- High School
- You don't have any recent items yet.
- You don't have any courses yet.
- You don't have any books yet.
- You don't have any Studylists yet.
- Chamberlain University
- Advanced Composition
The Impact of Mass Surveillance on Civic Liberties and Democratic
Subject : Other
Relevant documents
Documents that match the answer
Answer Created with AI
Thesis statement.
Mass surveillance, while often justified as a necessary measure for national security, has profound implications on civic liberties and democratic processes. It can lead to self-censorship, infringe upon privacy rights, and potentially manipulate democratic processes.
Impact on Civic Liberties
Mass surveillance can significantly impact civic liberties, particularly the right to privacy. The constant monitoring of citizens' activities, both online and offline, infringes upon the individual's right to privacy, a fundamental human right recognized in the UN Declaration of Human Rights. This intrusion can lead to a chilling effect where individuals may self-censor or refrain from expressing their views freely due to fear of surveillance.
"No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks." - Article 12, UN Declaration of Human Rights
Impact on Self-Censorship
The fear of being watched can lead to self-censorship, where individuals limit their expression or avoid certain topics due to fear of reprisal. This can stifle creativity, innovation, and the free exchange of ideas, which are vital for a thriving democratic society. A study by Pen America found that writers and journalists are significantly self-censoring their work in the wake of revelations about broad surveillance programs.
Impact on Democratic Processes
Mass surveillance can also have a detrimental impact on democratic processes. It can be used to manipulate elections, suppress dissent, and control information flow. For instance, surveillance data can be used to target specific demographics with tailored political messages, a tactic known as micro-targeting. This can distort the democratic process and undermine the principle of free and fair elections.
- Discover more from: Advanced Composition ENG148 Chamberlain University 20 Documents Go to course
Related Answered Questions
- Advanced Composition (ENG148) 25 days ago Please review the following list of instructions for writing a good argument essay conclusion paragraph. If the instruction is one you should follow, select “Yes,” and if the instruction is not one you should follow, select “No.” Hint: 3 are “Yes” and 3 are “No.” Yes No Copy and paste each of the topic sentences from the body paragraphs into the conclusion. Begin a brand-new argument. Carefully generate some phrasing that will leave your reader thinking about your argument. Experiment with different transition methods and choose one that works best at the start of your conclusion paragraph. Copy and paste the thesis statement from the introduction paragraph into the conclusion paragraph. Drive home your argument by reiterating it with original wording that is not the same as the wording in your thesis statement. (more) 0 1 Answers
- Advanced Composition (ENG148) 25 days ago Conclusions and Persuasion In which paragraph(s) of an argument essay should the writer deliberately apply persuasive techniques? Only in the conclusion paragraph Only in the introduction paragraph Only in the body paragraphs In all paragraphs (more) 0 1 Answers
- Advanced Composition (ENG148) 25 days ago Please read the following list describing five roles the writer (you) will take on when writing a conclusion paragraph for an argument essay. If the role is correct, select “Yes.” If the role is not correct, select “No.” Hint: 3 are "Yes" and 2 are "No." Yes No Your role, as the writer of the conclusion paragraph, is to tell the reader exactly what you have done in the essay by using “I” and “In this essay.” Your role is to continue persuading the reader in the conclusion. Your role as the conclusion writer is to copy your thesis and topic sentences, weaving them together with transitions. Your role is to drive home your argument in your conclusion by stating it in an original way vs. repeating the thesis statement word for word. Your role as the writer is to compose a smooth conclusion paragraph with flowing transitions. (more) 0 1 Answers
- Advanced Composition (ENG148) 25 days ago Please read the following statements and select the one that best describes the final portion of an effective conclusion in an argument essay. The final lines of the conclusion should include an exclamation point at the end. The final lines of the conclusion should be a copy/paste of the first lines of the essay’s introduction. The final lines of the conclusion should express a new argument. The final lines of the conclusion should leave the reader thinking in powerful ways about the argument. (more) 0 1 Answers
- Advanced Composition (ENG148) 25 days ago Which of the following lists effective ways for ending a conclusion paragraph in an argument essay? Inserting exclamation points for emphasis and envisioning the impact of the argument on the world Rhetorical questioning and saying “I believe” so the reader knows you really mean it Threatening the reader and noting that the world will end if the reader does not take action on your stance Bookending to unify the conclusion with the introduction’s approaches and envisioning a bigger picture (more) 0 1 Answers
- Advanced Composition (ENG148) 25 days ago Please read the following statements. If the statement notes what you should do in a conclusion paragraph for an argument essay, select “Do.” If the statement notes something you should avoid in a conclusion paragraph for an argument essay, select “Do Not.” Do Do Not Be sure to call the reader back to your main stance without simply restating your thesis or main points. Be sure to write very short sentences without any transitional words or phrases. Be sure to announce what you have done in the essay, like this: “In this essay, I have proven to you…” Be sure to engage your reader. Be sure to write a conclusion paragraph by using 9 steps so that it is at least 2 pages in length. (more) 0 1 Answers
Home — Essay Samples — Government & Politics — Government Surveillance
Essays on Government Surveillance
Embark on an in-depth exploration of government surveillance with our collection of essay samples. As a pivotal issue at the intersection of technology, law, and ethics, government surveillance offers a rich field of study for students across disciplines. These essays serve as exemplary models, dissecting the multifaceted arguments surrounding privacy rights, national security, and the balance of power.
Government Surveillance: A Multidimensional Perspective
Our essays on government surveillance delve into historical contexts, legal frameworks, and ethical considerations. Students can gain insights into the evolution of surveillance technologies, the legal battles over privacy rights, and the ethical dilemmas posed by state monitoring. These samples provide a comprehensive overview of the debates that define the discourse on government surveillance.
Analyzing the Impact of Surveillance on Society
The collection includes essays that evaluate the broader societal impacts of government surveillance . From the chilling effects on free speech to the implications for democratic freedoms, these essays encourage critical analysis of how surveillance shapes individuals' lives and society at large. Students are invited to engage with complex questions about the trade-offs between security and liberty.
Exploring Global Perspectives on Surveillance
Recognizing the global nature of government surveillance, our essays also feature comparative analyses of surveillance practices around the world. This global perspective enriches students' understanding of how different legal systems and cultural values influence the implementation and perception of surveillance.
A Resource for Critical Thinking and Academic Inquiry
Designed to support students in their academic endeavors, this collection of government surveillance essay samples is an invaluable resource for research, writing, and debate. By presenting well-crafted arguments and diverse viewpoints, these essays inspire deeper inquiry into one of the most pressing issues of our time.
The Effects on Online Surveillance by Government
Government surveillance in 1984 by george orwell: bogus security, made-to-order essay as fast as you need it.
Each essay is customized to cater to your unique preferences
+ experts online
Government Vigilance on Internet Activities Violating Constitutional Freedom in The Us
The ethics and appropriate use of government surveillance, why government surveillance is overall unethical, the drawbacks of government surveillance, let us write you an essay from scratch.
- 450+ experts on 30 subjects ready to help
- Custom essay delivered in as few as 3 hours
Government Surveillance and Deceit Throughout The World History
The moral dilemma around government surveillance on the internet in the united states, introducing the role of government in security of the nation, the inconveniences of government scope inside the area of transactions and concessions, get a personalized essay in under 3 hours.
Expert-written essays crafted with your exact needs in mind
The Governmantal System in Haiti
Georgia’s recent political history, the association of southeast asian nations, implementation of social protection programs in a bid to improve the people's standards of living, the lack of privacy in america, discussion about the role of government in economy , apple vs fbi: the ethics of accessing personal data, the purpose of government: safeguarding and serving, government and internet, relevant topics.
- European Union
- Gentrification
- Philippine Government
- Foreign Policy
- Student Government
- Homeland Security
- International Relations
- Corporate Governance
By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy . We’ll occasionally send you promo and account related email
No need to pay just yet!
We use cookies to personalyze your web-site experience. By continuing we’ll assume you board with our cookie policy .
- Instructions Followed To The Letter
- Deadlines Met At Every Stage
- Unique And Plagiarism Free
16 Pros and Cons Government Surveillance of Citizens
When we look back at the top-trending stories of the last decade, there are three in particular which stand out when looking at the issue of government surveillance: the death of Trayvon Martin, the rise and fall of Google Glass, and the release of information about the surveillance program called Prism.
Even though these issues may not seem like they are connected at first, each story represents a growing movement toward, or away from, a society that features surveillance.
On one side of the debate, there are people who say that there is too much surveillance already present in our society. We have wearable cameras, mobile computers, and a complete lack of privacy thanks to the amount of video we can produce without anyone realizing they are captured in the data.
The other side of the debate suggests that a society which offers cameras and recorders everywhere will make the world a safer place. When you are on camera committing a crime, then it becomes more.of a challenge to find a successful result in our adversarial system of justice.
Do we want this kind of society? These government surveillance pros and cons go beyond the idea that such an action would provide justice for all at the cost of having zero privacy.
List of the Pros of Government Surveillance
1. It is one of three primary methods of collecting information to keep people safe. Marc Thiessen from The Washington Post argues that there are only three ways that the government can collect the data that is needed to keep everyone in the country safe. Officials can obtain the information by questioning subjects, infiltrating enemy groups, or using intelligence resources to monitor communications. Even though this effort can track the phone calls, text messages, and emails of millions of people who pose no threat to the country, the argument is that the government surveillance is necessary to detect any association to international terrorism.
2. Surveillance does not create a threat of physical harm on its own. When the government is performing surveillance over video, communication lines, and Internet resources, then no one is being physically harmed by these activities. You can install trackers on a vehicle that might invade some of your privacy, but it will not be an actual attack on your person. Because the goal of this work is to discover criminal activities, many people believe that the ends justify the means when it comes to keeping everyone safe.
3. The act of surveillance acts as a deterrent to would-be criminals. Because there is an extensive web of government surveillance in place across the country, there is a natural deterrent in place that stops criminal activity before it can start. People tend to react to safety interventions instead of responding to them, which means their effort at harming someone is stopped before it can start. When those with nefarious intent discover that they have no way to hide from law enforcement, then there are fewer incidents that will eventually come to fruition.
That won’t stop the individuals who take their communication underground, but it can pick up many of the conversations and messages that people exchange when trying to coordinate an attack.
4. It provides a real-time look that provides an accurate account of events. When we look at the case of Trayvon Martin, who was an unarmed African-American teen that was shot because of his appearance, the most important evidence was the words of the shooter about how the argument between the two began. During the trial, the statements of the eyewitnesses differed, creating uncertainty about the sequence of events. With surveillance in place, it would have been much easier to determine what happened and what level of justice was necessary in that circumstance.
5. Surveillance equipment can be installed almost anywhere. The modern equipment for government surveillance can go almost anywhere. You can find cameras installed on telephone poles, stop lights, and in the ceilings and exterior of homes and businesses around the world. There are automated license plate readers that can be installed almost anywhere to track driving patterns in the city. Drones can provide real-time surveillance as well.
Then you have the secret programs of the government that can record and analyze data automatically on a mass scale.
6. Government surveillance can occur on a global scale. Under FISA 702, the U.S. government can collect a massive quantity of detailed, sensitive, and intimate personal information about individuals from all over the world. This advantage includes anyone who has a foreign intelligence interest for the government. That means we can even eavesdrop of foreign ambassadors, gather information about commodities, and then use all of this information to gain more leverage during negotiations.
List of the Cons of Government Surveillance
1. It is impossible to catch everything that happens in society. When the government is conducting surveillance on a mass scale, then it is impossible for the monitors to pay close attention to everything that happens in society. Even when there are automated systems in place that can alert the authorities to suspicious behavior, conversation keywords, or specific subjects who could be problematic, the number of false positives in the system are always going to be greater than the real problems you’re trying to catch.
The world is full of a variety of conversations that makes monitoring all of them an imprecise effort at best. From the words with double meanings to metaphors that alarm systems unintentionally, there is a lot of data to sort through. That reduces the chances to catch something of concern.
