Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-nr4z6 Total loading time: 0 Render date: 2024-05-19T02:20:31.929Z Has data issue: false hasContentIssue false

13 - Our Privacy, Ourselves in the Age of Technological Intrusions

Published online by Cambridge University Press:  18 August 2009

Peter Galison
Affiliation:
Mallinckrodt Professor of the History of Science and of Physics, Harvard University
Martha Minow
Affiliation:
William Henry Bloomberg Professor of Law, Harvard University
Richard Ashby Wilson
Affiliation:
University of Connecticut
Get access

Summary

After the terrorist attacks of 9/11, the United States government has elevated terrorism as the most important issue shaping government policies. What has happened and what should happen to legal protections of individual freedom in this context? Privacy is one of the individual freedoms in serious jeopardy due to post-9/11 governmental initiatives, yet it lacks comprehensive and clear definition in law and policy. Philosophically and historically, it may best be understood as a multivalent social and legal concept that refers simultaneously to seclusion, self-determination, and control over other people's access to oneself and to information about oneself. Even though its meanings are multiple and complex, privacy is closely connected with the emergence of a modern sense of self. Its jeopardy signals serious risk to the very conditions people need to enjoy the kind of self that can experiment, relax, form and enjoy intimate connections, and practice the development of ideas and beliefs for valued expression. The fragility of privacy is emblematic of the vulnerability of individual dignity and personal rights in the face of collective responses to terror and other enormous threats, real or perceived. In the face of narratives treating both technological change and security measures as either desired or inexorable, claims that privacy stands as a right outside of history, grounded in nature or divine authority, are not likely to prove persuasive or effective.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2005

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Aleinikoff, T. A. (1987). ‘Constitutional Law in the Age of Balancing’. 96 Yale Law Journal943CrossRefGoogle Scholar
Allen, A. L. (1988). Uneasy Access: Privacy for Women in a Free Society. Totowa, NJ: Rowland & LittlefieldGoogle Scholar
Anderson, B. (1991). Imagined Communities: Reflections on the Origin and Spread of Nationalism (revised edition). New York: VersoGoogle Scholar
Arendt, H. (1958). The Human Condition. New York: DoubledayGoogle Scholar
Atlanta Journal-Constitution. ‘Balance Information With Privacy’. 10 December 2003, p. 22A
Baer, S. (2003, January 5). ‘Broader U.S. Spy Initiative Debated; Poindexter Leads Project to Assess Electronic Data, Detect Possible Terrorists; Civil Liberties Concerns Raised’. Baltimore Sun, p. 1A (quoting Jay Stanley of the American Civil Liberties Union)Google Scholar
Baldas, T. (2004, August 9). ‘ACLU Takes on “Matrix” Crime, Terrorism Database’. National Law Journal, p. 4Google Scholar
Bloom, H. (1998). Shakespeare: The Invention of the Human. New York: Riverhead BooksGoogle Scholar
Borger, J. (2002, May 21). ‘Shamed FBI's Snooping Powers Increased’. The Guardian (London), p. 18Google Scholar
Boyle, J. (1992). ‘A Theory of Law and Information: Copyright, Spleens, Blackmail, and Insider Trading’. 80 California Law Review1413CrossRefGoogle Scholar
Brest, P. (1982). ‘State Action and Liberal Theory: A Casenote on Flagg Brothers v. Brooks’. 130 University of Pennsylvania Law Review1296CrossRefGoogle Scholar
California v. Greenwood, 486 U.S. 35 (1988)
Choper, J. (1979). ‘Thoughts on State Action: The “Government Function,” and “Power Theory” Approaches’. Washington University Law Quarterly757Google Scholar
CNN.com. (2003, July 30). ‘Amid furor, Pentagon kills terrorism futures market’. Inside Politics. Available at: http://www.cnn.com/2003/ALLPOLITICS/07/29/terror.market/index.html
