sailcraft comanche catamaran for sale

Alternatively,

  • Register with Facebook
  • Register with Google

Why Boatshed?

View all of your boats statistics in real time

Create a virtual "watch" on boats you're interested in

Refer a boat and earn up to 20% of the brokers commission

Language & Currency

Search our catalog, go direct, enter a boat reference, commanche 32, project catamaran, £ 0 sold / unavailable.

  • Boat REF#  ·  332061
  • Length  ·  9.80m
  • Year  ·  1980
  • Construction  ·  GRP
  • Underwater profile  ·  Multihull
  • Sleeping berths  ·  5
  • Engine  ·  1 x diesel 20hp, Perkins three cylinder, model unknown (1980)
  • Lying  ·  Newhaven

Boatshed Brighton

Boatshed Brighton

This boat is off the market but here are some boats that are still for sale.

  • Specification
  • Additional Information

Extra Details

Designer McAlpine Downey
Builder Sailcraft
Lying Newhaven
Fuel capacity 100.0 ltr (22.0 USG) Total - 1 Tanks
Water capacity 100.0 ltr (22.0 USG) Total - 1 Tanks
Engine 1 x diesel 20hp
Engine make and model Perkins three cylinder, model unknown (1980)
Engine Hours Not Recorded
Engine Cooled Direct
Steering wheel
Fuel consumption (approx) Not Recorded

Engine age and hp estimated

Length 9.80m
LWL 8.76m
Beam 4.22m
Draft Min 0.91m
Draft Max 0.97m
Displacement 4,536kg (10,001.7lbs)
Storage On marina

Sloop rigged Aluminium spars () with Stainless Steel standing rigging ()

Reefing mainsail - Inmast ()
Headsail - Furling ()

Electrical Systems

12 volt battery, 240 shore power voltage, 2 batteries charged by: engine, shore power Systems will require refurbishment or replacement

Construction

Construction GRP
Underwater profile Multihull
Finish Gelcoat finish

Tank numbers and sizes estimated Vessel age approximate

Accommodation

Total # of berths 5
No. of double berths 1
No. of single berths 3
Cabin(s) 3
Sink 2
Shower 1
Heads 1 heads (Manual)

All facilities listed here require renovation and or repair

2 burner propane Stove

Stove
Pressurised water system
Non-Smokers
Rode
Fenders

2 halyard winches 3 sheet winches Manual windlass

Nav Equipment

VHF
GPS
Stereo

All equipment will require renovation or replacement Hand bearing compass

Safety Equipment

Fume detector

1 bilge pumps (0 manual / 1 electric)

Broker's Comments

This boat comes with no documentation - all lost in a fire elsewhere. We will provide a Declaration of good Title upon purchase. There is no tax/VAT documentation.

Her current berth at Newhaven costs around £700 pcm and she must vacate by October.

This Comanche 32 presents a great opportunity to the DIY enthusiast or boat builder to secure ownership of a 32 foot Catamaran and through its refurbishment make the vessel your own.

Most electrical, electronic and mechanical systems on board will require test, repair, and or replacement.

She presents the impression of being strongly built with all of the standing rigging and deck components needed to get her sailing again, seemingly in place.

Furniture and internal fixings are of quality hardwood, however the hull has been submerged which has left its legacy on most surfaces, lockers and other voids with some associated damage.

The engine has not been started since the vessel's submergence, however it looks like it could be viable for repair.

If you would like to see more, or get more information. Please do get in touch with us. We would be pleased to arrange a viewing.

She sank in a storm, due to a mooring line parting and causing a hole at a rear quarter. She has been lifted and the repair made - she is now floating again.

She sank to the extent that there was a foot of headroom inside the cabin and was underwater for one tide only.

These boat details are subject to contract. Note: Offers on the asking price may be considered.

Owners FAQ's

How long have you owned the boat for, why are you selling her.

I don't have the time to get her back in to shape

Where have you sailed her?

I have not sailed her

Get Access to More

View unlimited photos of every boat

Walkthrough videos

VR 720° experiences

Get notified of new boats of your interest

Personalised boat recommendations

Save boats to 'My Boatshed'

Tim Kingston

Email
Telephone
Cell
WhatsApp WhatsApp

Cost Of Ownership

Share this boat.



Go to

Sail Craft Comanche 32' Catamaran, 1978 at [email protected]

Sail Craft Comanche 32' Catamaran, 1978 sailboat

  • The magazine

Current issue

  • All the issues
  • My magazines
  • Technical specifications
  • Multihull of the Year
  • Classified Ads
  • Destinations
  • Online store
  • All the magazines
  • Subscriptions
  • Accessories

Multihull of the year

Comanche 32

The bigger version of the very popular Iroquois, the Comanche 32 is just as robust but much more modern. She offers more comfort and a load capacity far superior to that of her little sister.

Practical info

  • Finance your Comanche 32
  • Articles about the Comanche 32
  • Available in issue # 178

Boat Test price 3.00 € Inc. tax

image description

Add several tests to your cart

and get an extra discount!

Its faceted coachroof and (very) raked bows obviously give the Comanche 32 a dated silhouette, but this model deserves attention, if only because of the rather affordable price. Despite her short length, the Comanche 32 is well suited to long distance cruising: she is pretty seaworthy for her size and is safe thanks to its four watertight compartments. In 1978, this model was positioned between the Iroquois 30 and the Cherokee 35 and offered a large load capacity – all within her 32 feet. Obviously, for long periods on board, this boat is ideally suited to the single-hander or a couple. As standard, the Comanche was delivered with fixed keels in order to gain living space inside the hulls. However, daggerboards could be ordered as an option (6 feet / 1.82m draft in the lowered position). The rudders are protected by strong skegs, allowing for stress-free beaching. This model was also available in a motor-sailer version with two 15 HP diesel engines, an interior helm station and a raised deck.

sailcraft comanche catamaran for sale

Wide coachroof and aft-set mast

In order to optimize the living space a...

To read in full, Buy the boat test

What readers think.

Post a comment

No comments to show.

MW #197 - Oct / Nov 2024

sailcraft comanche catamaran for sale

Download all the Boat Tests

Over 500 multihull tests

Place a classified ad Free of charge

on Multihulls World

Boat tests from the same range

image description

  • Seawind 1170

image description

  • Xquisite 30 SportCat

image description

  • HopYacht 30

image description

  • Bali Catsmart

Classified ads

image description

TRICAT 30 PERFORMANCE

image description

TRIMARAN FARRIER F9AX

image description

Privilege 515 (2010 - refit 2021) v. 3 cabins

image description

Power catamaran Fountaine Pajot Greenland 34 - fully self-sufficient

Vous avez ajouté " " à vos favoris., vous avez supprimé " " de vos favoris., in order to add this article to your favorites, please sign in..

sailcraft comanche catamaran for sale

fbPixel

  • Boats for Sale

New and used Sailcraft Comanche boats for sale

  • Sailcraft Comanche

Your search did not find any boats. Here are some suggestions...

  • Use the filter form above to widen your search
  • Ensure all words are spelled correctly
  • Try a new search
  • Browse power boats and sailing boats by manufacturer
  • Create a Boat Alert to have matching boats emailed to you when they are added

Search for a Sailcraft Comanche on the worlds largest network. We have Sailcraft Comanche brokers and sellers from around the world at great prices.

Sign up to our newsletter

By submitting this form, you agree to our Privacy & Cookie Policy

Change units of measure

This feature requires cookies to be enabled on your browser.

Show price in:

Show lengths, beam and draft in:

Show displacement or weight in:

Show capacity or volume in:

Show speed in:

Show distance in:

British Marine

    Beam:  13'10'    Draft:  3.5'

sailcraft comanche catamaran for sale

© 2001-2024 ./)   . . ./)   . .

Alternatively,

  • Register with Facebook
  • Register with Google

Why Boatshed?

View all of your boats statistics in real time

Create a virtual "watch" on boats you're interested in

Refer a boat and earn up to 20% of the brokers commission

Language & Currency

Search our catalog, go direct, enter a boat reference, sailcraft comanche 32, £ 0 sold / unavailable.

  • Boat REF#  ·  50371
  • Length  ·  9.75m
  • Year  ·  1980
  • Construction  ·  GRP
  • Underwater profile  ·  Multihull
  • Sleeping berths  ·  8
  • Engine  ·  2 x diesel 16hp, Yanmar QM16 ()
  • Lying  ·  North Wales

Boatshed North Wales

Boatshed North Wales

This boat is off the market but here are some boats that are still for sale.

  • Specification
  • Additional Information

Extra Details

Designer MacAlpine Downie
Builder Sailcraft
Lying North Wales
Fuel capacity 181.8 ltr (40.0 USG) Total - 1 Tanks
Last survey 01/01/2002
Engine 2 x diesel 16hp
Engine make and model Yanmar QM16 ()
Engine Hours Not Recorded
Engine Cooled Direct
Steering wheel
Prop(s) Maxprops - 3 blade folding props 2003
Fuel consumption (approx) 0.3 ltr (0.1 USG) /hour At Cruising Speed
Cruising speed (approx) 6 knots

Vetus wheel steering - inside and outside steering. Mikuni 3.9kw diesel hot air heater 2004 with dedicated battery.

Length 9.75m
LWL 8.76m
Beam 4.20m
Draft Min 0.97m
Displacement 4,581kg (10,101.1lbs)
Headroom 1.91m
Storage Dry storage

Sloop rigged Sailspar Aluminium spars (1980) with Stainless Steel standing rigging ()

Reefing mainsail Jeckells - Slab (2003)
Headsail - (2003)
Other sails Cruising chute (2002)
Stackaway lazy-jacks ()
Spinnaker gear

Winches: Lewmar 44 3 speed. Lewmar 2 speed 16. Lewmar single speed for roller reefing. Lewmar 2 speed 43 1 speed

Electrical Systems

12 volt battery, 3 batteries charged by: engine, solar panels

Construction

Construction GRP
Underwater profile Multihull
Finish Gelcoat finish

A comprehensive motor sailer specification to create a luxuriously appointed powerful all weather cruiser. Epoxy copper coated 2002. There are 3 fresh water tanks 2x25 ltrs and 1x50 ltrs.

Accommodation

Total # of berths 8
No. of double berths 3
No. of single berths 2
Cabin(s) 5
Heads 1 heads (Manual)

The very roomy accommodation has full standing room throughout. Seat cushions all new. Most mattreesses new and fire proofed. New Lavac toilet 2003. An amazing amount of storage.

2 burner propane Stove

Stove
Broiler
Oven
Sink
Carpet
Drapes
Cabin heating
Manual water system
Non-Smokers
Sail cover
Rode
Fenders
Boathook
Davits

2 anchors (CQR) 10.00m of chain 30.00m of rode Large drogue.

Nav Equipment

Compass
Speed
Log
Wind
Radar
VHF
GPS
Autopilot
Navigation lights
Depth sounder

JRC 1000 radar, Garmin 120 XL GPS, VDO log, Twin VDO tackometers, NASA windspeed/direction 2004.

Safety Equipment

Swim ladder
Emergency steering

2 bilge pumps (0 manual / 2 electric)

2 Powder fire extinguishers, 1 blanket 2003.

Broker's Comments

Oh this is a lovely boat - she is like a tardis inside and she has such lovely original features. You can see the workmanship when you look at the original chart storage cupboard - it is original and is beautifully fitted. The boat was laid up ashore between 1987 and 1998, which in part explains her fabulous condition. The shape of the hulls minimises any "slamming". This is a lovely example of a Commache 32 - come and have a look at her and see how beautifuuly she has been maintained.

These boat details are subject to contract. Note: Offers on the asking price may be considered.

Get Access to More

View unlimited photos of every boat

Walkthrough videos

VR 720° experiences

Get notified of new boats of your interest

Personalised boat recommendations

Save boats to 'My Boatshed'

Email

Cost Of Ownership

Share this boat.

Great choice! Your favorites are temporarily saved for this session. Sign in to save them permanently, access them on any device, and receive relevant alerts.

  • Sailboat Guide

Sailcraft Comanche 32

Sailcraft Comanche 32 is a 32 ′ 2 ″ / 9.8 m catamaran sailboat designed by J.R. (Rod) Macalpine-Downie and built by Sailcraft Ltd. starting in 1978.

Drawing of Sailcraft Comanche 32

Rig and Sails

Auxilary power, accomodations, calculations.

The theoretical maximum speed that a displacement hull can move efficiently through the water is determined by it's waterline length and displacement. It may be unable to reach this speed if the boat is underpowered or heavily loaded, though it may exceed this speed given enough power. Read more.

Classic hull speed formula:

Hull Speed = 1.34 x √LWL

Max Speed/Length ratio = 8.26 ÷ Displacement/Length ratio .311 Hull Speed = Max Speed/Length ratio x √LWL

Sail Area / Displacement Ratio

A measure of the power of the sails relative to the weight of the boat. The higher the number, the higher the performance, but the harder the boat will be to handle. This ratio is a "non-dimensional" value that facilitates comparisons between boats of different types and sizes. Read more.

SA/D = SA ÷ (D ÷ 64) 2/3

  • SA : Sail area in square feet, derived by adding the mainsail area to 100% of the foretriangle area (the lateral area above the deck between the mast and the forestay).
  • D : Displacement in pounds.

Ballast / Displacement Ratio

A measure of the stability of a boat's hull that suggests how well a monohull will stand up to its sails. The ballast displacement ratio indicates how much of the weight of a boat is placed for maximum stability against capsizing and is an indicator of stiffness and resistance to capsize.

Ballast / Displacement * 100

Displacement / Length Ratio

A measure of the weight of the boat relative to it's length at the waterline. The higher a boat’s D/L ratio, the more easily it will carry a load and the more comfortable its motion will be. The lower a boat's ratio is, the less power it takes to drive the boat to its nominal hull speed or beyond. Read more.

D/L = (D ÷ 2240) ÷ (0.01 x LWL)³

  • D: Displacement of the boat in pounds.
  • LWL: Waterline length in feet

Comfort Ratio

This ratio assess how quickly and abruptly a boat’s hull reacts to waves in a significant seaway, these being the elements of a boat’s motion most likely to cause seasickness. Read more.

Comfort ratio = D ÷ (.65 x (.7 LWL + .3 LOA) x Beam 1.33 )

  • D: Displacement of the boat in pounds
  • LOA: Length overall in feet
  • Beam: Width of boat at the widest point in feet

Capsize Screening Formula

This formula attempts to indicate whether a given boat might be too wide and light to readily right itself after being overturned in extreme conditions. Read more.

CSV = Beam ÷ ³√(D / 64)

In 1980 a new deck molding featured a raised coach roof (not shown here) that provided additional headroom in the main cabin.

Embed this page on your own website by copying and pasting this code.

  • About Sailboat Guide

©2024 Sea Time Tech, LLC

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

SAIL CRAFT COMANCHE 32  "Woelwater"   # 77160  Bwjr./Launched: 1978

sailcraft comanche catamaran for sale

Fotopresentatie / photopresentation

Multihull World Brokerage Network

sailcraft comanche catamaran for sale

Sailcraft's Comanche is het resultaat van alle ervaringen opgedaan door de werf en de ontwerper McAlpine Downie met de illustere voorgangers: Iroquois, Cherokee en Apache. Deze opvolger van de Iroquois MKII biedt aanzienlijk meer ruimte en comfort dan haar voorganger met behoud van de goede vaareigenschappen. "Woelwater" wordt nu na een grondige opknapbeurt  in uitstekende staat te koop aangeboden om gezondheidsredenen. Het jacht is compleet uitgerust met recente apparatuur, praktisch nieuwe zeilen en lopend want dat in 2013 is vervangen. Het jacht wordt vaarklaar in Zeeland overgedragen.

          

The Comanche by Sailcraft is the result of all experiences gained by the designer McAlpine Downie and the builders with her illustrious predecessors: Iroquois, Cherokee and Apache. This successor of the Iroquois MKII offers a lot more space and comfort while retaining its good performances. "Woelwater" is for sale in the South West Netherlands because  of the owner's health and age. He has spent many efforts in the past years to bring his Comanche in top- condition with for instance almost new sails, new running rigging in 2013 and a lot of recent equipment. She is ready for many more years of family cruising or holiday making.  

sailcraft comanche catamaran for sale

EVECOM MULTIHULLS - Post:  Fabrykswei 11 -  NL- 9216 WR Oudega (Sm.) -  Tel. (+31) (0)512 371999 -  KvK Noord.: 01060328

>> Beschrijving      >> Description                          >> Detail foto’s / Bilder / Photos                              >> Catamaran index

Mail: info@multihull.nl

                              (10- 4- 2016)

> Originele Sailcraft folder          > Specifiatie/specification of Sailcraft Comanche             > Yachting Monthly Test 1980

sailcraft comanche catamaran for sale

>>    Comanche Video Youtube

Residential

  • Long term rentals
  • Vacation rentals

Property Type

  • Apartment & Condo
  • House & Single-family home
  • Multi-family home
  • Parking space
  • Misc & Unspecified
  • Office & Commercial space
  • Warehouse & Industrial space
  • Business opportunity

Property Subtype

  • Office space
  • Commercial space
  • Industrial space
  • Bar, Hotel, Restaurant
  • Food & Beverage
  • Beauty & Health
  • Sport & Fitness
  • Nightclub, Bowling, Recreation
  • Newsagency & Stationery
  • Phone, Computer, Home Appliance
  • Clothing & Accessories
  • Home Furniture & Furnishings
  • Toys & Video Games
  • Florist & Garden Center
  • Agriculture & Horticulture
  • Auto, Moto, Boat, Transport
  • Animal & Pet Care
  • Building Mat. & Hardware Stores
  • Shoe Repair & Locksmith
  • Cleaning & Laundry
  • Building & Construction
  • Miscellaneous

Property Size

Buildable , monthly rent, advanced search criteria.

  • Guest house & Bed and Breakfast
  • Private mansion
  • Detached house

Email frequency

Other currencies.

  • AFN Afghan afghani
  • ALL Albanian lek
  • DZD Algerian Dinar
  • AOA Angolan kwanza
  • ARS Argentine Peso
  • AMD Armenian Dram
  • AWG Aruban florin
  • AUD Australian Dollar
  • AZN Azerbaijanian Manat
  • BSD Bahamian Dollar
  • BHD Bahraini Dinar
  • BDT Bangladeshi taka
  • BBD Barbadian dollar
  • BYR Belarussian Ruble
  • BWP Botswana pula
  • BRL Brazil Real
  • GBP British Pound
  • BGN Bulgarian Lev
  • CAD Canadian Dollar
  • XPF CFP franc
  • CLP Chilean Peso
  • CNY Chinese Yuan
  • COP Colombian Peso
  • HRK Croatian Kuna
  • CYP Cypriot Pound
  • CZK Czech Koruna
  • DKK Danish Krone
  • XCD East Caribbean Dollar
  • EGP Egyptian Pound
  • ETB Ethiopian Birr
  • GEL Georgian Lari
  • GHS Ghana cedi
  • HUF Hungarian Forint
  • INR Indian Rupee
  • IRR Iranian Rial
  • IQD Iraqi dinar
  • ILS Israeli new shekel
  • JPY Japanese yen
  • KZT Kazakhstani tenge
  • KWD Kuwaiti Dinar
  • KGS Kyrgyzstani som
  • LVL Latvian Lats
  • MKD Macedonian Denar
  • MYR Malaysian Ringgit
  • MXN Mexican Peso
  • MDL Moldovan Leu
  • MAD Moroccan Dirham
  • NZD New Zealand Dollar
  • NOK Norwegian Krone
  • PKR Pakistani Rupee
  • PHP Philippine Peso
  • PLN Polish Zloty
  • RON Romanian leu
  • RUB Russian Ruble
  • SAR Saudi riyal
  • RSD Serbian Dinar
  • SGD Singapore dollar
  • ZAR South Africa Rand
  • KRW South Korean won
  • SDG Sudanese Pound
  • SEK Swedish Krona
  • CHF Swiss Franc
  • THB Thai Baht
  • TRY Turkish Lira
  • TMT Turkmenistan manat
  • UAH Ukrainian hryvnia
  • AED United Arab Emirates dirham
  • USD US Dollar
  • VND Vietnamese dong

surveillance essay

The Dangers of Surveillance

  • Neil M. Richards
  • Addressing the Harm of Total Surveillance: A Reply to Professor Neil Richards  by  Danielle Keats Citron , David Gray
  • See full issue

From the Fourth Amendment to George Orwell’s Nineteen Eighty-Four , and from the Electronic Communications Privacy Act to films like Minority Report and The Lives of Others , our law and culture are full of warnings about state scrutiny of our lives. These warnings are commonplace, but they are rarely very specific. Other than the vague threat of an Orwellian dystopia, as a society we don’t really know why surveillance is bad and why we should be wary of it. To the extent that the answer has something to do with “privacy,” we lack an understanding of what “privacy” means in this context and why it matters. We’ve been able to live with this state of affairs largely because the threat of constant surveillance has been relegated to the realms of science fiction and failed totalitarian states.

