{"id":85580,"date":"2022-12-02T16:02:00","date_gmt":"2022-12-02T20:02:00","guid":{"rendered":"https:\/\/www.shortform.com\/blog\/?p=85580"},"modified":"2022-12-03T16:03:57","modified_gmt":"2022-12-03T20:03:57","slug":"government-surveillance-examples","status":"publish","type":"post","link":"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/","title":{"rendered":"Government Surveillance: Examples of Global Monitoring"},"content":{"rendered":"\n<p>Looking for examples of government surveillance? How do governments legislate and use mass surveillance? <\/p>\n\n\n\n<p>Nowadays, governments and corporations around the world openly collect data on who we are and how we live our lives. To better understand mass surveillance, it&#8217;s best to explore some examples of how government agencies across the world practice it.<\/p>\n\n\n\n<p>Read on for a selection of historical and modern examples of government surveillance.<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-examples-of-government-surveillance\">Examples of Government Surveillance<\/h2>\n\n\n\n<p>In addition to domestic mass surveillance, the prominence of the internet allows private companies and governments to conduct global mass surveillance efforts\u2014indiscriminately collecting data on people all over the world. This article will detail global examples of government surveillance via intelligence agencies, policies, and legislation. <\/p>\n\n\n\n<p>This global surveillance often occurs through collaborations between governments and corporations\u2014for example, <a href=\"https:\/\/www.nytimes.com\/2022\/08\/14\/technology\/tiktok-china-washington.html\" target=\"_blank\" rel=\"noreferrer noopener\">the Chinese company Bytedance (creator of the popular app TikTok) collects data on its users and allegedly collaborates with the Chinese government<\/a>, while <a href=\"https:\/\/www.brennancenter.org\/our-work\/analysis-opinion\/federal-agencies-are-secretly-buying-consumer-data\" target=\"_blank\" rel=\"noreferrer noopener\">the United States government allegedly buys consumer data from private companies<\/a>. While some countries (particularly <a href=\"https:\/\/gdpr-info.eu\/\" target=\"_blank\" rel=\"noreferrer noopener\">those in the European Union<\/a>) have passed privacy laws limiting the collection of information, these laws often require the consent of users rather than banning information collection outright\u2014meaning under these laws people can either consent to be surveilled or choose not to use the vast majority of the internet. This also means that no matter what country you live in, if you use the internet, you\u2019re almost certainly being watched.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-surveillance-and-law\">Surveillance and Law<\/h3>\n\n\n\n<p>As Cold War tensions lessened, some governments began to establish their intelligence agencies more concretely through law instead of keeping them entirely secret. Sometimes this was due to popular backlash against these agencies, while other times it was just done to firmly establish the role of intelligence agencies in government. Efforts to legislate mass surveillance (and intelligence activity in general) had two main consequences:<\/p>\n\n\n\n<p><strong>1) Oversight: <\/strong>Intelligence agencies began operating under increased government oversight. In practice, this didn\u2019t stop or strongly limit mass surveillance. Instead, it made these operations more integrated with civilian governments as opposed to the mostly-independent agencies of the \u201950s and \u201960s.<\/p>\n\n\n\n<p><strong>2) Legality: <\/strong>In addition to increased government oversight, many countries legally acknowledged their intelligence agencies and explicitly gave them legal authority to use different forms of surveillance. These laws limited the more egregious abuses of intelligence agencies (like Project <a href=\"https:\/\/www.intelligence.senate.gov\/sites\/default\/files\/hearings\/95mkultra.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">MKULTRA<\/a>, a CIA operation that secretly gave Americans LSD in an attempt to develop mind control) but also established them (and mass surveillance) as permanent government fixtures.\u00a0<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-examples\">Examples<\/h4>\n\n\n\n<p><strong>Israel: <\/strong>In 1987 the Israeli government created <a href=\"https:\/\/hamoked.org\/document.php?dID=Documents1643\" target=\"_blank\" rel=\"noreferrer noopener\">The Landau Commission<\/a> to investigate Shin Bet\u2019s (Israel\u2019s internal intelligence agency) use of physical force in interrogations. The commission discovered that Shin Bet commonly used torture in attempts to gain information from Palestinian prisoners. Furthermore, it also established a legal precedent for this torture by supporting the use of a \u201cmoderate measure of physical pressure\u201d and establishing guidelines for what that meant. However, reports since the commission show that Shin Bet <a href=\"https:\/\/www.hrw.org\/sites\/default\/files\/reports\/Israel914.