Post-9/11 Collision of Privacy and Security ; Fear and Technology Have Conspired in Ways That Threaten Even Our 'Hearts and Minds' with Surveillance

By Smith, Janna Malamud | The Christian Science Monitor, March 22, 2004 | Go to article overview

Post-9/11 Collision of Privacy and Security ; Fear and Technology Have Conspired in Ways That Threaten Even Our 'Hearts and Minds' with Surveillance


Smith, Janna Malamud, The Christian Science Monitor


America's democratic values - the marvelous freedoms that have characterized the nation - rest largely on thepillar of privacy protection.

Yet today, the historic coincidence of post-9/11 terrorist fears and remarkable technological advances in the area of security and data gathering threaten to undermine that privacy pillar.

A comment during a recent lunch captured for me the essence of society's current privacy predicament, and the great post-9/11 national privacy conundrum. "You know," said my lunch companion, a professor, "researchers who scan brains have found that separate portions light up if you're feeling love in a committed relationship, lust, or romantic love."

Whether this is true or not, simply musing about the scientific possibility of seeing into our innermost thoughts and feelings sheds light on how Americans are trying to figure out the amount and kinds of privacy they need, and what they are willing to sacrifice for collective safety. Will Americans be safe only if technology allows them to see into the recesses of each other's hearts and minds?

Privacy - as Americans know it today - is a fairly recent concept and experience. The historian Philip Aries has written that "until the end of the 17th century, nobody was ever left alone." Only a few eccentric hermits hid out in caves. Indeed, in the Puritan colony of Connecticut, no one was allowed to live alone for fear that it would challenge communal life, and make the solitary soul easy prey for the devil.

But over time, ideas changed. The national feeling today comes much closer to the ideal put forth by the Transcendentalist writer Bronson Alcott: "Individuals are sacred. The world, the state, the church, the school, all are felons whenever they violate the sanctity of the human heart."

America has come to value privacy deeply because it is understood that the right of privacy not only allows the freedom of solitude, but it also shields social interaction - from intimate to more open associations in which people can do and say heartfelt and spontaneous things with others that they wouldn't feel free to do or say if outsiders were watching.

Americans have long cherished the "right to be let alone" because they know privacy underpins liberty, choice, self-expression, creativity, and autonomy. Inventors, entrepreneurs, tinkerers, and artists alike grasp that their creative processes rest on not feeling prematurely scrutinized, not having to go public until they're ready.

Totalitarian governments consider privacy extremely dangerous. Indeed, a hallmark of such governments - Stalinist Russia, East Germany, Communist China - is the amount of spying they do on their own citizens and have their citizens do on each other. Leaders of such systems understand that, under surveillance, people are less assertive and more worried, careful, and vigilant. It can make them shrink into themselves so that they become smaller, meeker, and less inclined to stand up for their human rights.

Describing her own experiences and those of her poet husband under the continual hostile surveillance of Stalinism, Nadezhda Mandelstam wrote: "We all became slightly unbalanced mentally - not exactly ill, but not normal either: suspicious, mendacious, confused and inhibited in our speech.... What value can such people have as witnesses?"

Privacy is a precious, fragile concept. In the right measure, it shields and nurtures humanity; it enables the development of "the self," the emboldened human creature with a distinctive voice and talents.

However, life is never simple. Some people - perhaps all of us to varying degrees - have the potential to exploit privacy by using it to shield secret antisocial or illegal things they do. A certain amount of communal or technological surveillance makes society safe and functional. If everyone believed that "no one is watching," too many of us might stop paying taxes or start running traffic lights, pilfering goods, or mugging the guy blocking our path.

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Post-9/11 Collision of Privacy and Security ; Fear and Technology Have Conspired in Ways That Threaten Even Our 'Hearts and Minds' with Surveillance
Settings

Settings

Typeface
Text size Smaller Larger
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.