You are on page 1of 2

March 27th, 2014

1

Surveillance Technology
When security matters violate privacy

Although surveillance technology allows the fulfillment of Article 3 of the Universal
Declaration of Human Rights, which emphasizes the security of a person, it is also subject to
violating other rights. The current technology boom has driven our minds to create dependency
on devices or machines, that even though facilitate our daily activities, such as dealing with
security, have also affected our own interests. The question is, until what point is surveillance
technology positive for citizens? To answer this it is primordial to understand to what extent and
under what conditions this technology should be used. In developed countries such as the U.S.
and China, the governments have implemented this resource with the main objective of
enhancing their nations security and wellbeing. However, technology seems to outpace the
control humans may have of it, which elicits controversy on matters it affects such as in privacy
and security.
Security
Political, economic, social, ethnic, and religious conflicts have escalated with an
increasingly interconnected world. In order to comply with Article 3 of the UDHR, powerful
countries have developed the technology required to efficiently control and maintain the security
of their nations and of their citizens. The 9-11 terrorist attack on U.S. soil was the motive that
gave the United States a reason to control the movements of its citizens and of foreigners in
order to prevent another lethal attack. For this the United States Congress instructed the National
Security Agency, NSA, to conduct massive espionage on American and international citizens.
This espionage ranged from the incorporation of new smart cameras, which contain a biometric
mechanisms, located in public and private places, to the interference of phone calls, e-mails, and
messages. Drones, unmanned air vehicles, have been also employed to supervise the movements
of any suspects of the authorities. This extreme surveillance technology has allowed the United
States to prevent dozens of attacks and to provide security to its citizens. However, although this
March 27th, 2014

2

method seems perfect, it has provoked controversy after confidential information regarding
espionage was leaked to the public. Many civilians were disappointed with their own
government for violating the Fourth Amendment, spying on them without a legal order or their
consent. The outcome was similar with worldwide leaders, such as Angela Merkel, and, in
general with citizens whose countries implement this technology.
Privacy
Surveillance technology has invaded the privacy of millions of Americans. On the
disapproval side, 61% surveyed said they oppose government collection of the online
communications of citizens. (Mack, 2014). In order for espionage to be effective, the majority
of the population should be spied on, for the NSA cant assume someone is a suspect of any
crime without having evidence linking this person to a crime. For this reason, the NSA invaded
the privacy of millions of Americans without a warrant, which exemplifies a violation to Article
12 of the UDHR that reads No one shall be subjected to arbitrary interference with his privacy
(). David Cole, journalist of The Nation, mentions that the State argued the State set the GPS
on cars as an example of revealing public information since the car companies know where your
car is located. However, it is one thing to know where you are and a totally different one to listen
to a conversation or interfere a message.
Surveillance technology is an issue that must be critically analyzed. While it abruptly
enhances national security, it may jeopardize personal privacy. Countries with this technology
must decide to which extent they should respect individual privacy and constitutional rights,
without assuring national security, or assure domestic safety with the interference of individual
privacy.
Bibliography
Cole, D. (2014, January 27). Privacy in the Digital Era. The Nation: 3-4.
Mack, T. (2014, February). Privacy and Surveillance Explosion. Futurist: 42-47.

You might also like