"With those people, I'm very far apart, because I believe that government access to communications and stored records is valuable when done under tightly controlled conditions which protect legitimate privacy interests"
About this Quote
Distance is the first rhetorical move here: “With those people, I’m very far apart” draws a boundary line against privacy absolutists without naming them, casting the debate as one between grown-ups and ideologues. Denning’s intent is less to defend surveillance in the abstract than to claim the reasonable middle: not “government everywhere,” but government as a tool that can be made safe through procedure.
The phrase “government access” is doing heavy work. It’s sanitized language for powers that, in practice, can look like wiretaps, subpoenas, metadata collection, and compelled disclosure. By pairing it with “communications and stored records,” she quietly collapses a major distinction in digital life: real-time listening versus rummaging through your history. That blending is strategic; it frames both as comparable, manageable categories rather than morally different intrusions.
“Valuable” is a technocratic value judgment that sidesteps the emotionally loaded terrain of rights. It signals her background in security policy and computer science debates where the key question is often utility: does this help prevent harm, catch criminals, deter attacks? The subtext is an argument for legitimacy: the state can be trusted if it is constrained.
But the real pivot is “tightly controlled conditions.” It’s reassurance with an asterisk. Control by whom? Courts, legislatures, internal oversight, classified processes? Denning invokes safeguards to pre-answer the most common critique: that surveillance powers expand, leak, and outlive their original rationale. “Legitimate privacy interests” adds another gate, implying some privacy claims are less legitimate than others. That’s the quiet political wager: that privacy is negotiable, and that the right rules can keep the bargain from curdling into abuse.
The phrase “government access” is doing heavy work. It’s sanitized language for powers that, in practice, can look like wiretaps, subpoenas, metadata collection, and compelled disclosure. By pairing it with “communications and stored records,” she quietly collapses a major distinction in digital life: real-time listening versus rummaging through your history. That blending is strategic; it frames both as comparable, manageable categories rather than morally different intrusions.
“Valuable” is a technocratic value judgment that sidesteps the emotionally loaded terrain of rights. It signals her background in security policy and computer science debates where the key question is often utility: does this help prevent harm, catch criminals, deter attacks? The subtext is an argument for legitimacy: the state can be trusted if it is constrained.
But the real pivot is “tightly controlled conditions.” It’s reassurance with an asterisk. Control by whom? Courts, legislatures, internal oversight, classified processes? Denning invokes safeguards to pre-answer the most common critique: that surveillance powers expand, leak, and outlive their original rationale. “Legitimate privacy interests” adds another gate, implying some privacy claims are less legitimate than others. That’s the quiet political wager: that privacy is negotiable, and that the right rules can keep the bargain from curdling into abuse.
Quote Details
| Topic | Privacy & Cybersecurity |
|---|---|
| Source | Help us find the source |
More Quotes by Dorothy
Add to List


