Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter June 20, 2020

Mass Surveillance: A Private Affair?

  • Kevin Macnish ORCID logo EMAIL logo

Abstract

Mass surveillance is a more real threat now than at any time in history. Digital communications and automated systems allow for the collection and processing of private information at a scale never seen before. Many argue that mass surveillance entails a significant loss of privacy. Others dispute that there is a loss of privacy if the information is only encountered by automated systems.

This paper argues that automated mass surveillance does not involve a significant loss of privacy. Through providing a definition of informational privacy as a matter of actual access of private information by one who can understand the meaning of that information, it follows that automated systems which lack understanding cannot of themselves diminish privacy. This is not to say that mass surveillance is unproblematic, though: it is deeply problematic. It is just that privacy is not the most significant of these problems.

Acknowledgements

I am very grateful to the guest editor, two anonymous reviewers, and the organisers and attendees at the Ethics of Mass Surveillance workshop at the Karlsruhe Institute for Technology, notably Frej Klem Thomsen, Nora Ni Loideain, Scott Robbins, and Patrick Taylor Smith for comments which have considerably improved the quality of this paper.

References

AI, H.L.E.G. (2019). Ethics Guidelines for Trustworthy AI (European Commission).Search in Google Scholar

Allen, A.L. (1988). Uneasy Access: Privacy for Women in a Free Society (Totowa, N.J.: Rowman & Littlefield).Search in Google Scholar

Allen, A.L. (1998). ‘Coercing Privacy’, William and Mary Law Review 40: 723.Search in Google Scholar

Bok, S. (1998). Secrets: On the Ethics of Concealment and Revelation (New York: Vintage Books).Search in Google Scholar

Bradshaw, T. (2013). ‘Tim Berners-Lee Is “Deeply Concerned” about PRISM. Financial Times. http://blogs.ft.com/tech-blog/2013/06/tim-berners-lee-prism/, June 7.Search in Google Scholar

Cadwalladr, C. and Graham-Harrison, E. (2018). ‘Revealed: 50 Million Facebook Profiles Harvested for Cambridge Analytica in Major Data Breach’. The Guardian, https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election, March 17.Search in Google Scholar

Calo, M.R. (2011). ‘The Drone as Privacy Catalyst’, Stanford Law Review Online 64: 29.Search in Google Scholar

Court of Justice of the European 6 October 2015. Union Case C-362/14 Maximillian Schrems V Data Protection Commissioner. http://curia.europa.eu/juris/document/document.jsf;jsessionid=9ea7d0f130d5583d4c0351604929b070b203d91f5bf4.e34KaxiLc3eQc40LaxqMbN4Oc38Oe0?text=&docid=169195&pageIndex=0&doclang=EN&mode=req&dir=&occ=first&part=1&cid=386611Search in Google Scholar

Cuthbertson, A. (2019). ‘Amazon Admits Employees Listen to Audio from Echo Devices. The Independent, https://www.independent.co.uk/life-style/gadgets-and-tech/news/amazon-alexa-echo-listening-spy-security-a8865056.html, April 11.Search in Google Scholar

Day, M., Turner, G., and Drozdiak, N. (2019). ‘Amazon Workers are Listening to What You Tell Alexa’. Bloomberg, https://www.bloomberg.com/news/articles/2019-04-10/is-anyone-listening-to-you-on-alexa-a-global-team-reviews-audio, April 10.Search in Google Scholar

Donnersmarck, F.H.V. (2007). The Lives of Others (Lions Gate Home Entertainment).Search in Google Scholar

Doyle, T. (2009). ‘Privacy and Perfect Voyeurism’, Ethics and Information Technology 11: 181–189.10.1007/s10676-009-9195-9Search in Google Scholar

Funder, A. (2004). Stasiland: Stories from behind the Berlin Wall (London: Granta Books).Search in Google Scholar

Fuster, G.G. and Gutwirth, S. (2013). ‘Opening up Personal Data Protection: A Conceptual Controversy’, Computer Law & Security Review 29 (5): 531–539.10.1016/j.clsr.2013.07.008Search in Google Scholar

Gavison, R. (1984). ‘Privacy and the Limits of the Law’, F.D. Schoeman (ed.). Philosophical Dimensions of Privacy (Cambridge: Cambridge University Press), pp. 346–402.10.1017/CBO9780511625138.017Search in Google Scholar

Gellert, R. and Gutwirth, S. (2013). ‘The Legal Construction of Privacy and Data Protection’, Computer Law & Security Review 29 (5): 522–530.10.1016/j.clsr.2013.07.005Search in Google Scholar

Greenwald, G. (2014). No Place to Hide: Edward Snowden, the NSA and the Surveillance State (London: Penguin).Search in Google Scholar

Gross, H. (1967). ‘Concept of Privacy, The’, New York University Law Review 42: 34.Search in Google Scholar

Hallinan, D., Friedewald, M., and McCarthy, P. (2012). ‘Citizens’ Perceptions of Data Protection and Privacy in Europe’, Computer Law & Security Review 28 (3): 263–272.10.1016/j.clsr.2012.03.005Search in Google Scholar