2. Anyone can connect the dots in hindsight. When we take a look back at the various acts of violence that were captured through government surveillance, it is notable that many of the perpetrators tend to appear on watch lists because of the sheer amount of data collected. When Boston bomber Tamerlan Tsarnaev was placed on a terrorist watch list before attacking the city during the marathon, it was much easier to see the behavioral patterns and actions that led to the event after the fact than it was to predict what his actions would be.
This issue creates a conundrum for government surveillance. You can always see clearly in retrospect. That means we tend to learn more when we start to connect the dots instead of trying to prevent problems in real time.
3. Surveillance misses lead to even more data being collected on people. When there is a miss from government surveillance activities, then the reaction tends to be an ever-closer analysis of the information that was collected already. It can also lead the authorities to add even more surveillance to create additional data to sift through in the hopes that the real threats can be isolated from the false ones. This outcome means that there will be more privacy invasions over time as AI and human investigators apply a mass-scrutiny policy to their review efforts.
“There will come a time when it isn’t ‘They’re spying on me through my phone’ anymore,” said Philip K. Dick. “Eventually, it will be ‘My phone is spying on me’.”
4. Government surveillance places innocent people under investigation. Even if the data collected through government surveillance creates a reasonable suspicion of conduct for the targeted person, there may not be a guarantee that the individual is guilty. When we increase the amount of coverage that’s available in society, then we begin to restrict the rights of those who don’t deserve security interventions.
We have already seen innocent people being placed on watch lists, having their lives placed underneath the microscope of an investigation, and it occurs with ever-fewer pieces of evidence that back up the scope of what is happening. “There are no private lives,” said Dick. “This is a most important aspect of modern life. One of the biggest transformations we have seen in our society is the diminution of the sphere of the private.”
5. The government can use the information for its own benefit. The information that the government collects through surveillance can provide more data on behaviors and choices that go beyond the need for safety. This effort could help politicians discover unique data points which might predict voter behavior patterns in an election. It shows a person’s travel patterns, the structure of their social networks, and even the products they prefer to purchase at the grocery store.
When the government can use the information from surveillance to influence people to vote or buy in specific ways, then they are changing the very fabric of society. It is an authoritarian way to govern without the presence of a dictator to direct traffic. “Under observation, we act less free,” said Edward Snowden, “which means we effectively are less free.”
6. Government surveillance sweeps gather more bystanders than subjects. In an analysis of the information gathered through FISA 702, the number of non-targeted communications are 10 times greater than the data that the government actually wants to analyze from a suspect. Even if the goal is to spy on foreigners only, the huge volumes of data cannot help but to bring in information from email exchanges, photographs, social medial sharing, and conversations.
The government classifies the unwanted data as being incidental, but that doesn’t necessarily stop the information from being used in inappropriate ways. Once the data is acquired, other law enforcement agencies can search through the information without the need to obtain a warrant in some situations.
7. There is a persistent threat for insider abuse. There are already documented cases of agents in the government taking advantage of the data that surveillance programs collect information about others. It is easy to access this data to look at what is going on with a spouse, a mistress, or someone who is a personal enemy. The problem is so prevalent that there are nicknames for these searches.
The insider abuse of this data also applies in the form of attorney-client privilege. Governments are not bound to recognize this confidential nature of this relationship with the data that they collect. That means people could potentially incriminate themselves through surveillance even though they believe that there are protections in place while they prepare for their defense.
8. Individuals can be charged without any knowledge of their participation. This disadvantage comes to us courtesy of the Upstream program from the NSA. The government scans the information that flows over the internet to see if there is information about foreign intelligence targets. If you mention a political figure to a friend who lives overseas, then that could be enough to trigger a review of your conversation. Discussing their address or contact information could even lead to charges.
This issue could apply if you’re having a conversation with someone who commits a crime without your knowledge. In the United States, government surveillance efforts could collect your whole email account even if there is only one email that triggers the automated review systems.
9. There may not be any oversight over the government surveillance programs. Under section 702 in the United States, there is no judicial participation in the targeting decisions made by the government. The courts will assess the procedures to determine if they fit into the correct procedures that authorize this monitoring. There is no actual oversight on the targeting decisions that get made. That means any of the information that is collected through incidental gathering can flow to law enforcement even though it was never authorized by a judge.
10. There is an expense to consider with government surveillance. When you consider all of the technology investments, labor, and analyzing hours that go into a government surveillance program, the amount of money that gets spent each year can total several billion dollars. That money comes through taxpayer support in the name of defense, which means the population effectively pays for the data that the government could potentially use against them under the right set of circumstances.
Verdict on the Pros and Cons of Government Surveillance
There is a time and place for government surveillance where the use is authorized to keep someone safe. Whenever there is a threat to human life that is predictable and eminent, then this technology can help to save lives.
The problem with this issue is that governments tend to collect and keep the information so that it becomes useful in a variety of ways. Instead of keeping people safe, the data transitions to keeping specific people in power.
The pros and cons of government surveillance are essential to review every so often because as time passes, our priorities may change. The Patriot Act in the United States authorized many of the programs that fall into this category in 2001. It may be time to revisit that need.
- Environment
- Information Science
- Social Issues
- Argumentative
- Cause and Effect
- Classification
- Compare and Contrast
- Descriptive
- Exemplification
- Informative
- Controversial
- Exploratory
- What Is an Essay
- Length of an Essay
- Generate Ideas
- Types of Essays
- Structuring an Essay
- Outline For Essay
- Essay Introduction
- Thesis Statement
- Body of an Essay
- Writing a Conclusion
- Essay Writing Tips
- Drafting an Essay
- Revision Process
- Fix a Broken Essay
- Format of an Essay
- Essay Examples
- Essay Checklist
- Essay Writing Service
- Pay for Research Paper
- Write My Research Paper
- Write My Essay
- Custom Essay Writing Service
- Admission Essay Writing Service
- Pay for Essay
- Academic Ghostwriting
- Write My Book Report
- Case Study Writing Service
- Dissertation Writing Service
- Coursework Writing Service
- Lab Report Writing Service
- Do My Assignment
- Buy College Papers
- Capstone Project Writing Service
- Buy Research Paper
- Custom Essays for Sale
Can’t find a perfect paper?
- Free Essay Samples
- Government Surveillance
Essays on Government Surveillance
Law Enforcement Agencies and Drone Surveillance: An Ethical Dilemma Law enforcement agencies frequently use unmanned aircraft in surveillance missions. Police personnel can trace offenders using this method. Drone use in law enforcement has long been a source of contention. There has been much discussion about whether or not police officers should...
Words: 2677
Found a perfect essay sample but want a unique one?
Request writing help from expert writer in you feed!
Surveillance and Government Monitoring Surveillance refers to the government s efforts to collect information about its citizens without their knowledge or access to private areas. Communication, physical, and transaction monitoring are all types of surveillance that are currently in use. In the United States, the concept of government surveillance dates back...
Words: 1788
Related topic to Government Surveillance
The Ethics of Surveillance
Introduction to surveillance.
Surveillance is, simply put, the observation and/or monitoring of a person. Coming from the French word for "looking upon," the term encompasses not only visual observation but also the scrutiny of all behavior, speech, and actions. Prominent examples of surveillance include surveillance cameras, wiretaps, GPS tracking, and internet surveillance.
One-way observation is in some ways an expression of control. Just as having a stranger stare at you for an extended period of time can be uncomfortable and hostile, it is no different from being under constant surveillance, except that surveillance is often done surreptitiously and at the behest of some authority.
Todays technological capabilities take surveillance to new levels; no longer are spyglasses and "dropping" from the eaves of a roof necessary to observe individuals - the government can and does utilize methods to observe all the behavior and actions of people without the need for a spy to be physically present. Clearly, these advances in technology have a profound impact with regards to the ethics of placing individual under surveillance&emdash;in our modern society, where so many of our actions are observable, recorded, searchable, and traceable, close surveillance is much more intrusive than it has been in the past.
Surveillance and Physical Searches
Particularly interesting about government surveillance is that in the United States surveillance is not held to the same standards of accountability&emdash;as the Constitution protects American citizens from unreasonable searches and seizures, physical searches of individuals may not be conducted without a warrant issued by a judge. However, after the passage of FISA and subsequent laws, citizens have not been given the same protection with regards to electronic surveillance. As there have been massive changes in technology and lifestyle since the 1970s, electronic surveillance could be considered much more invasive than a physical search, yet as has been made clear in the legal section of this website, it is in fact much easier for government agents to perform surveillance. Why there is such disparity between these standards to us a matter of serious concern.
"If you haven't done anything wrong, you have nothing to fear."
This is a typical argument used by governments and other groups to justify their spying activities. Upon cursory inspection, it seems to make sense&emdash;as most people are law-abiding citizens, most ostensibly will not be targeted for surveillance and it will not impact their lives, while making their lives more comfortable and safer through the elimination of criminals. Thus, the government's use of closed-circuit television cameras in public spaces, warrantless wiretapping, and library record checks have the potential to save lives from criminals and terrorists with only minimal invasion of its citizens' privacy.
First, as a mental exercise, we ask that the reader consider that these arguments could easily be applied to asking all citizens to carry location tracking devices&emdash;it would make tracing criminal acts much easier, and that it could easily be argued that people refusing to carry these devices only do so because they have something to hide. It is a matter of course that most people in our society would object to this solution, not because they wish to commit any wrongdoings, but because it is invasive and prone to abuse. Now consider that, given current technology, the government already has the ability to track a known target's movements to a reasonable degree, and has easy access to information such as one's purchasing habits, online activities, phone conversations, and mail. Though implementing mandatory location tracking devices for the whole population is certainly more invasive than the above, we argue that current practices are analogous, extreme, and equally unacceptable.
Next, this argument fails to take into consideration a number of important issues when collecting personally identifiable data or recordings&emdash;first, that such practices create an archive of information that is vulnerable to abuse by trusted insiders; one example emerged in September of 2007 when Benjamin Robinson, a special agent of the Department of Commerce, was indicted for using a government database called the Treasury Enforcement Communications System (TECS) for tracking the travel patterns of an ex-girlfriend and her family. Records show that he used the system illegally at least 163 times before he was caught (Mark 2007). With the expansion of surveillance, such abuses could become more numerous and more egregious as the amount of personal data collected increases.
In addition, allowing surreptitious surveillance of one form, even limited in scope and for a particular contingency, encourages government to expand such surveillance programs in the future. It is our view that the danger of a "slippery slope" scenario cannot be dismissed as paranoia - as a prominent example, the collection of biometric has expanded immensely in the past several years. Many schools in the UK collect fingerprints of children as young as six without parental consent (Doward 2006), and fingerprinting in American schools has been widespread since the mid-eighties (NYT National Desk 1983). Now, the discussion has shifted towards DNA collection&emdash;British police are now pushing for the DNA collection of children who "exhibit behavior indicating they may become criminals in later life" (Townsend and Asthana 2008), while former New York City mayor Rudy Giuliani has encouraged the collection of DNA data of newborns (Lambert 1998).
When data is collected, whether such data remains used for its stated purpose after its collection has been called into question, even by government officials: the European Data Protection Supervisor has acknowledged that even when two databases of information are created for specific, distinct purposes, in a phenomenon known as 'function creep' they could be combined with one another to form a third with a purpose for which the first two were not built (eGov Monitor Weekly 2006). This non-uniqueness and immutability of information provides great potential for abuse by individuals and institutions.
When is surveillance appropriate?
A. the means.
Harm: does the technique cause unwarranted physical or psychological harm?
Boundary: does the technique cross a personal boundary without permission (whether involving coercion or deception or a body, relational or spatial border)?
Trust: does the technique violate assumptions that are made about how personal information will be treated such as no secret recordings?
Personal relationships: is the tactic applied in a personal or impersonal setting?
Invalidity: does the technique produce invalid results?
B. The Data Collection Context
Awareness: are individuals aware that personal information is being collected, who seeks it and why?
Consent: do individuals consent to the data collection?
Golden rule: would those responsbile for the surveillance (both the decision to apply it and its actual application) agree to be its subjects under the conditions in which they apply it to others?
Minimization: does a principle of minimization apply?
Public decision-making: was the decision to use a tactic arrived at through some public discussion and decision making process?
Human review: is there human review of machine generated results?