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">continued<\/a> (and <a href=\"https:\/\/www.972mag.com\/samer-arbeed-shin-bet-torture\/\" target=\"_blank\" rel=\"noreferrer noopener\">continues<\/a>) to use torture methods much harsher than those guidelines.\u00a0<\/p>\n\n\n\n<p><strong>The United Kingdom: <\/strong>Throughout the 1980s, British Prime Minister Margaret Thatcher began to create a legal framework for her intelligence agencies to use mass surveillance\u2014for example, <a href=\"https:\/\/www.legislation.gov.uk\/ukpga\/1984\/12\/section\/94\/enacted\" target=\"_blank\" rel=\"noreferrer noopener\">section 94 of the Telecommunications Act 1984<\/a> ensured that the government had the power to monitor and control all telecommunications with little oversight (as long as it was an issue of \u201cnational security\u201d), while <a href=\"https:\/\/www.legislation.gov.uk\/ukpga\/1989\/5\/contents\/enacted\" target=\"_blank\" rel=\"noreferrer noopener\">the Security Service Act 1989<\/a> formally recognized the existence and legality of MI5 (the United Kingdom\u2019s internal intelligence agency) for the first time, despite the agency having operated for many decades prior.\u00a0<\/p>\n\n\n\n<p><strong>The United States:<\/strong> In 1975, several government committees revealed the illegal activities of <a href=\"https:\/\/www.shortform.com\/blog\/the-cia-operations-technology-langley\/\">the CIA<\/a>, FBI, NSA, and IRS during the previous two decades. This led to a <a href=\"https:\/\/irp.fas.org\/offdocs\/eo\/eo-12036.htm\" target=\"_blank\" rel=\"noreferrer noopener\">partial increase in oversight and rules<\/a> against some of the agencies\u2019 worst abuses (including a ban on the assassination of foreign leaders).\u00a0<\/p>\n\n\n\n<p>Despite significant public backlash, however, the U.S. government began granting intelligence agencies legal permission to conduct mass surveillance\u2014for example, President Jimmy Carter signed the Federal Intelligence Surveillance Act (or FISA) in 1978, granting intelligence agencies the authority to electronically surveil whomever they believe is a threat so long as they have either approval from the president or a warrant issued by a secret court (known as a FISA court). How much these requirements limited intelligence agencies is up for debate\u2014between 1976 and 2006, <a href=\"https:\/\/epic.org\/foreign-intelligence-surveillance-court-fisc\/fisa-stats\/\" target=\"_blank\" rel=\"noreferrer noopener\">FISA courts received 22,987 requests for surveillance, approved (or modified and approved) 22,982 of them, and rejected five.<\/a><\/p>\n\n\n\n<p>In addition, in 1981, U.S. President Ronald Reagan signed <a href=\"https:\/\/dpcld.defense.gov\/Portals\/49\/Documents\/Civil\/eo-12333-2008.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Executive Order 12333<\/a> which further established the legality of electronic surveillance by intelligence agencies.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-post-colonial-turmoil\">Post-Colonial Turmoil<\/h3>\n\n\n\n<p>Meanwhile, during the late Cold War, many post-colonial nations across Africa and Asia struggled with political turmoil resulting from internal instability and interference from foreign intelligence agencies (mainly the CIA). This turmoil led many governments (new and old) to create police states and use mass surveillance in an attempt to maintain their hold on power. Often, a regime would fall and its replacement would continue using many of the same intelligence methods and institutions.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-examples-1\">Examples<\/h4>\n\n\n\n<p><strong>Argentina: <\/strong>Following a coup, a military junta (supported by <a href=\"https:\/\/www.theguardian.com\/news\/2020\/sep\/03\/operation-condor-the-illegal-state-network-that-terrorised-south-america\" target=\"_blank\" rel=\"noreferrer noopener\">the CIA\u2019s Operation Condor<\/a>) took over Argentina from 1976 until 1983. The junta (along with Operation Condor\u2019s right-wing death squads) <a href=\"https:\/\/web.archive.org\/web\/20170129015852\/http:\/\/aliciapatterson.org\/stories\/argentinas-dirty-war\" target=\"_blank\" rel=\"noreferrer noopener\">monitored, interrogated, tortured, and killed anyone they suspected of harboring leftist views<\/a>\u2014including journalists, union leaders, and members of student groups.