But these warnings are no longer science fiction. The digital technologies that have revolutionized our daily lives have also created minutely detailed records of those lives. In an age of terror, our government has shown a keen willingness to acquire this data and use it for unknown purposes. We know that governments have been buying and borrowing private-sector databases, and we recently learned that the National Security Agency (NSA) has been building a massive data and supercomputing center in Utah, apparently with the goal of intercepting and storing much of the world’s Internet communications for decryption and analysis.

Although we have laws that protect us against government surveillance, secret government programs cannot be challenged until they are discovered. And even when they are, our law of surveillance provides only minimal protections. Courts frequently dismiss challenges to such programs for lack of standing, under the theory that mere surveillance creates no harms. The Supreme Court recently reversed the only major case to hold to the contrary, in Clapper v. Amnesty International USA , finding that the respondents’ claim that their communications were likely being monitored was “too speculative.”

But the important point is that our society lacks an understanding of why (and when) government surveillance is harmful. Existing attempts to identify the dangers of surveillance are often unconvincing, and they generally fail to speak in terms that are likely to influence the law. In this Article, I try to explain the harms of government surveillance. Drawing on law, history, literature, and the work of scholars in the emerging interdisciplinary field of “surveillance studies,” I offer an account of what those harms are and why they matter. I will move beyond the vagueness of current theories of surveillance to articulate a more coherent understanding and a more workable approach.

At the level of theory, I will explain why and when surveillance is particularly dangerous and when it is not. First, surveillance is harmful because it can chill the exercise of our civil liberties. With respect to civil liberties, consider surveillance of people when they are thinking, reading, and communicating with others in order to make up their minds about political and social issues. Such intellectual surveillance is especially dangerous because it can cause people not to experiment with new, controversial, or deviant ideas. To protect our intellectual freedom to think without state over-sight or interference, we need what I have elsewhere called “intellectual privacy.” A second special harm that surveillance poses is its effect on the power dynamic between the watcher and the watched. This disparity creates the risk of a variety of harms, such as discrimination, coercion, and the threat of selective enforcement, where critics of the government can be prosecuted or blackmailed for wrongdoing unrelated to the purpose of the surveillance.

At a practical level, I propose a set of four principles that should guide the future development of surveillance law, allowing for a more appropriate balance between the costs and benefits of government surveillance. First, we must recognize that surveillance transcends the public/private divide . Public and private surveillance are simply related parts of the same problem, rather than wholly discrete. Even if we are ultimately more concerned with government surveillance, any solution must grapple with the complex relationships between government and corporate watchers. Second, we must recognize that secret surveillance is illegitimate and prohibit the creation of any domestic-surveillance programs whose existence is secret. Third, we should recognize that total surveillance is illegitimate and reject the idea that it is acceptable for the government to record all Internet activity without authorization. Government surveillance of the Internet is a power with the potential for massive abuse. Like its precursor of telephone wiretapping, it must be subjected to meaningful judicial process before it is authorized. We should carefully scrutinize any surveillance that threatens our intellectual privacy. Fourth, we must recognize that surveillance is harmful . Surveillance menaces intellectual privacy and increases the risk of blackmail, coercion, and discrimination; accordingly, we must recognize surveillance as a harm in constitutional standing doctrine. Explaining the harms of surveillance in a doctrinally sensitive way is essential if we want to avoid sacrificing our vital civil liberties.

I develop this argument in four steps. In Part I, I show the scope of the problem of modern “surveillance societies,” in which individuals are increasingly monitored by an overlapping and entangled assemblage of government and corporate watchers. I then develop an account of why this kind of watching is problematic. Part II shows how surveillance menaces our intellectual privacy and threatens the development of individual beliefs in ways that are inconsistent with the basic commitments of democratic societies. Part III explores how surveillance distorts the power relationships between the watcher and the watched, enhancing the watcher’s ability to blackmail, coerce, and discriminate against the people under its scrutiny. Part IV explores the four principles that I argue should guide the development of surveillance law, to protect us from the substantial harms of surveillance.

May 20, 2013

More from this Issue

The eu-u.s. privacy collision: a turn to institutions and procedures.

  • Paul M. Schwartz

Toward a Positive Theory of Privacy Law

  • Lior Jacob Strahilevitz

Does the Past Matter? On the Origins of Human Rights

An analysis of competing histories of the origins of international human rights law

  • Philip Alston

Surveillance - Essay Samples And Topic Ideas For Free

Surveillance entails the monitoring of behavior, activities, or information to influence, manage or direct individuals or groups. Essays on surveillance could explore the historical evolution of surveillance systems, the technologies enabling modern surveillance, or the legal and ethical implications of surveillance in various contexts. Discussions might also cover the impact of surveillance on privacy, civil liberties, and societal dynamics, the effectiveness of surveillance in enhancing security or solving crimes, or the portrayal of surveillance in literature and popular culture. Analyzing the balance between surveillance and privacy rights, exploring the role of surveillance in different political systems, or examining the implications of emerging surveillance technologies like facial recognition or data analytics could provide a comprehensive look at this omnipresent aspect of modern life. A vast selection of complimentary essay illustrations pertaining to Surveillance you can find at Papersowl. You can use our samples for inspiration to write your own essay, research paper, or just to explore a new topic for yourself.

1984 Surveillance Essay

George Orwell's 1984 writes of a dystopian society that has become severally oppressed by the methods ‘The Party' uses to control its society. The people do not think for themselves, and there is no independence from the government’s rules. One form that the party has control over everyone is with mind manipulation and constant surveillance, watching people actions and reactions to their messages that ‘The Party’ shares via the ‘telescreen’. A ‘telescreen’ is a two-way connection screen that people watch […]

Surveillance Cameras in Public Safety

The ‘safe city’ project in Mauritius has been implemented due to high crime rates in various cases, such as rape and theft. The recent rise in crime has resulted in increasing fear and insecurity among the people. This is an essay on surveillance cameras in public places. The project of installing at least 4000 surveillance cameras cost more than 19 billion rupees. The 4000 cameras will be installed in two thousand different places for the security of the population. These […]

Wake up its 1984 again

War is peace; freedom is slavery; ignorance is strength In the book 1984 by George Orwell, Big brother is an omnipotent, omniscient, and omnipresent dictator of Oceania. Big Brother symbolizes the face of the Party and its public manifestation, which controlled people's thoughts, actions, knowledge and way of living. By using secret police, surveillance, torture, propaganda, misinformation, and corrupted languages to control all aspects of one's life. Even though the book was meant to be fictional, there is some elements […]

We will write an essay sample crafted to your needs.

Surveillance Cameras as Modern Day Examples of Panopticism

Panopticism was a theory created by Bentham in the seventeenth century. His idea was to use panopticism for the layout of a prison. He suggested that the prison should be a circular building with a smaller circle in the middle. The prisoner's cells would be on the outside of the larger circle, and a guard would be placed in the smaller circle in the center. This way, the guard could always see the prisoners, but the prisoners could not tell […]

 The Watchful Eyes of our Government 

The US is looked as a country that continues to prosper every year compared to other countries. Although we make look like the most prosperous country there is more to us than meets the eye. Compared to other countries we have a lot more freedoms than them but those freedoms come with heavy surveillance and restrictions. Our government is constantly watching our every move sometimes for our protection and sometimes for the fun of it. Some cases of surveillance is […]

How Hate Crimes have Increased Domestic Terrorist Incidents

As the role of Department of Homeland Security has broaden, reshaped and to not to mention the current events with the resignation of the head of this department, this department has had it shares of trouble. Even with the decrease of terrorist crimes committed by non-US citizens on US soil, there have been a sharp increase of domestic terrorist attacks in the form of hate crimes, and unfortunately those are being committed by United States Citizens. Although hate crimes being […]

Security Versus Freedom?

Welcome to the Digital Age. In today’s connected world, we are living much of our live online. As a result, companies everywhere are creating large storehouses of data on all of us. The most obvious information being collected is social media data. Everything we post publicly and some cases privately, is being stored and analysed. But it is not just social media, there is now a digital record of everything we buy, everything we watch, where we go and what […]

Big Data and Cyber Crimes

In a universe full of high-technology, software is now available to predict future crimes, generate virtual "most wanted lists, and collect personal identifiable information. This new innovation of technology is called Big Data. Big data is an evolving term that describes any voluminous amount of structured, semi -structured, and unstructured data that has the potential to be mined for information (Bigelow). Big data generates value from large data cells that cannot be analyzed with traditional computing techniques. The quantity of […]

Selfies could be a Tool for Social Good

The term 'selfie' may pop into your mind the image of a teenage girl pouting at an iPhone, seemingly oblivious to what's happening in her surroundings, or a daredevil athlete hanging off a cliff or skyscraper moments from his/her death – symptoms of an apparent self-obsessed culture and, many claim, the decline of our society – but it's been researched that selfies have a much deeper cultural implication that often complicate such stereotypes. Alicia Eler, in her book 'The Selfie […]

How Drones Improves Law Enforcement Performance

The implementation of new drone technology are being used to assess the crime situations in several ways. Not only it helps the law enforcement solve the cases faster, it collects all the data from aerial that is useful for preventing the crimes and assisting with the public service. As I mentioned previously that the drones are incredible at getting all the data that the law enforcement needs to assess and solve the cases.  According to Center for the Study of […]

Privacy in the Digital Age: the Impact of Katz V. United States on Fourth Amendment Interpretations

In our rapidly evolving digital age, the notion of privacy has transformed into a complex puzzle, with its elements dispersed throughout the vast landscape of technology and law. Central to this complexity is Katz v. United States, a pivotal Supreme Court case that revolutionized our understanding of privacy rights under the Fourth Amendment. Let's revisit 1967, a time when phone booths were common on busy streets. It was in one such booth that Charles Katz, suspected of illegal gambling, became […]

Additional Example Essays

  • The Importance of Professional Bearing in the Military
  • Rosa Parks Vs. Harriet Tubman
  • A Dream To Become A Lawyer
  • A Home Is More Than Just A House
  • Two main strengths and weaknesses of international law
  • Short Essay on Feminism
  • Event that sparked Personal Growth
  • Men and Women Should Have Equal Rights
  • Psychiatric Nurse Practitioner
  • Reasons Why I Want to Study Abroad
  • Comparison Of Introverts VS Extroverts
  • Research Paper #1 – The Trail of Tears

1. Tell Us Your Requirements

2. Pick your perfect writer

3. Get Your Paper and Pay

Hi! I'm Amy, your personal assistant!

Don't know where to start? Give me your paper requirements and I connect you to an academic expert.

short deadlines

100% Plagiarism-Free

Certified writers

surveillance essay

A Banksy graffiti work in London. Photo by Cate Gillon/Getty Images

Life in the fishbowl

In the future, most people will live in a total surveillance state – and some of us might even like it.

by Stuart Armstrong   + BIO

Suppose you’re walking home one night, alone, and you decide to take a shortcut through a dark alley. You make it halfway through, when suddenly you hear some drunks stumbling behind you. Some of them are shouting curses. They look large and powerful, and there are several of them. Nonetheless, you feel safe, because you know someone is watching.

You know this because you live in the future where surveillance is universal, ubiquitous and unavoidable. Governments and large corporations have spread cameras, microphones and other tracking devices all across the globe, and they also have the capacity to store and process oceans of surveillance data in real time. Big Brother not only watches your sex life, he analyses it. It sounds nightmarish — but it might be inevitable. So far, attempts to control surveillance have generally failed. We could be headed straight for the panopticon, and if recent news developments are any indication, it might not take that long to get there.

Maybe we should start preparing. And not just by wringing our hands or mounting attempts to defeat surveillance. For if there’s a chance that the panopticon is inevitable, we ought to do some hard thinking about its positive aspects. Cataloguing the downsides of mass surveillance is important, essential even. But we have a whole literature devoted to that. Instead, let’s explore its potential benefits.

The first, and most obvious, advantage of mass surveillance is a drastic reduction in crime. Indeed, this is the advantage most often put forward by surveillance proponents today. The evidence as to whether current surveillance achieves this is ambiguous; cameras, for instance, seem to have an effect on property crime, but not on incidences of violence. But today’s world is very different from a panopticon full of automatically analysed surveillance devices that leave few zones of darkness.

If calibrated properly, total surveillance might eradicate certain types of crime almost entirely. People respond well to inevitable consequences, especially those that follow swiftly on the heels of their conduct. Few would commit easily monitored crimes such as assault or breaking and entering, if it meant being handcuffed within minutes. This kind of ultra-efficient police capability would require not only sensors capable of recording crimes, but also advanced computer vision and recognition algorithms capable of detecting crimes quickly. There has been some recent progress on such algorithms, with further improvements expected. In theory, they would be able to alert the police in real time, while the crime was still ongoing. Prompt police responses would create near-perfect deterrence, and violent crime would be reduced to a few remaining incidents of overwhelming passion or extreme irrationality.

If surveillance recordings were stored for later analysis, other types of crimes could be eradicated as well, because perpetrators would fear later discovery and punishment. We could expect crimes such as low-level corruption to vanish, because bribes would become perilous (to demand or receive) for those who are constantly under watch. We would likely see a similar reduction in police brutality. There might be an initial spike in detected cases of police brutality under a total surveillance regime, as incidents that would previously have gone unnoticed came to light, but then, after a short while, the numbers would tumble. Ubiquitous video recording, mobile and otherwise, has already begun to expose such incidents.

On a smaller scale, mass surveillance would combat all kinds of abuses that currently go unreported because the abuser has power over the abused. You see this dynamic in a variety of scenarios, from the dramatic (child abuse) to the more mundane (line managers insisting on illegal, unpaid overtime). Even if the victim is too scared to report the crime, the simple fact that the recordings existed would go a long way towards equalising existing power differentials. There would be the constant risk of some auditor or analyst stumbling on the recording, and once the abused was out of the abuser’s control (grown up, in another job) they could retaliate and complain, proof in hand. The possibility of deferred vengeance would make abuse much less likely to occur in the first place.

With reduced crime, we could also expect a significant reduction in police work and, by extension, police numbers. Beyond a rapid-reaction force tasked with responding to rare crimes of passion, there would be no need to keep a large police force on hand. And there would also be no need for them to enjoy the special rights they do today. Police officers can, on mere suspicion, detain you, search your person, interrogate you, and sometimes enter your home. They can also arrest you on suspicion of vague ‘crimes’ such as ‘loitering with intent’. Our present police force is given these powers because it needs to be able to investigate. Police officers can’t be expected to know who committed what crime, and when, so they need extra powers to be able to figure this out, and still more special powers to protect themselves while they do so. But in a total-surveillance world, there would be no need for humans to have such extensive powers of investigation. For most crimes, guilt or innocence would be obvious and easy to establish from the recordings. The police’s role could be reduced to arresting specific individuals, who have violated specific laws.

If all goes well, there might be fewer laws for the police to enforce. Most countries currently have an excess of laws, criminalising all sorts of behaviour. This is only tolerated because of selective enforcement; the laws are enforced very rarely, or only against marginalised groups. But if everyone was suddenly subject to enforcement, there would have to be a mass legal repeal. When spliffs on private yachts are punished as severely as spliffs in the ghetto, you can expect the marijuana legalisation movement to gather steam. When it becomes glaringly obvious that most people simply can’t follow all the rules they’re supposed to, these rules will have to be reformed. In the end, there is a chance that mass surveillance could result in more personal freedom, not less.

The military is another arm of state power that is ripe for a surveillance-inspired shrinking. If cross-border surveillance becomes ubiquitous and effective, we could see a reduction in the $1.7 trillion that the world spends on the military each year. Previous attempts to reduce armaments have ultimately been stymied by a lack of reliable verification. Countries can never trust that their enemies aren’t cheating, and that encourages them to cheat themselves. Arms races are also made worse by a psychological phenomenon, whereby each side interprets the actions of the other as a dangerous provocation, while interpreting its own as purely defensive or reactive. With cross-border mass surveillance, countries could check that others are abiding by the rules, and that they weren’t covertly preparing for an attack. If intelligence agencies were to use all the new data to become more sophisticated observers, countries might develop a better understanding of each other. Not in the hand-holding, peace-and-love sense, but in knowing what is a genuine threat and what is bluster or posturing. Freed from fear of surprising new weapons, and surprise attacks, countries could safely shrink their militaries. And with reduced armies, we should be able to expect reduced warfare, continuing the historical trend in conflict reduction since the end of the Second World War.

O f course, these considerations pale when compared with the potential for mass surveillance to help prevent global catastrophic risks, and other huge disasters. Pandemics, to name just one example, are among the deadliest dangers facing the human race. The Black Death killed a third of Europe’s population in the 14th century and, in the early 20th century, the Spanish Flu killed off between 50 and 100 million people. In addition, smallpox buried more people than the two world wars combined. There is no reason to think that great pandemics are a thing of the past, and in fact there are reasons to think that another plague could be due soon. There is also the possibility that a pandemic could arise from synthetic biology, the human manipulation of microbes to perform specific tasks. Experts are divided as to the risks involved in this new technology, but they could be tremendous, especially if someone were to release, accidentally or malevolently, infectious agents deliberately engineered for high transmissibility and deadliness.

You can imagine how many lives would have been saved had AIDS been sniffed out by epidemiologists more swiftly

Mass surveillance could help greatly here, by catching lethal pandemics in their earliest stages, or beforehand, if we were to see one being created artificially. It could also expose lax safety standards or dangerous practices in legitimate organisations. Surveillance could allow for quicker quarantines, and more effective treatment of pandemics. Medicines and doctors could be rushed to exactly the right places, and micro-quarantines could be instituted. More dramatic measures, such as airport closures, are hard to implement on a large scale, but these quick-response tactics could be implemented narrowly and selectively. Most importantly, those infected could be rapidly informed of their condition, allowing them to seek prompt treatment.

With proper procedures and perfect surveillance, we could avoid pandemics altogether. Infections would be quickly isolated and eliminated, and eradication campaigns would be shockingly efficient. Tracking the movements and actions of those who fell ill would make it much easier to research the causes and pathology of diseases. You can imagine how many lives would have been saved had AIDS been sniffed out by epidemiologists more swiftly.

Likewise, mass surveillance could prevent the terrorist use of nukes, dirty bombs, or other futuristic weapons. Instead of blanket bans in dangerous research areas, we could allow research to proceed and use surveillance to catch bad actors and bad practices. We might even see an increase in academic freedom.

Surveillance could also be useful in smaller, more conventional disasters. Knowing where everyone in a city was at the moment an earthquake struck would make rescue services much more effective, and the more cameras around when hurricanes hit, the better. Over time, all of this footage would increase our understanding of disasters, and help us to mitigate their effects.