Right of inspection: are people aware of the findings and how they were created?
Right to challenge and express a grievance: are there procedures for challenging the results, or for entering alternative data or interpretations into the record?
Redress and sanctions: if the individual has been treated unfairly and procedures violated, are there appropriate means of redress? Are there means for discovering violations and penalties to encourage responsible surveillant behavior?
Adequate data stewardship and protection: can the security of the data be adequately protected?
Equality-inequality regarding availability and application: a) is the means widely available or restricted to only the most wealthy, powerful or technologically sophisticated? b) within a setting is the tactic broadly applied to all people or only to those less powerful or unable to resist c) if there are means of resisting the provision of personal information are these equally available, or restricted to the most privileged?
The symbolic meaning of a method: what does the use of a method communicate more generally?
The creation of unwanted precedents: is it likely to create precedents that will lead to its application in undesirable ways?
Negative effects on surveillors and third parties: are there negative effects on those beyond the subject?
Beneficiary: does application of the tactic serve broad community goals, the goals of the object of surveillance or the personal goals of the data collector?
Proportionality: is there an appropriate balance between the importance of the goal and the cost of the means?
Alternative means: are other less costly means available?
Consequences of inaction: where the means are very costly, what are the consequences of taking no surveillance action?
Protections: are adequate steps taken to minimize costs and risk?
Appropriate vs. inappropriate goals: are the goals of the data collection legitimate?
The goodness of fit between the means and the goal: is there a clear link between the information collected and the goal sought?
Information used for original vs. other unrelated purposes: is the personal information used for the reasons offered for its collection and for which consent may have been given and does the data stay with the original collector, or does it migrate elsewhere?
Failure to share secondary gains from the information: is the personal data collected used for profit without permission from, or benefit to, the person who provided it?
Unfair disadvantage: is the information used in such a way as to cause unwarranted harm or disadvantage to its subject?
In general, we feel that surveillance can be ethical, but that there have to exist reasonable, publicly accessible records and accountability for those approving and performing the surveillance in question.
Advertisement
Government Surveillance, Privacy, and Legitimacy
- Research Article
- Open access
- Published: 05 February 2022
- Volume 35 , article number 8 , ( 2022 )
Cite this article
You have full access to this open access article
- Peter Königs ORCID: orcid.org/0000-0002-7267-4675 1
55k Accesses
20 Citations
27 Altmetric
Explore all metrics
The recent decades have seen established liberal democracies expand their surveillance capacities on a massive scale. This article explores what is problematic about government surveillance by democracies. It proceeds by distinguishing three potential sources of concern: (1) the concern that governments diminish citizens’ privacy by collecting their data, (2) the concern that they diminish their privacy by accessing their data, and (3) the concern that the collected data may be used for objectionable purposes. Discussing the meaning and value of privacy, the article argues that only the latter two constitute compelling independent concerns. It then focuses particularly on the third concern, exploring the risk of government surveillance being used to enforce illegitimate laws. It discusses three legitimacy-related reasons why we should be worried about the expansion of surveillance capacities in established democracies: (1) Even established democracies might decay. There is a risk that surveillance capacities that are used for democratically legitimated purposes today will be used for poorly legitimated purposes in the future. (2) Surveillance may be used to enforce laws that lack legitimacy due to the disproportionate punishment attached to their violation. (3) The democratic procedures in established democracies fail to conform to the requirements formulated by mainstream theories of democratic legitimacy. Surveillance is thus used to enforce laws whose legitimacy is in doubt.
Similar content being viewed by others
Governing Liberty Through Accountability: Surveillance Reporting as Technologies of Governmentality
The State of Surveillance – An Overall Account of Surveillance?
Drawing the line: public attitudes towards warranted and unwarranted government surveillance in European countries
Avoid common mistakes on your manuscript.
1 Introduction
For a long time, large-scale government surveillance was a hallmark of authoritarianism. Authoritarian states known for their extensive surveillance systems include the GDR, the People’s Republic of China, the Soviet Union, and North Korea. Footnote 1 In the past few decades, however, established liberal democracies have been increasingly ready to monitor their citizens on a massive scale. One notorious surveillance program run by an alliance of democracies was uncovered by Edward Snowden. The current rise of large-scale government surveillance is widely viewed with great concern, if not outright horror. Critics fear the rise of Orwellian surveillance states and celebrate Edward Snowden as a paragon of civil disobedience. Footnote 2 Much of the criticism of government surveillance has revolved around privacy, its meaning and value, and how it is impacted by surveillance. Government surveillance and the erosion of privacy it is associated with are being discussed as a cause of distrust and feelings of vulnerability, as a potential source of discrimination and unjust domination, and as a threat to democracy and the integrity of the public sphere, to name but a few concerns. By many, existing government surveillance programs are also deemed disproportionate. Footnote 3
At the same time, there remains some ambiguity about the acceptability of surveillance in democracies. For one thing, recent technological advances have made large-scale government surveillance not only feasible and cheap but also, in one sense, less intrusive. Modern government surveillance relies increasingly on technology rather than human spies and informers. Surveillance practices include, for instance, the monitoring of public spaces with CCTV cameras, the automatic interception and retention of Internet and telecommunication traffic, and the use of artificial intelligence to make sense of the huge amounts of data collected. As a result, modern surveillance is characterized by the rarity of actual human access to the large quantities of data collected. While the quantity of data collected is staggering, only a small proportion of them are ever accessed by a human person. Human access to collected surveillance data can be expected to further decrease as artificial intelligence becomes more sophisticated. This has led to a debate about whether modern surveillance even reduces the privacy of those subject to surveillance, with some arguing that modern surveillance, involving little human access to the collected data, tends to leave people’s privacy intact. Footnote 4
For another thing, surveillance operations by democracies seem much more acceptable than the kind of surveillance conducted by authoritarian regimes. Democracies are using surveillance mostly for seemingly innocuous purposes, such as combating terrorism and serious crime or, most recently, containing the spread of a deadly virus. They are less inclined to use surveillance to crush legitimate political opposition or to persecute members of stigmatized groups, notable exceptions notwithstanding. Footnote 5 There is a significant moral difference, then, between, say, the NSA and the East German Stasi . Footnote 6
In sum, when democratic governments conduct large-scale surveillance operations in the pursuit of seemingly innocuous goals, all while limiting human access to the collected data, the case against surveillance is at least not obvious. In fact, some philosophers have expressed wholehearted support for large-scale government surveillance. Noting that it is generally permissible for law enforcement agencies to secure information about past events, one advocate of government surveillance has suggested that “the State should place all of its citizens under surveillance at all times and in all places.” Footnote 7 Others have invoked catastrophic risks, such as those posed by biological and nuclear weapons of mass destruction, to justify extensive government surveillance. Footnote 8 To be sure, such wholesale endorsements of government surveillance are the exception. Footnote 9 But they convey an idea of the ethical ambivalence of government surveillance.
My goal in this paper is to contribute a new perspective on what is ethically at stake when democratic governments monitor their citizens and to achieve a better understanding of what is pro tanto objectionable about it. Footnote 10 I will proceed by distinguishing three independent concerns that a critic of government surveillance may have. The first concern is that governments diminish citizens’ privacy by collecting large amounts of data. This concern focuses on the loss of privacy brought about by the collection of data as such, that is, irrespective of whether the data will be accessed or used for objectionable purposes. The second concern is that the collected data may be accessed after all, again causing a loss of privacy, though of a different kind. The data may be accessed by government employees or exposed to the public through a hack or a leak. The third concern is that the collected data may be used for objectionable purposes (other than accessing the data).
Two of the above introduced concerns revolve around privacy. Zooming in on these two concerns, this paper seeks, first, to shed light on the significance of privacy in the context of surveillance. Engaging with the debate about the meaning of privacy, I will suggest that, whereas access to data is objectionable as such, the privacy loss brought about by the mere collection of data does not constitute an independent reason to object to government surveillance. Second, moving on to the third concern, the paper seeks to achieve a better understanding of problems associated with what surveillance can be used for. I will suggest that one serious and underappreciated problem with surveillance is related to the problem of political legitimacy. Surveillance can be used to enforce laws that lack legitimacy.
My discussions of privacy and legitimacy, though motivated by concerns about government surveillance, are, I hope, of more general relevance and thus of interest to scholars who have no particular interest in surveillance.
2 Surveillance and Privacy
I want to begin by examining the first concern about privacy, that is, the notion that there is something objectionable about government surveillance because the collection of massive amounts of data reduces people’s privacy. By undermining people’s privacy, government surveillance may be deemed objectionable irrespective of whether the data are accessed (second concern) or used for objectionable purposes (third concern). It is, in this sense, an independent concern about government surveillance.
There are four reasons why this concern is worth looking at. To begin with, it is a very natural thought that surveillance is objectionable simply on the grounds that the collection of people’s data reduces their privacy. Privacy is a widely valued good, and the mere collection of data is thought by many (though not all) to undermine privacy. It is therefore natural to object to the collection of data simply on the grounds that this violates people’s privacy — irrespective of whether the other two concerns apply.
Moreover, the extent to which increasingly automated surveillance practices really involve privacy losses is, as already noted, intensely discussed among privacy and surveillance scholars. An underlying assumption here seems to be that if the collection of citizens’ data reduces their privacy, surveillance is ipso facto problematic, irrespective of whether the data will be accessed or used for malicious purposes. Why else think that it matters how we define privacy and whether it is undermined by surveillance? Surveillance may be thought to be problematic simply in virtue of the fact that it undermines people’s privacy.
Yet another reason why the validity of the first concern matters is that some might question the force of the other two concerns. Human access to the collected data is very limited, and established liberal democracies may seem to use surveillance mainly for justifiable purposes. In light of this, some might question why we should object to large-scale government surveillance at all. If there is something objectionable about collecting large amounts of data as such (because of the privacy breaches associated with it), the critic of government surveillance has a ready answer to this question. Footnote 11
Finally, discussing this first concern will contribute towards achieving the overarching goal of this paper, namely a better understanding of how surveillance and privacy concerns relate to each other and how the potential harm done by government surveillance should be characterized. I believe that the first concern is ill-founded in that it fails to constitute a compelling independent reason to object to government surveillance, over and above the other two concerns. Appreciating why this is so allows a better understanding of the problem of government surveillance and of what is at stake in debates about the meaning and value of privacy.
Notice first, then, that the idea that there is something objectionable about the collection of data as such, though natural, can be challenged by means of a thought experiment. Imagine an unrealistically benevolent, well-organized, and stable democratic state that engages in large-scale surveillance operations. The state is characterized by the following two features:
Thanks to excellent institutional safeguards and security measures, there is no risk that data is illicitly accessed by government employees, nor that data might be exposed to the public.
It uses the collected surveillance data to enforce laws in a legitimate and just manner. It never uses the surveillance capacities for objectionable purposes. It also boasts a set of unrealistically robust checks and balances, which completely remove any risk of the surveillance capacities being used for less benign purposes in the future.
Admittedly, such perfectly benign surveillance is difficult to imagine. But when we do imagine it, it is difficult to see what might be objectionable about it. Once we stipulate that there is no risk of illicit access to the collected data and that the surveillance capacities will only ever be used for good purposes, that is, once we stipulate that the other two concerns do not apply, there just seems little cause for concern. On the contrary, it is arguable that we should welcome such perfectly benign surveillance. It provides enhanced security without any obvious downsides. To object to such perfectly benign surveillance would, it seems to me, be quite irrational. To be sure, we may have a residual feeling of unease at the thought even of such benevolent large-scale government surveillance (I, for one, certainly feel uneasy at the thought of it). But this is probably because no surveillance system in the real world resembles this perfectly benign surveillance system. Our emotional responses have been trained on a data set of surveillance practices that invariably do not meet the above two criteria. Upon rational reflection, we should welcome surveillance of this sort.
