{"id":263619,"date":"2014-07-07T13:25:44","date_gmt":"2014-07-07T17:25:44","guid":{"rendered":"https:\/\/policyoptions.irpp.org\/issues\/greenwald\/"},"modified":"2025-10-07T20:53:21","modified_gmt":"2025-10-08T00:53:21","slug":"greenwald","status":"publish","type":"issues","link":"https:\/\/policyoptions.irpp.org\/fr\/2014\/07\/greenwald\/","title":{"rendered":"The harm of surveillance"},"content":{"rendered":"<p class=\"dropcap-big\">Governments around the world have made vigorous attempts to train citizens to disdain their own privacy. A litany of now-familiar platitudes has convinced people to tolerate severe encroachments into their private realm; so successful are these justifications that many people applaud as the authorities collect vast amounts of data about what they say, read, buy, and do \u2014 and with whom.<\/p>\n<p>Those state authorities have been assisted in their assault on privacy by a chorus of Internet moguls \u2014 the government&#8217;s indispensable partners in surveillance. When Google CEO Eric Schmidt was asked in a 2009 CNBC interview about concerns over his company&#8217;s retention of user data, he infamously replied: \u201cIf you have something that you don&#8217;t want anyone to know, maybe you shouldn&#8217;t be doing it in the first place.\u201d With equal dismissiveness, Facebook founder and CEO Mark Zuckerberg said in a 2010 interview that \u201cpeople have really gotten comfortable not only sharing more information and different kinds, but more openly and with more people.\u201d Privacy in the digital age is no longer a \u201csocial norm,\u201d he claimed, a notion that handily serves the interests of a tech company trading on personal information.<\/p>\n<p>But the importance of privacy is evident in the fact that even those who devalue it, who have declared it dead or dispensable, do not believe the things they say. Anti-privacy advocates have often gone to great lengths to maintain control over the visibility of their own behavior and information. The US government itself has used extreme measures to shield its actions from public view, erecting an ever-higher wall of secrecy behind which it operates. As a 2011 report from the ACLU argued, \u201cToday much of our government&#8217;s business is conducted in secret.\u201d So secretive is this shadowy world, \u201cso large, so unwieldy,\u201d as the Washington Post reported, \u201cthat no one knows how much money it costs, how many people it employs, how many programs exist within it or exactly how many agencies do the same work.\u201d<\/p>\n<p>Similarly, those Internet tycoons who are so willing to devalue our privacy are vehemently protective of their own. Google insisted on a policy of not talking to reporters from CNET, the technology news site, after CNET published Eric Schmidt&#8217;s personal details \u2014 including his salary, campaign donations, and address, all public information obtained via Google \u2014 in order to highlight the invasive dangers of his company.<\/p>\n<p>Meanwhile, Mark Zuckerberg purchased the four homes adjacent to his own in Palo Alto, at a cost of $30 million, to ensure his privacy. As CNET put it, \u201cYour personal life is now known as Facebook&#8217;s data. Its CEO&#8217;s -personal life is now known as mind your own business.\u201d<\/p>\n<p>The same contradiction is expressed by the many ordinary citizens who dismiss the value of privacy yet nonetheless have passwords on their email and social media accounts. They put locks on their bathroom doors; they seal the envelopes containing their letters. They engage in conduct when nobody is watching that they would never consider when acting in full view. They say things to friends, psychologists, and lawyers that they do not want anyone else to know. They give voice to thoughts online that they do not want associated with their names.<\/p>\n<p>The many pro-surveillance advocates I have debated since Snowden blew the whistle have been quick to echo Eric Schmidt&#8217;s view that privacy is for people who have something to hide. But none of them would willingly give me the passwords to their email accounts, or allow video cameras in their homes.<\/p>\n<p>When the Senate Intelligence Committee&#8217;s chair, Dianne Feinstein, insisted that the NSA&#8217;s collection of metadata does not constitute surveillance \u2014 because it does not include the content of any communication \u2014 online protesters demanded that she back up her assertion with action: Would the senator, each month, publish a full list of people she emailed and called, including the length of time they spoke and their physical locations when the call was made? That she would take up the offer was inconceivable precisely because such information is profoundly revealing; making it public would constitute a true breach of one&#8217;s private realm.<\/p>\n<p>The point is not the hypocrisy of those who disparage the value of privacy while intensely safeguarding their own, although that is striking. It is that the desire for privacy is shared by us all as an essential, not ancillary, part of what it means to be human. We all instinctively understand that the private realm is where we can act, think, speak, write, experiment, and choose how to be, away from the judgmental eyes of others. Privacy is a core condition of being a free person.