origins and evolution of massive surveillance operations worldwide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/\" \/>\n<meta property=\"og:site_name\" content=\"Shortform Books\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-03T20:03:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-06T19:41:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/s3.amazonaws.com\/wordpress.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/cctv-surveillance-camera-on-brick-wall.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1640\" \/>\n\t<meta property=\"og:image:height\" content=\"1232\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emily Kitazawa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emily Kitazawa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/\"},\"author\":{\"name\":\"Emily Kitazawa\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/e094024454c7d3334a149c0cf039bdeb\"},\"headline\":\"What Is Mass Surveillance? An 80-Year Historical Review\",\"datePublished\":\"2022-12-03T20:03:35+00:00\",\"dateModified\":\"2022-12-06T19:41:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/\"},\"wordCount\":1472,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/cctv-surveillance-camera-on-brick-wall.jpg\",\"keywords\":[\"Articles\"],\"articleSection\":[\"History\",\"Society\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/\",\"url\":\"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/\",\"name\":\"What Is Mass Surveillance? An 80-Year Historical Review - Shortform Books\",\"isPartOf\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/cctv-surveillance-camera-on-brick-wall.jpg\",\"datePublished\":\"2022-12-03T20:03:35+00:00\",\"dateModified\":\"2022-12-06T19:41:55+00:00\",\"description\":\"What is mass surveillance? Read an 80-year historical analysis of the origins and evolution of massive surveillance operations worldwide.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/#primaryimage\",\"url\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/cctv-surveillance-camera-on-brick-wall.jpg\",\"contentUrl\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/cctv-surveillance-camera-on-brick-wall.jpg\",\"width\":1640,\"height\":1232},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.shortform.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Mass Surveillance? An 80-Year Historical Review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#website\",\"url\":\"https:\/\/www.shortform.com\/blog\/\",\"name\":\"Shortform Books\",\"description\":\"The World&#039;s Best Book Summaries\",\"publisher\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.shortform.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#organization\",\"name\":\"Shortform Books\",\"url\":\"https:\/\/www.shortform.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2019\/06\/logo-equilateral-with-text-no-bg.png\",\"contentUrl\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2019\/06\/logo-equilateral-with-text-no-bg.png\",\"width\":500,\"height\":74,\"caption\":\"Shortform Books\"},\"image\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/e094024454c7d3334a149c0cf039bdeb\",\"name\":\"Emily Kitazawa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0f5c60fcdcf3b7cd02c2882334c15a3d02f74a69631c696c3bce47deb21dc9ac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0f5c60fcdcf3b7cd02c2882334c15a3d02f74a69631c696c3bce47deb21dc9ac?s=96&d=mm&r=g\",\"caption\":\"Emily Kitazawa\"},\"description\":\"Emily found her love of reading and writing at a young age, learning to enjoy these activities thanks to being taught them by her mom\u2014Goodnight Moon will forever be a favorite. As a young adult, Emily graduated with her English degree, specializing in Creative Writing and TEFL (Teaching English as a Foreign Language), from the University of Central Florida. She later earned her master\u2019s degree in Higher Education from Pennsylvania State University. Emily loves reading fiction, especially modern Japanese, historical, crime, and philosophical fiction. Her personal writing is inspired by observations of people and nature.\",\"url\":\"https:\/\/www.shortform.com\/blog\/author\/emily-kitazawa\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Is Mass Surveillance? An 80-Year Historical Review - Shortform Books","description":"What is mass surveillance? Read an 80-year historical analysis of the origins and evolution of massive surveillance operations worldwide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/","og_locale":"en_US","og_type":"article","og_title":"What Is Mass Surveillance? An 80-Year Historical Review","og_description":"What is mass surveillance? Read an 80-year historical analysis of the origins and evolution of massive surveillance operations worldwide.","og_url":"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/","og_site_name":"Shortform Books","article_published_time":"2022-12-03T20:03:35+00:00","article_modified_time":"2022-12-06T19:41:55+00:00","og_image":[{"width":1640,"height":1232,"url":"https:\/\/s3.amazonaws.com\/wordpress.