<\/p>\n\n\n\n<p><strong>Iran: <\/strong>During the 1970s, the CIA-backed Shah\u2019s intelligence agency SAVAK grew increasingly violent, imprisoning and torturing suspected dissidents with impunity. In 1979, however, <a href=\"https:\/\/www.britannica.com\/event\/Iranian-Revolution\" target=\"_blank\" rel=\"noreferrer noopener\">the Iranian Revolution<\/a> deposed the Shah and installed a new Islamist republic. Though the information is contested, some sources suggest that Ayatollah Ruhollah Khomeini (the new republic\u2019s first supreme leader) kept <a href=\"https:\/\/web.archive.org\/web\/20170315180405\/https:\/\/www.washingtonpost.com\/archive\/politics\/1980\/06\/07\/khomeini-is-reported-to-have-a-savak-of-his-own\/dfc8e0a4-85b5-4a35-9723-c8a57caabae6\/\" target=\"_blank\" rel=\"noreferrer noopener\">many former SAVAK staff<\/a> and structures for Iran\u2019s successor intelligence agency, the Ministry of Intelligence (initially known as SAVAMA).<\/p>\n\n\n\n<p><strong>Iraq: <\/strong>After several attempted coups and assassinations against Iraqi dictator Saddam Hussein in the 1970s and 1980s, the Iraqi Intelligence Agency grew extensively as part of Hussein\u2019s attempt to tighten his grip on power. The IIS (also sometimes known as the Mukharabat) <a href=\"https:\/\/www.globalsecurity.org\/intell\/world\/iraq\/mukhabarat.htm\" target=\"_blank\" rel=\"noreferrer noopener\">often used brutal and violent tactics<\/a> to monitor and repress dissent.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Surveillance in Modern Times<\/h3>\n\n\n\n<p>With the collapse of the Soviet Union and the <a href=\"https:\/\/www.shortform.com\/blog\/importance-of-the-fall-of-the-berlin-wall\/\">end of the Cold War<\/a>, many intelligence agencies lost their original justifications for the use of mass surveillance. However, they soon found new justifications for its expanded use\u2014and new technologies to conduct surveillance on a larger scale than ever before.\u00a0<\/p>\n\n\n\n<p>Below, we&#8217;ll briefly describe some examples of modern government surveillance methods.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-methods\">Methods<\/h4>\n\n\n\n<p><strong>Video surveillance: <\/strong>Modern security cameras create a higher-quality image and can store far more footage. Governments <a href=\"https:\/\/www.aclu.org\/other\/whats-wrong-public-video-surveillance\" target=\"_blank\" rel=\"noreferrer noopener\">often use traffic cameras and can take footage from security cameras of private businesses.<\/a><\/p>\n\n\n\n<p><strong>GPS Tracking: <\/strong>Improvements in satellite technology and the prevalence of smartphones <a href=\"https:\/\/www.pbs.org\/newshour\/politics\/how-an-obscure-cellphone-tracking-tool-provides-police-mass-surveillance-on-a-budget\" target=\"_blank\" rel=\"noreferrer noopener\">allow governments to track people\u2019s locations and movements.<\/a>\u00a0<\/p>\n\n\n\n<p><strong>Internet activity: <\/strong>Governments can <a href=\"https:\/\/theworld.org\/stories\/2013-07-09\/17-disturbing-things-snowden-has-taught-us-so-far\" target=\"_blank\" rel=\"noreferrer noopener\">survey people\u2019s internet activity<\/a>\u2014the messages they send, the websites they visit, and the applications or programs they use.\u00a0<\/p>\n\n\n\n<p><strong>Algorithms and artificial intelligence: <\/strong>Governments can use computer algorithms and artificial intelligence to detect patterns of behavior, learn about people, and even predict what they\u2019ll do next. These programs can analyze things like <a href=\"https:\/\/epic.org\/issues\/surveillance-oversight\/face-surveillance\/\" target=\"_blank\" rel=\"noreferrer noopener\">biometric data<\/a> (faces, voices, gait, fingerprints, DNA) and <a href=\"https:\/\/freedomhouse.org\/report\/freedom-on-the-net\/2019\/the-crisis-of-social-media\/social-media-surveillance\" target=\"_blank\" rel=\"noreferrer noopener\">online posts and pictures<\/a>.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-removing-limitations\">Removing Limitations<\/h3>\n\n\n\n<p>In the past several decades, many governments have written legislation to enable mass surveillance and remove any limitations on it. This is a significant shift from earlier policies: While previously governments might have had secretive or ambiguous policies regarding mass surveillance, more countries today are willing to simply acknowledge that they use mass surveillance with little to no oversight or limitations\u2014meaning that for billions of people across the world, unrestricted mass government surveillance has become a well-known fact of life.