Startseite A Neo-Republican Theory of Just State Surveillance
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

A Neo-Republican Theory of Just State Surveillance

  • Patrick Taylor Smith EMAIL logo
Veröffentlicht/Copyright: 20. Juni 2020

Abstract

This paper develops a novel, neo-republican account of just state surveillance in the information age. The goal of state surveillance should be to avoid and prevent domination, both public and private. In light of that conception of justice, the paper makes three substantive points. First, it argues that modern state surveillance based upon information technology and predicated upon a close partnership with the tech sector gives the state significant power and represents a serious potential source of domination. Second, it argues that, nonetheless, state surveillance can serve legitimate republican ends and so unilateral and private technological attempts to block it may be wrongful. Third, it argues that, despite the serious normative failings of current institutions, state surveillance can be justly regulated and made accountable through a legal liability regime that incentivizes tech company intermediaries to ally with civil society groups in order to safeguard the privacy rights of potential subjects of state surveillance.

Acknowledgements

I owe much gratitude to the workshop ‘The Ethics of Mass State Surveillance’ at Karlrsuhe Institute of Technology. I owe additional thanks to Kevin Macnish, Peter Königs, and two anonymous reviewers.

References

Aitchinson, G. (2016). ‘Three Models of Republican Rights: Juridical, Parliamentary and Populist’, Political Studies 65 (2): 339–355.10.1177/0032321716648339Suche in Google Scholar

Anonymous. (2018). ‘Cooperation or Resistance: The Role of Tech Companies in Government Surveillance’, Harvard Law Review 131 (6): 1722–1741.Suche in Google Scholar

Bauman, Z. (2006). Liquid Fear (Cambridge, MA: Polity).Suche in Google Scholar

Bauman, Z., Bigo, D., and Esteves, P. (2014). ‘After Snowden: Rethinking the Impact of Surveillance’, International Political Sociology 8 (2): 121–144.10.1111/ips.12048Suche in Google Scholar

Bellamy, R. (2013). ‘Rights, Republicanism and Democracy’, in A. Niederberger and P. Schink (eds.). Republican Democracy: Liberty, Laws and Politics (Edinburgh: Edinburgh University Press): 253–275.10.3366/edinburgh/9780748643066.003.0011Suche in Google Scholar

Calabresi, G. (1961). ‘Some Thoughts on Risk Distribution and the Law of Torts’, Yale Law Journal 70 (4): 499–553.10.2307/794261Suche in Google Scholar

Cole, D. (2014). ‘The Three Leakers and What to Do about Them’, The New York Review of Books February 6.Suche in Google Scholar

Currier, J. (2017). ‘70% of Value in Tech Is Driven by Network Effects’, NfX, November 28. https://medium.com/@nfx/70-of-value-in-tech-is-driven-by-network-effects-8c4788528e35 (Accessed July 1st, 2019).Suche in Google Scholar

Diamond, L. (1994). ‘Rethinking Civil Society’, Journal of Democracy 5 (3): 4–17.10.1353/jod.1994.0041Suche in Google Scholar

Hess, A. (2016). ‘The Far Right Has a New Digital Safe Space’, The New York Times November 30.Suche in Google Scholar

Hoye, J.M. and Monaghan, J. (2015). ‘Surveillance, Freedom and the Republic’, European Journal of Political Theory 17 (3): 343–363.10.1177/1474885115608783Suche in Google Scholar

Human Rights Watch. (2018). ‘The EU General Data Protection Regulation: Questions and Answers’, https://www.hrw.org/news/2018/06/06/eu-general-data-protection-regulationSuche in Google Scholar

Johnson, V. (2008). ‘Data Security and Tort Liability’, Journal of Internet Law 11 (7): 22–31.Suche in Google Scholar

Katz, M. and Shapiro, C. (1994). ‘System Competition and Network Effects’, Journal of Economic Perspectives 8 (2): 93–115.10.1257/jep.8.2.93Suche in Google Scholar

Kisielewski, A. (2016). ‘To Encrypt or Not Encrypt’, The Century Foundation, May 5. https://tcf.org/content/commentary/snowden-v-zakaria-debate-encrypt-not-encrypt/?agreed =1 (Accessed April 25, 2020) .Suche in Google Scholar