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/cctv-surveillance-camera-on-brick-wall.jpg","type":"image\/jpeg"}],"author":"Emily Kitazawa","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Emily Kitazawa","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/#article","isPartOf":{"@id":"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/"},"author":{"name":"Emily Kitazawa","@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/e094024454c7d3334a149c0cf039bdeb"},"headline":"What Is Mass Surveillance? An 80-Year Historical Review","datePublished":"2022-12-03T20:03:35+00:00","dateModified":"2022-12-06T19:41:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/"},"wordCount":1472,"commentCount":0,"publisher":{"@id":"https:\/\/www.shortform.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/cctv-surveillance-camera-on-brick-wall.jpg","keywords":["Articles"],"articleSection":["History","Society"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/","url":"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/","name":"What Is Mass Surveillance? An 80-Year Historical Review - Shortform Books","isPartOf":{"@id":"https:\/\/www.shortform.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/#primaryimage"},"image":{"@id":"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/cctv-surveillance-camera-on-brick-wall.jpg","datePublished":"2022-12-03T20:03:35+00:00","dateModified":"2022-12-06T19:41:55+00:00","description":"What is mass surveillance? Read an 80-year historical analysis of the origins and evolution of massive surveillance operations worldwide.","breadcrumb":{"@id":"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/#primaryimage","url":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/cctv-surveillance-camera-on-brick-wall.jpg","contentUrl":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/cctv-surveillance-camera-on-brick-wall.jpg","width":1640,"height":1232},{"@type":"BreadcrumbList","@id":"https:\/\/www.shortform.com\/blog\/what-is-mass-surveillance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.shortform.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is Mass Surveillance? An 80-Year Historical Review"}]},{"@type":"WebSite","@id":"https:\/\/www.shortform.com\/blog\/#website","url":"https:\/\/www.shortform.com\/blog\/","name":"Shortform Books","description":"The World&#039;s Best Book Summaries","publisher":{"@id":"https:\/\/www.shortform.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.shortform.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.shortform.com\/blog\/#organization","name":"Shortform Books","url":"https:\/\/www.shortform.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2019\/06\/logo-equilateral-with-text-no-bg.png","contentUrl":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2019\/06\/logo-equilateral-with-text-no-bg.png","width":500,"height":74,"caption":"Shortform Books"},"image":{"@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/e094024454c7d3334a149c0cf039bdeb","name":"Emily Kitazawa","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0f5c60fcdcf3b7cd02c2882334c15a3d02f74a69631c696c3bce47deb21dc9ac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0f5c60fcdcf3b7cd02c2882334c15a3d02f74a69631c696c3bce47deb21dc9ac?s=96&d=mm&r=g","caption":"Emily Kitazawa"},"description":"Emily found her love of reading and writing at a young age, learning to enjoy these activities thanks to being taught them by her mom\u2014Goodnight Moon will forever be a favorite. As a young adult, Emily graduated with her English degree, specializing in Creative Writing and TEFL (Teaching English as a Foreign Language), from the University of Central Florida. She later earned her master\u2019s degree in Higher Education from Pennsylvania State University. Emily loves reading fiction, especially modern Japanese, historical, crime, and philosophical fiction. Her personal writing is inspired by observations of people and nature.","url":"https:\/\/www.shortform.com\/blog\/author\/emily-kitazawa\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/cctv-surveillance-camera-on-brick-wall.jpg","_links":{"self":[{"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/posts\/85578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/comments?post=85578"}],"version-history":[{"count":6,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/posts\/85578\/revisions"}],"predecessor-version":[{"id":85808,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/posts\/85578\/revisions\/85808"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/media\/85592"}],"wp:attachment":[{"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/media?parent=85578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/categories?post=85578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/tags?post=85578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}