The Right to Quantitative Privacy David Gray

Total Page:16

File Type:pdf, Size:1020Kb

The Right to Quantitative Privacy David Gray University of Minnesota Law School Scholarship Repository Minnesota Law Review 2013 The Right to Quantitative Privacy David Gray Danielle Citron Follow this and additional works at: https://scholarship.law.umn.edu/mlr Part of the Law Commons Recommended Citation Gray, David and Citron, Danielle, "The Right to Quantitative Privacy" (2013). Minnesota Law Review. 285. https://scholarship.law.umn.edu/mlr/285 This Article is brought to you for free and open access by the University of Minnesota Law School. It has been accepted for inclusion in Minnesota Law Review collection by an authorized administrator of the Scholarship Repository. For more information, please contact [email protected]. Article The Right to Quantitative Privacy David Gray† & Danielle Citron†† Introduction ................................................................................. 63 I. Quantitative Privacy: The Perils of Broad and Indiscriminate Surveillance .................................................. 73 II. Quantitative Privacy and the Fourth Amendment ............ 83 A. Qualitative Privacy: The Fourth Amendment Before United States v. Jones ................................... 83 B. A Fourth Amendment Foothold for Quantitative Privacy in United States v. Jones ............................. 87 C. The Fourth Amendment Foundations of † Professor of Law, University of Maryland Francis King Carey School of Law. †† Lois K. Macht Research Professor & Professor of Law, University of Maryland Francis King Carey School of Law, Affiliate Scholar, Stanford Cen- ter on Internet and Society, Affiliate Fellow, Yale Information Society Project. The authors thank everyone who generously commented on this work during presentations at Yale’s Information Society Project, the Annual Meeting of the ABA/AALS Criminal Law Section, the University of North Carolina, North- western, Yale’s Conference on Locational Privacy and Biometrics, Law and So- ciety, the Privacy Law Scholars Conference, and the Computers, Freedom, and Privacy Conference, and during conversations at the American Law Institute Meeting on Information Privacy Law and Harvard Law Review’s Symposium on Informational Privacy. Particular thanks go to Ronald Allen, Julia Angwin, Jack Balkin, Kevin Bankston, Steve Bellovin, Marc Blitz, Richard Boldt, Becky Bolin, Mary Bowman, Al Brophy, Andrew Chin, Bryan Choi, Thomas Clancy, Julie Cohen, Thomas Crocker, Nick Doty, LisaMarie Freitas, Susan Freiwald, Barry Friedman, Brandon Garrett, Bob Gellman, Don Gifford, Mark Graber, John Grant, James Grimmelmann, Deborah Hellman, Leslie Meltzer Henry, Lance Hoffman, Renée Hutchins, Camilla Hrdy, Orin Kerr, Joseph Kennedy, Catherine Kim, Anne Klinefelter, Avner Levin, Michael Mannheimer, Dan Markel, Christina Mulligan, Richard Myers, Neil Richards, Catherine Sabbeth, Laurent Sacharoff, Paul Schwartz, Christopher Slobogin, Robert Smith, Dan Solove, Max Stearns, David Super, Harry Surden, Peter Swire, Peter Quint, Jason Weinstein, Arthur Weisburd, and Jonathan Witmer-Rich. We also thank Liz Clark Rinehart for her research assistance and Max Siegel for his insightful editing. Finally, we are grateful to Frank Lancaster for holding us together. Copyright © by David Gray and Danielle Citron. 62 2013] QUANTITATIVE PRIVACY 63 Quantitative Privacy ................................................. 92 III. The Technology-Centered Approach to Quantitative Privacy ......................................................... 101 A. Fourth Amendment Precedents for a Technology-Centered Approach .............................. 103 B. The Technology-Centered Approach and Aerial Surveillance Drones ................................................. 105 C. The Technology-Centered Approach and Data Aggregation .............................................................. 112 D. The Technology-Centered Approach and Human Surveillance .............................................................. 124 IV. Some Concerns About Quantitative Privacy in Practice . 125 A. The Technology-Centered Approach Resolves Practical Challenges ................................................ 126 B. The Technology-Centered Approach and the Public Observation Doctrine ................................... 131 C. The Technology-Centered Approach and the State Agency Requirement ..................................... 133 D. The Technology-Centered Approach and the Third-Party Doctrine ............................................... 137 Conclusion .................................................................................. 