Klein, S. and Lee, C.-S. (2019). ‘Towards a Dynamic Theory of Civil Society: The Politics of Forward and Backward Infiltration’, Sociological Theory 37 (1): 62–88.10.1177/0735275119830451Suche in Google Scholar

Laborde, C. (2010). ‘Republicanism and Global Justice: A Sketch’, European Journal of Political Theory 9 (1): 48–69.10.1177/1474885109349404Suche in Google Scholar

Lovett, F. (2010). A General Theory of Domination and Justice (Oxford: Oxford University Press).10.1093/acprof:oso/9780199579419.001.0001Suche in Google Scholar

Macnish, K. (2014). ‘Just Surveillance? Towards a Normative Theory of Surveillance’, Surveillance & Society 12 (1): 142–153.10.24908/ss.v12i1.4515Suche in Google Scholar

Macnish, K. (2015). ‘An Eye for an Eye: Proportionality and Surveillance’, Ethical Theory and Moral Practice 18 (3): 529–548.10.1007/s10677-014-9537-5Suche in Google Scholar

Peterson, A. (2013). ‘LOVEINT: When NSA Officers Use Their Spying Power on Love Interests’. The Washington Post, August 8.Suche in Google Scholar

Pettit, P. (1997). Republicanism: A Theory of Freedom and Government (Oxford: Oxford University Press).Suche in Google Scholar

Pettit, P. (2012). On the People’s Terms: A Republican Philosophy of Democracy (Cambridge: Cambridge University Press).10.1017/CBO9781139017428Suche in Google Scholar

Priel, D. (2010). ‘A Public Role for the Intentional Torts’, King’s Law Journal 22 (2): 183–208.10.1017/CBO9781139856478.014Suche in Google Scholar

Ripstein, A. (2009). Force and Freedom: Kant’s Moral and Political Philosophy (Cambridge: Harvard University Press).10.4159/9780674054516Suche in Google Scholar

Roberts, A. (2015). ‘A Republican Account of the Value of Privacy’, European Journal of Political Theory 14 (3): 320–344.10.1177/1474885114533262Suche in Google Scholar

Rozenshtein, A. (2018). ‘Surveillance Intermediaries’, Stanford Law Review 70 (1): pp. 91–189.Suche in Google Scholar

Silva, R. (2015). ‘Non-Domination and Political Institutions: The Contested Concept of Republican Democracy’, Brazilian Political Science Review 9 (1): 3–38.10.1590/1981-38212014000200001Suche in Google Scholar

Smith, P.T. (2019). ‘A Normative Foundation for Statism’, Critical Review of Social and Political Philosophy Early view 10.1080/13698230.2019.1567207.Suche in Google Scholar

Smith v. Maryland(1979) 442 U.S. 735.10.1128/jb.137.2.735-739.1979Suche in Google Scholar

Solove, D. and Citron, D. (2017). ‘Risk and Anxiety: A Theory of Data-Breach Harms’, Texas Law Review 96: 737.10.2139/ssrn.2885638Suche in Google Scholar

Stahl, T. (2016). ‘Indiscriminate Mass Surveillance and the Public Sphere’, Ethics of Information Technology10.1007/s10676-016-9392-2.Suche in Google Scholar

Stilz, A. (2009). Liberal Loyalty: Freedom, Obligation, and the State (Princeton: Princeton University Press).10.1515/9781400830701Suche in Google Scholar

Taylor, I. (2017). ‘Data Collection, Counterterrorism and the Right to Privacy’, Politics, Philosophy, and Economics 16 (3): 326–346.10.1177/1470594X17715249Suche in Google Scholar

Zittrain, J. (2008). The Internet and How to Stop It (New Haven: Yale University Press).Suche in Google Scholar

Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (New York: Public Affairs).Suche in Google Scholar

Published Online: 2020-06-20
Published in Print: 2020-05-26

© 2020 Walter de Gruyter GmbH, Berlin/Boston

Heruntergeladen am 7.9.2025 von https://www.degruyterbrill.com/document/doi/10.1515/mopp-2019-0032/html
Button zum nach oben scrollen