Indeed, there are whole new bodies of research that could emerge from the data provided by mass surveillance. Instead of formulating theories and laboriously recruiting a biased and sometimes unwilling group for testing, social scientists, economists and epidemiologists could use surveillance data to test their ideas. And they could do it from home, immediately, and have access to the world’s entire population. Many theories could be rapidly confirmed or discarded, with great benefit to society. The panopticon would be a research nirvana.

Lying and hypocrisy would become practically impossible, and one could no longer project a false image of oneself

Mass surveillance could also make our lives more convenient, by eliminating the need for passwords. The surveillance system itself could be used for identification, provided the algorithms were sufficiently effective. Instead of Mr John Smith typing in ‘passw0rd!!!’ to access his computer or ‘2345’ to access his money, the system could simply track where he was at all times, and grant him access to any computers and money he had the right to. Long security lines at airports could also be eliminated. If surveillance can detect prohibited items, then searches are a waste of time. Effective crime detection and deterrence would mean that people would have little reason to lock their cars or their doors.

Doing business in a mass surveillance society would be smoother, too. Outdoor festivals and concerts would no longer need high fences, security patrols, and intimidating warnings. They could simply replace them with clear signs along the boundary of the event, as anyone attending would be identified and billed directly. People could dash into a shop, grab what they needed, and run out, without having to wait in line or check out. The camera system would have already billed them. Drivers who crashed into parked cars would no longer need to leave a note. They’d be tracked anyway, and insurance companies would have already settled the matter by the time they returned home. Everyday human interactions would be changed in far-reaching ways. Lying and hypocrisy would become practically impossible, and one could no longer project a false image of oneself. In the realm of personal identity, there would be less place for imagination or reinvention, and more place for honesty.

Today’s intricate copyright laws could be simplified, and there would be no need for the infantilising mess of reduced functionality that is ‘Digital Rights Management’. Surveillance would render DRM completely unnecessary, meaning that anyone who purchased a song could play it anytime, on any machine, while copying it and reusing it to their heart’s content. There would be no point in restricting these uses, because the behaviour that copyrights holders object to — passing the music on to others — would be detected and tagged separately. Every time you bought a song, a book, or even a movie, you’d do so knowing that it would be with you wherever you went for the rest of your life.

The virtues and vices of surveillance are the imagined virtues and vices of small villages, which tend to be safe and neighbourly, but prejudiced and judgemental. With the whole world as the village, we can hope that the multiplicity of cultures and lifestyles would reduce a global surveillance culture’s built-in potential for prejudice and judgment. With people more trusting, and less fearful, of each other, we could become more willing to help out, more willing to take part in common projects, more pro-social and more considerate. Yes, these potential benefits aren’t the whole story on mass surveillance, and I would never argue that they outweigh the potential downsides. But if we’re headed into a future panopticon, we’d better brush up on the possible upsides. Because governments might not bestow these benefits willingly — we will have to make sure to demand them.

A busy beach scene with children on donkeys, people in the sea, a man reading on a sun lounger, and a dog urinating on a sun shade.

Virtues and vices

Make it awkward!

Rather than being a cringey personal failing, awkwardness is a collective rupture – and a chance to rewrite the social script

Alexandra Plakias

Black and white photo of four people in sunglasses standing on a terrace overlooking the sea with a hilly coastline in the background.

Metaphysics

Desperate remedies

In order to make headway on knotty metaphysical problems, philosophers should look to the methods used by scientists

Photo of a light beige woven fabric with black and red borders on the sides, frayed edges at the bottom, and a black background.

Political philosophy

Citizens and spinning wheels

For Indians to be truly free, Gandhi argued they must take up traditional crafts. Was it a quixotic hope or inspired solution?

Benjamin Studebaker

A silhouetted figure walking with a dog through a dimly lit tunnel, contrasting with bright concrete walls in the foreground.

Psychiatry and psychotherapy

For those who hear voices, the ‘broken brain’ explanation is harmful. Psychiatry must embrace new meaning-making frameworks

Justin Garson

Black-and-white photo of a man in a suit and hat grabbing another man by his collar in front of a bar with bottles.

C L R James and America

The brilliant Trinidadian thinker is remembered as an admirer of the US but he also warned of its dark political future

Harvey Neptune

A suburban street with mountains in the background, featuring a girl on a bike, parked cars, and old furniture on the sidewalk in front of a house.

Progress and modernity

The great wealth wave

The tide has turned – evidence shows ordinary citizens in the Western world are now richer and more equal than ever before

Daniel Waldenström

The Ethics of Surveillance

Introduction to surveillance.

Surveillance is, simply put, the observation and/or monitoring of a person. Coming from the French word for "looking upon," the term encompasses not only visual observation but also the scrutiny of all behavior, speech, and actions. Prominent examples of surveillance include surveillance cameras, wiretaps, GPS tracking, and internet surveillance.

One-way observation is in some ways an expression of control. Just as having a stranger stare at you for an extended period of time can be uncomfortable and hostile, it is no different from being under constant surveillance, except that surveillance is often done surreptitiously and at the behest of some authority.

Todays technological capabilities take surveillance to new levels; no longer are spyglasses and "dropping" from the eaves of a roof necessary to observe individuals - the government can and does utilize methods to observe all the behavior and actions of people without the need for a spy to be physically present. Clearly, these advances in technology have a profound impact with regards to the ethics of placing individual under surveillance&emdash;in our modern society, where so many of our actions are observable, recorded, searchable, and traceable, close surveillance is much more intrusive than it has been in the past.

Surveillance and Physical Searches

Particularly interesting about government surveillance is that in the United States surveillance is not held to the same standards of accountability&emdash;as the Constitution protects American citizens from unreasonable searches and seizures, physical searches of individuals may not be conducted without a warrant issued by a judge. However, after the passage of FISA and subsequent laws, citizens have not been given the same protection with regards to electronic surveillance. As there have been massive changes in technology and lifestyle since the 1970s, electronic surveillance could be considered much more invasive than a physical search, yet as has been made clear in the legal section of this website, it is in fact much easier for government agents to perform surveillance. Why there is such disparity between these standards to us a matter of serious concern.

"If you haven't done anything wrong, you have nothing to fear."

This is a typical argument used by governments and other groups to justify their spying activities. Upon cursory inspection, it seems to make sense&emdash;as most people are law-abiding citizens, most ostensibly will not be targeted for surveillance and it will not impact their lives, while making their lives more comfortable and safer through the elimination of criminals. Thus, the government's use of closed-circuit television cameras in public spaces, warrantless wiretapping, and library record checks have the potential to save lives from criminals and terrorists with only minimal invasion of its citizens' privacy.

First, as a mental exercise, we ask that the reader consider that these arguments could easily be applied to asking all citizens to carry location tracking devices&emdash;it would make tracing criminal acts much easier, and that it could easily be argued that people refusing to carry these devices only do so because they have something to hide. It is a matter of course that most people in our society would object to this solution, not because they wish to commit any wrongdoings, but because it is invasive and prone to abuse. Now consider that, given current technology, the government already has the ability to track a known target's movements to a reasonable degree, and has easy access to information such as one's purchasing habits, online activities, phone conversations, and mail. Though implementing mandatory location tracking devices for the whole population is certainly more invasive than the above, we argue that current practices are analogous, extreme, and equally unacceptable.

Next, this argument fails to take into consideration a number of important issues when collecting personally identifiable data or recordings&emdash;first, that such practices create an archive of information that is vulnerable to abuse by trusted insiders; one example emerged in September of 2007 when Benjamin Robinson, a special agent of the Department of Commerce, was indicted for using a government database called the Treasury Enforcement Communications System (TECS) for tracking the travel patterns of an ex-girlfriend and her family. Records show that he used the system illegally at least 163 times before he was caught (Mark 2007). With the expansion of surveillance, such abuses could become more numerous and more egregious as the amount of personal data collected increases.

In addition, allowing surreptitious surveillance of one form, even limited in scope and for a particular contingency, encourages government to expand such surveillance programs in the future. It is our view that the danger of a "slippery slope" scenario cannot be dismissed as paranoia - as a prominent example, the collection of biometric has expanded immensely in the past several years. Many schools in the UK collect fingerprints of children as young as six without parental consent (Doward 2006), and fingerprinting in American schools has been widespread since the mid-eighties (NYT National Desk 1983). Now, the discussion has shifted towards DNA collection&emdash;British police are now pushing for the DNA collection of children who "exhibit behavior indicating they may become criminals in later life" (Townsend and Asthana 2008), while former New York City mayor Rudy Giuliani has encouraged the collection of DNA data of newborns (Lambert 1998).

When data is collected, whether such data remains used for its stated purpose after its collection has been called into question, even by government officials: the European Data Protection Supervisor has acknowledged that even when two databases of information are created for specific, distinct purposes, in a phenomenon known as 'function creep' they could be combined with one another to form a third with a purpose for which the first two were not built (eGov Monitor Weekly 2006). This non-uniqueness and immutability of information provides great potential for abuse by individuals and institutions.

When is surveillance appropriate?

A. the means.

Harm: does the technique cause unwarranted physical or psychological harm?

Boundary: does the technique cross a personal boundary without permission (whether involving coercion or deception or a body, relational or spatial border)?

Trust: does the technique violate assumptions that are made about how personal information will be treated such as no secret recordings?

Personal relationships: is the tactic applied in a personal or impersonal setting?

Invalidity: does the technique produce invalid results?

B. The Data Collection Context

Awareness: are individuals aware that personal information is being collected, who seeks it and why?

Consent: do individuals consent to the data collection?

Golden rule: would those responsbile for the surveillance (both the decision to apply it and its actual application) agree to be its subjects under the conditions in which they apply it to others?

Minimization: does a principle of minimization apply?

Public decision-making: was the decision to use a tactic arrived at through some public discussion and decision making process?

Human review: is there human review of machine generated results?

Right of inspection: are people aware of the findings and how they were created?

Right to challenge and express a grievance: are there procedures for challenging the results, or for entering alternative data or interpretations into the record?

Redress and sanctions: if the individual has been treated unfairly and procedures violated, are there appropriate means of redress? Are there means for discovering violations and penalties to encourage responsible surveillant behavior?

Adequate data stewardship and protection: can the security of the data be adequately protected?

Equality-inequality regarding availability and application: a) is the means widely available or restricted to only the most wealthy, powerful or technologically sophisticated? b) within a setting is the tactic broadly applied to all people or only to those less powerful or unable to resist c) if there are means of resisting the provision of personal information are these equally available, or restricted to the most privileged?

The symbolic meaning of a method: what does the use of a method communicate more generally?

The creation of unwanted precedents: is it likely to create precedents that will lead to its application in undesirable ways?

Negative effects on surveillors and third parties: are there negative effects on those beyond the subject?

Beneficiary: does application of the tactic serve broad community goals, the goals of the object of surveillance or the personal goals of the data collector?

Proportionality: is there an appropriate balance between the importance of the goal and the cost of the means?

Alternative means: are other less costly means available?

Consequences of inaction: where the means are very costly, what are the consequences of taking no surveillance action?

Protections: are adequate steps taken to minimize costs and risk?

Appropriate vs. inappropriate goals: are the goals of the data collection legitimate?

The goodness of fit between the means and the goal: is there a clear link between the information collected and the goal sought?

Information used for original vs. other unrelated purposes: is the personal information used for the reasons offered for its collection and for which consent may have been given and does the data stay with the original collector, or does it migrate elsewhere?

Failure to share secondary gains from the information: is the personal data collected used for profit without permission from, or benefit to, the person who provided it?

Unfair disadvantage: is the information used in such a way as to cause unwarranted harm or disadvantage to its subject?

In general, we feel that surveillance can be ethical, but that there have to exist reasonable, publicly accessible records and accountability for those approving and performing the surveillance in question.

  • Entertainment
  • Environment
  • Information Science and Technology
  • Social Issues

Home Essay Samples Law

Essay Samples on Surveillance

Surveillance in george orwell's "1984": the perils of totalitarian control.

George Orwell's novel "1984" serves as a chilling depiction of a dystopian society where surveillance is used as a tool of control and manipulation. The novel explores the devastating consequences of a government that employs surveillance to monitor and regulate every aspect of its citizens'...

  • Surveillance

Analysis Of Foucault's Panopticism Theory: Society Under Surveillance

At the point when I began to peruse content 'Panopticism' by Foucault, he starts by describing how the moves were made against the plague in the seventeenth century; apportioning of the room and deterring houses, steady investigation and registration. A plague adhering a town to...

  • Michel Foucault
  • Panopticism

Surveillance Schools: Understanding from Michel Foucault Perspectives

Abstract Surveillance schools make use of modern technologies to keep an eye on children and their actions. These modern technologies include Closed Circuit Television (CCTV), fingerprint identification and RFID (radio-frequency identification). The main focus of this paper is to understand the impact of the modern...

Benefits Of Koala Detection With Aerial Surveillance

The use of a drone also known as Remotely Piloted Aircraft Systems (RPAS) is being used more frequently to collect image data of wildlife populations. Ariel surveys are manually interpreted however this can often be bias, tedious and time-consuming which causes low probabilities of detection...

  • Natural Environment

The Neccessity of Government Surveillance in Everyday Life

What if we lived in a world where we are being monitored almost every second of the day? Every day we willingly participate in many different types of surveillance and tracking – the EZ-tag on your car, data collection on Facebook and the GPS locator...

  • Government Surveillance
  • Social Security

Stressed out with your paper?

Consider using writing assistance:

  • 100% unique papers
  • 3 hrs deadline option

Government Surveillance in a Digital Era

In an ever growing technological era, people encounter different types of technology in a myriad of ways. From cell phones, to emails, to social media, people use the internet in many ways leaving a trace of their history wherever they go. Doing this on a...

  • Digital Era

Limitation of Freedom of Speech by Government Surveillance

Government Surveillance is the act of monitoring incredulous behaviors and activities for the sole use of influencing, managing, directing, and protecting people. In today’s society, the government claims to use public surveillance as a way of protecting American citizens. They do this by monitoring all...

  • Free Speech

Monitor Responsibly: How Employers Are Using Workplace Surveillance Devices

This article talks about how organizations are incorporating technology to their workforce in order to track them. The devices range from injected microchips to wearable devices, even sensors at a desk that senses body heat so that time away from a desk is measured. In...

Electronic Surveillance In Law Authorization

Presently, we've achieved a moral predicament here. As a matter of first importance, electronic surveillance is useful in law authorization. Unquestionably no uncertainty by any means. Actually, law authorization specialists asks for parcels and loads of data from a wide range of associations, from wiretaps,...

  • Electronics

Best topics on Surveillance

1. Surveillance in George Orwell’s “1984”: The Perils of Totalitarian Control

2. Analysis Of Foucault’s Panopticism Theory: Society Under Surveillance

3. Surveillance Schools: Understanding from Michel Foucault Perspectives

4. Benefits Of Koala Detection With Aerial Surveillance

5. The Neccessity of Government Surveillance in Everyday Life

6. Government Surveillance in a Digital Era

7. Limitation of Freedom of Speech by Government Surveillance

8. Monitor Responsibly: How Employers Are Using Workplace Surveillance Devices

9. Electronic Surveillance In Law Authorization

  • First Amendment
  • Capital Punishment
  • Criminal Justice
  • Legal cases

Need writing help?

You can always rely on us no matter what type of paper you need

*No hidden charges

100% Unique Essays

Absolutely Confidential

Money Back Guarantee

By clicking “Send Essay”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails

You can also get a UNIQUE essay on this or any other topic

Thank you! We’ll contact you as soon as possible.

Schneier on Security

Home Essays

Your Life, Under Constant Surveillance

  • Bruce Schneier
  • October 16, 2013

Historically, surveillance was difficult and expensive.

Over the decades, as technology advanced, surveillance became easier and easier. Today, we find ourselves in a world of ubiquitous surveillance , where everything is collected, saved, searched, correlated and analyzed.

But while technology allowed for an increase in both corporate and government surveillance, the private and public sectors took very different paths to get there. The former always collected information about everyone, but over time, collected more and more of it, while the latter always collected maximal information, but over time, collected it on more and more people.

Corporate surveillance has been on a path from minimal to maximal information. Corporations always collected information on everyone they could, but in the past they didn’t collect very much of it and only held it as long as necessary. When surveillance information was expensive to collect and store, companies made do with as little as possible.

Telephone companies collected long-distance calling information because they needed it for billing purposes. Credit cards collected only the information about their customers’ transactions that they needed for billing. Stores hardly ever collected information about their customers, maybe some personal preferences, or name-and-address for advertising purposes. Even Google, back in the beginning, collected far less information about its users than it does today.

As technology improved, corporations were able to collect more. As the cost of data storage became cheaper, they were able to save more data and for a longer time. And as big data analysis tools became more powerful, it became profitable to save more. Today, almost everything is being saved by someone—probably forever.

Examples are everywhere. Internet companies like Google, Facebook, Amazon and Apple collect everything we do online at their sites. Third-party cookies allow those companies, and others, to collect data on us wherever we are on the Internet. Store affinity cards allow merchants to track our purchases. CCTV and aerial surveillance combined with automatic face recognition allow companies to track our movements; so does your cell phone. The Internet will facilitate even more surveillance, by more corporations for more purposes.

On the government side, surveillance has been on a path from individually targeted to broadly collected. When surveillance was manual and expensive, it could only be justified in extreme cases. The warrant process limited police surveillance, and resource restraints and the risk of discovery limited national intelligence surveillance. Specific individuals were targeted for surveillance, and maximal information was collected on them alone.

As technology improved, the government was able to implement ever-broadening surveillance. The National Security Agency could surveil groups—the Soviet government, the Chinese diplomatic corps, etc.—not just individuals. Eventually, they could spy on entire communications trunks.

Now, instead of watching one person, the NSA can monitor “ three hops ” away from that person—an ever widening network of people not directly connected to the person under surveillance. Using sophisticated tools, the NSA can surveil broad swaths of the Internet and phone network.

Governments have always used their authority to piggyback on corporate surveillance. Why should they go through the trouble of developing their own surveillance programs when they could just ask corporations for the data? For example we just learned that the NSA collects e-mail, IM and social networking contact lists for millions of Internet users worldwide .

But as corporations started collecting more information on populations, governments started demanding that data. Through National Security Letters, the FBI can surveil huge groups of people without obtaining a warrant. Through secret agreements, the NSA can monitor the entire Internet and telephone networks.

This is a huge part of the public-private surveillance partnership .

The result of all this is we’re now living in a world where both corporations and governments have us all under pretty much constant surveillance.

Data is a byproduct of the information society. Every interaction we have with a computer creates a transaction record, and we interact with computers hundreds of times a day. Even if we don’t use a computer—buying something in person with cash, say—the merchant uses a computer, and the data flows into the same system. Everything we do leaves a data shadow, and that shadow is constantly under surveillance.

Data is also a byproduct of information society socialization, whether it be e-mail, instant messages or conversations on Facebook. Conversations that used to be ephemeral are now recorded, and we are all leaving digital footprints wherever we go.

Moore’s law has made computing cheaper. All of us have made computing ubiquitous. And because computing produces data, and that data equals surveillance, we have created a world of ubiquitous surveillance.

Now we need to figure out what to do about it. This is more than reining in the NSA or fining a corporation for the occasional data abuse. We need to decide whether our data is a shared societal resource, a part of us that is inherently ours by right, or a private good to be bought and sold.

Writing in The Guardian, Chris Huhn said that “information is power, and the necessary corollary is that privacy is freedom.” How this interplay between power and freedom play out in the information age is still to be determined.

Categories: National Security Policy , Privacy and Surveillance

Sidebar photo of Bruce Schneier by Joe MacInnis.

Powered by WordPress Hosted by Pressable

The Moral Side of Government Surveillance Essay

  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Taylor’s argument on surveillance

Importance of surveillance.

