Moral Implications of Data-Mining, Key-word Searches, and Targeted Electronic Surveillance

In Bradley J. Strawser, Fritz Allhoff & Adam Henschke (eds.), Binary Bullets (2015)
  Copy   BIBTEX


This chapter addresses the morality of two types of national security electronic surveillance (SIGINT) programs: the analysis of communication “metadata” and dragnet searches for keywords in electronic communication. The chapter develops a standard for assessing coercive government action based on respect for the autonomy of inhabitants of liberal states and argues that both types of SIGINT can potentially meet this standard. That said, the collection of metadata creates opportunities for abuse of power, and so judgments about the trustworthiness and competence of the government engaging in the collection must be made in order to decide whether metadata collection is justified in a particular state. Further, the moral standard proposed has a reflexive element justifying adversary states’ intelligence collection against one another. Therefore, high-tech forms of SIGINT can only be justified at the cost of justifying cruder versions of signals intelligence collection practiced by a state’s less-advanced adversaries.



External links

  • This entry has no external links. Add one.
Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Legal Archetypes and Metadata Collection.Alan Rubel - 2017 - Wisconsin International Law Review 34 (4):823-853.
A Two Level Account of Executive Authority.Michael Skerker - 2019 - In Claire Oakes Finkelstein & Michael Skerker (eds.), Sovereignty and the New Executive Authority. Oxford University Press.
Being Watched: The Ethics of Targeted Surveillance.Kevin Macnish - 2013 - The Philosophers' Magazine 63:84-90.
The Relative Moral Risks of Untargeted and Targeted Surveillance.Katerina Hadjimatheou - 2014 - Ethical Theory and Moral Practice 17 (2):187-207.


Added to PP

199 (#103,166)

6 months
62 (#80,152)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Michael Skerker
United States Naval Academy

Citations of this work

No citations found.

Add more citations

References found in this work

Theoretical foundations of liberalism.Jeremy Waldron - 1987 - Philosophical Quarterly 37 (147):127-150.
Privacy, intimacy, and personhood.Jeffrey Reiman - 1976 - Philosophy and Public Affairs 6 (1):26-44.
Special ties and natural duties.Jeremy Waldron - 1993 - Philosophy and Public Affairs 22 (1):3-30.
Privacy and the Right to Privacy.H. J. McCloskey - 1980 - Philosophy 55 (211):17 - 38.
Reconstructing the Right to Privacy.Mark Alfino & G. Randolph Mayes - 2003 - Social Theory & Practice 29 (1):1-18.

View all 6 references / Add more references