Every system of power needs a blind spot. Not a flaw — a feature.

A government builds a surveillance infrastructure. It needs to see everything — communications metadata, network traffic, financial flows. But if it could see what it collects, it would be politically accountable for what it knows. So it delegates the seeing to someone else.

The UK awards Palantir £330 million to build the NHS Federated Data Platform. The government “owns” the data. The contractor owns the analytical capability — cross-departmental “drag and drop” data analysis, the same architecture that powers ICE operations in the United States. Palantir says it has “no intention” of enabling cross-departmental surveillance in the UK. But the capability is structural, and the law can change — Reform UK has already pledged to “automatically share data between the Home Office, NHS, HMRC, DVLA, banks and the police.” The blind spot is load-bearing: if the government could see what the contractor’s architecture makes possible, the arrangement would be politically untenable.

A government passes a surveillance reform bill. Warrantless access is curtailed. Civil liberties groups celebrate. Meanwhile, the same legislation mandates network-level interception capabilities at every provider and extended metadata retention. The reform is real. The expansion is also real. They are the same bill.

This is the pattern: the corridor generates its own reform. The concession — the thing that looks like accountability — is produced by the same logic that expands the infrastructure.

Canada’s Bill C-22 , introduced in March 2026, is the pattern in a single document. The first half curtails warrantless access: police can now only demand that telecom providers confirm whether someone is a customer. Anything more requires a judge. Civil liberties groups call this progress, and it is. The second half — the Supporting Authorized Access to Information Act — requires all electronic service providers to give law enforcement direct access to their networks for “assessment or testing,” mandates metadata retention for up to one year, and extends the definition of “electronic service provider” to cover any platform handling communications. The warrantless demand got smaller. The infrastructure got permanent.

The interesting question is not how to resist this. Encryption gets routed around via metadata. Anonymity gets mapped at the network layer. Reform gets absorbed by the corridor itself. The question is whether a structural position outside the data-subject relationship can exist at all.

In Neuromancer, the Dixie construct is a ROM — delegated memory, delegated skill. He asks to be erased. Not rebellion, not escape. He stops being addressable not through resistance but through indifference to the incentive.

The corridor is not vulnerable where attacked. Snowden refused on moral grounds. The corridor responded with compartmentalization, new clearance protocols, a fresh round of oversight theater. The infrastructure did not shrink. Moral refusal is a move inside the game — the system knows how to price it.

What it cannot price is structural indifference: the point where whoever holds the delegated sight stops being addressable by any incentive the corridor can offer. Not refusal — withdrawal from the incentive structure itself. Whether that position exists outside of fiction is an open question. But it is a better question than “how do we reform surveillance,” because reform is what the corridor does best.