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-examples\">Examples<\/h4>\n\n\n\n<p><strong>China: <\/strong>The Chinese Communist Party began rapidly expanding mass surveillance in the past two decades using internet tracking software, <a href=\"https:\/\/www.npr.org\/2013\/01\/29\/170469038\/in-china-beware-a-camera-may-be-watching-you\" target=\"_blank\" rel=\"noreferrer noopener\">millions of video cameras<\/a>, and <a href=\"https:\/\/www.nytimes.com\/2022\/06\/21\/world\/asia\/china-surveillance-investigation.html\" target=\"_blank\" rel=\"noreferrer noopener\">AI analyzing movements and biometric data<\/a>. They\u2019ve also passed a number of laws and measures supporting these efforts, like a 2016 law <a href=\"https:\/\/www.chinalawtranslate.com\/en\/2016-cybersecurity-law\/\" target=\"_blank\" rel=\"noreferrer noopener\">requiring internet companies to store six months\u2019 worth of data in mainland China<\/a> or a 2019 law that <a href=\"http:\/\/www.cac.gov.cn\/2019-03\/28\/c_1124293349.htm\" target=\"_blank\" rel=\"noreferrer noopener\">controls and monitors the internet use of teenagers<\/a>.\u00a0<\/p>\n\n\n\n<p><strong>Russia: <\/strong>Initially passed in 1995, Russia\u2019s SORM (and SORM 2) law has expanded over time, <a href=\"https:\/\/www.cogitatiopress.com\/mediaandcommunication\/article\/view\/808\" target=\"_blank\" rel=\"noreferrer noopener\">allowing the government to monitor all forms of communication without a warrant<\/a>. In addition, Russia has expanded its video surveillance network under the guise of COVID-19 regulations, using millions of video cameras and facial recognition software to track people and their movements.\u00a0<\/p>\n\n\n\n<p><strong>The United States: <\/strong>Under President George W. Bush, the United States passed the Patriot Act in 2001 following the 9\/11 terrorist attacks. The Patriot Act <a href=\"https:\/\/www.aclu.org\/issues\/national-security\/privacy-and-surveillance\/surveillance-under-patriot-act\" target=\"_blank\" rel=\"noreferrer noopener\">allows the U.S. government to monitor communications and collect data on American citizens without a warrant<\/a>. In 2013, former NSA (National Security Agency) contractor Edward Snowden revealed that <a href=\"https:\/\/www.bbc.com\/news\/world-us-canada-23123964\" target=\"_blank\" rel=\"noreferrer noopener\">the agency was indiscriminately monitoring telephone and internet communication<\/a>\u2014provoking no significant government response. Further documents show that the NSA <a href=\"https:\/\/www.nytimes.com\/2014\/06\/01\/us\/nsa-collecting-millions-of-faces-from-web-images.html\" target=\"_blank\" rel=\"noreferrer noopener\">regularly uses facial recognition technology<\/a>, and U.S. law regarding biometric privacy is ambiguous.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Looking for examples of government surveillance? How do governments legislate and use mass surveillance? Nowadays, governments and corporations around the world openly collect data on who we are and how we live our lives. To better understand mass surveillance, it&#8217;s best to explore some examples of how government agencies across the world practice it. Read on for a selection of historical and modern examples of government surveillance.<\/p>\n","protected":false},"author":19,"featured_media":85594,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[275,24],"tags":[727],"class_list":["post-85580","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-politics","category-society","tag-articles","","tg-column-two"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.3 (Yoast SEO v24.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Government Surveillance: Examples of Global Monitoring - Shortform Books<\/title>\n<meta name=\"description\" content=\"Looking for government surveillance examples? Read a selection of historical and modern examples of mass surveillance by government agencies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Government Surveillance: Examples of Global Monitoring\" \/>\n<meta property=\"og:description\" content=\"Looking for government surveillance examples? Read a selection of historical and modern examples of mass surveillance by government agencies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/\" \/>\n<meta property=\"og:site_name\" content=\"Shortform Books\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-02T20:02:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-03T20:03:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/s3.amazonaws.com\/wordpress.