Human Extinction and Farsighted Universal Surveillance

Human Extinction and Farsighted Universal Surveillance

Mark Walker
Copyright: © 2012 |Volume: 3 |Issue: 4 |Pages: 11
ISSN: 1947-3451|EISSN: 1947-346X|EISBN13: 9781466614468|DOI: 10.4018/jte.2012100102
Cite Article Cite Article

MLA

Walker, Mark. "Human Extinction and Farsighted Universal Surveillance." IJT vol.3, no.4 2012: pp.22-32. http://doi.org/10.4018/jte.2012100102

APA

Walker, M. (2012). Human Extinction and Farsighted Universal Surveillance. International Journal of Technoethics (IJT), 3(4), 22-32. http://doi.org/10.4018/jte.2012100102

Chicago

Walker, Mark. "Human Extinction and Farsighted Universal Surveillance," International Journal of Technoethics (IJT) 3, no.4: 22-32. http://doi.org/10.4018/jte.2012100102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper bridges the dilemma created by intrusive surveillance technologies needed to safeguard people’s security, and the potential negative consequences such technologies might have on individual privacy. The author begins with a brief review of the increasing threat to human life posed by emerging technologies, e.g., genetic engineering and nanotechnology. Next, they canvass a potential technological means to mitigate some of this threat, namely, ubiquitous microscopic sensors. The author then notes that a consequence of the deployment of such technology appears to be an erosion of personal privacy on a scale hitherto unimaginable. It is then argued that many details of an individual’s private life are actually irrelevant for security purposes, and that it may be possible to develop technology to mask these details in the data gleaned from surveillance devices. Such a development could meet some, perhaps many, of the concerns about privacy. It is also argued that if it is possible to use technology to mask personal information this may actually promote the goal of security, since it is conjectured that the public is likely to be more willing to accept such invasive technology if it is designed to mask such details. Finally, some applications to Society’s current uses of surveillance technology are drawn.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.