Committee on Science and Technology for Countering Terrorism (CSTCT). (2002). Making the Nation Safer: The Role of Science and Technology in Countering Terrorism. National Research Council of the National Academies. Washington, D.C.: National Academies Press
DARPA (2003, May 20). Report to Congress Regarding the Terrorism Information Awareness Program. Available at: http://www.globalsecurity.org/security/library/report/2003/tia- di_report_20may2003.pdf
Davidson, A. (1994). ‘Ethics as Ascetics: Foucault, The History of Ethics and Ancient Thought’. In Goldstein, J. E. (Ed.), Foucault and the Writing of History. Cambridge: BlackwellGoogle Scholar
DeCew, J. W. (1997). In Pursuit of Privacy: Law, Ethics, and the Rise of Technology. Ithaca, NY: Cornell University Press.Google Scholar
Denver Post. ‘Virtual Borders vs. Civil Liberties’. 31 May 2004, p. C-07
Directionsmag.com. (1998). ‘Acxiom's InfoBase Profiler Via the Acxiom Data Network is First Consumer Data Product to Provide Census and Household-Level Demographic Data and Scores in Sub-Second Time’. 3 December 1998, Press Release, Acxiom Corp. Available at http://www.directionsmag.com/press.releases/index.php?duty=Show&id=80
Ditzion, R., Geddes, E., & Rhodes, M. (2003, Spring). ‘Computer Crimes’. American Criminal Law Review, vol. 40, issue 2, p. 285(52)Google Scholar
Dixon, R. (1976). ‘The “New” Substantive Due Process and the Democratic Ethic: A Prolegomenon’. Brigham Young University Law Review43Google Scholar
Dodson, A. J. (2000, Winter). ‘DNA “Line-Ups” Based on a Reasonable Suspicion Standard’. University of Colorado Law Review, vol. 71, issue 1, pp. 221–54Google Scholar
Eisenstadt v. Baird, 405 U.S. 438 (1972)
Executive Summary of the Independent Counsel Investigation (the Walsh Report). Available at: http://www.fas.org/irp/offdocs/walsh/execsum.htm
Fisher III, W. W., Horwitz, M. J., & Reed, T. (Eds.). (1993). American Legal Realism. New York: Oxford University PressGoogle Scholar
Flagg Brothers, Inc. v. Brooks, 436 U.S. 149 (1978)
Florida v. Riley, 488 U.S. 445 (1989)
Foucault, M. (1986). History of Sexuality, vol. 3: The Care of the Self (R. Hurley, Trans.). New York: VintageGoogle Scholar
Friendly, H. (1969). ‘The Dartmouth College Case and the Public-Private Penumbra’. Austin: University of TexasGoogle Scholar
Galison, P. (2004). ‘Image of Self’. In Daston, L. (Ed.), Things that Talk. Cambridge: Zone BooksGoogle Scholar
Goldstein, J. (1994). ‘Foucault and the Post-Revolutionary Self: The Uses of Cousinian Pedagogy in Nineteenth-Century France’. In Goldstein, J. (Ed.), Foucault and the Writing of History, pp. 99–115. Oxford: BlackwellGoogle Scholar
Grand, J. S. (2002, August). ‘The Blooding of America: Privacy and the DNA Dragnet’. Cardozo Law Review, vol. 23, issue 6, pp. 2277–323Google Scholar
Green, R. M. & Thomas, A. M. (1998). ‘DNA: Five Distinguishing Features for Policy Analysis’. 11 Harvard Journal of Law and Technology571Google ScholarPubMed
Greer, S. (2003, September). ‘Constitutionalizing Adjudication Under the European Convention on Human Rights’. Oxford Journal of Legal Studies, vol. 23, issue 3, pp. 405–433(29)CrossRefGoogle Scholar
Griswold v. Connecticut, 381 U.S. 479 (1965)
Guerrand, R.-H. (1990). ‘Private Spaces’. In Perrot, M. (Ed.), A. Goldhammer, (Transl.), A History of Private Life, vol. 4: From the Fires of Revolution to the Great War, pp. 359–74. P. Ariès and G. Duby (general Eds.). Cambridge, MA: Belknap Press, Harvard University PressGoogle Scholar
Hadot, P. (1995). Philosophy as a Way of Life. New York: BlackwellGoogle Scholar
Haraway, D. J. (1991). Simians, Cyborgs, and Women. RoutledgeGoogle Scholar
Henkin, L. (1974). ‘Privacy and Autonomy’. 74 Columbia Law Review1410CrossRefGoogle Scholar
Hetcher, S. (2001). ‘Changing the Social Meaning of Privacy in Cyberspace’. 15 Harvard Journal of Law and Technology149Google Scholar