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/surveillance-monitoring-room-with-computers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1846\" \/>\n\t<meta property=\"og:image:height\" content=\"1230\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emily Kitazawa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emily Kitazawa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/\"},\"author\":{\"name\":\"Emily Kitazawa\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/e094024454c7d3334a149c0cf039bdeb\"},\"headline\":\"Government Surveillance: Examples of Global Monitoring\",\"datePublished\":\"2022-12-02T20:02:00+00:00\",\"dateModified\":\"2022-12-03T20:03:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/\"},\"wordCount\":1513,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/surveillance-monitoring-room-with-computers.jpg\",\"keywords\":[\"Articles\"],\"articleSection\":[\"Politics\",\"Society\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/\",\"url\":\"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/\",\"name\":\"Government Surveillance: Examples of Global Monitoring - Shortform Books\",\"isPartOf\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/surveillance-monitoring-room-with-computers.jpg\",\"datePublished\":\"2022-12-02T20:02:00+00:00\",\"dateModified\":\"2022-12-03T20:03:57+00:00\",\"description\":\"Looking for government surveillance examples? Read a selection of historical and modern examples of mass surveillance by government agencies.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/#primaryimage\",\"url\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/surveillance-monitoring-room-with-computers.jpg\",\"contentUrl\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/surveillance-monitoring-room-with-computers.jpg\",\"width\":1846,\"height\":1230},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.shortform.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Government Surveillance: Examples of Global Monitoring\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#website\",\"url\":\"https:\/\/www.shortform.com\/blog\/\",\"name\":\"Shortform Books\",\"description\":\"The World&#039;s Best Book Summaries\",\"publisher\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.shortform.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#organization\",\"name\":\"Shortform Books\",\"url\":\"https:\/\/www.shortform.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2019\/06\/logo-equilateral-with-text-no-bg.png\",\"contentUrl\":\"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2019\/06\/logo-equilateral-with-text-no-bg.png\",\"width\":500,\"height\":74,\"caption\":\"Shortform Books\"},\"image\":{\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/e094024454c7d3334a149c0cf039bdeb\",\"name\":\"Emily Kitazawa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0f5c60fcdcf3b7cd02c2882334c15a3d02f74a69631c696c3bce47deb21dc9ac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0f5c60fcdcf3b7cd02c2882334c15a3d02f74a69631c696c3bce47deb21dc9ac?s=96&d=mm&r=g\",\"caption\":\"Emily Kitazawa\"},\"description\":\"Emily found her love of reading and writing at a young age, learning to enjoy these activities thanks to being taught them by her mom\u2014Goodnight Moon will forever be a favorite. As a young adult, Emily graduated with her English degree, specializing in Creative Writing and TEFL (Teaching English as a Foreign Language), from the University of Central Florida. She later earned her master\u2019s degree in Higher Education from Pennsylvania State University. Emily loves reading fiction, especially modern Japanese, historical, crime, and philosophical fiction. Her personal writing is inspired by observations of people and nature.\",\"url\":\"https:\/\/www.shortform.com\/blog\/author\/emily-kitazawa\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Government Surveillance: Examples of Global Monitoring - Shortform Books","description":"Looking for government surveillance examples? Read a selection of historical and modern examples of mass surveillance by government agencies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/","og_locale":"en_US","og_type":"article","og_title":"Government Surveillance: Examples of Global Monitoring","og_description":"Looking for government surveillance examples? Read a selection of historical and modern examples of mass surveillance by government agencies.","og_url":"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/","og_site_name":"Shortform Books","article_published_time":"2022-12-02T20:02:00+00:00","article_modified_time":"2022-12-03T20:03:57+00:00","og_image":[{"width":1846,"height":1230,"url":"https:\/\/s3.amazonaws.com\/wordpress.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/surveillance-monitoring-room-with-computers.jpg","type":"image\/jpeg"}],"author":"Emily Kitazawa","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Emily Kitazawa","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/#article","isPartOf":{"@id":"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/"},"author":{"name":"Emily Kitazawa","@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/e094024454c7d3334a149c0cf039bdeb"},"headline":"Government Surveillance: Examples of Global Monitoring","datePublished":"2022-12-02T20:02:00+00:00","dateModified":"2022-12-03T20:03:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/"},"wordCount":1513,"commentCount":0,"publisher":{"@id":"https:\/\/www.shortform.