<\/p>\n<p class=\"dropcap\">Perhaps the most famous formulation of what privacy means and why it is so universally and supremely desired was offered by US Supreme Court Justice Louis Brandeis in the 1928 case <em>Olmstead v. U.S.<\/em>: \u201cThe right to be left alone [is] the most comprehensive of rights, and the right most valued by a free people.\u201d The value of privacy, he wrote, \u201cis much broader in scope\u201d than mere civic freedoms. It is, he said, fundamental:<\/p>\n<p style=\"padding-left: 60px;\"><em>The makers of our Constitution undertook to secure conditions favorable to the pursuit of happiness. They recognized the significance of man&#8217;s spiritual nature, of his feelings and of his intellect. They knew that only a part of the pain, pleasure and satisfactions of life are to be found in material things. They sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the Government, the right to be let alone.<\/em><\/p>\n<p>Even before Brandeis was appointed to the Court, he was an ardent proponent of the importance of privacy. Together with lawyer Samuel Warren, he wrote the seminal 1890 <em>Harvard Law Review<\/em> article \u201cThe Right to Privacy,\u201d arguing that robbing someone of their privacy was a crime of a deeply different nature than the theft of a material belonging. \u201cThe principle which protects personal writings and all other personal productions, not against theft and physical appropriation, but against publication in any form, is in reality not the principle of private property, but that of an inviolate personality.\u201d<\/p>\n<p>Privacy is essential to human freedom and happiness for reasons that are rarely discussed but instinctively understood by most people, as evidenced by the lengths to which they go to protect their own. To begin with, people radically change their behavior when they know they are being watched. They will strive to do that which is expected of them. They want to avoid shame and condemnation. They do so by adhering tightly to accepted social practices, by staying within imposed boundaries, avoiding action that might be seen as deviant or abnormal.<\/p>\n<p>The range of choices people consider when they believe that others are watching is therefore far more limited than what they might do when acting in a private realm. A denial of privacy operates to severely restrict one&#8217;s freedom of choice.<\/p>\n<p>Several years ago, I attended the bat mitzvah of my best friend&#8217;s daughter. During the ceremony, the rabbi emphasized that \u201cthe central lesson\u201d for the girl to learn was that she was \u201calways being watched and judged.\u201d He told her that God always knew what she was doing, every choice, every action, and even every thought, no matter how private. \u201cYou are never alone,\u201d he said, which meant that she should always adhere to God&#8217;s will.<\/p>\n<p>The rabbi&#8217;s point was clear: if you can never evade the watchful eyes of a supreme authority, there is no choice but to follow the dictates that authority imposes. You cannot even consider forging your own path beyond those rules: if you believe you are always being watched and judged, you are not really a free individual.<\/p>\n<p>All oppressive authorities \u2014 political, religious, societal, parental \u2014 rely on this vital truth, using it as a principal tool to enforce orthodoxies, compel adherence, and quash dissent. It is in their interest to convey that nothing their subjects do will escape the knowledge of the authorities. Far more effectively than a police force, the deprivation of privacy will crush any temptation to deviate from rules and norms.<\/p>\n<p>What is lost when the private realm is abolished are many of the attributes typically associated with quality of life. Most people have experienced how privacy enables liberation from constraint. And we&#8217;ve all, conversely, had the experience of engaging in private behavior when we thought we were alone \u2014 dancing, confessing, exploring sexual expression, sharing untested ideas \u2014 only to feel shame at having been seen by others.<\/p>\n<p>Only when we believe that nobody else is watching us do we feel free \u2014 safe \u2014 to truly experiment, to test boundaries, to explore new ways of thinking and being, to explore what it means to be ourselves. What made the Internet so appealing was precisely that it afforded the ability to speak and act anonymously, which is so vital to individual exploration.<\/p>\n<p>For that reason, it is in the realm of privacy where creativity, dissent, and challenges to orthodoxy germinate. A society in which everyone knows they can be watched by the state \u2014 where the private realm is effectively eliminated \u2014 is one in which those attributes are lost, at both the societal and the individual level.<\/p>\n<p>Mass surveillance by the state is therefore inherently repressive, even in the unlikely case that it is not abused by vindictive officials to do things like gain private information about political opponents. Regardless of how surveillance is used or abused, the limits it imposes on freedom are intrinsic to its existence.