Privacy refers to a situation in which an individual is free from any sort of disturbance from people. It also describes a state of an individual practicing his or her personality freely. Privacy breach involves the act of a person accessing information of another without permission and using it wrongly. Privacy plays a crucial role in advancing one’s autonomy (Edelbach and Winston, 234). It enables individuals to advance in their daily activities, which do not require public attention. A breach of privacy siphons an individual’s ability to live independently. Privacy is also crucial in terms of social relations. The restrictions imposed by the right of privacy enable a diverse group of people to live harmoniously, enabling individuals to maintain good social relations among themselves.

Many authors such as Stanley and Steinhardt argue in opposition to the advanced use of surveillance. According to Stanley and Steinhardt, the rising use of surveillance denies individuals their right to confidentiality (Edelbach and Winston, 236). However, some authors such as James Taylor support the advancement made in the field of surveillance. According to Taylor, individuals opt to pay great consideration to matters of security. Currently, the level of insecurity is very high in the world; cases pertaining to terrorism are ever reported in many countries. Thus, according to Taylor it is crucial for nations to advance their level of surveillance.

According to Taylor, the government’s act of watching over its citizens and accessing their information cannot be regarded as a breach of privacy. Taylor argues that privacy can only be breached when the collected information is used for the wrong purpose. Moreover, the collection of information by authorized organizations plays a significant role in the observance and maintenance of the state’s security. The collected information by authorized organizations aid in crucial social issues such as preventing crimes and minimizing the efforts put in extracting information from reluctant witnesses. Taylor states that, despite surveillance going against citizens’ freedom, the acceptable application of surveillance increases citizens’ chances of being safe and promotes their self-independence and privacy.

To my opinion, Taylor is right. Uses of surveillance increases citizen’s safety and promotes moral accepted standards by enhancing reduction of crimes, encouraging observance of law, discouraging corruption, and promoting social codes of conducts.

Surveillance contributes immensely towards the reduction of crimes in states. The use of satellites plays a significant role in reducing terrorism, they enable security managements to detect illegal acts of terrorists in advance, thus promoting calmness, serenity and order. The high-security observance also assists in lowering cases such as highway hijacking of drivers and pedestrians; surveillance enables close monitoring of events that take place on the roads. Extensive use of surveillance cameras in large retail shops such as supermarkets helps in eradicating cases of shoplifting, the cameras provide a wide field of view of the activities that take place within the retail shops. In other cases, companies and organizations attach electronic tags to their products and properties. Electronic tags play a significant role in eradicating theft cases. The positioning of surveillance cameras outside shops and companies also aid in capturing burglars, hence reducing theft cases in a state.

Surveillance has boosted the traffic sector; it monitors daily activities that take place on roads. Road users tend to break rules and regulations that govern traffic sectors. They engage in activities such as overspeeding, use of un-roadworthy vehicles, overloading and carrying excess passengers, evading checkpoints, and neglecting traffic lights. Victims of such crimes try to go scot-free when confronted by security officers by using bribes. However, extensive use of surveillance has significantly minimized such ill behaviors on the roads.

Surveillance has contributed significantly towards combating corruption. For a long time, corruption has been practiced in public offices and other institutions. Many people also used corruption as a shortcut in getting favors and positions they did not deserve. The use of surveillance, however, has contributed positively towards fighting and eradicating this vice. Currently, the use of CCTV cameras in organizations, companies and offices has aided in reducing corruption. The use of surveillance enables right and deserving individuals to be placed in appropriate positions proving the surveillance morality.

Surveillance has also played a vital role in promoting moral uprightness by ensuring high societal observing of acceptable codes of conduct. Prostitution and the use of drugs are some of the issues that promoted social decay. Nevertheless, surveillance denies individuals chances of engaging in such activities. Thus, the use of surveillance encourages observance of high moral conduct.

To a great extent, Taylor’s views concerning the morality of surveillance prove true. This is evident in success observed in law enforcement, crime reduction, combating corruption, and in individuals upholding high social codes of conduct. Despite its moral privilege, surveillance proves inappropriate in some areas. This includes the right to privacy of individuals; it bars individuals from enjoying their personal space. Surveillance has also led to the reduction of creativity, the majority of innovative individuals like working privately. Additionally, an increase in surveillance has also contributed to an increase in crimes in some areas; some of the criminals have invented new ways of committing crimes.

Edelbach, Ralph and Winston, Morton. Society, Ethics, and Technology . New York: Cengage Learning. Print.

  • United Kingdom as a Surveillance Society
  • "Who Governs the Globe?" by Avant, Finnemore, & Sell
  • Ethical Issues in Non-Observance of Working Hours
  • Workplace Surveillance
  • Effects of Surveillance Technology on Privacy
  • Peace, Stability and Security
  • Foreseeing Madam Park’s National Defense Policy: What Will Become of Korea
  • Intelligence Agency: Covert Action and Intelligence Organization
  • Malawi's Sustainable Development
  • Values Gap Between the USA and Other Rich Democracies
  • Chicago (A-D)
  • Chicago (N-B)

IvyPanda. (2022, February 4). The Moral Side of Government Surveillance. https://ivypanda.com/essays/the-moral-side-of-government-surveillance/

"The Moral Side of Government Surveillance." IvyPanda , 4 Feb. 2022, ivypanda.com/essays/the-moral-side-of-government-surveillance/.

IvyPanda . (2022) 'The Moral Side of Government Surveillance'. 4 February.

IvyPanda . 2022. "The Moral Side of Government Surveillance." February 4, 2022. https://ivypanda.com/essays/the-moral-side-of-government-surveillance/.

1. IvyPanda . "The Moral Side of Government Surveillance." February 4, 2022. https://ivypanda.com/essays/the-moral-side-of-government-surveillance/.

Bibliography

IvyPanda . "The Moral Side of Government Surveillance." February 4, 2022. https://ivypanda.com/essays/the-moral-side-of-government-surveillance/.

  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

IELTS Advantage

IELTS Advantage

IELTS Preparation Courses

Surveillance Essay

In many cities the use of video cameras in public places is being increased in order to reduce crime, but some people believe these measures restrict our individual freedom. Do the benefits of increased security outweigh the drawbacks?

In many metropolitan areas CCTV is on the increase with the express purpose of reducing crime, however, some would argue that these encroach upon our liberty. This essay will argue that the advantages do not outweigh the disadvantages because surveillance cameras do not deter serious criminals and the vast majority of people they record are innocent members of society who have a right to privacy.

Most advocates of increased surveillance argue that cameras deter crime because criminals are less likely to commit crimes if they know they are being watched. This might be the case for petty crime, but it does not prevent more serious crimes. Drug dealers and murderers will simply use areas that are not monitored or do something to obscure their identity. The recent attacks on Paris by terrorists demonstrate that all areas are vulnerable no matter how many cameras are pointing at them.

This argument is further weakened by the fact that the overwhelming majority of people filmed in public places are ordinary, law abiding citizens and this is an infringement of their rights. A person should not have their every move digitally recorded, when all they want to do is travel to their job or go shopping. A person is left with a choice of either surrendering their privacy or not going to public spaces, which is an erosion of the right to privacy. For example, it is estimated that a person living in any major city in the UK will be recorded up to 80% of the time they are in public.

In conclusion, the drawbacks of video surveillance far outweigh the benefits because major criminals, including terrorists, are not put off by it and it results in citizens having to relinquish too much of their private lives to the state.

surveillance essay

About Christopher Pell

My name is Christopher Pell and I'm the Managing Director of IELTS Advantage.

I started IELTS Advantage as a simple blog to help 16 students in my class. Several years later, I am very humbled that my VIP Course has been able to help thousands of people around the world to score a Band 7+ in their IELTS tests.

If you need my help with your IELTS preparation, you can send me an email using the contact us page.

Home — Essay Samples — Literature — 1984 — Surveillance and Totalitarian Control in George Orwell’s “1984”

test_template

Surveillance and Totalitarian Control in George Orwell's "1984"

  • Categories: 1984 Totalitarianism

About this sample

close

Words: 713 |

Published: Jun 6, 2024

Words: 713 | Pages: 2 | 4 min read

Table of contents

Mechanisms of control in 1984, the implications for society, contemporary relevance.

Image of Dr. Charlotte Jacobson

Cite this Essay

To export a reference to this article please select a referencing style below:

Let us write you an essay from scratch

  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours

Get high-quality help

author

Dr. Heisenberg

Verified writer

  • Expert in: Literature Government & Politics

writer

+ 120 experts online

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy . We’ll occasionally send you promo and account related email

No need to pay just yet!

Related Essays

2 pages / 1002 words

3 pages / 1358 words

2 pages / 707 words

3.5 pages / 1534 words

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

121 writers online

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

Related Essays on 1984

In George Orwell's classic dystopian novel, "1984," the themes of totalitarianism, censorship, and surveillance are explored through a chilling portrayal of a future society controlled by a tyrannical government. As readers [...]

George Orwell’s novel 1984 has become a classic in the realm of dystopian literature, and its portrayal of a totalitarian society ruled by the enigmatic figure of Big Brother has left a lasting impact on readers. The concept of [...]

The novel's themes of surveillance, propaganda, and the manipulation of truth have striking parallels to certain aspects of modern society. In this essay, we will examine the similarities between "1984" and society today, [...]

In the labyrinth of George Orwell's dystopian masterpiece, "1984," the protagonist Winston Smith's rebellion stands as a pivotal exploration of human resilience and the spirit of defiance in the face of totalitarianism. [...]

People have always tried to escape from their reality, and some people find this escape through love. Love might be the escape from reality in 984 for different characters, who are thenselves represented in various ways. We [...]

In George Orwell’s dystopian novel 1984, the omnipresent telescreens serve as the ultimate symbol of the Party’s surveillance and control over its citizens. These devices are a constant reminder that Big Brother is always [...]

Related Topics

By clicking “Send”, you agree to our Terms of service and Privacy statement . We will occasionally send you account related emails.

Where do you want us to send this sample?

By clicking “Continue”, you agree to our terms of service and privacy policy.

Be careful. This essay is not unique

This essay was donated by a student and is likely to have been used and submitted before

Download this Sample

Free samples may contain mistakes and not unique parts

Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

Please check your inbox.

We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

Get Your Personalized Essay in 3 Hours or Less!

We use cookies to personalyze your web-site experience. By continuing we’ll assume you board with our cookie policy .

  • Instructions Followed To The Letter
  • Deadlines Met At Every Stage
  • Unique And Plagiarism Free

surveillance essay

Advertisement

Advertisement

Government Surveillance, Privacy, and Legitimacy

  • Research Article
  • Open access
  • Published: 05 February 2022
  • Volume 35 , article number  8 , ( 2022 )

Cite this article

You have full access to this open access article

surveillance essay

  • Peter Königs   ORCID: orcid.org/0000-0002-7267-4675 1  

47k Accesses

18 Citations

28 Altmetric

Explore all metrics

The recent decades have seen established liberal democracies expand their surveillance capacities on a massive scale. This article explores what is problematic about government surveillance by democracies. It proceeds by distinguishing three potential sources of concern: (1) the concern that governments diminish citizens’ privacy by collecting their data, (2) the concern that they diminish their privacy by accessing their data, and (3) the concern that the collected data may be used for objectionable purposes. Discussing the meaning and value of privacy, the article argues that only the latter two constitute compelling independent concerns. It then focuses particularly on the third concern, exploring the risk of government surveillance being used to enforce illegitimate laws. It discusses three legitimacy-related reasons why we should be worried about the expansion of surveillance capacities in established democracies: (1) Even established democracies might decay. There is a risk that surveillance capacities that are used for democratically legitimated purposes today will be used for poorly legitimated purposes in the future. (2) Surveillance may be used to enforce laws that lack legitimacy due to the disproportionate punishment attached to their violation. (3) The democratic procedures in established democracies fail to conform to the requirements formulated by mainstream theories of democratic legitimacy. Surveillance is thus used to enforce laws whose legitimacy is in doubt.

Similar content being viewed by others

surveillance essay

Governing Liberty Through Accountability: Surveillance Reporting as Technologies of Governmentality

surveillance essay

The State of Surveillance – An Overall Account of Surveillance?

surveillance essay

The Surveillance Society: A Criminological Perspective

Explore related subjects.

  • Medical Ethics

Avoid common mistakes on your manuscript.

1 Introduction

For a long time, large-scale government surveillance was a hallmark of authoritarianism. Authoritarian states known for their extensive surveillance systems include the GDR, the People’s Republic of China, the Soviet Union, and North Korea. Footnote 1 In the past few decades, however, established liberal democracies have been increasingly ready to monitor their citizens on a massive scale. One notorious surveillance program run by an alliance of democracies was uncovered by Edward Snowden. The current rise of large-scale government surveillance is widely viewed with great concern, if not outright horror. Critics fear the rise of Orwellian surveillance states and celebrate Edward Snowden as a paragon of civil disobedience. Footnote 2 Much of the criticism of government surveillance has revolved around privacy, its meaning and value, and how it is impacted by surveillance. Government surveillance and the erosion of privacy it is associated with are being discussed as a cause of distrust and feelings of vulnerability, as a potential source of discrimination and unjust domination, and as a threat to democracy and the integrity of the public sphere, to name but a few concerns. By many, existing government surveillance programs are also deemed disproportionate. Footnote 3

At the same time, there remains some ambiguity about the acceptability of surveillance in democracies. For one thing, recent technological advances have made large-scale government surveillance not only feasible and cheap but also, in one sense, less intrusive. Modern government surveillance relies increasingly on technology rather than human spies and informers. Surveillance practices include, for instance, the monitoring of public spaces with CCTV cameras, the automatic interception and retention of Internet and telecommunication traffic, and the use of artificial intelligence to make sense of the huge amounts of data collected. As a result, modern surveillance is characterized by the rarity of actual human access to the large quantities of data collected. While the quantity of data collected is staggering, only a small proportion of them are ever accessed by a human person. Human access to collected surveillance data can be expected to further decrease as artificial intelligence becomes more sophisticated. This has led to a debate about whether modern surveillance even reduces the privacy of those subject to surveillance, with some arguing that modern surveillance, involving little human access to the collected data, tends to leave people’s privacy intact. Footnote 4

For another thing, surveillance operations by democracies seem much more acceptable than the kind of surveillance conducted by authoritarian regimes. Democracies are using surveillance mostly for seemingly innocuous purposes, such as combating terrorism and serious crime or, most recently, containing the spread of a deadly virus. They are less inclined to use surveillance to crush legitimate political opposition or to persecute members of stigmatized groups, notable exceptions notwithstanding. Footnote 5 There is a significant moral difference, then, between, say, the NSA and the East German Stasi . Footnote 6

In sum, when democratic governments conduct large-scale surveillance operations in the pursuit of seemingly innocuous goals, all while limiting human access to the collected data, the case against surveillance is at least not obvious. In fact, some philosophers have expressed wholehearted support for large-scale government surveillance. Noting that it is generally permissible for law enforcement agencies to secure information about past events, one advocate of government surveillance has suggested that “the State should place all of its citizens under surveillance at all times and in all places.” Footnote 7 Others have invoked catastrophic risks, such as those posed by biological and nuclear weapons of mass destruction, to justify extensive government surveillance. Footnote 8 To be sure, such wholesale endorsements of government surveillance are the exception. Footnote 9 But they convey an idea of the ethical ambivalence of government surveillance.

My goal in this paper is to contribute a new perspective on what is ethically at stake when democratic governments monitor their citizens and to achieve a better understanding of what is pro tanto objectionable about it. Footnote 10 I will proceed by distinguishing three independent concerns that a critic of government surveillance may have. The first concern is that governments diminish citizens’ privacy by collecting large amounts of data. This concern focuses on the loss of privacy brought about by the collection of data as such, that is, irrespective of whether the data will be accessed or used for objectionable purposes. The second concern is that the collected data may be accessed after all, again causing a loss of privacy, though of a different kind. The data may be accessed by government employees or exposed to the public through a hack or a leak. The third concern is that the collected data may be used for objectionable purposes (other than accessing the data).

Two of the above introduced concerns revolve around privacy. Zooming in on these two concerns, this paper seeks, first, to shed light on the significance of privacy in the context of surveillance. Engaging with the debate about the meaning of privacy, I will suggest that, whereas access to data is objectionable as such, the privacy loss brought about by the mere collection of data does not constitute an independent reason to object to government surveillance. Second, moving on to the third concern, the paper seeks to achieve a better understanding of problems associated with what surveillance can be used for. I will suggest that one serious and underappreciated problem with surveillance is related to the problem of political legitimacy. Surveillance can be used to enforce laws that lack legitimacy.

My discussions of privacy and legitimacy, though motivated by concerns about government surveillance, are, I hope, of more general relevance and thus of interest to scholars who have no particular interest in surveillance.

2 Surveillance and Privacy

I want to begin by examining the first concern about privacy, that is, the notion that there is something objectionable about government surveillance because the collection of massive amounts of data reduces people’s privacy. By undermining people’s privacy, government surveillance may be deemed objectionable irrespective of whether the data are accessed (second concern) or used for objectionable purposes (third concern). It is, in this sense, an independent concern about government surveillance.

There are four reasons why this concern is worth looking at. To begin with, it is a very natural thought that surveillance is objectionable simply on the grounds that the collection of people’s data reduces their privacy. Privacy is a widely valued good, and the mere collection of data is thought by many (though not all) to undermine privacy. It is therefore natural to object to the collection of data simply on the grounds that this violates people’s privacy — irrespective of whether the other two concerns apply.

Moreover, the extent to which increasingly automated surveillance practices really involve privacy losses is, as already noted, intensely discussed among privacy and surveillance scholars. An underlying assumption here seems to be that if the collection of citizens’ data reduces their privacy, surveillance is ipso facto problematic, irrespective of whether the data will be accessed or used for malicious purposes. Why else think that it matters how we define privacy and whether it is undermined by surveillance? Surveillance may be thought to be problematic simply in virtue of the fact that it undermines people’s privacy.

Yet another reason why the validity of the first concern matters is that some might question the force of the other two concerns. Human access to the collected data is very limited, and established liberal democracies may seem to use surveillance mainly for justifiable purposes. In light of this, some might question why we should object to large-scale government surveillance at all. If there is something objectionable about collecting large amounts of data as such (because of the privacy breaches associated with it), the critic of government surveillance has a ready answer to this question. Footnote 11

Finally, discussing this first concern will contribute towards achieving the overarching goal of this paper, namely a better understanding of how surveillance and privacy concerns relate to each other and how the potential harm done by government surveillance should be characterized. I believe that the first concern is ill-founded in that it fails to constitute a compelling independent reason to object to government surveillance, over and above the other two concerns. Appreciating why this is so allows a better understanding of the problem of government surveillance and of what is at stake in debates about the meaning and value of privacy.

Notice first, then, that the idea that there is something objectionable about the collection of data as such, though natural, can be challenged by means of a thought experiment. Imagine an unrealistically benevolent, well-organized, and stable democratic state that engages in large-scale surveillance operations. The state is characterized by the following two features:

Thanks to excellent institutional safeguards and security measures, there is no risk that data is illicitly accessed by government employees, nor that data might be exposed to the public.

It uses the collected surveillance data to enforce laws in a legitimate and just manner. It never uses the surveillance capacities for objectionable purposes. It also boasts a set of unrealistically robust checks and balances, which completely remove any risk of the surveillance capacities being used for less benign purposes in the future.

Admittedly, such perfectly benign surveillance is difficult to imagine. But when we do imagine it, it is difficult to see what might be objectionable about it. Once we stipulate that there is no risk of illicit access to the collected data and that the surveillance capacities will only ever be used for good purposes, that is, once we stipulate that the other two concerns do not apply, there just seems little cause for concern. On the contrary, it is arguable that we should welcome such perfectly benign surveillance. It provides enhanced security without any obvious downsides. To object to such perfectly benign surveillance would, it seems to me, be quite irrational. To be sure, we may have a residual feeling of unease at the thought even of such benevolent large-scale government surveillance (I, for one, certainly feel uneasy at the thought of it). But this is probably because no surveillance system in the real world resembles this perfectly benign surveillance system. Our emotional responses have been trained on a data set of surveillance practices that invariably do not meet the above two criteria. Upon rational reflection, we should welcome surveillance of this sort.

