Page 119 - Privacy in a Cyber Age Policy and Practice
P. 119

LIBERAL COMMUNITARIAN APPROACH TO PRIVACY AND SECURITY  107

           ways to reduce the conflict between these two core values. One major way
           is to draw a sharp line between what is stored in and processed by
           computers—and what is revealed to human agents. Computers, per se, do
           not violate privacy. They do not gossip. They see no evil, hear no evil, and
           speak no evil. They can (vastly) facilitate privacy violations—but only as
           perpetrated by human agents. (Indeed, with respect to much of the data
           collected by the NSA, “they park stuff in storage in the hopes they will
           eventually have time to get to it or that they’ll find something that they
           need to go back and look for in the masses of data . . . most of it sits and is
                                 29
           never looked at by anyone.” ) Hence, those who are concerned with find-
           ing a reasonable balance between security and privacy should focus on the
           interface between computers and human agents. That is, we should ensure
           that once the computers flag particular individuals, this information is
           revealed only to law enforcement authorities and used by them in legal and
           accountable ways.
             Thus, computers can pull out all those who purchased a one-way ticket,
           paid with cash, and got the ticket at the last moment. It is far from clear,
           at least to this sociologist, that finding such patterns can suffice to identify
           terrorists. However, such searches could lead to closer computerized scru-
           tiny (e.g., to see if those who drew attention have also made calls to areas
           in which terrorists train, have traveled to those same areas, or have visited
           al Qaeda websites) and, if suspicious activity is found, the computers could
           then alert a human agent.

                                D. Trust but Verify

                                  1. Curb Abuses

           Critics have strong reason to hold that, if the government is granted the
           power to collect information about the private lives of individuals, the gov-
           ernment will abuse it. Among possible abuses are the use of data to find
           and prosecute people of opposing political views, which some have called
                        30
           the Nixon effect;  to stigmatize people whose conduct violates established
           norms but not the law, such as those who have adulterous affairs, abortions,
           or unusual sexual preferences, which one might call the “Scarlet Letter”
           effect; to keep information that, in the past, would have been slowly forgot-
           ten, thereby allowing people to develop new identities, such as a person
           whose “conviction of graffiti vandalism at age 19 will still be there at age 29
                                                                31
           when [they’re] a solid citizen trying to get a job and raise a family” ; and
           to go after crimes other than terrorist acts.
             There is no question that, in the past, all of these abuses have taken
           place. One should also note that they are not one and the same kind. The
   114   115   116   117   118   119   120   121   122   123   124