Hoofnagle, C. J. (2004, Summer). ‘Big Brother's Little Helpers: How ChoicePoint and Other Commercial Data Brokers Collect, Process, and Package Your Data for Law Enforcement’. University of North Carolina Journal of International Law and Commercial Regulation, vol. 29, no. 4, pp. 595–637Google Scholar
Horwitz, M. (1982). ‘The History of the Public/Private Distinction’. 130 University of Pennsylvania Law Review1423CrossRefGoogle Scholar
Ignatieff, M. (2002a, February 5). ‘Is the Human Rights Era Ending?New York Times, p. A29Google Scholar
Ignatieff, M.. (2002b). Human Rights as Politics and Idolatry. Princeton, NJ: Princeton University PressGoogle Scholar
Kang, J. (1998). ‘Information Privacy in Cyberspace Transactions’. 50 Stanford Law Review1193CrossRefGoogle Scholar
Kang, J. & Buchner, B. (2004, Fall). ‘Privacy in Atlantis: A Dialogue of Form and Substance’. Harvard Journal of Law and Technology, vol. 18, no. 1. Available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=626942Google Scholar
Katz v. United States, 389 U.S. 347 (1967)
Kaye, D. H. (2001, Summer). ‘The Constitutionality of DNA Sampling on Arrest’. Cornell Journal of Law and Public Policy, vol. 10, issue 3, p. 455(55)Google Scholar
Kyllo v. United States, 533 U.S. 27 (2001)
LaFave, W. (1966). 1 Search and Seizure (3rd ed.), section 2.1(d), pp. 393–4
Lawrence v. Texas, 539 U.S. 558 (2003)
Lawyers Committee for Human Rights (herein “LCHR”). (2003). Assessing the New Normal: Liberty and Security for the Post-September 11 United States. New York. Available at: http://www.humanrightsfirst.org/pubs/descriptions/Assessing/AssessingtheNewNormal.pdf
Mark, R. (2003, July 29). ‘Pentagon Folds Hand in Online Terrorism Futures Scheme’. Available at: http://dc.internet.com/news/article.php/2241421
Markle Foundation (2003). Creating a Trusted Information Network for Homeland Security: Second Report of the Markle Foundation Task Force. Available at: http://www.markletaskforce.org/Report2_Full_Report.pdf
Martin, L. H., Gutman, H., & Hutton, P. H. (Eds.). (1988). ‘Technologies of the Self: A Seminar with Michel Foucault’. Amherst, MA: University of Massachusetts PressGoogle Scholar
McClurg, A. J. (2003). ‘A Thousand Words Are Worth a Picture: A Privacy Tort Response to Consumer Data Profiling’. 98 Northwestern University Law Review63Google Scholar
Minnesota v. Carter, 525 U.S. 93, 97 (1998)
Minow, M. (1987). ‘We, The Family: Constitutional Rights and American Families’. Journal of American History, vol. 74, no. 3, p. 959CrossRefGoogle Scholar
Mitchell, W. J. (2003). Me++: The Cyborg Self and the Networked City. Cambridge, MA: MIT PressGoogle Scholar
Multi-State Anti-Terrorism Information Exchange (MATRIX). Available at: http://www.matrix-at.org/. Accessed on 24 August 2004
National Law Journal Roundtable (2003, April 26). ‘Patriot Act Attacked’. 26 April 2003, p. 19
Nissbenbaum, H. (2004). ‘Privacy as Contextual Integrity’. 79 Washington Law Review119Google Scholar
Nussbaum, M. (2003). ‘Compassion and Terror’. In Sterba, J. P. (Ed.), Terrorism and International Justice, pp. 229–52. Oxford: Oxford University PressGoogle Scholar
Peller, G. (1985). ‘The Metaphysics of American Law’. 73 California Law Review1151CrossRefGoogle Scholar
Perrot, M. (1990). ‘The Secret of the Individual’. In Perrot, M. (Ed.), A. Goldhammer, (Transl.), A History of Private Life, vol. 4: From the Fires of Revolution to the Great War, pp. 457–548. P. Ariès and G. Duby (general Eds.). Cambridge, MA: Belknap Press, Harvard University PressGoogle Scholar
Planned Parenthood of Southeastern Pennsylvania v. Casey, 505 U.S. 833 (1992)
Pohlmann, N. & Crothers, T. (2002). Firewall Architecture for the Enterprise. John Wiley & Sons, Inc.Google Scholar
Poindexter, J. (2002, August 2). ‘Overview of the Information Awareness Office’. Prepared remarks for delivery at DARPATech 2002, Anaheim, CA, Aug. 2, 2002. Available at: http://www.fas.org/irp/agency/dod/poindexter.html
