Skip to main content Accessibility help
×
×
Home
  • Get access
    Check if you have access via personal or institutional login
  • Cited by 3
  • Cited by
    This chapter has been cited by the following publications. This list is generated based on data provided by CrossRef.

    Galison, Peter 2008. Ten Problems in History and Philosophy of Science. Isis, Vol. 99, Issue. 1, p. 111.

    Mokrosinska, Dorota 2018. Privacy and Autonomy: On Some Misconceptions Concerning the Political Dimensions of Privacy. Law and Philosophy, Vol. 37, Issue. 2, p. 117.

    Sorell, Tom 2018. The Rule of Crisis. Vol. 64, Issue. , p. 37.

    ×
  • Print publication year: 2005
  • Online publication date: August 2009

13 - Our Privacy, Ourselves in the Age of Technological Intrusions

Summary

After the terrorist attacks of 9/11, the United States government has elevated terrorism as the most important issue shaping government policies. What has happened and what should happen to legal protections of individual freedom in this context? Privacy is one of the individual freedoms in serious jeopardy due to post-9/11 governmental initiatives, yet it lacks comprehensive and clear definition in law and policy. Philosophically and historically, it may best be understood as a multivalent social and legal concept that refers simultaneously to seclusion, self-determination, and control over other people's access to oneself and to information about oneself. Even though its meanings are multiple and complex, privacy is closely connected with the emergence of a modern sense of self. Its jeopardy signals serious risk to the very conditions people need to enjoy the kind of self that can experiment, relax, form and enjoy intimate connections, and practice the development of ideas and beliefs for valued expression. The fragility of privacy is emblematic of the vulnerability of individual dignity and personal rights in the face of collective responses to terror and other enormous threats, real or perceived. In the face of narratives treating both technological change and security measures as either desired or inexorable, claims that privacy stands as a right outside of history, grounded in nature or divine authority, are not likely to prove persuasive or effective.

Recommend this book

Email your librarian or administrator to recommend adding this book to your organisation's collection.