This provides at least initial grounds for thinking that the first concern must be ill-founded. The collection of large amounts of data as such — divorced from the other two concerns — seems unobjectionable. But one might still find the above line of reasoning unconvincing as it entirely brackets the key issue of privacy. Indeed, I have made two seemingly conflicting claims. On the one hand, I have just suggested that there does not seem to be anything problematic about the collection of data as such, divorced from the other two concerns. On the other hand, I have suggested that the collection of large amounts of data may diminish citizens’ privacy. This raises the question how the collection of large amounts of data could possibly diminish people’s privacy without being in any way problematic as such. If it diminishes their privacy, does this not show precisely that there is something objectionable about surveillance irrespective of whether the data are exposed or used for objectionable purposes?

To resolve this tension, and more generally to understand how surveillance and privacy relate, it is useful to briefly consider the debate about the meaning of privacy. One view in the literature is that privacy should be spelled out in terms of control. A person’s privacy remains intact as long as this person retains control over her personal information. Footnote 12 Beate Rössler, for instance, proposes the following definition: “Something counts as private if one can oneself control the access to this ‘something.’” Footnote 13 On this view, privacy is reduced as soon as one loses the relevant sort of control. A competing view holds that privacy is a matter of access, not of control. A person’s privacy is intact to the extent that no one actually accesses her personal information. Mere loss of control over one’s personal information is not enough for there to be a reduction of privacy. Kevin Macnish has made the case for the access account by appeal to the so-called threatened loss cases. Threatened loss cases are characterized by a loss of control over one’s personal information in the absence of actual access to it. He invites us to consider the case of a person who left her diary on a table in a coffee shop. When she returns to the coffee shop to pick it up, it is handed back to her by a stranger in whose possession it was for the last 30 minutes. During this interval, the diary owner had lost control over her personal information in the diary. But if the stranger did not open the diary during this time, it seems plausible that the diary owner’s privacy has not been comprised. Such threatened loss cases suggest that what matters is actual access rather than loss of control. Footnote 14

An assumption underlying this debate is that there is a lot at stake in the dispute about the meaning of privacy. Recall that modern government surveillance, relying increasingly on technology rather than people, involves relatively little actual human access to the collected data. Depending, then, on how we define privacy, modern government surveillance involves either privacy erosions on a massive scale (control account) or hardly any privacy losses at all (access account), given that it involves loss of control over one’s personal data but little actual human access to them. Footnote 15 This is why how we define privacy has been taken to matter a great deal.

Notwithstanding the many valuable insights this debate has generated, I do not believe that how we define privacy matters as much as is commonly thought. Little of substance depends on it. Whether we should think of government surveillance operations as reducing privacy in the strict sense of the term or not is, at the end of day, not that relevant. Indeed, Macnish himself, who in the title of a paper asserts that “defining privacy matters,” is (rightly, I think) adamant that government surveillance is problematic even if, technically, citizens’ privacy is not diminished. Footnote 16 This begs the question why exactly it should matter which definition of privacy we opt for. I believe it does not matter all that much. What matters are the actual wrongs and dangers of surveillance, and their exploration does not require resolving the dispute between access theorists and control theorists. Footnote 17

I therefore wish to sidestep this debate by engaging in an act of conceptual stipulation. I suggest that we distinguish two concepts of privacy: “access privacy” and “control privacy.” Access privacy is the kind of privacy that requires nonaccess to one’s personal information, whereas control privacy is reduced as soon as one loses control over one’s personal information, whether accessed or not. Modern government surveillance, to the extent that it does not involve human access to the collected data, reduces control privacy while leaving access privacy mostly intact. Footnote 18 The suggested distinction is a technical stipulation. By making this stipulation, I am not suggesting that our everyday concept of privacy is fundamentally vague or ambiguous. Perhaps it is, but I am not committed to this view. Footnote 19 Nor do I mean it to discourage further inquiry into how to best analyze everyday privacy talk, which strikes me as an interesting undertaking in its own right. But introducing these two technical concepts by means of stipulation allows us to sidestep an intricate and unresolved debate, and it yields two technical concepts that are useful for analytical purposes. To be sure, the proposed terminological stipulation tells us little of substance about the significance of privacy in the context of government surveillance. But it helps us organize our thoughts and get more quickly to the heart of what is normatively at stake. Footnote 20

With these clarifications in mind, we can return to the question at hand: How might the collection of data involve a reduction in privacy without being in any way problematic as such, that is, irrespective of whether the data may actually be accessed or used for objectionable purposes? My answer is not that we should simply reject the assumption that the mere collection of data even involves privacy losses, as adherents of the access account of privacy would do. I think both accounts of privacy are legitimate, and it is not obviously wrong to say that the mere collection of data reduces people’s (control) privacy. Instead, the answer I want to propose is that the collecting of data may well be said to diminish people’s (control) privacy, but that the value of this kind of privacy depends on the other two concerns, that is, on the risk of collected data being accessed or of them being used for objectionable purposes. In a, again unrealistic, world in which there is no risk of data access or misuse by the government, the value of control privacy would be unclear. Mere loss of control over one’s personal data would be unproblematic, if we could rest assured that the data are not accessed and that nothing bad happens with these data. I want to state unequivocally that I am not suggesting that, in normal circumstances, there is no reason to value control privacy, or that we need not be concerned about governments reducing people’s control privacy. In normal circumstances, the antecedent of the above conditional is not satisfied. The risk of our data being accessed or abused is real, and this is reason enough to be concerned about the mass collection of data. Rather, the point I wish to make is an analytical one: at least in the context of surveillance, the value of control privacy is closely tied to the other two concerns. We may plausibly define privacy in such a way that government surveillance can be said to diminish people’s privacy, namely their control privacy. Footnote 21 But its diminution does not constitute an independent concern, over and above concerns about access to one’s data (losses of access privacy) and about what these data are or might be used for. Footnote 22

Turning now to the second concern about privacy, a loss of access privacy is different from a loss of control privacy. There seems to be something problematic about people accessing personal information as such, that is, irrespective of other concerns, especially of whether the accessed information will be used for objectionable purposes. Imagine that government agents monitor your behavior, eavesdrop on your conversations, read your mail or email, or reduce your access privacy in some other such way. These privacy breaches seem harmful even when there is no risk whatsoever that the collected information is used for bad purposes (or exposed to the public so that even more people access the information). Even if we stipulate that these agents are perfectly virtuous people who, somehow isolated from the rest of society, have not the slightest opportunity to pass on the information gleaned to others, there is, I think, a distinct sense that you are being harmed. I admit that I am here appealing to intuition and that it is not easy to spell out the nature of this harm or provide further support for this view. Perhaps we are here reaching ethical rock-bottom. One way of going beyond brute intuition may be to observe that people who have had intimate information accessed by others often feel exposed, embarrassed, humiliated, or simply awkward, a response that does not appear fully reducible to fears about what the information gleaned may be used for. Maybe, as ethicists, we do well to take these responses at face value. Footnote 23 Thus, although the argument for it remains somewhat schematic, it is certainly plausible that breaches of access privacy are objectionable as such, irrespective of other concerns, in particular of what the accessed information will be used for. Footnote 24 There appears to exist a significant normative difference between whether some piece of personal information, which we had rather kept for ourselves, is actually in somebody else’s mind or not — a distinction that certainly has some plausibility on its face. Admittedly, though, my argument for this asymmetry is not uncontestable, and it is open to critics to challenge it by either disputing that access as such is problematic or by pushing the intuition that loss of control as such is problematic too.

The claims I have made are substantive ethical claims, which are independent from definitional questions. They would remain true if we opted for some other definition of privacy, although this would necessitate reformulating them. The increasingly automated character of modern surveillance matters not for reasons related to the meaning of privacy. It matters morally because it means that there can be collecting and processing of large amounts of data without any access taking place. This is relevant because access as such is morally problematic. By contrast, the mere collecting of large amounts of data, though reducing control privacy, does not constitute a compelling independent concern about surveillance, independent, that is, from the other two concerns. To understand what is ultimately problematic about government surveillance, we must therefore focus on the concern about access and the concern about what surveillance is used for. The question regarding the meaning of privacy and whether surveillance should be said to reduce “privacy” is peripheral.

The concern about access is legitimate and important. There seems to be something objectionable about human access to surveillance data in its own right , irrespective of what the accessed data are used for. The force of this concern about modern government surveillance is difficult to gauge, though. There certainly is a non-negligible risk of access taking place, in spite of the increasingly automated nature of surveillance. For instance, there are reports that employees of the US’s National Security Agency use surveillance tools to spy on their partners. Footnote 25 There is also the risk that data are hacked or leaked to the public, in which case they may be accessed by people other than government employees. Just as the extensive data collection efforts by private corporations is worrisome because the collected data are never perfectly secure, so is government surveillance. Footnote 26 Indeed, recent security breaches of government and corporate databases have exposed data of 50 million Turks and 223 million Brazilians, respectively. Footnote 27 Still, the fact that surveillance today relies on modern surveillance technologies means that the amount of access taking place is relatively low, compared to “old-fashioned” large-scale surveillance operations. The collection of massive amounts of data does typically not translate to a massive erosion of people’s access privacy. Security breaches such as the ones above are the exception, and even when they occur, only a small portion of the data made available is actually accessed. Technological and institutional safeguards may be put in place to further reduce the probability of data breaches, although they will never completely eliminate the risk. Footnote 28 Despite the recent massive expansion of government surveillance, it is arguable that today’s government surveillance in, say, the US, the UK, or the EU causes fewer reductions in access privacy than, say, government surveillance in the GDR. Footnote 29 On the whole, the concern that data might be accessed should be taken seriously, and it is no doubt part of the explanation of why real-world mass surveillance is so worrisome. But it only goes some way towards explaining the fierce opposition or even horror that large-scale government surveillance tends to elicit.

Arguably, the most compelling concern about modern government surveillance is that it can be used for objectionable purposes. Mass surveillance is a powerful instrument for controlling people, and placing an instrument this powerful in the hands of already powerful governments raises legitimate fears about what it will be used for (other than potentially for accessing the data). It was mentioned in the introduction that surveillance scholars have already raised a number of concerns regarding large-scale government surveillance. Many of these concerns can be interpreted as being ultimately about how the surveillance data are or might be used. Adding another perspective to this discussion, I will, in the remainder of this paper, explore one problem associated with the use of surveillance that in my view constitutes one of the principal problems with government surveillance and that has so far received little attention.

3 Surveillance and Legitimacy

To appreciate this particular problem, we must consider that government surveillance is a means of enforcing laws. The primary purpose of government surveillance is to ensure that people comply with the law by enabling the legal prosecution of those who fail to comply and by creating a climate of deterrence. Footnote 30 This section explores the idea that one fundamental problem with government surveillance is that it can be used to enforce laws (or, more broadly, government policies) that the government has no right to enforce. In his autobiography, Edward Snowden asserts that.

a world of total automated enforcement – of, say, all pet-ownership laws, or all zoning laws regulating home businesses – would be intolerable. Extreme justice can turn out to be extreme injustice, not just in terms of the severity of the punishment for an infraction, but also in terms of how consistently and thoroughly the law is applied and prosecuted. Footnote 31

This observation is, I think, important and to the point. One problem with extensive government surveillance is that we should not want all laws to be consistently and thoroughly applied and prosecuted. The problem of government surveillance is thus closely intertwined with the more general problem of political legitimacy. There is a sense in which a criticism of surveillance along these lines is not a criticism of surveillance per se. Surveillance is really just the tool for achieving that which is argued to be objectionable. This point is well taken. Indeed, I mentioned at the outset that I take my discussion to be of more general relevance and thus, hopefully, of interest to scholars who have no particular interest in surveillance. But it is also true that the rise of government surveillance renders concerns about legitimacy particularly salient and pertinent. It renders the “consistent and thorough application and prosecution of the law” possible in a way that until recently states could only dream of. This is why Snowden’s above-quoted concern is not “off-topic” and why, I hope, the below discussion of issues related to legitimacy is fitting.

Political legitimacy refers to the moral right of a government to pass and enforce laws. Footnote 32 Understanding the ethical significance of government surveillance requires an understanding of the conditions that must be satisfied for coercive government action to be legitimate. Although most people, political theorists and laypeople alike, accept the legitimacy of democratic governments, it is worth making explicit why government action is in need of legitimation. Essentially, the problem of political legitimacy is that government action is coercive. Government commands are backed by punishments that one cannot defy, as one is literally forced to comply. One might refuse to pay a fine, decide not to turn up to a court hearing, or continue driving one’s car after having had one’s license revoked. But at the end of the chain of sanctions, there is (typically) imprisonment, and one is ultimately made to go there by physical force.

The fact that government ultimately rests on the threat of physical force and imprisonment is morally significant, as it constitutes a serious pro tanto wrong that stands in need of moral justification. Indeed, in nonpolitical settings, people are extremely reluctant to condone or personally resort to physical coercion to achieve even desirable aims. Most people would be aghast at the idea of private individuals using physical coercion to carry out the kind of policies that they take governments to be perfectly entitled to enforce. They would, for instance, be appalled if a private individual forcibly extracted money from her neighbor for charitable purposes by threatening to use physical force to lock her up in the basement. Footnote 33 Given then the widely acknowledged considerable pro tanto badness of physical coercion and imprisonment, there is a need to justify the use of coercive measures by the government. This need for justification carries over to government surveillance, which is a part of the coercive apparatus of the state. The primary purpose of government surveillance is to ensure compliance with the law and to facilitate the prosecution of those who fail to comply.

One group of people who should find government surveillance objectionable is libertarians and anarchists, who, emphasizing the badness of physical coercion, believe that the scope of legitimate government action is very limited or, indeed, zero. Footnote 34 They should approve of government surveillance only for the enforcement of the set of policies that governments may legitimately enforce, which, according to them, is either very small or empty. The observation that there is something objectionable from a libertarian or anarchist point of view with an institution that is an instrument of law enforcement borders on the trivial. Footnote 35 Also, libertarianism and anarchism are minority views that few interested in the ethics of government surveillance share. I will therefore put libertarian or anarchist objections to one side and focus on more mainstream conceptions of political legitimacy, which are more optimistic about the capacity of democratic procedures to generate legitimacy. From such as perspective, government surveillance, when carried out by established liberal democracies, may appear prima facie legitimate. When established liberal democracies — think the US, the UK, Germany, or France — rely on surveillance for law enforcement purposes, they are enforcing what appear to be democratically legitimated laws.

My project in this section is to explore why even those subscribing to more mainstream conceptions of political legitimacy have reason to be concerned about government surveillance on account of its forming part of the coercive apparatus of the state. I will identify and discuss three such reasons for concern. Footnote 36

The first and perhaps most obvious reason is that there is always the risk of democratic decay. States that are functioning liberal democracies today might degenerate into severely defective democracies in the future. This risk is today more palpable than ever. It means that there is a risk that the surveillance infrastructure and the collected data that are used for democratically legitimated purposes today will be used for poorly legitimated purposes in the future. When democratic institutions decay, they will at some point fail to generate the legitimacy that is necessary for the enforcement of laws to be rightful. This problem carries over to surveillance. There is something deeply objectionable about government surveillance when it is used to enforce laws that are illegitimate. One risk, then, is that surveillance capacities are used in the future to enforce laws that have not been adequately legitimated. A fortiori, government surveillance is objectionable when a democracy has degenerated into an authoritarian tyranny that employs surveillance to infringe basic human rights. Surveillance can and has been used to stifle free speech, to restrict the freedom of assembly, to go after dissidents, and to oppress and persecute marginalized people, which is not only illegitimate but also substantively unjust. Footnote 37

Second, most democratic theorists agree that there are limits to what can be democratically legitimated. While they regard democratic procedures as an effective way of legitimating coercion, they usually hold that some policies are illegitimate even if they have been passed in a proper democratic procedure. That is, they usually endorse at least some substantial criteria of political legitimacy, the violation of which defeats the legitimating force of democratic procedures. This proviso is typically thought to affect laws that violate basic political rights, the so-called liberties of the ancients. For instance, it is generally held that it is never legitimate to disenfranchise a certain group of people, to take away people’s right to freedom of expression, or to severely curtail the freedom of the press. But most democratic theorists also take this proviso to protect nonpolitical human rights, including the liberties of the moderns such as liberty of conscience and the right to bodily integrity. Footnote 38

Many surveillance operations serve to enforce laws against terrorism and serious crime. These are not plausible candidates for laws that involve legitimacy-defeating violations of basic liberties. In the wake of the Covid crisis, however, surveillance has also been used to enforce restrictions on people’s basic liberties. Taiwan, South Korea, and Israel have been particularly resolute, relying on mandatory surveillance instruments to enforce quarantine regulations. Footnote 39 One newspaper article reports, for instance, that “the [Taiwanese] government worked with telecommunications companies to track quarantined residents’ locations using their phone numbers. This system, called a ‘digital fence,’ notifies authorities when anyone under mandatory quarantine goes outside their designated quarantine site.” Footnote 40 Surveillance is effectively used to severely restrict citizens’ liberty of movement, liberty of assembly, freedom of trade, and other basic liberties. Whether such restrictions constitute a morally justifiable response to the Covid pandemic is debatable and will not be discussed here. I mention them as they convey an idea of how readily surveillance may be used to enforce restrictions that do infringe on citizens’ basic liberties.

There is, however, another route to arguing that government surveillance might end up being deployed to enforce democratically enacted yet illegitimate laws. This route — again anticipated by Snowden’s remark on the “severity of the punishment for an infraction” — is in my view quite compelling but perhaps also somewhat nonobvious and contrarian. It concerns not the content of the laws that are enforced, for instance, whether they curtail basic liberties, but their mode of enforcement. David Estlund observes that among the democratically enacted laws that are illegitimate are not only those that undermine the proper functioning of democratic procedures but also laws that are morally abhorrent for other reasons. He asserts, convincingly, that a “law, passed by proper democratic procedures, that established, as a punishment for anything, being boiled in oil would be neither legitimate nor authoritative even though it has no real antidemocratic dimension to it.” Footnote 41 The feature that renders this law illegitimate relates to the punishment attached to its violation, that is, to its mode of enforcement rather than to its content. While nobody is boiled in oil these days, excessively cruel punishments are by no means a thing of the past. Today, people are punished by being locked up in a prison cell, and it is arguable that this is an extremely inhumane punishment, too. As Chris Surprenant and Jason Brennan observe, “[d]epriving someone of freedom, subjecting them to extended risk of physical and sexual abuse, forcing them to remain locked in a small space, and in some cases, keeping them isolated and without entertainment for extended period[s] [is] barbaric.” Footnote 42 Incarceration also causes considerable collateral damage by negatively affecting people who are personally close to the incarcerated person and may depend on his or her support, such as family members, partners, and friends. Surprenant and Brennan imagine that an outsider might offer the following account of incarceration as a punishment:

You […] enslave your convicts, place them under constant surveillance, remove their privacy, dehumanize them, bore them, psychologically torture them, and subject them to near constant threats of capricious physical and sexual abuse. You ruin their lives, and you make it so that these people provide nothing of value to society, either. And you do this all at tremendous monetary expense. […] [Y]ou punish criminality with prolonged dehumanization punctuated by capricious, unexpected brutality. Footnote 43

Now consider again the example of death by boiling in oil. Assume, for the sake of argument, that drug offenses, theft, or tax evasion were punished by boiling the delinquent in oil. It is plausible that even if we assume that the laws that criminalize these practices and specify the punishment were democratically passed, democratic theorists should dismiss them as illegitimate on account of the disproportionate cruelty of the punishment attached to their violation. The punishment is profoundly inhumane, and its inhumanity nullifies whatever democratic legitimation the laws may have received. It would evidently be wrong to enforce these laws and to boil in oil the drug user or dealer, the thief, or the tax evader. While incarceration is certainly less inhumane than boiling in oil, it is, I submit, still sufficiently inhumane and excessive as to defeat the legitimacy of some laws that result in people being incarcerated. I am not saying that incarceration is never justified. Some wrongdoers, such as serial killers, rapists, and terrorists, ought to be locked away so as to prevent them from causing further harm. Footnote 44 But incarceration as a punishment for nonviolent crime is unjustifiably inhumane. Thus, many instances of incarceration, especially but not exclusively in the USA, are so inhumane that we should question the legitimacy of the laws responsible for them. Footnote 45

What I am suggesting, then, is that government surveillance is problematic when it is used to enforce laws that are illegitimate because of the inhumanity of the punishment attached to their violation. That is, there is a considerable risk that government surveillance is abused to enforce laws that are illegitimate because of their mode of enforcement. Although most democratic theorists focus on the content of laws rather than their mode of enforcement (Estlund being an exception), I take this concern about government surveillance to be consonant with the spirit of much of democratic theorizing, which acknowledges that grossly inhumane legislation is illegitimate irrespective of the democratic legitimation it may have received. Footnote 46

Third, the use of surveillance to enforce laws may be objectionable because the democratic institutions of established liberal democracies are already defective. So far, my argument assumed that the democratic procedures in established liberal democracies are by and large doing a good job at generating democratic legitimacy, although it was acknowledged that they might decay (first problem) or on occasion produce illegitimate laws by violating procedure-independent standards (second problem). The third problem arises from the observation that the democratic procedures of established liberal democracies are already defective and may thus fail to secure the legitimacy of the laws that surveillance is used to enforce. They are defective by the standards of at least a number of influential mainstream theories of political legitimacy.