Henschke, A. (2017). Ethics in an Age of Surveillance: Personal Information and Virtual Identities (Cambridge: Cambridge University Press).10.1017/9781316417249Search in Google Scholar

Hirsch, E.D. (1984). ‘Meaning and Significance Reinterpreted’, Critical Inquiry 11 (2): 202–225. JSTOR.10.1086/448285Search in Google Scholar

Inness, J.C. (1996). Privacy, Intimacy, and Isolation (Oxford: Oxford University Press).10.1093/0195104609.001.0001Search in Google Scholar

Kokott, J. and Sobotta, C. (2013). ‘The Distinction between Privacy and Data Protection in the Jurisprudence of the CJEU and the ECtHR’, International Data Privacy Law 3 (4): 222–228.10.1093/idpl/ipt017Search in Google Scholar

Macnish, K. (2013). ‘Being Watched’, The Philosophers’ Magazine 63: 84–90.10.5840/tpm201363131Search in Google Scholar

Macnish, K. (2014). ‘Just Surveillance? Towards a Normative Theory of Surveillance’, Surveillance and Society 12 (1): 142–153.10.24908/ss.v12i1.4515Search in Google Scholar

Macnish, K. (2015). ‘An Eye for an Eye: Proportionality and Surveillance’, Ethical Theory and Moral Practice 18 (3): 529–548. https://doi.org/10.1007/s10677-014-9537-5.Search in Google Scholar

Macnish, K. (2017). The Ethics of Surveillance: an Introduction (London: Routledge).10.4324/9781315162867Search in Google Scholar

Macnish, K. (2018). ‘Government Surveillance and Why Defining Privacy Matters in a Post-Snowden World’, Journal of Applied Philosophy 35 (2): 417–432. https://doi.org/10.1111/japp.12219.Search in Google Scholar

Moore, A. (2003). ‘Privacy: Its Meaning and Value’, American Philosophical Quarterly 40 (3): 215–227.Search in Google Scholar

Moore, A. (2008). ‘Defining Privacy’, Journal of Social Philosophy 39 (3): 411–428.10.1111/j.1467-9833.2008.00433.xSearch in Google Scholar

Müller-Enbergs, H. (2008). Inoffizielle Mitarbeiter des Ministeriums für Staatssicherheit: Statistiken (Berlin: Ch. Links Verlag).Search in Google Scholar

Nissenbaum, H. (2004). ‘Privacy as Contextual Integrity’, Washington Law Review 79: 1. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=534622.Search in Google Scholar

Nissenbaum, H.F. (2009). Privacy in Context: Technology, Policy, and the Integrity of Social Life (Stanford, California: Stanford University Press).10.1515/9780804772891Search in Google Scholar

O’Flaherty, K. (2019). ‘Amazon Staff Are Listening To Alexa Conversations—Here’s What To Do’. Forbes, https://www.forbes.com/sites/kateoflahertyuk/2019/04/12/amazon-staff-are-listening-to-alexa-conversations-heres-what-to-do/, April 12.Search in Google Scholar

Parent, W.A. (1983). ‘Privacy, Morality and the Law’, Philosophy and Public Affairs 12 (4): 269–288.10.4324/9781315246024-6Search in Google Scholar

Regulation (EU). (2016). 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA Relevance), Pub. L. No. 32016R0679, 119 OJ L. http://data.europa.eu/eli/reg/2016/679/oj/engSearch in Google Scholar

Scanlon, T.M. (1975). ‘Thomson on Privacy’, Philosophy and Public Affairs 4 (4): 315–322.Search in Google Scholar

Schneier, B. (2014). ‘NSA Robots are ‘Collecting’ Your Data, Too, and They’re Getting Away with It’. The Guardian, http://www.theguardian.com/commentisfree/2014/feb/27/nsa-robots-algorithm-surveillance-bruce-schneier, February 27.Search in Google Scholar

Searle, J.R. (1980). ‘Minds, Brains, and Programs’, Behavioral and Brain Sciences 3 (3): 417–424.10.1017/S0140525X00005756Search in Google Scholar

Tavani, H.T. and Moor, J.H. (2001). ‘Privacy Protection, Control of Information, and Privacy-Enhancing Technologies’, Computers and Society 31 (1): 6–11.10.1145/572277.572278Search in Google Scholar

Thomson, J.J. (1975). ‘The Right to Privacy’, Philosophy and Public Affairs 4 (4): 295–314.10.1017/CBO9780511625138.012Search in Google Scholar

Topaz, J. (2013). ‘Rand Paul: NSA Monitoring an “Extraordinary Invasion of Privacy”. POLITICO, http://www.politico.com/blogs/politico-live/2013/06/paul-monitoring-an-extraordinary-invasion-of-privacy-165742.html, September 6.Search in Google Scholar

Van Den Haag, E. (1971). ‘On Privacy’, Nomos 13: 147–153.10.4324/9781315127439-8Search in Google Scholar

Published Online: 2020-06-20
Published in Print: 2020-05-26

© 2020 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 19.3.2024 from https://www.degruyter.com/document/doi/10.1515/mopp-2019-0025/html
Scroll to top button