This provides at least initial grounds for thinking that the first concern must be ill-founded. The collection of large amounts of data as such — divorced from the other two concerns — seems unobjectionable. But one might still find the above line of reasoning unconvincing as it entirely brackets the key issue of privacy. Indeed, I have made two seemingly conflicting claims. On the one hand, I have just suggested that there does not seem to be anything problematic about the collection of data as such, divorced from the other two concerns. On the other hand, I have suggested that the collection of large amounts of data may diminish citizens’ privacy. This raises the question how the collection of large amounts of data could possibly diminish people’s privacy without being in any way problematic as such. If it diminishes their privacy, does this not show precisely that there is something objectionable about surveillance irrespective of whether the data are exposed or used for objectionable purposes?
To resolve this tension, and more generally to understand how surveillance and privacy relate, it is useful to briefly consider the debate about the meaning of privacy. One view in the literature is that privacy should be spelled out in terms of control. A person’s privacy remains intact as long as this person retains control over her personal information. Footnote 12 Beate Rössler, for instance, proposes the following definition: “Something counts as private if one can oneself control the access to this ‘something.’” Footnote 13 On this view, privacy is reduced as soon as one loses the relevant sort of control. A competing view holds that privacy is a matter of access, not of control. A person’s privacy is intact to the extent that no one actually accesses her personal information. Mere loss of control over one’s personal information is not enough for there to be a reduction of privacy. Kevin Macnish has made the case for the access account by appeal to the so-called threatened loss cases. Threatened loss cases are characterized by a loss of control over one’s personal information in the absence of actual access to it. He invites us to consider the case of a person who left her diary on a table in a coffee shop. When she returns to the coffee shop to pick it up, it is handed back to her by a stranger in whose possession it was for the last 30 minutes. During this interval, the diary owner had lost control over her personal information in the diary. But if the stranger did not open the diary during this time, it seems plausible that the diary owner’s privacy has not been comprised. Such threatened loss cases suggest that what matters is actual access rather than loss of control. Footnote 14
An assumption underlying this debate is that there is a lot at stake in the dispute about the meaning of privacy. Recall that modern government surveillance, relying increasingly on technology rather than people, involves relatively little actual human access to the collected data. Depending, then, on how we define privacy, modern government surveillance involves either privacy erosions on a massive scale (control account) or hardly any privacy losses at all (access account), given that it involves loss of control over one’s personal data but little actual human access to them. Footnote 15 This is why how we define privacy has been taken to matter a great deal.
Notwithstanding the many valuable insights this debate has generated, I do not believe that how we define privacy matters as much as is commonly thought. Little of substance depends on it. Whether we should think of government surveillance operations as reducing privacy in the strict sense of the term or not is, at the end of day, not that relevant. Indeed, Macnish himself, who in the title of a paper asserts that “defining privacy matters,” is (rightly, I think) adamant that government surveillance is problematic even if, technically, citizens’ privacy is not diminished. Footnote 16 This begs the question why exactly it should matter which definition of privacy we opt for. I believe it does not matter all that much. What matters are the actual wrongs and dangers of surveillance, and their exploration does not require resolving the dispute between access theorists and control theorists. Footnote 17
I therefore wish to sidestep this debate by engaging in an act of conceptual stipulation. I suggest that we distinguish two concepts of privacy: “access privacy” and “control privacy.” Access privacy is the kind of privacy that requires nonaccess to one’s personal information, whereas control privacy is reduced as soon as one loses control over one’s personal information, whether accessed or not. Modern government surveillance, to the extent that it does not involve human access to the collected data, reduces control privacy while leaving access privacy mostly intact. Footnote 18 The suggested distinction is a technical stipulation. By making this stipulation, I am not suggesting that our everyday concept of privacy is fundamentally vague or ambiguous. Perhaps it is, but I am not committed to this view. Footnote 19 Nor do I mean it to discourage further inquiry into how to best analyze everyday privacy talk, which strikes me as an interesting undertaking in its own right. But introducing these two technical concepts by means of stipulation allows us to sidestep an intricate and unresolved debate, and it yields two technical concepts that are useful for analytical purposes. To be sure, the proposed terminological stipulation tells us little of substance about the significance of privacy in the context of government surveillance. But it helps us organize our thoughts and get more quickly to the heart of what is normatively at stake. Footnote 20
With these clarifications in mind, we can return to the question at hand: How might the collection of data involve a reduction in privacy without being in any way problematic as such, that is, irrespective of whether the data may actually be accessed or used for objectionable purposes? My answer is not that we should simply reject the assumption that the mere collection of data even involves privacy losses, as adherents of the access account of privacy would do. I think both accounts of privacy are legitimate, and it is not obviously wrong to say that the mere collection of data reduces people’s (control) privacy. Instead, the answer I want to propose is that the collecting of data may well be said to diminish people’s (control) privacy, but that the value of this kind of privacy depends on the other two concerns, that is, on the risk of collected data being accessed or of them being used for objectionable purposes. In a, again unrealistic, world in which there is no risk of data access or misuse by the government, the value of control privacy would be unclear. Mere loss of control over one’s personal data would be unproblematic, if we could rest assured that the data are not accessed and that nothing bad happens with these data. I want to state unequivocally that I am not suggesting that, in normal circumstances, there is no reason to value control privacy, or that we need not be concerned about governments reducing people’s control privacy. In normal circumstances, the antecedent of the above conditional is not satisfied. The risk of our data being accessed or abused is real, and this is reason enough to be concerned about the mass collection of data. Rather, the point I wish to make is an analytical one: at least in the context of surveillance, the value of control privacy is closely tied to the other two concerns. We may plausibly define privacy in such a way that government surveillance can be said to diminish people’s privacy, namely their control privacy. Footnote 21 But its diminution does not constitute an independent concern, over and above concerns about access to one’s data (losses of access privacy) and about what these data are or might be used for. Footnote 22
Turning now to the second concern about privacy, a loss of access privacy is different from a loss of control privacy. There seems to be something problematic about people accessing personal information as such, that is, irrespective of other concerns, especially of whether the accessed information will be used for objectionable purposes. Imagine that government agents monitor your behavior, eavesdrop on your conversations, read your mail or email, or reduce your access privacy in some other such way. These privacy breaches seem harmful even when there is no risk whatsoever that the collected information is used for bad purposes (or exposed to the public so that even more people access the information). Even if we stipulate that these agents are perfectly virtuous people who, somehow isolated from the rest of society, have not the slightest opportunity to pass on the information gleaned to others, there is, I think, a distinct sense that you are being harmed. I admit that I am here appealing to intuition and that it is not easy to spell out the nature of this harm or provide further support for this view. Perhaps we are here reaching ethical rock-bottom. One way of going beyond brute intuition may be to observe that people who have had intimate information accessed by others often feel exposed, embarrassed, humiliated, or simply awkward, a response that does not appear fully reducible to fears about what the information gleaned may be used for. Maybe, as ethicists, we do well to take these responses at face value. Footnote 23 Thus, although the argument for it remains somewhat schematic, it is certainly plausible that breaches of access privacy are objectionable as such, irrespective of other concerns, in particular of what the accessed information will be used for. Footnote 24 There appears to exist a significant normative difference between whether some piece of personal information, which we had rather kept for ourselves, is actually in somebody else’s mind or not — a distinction that certainly has some plausibility on its face. Admittedly, though, my argument for this asymmetry is not uncontestable, and it is open to critics to challenge it by either disputing that access as such is problematic or by pushing the intuition that loss of control as such is problematic too.
The claims I have made are substantive ethical claims, which are independent from definitional questions. They would remain true if we opted for some other definition of privacy, although this would necessitate reformulating them. The increasingly automated character of modern surveillance matters not for reasons related to the meaning of privacy. It matters morally because it means that there can be collecting and processing of large amounts of data without any access taking place. This is relevant because access as such is morally problematic. By contrast, the mere collecting of large amounts of data, though reducing control privacy, does not constitute a compelling independent concern about surveillance, independent, that is, from the other two concerns. To understand what is ultimately problematic about government surveillance, we must therefore focus on the concern about access and the concern about what surveillance is used for. The question regarding the meaning of privacy and whether surveillance should be said to reduce “privacy” is peripheral.
The concern about access is legitimate and important. There seems to be something objectionable about human access to surveillance data in its own right , irrespective of what the accessed data are used for. The force of this concern about modern government surveillance is difficult to gauge, though. There certainly is a non-negligible risk of access taking place, in spite of the increasingly automated nature of surveillance. For instance, there are reports that employees of the US’s National Security Agency use surveillance tools to spy on their partners. Footnote 25 There is also the risk that data are hacked or leaked to the public, in which case they may be accessed by people other than government employees. Just as the extensive data collection efforts by private corporations is worrisome because the collected data are never perfectly secure, so is government surveillance. Footnote 26 Indeed, recent security breaches of government and corporate databases have exposed data of 50 million Turks and 223 million Brazilians, respectively. Footnote 27 Still, the fact that surveillance today relies on modern surveillance technologies means that the amount of access taking place is relatively low, compared to “old-fashioned” large-scale surveillance operations. The collection of massive amounts of data does typically not translate to a massive erosion of people’s access privacy. Security breaches such as the ones above are the exception, and even when they occur, only a small portion of the data made available is actually accessed. Technological and institutional safeguards may be put in place to further reduce the probability of data breaches, although they will never completely eliminate the risk. Footnote 28 Despite the recent massive expansion of government surveillance, it is arguable that today’s government surveillance in, say, the US, the UK, or the EU causes fewer reductions in access privacy than, say, government surveillance in the GDR. Footnote 29 On the whole, the concern that data might be accessed should be taken seriously, and it is no doubt part of the explanation of why real-world mass surveillance is so worrisome. But it only goes some way towards explaining the fierce opposition or even horror that large-scale government surveillance tends to elicit.
Arguably, the most compelling concern about modern government surveillance is that it can be used for objectionable purposes. Mass surveillance is a powerful instrument for controlling people, and placing an instrument this powerful in the hands of already powerful governments raises legitimate fears about what it will be used for (other than potentially for accessing the data). It was mentioned in the introduction that surveillance scholars have already raised a number of concerns regarding large-scale government surveillance. Many of these concerns can be interpreted as being ultimately about how the surveillance data are or might be used. Adding another perspective to this discussion, I will, in the remainder of this paper, explore one problem associated with the use of surveillance that in my view constitutes one of the principal problems with government surveillance and that has so far received little attention.
3 Surveillance and Legitimacy
To appreciate this particular problem, we must consider that government surveillance is a means of enforcing laws. The primary purpose of government surveillance is to ensure that people comply with the law by enabling the legal prosecution of those who fail to comply and by creating a climate of deterrence. Footnote 30 This section explores the idea that one fundamental problem with government surveillance is that it can be used to enforce laws (or, more broadly, government policies) that the government has no right to enforce. In his autobiography, Edward Snowden asserts that.
a world of total automated enforcement – of, say, all pet-ownership laws, or all zoning laws regulating home businesses – would be intolerable. Extreme justice can turn out to be extreme injustice, not just in terms of the severity of the punishment for an infraction, but also in terms of how consistently and thoroughly the law is applied and prosecuted. Footnote 31
This observation is, I think, important and to the point. One problem with extensive government surveillance is that we should not want all laws to be consistently and thoroughly applied and prosecuted. The problem of government surveillance is thus closely intertwined with the more general problem of political legitimacy. There is a sense in which a criticism of surveillance along these lines is not a criticism of surveillance per se. Surveillance is really just the tool for achieving that which is argued to be objectionable. This point is well taken. Indeed, I mentioned at the outset that I take my discussion to be of more general relevance and thus, hopefully, of interest to scholars who have no particular interest in surveillance. But it is also true that the rise of government surveillance renders concerns about legitimacy particularly salient and pertinent. It renders the “consistent and thorough application and prosecution of the law” possible in a way that until recently states could only dream of. This is why Snowden’s above-quoted concern is not “off-topic” and why, I hope, the below discussion of issues related to legitimacy is fitting.
Political legitimacy refers to the moral right of a government to pass and enforce laws. Footnote 32 Understanding the ethical significance of government surveillance requires an understanding of the conditions that must be satisfied for coercive government action to be legitimate. Although most people, political theorists and laypeople alike, accept the legitimacy of democratic governments, it is worth making explicit why government action is in need of legitimation. Essentially, the problem of political legitimacy is that government action is coercive. Government commands are backed by punishments that one cannot defy, as one is literally forced to comply. One might refuse to pay a fine, decide not to turn up to a court hearing, or continue driving one’s car after having had one’s license revoked. But at the end of the chain of sanctions, there is (typically) imprisonment, and one is ultimately made to go there by physical force.