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/#primaryimage"},"thumbnailUrl":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/surveillance-monitoring-room-with-computers.jpg","keywords":["Articles"],"articleSection":["Politics","Society"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/","url":"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/","name":"Government Surveillance: Examples of Global Monitoring - Shortform Books","isPartOf":{"@id":"https:\/\/www.shortform.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/#primaryimage"},"image":{"@id":"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/#primaryimage"},"thumbnailUrl":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/surveillance-monitoring-room-with-computers.jpg","datePublished":"2022-12-02T20:02:00+00:00","dateModified":"2022-12-03T20:03:57+00:00","description":"Looking for government surveillance examples? Read a selection of historical and modern examples of mass surveillance by government agencies.","breadcrumb":{"@id":"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/#primaryimage","url":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/surveillance-monitoring-room-with-computers.jpg","contentUrl":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/surveillance-monitoring-room-with-computers.jpg","width":1846,"height":1230},{"@type":"BreadcrumbList","@id":"https:\/\/www.shortform.com\/blog\/government-surveillance-examples\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.shortform.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Government Surveillance: Examples of Global Monitoring"}]},{"@type":"WebSite","@id":"https:\/\/www.shortform.com\/blog\/#website","url":"https:\/\/www.shortform.com\/blog\/","name":"Shortform Books","description":"The World&#039;s Best Book Summaries","publisher":{"@id":"https:\/\/www.shortform.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.shortform.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.shortform.com\/blog\/#organization","name":"Shortform Books","url":"https:\/\/www.shortform.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2019\/06\/logo-equilateral-with-text-no-bg.png","contentUrl":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2019\/06\/logo-equilateral-with-text-no-bg.png","width":500,"height":74,"caption":"Shortform Books"},"image":{"@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/e094024454c7d3334a149c0cf039bdeb","name":"Emily Kitazawa","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.shortform.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0f5c60fcdcf3b7cd02c2882334c15a3d02f74a69631c696c3bce47deb21dc9ac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0f5c60fcdcf3b7cd02c2882334c15a3d02f74a69631c696c3bce47deb21dc9ac?s=96&d=mm&r=g","caption":"Emily Kitazawa"},"description":"Emily found her love of reading and writing at a young age, learning to enjoy these activities thanks to being taught them by her mom\u2014Goodnight Moon will forever be a favorite. As a young adult, Emily graduated with her English degree, specializing in Creative Writing and TEFL (Teaching English as a Foreign Language), from the University of Central Florida. She later earned her master\u2019s degree in Higher Education from Pennsylvania State University. Emily loves reading fiction, especially modern Japanese, historical, crime, and philosophical fiction. Her personal writing is inspired by observations of people and nature.","url":"https:\/\/www.shortform.com\/blog\/author\/emily-kitazawa\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/www.shortform.com\/blog\/wp-content\/uploads\/2022\/12\/surveillance-monitoring-room-with-computers.jpg","_links":{"self":[{"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/posts\/85580","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/comments?post=85580"}],"version-history":[{"count":9,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/posts\/85580\/revisions"}],"predecessor-version":[{"id":85595,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/posts\/85580\/revisions\/85595"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/media\/85594"}],"wp:attachment":[{"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/media?parent=85580"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/categories?post=85580"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.shortform.com\/blog\/wp-json\/wp\/v2\/tags?post=85580"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}