Human Rights in the 'War on Terror'
  • Online ISBN: 9780511511288
  • Book DOI: https://doi.org/10.1017/CBO9780511511288
Please enter your name
Please enter a valid email address
Who would you like to send this to *
×
REFERENCES
Aleinikoff, T. A. (1987). ‘Constitutional Law in the Age of Balancing’. 96 Yale Law Journal943
Allen, A. L. (1988). Uneasy Access: Privacy for Women in a Free Society. Totowa, NJ: Rowland & Littlefield
Anderson, B. (1991). Imagined Communities: Reflections on the Origin and Spread of Nationalism (revised edition). New York: Verso
Arendt, H. (1958). The Human Condition. New York: Doubleday
Atlanta Journal-Constitution. ‘Balance Information With Privacy’. 10 December 2003, p. 22A
Baer, S. (2003, January 5). ‘Broader U.S. Spy Initiative Debated; Poindexter Leads Project to Assess Electronic Data, Detect Possible Terrorists; Civil Liberties Concerns Raised’. Baltimore Sun, p. 1A (quoting Jay Stanley of the American Civil Liberties Union)
Baldas, T. (2004, August 9). ‘ACLU Takes on “Matrix” Crime, Terrorism Database’. National Law Journal, p. 4
Bloom, H. (1998). Shakespeare: The Invention of the Human. New York: Riverhead Books
Borger, J. (2002, May 21). ‘Shamed FBI's Snooping Powers Increased’. The Guardian (London), p. 18
Boyle, J. (1992). ‘A Theory of Law and Information: Copyright, Spleens, Blackmail, and Insider Trading’. 80 California Law Review1413
Brest, P. (1982). ‘State Action and Liberal Theory: A Casenote on Flagg Brothers v. Brooks’. 130 University of Pennsylvania Law Review1296
California v. Greenwood, 486 U.S. 35 (1988)
Choper, J. (1979). ‘Thoughts on State Action: The “Government Function,” and “Power Theory” Approaches’. Washington University Law Quarterly757
CNN.com. (2003, July 30). ‘Amid furor, Pentagon kills terrorism futures market’. Inside Politics. Available at: http://www.cnn.com/2003/ALLPOLITICS/07/29/terror.market/index.html
Committee on Science and Technology for Countering Terrorism (CSTCT). (2002). Making the Nation Safer: The Role of Science and Technology in Countering Terrorism. National Research Council of the National Academies. Washington, D.C.: National Academies Press
DARPA (2003, May 20). Report to Congress Regarding the Terrorism Information Awareness Program. Available at: http://www.globalsecurity.org/security/library/report/2003/tia- di_report_20may2003.pdf
Davidson, A. (1994). ‘Ethics as Ascetics: Foucault, The History of Ethics and Ancient Thought’. In Goldstein, J. E. (Ed.), Foucault and the Writing of History. Cambridge: Blackwell
DeCew, J. W. (1997). In Pursuit of Privacy: Law, Ethics, and the Rise of Technology. Ithaca, NY: Cornell University Press.
Denver Post. ‘Virtual Borders vs. Civil Liberties’. 31 May 2004, p. C-07
Directionsmag.com. (1998). ‘Acxiom's InfoBase Profiler Via the Acxiom Data Network is First Consumer Data Product to Provide Census and Household-Level Demographic Data and Scores in Sub-Second Time’. 3 December 1998, Press Release, Acxiom Corp. Available at http://www.directionsmag.com/press.releases/index.php?duty=Show&id=80
Ditzion, R., Geddes, E., & Rhodes, M. (2003, Spring). ‘Computer Crimes’. American Criminal Law Review, vol. 40, issue 2, p. 285(52)
Dixon, R. (1976). ‘The “New” Substantive Due Process and the Democratic Ethic: A Prolegomenon’. Brigham Young University Law Review43
Dodson, A. J. (2000, Winter). ‘DNA “Line-Ups” Based on a Reasonable Suspicion Standard’. University of Colorado Law Review, vol. 71, issue 1, pp. 221–54
Eisenstadt v. Baird, 405 U.S. 438 (1972)
Executive Summary of the Independent Counsel Investigation (the Walsh Report). Available at: http://www.fas.org/irp/offdocs/walsh/execsum.htm
Fisher III, W. W., Horwitz, M. J., & Reed, T. (Eds.). (1993). American Legal Realism. New York: Oxford University Press
Flagg Brothers, Inc. v. Brooks, 436 U.S. 149 (1978)
Florida v. Riley, 488 U.S. 445 (1989)
Foucault, M. (1986). History of Sexuality, vol. 3: The Care of the Self (R. Hurley, Trans.). New York: Vintage
Friendly, H. (1969). ‘The Dartmouth College Case and the Public-Private Penumbra’. Austin: University of Texas
Galison, P. (2004). ‘Image of Self’. In Daston, L. (Ed.), Things that Talk. Cambridge: Zone Books