The fact that government ultimately rests on the threat of physical force and imprisonment is morally significant, as it constitutes a serious pro tanto wrong that stands in need of moral justification. Indeed, in nonpolitical settings, people are extremely reluctant to condone or personally resort to physical coercion to achieve even desirable aims. Most people would be aghast at the idea of private individuals using physical coercion to carry out the kind of policies that they take governments to be perfectly entitled to enforce. They would, for instance, be appalled if a private individual forcibly extracted money from her neighbor for charitable purposes by threatening to use physical force to lock her up in the basement. Footnote 33 Given then the widely acknowledged considerable pro tanto badness of physical coercion and imprisonment, there is a need to justify the use of coercive measures by the government. This need for justification carries over to government surveillance, which is a part of the coercive apparatus of the state. The primary purpose of government surveillance is to ensure compliance with the law and to facilitate the prosecution of those who fail to comply.
One group of people who should find government surveillance objectionable is libertarians and anarchists, who, emphasizing the badness of physical coercion, believe that the scope of legitimate government action is very limited or, indeed, zero. Footnote 34 They should approve of government surveillance only for the enforcement of the set of policies that governments may legitimately enforce, which, according to them, is either very small or empty. The observation that there is something objectionable from a libertarian or anarchist point of view with an institution that is an instrument of law enforcement borders on the trivial. Footnote 35 Also, libertarianism and anarchism are minority views that few interested in the ethics of government surveillance share. I will therefore put libertarian or anarchist objections to one side and focus on more mainstream conceptions of political legitimacy, which are more optimistic about the capacity of democratic procedures to generate legitimacy. From such as perspective, government surveillance, when carried out by established liberal democracies, may appear prima facie legitimate. When established liberal democracies — think the US, the UK, Germany, or France — rely on surveillance for law enforcement purposes, they are enforcing what appear to be democratically legitimated laws.
My project in this section is to explore why even those subscribing to more mainstream conceptions of political legitimacy have reason to be concerned about government surveillance on account of its forming part of the coercive apparatus of the state. I will identify and discuss three such reasons for concern. Footnote 36
The first and perhaps most obvious reason is that there is always the risk of democratic decay. States that are functioning liberal democracies today might degenerate into severely defective democracies in the future. This risk is today more palpable than ever. It means that there is a risk that the surveillance infrastructure and the collected data that are used for democratically legitimated purposes today will be used for poorly legitimated purposes in the future. When democratic institutions decay, they will at some point fail to generate the legitimacy that is necessary for the enforcement of laws to be rightful. This problem carries over to surveillance. There is something deeply objectionable about government surveillance when it is used to enforce laws that are illegitimate. One risk, then, is that surveillance capacities are used in the future to enforce laws that have not been adequately legitimated. A fortiori, government surveillance is objectionable when a democracy has degenerated into an authoritarian tyranny that employs surveillance to infringe basic human rights. Surveillance can and has been used to stifle free speech, to restrict the freedom of assembly, to go after dissidents, and to oppress and persecute marginalized people, which is not only illegitimate but also substantively unjust. Footnote 37
Second, most democratic theorists agree that there are limits to what can be democratically legitimated. While they regard democratic procedures as an effective way of legitimating coercion, they usually hold that some policies are illegitimate even if they have been passed in a proper democratic procedure. That is, they usually endorse at least some substantial criteria of political legitimacy, the violation of which defeats the legitimating force of democratic procedures. This proviso is typically thought to affect laws that violate basic political rights, the so-called liberties of the ancients. For instance, it is generally held that it is never legitimate to disenfranchise a certain group of people, to take away people’s right to freedom of expression, or to severely curtail the freedom of the press. But most democratic theorists also take this proviso to protect nonpolitical human rights, including the liberties of the moderns such as liberty of conscience and the right to bodily integrity. Footnote 38
Many surveillance operations serve to enforce laws against terrorism and serious crime. These are not plausible candidates for laws that involve legitimacy-defeating violations of basic liberties. In the wake of the Covid crisis, however, surveillance has also been used to enforce restrictions on people’s basic liberties. Taiwan, South Korea, and Israel have been particularly resolute, relying on mandatory surveillance instruments to enforce quarantine regulations. Footnote 39 One newspaper article reports, for instance, that “the [Taiwanese] government worked with telecommunications companies to track quarantined residents’ locations using their phone numbers. This system, called a ‘digital fence,’ notifies authorities when anyone under mandatory quarantine goes outside their designated quarantine site.” Footnote 40 Surveillance is effectively used to severely restrict citizens’ liberty of movement, liberty of assembly, freedom of trade, and other basic liberties. Whether such restrictions constitute a morally justifiable response to the Covid pandemic is debatable and will not be discussed here. I mention them as they convey an idea of how readily surveillance may be used to enforce restrictions that do infringe on citizens’ basic liberties.
There is, however, another route to arguing that government surveillance might end up being deployed to enforce democratically enacted yet illegitimate laws. This route — again anticipated by Snowden’s remark on the “severity of the punishment for an infraction” — is in my view quite compelling but perhaps also somewhat nonobvious and contrarian. It concerns not the content of the laws that are enforced, for instance, whether they curtail basic liberties, but their mode of enforcement. David Estlund observes that among the democratically enacted laws that are illegitimate are not only those that undermine the proper functioning of democratic procedures but also laws that are morally abhorrent for other reasons. He asserts, convincingly, that a “law, passed by proper democratic procedures, that established, as a punishment for anything, being boiled in oil would be neither legitimate nor authoritative even though it has no real antidemocratic dimension to it.” Footnote 41 The feature that renders this law illegitimate relates to the punishment attached to its violation, that is, to its mode of enforcement rather than to its content. While nobody is boiled in oil these days, excessively cruel punishments are by no means a thing of the past. Today, people are punished by being locked up in a prison cell, and it is arguable that this is an extremely inhumane punishment, too. As Chris Surprenant and Jason Brennan observe, “[d]epriving someone of freedom, subjecting them to extended risk of physical and sexual abuse, forcing them to remain locked in a small space, and in some cases, keeping them isolated and without entertainment for extended period[s] [is] barbaric.” Footnote 42 Incarceration also causes considerable collateral damage by negatively affecting people who are personally close to the incarcerated person and may depend on his or her support, such as family members, partners, and friends. Surprenant and Brennan imagine that an outsider might offer the following account of incarceration as a punishment:
You […] enslave your convicts, place them under constant surveillance, remove their privacy, dehumanize them, bore them, psychologically torture them, and subject them to near constant threats of capricious physical and sexual abuse. You ruin their lives, and you make it so that these people provide nothing of value to society, either. And you do this all at tremendous monetary expense. […] [Y]ou punish criminality with prolonged dehumanization punctuated by capricious, unexpected brutality. Footnote 43
Now consider again the example of death by boiling in oil. Assume, for the sake of argument, that drug offenses, theft, or tax evasion were punished by boiling the delinquent in oil. It is plausible that even if we assume that the laws that criminalize these practices and specify the punishment were democratically passed, democratic theorists should dismiss them as illegitimate on account of the disproportionate cruelty of the punishment attached to their violation. The punishment is profoundly inhumane, and its inhumanity nullifies whatever democratic legitimation the laws may have received. It would evidently be wrong to enforce these laws and to boil in oil the drug user or dealer, the thief, or the tax evader. While incarceration is certainly less inhumane than boiling in oil, it is, I submit, still sufficiently inhumane and excessive as to defeat the legitimacy of some laws that result in people being incarcerated. I am not saying that incarceration is never justified. Some wrongdoers, such as serial killers, rapists, and terrorists, ought to be locked away so as to prevent them from causing further harm. Footnote 44 But incarceration as a punishment for nonviolent crime is unjustifiably inhumane. Thus, many instances of incarceration, especially but not exclusively in the USA, are so inhumane that we should question the legitimacy of the laws responsible for them. Footnote 45
What I am suggesting, then, is that government surveillance is problematic when it is used to enforce laws that are illegitimate because of the inhumanity of the punishment attached to their violation. That is, there is a considerable risk that government surveillance is abused to enforce laws that are illegitimate because of their mode of enforcement. Although most democratic theorists focus on the content of laws rather than their mode of enforcement (Estlund being an exception), I take this concern about government surveillance to be consonant with the spirit of much of democratic theorizing, which acknowledges that grossly inhumane legislation is illegitimate irrespective of the democratic legitimation it may have received. Footnote 46
Third, the use of surveillance to enforce laws may be objectionable because the democratic institutions of established liberal democracies are already defective. So far, my argument assumed that the democratic procedures in established liberal democracies are by and large doing a good job at generating democratic legitimacy, although it was acknowledged that they might decay (first problem) or on occasion produce illegitimate laws by violating procedure-independent standards (second problem). The third problem arises from the observation that the democratic procedures of established liberal democracies are already defective and may thus fail to secure the legitimacy of the laws that surveillance is used to enforce. They are defective by the standards of at least a number of influential mainstream theories of political legitimacy.
For instance, many proponents of deliberative accounts of political legitimacy hold that policies are legitimate only if they emanate from ideal political deliberation. Seyla Benhabib asserts “that legitimacy in complex modern democratic societies must be thought to result from the free and unconstrained public deliberation of all about matters of common concern.” Footnote 47 But, as many have observed, actual political deliberation does not at all conform to this ideal. Footnote 48 Or consider how John Rawls conceives of legitimacy:
[T]he idea of political legitimacy based on the criterion of reciprocity says: Our exercise of political power is proper only when we sincerely believe that the reasons we would offer for our political actions – were we to state them as government officials – are sufficient, and we also reasonably think that other citizens might also reasonably accept those reasons. Footnote 49
Often, however, the exercise of political power is not justified by public reasons in the way envisaged by Rawls and his followers in the public reason tradition. Estlund, defending an epistemic theory of democratic legitimacy, holds that “[d]emocratic legitimacy requires that the procedure can be held, in terms acceptable to all qualified points of view, to be epistemically the best (or close to it) among those that are better than random.” Footnote 50 But it is fair to say that actual democratic procedures in established liberal democracies, however, worthy of respect and protection, are not close to being the epistemically best among those that are better than random. Estlund himself, acknowledging the problem of voter ignorance, notes that he is unsure whether the requirements of epistemic proceduralism will ever be met. Footnote 51 The neo-republican approach ties legitimacy to the concept of non-domination and to popular control over government. Philip Pettit, who has offered the most comprehensive account of neo-republicanism, states: “[A] state will be legitimate just insofar as it gives each citizen an equal share in a system of popular control over government.” Footnote 52 Again, due to existing inequalities between citizens, virtually no democracy conforms to this ideal, as Pettit himself observes. Footnote 53
I cannot and need not here review all theories of political legitimacy. This selective review suffices to illustrate that at least several prominent theories of political legitimacy formulate standards of legitimacy that established liberal democracies do not meet. Perhaps, this is unsurprising. Democratic theorists are in the business of outlining to-be-emulated political ideals. They do not seek to provide descriptively adequate accounts of the imperfect status quo. But it means that if we take these theories at face value, the legitimacy of most policies enforced in established liberal democracies is in doubt. This problem has, to my knowledge, hardly been addressed in the literature, and its precise implications remain to be explored. Footnote 54 At this point, I want to cautiously point out that, by the standards of several notable theories of legitimacy, many laws seem to lack legitimacy and that there may be something problematic about enforcing such laws. To the extent that government surveillance is used to enforce such imperfectly legitimated laws, government surveillance is problematic, too.