For instance, many proponents of deliberative accounts of political legitimacy hold that policies are legitimate only if they emanate from ideal political deliberation. Seyla Benhabib asserts “that legitimacy in complex modern democratic societies must be thought to result from the free and unconstrained public deliberation of all about matters of common concern.” Footnote 47 But, as many have observed, actual political deliberation does not at all conform to this ideal. Footnote 48 Or consider how John Rawls conceives of legitimacy:

[T]he idea of political legitimacy based on the criterion of reciprocity says: Our exercise of political power is proper only when we sincerely believe that the reasons we would offer for our political actions – were we to state them as government officials – are sufficient, and we also reasonably think that other citizens might also reasonably accept those reasons. Footnote 49

Often, however, the exercise of political power is not justified by public reasons in the way envisaged by Rawls and his followers in the public reason tradition. Estlund, defending an epistemic theory of democratic legitimacy, holds that “[d]emocratic legitimacy requires that the procedure can be held, in terms acceptable to all qualified points of view, to be epistemically the best (or close to it) among those that are better than random.” Footnote 50 But it is fair to say that actual democratic procedures in established liberal democracies, however, worthy of respect and protection, are not close to being the epistemically best among those that are better than random. Estlund himself, acknowledging the problem of voter ignorance, notes that he is unsure whether the requirements of epistemic proceduralism will ever be met. Footnote 51 The neo-republican approach ties legitimacy to the concept of non-domination and to popular control over government. Philip Pettit, who has offered the most comprehensive account of neo-republicanism, states: “[A] state will be legitimate just insofar as it gives each citizen an equal share in a system of popular control over government.” Footnote 52 Again, due to existing inequalities between citizens, virtually no democracy conforms to this ideal, as Pettit himself observes. Footnote 53

I cannot and need not here review all theories of political legitimacy. This selective review suffices to illustrate that at least several prominent theories of political legitimacy formulate standards of legitimacy that established liberal democracies do not meet. Perhaps, this is unsurprising. Democratic theorists are in the business of outlining to-be-emulated political ideals. They do not seek to provide descriptively adequate accounts of the imperfect status quo. But it means that if we take these theories at face value, the legitimacy of most policies enforced in established liberal democracies is in doubt. This problem has, to my knowledge, hardly been addressed in the literature, and its precise implications remain to be explored. Footnote 54 At this point, I want to cautiously point out that, by the standards of several notable theories of legitimacy, many laws seem to lack legitimacy and that there may be something problematic about enforcing such laws. To the extent that government surveillance is used to enforce such imperfectly legitimated laws, government surveillance is problematic, too.

Note that the problem of defective legitimacy affects not only laws that are enforced with the help of government surveillance but also government surveillance as a policy itself. If existing democratic procedures do not meet the requirements necessary for democratic legitimation, the actual decision-making processes that lead to the introduction of surveillance programs may fail to ensure their legitimacy. Indeed, given the secretive nature of many surveillance operations and the importance of transparency for political legitimacy, the problem may be particularly acute for surveillance policies. Footnote 55

To summarize, the three subproblems are as follows: (1) even if established liberal democracies are, by and large, legitimated to enforce laws today, their democratic institutions may decay in the future. Existing surveillance data and infrastructure might then be used for illegitimate purposes. (2) Even if established liberal democracies possess the procedural institutions that generate democratic legitimacy, there are procedure-independent standards that may defeat the legitimacy of laws decided by these institutions. The inhumanity of incarceration may be such a defeater. Government surveillance is objectionable if it is used to enforce such laws. (3) It is unclear to what extent established liberal democracies really possess the procedural institutions that generate democratic legitimacy, if judged by the standards of several prominent theories of political legitimacy. It is arguable that government surveillance is problematic when it is used to enforce laws whose legitimacy is in doubt.

To be sure, the established liberal democracies I have considered are, as of today, not authoritarian tyrannies (trivially). Also, some of the most salient mass surveillance operations, such as those uncovered by Snowden, serve to fight terrorism and similarly serious crime. One might argue that if any laws are legitimate, it is laws against terrorism and serious crime. They ought to be enforced even when they have resulted from imperfect democratic processes, and incarceration may be a morally justified response to the violation of these laws. Arguably, people who plot terrorist attacks ought to be put behind bars. However, democratic institutions are increasingly under threat, with many experts fearing an authoritarian backlash. Footnote 56 And as surveillance technologies become more sophisticated and citizens more desensitized to being monitored, it is likely that government surveillance will progressively expand beyond the purpose of counterterrorism and the like. Footnote 57 Indeed, already today, surveillance is used to enforce rather questionable legislation. One of the most extensive surveillance operations, said by some to eclipse that of the National Security Agency, is run by the US Drug Enforcement Agency (DEA). Through the “Hemisphere Project,” the DEA has access to a vast database of phone data, provided by telecommunication company AT&T, to prosecute the “war on drugs,” one of the US’s most questionable policy programs. Footnote 58 Another controversial surveillance operation is carried out by the US’s Immigration and Customs Enforcement (ICE). It uses facial recognition to scan millions of driver’s licence photos, possibly in an effort to track down undocumented immigrants. Footnote 59 To such surveillance programs, the above legitimacy concerns seem readily applicable. These programs also demonstrate that government surveillance is expanding rapidly and often in an unchecked manner — the DEA’s surveillance was secret until accidentally uncovered, and the ICE proceeds without seeking state or court approval, let alone approval of the driver’s licences’ owners — giving a foretaste of what is to come. Surveillance is thus likely to continue expanding beyond the prevention of terrorism and serious crime. The more government surveillance is leading to the “total enforcement” of the law, the more applicable the above concerns about legitimacy become.

4 Conclusion

Having distinguished three potential reasons for concern, I have argued that, ultimately, we ought to be concerned about whether collected surveillance data may be accessed and about what the data are used for. The mere collecting of surveillance data, though involving privacy losses of sorts, does not constitute a compelling reason for concern in its own right, over and above the other two concerns. Debates about the meaning of privacy, though insightful, need not be settled for the ethical assessment of government surveillance. One chief problem with government surveillance in democracies is that it may be used to enforce laws that ought not to be enforced — a problem that will become increasingly acute as government surveillance expands.

I conclude with a caveat regarding the implications of my argument. The aim of this essay was to get a better grip on what is pro tanto objectionable about modern government surveillance in established liberal democracies. I have made no attempt to provide an all-things-considered judgment of its ethical acceptability. Nothing I have said entails that government surveillance is never justified. To call for an end to all government surveillance on the basis of the above concerns, perhaps by appeal to the precautionary principle, would be to ignore the opportunity costs that forgoing government surveillance may involve. Footnote 60 As mentioned in the introduction, some scholars have defended government surveillance as a useful instrument for preventing terrorist attacks of a catastrophic scale. An all-things-considered judgment that accounts for these and other potential opportunity costs, which would also require assessing the actual effectiveness of surveillance, cannot be provided within the scope of one article. Footnote 61 Indeed, it is doubtful that any such general assessment can be provided, as the moral costs and benefits of each surveillance technique or operation must be judged on its own terms. Footnote 62 What I do hope to have achieved is to contribute a new perspective on whether and why we should be concerned about government surveillance and on how the problem of government surveillance relates to questions of privacy and legitimacy.

For an overview of policing and surveillance in twentieth-century dictatorships, refer to Dunnage ( 2016 ). Dunnage reports that it is estimated that, in the post-Stalinist Soviet Union, some 30 to 60% of the population were forced to work as informers for the KGB, and in the GDR, roughly every thirtieth citizen served as an informer for the regime. Nazi Germany may have relied less on surveillance and more on denunciations (pp. 122–123). On surveillance in China and North Korea, see Denyer ( 2018 ) and Lankov and In-ok ( 2011 ), respectively.

See, e.g., Brownlee ( 2016 ) and Scheuermann ( 2014 ).

Critical discussions of government surveillance include Goold ( 2009 ); Henschke ( 2017 , ch. 9); Hoye and Monaghan ( 2018 ); Lever ( 2008 ); Nissenbaum ( 1998 ); Roberts ( 2015 ); Solove ( 2007 ); Smith ( 2020 ); Stahl ( 2016 , 2020 ); and I. Taylor ( 2017 ). For two non-privacy-centered criticisms of government surveillance, see Macnish ( 2018 , 2020 ) and Sorell ( 2018 ). A classic treatment of this topic is Foucault ( 1975 ). See also Zuboff ( 2019 ), though her focus is on “surveillance” by private companies.

Most prominently Macnish ( 2018 , 2020 ); see also Posner ( 2005 ) and Sorell ( 2018 ). For an argument that public video surveillance does not violate privacy rights, refer to Ryberg ( 2007 ).

Exceptions include surveillance in the McCarthy era, the FBI’s COINTELPRO (including the wiretapping of Martin Luther King), and undercover policing in the UK (see the ongoing Undercover Policing Inquiry). See also Goold ( 2009 , p. 43).

See Sorell ( 2011 , pp. 12–14).

J. S. Taylor ( 2005 , p. 227).

Persson and Savulescu ( 2012 )

Much more cautious defenses of surveillance have been advanced by Smith ( 2020 ) and I. Taylor ( 2017 ).

In what follows, the “pro tanto” will usually be omitted, but I will return to it in the conclusion.

The observation that no access takes place when data are processed by intelligent algorithms might be challenged on the grounds that these algorithms are themselves “agents” of sorts, who “access” the data when processing them. Whether intelligent systems qualify as “agents” or not, I agree with Macnish ( 2020 ) that there is a significant difference between access by humans and access by entities that lack “semantic understanding,” e.g., intelligent systems.

I am focusing on informational privacy, as this seems to be the relevant kind of privacy in the present context.

Roessler ( 2005 , p. 8). Other proponents of the control account include Fried ( 1984 , p. 209); Menges ( 2020a ); Moore ( 2003 , 2008 ); Westin ( 1967 , p. 7); and, tentatively, Mainz and Uhrenfeldt ( 2021 ) (the latter focus on the right to privacy, though). For an interesting exchange about its plausibility, see Lundgren ( 2020 ) and Menges ( 2020b ).

Macnish ( 2018 ); see also Macnish ( 2020 ) and Thomson ( 1975 , pp. 304–305, n. 1). An argument strikingly similar to Macnish’s (that even features a diary example) was independently developed by Tom Sorell ( 2018 ). For a subtle attempt by a control theorist to account for threatened loss cases, refer to Menges ( 2020a , forthcoming).

Note, though, that Menges, although a control theorist, tries to capture the intuition that no privacy loss occurs in threatened loss cases and thus agrees with Macnish that modern government surveillance involves very little loss of privacy (2020a, 2020b, forthcoming).

Macnish ( 2018 , 2020 ). Menges concurs (2020a, pp. 46–47). A view similar to Macnish’s has been defended by Sorell, who “den[ies] that bulk collection is seriously intrusive without denying that it is morally objectionable in other ways” (2018, p. 47).

I am here concurring with Henschke ( 2017 , p. 46), Solove ( 2007 , p. 760; 2009, pp. 39–40), and van den Hoven ( 2008 ), who have warned against getting bogged down in conceptual debates.

Henschke ( 2020 ), too, suggests distinguishing two concepts of privacy. His distinction differs from mine. In his 2017, he defends a pluralistic, “clustered” approach to privacy.

For what it is worth, I share Macnish’s linguistic intuition that privacy is only reduced in situations in which human access occurs.

An anonymous reviewer has sensibly suggested that I clarify whether this approach commits me to the views that (1) defining privacy is not crucial to assessing the ethical permissibility of surveillance, and (2) intermediate moral principles such as “Do not diminish a person’s privacy [or, for that matter, autonomy, freedom, etc.]” play little role in moral theory compared to more fundamental principles such as the categorical imperative or the utilitarian calculus. In response, I wish to state that I do believe that defining privacy matters, and I have offered two stipulative definitions of privacy. What I do not believe is that we necessarily need to determine which of several privacy definitions on offer (especially privacy as control and privacy as nonaccess) best capture everyday privacy talk before we can address the ethical issue at stake. We can proceed by exploring both the normative significance of reductions of control privacy and that of reductions of access privacy. This way, we can come to grips with the problem of surveillance without first having to identify which concept of privacy best captures everyday privacy talk. This is the approach I am taking in this essay. Relatedly, I am not committed to the view that intermediate principles do not matter for moral theorizing. Such principles as “Do not diminish a person’s privacy” do play a role in moral theorizing, but again, we can work with different versions of such principles (e.g., “Do not diminish a person’s control privacy,” “Do not diminish a person’s control privacy,” etc.), and we need not first identify which privacy concept best captures everyday privacy talk.

At least according to the standard version of the control account. See again Menges ( 2020a , b , forthcoming) for a version of the control account that entails that government surveillance need not necessarily reduce people’s privacy.

Similarly, Henderson ( 2016 , p. 962) observes that “assuming complete automation, the key privacy harm seems to occur only upon human viewing, or use.”.

A related line of research explores the connection between privacy and dignity (Bloustein, 1964 ; Floridi, 2016 ; Kleinig, 2009 ).

This is not to deny that access to information may additionally be problematic for the reason that the accessed information may be used for objectionable purposes.

Perez ( 2013 )

For criticisms of corporate “surveillance,” see Zuboff ( 2019 ).

Belli ( 2021 ); Hern ( 2016 )

See I. Taylor ( 2017 , pp. 335–336).

It is true, though, that the advent of new surveillance technologies has made it more likely that democracies engage in surveillance that might not have engaged in surveillance without these technologies. Thus, although surveillance operations relying on these technologies involve little data access, it may still be the case that the advent of these technologies has led to an absolute reduction of access privacy, given that even modern surveillance tends to be associated with some reductions in access privacy.

This is not to deny that government surveillance may be used for other purposes that are not straightforwardly reducible to law enforcement or that the effects of government surveillance on those subjected to surveillance may go beyond mere compliance with the law (as scholars in the Foucauldian tradition might suggest).

Snowden ( 2019 , p. 196).

See, e.g., Huemer ( 2013 , p. 5), who defines political legitimacy as “the right, on the part of a government, to make certain laws and enforce them by coercion against the members of its society – in short the right to rule.” Political legitimacy can be understood as one dimension of political authority, the other being citizens’ obligation to obey laws.

See again Huemer ( 2013 , p. 11). Huemer is a skeptic about political legitimacy, but his characterization should be common ground among optimists and skeptics about political authority alike.

See, e.g., Huemer ( 2013 ), Nozick ( 1974 ), and Wolff ( 1970 ).

Though see Pilon and Epstein ( 2013 ).

For a different legitimacy-centered criticism of surveillance, inspired by Habermasian discourse theory, refer to Stahl ( 2020 ).

See also Henschke on “Deliberative Information Harms” (2017, pp. 223–227). Note that, in addition, the ready availability of a surveillance infrastructure and of surveillance data might also facilitate the transition to an authoritarian regime. It is easier to establish an authoritarian tyranny and persecute its enemies when one already possesses or can readily acquire information about the political orientation and activities of one’s subjects.

See, e.g., Christiano ( 2008 , ch. 7); Cohen ( 1997b ); Estlund ( 2007 , p. 110); Freeman ( 1990 ); Gutmann and Thompson ( 2004 , ch. 3); Habermas ( 1996 , ch. 3); and Rawls ( 1996 , ch. 8).

Altshuler and Hershkowitz ( 2020 )

Lee, McCauley, and Abadi (2020).

Estlund ( 2007 , p. 111).

Surprenant and Brennan ( 2019 , pp. 70–71); see also Huemer ( 2018 ).

Surprenant and Brennan ( 2019 , p. 72).

See again Surprenant and Brennan ( 2019 , p. 85).

Similarly, Surprenant and Brennan encourage juries to make use of their right to nullify the law (2019, pp. 140–141).

To be sure, at least Brennan is a libertarian, but while his and Surprenant’s critique of incarceration might be characteristically libertarian, it is by no means exclusively libertarian.

Benhabib ( 1994 , p. 26). According to John Dryzek, the core claim of deliberative democracy is “that outcomes are legitimate to the extent they receive reflective assent through participation in authentic deliberation by all those subject to the decision in question” (2001, p. 651). Some theories of deliberative democracy are ambiguous as to whether legitimacy requires actual or hypothetical deliberation (e.g., Cohen, 1997a ; Habermas, 1996 ). Whether, according to these theories, legitimacy is damaged by the defects of actual deliberative procedures is somewhat unclear. The letter of these theories seems to say “no,” but their spirit suggests “yes.”.

See, e.g., Huemer ( 2013 , pp. 61–64).

Rawls ( 1997 , p. 771).

Estlund ( 2007 , p. 98).

Estlund ( 2007 , p. 14).

Pettit ( 2014 , p. 22).

Pettit ( 2014 , pp. 136–140).

Kirshner ( 2018 ) and Pettit ( 2014 , pp. 136–140) discuss the related problem of whether citizens have a duty to obey the law in defective democracies.

On the transparency requirement, see, e.g., Pettit ( 2014 , p. 215). I owe this observation to Irina Schumski.

See, e.g., Applebaum ( 2020 ), Levitsky and Ziblatt ( 2018 ), and Snyder ( 2018 ).

Besides, the risk of this happening has repercussions in the present. If there is a risk that surveillance data are used for illegitimate purposes in the future, citizens’ freedom and autonomy is curtailed in the present as they will adjust their behavior in anticipation of these risks. For related discussions on the “chilling effects” of surveillance, see, e.g., Macnish ( 2018 , p. 428), Solove ( 2006 ), Stahl ( 2020 , p. 85), and Thomsen ( 2020b , p. 381).

Shane and Moynihan ( 2013 )

Harwell ( 2019 ); Harwell and Cox ( 2020 )

See Sunstein ( 2005 ).

On the questionable effectiveness of the NSA’s surveillance program, see Greenwald ( 2014 , pp. 202–205). Refer to Macnish ( 2015 ), Rønn and Lippert-Rasmussen ( 2020 ), and Thomsen ( 2020b ) for discussions of government surveillance and proportionality, which may be helpful for reaching more comprehensive judgments.