Goldstein, J. (1994). ‘Foucault and the Post-Revolutionary Self: The Uses of Cousinian Pedagogy in Nineteenth-Century France’. In Goldstein, J. (Ed.), Foucault and the Writing of History, pp. 99–115. Oxford: Blackwell
Grand, J. S. (2002, August). ‘The Blooding of America: Privacy and the DNA Dragnet’. Cardozo Law Review, vol. 23, issue 6, pp. 2277–323
Green, R. M. & Thomas, A. M. (1998). ‘DNA: Five Distinguishing Features for Policy Analysis’. 11 Harvard Journal of Law and Technology571
Greer, S. (2003, September). ‘Constitutionalizing Adjudication Under the European Convention on Human Rights’. Oxford Journal of Legal Studies, vol. 23, issue 3, pp. 405–433(29)
Griswold v. Connecticut, 381 U.S. 479 (1965)
Guerrand, R.-H. (1990). ‘Private Spaces’. In Perrot, M. (Ed.), A. Goldhammer, (Transl.), A History of Private Life, vol. 4: From the Fires of Revolution to the Great War, pp. 359–74. P. Ariès and G. Duby (general Eds.). Cambridge, MA: Belknap Press, Harvard University Press
Hadot, P. (1995). Philosophy as a Way of Life. New York: Blackwell
Haraway, D. J. (1991). Simians, Cyborgs, and Women. Routledge
Henkin, L. (1974). ‘Privacy and Autonomy’. 74 Columbia Law Review1410
Hetcher, S. (2001). ‘Changing the Social Meaning of Privacy in Cyberspace’. 15 Harvard Journal of Law and Technology149
Hoofnagle, C. J. (2004, Summer). ‘Big Brother's Little Helpers: How ChoicePoint and Other Commercial Data Brokers Collect, Process, and Package Your Data for Law Enforcement’. University of North Carolina Journal of International Law and Commercial Regulation, vol. 29, no. 4, pp. 595–637
Horwitz, M. (1982). ‘The History of the Public/Private Distinction’. 130 University of Pennsylvania Law Review1423
Ignatieff, M. (2002a, February 5). ‘Is the Human Rights Era Ending?New York Times, p. A29
Ignatieff, M.. (2002b). Human Rights as Politics and Idolatry. Princeton, NJ: Princeton University Press
Kang, J. (1998). ‘Information Privacy in Cyberspace Transactions’. 50 Stanford Law Review1193
Kang, J. & Buchner, B. (2004, Fall). ‘Privacy in Atlantis: A Dialogue of Form and Substance’. Harvard Journal of Law and Technology, vol. 18, no. 1. Available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=626942
Katz v. United States, 389 U.S. 347 (1967)
Kaye, D. H. (2001, Summer). ‘The Constitutionality of DNA Sampling on Arrest’. Cornell Journal of Law and Public Policy, vol. 10, issue 3, p. 455(55)
Kyllo v. United States, 533 U.S. 27 (2001)
LaFave, W. (1966). 1 Search and Seizure (3rd ed.), section 2.1(d), pp. 393–4
Lawrence v. Texas, 539 U.S. 558 (2003)
Lawyers Committee for Human Rights (herein “LCHR”). (2003). Assessing the New Normal: Liberty and Security for the Post-September 11 United States. New York. Available at: http://www.humanrightsfirst.org/pubs/descriptions/Assessing/AssessingtheNewNormal.pdf
Mark, R. (2003, July 29). ‘Pentagon Folds Hand in Online Terrorism Futures Scheme’. Available at: http://dc.internet.com/news/article.php/2241421
Markle Foundation (2003). Creating a Trusted Information Network for Homeland Security: Second Report of the Markle Foundation Task Force. Available at: http://www.markletaskforce.org/Report2_Full_Report.pdf
Martin, L. H., Gutman, H., & Hutton, P. H. (Eds.). (1988). ‘Technologies of the Self: A Seminar with Michel Foucault’. Amherst, MA: University of Massachusetts Press
McClurg, A. J. (2003). ‘A Thousand Words Are Worth a Picture: A Privacy Tort Response to Consumer Data Profiling’. 98 Northwestern University Law Review63
Minnesota v. Carter, 525 U.S. 93, 97 (1998)
Minow, M. (1987). ‘We, The Family: Constitutional Rights and American Families’. Journal of American History, vol. 74, no. 3, p. 959
Mitchell, W. J. (2003). Me++: The Cyborg Self and the Networked City. Cambridge, MA: MIT Press
Multi-State Anti-Terrorism Information Exchange (MATRIX). Available at: http://www.matrix-at.org/. Accessed on 24 August 2004
National Law Journal Roundtable (2003, April 26). ‘Patriot Act Attacked’. 26 April 2003, p. 19
Nissbenbaum, H. (2004). ‘Privacy as Contextual Integrity’. 79 Washington Law Review119
Nussbaum, M. (2003). ‘Compassion and Terror’. In Sterba, J. P. (Ed.), Terrorism and International Justice, pp. 229–52. Oxford: Oxford University Press
Peller, G. (1985). ‘The Metaphysics of American Law’. 73 California Law Review1151