Note that the problem of defective legitimacy affects not only laws that are enforced with the help of government surveillance but also government surveillance as a policy itself. If existing democratic procedures do not meet the requirements necessary for democratic legitimation, the actual decision-making processes that lead to the introduction of surveillance programs may fail to ensure their legitimacy. Indeed, given the secretive nature of many surveillance operations and the importance of transparency for political legitimacy, the problem may be particularly acute for surveillance policies. Footnote 55
To summarize, the three subproblems are as follows: (1) even if established liberal democracies are, by and large, legitimated to enforce laws today, their democratic institutions may decay in the future. Existing surveillance data and infrastructure might then be used for illegitimate purposes. (2) Even if established liberal democracies possess the procedural institutions that generate democratic legitimacy, there are procedure-independent standards that may defeat the legitimacy of laws decided by these institutions. The inhumanity of incarceration may be such a defeater. Government surveillance is objectionable if it is used to enforce such laws. (3) It is unclear to what extent established liberal democracies really possess the procedural institutions that generate democratic legitimacy, if judged by the standards of several prominent theories of political legitimacy. It is arguable that government surveillance is problematic when it is used to enforce laws whose legitimacy is in doubt.
To be sure, the established liberal democracies I have considered are, as of today, not authoritarian tyrannies (trivially). Also, some of the most salient mass surveillance operations, such as those uncovered by Snowden, serve to fight terrorism and similarly serious crime. One might argue that if any laws are legitimate, it is laws against terrorism and serious crime. They ought to be enforced even when they have resulted from imperfect democratic processes, and incarceration may be a morally justified response to the violation of these laws. Arguably, people who plot terrorist attacks ought to be put behind bars. However, democratic institutions are increasingly under threat, with many experts fearing an authoritarian backlash. Footnote 56 And as surveillance technologies become more sophisticated and citizens more desensitized to being monitored, it is likely that government surveillance will progressively expand beyond the purpose of counterterrorism and the like. Footnote 57 Indeed, already today, surveillance is used to enforce rather questionable legislation. One of the most extensive surveillance operations, said by some to eclipse that of the National Security Agency, is run by the US Drug Enforcement Agency (DEA). Through the “Hemisphere Project,” the DEA has access to a vast database of phone data, provided by telecommunication company AT&T, to prosecute the “war on drugs,” one of the US’s most questionable policy programs. Footnote 58 Another controversial surveillance operation is carried out by the US’s Immigration and Customs Enforcement (ICE). It uses facial recognition to scan millions of driver’s licence photos, possibly in an effort to track down undocumented immigrants. Footnote 59 To such surveillance programs, the above legitimacy concerns seem readily applicable. These programs also demonstrate that government surveillance is expanding rapidly and often in an unchecked manner — the DEA’s surveillance was secret until accidentally uncovered, and the ICE proceeds without seeking state or court approval, let alone approval of the driver’s licences’ owners — giving a foretaste of what is to come. Surveillance is thus likely to continue expanding beyond the prevention of terrorism and serious crime. The more government surveillance is leading to the “total enforcement” of the law, the more applicable the above concerns about legitimacy become.
4 Conclusion
Having distinguished three potential reasons for concern, I have argued that, ultimately, we ought to be concerned about whether collected surveillance data may be accessed and about what the data are used for. The mere collecting of surveillance data, though involving privacy losses of sorts, does not constitute a compelling reason for concern in its own right, over and above the other two concerns. Debates about the meaning of privacy, though insightful, need not be settled for the ethical assessment of government surveillance. One chief problem with government surveillance in democracies is that it may be used to enforce laws that ought not to be enforced — a problem that will become increasingly acute as government surveillance expands.
I conclude with a caveat regarding the implications of my argument. The aim of this essay was to get a better grip on what is pro tanto objectionable about modern government surveillance in established liberal democracies. I have made no attempt to provide an all-things-considered judgment of its ethical acceptability. Nothing I have said entails that government surveillance is never justified. To call for an end to all government surveillance on the basis of the above concerns, perhaps by appeal to the precautionary principle, would be to ignore the opportunity costs that forgoing government surveillance may involve. Footnote 60 As mentioned in the introduction, some scholars have defended government surveillance as a useful instrument for preventing terrorist attacks of a catastrophic scale. An all-things-considered judgment that accounts for these and other potential opportunity costs, which would also require assessing the actual effectiveness of surveillance, cannot be provided within the scope of one article. Footnote 61 Indeed, it is doubtful that any such general assessment can be provided, as the moral costs and benefits of each surveillance technique or operation must be judged on its own terms. Footnote 62 What I do hope to have achieved is to contribute a new perspective on whether and why we should be concerned about government surveillance and on how the problem of government surveillance relates to questions of privacy and legitimacy.
For an overview of policing and surveillance in twentieth-century dictatorships, refer to Dunnage ( 2016 ). Dunnage reports that it is estimated that, in the post-Stalinist Soviet Union, some 30 to 60% of the population were forced to work as informers for the KGB, and in the GDR, roughly every thirtieth citizen served as an informer for the regime. Nazi Germany may have relied less on surveillance and more on denunciations (pp. 122–123). On surveillance in China and North Korea, see Denyer ( 2018 ) and Lankov and In-ok ( 2011 ), respectively.
See, e.g., Brownlee ( 2016 ) and Scheuermann ( 2014 ).
Critical discussions of government surveillance include Goold ( 2009 ); Henschke ( 2017 , ch. 9); Hoye and Monaghan ( 2018 ); Lever ( 2008 ); Nissenbaum ( 1998 ); Roberts ( 2015 ); Solove ( 2007 ); Smith ( 2020 ); Stahl ( 2016 , 2020 ); and I. Taylor ( 2017 ). For two non-privacy-centered criticisms of government surveillance, see Macnish ( 2018 , 2020 ) and Sorell ( 2018 ). A classic treatment of this topic is Foucault ( 1975 ). See also Zuboff ( 2019 ), though her focus is on “surveillance” by private companies.
Most prominently Macnish ( 2018 , 2020 ); see also Posner ( 2005 ) and Sorell ( 2018 ). For an argument that public video surveillance does not violate privacy rights, refer to Ryberg ( 2007 ).
Exceptions include surveillance in the McCarthy era, the FBI’s COINTELPRO (including the wiretapping of Martin Luther King), and undercover policing in the UK (see the ongoing Undercover Policing Inquiry). See also Goold ( 2009 , p. 43).
See Sorell ( 2011 , pp. 12–14).
J. S. Taylor ( 2005 , p. 227).
Persson and Savulescu ( 2012 )
Much more cautious defenses of surveillance have been advanced by Smith ( 2020 ) and I. Taylor ( 2017 ).
In what follows, the “pro tanto” will usually be omitted, but I will return to it in the conclusion.
The observation that no access takes place when data are processed by intelligent algorithms might be challenged on the grounds that these algorithms are themselves “agents” of sorts, who “access” the data when processing them. Whether intelligent systems qualify as “agents” or not, I agree with Macnish ( 2020 ) that there is a significant difference between access by humans and access by entities that lack “semantic understanding,” e.g., intelligent systems.
I am focusing on informational privacy, as this seems to be the relevant kind of privacy in the present context.
Roessler ( 2005 , p. 8). Other proponents of the control account include Fried ( 1984 , p. 209); Menges ( 2020a ); Moore ( 2003 , 2008 ); Westin ( 1967 , p. 7); and, tentatively, Mainz and Uhrenfeldt ( 2021 ) (the latter focus on the right to privacy, though). For an interesting exchange about its plausibility, see Lundgren ( 2020 ) and Menges ( 2020b ).
Macnish ( 2018 ); see also Macnish ( 2020 ) and Thomson ( 1975 , pp. 304–305, n. 1). An argument strikingly similar to Macnish’s (that even features a diary example) was independently developed by Tom Sorell ( 2018 ). For a subtle attempt by a control theorist to account for threatened loss cases, refer to Menges ( 2020a , forthcoming).
Note, though, that Menges, although a control theorist, tries to capture the intuition that no privacy loss occurs in threatened loss cases and thus agrees with Macnish that modern government surveillance involves very little loss of privacy (2020a, 2020b, forthcoming).
Macnish ( 2018 , 2020 ). Menges concurs (2020a, pp. 46–47). A view similar to Macnish’s has been defended by Sorell, who “den[ies] that bulk collection is seriously intrusive without denying that it is morally objectionable in other ways” (2018, p. 47).
I am here concurring with Henschke ( 2017 , p. 46), Solove ( 2007 , p. 760; 2009, pp. 39–40), and van den Hoven ( 2008 ), who have warned against getting bogged down in conceptual debates.
Henschke ( 2020 ), too, suggests distinguishing two concepts of privacy. His distinction differs from mine. In his 2017, he defends a pluralistic, “clustered” approach to privacy.
For what it is worth, I share Macnish’s linguistic intuition that privacy is only reduced in situations in which human access occurs.
An anonymous reviewer has sensibly suggested that I clarify whether this approach commits me to the views that (1) defining privacy is not crucial to assessing the ethical permissibility of surveillance, and (2) intermediate moral principles such as “Do not diminish a person’s privacy [or, for that matter, autonomy, freedom, etc.]” play little role in moral theory compared to more fundamental principles such as the categorical imperative or the utilitarian calculus. In response, I wish to state that I do believe that defining privacy matters, and I have offered two stipulative definitions of privacy. What I do not believe is that we necessarily need to determine which of several privacy definitions on offer (especially privacy as control and privacy as nonaccess) best capture everyday privacy talk before we can address the ethical issue at stake. We can proceed by exploring both the normative significance of reductions of control privacy and that of reductions of access privacy. This way, we can come to grips with the problem of surveillance without first having to identify which concept of privacy best captures everyday privacy talk. This is the approach I am taking in this essay. Relatedly, I am not committed to the view that intermediate principles do not matter for moral theorizing. Such principles as “Do not diminish a person’s privacy” do play a role in moral theorizing, but again, we can work with different versions of such principles (e.g., “Do not diminish a person’s control privacy,” “Do not diminish a person’s control privacy,” etc.), and we need not first identify which privacy concept best captures everyday privacy talk.
At least according to the standard version of the control account. See again Menges ( 2020a , b , forthcoming) for a version of the control account that entails that government surveillance need not necessarily reduce people’s privacy.
Similarly, Henderson ( 2016 , p. 962) observes that “assuming complete automation, the key privacy harm seems to occur only upon human viewing, or use.”.
A related line of research explores the connection between privacy and dignity (Bloustein, 1964 ; Floridi, 2016 ; Kleinig, 2009 ).
This is not to deny that access to information may additionally be problematic for the reason that the accessed information may be used for objectionable purposes.
Perez ( 2013 )
For criticisms of corporate “surveillance,” see Zuboff ( 2019 ).
Belli ( 2021 ); Hern ( 2016 )
See I. Taylor ( 2017 , pp. 335–336).
It is true, though, that the advent of new surveillance technologies has made it more likely that democracies engage in surveillance that might not have engaged in surveillance without these technologies. Thus, although surveillance operations relying on these technologies involve little data access, it may still be the case that the advent of these technologies has led to an absolute reduction of access privacy, given that even modern surveillance tends to be associated with some reductions in access privacy.
This is not to deny that government surveillance may be used for other purposes that are not straightforwardly reducible to law enforcement or that the effects of government surveillance on those subjected to surveillance may go beyond mere compliance with the law (as scholars in the Foucauldian tradition might suggest).
Snowden ( 2019 , p. 196).
See, e.g., Huemer ( 2013 , p. 5), who defines political legitimacy as “the right, on the part of a government, to make certain laws and enforce them by coercion against the members of its society – in short the right to rule.” Political legitimacy can be understood as one dimension of political authority, the other being citizens’ obligation to obey laws.
See again Huemer ( 2013 , p. 11). Huemer is a skeptic about political legitimacy, but his characterization should be common ground among optimists and skeptics about political authority alike.
See, e.g., Huemer ( 2013 ), Nozick ( 1974 ), and Wolff ( 1970 ).
Though see Pilon and Epstein ( 2013 ).
For a different legitimacy-centered criticism of surveillance, inspired by Habermasian discourse theory, refer to Stahl ( 2020 ).
See also Henschke on “Deliberative Information Harms” (2017, pp. 223–227). Note that, in addition, the ready availability of a surveillance infrastructure and of surveillance data might also facilitate the transition to an authoritarian regime. It is easier to establish an authoritarian tyranny and persecute its enemies when one already possesses or can readily acquire information about the political orientation and activities of one’s subjects.