For one moral assessment of a specific surveillance practice, see Thomsen ( 2020a ).

Altshuler, T. S., & Hershkowitz, R. A. (2020). How Israel’s COVID-19 mass surveillance operation works. Retrieved from  https://www.brookings.edu/techstream/how-israels-covid-19-mass-surveillance-operation-works/ . Accessed 03/02/2022

Applebaum, A. (2020). Twilight of Democracy: The Seductive Lure of Authoritarianism . Penguin.

Google Scholar  

Belli, L. (2021). The largest personal data leakage in Brazilian history: Why the rest of the world should be worried, and think hard about how to create a data protection culture. Retrieved from  https://www.opendemocracy.net/en/largest-personal-data-leakage-brazilian-history/ . Accessed 03/02/2022

Benhabib, S. (1994). Deliberative rationality and models of democratic legitimacy. Constellations, 1 (1), 26–52.

Article   Google Scholar  

Bloustein, E. J. (1964). Privacy as an aspect of human dignity: An answer to Dean Prosser. New York University Law Review, 39 (6), 962–1007.

Brownlee, K. (2016). The civil disobedience of Edward Snowden: A reply to William Scheuermann. Philosophy and Social Criticism, 42 (10), 965–970.

Christiano, T. (2008). The Constitution of Equality: Democratic Authority and its Limits . Oxford University Press.

Book   Google Scholar  

Cohen, J. (1997a). Deliberation and democratic legitimacy. In J. Bohman & W. Rehg (Eds.), Deliberative Democracy (pp. 67–92). MIT Press.

Cohen, J. (1997b). Procedure and substance in deliberative democracy. In J. Bohman & W. Rehg (Eds.), Deliberative Democracy (pp. 407–438). MIT Press.

Denyer, S. (2018). China’s watchful eye. The Washington Post . Retrieved from  https://www.washingtonpost.com/news/world/wp/2018/01/07/feature/in-china-facial-recognition-is-sharp-end-of-a-drive-for-total-surveillance/ . Accessed 03/02/2022

Dryzek, J. (2001). Legitimacy and economy in deliberative democracy. Political Theory, 29 (5), 651–669.

Dunnage, J. (2016). Policing and surveillance. In P. Corner & J.-H. Lim (Eds.), The Palgrave Handbook of Mass Dictatorship (pp. 119–130). Palgrave Macmillian.

Chapter   Google Scholar  

Estlund, D. (2007). Democratic authority: A philosophical framework . Princeton University Press.

Floridi, L. (2016). On human dignity as a foundation for the right to privacy. Philosophy and Technology, 29 (4), 307–312.

Foucault, M. (1975). Surveiller et Punir: Naissance de la Prison . Gallimard.

Freeman, S. (1990). Constitutional democracy and the legitimacy of judicial review. Law and Philosophy, 9 (4), 327–370.

Fried, C. (1984). Privacy: A moral analysis. In F. D. Schoeman (Ed.), Philosophical Dimensions of Privacy: An Anthology (pp. 203–222). Cambridge University Press.

Greenwald, G. (2014). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State . New York: Metropolitan Books.

Goold, B. (2009). How much surveillance is too much? Some thoughts on surveillance, democracy, and the political value of privacy. In D. W. Schartum (Ed.), Overvakning I en Rettstaat (pp. 38–48). Bergen: Fagbokforlaget.

Gutmann, A., & Thompson, D. (2004). Why Deliberative Democracy? Princeton University Press.

Habermas, J. (1996). Between Facts and Norms: Contributions to a Discourse Theory of Law and Democracy . MIT Press.

Harwell, D. (2019). FBI, ICE find state driver’s license photos are a gold mine for facial-recognition searches. The Washington Post . Retrieved from  https://www.washingtonpost.com/technology/2019/07/07/fbi-ice-find-state-drivers-license-photos-are-gold-mine-facial-recognition-searches/ . Accessed 03/02/2022

Harwell, D., & Cox, E. (2020). ICE has run facial-recognition searches on millions of Maryland drivers. The Washington Post . Retrieved from  https://www.washingtonpost.com/technology/2020/02/26/ice-has-run-facial-recognition-searches-millions-maryland-drivers/ . Accessed 03/02/2022

Henderson, S. E. (2016). Fourth amendment time machines (and what they might say about police body cameras). University of Pennsylvania Journal of Constitutional Law, 18 (3), 933–973.

Henschke, A. (2017). Ethics in an Age of Surveillance: Personal Information and Virtual Identities . Cambridge University Press.

Henschke, A. (2020). Privacy, the Internet of things, and state surveillance: Handling personal information within an inhuman system. Moral Philosophy and Politics, 7 (1), 123–149.

Hern, A. (2016). Database allegedly containing ID numbers of 50m Turks posted online. The Guardian . Retrieved from  https://www.theguardian.com/technology/‍2016/apr/04/database-allegedly-containing-id-numbers-of-50m-turks-posted-online . Accessed 03/02/2022

Hoye, J. M., & Monaghan, J. (2018). Surveillance, freedom and the republic. European Journal of Political Theory, 17 (3), 343–363.

Huemer, M. (2013). The Problem of Political Authority: An Examination of the Right to Coerce and the Duty to Obey . Palgrave Macmillan.

Huemer, M. (2018). Unconscionable punishment. In C. W. Surprenant (Ed.), Rethinking Punishment in the Era of Mass Incarceration (pp. 34–48). Routledge.

Kirshner, A. S. (2018). Nonideal democratic authority: The case of undemocratic elections. Politics, Philosophy & Economics, 17 (3), 357–376.

Kleinig, J. (2009). The ethical perils of knowledge acquisition. Criminal Justice Ethics, 28 (2), 201–222.

Lankov, A., & In-ok, K. (2011). The decline of the North Korean surveillance state. North Korean Review, 7 (2), 6–21.

Lee, W.-Y., McCauley, E., & Abadi, M. (2020). Taiwan used police surveillance, government tracking, and $33,000 fines to contain its coronavirus outbreak. Retrieved from  https://www.businessinsider.com/taiwan-coronavirus-surveillance-masks-china-2020-6/ . Accessed 03/02/2022

Lever, A. (2008). Mrs. Aremac and the camera: A response to Ryberg. Res Publica, 14 (1), 35–42.

Levitsky, S., & Ziblatt, D. (2018). How Democracies Die . Broadway Books.

Lundgren, B. (2020). A dilemma for privacy as control. The Journal of Ethics, 24 (2), 165–175.

Macnish, K. (2015). An eye for an eye: Proportionality and surveillance. Ethical Theory and Moral Practice, 18 (3), 529–548.

Macnish, K. (2018). Government surveillance and why defining privacy matters in a post-Snowden world. Journal of Applied Philosophy, 35 (2), 417–432.

Macnish, K. (2020). Mass surveillance: A private affair? Moral Philosophy and Politics, 7 (1), 9–28.

Mainz, J. T., & Uhrenfeldt, R. (2021). Too much info: Data surveillance and reasons to favor the control account of the right to privacy. Res Publica, 27 (2), 287–302.

Menges, L. (2020a). Did the NSA and GCHQ diminish our privacy? What the control account should say. Moral Philosophy and Politics, 7 (1), 29–48.

Menges, L. (2020b). A defense of privacy as control. The Journal of Ethics, 25 (3), 385–402.

Menges, L. (forthcoming). Three control views on privacy. Social Theory and Practice

Moore, A. (2003). Privacy: Its meaning and value. American Philosophical Quarterly, 40 (3), 215–227.

Moore, A. (2008). Defining privacy. Journal of Social Philosophy, 39 (3), 411–428.

Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17 (5/6), 559–596.

Nozick, R. (1974). Anarchy, State, and Utopia . Basic Books.

Perez, E. (2013). NSA: Some used spying power to snoop on lovers. Retrieved from  https://edition.cnn.com/2013/09/27/politics/nsa-snooping/index.html . Accessed 03/02/2022

Persson, I., & Savulescu, J. (2012). Unfit for the Future . Oxford University Press.

Pettit, P. (2014). On the People’s Terms: A Republican Theory and Model of Democracy . Cambridge University Press.

Pilon, R., & Epstein, R. A. (2013). NSA surveillance in perspective. Chicago Tribune (12.06.2013)

Posner, R. A. (2005). Our domestic intelligence crisis. The Washington Post (21.12.2005).

Rawls, J. (1996). Political Liberalism . Columbia University Press.

Rawls, J. (1997). The idea of public reason revisited. The University of Chicago Law Review, 64 (3), 765–807.

Roberts, A. (2015). A republican account of the value of privacy. European Journal of Political Theory, 14 (4), 320–344.

Roessler, B. (2005). The Value of Privacy . Polity Press.

Rønn, K. V., & Lippert-Rasmussen, K. (2020). Out of proportion? On surveillance and the proportionality requirement. Ethical Theory and Moral Practice, 23 (1), 181–199.

Ryberg, J. (2007). Privacy rights, crime prevention, CCTV, and the life of Mrs Aremac. Res Publica, 13 (2), 127–143.

Scheuermann, W. E. (2014). Whistleblowing as civil disobedience: The case of Edward Snowden. Philosophy and Social Criticism, 40 (7), 609–628.

Shane, S., & Moynihan, C. (2013). Drug agents use vast phone trove, eclipsing N.S.A.’s. The New York Times . Retrieved from  https://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html . Accessed 03/02/2022

Smith, P. T. (2020). A neo-republican account of just state surveillance. Moral Philosophy and Politics, 7 (1), 49–71.

Snowden, E. (2019). Permanent Record . Metropolitan Books.

Snyder, T. (2018). The Road to Unfreedom: Russia, Europe, America . Tim Duggan Books.

Solove, D. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 154 (3), 477–564.

Solove, D. (2007). “I’ve got nothing to hide” and other misunderstandings of privacy. San Diego Law Review, 44 , 745–772.

Sorell, T. (2011). Preventive policing, surveillance, and the European counter-terrorism. Criminal Justice Ethics, 30 (81), 1–22.

Sorell, T. (2018). Bulk collection, intrusion and domination. In A. I. Cohen (Ed.), Philosophy and Public Policy (pp. 39–60). Rowman & Littlefield.

Stahl, T. (2016). Indiscriminate mass surveillance and the public sphere. Ethics and Information Technology, 18 (1), 33–39.

Stahl, T. (2020). Privacy in public: A democratic defense. Moral Philosophy and Politics, 7 (1), 73–96.

Sunstein, C. R. (2005). Laws of Fear: Beyond the Precautionary Principle . Cambridge University Press.

Surprenant, C. W., & Brennan, J. (2019). Injustice for All: How Financial Incentives Corrupted and Can Fix the US Criminal Justice System . Routledge.

Taylor, I. (2017). Data collection, counterterrorism and the right to privacy. Politics, Philosophy & Economics, 16 (3), 326–346.

Taylor, J. S. (2005). In praise of big brother: Why we should learn to stop worrying and love government surveillance. Public Affairs Quarterly, 19 (3), 227–246.

Thomsen, F. (2020a). The ethics of police body-worn cameras. Moral Philosophy and Politics, 7 (1), 97–122.

Thomsen, F. (2020b). The teleological account of proportional surveillance. Res Publica, 26 (3), 373–401.

Thomson, J. J. (1975). The Right to privacy. Philosophy and Public Affairs, 4 (4), 295–314.

van den Hoven, J. (2008). Information technology, privacy, and the protection of personal data. In J. van den Hoven & J. Weckert (Eds.), Information Technology and Moral Philosophy (pp. 301–321). Cambridge University Press.

Westin, A. (1967). Privacy and Freedom . Atheneum.

Wolff, R. P. (1970). In Defense of Anarchism . Harper & Row.

Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power . Profile Books.

Download references

Acknowledgements

The author would like to thank Saskia Nagel, Niël Conradie, Jan-Christoph Heilinger, and Hendrik Kempt for their helpful comments. He is a member of the project group “Regulatory theories of Artificial Intelligence” within the “Centre Responsible Digitality” (ZEVEDI).

Open Access funding enabled and organized by Projekt DEAL. Funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany’s Excellence Strategy — EXC-2023 Internet of Production — 390621612.

Author information

Authors and affiliations.

Frankfurt School of Finance & Management, Frankfurt, Germany

Peter Königs

You can also search for this author in PubMed   Google Scholar

Contributions

Not applicable (single authored).

Ethics declarations

Conflict of interest.

The author declares no competing interests.

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ .

Reprints and permissions

About this article

Königs, P. Government Surveillance, Privacy, and Legitimacy. Philos. Technol. 35 , 8 (2022). https://doi.org/10.1007/s13347-022-00503-9

Download citation

Received : 08 September 2021

Accepted : 15 January 2022

Published : 05 February 2022

DOI : https://doi.org/10.1007/s13347-022-00503-9

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Find a journal
  • Publish with us
  • Track your research
  • Admission help
  • Custom essay help
  • Writing assignment
  • College essay
  • Coursework writing
  • Custom writing
  • Dissertation writing
  • Homework help
  • Personal statement
  • Proofreading
  • School papers
  • Speech writing
  • Thesis help
  • Lab report writing
  • Ghostwriting
  • Book report
  • Book review
  • Movie review
  • Testimonials
  • 1-929-999-5210 Copied!
  • Write my essay

Essay on “Surveillance and Privacy”

Surveillance and privacy essay introduction.

In this essay about privacy, surveillance is defined as the close monitoring of the actions of a specific individual. The surveillance technology systems are devices that identify monitors and track the movements and data. Surveillance has raised a lot of concerns in privacy issues in the advancing technology. The electronic devices used include the closed circuit TV, the VCR, the telephone bugging, electronic databases, and the proximity cards. Surveillance has presented numerous challenges to the right to privacy.

Every individual is entitled to the right to privacy, and measures should be taken to address these issues in the new technology. Advanced technology can be very useful if properly handled, but it can also present with a lot of damage risks if misused. On the other hand, privacy can be described as the ability of not exposing an individual in any way to others without his consent. In my view, there are solution ideas to the problems that exist in surveillance and privacy. The solutions ideas are discussed in the essay below.

There is a need to develop a high technology surveillance system that will come with great benefits without intrusion. The development of the rapid DNA-based tests can serve a great significance in the protection from the biological weapons and the also in disease diagnosis. The tests will help us to reveal more about the health professionals. The high technology system will help to protect individual privacy. The importance of the solution will require the government to amend laws to regulate the privacy associated with one’s privacy.

The government can also use the keystroke loggers as spyware. The loggers are types of computer programs that can be used to track any records on a computer. The software program can be used to track production in workplaces, but their role in computers ensures that they are used as a spyware. They ensure privacy is protected if used as a tool in surveillance by the government. The federal law will require amendments in protecting the keystroke loggers’ installation.

The development of location technologies also is a solution to surveillance and privacy. There are several types of such electronic tracking devices in use today, but advanced ones have been introduced in cell phones and in cars navigation systems. The technologies will ensure that individuals are safe, secure, and convenient. The government has a responsibility to monitor one’s movement and ensure maximum security. There will be a need for legal standards which will aim at protecting the privacy rights in the surveillance of an individual.

The following is a criterion that can be used to evaluate the development of location technologies in surveillance. The government agencies must be authorized to take part in tracking the movements of an individual. They must be aware that their privacy will not be exposed to other people by the agents. The fundamental human right is an issue to be well taken off. The tracking of movements in bad places does not mean the agents will have a right to expose this to the public. The development of the location technologies has been subsidized in cell phones and in the car systems, and their costs are affordable.

This will help the United States government to develop it as it will not bear much economic weight. The main point of this privacy and surveillance essay is that there is a need to constitute laws and regulations responsible for governing individual privacy in surveillance. No one has a right to carelessly expose somebody’s information without been given that consent.

Do you want to get a custom essay on surveillance written for you from scratch by real masters of their craft? Place an order now, and a professional writer will compose a state-of-the-art original essay in just 3 hours or less!

Order Your Own Unique Essay!

This essay intro has been used by many students, but we can write you a perfect new one!

Order Here!

surveillance essay

Surveillance Essay Some might say that surveillance is an arbitrary invasion of privacy and others might mention that it is ¨big brother¨ watching over you with your best interest at hand. The controversial issues that provoked controversy, is whether it is justifiable or not justifiable for people in positions of authority to conduct ...

Writing an essay on surveillance is important because it allows individuals to critically analyze and discuss the impact of surveillance on society, privacy, and individual freedoms. Surveillance has become an integral part of modern life, with the widespread use of technology and the collection of personal data.

In the form of the surveillance essay current writers from many disciplines and perspectives (e.g., political economy, social control, law and society, and criminology) draw on and extend the earlier theorists to describe the appearance of a new kind of society with new forms of social ordering (Table 1).

In George Orwell's novel 1984 Big Brother controls the population of Oceania through many ways. One of these ways is surveillance; monitoring everyone's every move. This instills fear in the people in their everyday lives to carry out their moves and actions a certain way.

Surveillance Cameras in Public Safety. Words: 476 Pages: 2 5442. The 'safe city' project in Mauritius has been implemented due to high crime rates in various cases, such as rape and theft. The recent rise in crime has resulted in increasing fear and insecurity among the people. This is an essay on surveillance cameras in public places.

The Ethics (or not) of Massive Government Surveillance

Surveillance is the concept that is widely used today in the context of developing strategies for preventing crimes and guaranteeing security. Thus, surveillance is the process of gathering and analyzing information to prevent criminal activities and develop an adequate response to illegal actions through supervising.

Some potential topics include: 1. The rise of retail theft during the COVID-19 pandemic and the challenges faced by law enforcement in addressing this issue. 2. The use of technology, such as surveillance cameras and facial recognition software, in the investigation of theft cases. 3.

Benefits of surveillance cameras in public places (essay) Surveillance cameras in public places are very helpful and important in today's life because they decrease crime rate and improve public safety. It is clear that surveillance cameras in public places have a big impact of declining the rate of crime and protect people' life and property.

Essay Samples on Surveillance. Essay Examples. Essay Topics. Surveillance in George Orwell's "1984": The Perils of Totalitarian Control. George Orwell's novel "1984" serves as a chilling depiction of a dystopian society where surveillance is used as a tool of control and manipulation. The novel explores the devastating consequences of a ...

Your Life, Under Constant Surveillance. Bruce Schneier. CNN. October 16, 2013. Historically, surveillance was difficult and expensive. Over the decades, as technology advanced, surveillance became easier and easier. Today, we find ourselves in a world of ubiquitous surveillance, where everything is collected, saved, searched, correlated and ...

Importance of surveillance. To my opinion, Taylor is right. Uses of surveillance increases citizen's safety and promotes moral accepted standards by enhancing reduction of crimes, encouraging observance of law, discouraging corruption, and promoting social codes of conducts. Surveillance contributes immensely towards the reduction of crimes ...

Foucault, and many of those in the surveillance essay and dystopian novelist tradition, collapse or reduce the more general process or activity of surveillance to just one context—the organizational— to one goal, which is control, a term often used interchangeably with domination and repression. This needs to be seen along with other goals.

An Essay on Domestic Surveillance Philip B. Heymann* INTRODUCTION Whoever becomes president in the decades ahead may inherit extensive institutional knowledge (or the capacity to create such knowledge) about almost every citizen's beliefs, concerns, ambitions, interests, fears, actions, intentions, and associates.

Essay On Government Surveillance. organizations especially the government constantly watches each and every one of our moves. By definition, surveillance is any systematic focus on any information in order to influence, manage, entitle, or control those whose information is collected. (Bennet et Al, 6). From driving to the shopping mall to ...

This essay will argue that the advantages do not outweigh the disadvantages because surveillance cameras do not deter serious criminals and the vast majority of people they record are innocent members of society who have a right to privacy. Most advocates of increased surveillance argue that cameras deter crime because criminals are less likely ...

