Read The Internet of Us Online

Authors: Michael P. Lynch

The Internet of Us (13 page)

The Values of Privacy

If you are arrested for a serious crime in the United States today, your picture is taken, you are fingerprinted, and in some precincts the inside of your cheek is swabbed in order to obtain a sample of your DNA. In his dissenting opinion in the recent Supreme Court case on DNA identification techniques, Supreme Court Justice Antonin Scalia argued that such techniques amount to illegal searches.
3
We are, he said, opening our mouths to government invasion and tyranny.

Legally speaking, the case was complicated by a lack of clarity over whether collecting DNA constitutes a search. That is partly because DNA collection does not require a cheek swab; it can be collected from the skin or hair, for example. Thus, as the majority opinion noted, it is unclear why fingerprints wouldn't also constitute an illegal search if DNA samples do.

What
is
clear is that photos, fingerprints and DNA samples allow the police to identify and reidentify you—in ways that are increasingly immune to deception or alteration. You can change your name and your appearance, and fingerprints are not actually unique. But you can't as easily mess with the DNA—it is, in a real sense, part of who you are.

Of course, being able to identify criminal suspects is generally a very good thing—and DNA has proven to be an effective tool not only in this regard, but also for exonerating innocent
people of crimes for which they've been falsely accused (and sometimes convicted). At the same time, human beings have always been somewhat suspicious about new means of identification. That includes basic methods that we often overlook. Consider names. A rose may smell as sweet under any other name, but the fact that it has a name at all gives us an ability to reidentify it quickly and communicate that identification to one another. That's why, in some cultures, knowing someone's true name can give you (magical) power over them. You know how to identify “who they really are.”

For similar reasons, images have often been said—as Warren and Brandeis were well aware—to have power. Even now, a photograph remains one of our best ways of identifying anything: we record in detail what our memories can't. Is it any wonder that individuals in some cultures were hesitant to allow their pictures to be taken? The idea that a camera could steal your spirit can be seen as a way of representing a real truth: that a picture identifies you, and like people's knowledge of your name is not something that is necessarily in your control.

This idea of control is closely connected to the idea of information privacy. The broad notion of privacy is difficult, if not impossible, to define in a straightforward way, and the narrower notion of information privacy is not much better. But even without a precise definition, it is clear that there are several marks or symptoms associated with information privacy. One of those concerns protection: we think of information as private to the extent that it is protected from interference or intrusion.
4
Another concerns control: information is private to the extent to which we control access to it.

Why do we value protecting and controlling our information? A cynic might say: we value it only when we have something to hide. But of course, even if this is true, it doesn't really answer the question. That's because it depends on
what
you are hiding and
whom
you are hiding it from. Hiding a criminal past is one thing; hiding Jews in your basement from the Nazis is another.

In reality, there are much more basic reasons information privacy matters to us.

The Pool of Information

In the summer of 2014, following the revelations of Edward Snowden, the
Washington Post
revealed what many had long suspected: that the NSA, in targeting foreign nationals, is collecting and storing extremely large amounts of information on American citizens.
5
This information is not restricted to meta-data of the sort collected by the NSA's infamous phone data collection program. It is content—photos, Web chats, emails and the like.

U.S. law prevents the targeting of U.S. citizens without a warrant (even if it is just a warrant from the secret court established for this purpose by the Foreign Intelligence Surveillance Act (FISA) of 1978). But citizens' digital data is often vacuumed up “incidentally” when the NSA is collecting the posts, emails and so forth of legally designated foreign targets. Nothing currently prevents the NSA from engaging in this “incidental collection.” And the incidentally collected data can be stored indefinitely. Moreover, no law prevents the agency—and other U.S. intelligence
and law enforcement agencies—from accessing the incidentally collected content without a warrant, into perpetuity.

The storage of incidentally collected data seems clearly wrong. Yet the reasons that make it so also help to explain why as a nation we sometimes sympathize with the sentiment voiced by Representative Mike Rogers in 2013: that your privacy can't be violated if you don't know about it—a non sequitur of such numbing grossness that only Peeping Toms could have greeted it with anything other than laughter.

But before getting back to the NSA, let's do another thought experiment. Imagine for a moment that I could perform something like the Vulcan mind meld with you (okay, okay, I'm dating myself). I telepathically read all your conscious and unconscious thoughts and feelings. You don't share your thoughts with me; I take them. I'm sure you'd agree that such an act of mental invasion would be wrong and harmful, but let's think about why.

The first and most obvious reason is that it has potentially dangerous consequences for you. And, Mike Rogers aside, that danger exists whether or not you know about my violation. Suppose you don't know. The more I know about you and the less you know about my knowledge, the easier it could be for me to take advantage of your ignorance: and the easier you will be to control or exploit.

Intentions matter. The fact that I can read your thoughts doesn't necessarily mean I will exploit you. I may be purely motivated by science: I might jot down your thoughts and do nothing to profit from them. Or I may be like Professor X of the comic book heroes X-Men, only motivated by truth, justice and the American way. More simply, the fact that I know what you like
may help me guide you toward experiences you haven't had yet but would enjoy. Think of Amazon: part of their business model is predicated on acquiring information about their customers' preferences—information often obtained without the customer really knowing it. They use this information to predict what else the customer might like—and to ensure that the customer is given every opportunity to buy it. There is no doubt that many of us feel uncomfortable about the amount of information collected now by corporations for the purpose of selling us stuff we need (or making us want to buy stuff others would like us to need). But it doesn't necessarily involve nefarious motives. So intentions matter, and even in the case of mind-reading, it is not absolutely certain that bad things will happen, even if you don't know about it.