See, e.g., Christiano ( 2008 , ch. 7); Cohen ( 1997b ); Estlund ( 2007 , p. 110); Freeman ( 1990 ); Gutmann and Thompson ( 2004 , ch. 3); Habermas ( 1996 , ch. 3); and Rawls ( 1996 , ch. 8).
Altshuler and Hershkowitz ( 2020 )
Lee, McCauley, and Abadi (2020).
Estlund ( 2007 , p. 111).
Surprenant and Brennan ( 2019 , pp. 70–71); see also Huemer ( 2018 ).
Surprenant and Brennan ( 2019 , p. 72).
See again Surprenant and Brennan ( 2019 , p. 85).
Similarly, Surprenant and Brennan encourage juries to make use of their right to nullify the law (2019, pp. 140–141).
To be sure, at least Brennan is a libertarian, but while his and Surprenant’s critique of incarceration might be characteristically libertarian, it is by no means exclusively libertarian.
Benhabib ( 1994 , p. 26). According to John Dryzek, the core claim of deliberative democracy is “that outcomes are legitimate to the extent they receive reflective assent through participation in authentic deliberation by all those subject to the decision in question” (2001, p. 651). Some theories of deliberative democracy are ambiguous as to whether legitimacy requires actual or hypothetical deliberation (e.g., Cohen, 1997a ; Habermas, 1996 ). Whether, according to these theories, legitimacy is damaged by the defects of actual deliberative procedures is somewhat unclear. The letter of these theories seems to say “no,” but their spirit suggests “yes.”.
See, e.g., Huemer ( 2013 , pp. 61–64).
Rawls ( 1997 , p. 771).
Estlund ( 2007 , p. 98).
Estlund ( 2007 , p. 14).
Pettit ( 2014 , p. 22).
Pettit ( 2014 , pp. 136–140).
Kirshner ( 2018 ) and Pettit ( 2014 , pp. 136–140) discuss the related problem of whether citizens have a duty to obey the law in defective democracies.
On the transparency requirement, see, e.g., Pettit ( 2014 , p. 215). I owe this observation to Irina Schumski.
See, e.g., Applebaum ( 2020 ), Levitsky and Ziblatt ( 2018 ), and Snyder ( 2018 ).
Besides, the risk of this happening has repercussions in the present. If there is a risk that surveillance data are used for illegitimate purposes in the future, citizens’ freedom and autonomy is curtailed in the present as they will adjust their behavior in anticipation of these risks. For related discussions on the “chilling effects” of surveillance, see, e.g., Macnish ( 2018 , p. 428), Solove ( 2006 ), Stahl ( 2020 , p. 85), and Thomsen ( 2020b , p. 381).
Shane and Moynihan ( 2013 )
Harwell ( 2019 ); Harwell and Cox ( 2020 )
See Sunstein ( 2005 ).
On the questionable effectiveness of the NSA’s surveillance program, see Greenwald ( 2014 , pp. 202–205). Refer to Macnish ( 2015 ), Rønn and Lippert-Rasmussen ( 2020 ), and Thomsen ( 2020b ) for discussions of government surveillance and proportionality, which may be helpful for reaching more comprehensive judgments.
For one moral assessment of a specific surveillance practice, see Thomsen ( 2020a ).
Altshuler, T. S., & Hershkowitz, R. A. (2020). How Israel’s COVID-19 mass surveillance operation works. Retrieved from https://www.brookings.edu/techstream/how-israels-covid-19-mass-surveillance-operation-works/ . Accessed 03/02/2022
Applebaum, A. (2020). Twilight of Democracy: The Seductive Lure of Authoritarianism . Penguin.
Google Scholar
Belli, L. (2021). The largest personal data leakage in Brazilian history: Why the rest of the world should be worried, and think hard about how to create a data protection culture. Retrieved from https://www.opendemocracy.net/en/largest-personal-data-leakage-brazilian-history/ . Accessed 03/02/2022
Benhabib, S. (1994). Deliberative rationality and models of democratic legitimacy. Constellations, 1 (1), 26–52.
Article Google Scholar
Bloustein, E. J. (1964). Privacy as an aspect of human dignity: An answer to Dean Prosser. New York University Law Review, 39 (6), 962–1007.
Brownlee, K. (2016). The civil disobedience of Edward Snowden: A reply to William Scheuermann. Philosophy and Social Criticism, 42 (10), 965–970.
Christiano, T. (2008). The Constitution of Equality: Democratic Authority and its Limits . Oxford University Press.
Book Google Scholar
Cohen, J. (1997a). Deliberation and democratic legitimacy. In J. Bohman & W. Rehg (Eds.), Deliberative Democracy (pp. 67–92). MIT Press.
Cohen, J. (1997b). Procedure and substance in deliberative democracy. In J. Bohman & W. Rehg (Eds.), Deliberative Democracy (pp. 407–438). MIT Press.
Denyer, S. (2018). China’s watchful eye. The Washington Post . Retrieved from https://www.washingtonpost.com/news/world/wp/2018/01/07/feature/in-china-facial-recognition-is-sharp-end-of-a-drive-for-total-surveillance/ . Accessed 03/02/2022
Dryzek, J. (2001). Legitimacy and economy in deliberative democracy. Political Theory, 29 (5), 651–669.
Dunnage, J. (2016). Policing and surveillance. In P. Corner & J.-H. Lim (Eds.), The Palgrave Handbook of Mass Dictatorship (pp. 119–130). Palgrave Macmillian.
Chapter Google Scholar
Estlund, D. (2007). Democratic authority: A philosophical framework . Princeton University Press.
Floridi, L. (2016). On human dignity as a foundation for the right to privacy. Philosophy and Technology, 29 (4), 307–312.
Foucault, M. (1975). Surveiller et Punir: Naissance de la Prison . Gallimard.
Freeman, S. (1990). Constitutional democracy and the legitimacy of judicial review. Law and Philosophy, 9 (4), 327–370.
Fried, C. (1984). Privacy: A moral analysis. In F. D. Schoeman (Ed.), Philosophical Dimensions of Privacy: An Anthology (pp. 203–222). Cambridge University Press.
Greenwald, G. (2014). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State . New York: Metropolitan Books.
Goold, B. (2009). How much surveillance is too much? Some thoughts on surveillance, democracy, and the political value of privacy. In D. W. Schartum (Ed.), Overvakning I en Rettstaat (pp. 38–48). Bergen: Fagbokforlaget.
Gutmann, A., & Thompson, D. (2004). Why Deliberative Democracy? Princeton University Press.
Habermas, J. (1996). Between Facts and Norms: Contributions to a Discourse Theory of Law and Democracy . MIT Press.
Harwell, D. (2019). FBI, ICE find state driver’s license photos are a gold mine for facial-recognition searches. The Washington Post . Retrieved from https://www.washingtonpost.com/technology/2019/07/07/fbi-ice-find-state-drivers-license-photos-are-gold-mine-facial-recognition-searches/ . Accessed 03/02/2022
Harwell, D., & Cox, E. (2020). ICE has run facial-recognition searches on millions of Maryland drivers. The Washington Post . Retrieved from https://www.washingtonpost.com/technology/2020/02/26/ice-has-run-facial-recognition-searches-millions-maryland-drivers/ . Accessed 03/02/2022
Henderson, S. E. (2016). Fourth amendment time machines (and what they might say about police body cameras). University of Pennsylvania Journal of Constitutional Law, 18 (3), 933–973.
Henschke, A. (2017). Ethics in an Age of Surveillance: Personal Information and Virtual Identities . Cambridge University Press.
Henschke, A. (2020). Privacy, the Internet of things, and state surveillance: Handling personal information within an inhuman system. Moral Philosophy and Politics, 7 (1), 123–149.
Hern, A. (2016). Database allegedly containing ID numbers of 50m Turks posted online. The Guardian . Retrieved from https://www.theguardian.com/technology/2016/apr/04/database-allegedly-containing-id-numbers-of-50m-turks-posted-online . Accessed 03/02/2022
Hoye, J. M., & Monaghan, J. (2018). Surveillance, freedom and the republic. European Journal of Political Theory, 17 (3), 343–363.
Huemer, M. (2013). The Problem of Political Authority: An Examination of the Right to Coerce and the Duty to Obey . Palgrave Macmillan.
Huemer, M. (2018). Unconscionable punishment. In C. W. Surprenant (Ed.), Rethinking Punishment in the Era of Mass Incarceration (pp. 34–48). Routledge.
Kirshner, A. S. (2018). Nonideal democratic authority: The case of undemocratic elections. Politics, Philosophy & Economics, 17 (3), 357–376.
Kleinig, J. (2009). The ethical perils of knowledge acquisition. Criminal Justice Ethics, 28 (2), 201–222.
Lankov, A., & In-ok, K. (2011). The decline of the North Korean surveillance state. North Korean Review, 7 (2), 6–21.
Lee, W.-Y., McCauley, E., & Abadi, M. (2020). Taiwan used police surveillance, government tracking, and $33,000 fines to contain its coronavirus outbreak. Retrieved from https://www.businessinsider.com/taiwan-coronavirus-surveillance-masks-china-2020-6/ . Accessed 03/02/2022
Lever, A. (2008). Mrs. Aremac and the camera: A response to Ryberg. Res Publica, 14 (1), 35–42.
Levitsky, S., & Ziblatt, D. (2018). How Democracies Die . Broadway Books.
Lundgren, B. (2020). A dilemma for privacy as control. The Journal of Ethics, 24 (2), 165–175.
Macnish, K. (2015). An eye for an eye: Proportionality and surveillance. Ethical Theory and Moral Practice, 18 (3), 529–548.
Macnish, K. (2018). Government surveillance and why defining privacy matters in a post-Snowden world. Journal of Applied Philosophy, 35 (2), 417–432.
Macnish, K. (2020). Mass surveillance: A private affair? Moral Philosophy and Politics, 7 (1), 9–28.
Mainz, J. T., & Uhrenfeldt, R. (2021). Too much info: Data surveillance and reasons to favor the control account of the right to privacy. Res Publica, 27 (2), 287–302.
Menges, L. (2020a). Did the NSA and GCHQ diminish our privacy? What the control account should say. Moral Philosophy and Politics, 7 (1), 29–48.
Menges, L. (2020b). A defense of privacy as control. The Journal of Ethics, 25 (3), 385–402.
Menges, L. (forthcoming). Three control views on privacy. Social Theory and Practice
Moore, A. (2003). Privacy: Its meaning and value. American Philosophical Quarterly, 40 (3), 215–227.
Moore, A. (2008). Defining privacy. Journal of Social Philosophy, 39 (3), 411–428.
Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17 (5/6), 559–596.
Nozick, R. (1974). Anarchy, State, and Utopia . Basic Books.
Perez, E. (2013). NSA: Some used spying power to snoop on lovers. Retrieved from https://edition.cnn.com/2013/09/27/politics/nsa-snooping/index.html . Accessed 03/02/2022
Persson, I., & Savulescu, J. (2012). Unfit for the Future . Oxford University Press.
Pettit, P. (2014). On the People’s Terms: A Republican Theory and Model of Democracy . Cambridge University Press.
Pilon, R., & Epstein, R. A. (2013). NSA surveillance in perspective. Chicago Tribune (12.06.2013)
Posner, R. A. (2005). Our domestic intelligence crisis. The Washington Post (21.12.2005).
Rawls, J. (1996). Political Liberalism . Columbia University Press.
Rawls, J. (1997). The idea of public reason revisited. The University of Chicago Law Review, 64 (3), 765–807.
Roberts, A. (2015). A republican account of the value of privacy. European Journal of Political Theory, 14 (4), 320–344.
Roessler, B. (2005). The Value of Privacy . Polity Press.
Rønn, K. V., & Lippert-Rasmussen, K. (2020). Out of proportion? On surveillance and the proportionality requirement. Ethical Theory and Moral Practice, 23 (1), 181–199.
Ryberg, J. (2007). Privacy rights, crime prevention, CCTV, and the life of Mrs Aremac. Res Publica, 13 (2), 127–143.