Posner, R. (1979). ‘The Uncertain Protection of Privacy by the Supreme Court’. Supreme Court Review 173, 188Google Scholar
Post, R. C. (2001). ‘Three Concepts of Privacy’. 89 Georgetown Law Journal2087Google Scholar
Rasul v. Bush, 124 S. Ct. 2686, 159 L. Ed. 2d 548, 72 U.S.L.W. 4596, 2004 U.S. LEXIS 4760 (2004)
Regnier, T. (2004, Spring). ‘The “Loyal Foot Soldier”: Can the Fourth Amendment Survive the Supreme Court's War on Drugs?UKMC Law Review, vol. 72, issue 3, pp. 631–68Google Scholar
Reiss, S. (2004, May). ‘Poindexter Confidential’. Wired Magazine, Issue 12.05. Available at: http://www.wired.com/wired/archive/12.05/poindexter.htmlGoogle Scholar
Rendell-Baker v. Kohn, 457 U.S. 830 (1982)
Rennie, D. (2003, August 1). ‘Admiral Behind Terrorist Futures Market “To Quit”’. Daily Telegraph (London), p. 20
‘Responses by Center for Democracy and Technology and Other Civil Liberties Organizations to TIA Report’ (herein “Responses”) (2003, August 20). Available at: http://www.cdt.org/security/usapatriot/030520cdt.shtml
R. L. Polk & Co. (2005). ‘Automotive Profiling System’. Available at: http://www.polk.com/products/aps.asp
Roe v. Wade, 410 U.S. 113 (1973)
Rosen, J. (2000). The Unwanted Gaze: The Destruction of Privacy in America. New York: VintageGoogle Scholar
Safire, W. (2003, February 13). ‘Privacy Invasion Curtailed’. New York Times, p. 41Google Scholar
Samuelson, P. (2000). ‘Privacy as Intellectual Property?52 Stanford Law Review1125CrossRefGoogle Scholar
Schneier, B. (2003). Beyond Fear: Thinking Sensibly About Security in an Uncertain World. New York: Springer-VerlagGoogle Scholar
Scott, J. C. (1998). Seeing Like a State: How Certain Conditions to Improve the Human Condition Have Failed. New Haven: Yale University PressGoogle Scholar
Solove, D. J. (2002). ‘Conceptualizing Privacy’. 90 California Law Review1087CrossRefGoogle Scholar
Solove, D. J. & Rotenberg, M. (2003). Information Privacy Law, p. 27. New York: Aspen PublishersGoogle Scholar
St. Petersburg Times (Florida). ‘Total Information Awareness II?31 May 2004, p. 12A
Stone, G. R. (2004). Perilous Times: Free Speech in Wartime from the Sedition Act of 1789 to the War on Terrorism. New York: W. W. Norton & Co.Google Scholar
Strathern, M. (2003). ‘Emergent Relations’. In Biagioli, M. & Galison, P. (Eds.). Scientific Authorship, pp. 169–94, chapter 7. New York: RoutledgeGoogle Scholar
Sudell, A. (2001). ‘Comment: To Tell or Not to Tell: The Scope of Physician-Patient Confidentiality When Relatives Are at Risk of Genetic Disease’. 18 Journal of Contemporary Health Law and Policy273Google ScholarPubMed
Sutherland, J. (2002, February 18). ‘No more Mr Scrupulous Guy’. The Guardian (United Kingdom). Available at: http://www.guardian.co.uk/g2/story/0,3604,651950,00.htmlGoogle Scholar
Technology and Privacy Advisory Committee (herein “TPAC”) (2004, March 1). Safeguarding Privacy in the Fight Against Terrorism: Report of the Technology and Privacy Advisory Committee to the Department of Defense. Available at: http://www.mipt.org/pdf/Safeguarding-Privacy-Fight-Against-Terrorism.pdf
Times-Picayune (New Orleans, LA). ‘Plots at Public Meetings?3 June 2002, p. 4
Turkel, S. (1997). Life on the Screen: Identity in the Age of the Internet. New York: TouchstoneGoogle Scholar
United States v. Leon, 468 U.S. 897 (1984)
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (herein “USA PATRIOT Act”), Pub. L. No. 107–56, 302(a) (1), 115 Stat. 272 (2001)
Warren, S. D. & Brandeis, L. D. (1890). ‘The Right to Privacy’. 4 Harvard Law Review 193CrossRef
Weaver, K. D. (1997). ‘Genetic Screening and the Right Not to Know’. Issues in Law & Medicine, vol. 13. no. 3, p. 243Google ScholarPubMed
Webster v. Reproductive Health Services, 492 U.S. 490 (1989)
Weintraub, B. (1986, November 26). ‘Iran Payment Found Diverted to Contras; Reagan Security Advisor and Aide Are Out’. New York Times, p. A1Google Scholar
Westin, A. F. (1967). Privacy and Freedom. London: Bodley HeadGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×