Insider Abuse

Insider Abuse

Covert surveillance systems are powerful tools that can be abused.

I'm not going to be so naive as to say an officer hasn't seen a pretty girl and run her plate.

Lawrence Carey, former police chief, Plymouth Township, MI

DESCRIPTION

Covert surveillance systems are powerful tools that can be abused.  They present unethical law enforcement officers with the opportunity to stalk or harass partners, ex-partners, friends, and rivals. That temptation proves too much for some to resist.

Journalists, watchdogs, and corruption investigators have documented hundreds of cases of misuse of surveillance equipment and government databases by unethical officers. Some of these cases involve petty and crude mischief. Audits of London’s extensive video surveillance system, for example, revealed that operators focused their cameras disproportionately on women, frequently zooming in on women’s chests and buttocks. Managers even caught one operator remotely maneuvering his camera to peer through the window of a woman’s apartment, capturing 80 minutes of video over a month. In other cases, the abuses have been much more threatening. In Washington, D.C., a high-ranking officer collected license plate data on patrons of a gay bar. He used his access to police databases to find out which ones were married, then threatened to send the information to their spouses and employers unless they paid him thousands of dollars.

When police abuse their access to surveillance tools and databases, they put their targets in an extremely vulnerable and frightening position. Most victims of stalking and harassment can go to the police for help. But when the perpetrator is an officer, victims may be left without meaningful recourse. If the government intends to acquire powerful new surveillance systems and build large databases of personal information, it also needs systems to hold the people with access accountable. Outside monitors should audit these tools frequently. Agencies should make the results of these audits open to the public. The penalties for misuse should be stern and certain. The citizenry shouldbe assured that law enforcement officers take the public’s trust seriously.

Examples of Use

  • Map of Michigan featuring Troy
    Location:: 
    Troy, MI
    Investigation uncovers personal misuse of data by police in Michigan

    In 2001, an investigation by the Detroit Free Press found that police officers and federal agents from all over the state of Michigan abused the state’s Law Enforcement Information Network with alarming frequency. The system, open to nearly all officers in the state, requires only a name or license plate number to reveal a wealth of personal information about a subject. In one instance, an assistant prosecuting attorney discovered that her ex-husband, a Troy police lieutenant, had run her new husband through the background check system. Using the information they found, her ex took her to court to gain custody of their young son. The lawsuit failed, but the stress and the threatening behavior was enough to end her new marriage. In another instance, an officer ran a license plate number through the database on behalf of a friend who’d had a traffic altercation with the driver. Apparently, the officer passed the driver’s contact and family information along to his friend. Less than an hour after the officer ran the plate, the driver received the first of several threatening calls:  “You’re talking to God. I know everything about you.” Later, the mysterious caller said that he had a “beautiful wife” and that “it would be a shame if anything happened to her.” Numerous abuses like these were uncovered by the journalists.

Recommendations

When government agencies consider acquiring and using surveillance systems, communities and their elected officials must both weigh the benefits against the costs to civil liberties and carefully craft policies and procedures that help to limit the negative effects that surveillance will have on fundamental rights.  For a useful list of considerations, please visit the recommendations page.

Subscribe to RSS - Insider Abuse