Scheuermann, W. E. (2014). Whistleblowing as civil disobedience: The case of Edward Snowden. Philosophy and Social Criticism, 40 (7), 609–628.
Shane, S., & Moynihan, C. (2013). Drug agents use vast phone trove, eclipsing N.S.A.’s. The New York Times . Retrieved from https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html . Accessed 03/02/2022
Smith, P. T. (2020). A neo-republican account of just state surveillance. Moral Philosophy and Politics, 7 (1), 49–71.
Snowden, E. (2019). Permanent Record . Metropolitan Books.
Snyder, T. (2018). The Road to Unfreedom: Russia, Europe, America . Tim Duggan Books.
Solove, D. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 154 (3), 477–564.
Solove, D. (2007). “I’ve got nothing to hide” and other misunderstandings of privacy. San Diego Law Review, 44 , 745–772.
Sorell, T. (2011). Preventive policing, surveillance, and the European counter-terrorism. Criminal Justice Ethics, 30 (81), 1–22.
Sorell, T. (2018). Bulk collection, intrusion and domination. In A. I. Cohen (Ed.), Philosophy and Public Policy (pp. 39–60). Rowman & Littlefield.
Stahl, T. (2016). Indiscriminate mass surveillance and the public sphere. Ethics and Information Technology, 18 (1), 33–39.
Stahl, T. (2020). Privacy in public: A democratic defense. Moral Philosophy and Politics, 7 (1), 73–96.
Sunstein, C. R. (2005). Laws of Fear: Beyond the Precautionary Principle . Cambridge University Press.
Surprenant, C. W., & Brennan, J. (2019). Injustice for All: How Financial Incentives Corrupted and Can Fix the US Criminal Justice System . Routledge.
Taylor, I. (2017). Data collection, counterterrorism and the right to privacy. Politics, Philosophy & Economics, 16 (3), 326–346.
Taylor, J. S. (2005). In praise of big brother: Why we should learn to stop worrying and love government surveillance. Public Affairs Quarterly, 19 (3), 227–246.
Thomsen, F. (2020a). The ethics of police body-worn cameras. Moral Philosophy and Politics, 7 (1), 97–122.
Thomsen, F. (2020b). The teleological account of proportional surveillance. Res Publica, 26 (3), 373–401.
Thomson, J. J. (1975). The Right to privacy. Philosophy and Public Affairs, 4 (4), 295–314.
van den Hoven, J. (2008). Information technology, privacy, and the protection of personal data. In J. van den Hoven & J. Weckert (Eds.), Information Technology and Moral Philosophy (pp. 301–321). Cambridge University Press.
Westin, A. (1967). Privacy and Freedom . Atheneum.
Wolff, R. P. (1970). In Defense of Anarchism . Harper & Row.
Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power . Profile Books.
Download references
Acknowledgements
The author would like to thank Saskia Nagel, Niël Conradie, Jan-Christoph Heilinger, and Hendrik Kempt for their helpful comments. He is a member of the project group “Regulatory theories of Artificial Intelligence” within the “Centre Responsible Digitality” (ZEVEDI).
Open Access funding enabled and organized by Projekt DEAL. Funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany’s Excellence Strategy — EXC-2023 Internet of Production — 390621612.
Author information
Authors and affiliations.
Frankfurt School of Finance & Management, Frankfurt, Germany
Peter Königs
You can also search for this author in PubMed Google Scholar
Contributions
Not applicable (single authored).
Ethics declarations
Conflict of interest.
The author declares no competing interests.
Additional information
Publisher's note.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ .
Reprints and permissions
About this article
Königs, P. Government Surveillance, Privacy, and Legitimacy. Philos. Technol. 35 , 8 (2022). https://doi.org/10.1007/s13347-022-00503-9
Download citation
Received : 08 September 2021
Accepted : 15 January 2022
Published : 05 February 2022
DOI : https://doi.org/10.1007/s13347-022-00503-9
Share this article
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
- Surveillance
- Find a journal
- Publish with us
- Track your research
The Moral Side of Government Surveillance Essay
Taylor’s argument on surveillance, importance of surveillance.
Privacy refers to a situation in which an individual is free from any sort of disturbance from people. It also describes a state of an individual practicing his or her personality freely. Privacy breach involves the act of a person accessing information of another without permission and using it wrongly. Privacy plays a crucial role in advancing one’s autonomy (Edelbach and Winston, 234). It enables individuals to advance in their daily activities, which do not require public attention. A breach of privacy siphons an individual’s ability to live independently. Privacy is also crucial in terms of social relations. The restrictions imposed by the right of privacy enable a diverse group of people to live harmoniously, enabling individuals to maintain good social relations among themselves.
Many authors such as Stanley and Steinhardt argue in opposition to the advanced use of surveillance. According to Stanley and Steinhardt, the rising use of surveillance denies individuals their right to confidentiality (Edelbach and Winston, 236). However, some authors such as James Taylor support the advancement made in the field of surveillance. According to Taylor, individuals opt to pay great consideration to matters of security. Currently, the level of insecurity is very high in the world; cases pertaining to terrorism are ever reported in many countries. Thus, according to Taylor it is crucial for nations to advance their level of surveillance.
According to Taylor, the government’s act of watching over its citizens and accessing their information cannot be regarded as a breach of privacy. Taylor argues that privacy can only be breached when the collected information is used for the wrong purpose. Moreover, the collection of information by authorized organizations plays a significant role in the observance and maintenance of the state’s security. The collected information by authorized organizations aid in crucial social issues such as preventing crimes and minimizing the efforts put in extracting information from reluctant witnesses. Taylor states that, despite surveillance going against citizens’ freedom, the acceptable application of surveillance increases citizens’ chances of being safe and promotes their self-independence and privacy.
To my opinion, Taylor is right. Uses of surveillance increases citizen’s safety and promotes moral accepted standards by enhancing reduction of crimes, encouraging observance of law, discouraging corruption, and promoting social codes of conducts.
Surveillance contributes immensely towards the reduction of crimes in states. The use of satellites plays a significant role in reducing terrorism, they enable security managements to detect illegal acts of terrorists in advance, thus promoting calmness, serenity and order. The high-security observance also assists in lowering cases such as highway hijacking of drivers and pedestrians; surveillance enables close monitoring of events that take place on the roads. Extensive use of surveillance cameras in large retail shops such as supermarkets helps in eradicating cases of shoplifting, the cameras provide a wide field of view of the activities that take place within the retail shops. In other cases, companies and organizations attach electronic tags to their products and properties. Electronic tags play a significant role in eradicating theft cases. The positioning of surveillance cameras outside shops and companies also aid in capturing burglars, hence reducing theft cases in a state.
Surveillance has boosted the traffic sector; it monitors daily activities that take place on roads. Road users tend to break rules and regulations that govern traffic sectors. They engage in activities such as overspeeding, use of un-roadworthy vehicles, overloading and carrying excess passengers, evading checkpoints, and neglecting traffic lights. Victims of such crimes try to go scot-free when confronted by security officers by using bribes. However, extensive use of surveillance has significantly minimized such ill behaviors on the roads.
Surveillance has contributed significantly towards combating corruption. For a long time, corruption has been practiced in public offices and other institutions. Many people also used corruption as a shortcut in getting favors and positions they did not deserve. The use of surveillance, however, has contributed positively towards fighting and eradicating this vice. Currently, the use of CCTV cameras in organizations, companies and offices has aided in reducing corruption. The use of surveillance enables right and deserving individuals to be placed in appropriate positions proving the surveillance morality.
Surveillance has also played a vital role in promoting moral uprightness by ensuring high societal observing of acceptable codes of conduct. Prostitution and the use of drugs are some of the issues that promoted social decay. Nevertheless, surveillance denies individuals chances of engaging in such activities. Thus, the use of surveillance encourages observance of high moral conduct.
To a great extent, Taylor’s views concerning the morality of surveillance prove true. This is evident in success observed in law enforcement, crime reduction, combating corruption, and in individuals upholding high social codes of conduct. Despite its moral privilege, surveillance proves inappropriate in some areas. This includes the right to privacy of individuals; it bars individuals from enjoying their personal space. Surveillance has also led to the reduction of creativity, the majority of innovative individuals like working privately. Additionally, an increase in surveillance has also contributed to an increase in crimes in some areas; some of the criminals have invented new ways of committing crimes.
Edelbach, Ralph and Winston, Morton. Society, Ethics, and Technology . New York: Cengage Learning. Print.
- United Kingdom as a Surveillance Society
- "Who Governs the Globe?" by Avant, Finnemore, & Sell
- Ethical Issues in Non-Observance of Working Hours
- Workplace Surveillance
- Effects of Surveillance Technology on Privacy
- Peace, Stability and Security
- Foreseeing Madam Park’s National Defense Policy: What Will Become of Korea
- Intelligence Agency: Covert Action and Intelligence Organization
- Malawi's Sustainable Development
- Values Gap Between the USA and Other Rich Democracies
- Chicago (A-D)
- Chicago (N-B)
IvyPanda. (2022, February 4). The Moral Side of Government Surveillance. https://ivypanda.com/essays/the-moral-side-of-government-surveillance/
"The Moral Side of Government Surveillance." IvyPanda , 4 Feb. 2022, ivypanda.com/essays/the-moral-side-of-government-surveillance/.
IvyPanda . (2022) 'The Moral Side of Government Surveillance'. 4 February.
IvyPanda . 2022. "The Moral Side of Government Surveillance." February 4, 2022. https://ivypanda.com/essays/the-moral-side-of-government-surveillance/.
1. IvyPanda . "The Moral Side of Government Surveillance." February 4, 2022. https://ivypanda.com/essays/the-moral-side-of-government-surveillance/.
Bibliography
IvyPanda . "The Moral Side of Government Surveillance." February 4, 2022. https://ivypanda.com/essays/the-moral-side-of-government-surveillance/.
- To find inspiration for your paper and overcome writer’s block
- As a source of information (ensure proper referencing)
- As a template for you assignment
IMAGES
VIDEO
COMMENTS
Government Surveillance and how it affects society in the eyes of people (more) 0 1. Answers. Advanced Composition (ENG148) 9 days ago. The Impact of Mass Surveillance on Civic Liberties and Democratic Processes with a thesis statement and three paragraph introduction and a citation (more) 0 1. Answers.
Government Surveillance: A Multidimensional Perspective. Our essays on government surveillance delve into historical contexts, legal frameworks, and ethical considerations. Students can gain insights into the evolution of surveillance technologies, the legal battles over privacy rights, and the ethical dilemmas posed by state monitoring.
Thesis statement: Government surveillance should be stopped because it is an invasion of privacy and gives the government control that is not enumerated in the constitution. ... Government surveillance in the past was not a big threat due to the limitations on technology; however, in the current day, it has become an immense power for the ...
During the trial, the statements of the eyewitnesses differed, creating uncertainty about the sequence of events. With surveillance in place, it would have been much easier to determine what happened and what level of justice was necessary in that circumstance. ... Government surveillance can occur on a global scale. Under FISA 702, the U.S ...
Need some inspiration before writing Government Surveillance essay? Explore 100% free Government Surveillance essays, research paper examples and choose any topic you need.
With the expansion of surveillance, such abuses could become more numerous and more egregious as the amount of personal data collected increases. In addition, allowing surreptitious surveillance of one form, even limited in scope and for a particular contingency, encourages government to expand such surveillance programs in the future.
The recent decades have seen established liberal democracies expand their surveillance capacities on a massive scale. This article explores what is problematic about government surveillance by democracies. It proceeds by distinguishing three potential sources of concern: (1) the concern that governments diminish citizens' privacy by collecting their data, (2) the concern that they diminish ...
Taylor's argument on surveillance. Many authors such as Stanley and Steinhardt argue in opposition to the advanced use of surveillance. According to Stanley and Steinhardt, the rising use of surveillance denies individuals their right to confidentiality (Edelbach and Winston, 236).
surveillance and on how the problem of government surveillance relates to ques tions of privacy and legitimacy. Acknowledgements The author would like to thank Saskia Nagel, Niël Conradie, Jan ...
Glenn Sulmasy says Edward Snowden's leaks of classified intelligence raises thorny issues about government surveillance.