Mechanisms of Control in 1984. The control mechanisms in 1984 are multifaceted, encompassing both technological surveillance and psychological manipulation. One of the most pervasive tools is the telescreen, a device that enables the Party to monitor citizens continually.The telescreen is emblematic of the Party's omnipresent surveillance, instilling fear and ensuring conformity.

In this essay about privacy, surveillance is defined as the close monitoring of the actions of a specific individual. The surveillance technology systems are devices that identify monitors and track the movements and data. Surveillance has raised a lot of concerns in privacy issues in the advancing technology.

Throughout this essay, I will be assessing the degree to which our rights are at risk with reference to the close observation of civilians. Mass surveillance is the practise of supervising the population's actions, locations and communications. It can be carried out by the government or other corporations on their own initiative.

Human Rights Watch weighed in repeatedly throughout 2013 on the human rights implications of Snowden's revelations of mass surveillance, and the need to protect whistleblowers. This essay looks ...

  • business plan
  • course work
  • research paper

Did You Know That We Offer Contract to Closing Services? Click Here to Find Out More.

Need Marine Financing? Apply Here With Our Partner, First Approval Source

  • Catamaran Interviews
  • Catamaran Reviews
  • Buying Advice
  • Selling Advice
  • Woods Design Advice
  •     Admiral 38
  •     Admiral 40
  •     Admiral 50
  •     Americat 3014
  •     Antares 44
  •     Aquila 44
  •     Aquila 48 Power Catamaran
  •     Aventura 37
  •     Balance 442
  •     Balance 482
  •     Balance 526
  •     Bali 4.0
  •     Bali 4.1
  •     Bali 4.2
  •     Bali 4.3
  •     Bali 4.4
  •     Bali 4.5
  •     Bali 4.6
  •     Bali 4.8
  •     Bali 40 Catspace
  •     Bali 5.4
  •     Bali Catsmart
  •     Beneteau Blue II
  •     Broadblue 346
  •     Broadblue 38 Prestige
  •     Broadblue 385
  •     Broadblue 435
  •     Broadblue 46
  •     Rapier 400
  •     Rapier 550
  •     Catalac 10M
  •     Catalac 11M
  •     Catalac 12M
  •     Catalac 8M
  •     Catalac 900
  •     Catalac 9M
  •     Catana 381
  •     Catana 39
  •     Catana 401
  •     Catana 40S
  •     Catana 411
  •     Catana 42
  •     Catana 42 S
  •     Catana 431
  •     Catana 44
  •     Catana 471
  •     Catana 50
  •     Catana 521
  •     Catana 531
  •     Catana 55
  •     Catana 581
  •     Catana 65
  •     Catathai 44
  • Chris White
  •     Chris White 48 Voyager
  •     Chris White 55
  •     Condor 40
  •     Contour 34
  •     Corsair F28 R
  • De Villiers
  •     Dean 365
  •     Dean 400
  •     Dean 440
  •     Dean 500
  •     Dix DH550
  •     Dolphin 380
  •     Dolphin 460
  •     Edel 35
  •     Endeavour 30
  •     Endeavour 35 Victory
  •     Endeavour 36
  •     Endeavour 44
  •     Endeavour 44 TrawlerCat
  •     Endeavour 50 Pilothouse Trawler
  •     Excess 11
  •     Excess 15
  •     F-41
  •     Fastback 43
  •     Fastcat 445
  •     Fisher 28
  •     Fisher 32
  •     Fortuna 36 Island Spirit
  •     Fortuna 401 Island Spirit
  • Fountaine Pajot
  •     FP 32 Maldives
  •     FP 35 Tobago
  •     FP 36 Mahe
  •     FP 37 Antigua
  •     FP 38 Athena
  •     FP 39 Fidji
  •     FP 40 Isla
  •     FP 40 Lavezzi
  •     FP 40 Lucia
  •     FP 40 MY
  •     FP 40 Summerland MY
  •     FP 41 Lipari
  •     FP 42 Astrea
  •     FP 42 Venezia
  •     FP 43 Belize
  •     FP 44 Helia
  •     FP 44 Orana
  •     FP 45 Elba
  •     FP 46 Bahia
  •     FP 46 Casamance
  •     FP 48 Salina
  •     FP 50 Saba
  •     FP 56 Marquises
  •     FP 57 Sanya
  •     FP 58 Ipanema
  •     FP 60 Eleuthera
  •     FP Saona 47
  •     Fusion 40
  •     Gemini 105
  •     Gemini 3000
  •     Gemini 3200
  •     Gemini 3400
  •     Gemini Freestyle 37
  •     Gemini Freestyle 399 Power
  •     Gemini Legacy 35
  •     Grainger 420 Mystery Cove
  •     Gunboat 55
  •     Hirondelle 7M
  •     HopYacht 30
  • Island Packet
  •     Island Packet Cat 35
  •     Kennex 420
  •     Knysna 440
  •     Knysna 480
  •     Knysna 500
  •     Knysna 550
  •     Lagoon 35
  •     Lagoon 37 TPI
  •     Lagoon 380
  •     Lagoon 39
  •     Lagoon 40
  •     Lagoon 400
  •     Lagoon 410
  •     Lagoon 42
  •     Lagoon 42 TPI
  •     Lagoon 420
  •     Lagoon 421
  •     Lagoon 43 PC
  •     Lagoon 44 Power Cat
  •     Lagoon 440
  •     Lagoon 450
  •     Lagoon 46
  •     Lagoon 470
  •     Lagoon 50
  •     Lagoon 500
  •     Lagoon 52F
  •     Lagoon 55
  •     Lagoon 560
  •     Lagoon 570
  •     Lagoon 620
  •     Lagoon Seventy 8
  •     Lagoon Sixty 7
  •     Leeuwin 42
  •     Leopard 38
  •     Leopard 39
  •     Leopard 39 PowerCat
  •     Leopard 40
  •     Leopard 42
  •     Leopard 43
  •     Leopard 44
  •     Leopard 45
  •     Leopard 45 Classic
  •     Leopard 46
  •     Leopard 46 Lion PowerCat
  •     Leopard 47
  •     Leopard 47 PowerCat
  •     Leopard 48
  •     Leopard 50
  •     Leopard 51 PowerCat
  •     Leopard 53 PowerCat
  •     Leopard 58
  •     Lidgard 73 Executive
  •     Looping 50
  •     Maine Cat 30
  •     Maine Cat 38
  •     Maine Cat 41
  •     Manta 40
  •     Manta 42
  •     Matrix 450 Vision
  •     Matrix 760 Silhouette
  •     Maverick 400
  •     Maverick 420
  •     Maverick 440
  •     Moxie 61
  •     Nautitech 40
  •     Nautitech 40 Open
  •     Nautitech 44 Open
  •     Nautitech 442
  •     Nautitech 46 Open
  •     Nautitech 47
  •     Nautitech 47 Power
  •     Nautitech 475
  •     Nautitech 65
  •     Neel 45
  •     Neel 47
  •     Outremer 40
  •     Outremer 45
  •     Outremer 50 Standard
  •     Outremer 55
  •     Outremer 5X
  •     PDQ 32
  •     PDQ 36
  •     PDQ 42 Antares
  •     Privilege 37
  •     Privilege 39
  •     Privilege 42
  •     Privilege 43
  •     Privilege 435
  •     Privilege 45
  •     Privilege 465
  •     Privilege 48 Transcat
  •     Privilege 482
  •     Privilege 495
  •     Privilege 510
  •     Privilege 65
  •     Privilege Serie 5
  •     Prout 31 Quest
  •     Prout 33 Quest
  •     Prout 34 Event
  •     Prout 35 Snowgoose
  •     Prout 37 Snowgoose
  •     Prout 37 Snowgoose Elite
  •     Prout 38
  •     Prout 38 Manta
  •     Prout 39 Escale
  •     Prout 45
  •     Prout 46
  •     Royal Cape 45
  •     Royal Cape 500 Majestic
  •     Royal Cape 530 Majestic
  •     Sailcraft 30 Iroquois
  •     Sailcraft 32 Comanche
  •     Sailcraft 35 Cherokee
  •     Sailcraft 41 Apache
  •     Sailcraft 44 Apache
  •     Scape 39
  •     Wildcat 350
  •     Seacart 30
  •     Seawind 1000
  •     Seawind 1160
  •     Seawind 1190
  •     Seawind 1200
  •     Seawind 1260
  •     Seawind 1600
  •     Simpson 48
  •     Solaris 36 Sunrise
  •     Solaris 36 Sunstar
  •     Solaris 42
  •     St Francis 44
  •     St Francis 48
  •     St Francis 50
  •     Stealth 11.8
  •     Sunreef 60
  •     Sunreef 62
  •     Sunreef 70
  •     Sunreef 74C
  •     Sunreef 82 DD
  •     Sunreef 88 DD
  •     Switch 51
  •     Switch 55
  •     TRT 1200
  •     Heavenly Twins 26
  •     Ocean Twins 38
  •     Vaan R5
  •     Vision 444
  •     Voyage 380 Maxim
  •     Voyage 400 Norseman
  •     Voyage 430 Norseman
  •     Voyage 440
  •     Voyage 450 Cabriolet
  •     Voyage 47 Mayotte
  •     Voyage 480
  •     Voyage 500
  •     Voyage 580
  •     Voyage 590
  •     Kronos 45
  •     Wharram 38 Tiki
  •     AMI 320 Renaissance
  •     Woods 22 Wizard
  •     Woods 35 Banshee
  •     Woods 35 Flica
  •     Woods 36 Scylla
  •     Woods 36 Vardo
  •     Woods 38 Transit
  •     Woods 40 Meander
  •     Xquisite X5
  •     Xquisite X5+

Brand: Sailcraft

sailcraft comanche catamaran for sale

Sailcraft with Rod McAlpine-Downie as the designer, built the first mass produced glass fibre catamarans the world had seen. This is a classic UK builder of catamarans from the 1960’s to 1980’s.

sailcraft comanche catamaran for sale

There are no catamarans currently for sale of this brand.

Please see our catamarans for sale page for a full listing of other currently available models.

sailcraft comanche catamaran for sale

  • Realting.com
  • Omsk Oblast
  • Residential

Houses for sale in Omsk Oblast, Russia

Similar properties in the surrounding area.

Apartment in Nizhny Novgorod, Russia

Properties features in Omsk Oblast, Russia

IMAGES

  1. Sailcraft Comanche 32 For Sale, 9.75m, 1980

    sailcraft comanche catamaran for sale

  2. 1980 Sailcraft Comanche Deluxe

    sailcraft comanche catamaran for sale

  3. 1978 Sailcraft Comanche Cruiser for sale

    sailcraft comanche catamaran for sale

  4. 1980 Sailcraft Comanche sailboat for sale in Florida

    sailcraft comanche catamaran for sale

  5. Sail Craft Comanche 32' Catamaran, 1978, Nassau, Bahamas, to South

    sailcraft comanche catamaran for sale

  6. Sailcraft Comanche for sale UK, Sailcraft boats for sale, Sailcraft

    sailcraft comanche catamaran for sale

VIDEO

  1. 2004 Cabo 43 Flybridge "Miss Christina" For Sale

  2. Canadian SailCraft April 2022

  3. Rare 1986 Jeep Comanche 4 Sale

  4. Breezeway Yachts 1985 CS30 Galaxsea SOLD

  5. 1965 Piper Comanche PA24-260 For Sale

  6. Skoota 28

COMMENTS

  1. Sailcraft 32 Comanche Catamarans For Sale

    Sailcraft 32 Comanche. The Comanche is a pocket cruising catamaran. As economical as it gets, she motors at 5-6 knots while only using 2/3s of a gallon of fuel per hour. Built in England using only materials approved for marine use through Lloyd's Of London, which makes this boat as solid as they come. Has buoyancy chambers at all four ...

  2. 1980 Sailcraft Comanche sailboat for sale in Florida

    1980. 32'. 13'10'. 3.5'. Florida. $60,000. Description: Propulsion: Twin 9.9 Yamaha 4 stroke High Thrust 9.9 Outboards. 9 Gallon fuel tank for main engine and 2 separate 3 gallons fuel tank for second engine. Both engines have electric trim and starter.

  3. Commanche 32 For Sale, 9.80m, 1980

    This Comanche 32 presents a great opportunity to the DIY enthusiast or boat builder to secure ownership of a 32 foot Catamaran and through its refurbishment make the vessel your own. Most electrical, electronic and mechanical systems on board will require test, repair, and or replacement. She presents the impression of being strongly built with ...

  4. 1980 Sailcraft Comanche Deluxe

    Seller's Description. SALE PENDING AS OF 6/28/20 S/V Cadenza is a US Coast Guard documented Comanche 32 Deluxe Catamaran built by Sailcraft Ltd. in Essex England. Using only materials certified for marine use by Loyd's of London. This boat is as solid as they come. Not a mass production boat The 13.10" beam allows her to fit in a standard ...

  5. Sail Craft Comanche 32' Catamaran, 1978, Nassau, Bahamas, to South

    Go to Sailing Texas classifieds for current sailboats for sale . Sail Craft Comanche 32' Catamaran, 1978 $47,000 but would entertain trades of equal or greater value located in Nassau, Bahamas, but headed back to South Florida very soon Well built, solid glass hull boat by a reputable company with fixed, beachable keels 3.3' draft

  6. COMANCHE 32 (SAILCRAFT)

    LENGTH: Traditionally, LOA (length over all) equaled hull length. Today, many builders use LOA to include rail overhangs, bowsprits, etc. and LOD (length on deck) for hull length. That said, LOA may still mean LOD if the builder is being honest and using accepted industry standards developed by groups like the ABYC (American Boat and Yacht Council).

  7. Boat Review by Multihulls World of: Catamaran Comanche 32

    Articles about the Comanche 32. Available in issue # 178. Boat Test price 3.00€ Inc. tax. Purchase. Its faceted coachroof and (very) raked bows obviously give the Comanche 32 a dated silhouette, but this model deserves attention, if only because of the rather affordable price. Despite her short length, the Comanche 32 is well suited to long ...

  8. Comanche For Sale

    FOR SALE COMANCHE 105 CATAMARAN (35') ... LOA 35' Beam 13'10" Draft 3'2" Built UK Sailcraft (1979), launched 1980 Canada ... 1980 Comanche 32/35 Built by Sailcraft, UK (1979), launched Lake Huron 1981 LOA 35 feet BOA 13 feet 10 inches LWL 31 feet

  9. New and used Sailcraft Comanche boats for sale

    We have Sailcraft Comanche brokers and sellers from around the world at great prices. Order by Date listed - newest first Date listed - oldest first Price - low to high Price - high to low Length - low to high Length - high to low Make/model - A-Z Make/model - Z-A Country - A-Z Country - Z-A Year - newest first Year - oldest first

  10. Sailcraft sailboats for sale by owner.

    Sailcraft preowned sailboats for sale by owner. Sailcraft used sailboats for sale by owner. Home. Register & Post. View All Sailboats. Search. ... Sailcraft Comanche: Length: 32' Beam: 13'10' Draft: 3.5' Year: 1980: Type: other: Hull: fiberglass catamaran: ... 43' CSK Catamarans Polycon Cabrillo way Marina, California Asking $115,000. 21 ...

  11. Sailcraft Comanche for sale UK, Sailcraft boats for sale, Sailcraft

    Sailcraft Comanche For Sale UK. ... She offers more comfort and a load capacity far superior to other mid size catamarans. The Comanche 32 is well suited to long distance cruising: she is seaworthy for her size and is safe, thanks to its' watertight compartments and easy motion. The clearance under the bridge deck avoids the slamming and noise ...

  12. Sailcraft sailboats for sale by owner.

    Sailcraft preowned sailboats for sale by owner. Sailcraft used sailboats for sale by owner.

  13. Sailcraft Comanche 32 For Sale, 9.75m, 1980

    Sailcraft Comanche 32 for sale | 9.75m | 1980 | 2x diesel 16hp | GRP Construction | Multihull underwater profile | 8 berths | Boat REF# 50371

  14. 1980 Sailcraft Comanche for sale. View price, photos and Buy 1980

    Key features 1980 Sailcraft Comanche: length 9.82 meters, beam 4.2 meters and max boat draft 1.2 meters. Inboard Diesel YANMAR18 HP engine: fuel type - diesel. Total berths - 6. 1980 Sailcraft Comanche refers to classes: multihull sailboats, sailboats, sailing catamarans and sailing sloops. To clarify the price €42,000 and buy Sailcraft ...

  15. Sailcraft Comanche for sale UK, Sailcraft boats for sale, Sailcraft

    Sailing Yachts: For Sale: Commanche 32 039 Catamaran Dart Devon. Boats for sale: International > Sailing Yachts. View 8834 boats for sale in the United Kingdom ... Comanche 32 ft catamaran £29,000. Catena is in good condition, ideal for family or possibly live aboard. New windows, 25 hp honda inboard outboard in central well, pressurised hot ...

  16. Sailcraft Comanche 32

    Sailcraft Comanche 32 is a 32′ 2″ / 9.8 m catamaran sailboat designed by J.R. (Rod) Macalpine-Downie and built by Sailcraft Ltd. starting in 1978. ... Sailcraft Comanche 32 is a 32 ... For Sale View More . Have a sailboat to sell? List it for free and it will show up here. Advertisement. Great choice! Your favorites are temporarily saved ...

  17. 2e hands Sail Craft Comanche 10m kajuitcatamaran te koop in Zeeland

    Pictures of an excellent pre owned Comanche 32 Sail Craft cruising catamaran for sale in Zeeland-Netherlands. SAIL CRAFT COMANCHE 32 "Woelwater" # 77160 Bwjr./Launched: 1978. ... The Comanche by Sailcraft is the result of all experiences gained by the designer McAlpine Downie and the builders with her illustrious predecessors: Iroquois ...

  18. Residential properties for sale in Omsk Oblast, Russia

    Find Residential properties for Sale in Omsk Oblast, Russia Large selection of residential properties in latest listings Actual prices Photos Description and Location on the map.

  19. Real estate listings Omsk. Apartments and houses for rent Omsk

    Located in Омск. 269 sqft floor 8 Kirovskiy. USD 238 / month. Located in Омск. 452 sqft floor 5 Kirovskiy. USD 453 / month. 678 sqft floor 6 Kirovskiy. USD 91 / month. 1 bd 409 sqft floor 5 Omsk.

  20. Sailcraft 35 Cherokee Catamarans For Sale

    Brand: Sailcraft 35 Cherokee. Brand: Sailcraft 35 Cherokee. The ever popular Cherokee 35 catamaran was designed by Rod Macalpine-Downie and solidly built by Sailcraft Ltd UK. Proven offshore performer featuring a large and well protected cockpit. Spacious saloon and galley, three cabins, two heads and workshop.

  21. compac 19 sailboat for sale

    Com Pac 19 Boats for sale. 1-6 of 6. Alert for new Listings. Sort By. 1986 Com-Pac 19. $5,995 . Traverse City, Michigan. Year 1986 . Make Com-Pac ... 1988 Compac Yacht Compac Designed by Robert K. Johnson, the Com-Pac 19 offers berths for four with sitting headroom. There is storage beneath the forepeak berth and also a discrete place for a head....

  22. Sailcraft Catamarans For Sale

    Sailcraft with Rod McAlpine-Downie as the designer, built the first mass produced glass fibre catamarans the world had seen. This is a classic UK builder of catamarans from the 1960's to 1980's. Sailcraft 30 Iroquois Sailcraft 32 Comanche Sailcraft 35 Cherokee Sailcraft 41 Apache Sailcraft 44 Apache

  23. Houses for sale in Omsk Oblast, Russia

    Find Houses for Sale in Omsk Oblast, Russia Large selection of Houses in latest listings Actual prices Photos Description and Location on the map.