Perrot, M. (1990). ‘The Secret of the Individual’. In Perrot, M. (Ed.), A. Goldhammer, (Transl.), A History of Private Life, vol. 4: From the Fires of Revolution to the Great War, pp. 457–548. P. Ariès and G. Duby (general Eds.). Cambridge, MA: Belknap Press, Harvard University Press
Planned Parenthood of Southeastern Pennsylvania v. Casey, 505 U.S. 833 (1992)
Pohlmann, N. & Crothers, T. (2002). Firewall Architecture for the Enterprise. John Wiley & Sons, Inc.
Poindexter, J. (2002, August 2). ‘Overview of the Information Awareness Office’. Prepared remarks for delivery at DARPATech 2002, Anaheim, CA, Aug. 2, 2002. Available at: http://www.fas.org/irp/agency/dod/poindexter.html
Posner, R. (1979). ‘The Uncertain Protection of Privacy by the Supreme Court’. Supreme Court Review 173, 188
Post, R. C. (2001). ‘Three Concepts of Privacy’. 89 Georgetown Law Journal2087
Rasul v. Bush, 124 S. Ct. 2686, 159 L. Ed. 2d 548, 72 U.S.L.W. 4596, 2004 U.S. LEXIS 4760 (2004)
Regnier, T. (2004, Spring). ‘The “Loyal Foot Soldier”: Can the Fourth Amendment Survive the Supreme Court's War on Drugs?UKMC Law Review, vol. 72, issue 3, pp. 631–68
Reiss, S. (2004, May). ‘Poindexter Confidential’. Wired Magazine, Issue 12.05. Available at: http://www.wired.com/wired/archive/12.05/poindexter.html
Rendell-Baker v. Kohn, 457 U.S. 830 (1982)
Rennie, D. (2003, August 1). ‘Admiral Behind Terrorist Futures Market “To Quit”’. Daily Telegraph (London), p. 20
‘Responses by Center for Democracy and Technology and Other Civil Liberties Organizations to TIA Report’ (herein “Responses”) (2003, August 20). Available at: http://www.cdt.org/security/usapatriot/030520cdt.shtml
R. L. Polk & Co. (2005). ‘Automotive Profiling System’. Available at: http://www.polk.com/products/aps.asp
Roe v. Wade, 410 U.S. 113 (1973)
Rosen, J. (2000). The Unwanted Gaze: The Destruction of Privacy in America. New York: Vintage
Safire, W. (2003, February 13). ‘Privacy Invasion Curtailed’. New York Times, p. 41
Samuelson, P. (2000). ‘Privacy as Intellectual Property?52 Stanford Law Review1125
Schneier, B. (2003). Beyond Fear: Thinking Sensibly About Security in an Uncertain World. New York: Springer-Verlag
Scott, J. C. (1998). Seeing Like a State: How Certain Conditions to Improve the Human Condition Have Failed. New Haven: Yale University Press
Solove, D. J. (2002). ‘Conceptualizing Privacy’. 90 California Law Review1087
Solove, D. J. & Rotenberg, M. (2003). Information Privacy Law, p. 27. New York: Aspen Publishers
St. Petersburg Times (Florida). ‘Total Information Awareness II?31 May 2004, p. 12A
Stone, G. R. (2004). Perilous Times: Free Speech in Wartime from the Sedition Act of 1789 to the War on Terrorism. New York: W. W. Norton & Co.
Strathern, M. (2003). ‘Emergent Relations’. In Biagioli, M. & Galison, P. (Eds.). Scientific Authorship, pp. 169–94, chapter 7. New York: Routledge
Sudell, A. (2001). ‘Comment: To Tell or Not to Tell: The Scope of Physician-Patient Confidentiality When Relatives Are at Risk of Genetic Disease’. 18 Journal of Contemporary Health Law and Policy273
Sutherland, J. (2002, February 18). ‘No more Mr Scrupulous Guy’. The Guardian (United Kingdom). Available at: http://www.guardian.co.uk/g2/story/0,3604,651950,00.html
Technology and Privacy Advisory Committee (herein “TPAC”) (2004, March 1). Safeguarding Privacy in the Fight Against Terrorism: Report of the Technology and Privacy Advisory Committee to the Department of Defense. Available at: http://www.mipt.org/pdf/Safeguarding-Privacy-Fight-Against-Terrorism.pdf
Times-Picayune (New Orleans, LA). ‘Plots at Public Meetings?3 June 2002, p. 4
Turkel, S. (1997). Life on the Screen: Identity in the Age of the Internet. New York: Touchstone
United States v. Leon, 468 U.S. 897 (1984)
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (herein “USA PATRIOT Act”), Pub. L. No. 107–56, 302(a) (1), 115 Stat. 272 (2001)
Warren, S. D. & Brandeis, L. D. (1890). ‘The Right to Privacy’. 4 Harvard Law Review 193
Weaver, K. D. (1997). ‘Genetic Screening and the Right Not to Know’. Issues in Law & Medicine, vol. 13. no. 3, p. 243
Webster v. Reproductive Health Services, 492 U.S. 490 (1989)
Weintraub, B. (1986, November 26). ‘Iran Payment Found Diverted to Contras; Reagan Security Advisor and Aide Are Out’. New York Times, p. A1
Westin, A. F. (1967). Privacy and Freedom. London: Bodley Head