<\/p>\n<p>Invoking George Orwell&#8217;s <em>1984<\/em> is something of a clich\u00e9, but the echoes of the world about which he warned in the NSA&#8217;s surveillance state are unmistakable: both rely on the existence of a technological system with the capacity to monitor every citizen&#8217;s actions and words. The similarity is denied by the surveillance champions \u2014 we&#8217;re not <em>always <\/em>being watched, they say \u2014 but that argument misses the point. In <em>1984<\/em>, citizens were not necessarily monitored at all times; in fact, they had no idea whether they were ever actually being monitored. But the state had the capability to watch them at any time. It was the uncertainty and possibility of ubiquitous surveillance that served to keep everyone in line.<\/p>\n<p><em>\u00a0Excerpted from <\/em>No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State<em>(Toronto: Signal, McLelland &amp; Stewart). \u00a9 2014 Glenn Greenwald. Used by permission.<\/em><\/p>\n<p><span class=\"image-caption\">Photo: Shutterstock\u00a0by\u00a0Gorodenkoff<\/span><\/p>\n<hr \/>\n<p><em>Do you have something to say about the article you just read? Be part of the\u00a0<\/em>Policy Options<em>\u00a0discussion, and send in your own submission.\u00a0Here is a\u00a0<\/em><a href=\"https:\/\/policyoptions.irpp.org\/article-submission\/\"><em>link<\/em><\/a><em>\u00a0on how to do it.\u00a0<\/em><em>|\u00a0Souhaitez-vous r\u00e9agir \u00e0 cet article ?\u00a0<\/em><em>Joignez-vous aux d\u00e9bats d\u2019<\/em>Options politiques\u00a0<em>et soumettez-nous votre texte en suivant ces\u00a0<\/em><a href=\"https:\/\/policyoptions.irpp.org\/fr\/article-submission\/\"><em>directives<\/em><\/a><em>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Governments around the world have made vigorous attempts to train citizens to disdain their own privacy. A litany of now-familiar platitudes has convinced people to tolerate severe encroachments into their private realm; so successful are these justifications that many people applaud as the authorities collect vast amounts of data about what they say, read, buy, [&hellip;]<\/p>\n","protected":false},"featured_media":250152,"template":"","meta":{"_acf_changed":false,"content-type":"","ep_exclude_from_search":false,"apple_news_api_created_at":"2025-10-08T00:53:24Z","apple_news_api_id":"4888518d-28e1-42d8-82fc-341cba526985","apple_news_api_modified_at":"2025-10-08T00:53:24Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/ASIhRjSjhQtiC_DQculJphQ","apple_news_cover_media_provider":"image","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_cover_video_id":0,"apple_news_cover_video_url":"","apple_news_cover_embedwebvideo_url":"","apple_news_is_hidden":"","apple_news_is_paid":"","apple_news_is_preview":"","apple_news_is_sponsored":"","apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":[],"apple_news_suppress_video_url":false,"apple_news_use_image_component":false},"categories":[9358,9383],"tags":[],"article-status":[],"irpp-category":[4295,4337],"section":[],"irpp-tag":[],"class_list":["post-263619","issues","type-issues","status-publish","has-post-thumbnail","hentry","category-politique","category-sciences-et-technologies","irpp-category-politique","irpp-category-science-et-technologie"],"acf":[],"apple_news_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The harm of surveillance<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/policyoptions.irpp.org\/fr\/2014\/07\/greenwald\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The harm of surveillance\" \/>\n<meta property=\"og:description\" content=\"Governments around the world have made vigorous attempts to train citizens to disdain their own privacy. A litany of now-familiar platitudes has convinced people to tolerate severe encroachments into their private realm; so successful are these justifications that many people applaud as the authorities collect vast amounts of data about what they say, read, buy, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/policyoptions.irpp.org\/fr\/2014\/07\/greenwald\/\" \/>\n<meta property=\"og:site_name\" content=\"Policy Options\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IRPP.org\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-08T00:53:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/The-harm-of-surveillance.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@irpp\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/policyoptions.irpp.org\\\/fr\\\/2014\\\/07\\\/greenwald\\\/\",\"url\":\"https:\\\/\\\/policyoptions.irpp.org\\\/fr\\\/2014\\\/07\\\/greenwald\\\/\",\"name\":\"The harm of