But what if you
do
know
t
hat I am reading your thoughts? Well, you'll be wary, naturally. So wary that you will likely try and censor your thoughts and even your activities—perhaps by humming some Mozart in your mind to disguise your thoughts as best you can. And the reason you'd do so would be obvious—no matter how good I may seem to you now, you will want to minimize your exposure to exploitation and manipulation. This is not surprising. As Bentham knew when he designed his panopticon, observation affects behavior. But, of course, that too isn't necessarily bad. It is why security cameras are not always hidden. If you know you are being watched, you are less likely to act out. And that can be an instrument for good. Or not.

So, one reason privacy is important is that invasions of it can lead to exploitation, manipulation and loss of liberty. These, in turn, obviously can negatively affect a person's autonomy. But
the possibility of bad effects is one thing, the actuality another. This is precisely the point that defenders of the NSA programs, for example, have been at pains to make. For all that's been said so far, there
might
be negative consequences from, e.g., the NSA's policy of massive incidental collection and other data-sweep programs,
if
the agency or its architects were assumed to have bad or corrupt intentions. But why, some say, should we think that?

The fact is, however, that we don't have to know anything about the intentions of the program's architects in order to be worried. The NSA programs are dangerous to democracy even if we assume that their architects were motivated by the best of intentions—as no doubt many of them were. Roads to unpleasant places are frequently paved with the sweetest of intentions.

The NSA database could be described as a pool of information. This is an apt metaphor. In law, swimming pools are called attractive nuisances. They attract children and, as a result, if you own a pool, even if you are a watchful, responsible parent yourself, you still have to put up a fence. Similarly, even if we can trust that the architects of the NSA's various programs had no intention of abusing the information they are collecting about American citizens, the pool of information could easily prove irresistible. And the bigger the pool, the more irresistible it is likely to become. This is not just common sense, it explains why the NSA's repeated assertions that they aren't actually looking at the content of emails, or targeting Americans, should have been greeted with skepticism. The pool of data is a pool of knowledge. Knowledge is power; and power corrupts. It is difficult to avoid drawing the inference that
absolute knowledge might corrupt absolutely
.

That, not surprisingly, is the view of folks like Edward Snowden. But a growing number of stories strongly suggest that fear of abuse is more than a mere theoretical worry. These examples are not constrained to the widely reported cases of NSA employees using their access to spy on sexual partners,
6
nor to similar cases in the UK where analysts collected sexually explicit photos of citizens without cause. More troubling, if less titillating, is the fact that the secret FISA court itself has complained that the NSA misrepresented its compliance with the court's previous rulings that various NSA techniques were unconstitutional.
7
In other words, the FISA court is being ignored by the very agency it is assigned to oversee and monitor. It is hard not to form the impression of an agency that feels it knows better than the judiciary or the Congress. And that, surely, should be worrying.

But the most disturbing fact is the massive continued storage of incidentally collected content itself (again: emails, photos, chat conversations and so on)—information that, as reported in the
Post
, is routinely searched by the CIA and the FBI—all without a warrant, even from the ineffective FISA court, and without any real oversight. Such searches needn't even be reported, and there is, presently, no legal oversight to prevent queries that are unrelated to national security, or even motivated by political ends. And relying on the agencies themselves to report abuses is like relying on the tobacco companies to tell us whether smoking is harmful.

While that's one of the major problems with the NSA collecting massive amounts of incidental information about Americans, it also helps explain why people don't seem too concerned.
Putting up fences is arduous, time-consuming and expensive. And it does cut down on easy access to the water. So, if you want to get in that pool with the best intentions—you want to find the terrorists—it is natural to think that the fence only gets in the way of what matters. If you trust that is what the owners of the pool are after, then worries about possible long-term negative consequences will seem abstract and, well, philosophical. After all, it is pretty clear human beings find it difficult to think about long-term consequences—that's true whether we are talking about swimming pools or global warming. If nothing bad has happened already that we know about as a result of privacy invasions, then what's the problem?

Unfortunately, if the pool of information about American citizens is systematically abused we aren't going to know about it—at least, not easily. When it comes to global warming, at least we'll get to realize the consequences of our current policies (or lack of them) one way or another. But the abuse of knowledge isn't going to be so obvious, and the abusers will have every reason to hide behind good intentions. That was one of the points made by the President's own review panel's report in 2013.
8
That panel—made up of not only writers and scholars including Cass Sunstein but former leaders of the CIA—suggested, in fact, more than simply fencing the pool (passing legislation to make it more difficult to access); they suggested the pool be drained. That is, they urged that all incidentally collected information (again, mostly on Americans, and far outweighing the amount being collected on warranted targets) simply be removed from the NSA's databases. This has not yet been done.
9

Privacy and the Concept of a Person

The potential dangers of abusing big data are one reason the storage of incidentally collected information is wrong. But there is another: the more insidious harm is not “instrumental” but “in principle.”

Just this point was made over half a century ago in one of the most cited discussions of the right of privacy. In 1965, Edward J. Bloustein argued in a paper that what is wrong with such intrusions is

not the intentional infliction of mental distress but rather a blow to human dignity, an assault on human personality. Eavesdropping and wiretapping, entry into another's home, may be the occasion and cause of distress and embarrassment but it is not what makes these acts of intrusion wrongful. They are wrongful because they are demeaning of individuality and they are such whether or not they cause emotional trauma.
10

Other books

A Presumption of Death by Dorothy L. Sayers, Jill Paton Walsh
The Second Confession by Stout, Rex
Adrift in the Sound by Kate Campbell
Mind Games (Mindjack Origins) by Susan Kaye Quinn
Royce by D. Hamilton-Reed
Shamed by Taylor, Theresa
Lt. Leary, Commanding by David Drake
After the Plague by T. C. Boyle
The Unbreakable Trio by Sam Crescent