Page 120 - Privacy in a Cyber Age Policy and Practice
P. 120

108  PRIVACY IN A CYBER AGE

           Nixon and Scarlet Letter effects are clearly troubling, and one must discuss
           how to curb and deter them. The status of a newly minted right by privacy
           advocates—the right to be forgotten—is much less clear, because evidence
           shows that erasing the past much more often leads to people who abuse
           children, failures to revoke the medical licenses of alcoholic and addict
           doctors who have killed patients, and con artists to abuse the elderly. 32
               The question of using personal information to find criminals rather
           than terrorists raises a serious question of balance. On the one hand, there
           is reason to hold that the extraordinary powers granted to the government
           to counter terrorism, given the special threat, should not be used for other
           purposes. On the other, in a society in which over 35 percent of homicide
           cases remain unsolved, with that number rising to nearly 60 percent for
           cases of rape and almost 90 percent for instances of burglary and motor
           vehicle theft, some extension of powers to enhance public safety might be
                  33
           justified.  Sorting out this particular balance between privacy and public
           safety other than counterterrorism is beyond the purview of this chapter
           but deserves much more attention that it has been granted so far.
              The discussion next turns to the question of what measures can be
           taken to further ensure that counterterrorism powers will not be abused
           in any of the ways they have been in the past. That is, instead of arguing
           that there is no need to rebalance security and privacy in order to mini-
           mize future terrorist attacks—the challenge now is, given the assumption
           that a rebalancing is called for, what measures can be added to those in
           place to ensure that the enhanced powers will be employed only for legitimate
           purposes?
              The reason the challenge is worded in terms of which measures should
           be “added” rather than which should be “employed,” is that many are
           already in place. The executive branch has layers upon layers of super-
           visors, who are the first line of accountability. In addition, there are
           Inspectors General and Privacy Officers who often serve as quite forceful
                                           34
           critics of the practices of concern here.  Congress has various commit-
           tees charged with oversight, and there is also the investigative branch of
                                           35
           the Government Accountability Office.  The courts, too, play an impor-
           tant role in checking and balancing abuses of government power.  The
           media also frequently acts as a major guardian against abuses. Investiga-
           tive bodies such as the Pike and Church committees—as well as the 9/11
           Commission—also serve to review and vet the government’s claims and
           behavior. In the past, all these institutions served to reveal abuses when
           they occurred and acted to curb them, albeit often only after consider-
           able delay. Further, the fact that abuses occurred at all suggests that there
           is reason to further enhance scrutiny of the government and to establish
           additional precautionary measures.
   115   116   117   118   119   120   121   122   123   124   125