surveillance\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/policyoptions.irpp.org\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/policyoptions.irpp.org\\\/fr\\\/2014\\\/07\\\/greenwald\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/policyoptions.irpp.org\\\/fr\\\/2014\\\/07\\\/greenwald\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/policyoptions.irpp.org\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/The-harm-of-surveillance.jpg\",\"datePublished\":\"2014-07-07T17:25:44+00:00\",\"dateModified\":\"2025-10-08T00:53:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/policyoptions.irpp.org\\\/fr\\\/2014\\\/07\\\/greenwald\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/policyoptions.irpp.org\\\/fr\\\/2014\\\/07\\\/greenwald\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/policyoptions.irpp.org\\\/fr\\\/2014\\\/07\\\/greenwald\\\/#primaryimage\",\"url\":\"https:\\\/\\\/policyoptions.irpp.org\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/The-harm-of-surveillance.jpg\",\"contentUrl\":\"https:\\\/\\\/policyoptions.irpp.org\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/The-harm-of-surveillance.jpg\",\"width\":2000,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/policyoptions.irpp.org\\\/fr\\\/2014\\\/07\\\/greenwald\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/policyoptions.irpp.org\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Politiques d&#8217;hier, politiques de demain\",\"item\":\"https:\\\/\\\/policyoptions.irpp.org\\\/fr\\\/2014\\\/07\\\/politiques-dhier-politiques-de-demain\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The harm of surveillance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/policyoptions.irpp.org\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/policyoptions.irpp.org\\\/fr\\\/\",\"name\":\"Policy Options\",\"description\":\"Institute for Research on Public Policy\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/policyoptions.irpp.org\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The harm of surveillance","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/policyoptions.irpp.org\/fr\/2014\/07\/greenwald\/","og_locale":"fr_FR","og_type":"article","og_title":"The harm of surveillance","og_description":"Governments around the world have made vigorous attempts to train citizens to disdain their own privacy. A litany of now-familiar platitudes has convinced people to tolerate severe encroachments into their private realm; so successful are these justifications that many people applaud as the authorities collect vast amounts of data about what they say, read, buy, [&hellip;]","og_url":"https:\/\/policyoptions.irpp.org\/fr\/2014\/07\/greenwald\/","og_site_name":"Policy Options","article_publisher":"https:\/\/www.facebook.com\/IRPP.org","article_modified_time":"2025-10-08T00:53:21+00:00","og_image":[{"width":2000,"height":700,"url":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/The-harm-of-surveillance.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@irpp","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/policyoptions.irpp.org\/fr\/2014\/07\/greenwald\/","url":"https:\/\/policyoptions.irpp.org\/fr\/2014\/07\/greenwald\/","name":"The harm of surveillance","isPartOf":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/2014\/07\/greenwald\/#primaryimage"},"image":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/2014\/07\/greenwald\/#primaryimage"},"thumbnailUrl":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/The-harm-of-surveillance.jpg","datePublished":"2014-07-07T17:25:44+00:00","dateModified":"2025-10-08T00:53:21+00:00","breadcrumb":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/2014\/07\/greenwald\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/policyoptions.irpp.org\/fr\/2014\/07\/greenwald\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/policyoptions.irpp.org\/fr\/2014\/07\/greenwald\/#primaryimage","url":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/The-harm-of-surveillance.jpg","contentUrl":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/The-harm-of-surveillance.jpg","width":2000,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/policyoptions.irpp.org\/fr\/2014\/07\/greenwald\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/policyoptions.irpp.org\/fr\/"},{"@type":"ListItem","position":2,"name":"Politiques d&#8217;hier, politiques de demain","item":"https:\/\/policyoptions.irpp.org\/fr\/2014\/07\/politiques-dhier-politiques-de-demain\/"},{"@type":"ListItem","position":3,"name":"The harm of surveillance"}]},{"@type":"WebSite","@id":"https:\/\/policyoptions.irpp.org\/fr\/#website","url":"https:\/\/policyoptions.irpp.org\/fr\/","name":"Policy Options","description":"Institute for Research on Public Policy","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/policyoptions.irpp.org\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/issues\/263619","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/issues"}],"about":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/types\/issues"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/media\/250152"}],"wp:attachment":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/media?parent=263619"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/categories?post=263619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/tags?post=263619"},{"taxonomy":"article-status","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/article-status?post=263619"},{"taxonomy":"irpp-category","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/irpp-category?post=263619"},{"taxonomy":"section","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/section?post=263619"},{"taxonomy":"irpp-tag","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/irpp-tag?post=263619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}