144 INTRODUCTION In June and July 2013, documents leaked by a government contractor revealed details of three expansive surveillance pro- grams operated by the Federal Bureau of Investigation (FBI) and the Department of Defense on behalf of the National Secu- rity Agency (NSA).1 The first requires that Verizon and other telecommunication companies provide to the NSA on a daily basis “all call detail records or ‘telephony metadata’ created by Verizon for communications (i) between the United States and abroad; or (ii) wholly within the United States, including local 1. See Barton Gellman & Laura Poitras, U.S., British Intelligence Min- ing Data from Nine U.S. Internet Companies in Broad Secret Program, WASH. POST, June 6, 2013, http://www.washingtonpost.com/investigations/us -intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret -program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html; Glenn Greenwald, NSA Collecting Phone Records of Millions of Verizon Cus- tomers Daily, GUARDIAN, June 5, 2013, http://www.theguardian.com/world/ 2013/jun/06/nsa-phone-records-verizon-court-order [hereinafter Greenwald, Phone Records]; Glenn Greenwald, XKeyscore: NSA Tool Collects ‘Nearly Eve- rything a User Does on the Internet,’ GUARDIAN, July 31, 2013, http://www .theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data [here- inafter Greenwald, XKeyscore]. 64 MINNESOTA LAW REVIEW [98:62 telephone calls.”2 Although this program does not allow for the collection of content, including customers’ conversations, te- lephony metadata is a rich source of information, giving au- thorities vast knowledge about callers’ identity, location, and social networks.3 A second program, referred to in leaked doc- uments as “PRISM,” reportedly allows the NSA and the FBI to access “audio and video chats, photographs, e-mails, docu- ments, and connection logs” collected by nine leading U.S. in- ternet companies, including Google and Facebook.4 The third program, called XKeyscore, provides analysts with the capacity to mine content and metadata generated by e-mail, chat, and browsing activities through a global network of servers and in- ternet access points.5 These revelations confirm previous re- ports about a comprehensive domestic surveillance program that seeks to provide government agents with contemporary and perpetual access to details about everywhere we go and everything we do, say, or write, particularly when using or in the company of networked technologies.6 2. Verizon Forced to Hand Over Telephone Data‒Full Court Ruling, GUARDIAN, June 5, 2013, http://www.theguardian.com/world/interactive/2013/ jun/06/verizon-telephone-data-court-order [hereinafter FISA]. The NSA subse- quently released a declassified version of the order. See Declassified Govern- ment Documents Related to NSA Collection of Telephone Metadata Records, WASH. POST, http://apps.washingtonpost.com/g/page/politics/government -documents-related-to-nsa-collection-of-telephone-metadata-records/351/ (last visited Oct. 15, 2013). 3. Dan Roberts & Spencer Ackerman, Anger Swells After NSA Phone Records Court Order Revelations, GUARDIAN, June 6, 2013, http://www .theguardian.com/world/2013/jun/06/obama-administration-nsa-verizon -records (“[Telephony] metadata . can provide authorities with vast knowledge about a caller’s identity. [C]ross-checked against other public records, the metadata can reveal someone’s name, address, driver’s license, credit history, social security number and more.”). 4. Gellman & Poitras, supra note 1. The companies identified as partici- pants in PRISM have denied granting government agents open access to their servers. Id. As of this writing, the full truth of the program remains hidden behind a veil of alleged national security necessity. 5. Greenwald, XKeyscore, supra note 1. 6. See JAMES BAMFORD, THE SHADOW FACTORY 177–96 (2008) [hereinaf- ter BAMFORD, SHADDOW]; James Bamford, The NSA Is Building the Country’s Biggest Spy Center, WIRED MAG., Mar. 15, 2012, available at http://www.wired .com/threatlevel/2012/03/ff_nsadatacenter/all/1 [hereinafter Bamford, The NSA is Building]; Michael Isikoff, The Fed Who Blew the Whistle, NEWSWEEK (Dec. 12, 2008), http://www.thedailybeast.com/newsweek/2008/12/12/the-fed -who-blew-the-whistle.html; James Risen & Eric Lichtblau, Bush Lets U.S. Spy on Callers Without Courts, N.Y. TIMES, Dec. 15, 2005, http://www.nytimes .com/2005/12/16/politics/16program.html?pagewanted=all. 2013] QUANTITATIVE PRIVACY 65 The domestic surveillance infrastructure is not confined to our networked communications, however. Consider aerial drones. No longer just a feature of modern warfare, unmanned aerial drones now populate domestic airspace.7 Military-style drones operate along the United States border with Mexico.8 Farther inland, law enforcement agencies are starting to use a variety of drones during their routine police operations.9 Many of these drones are hardly visible, and some are as small as in- sects.10 Among the primary
Recommended publications
  • Reconciling Data Privacy and the First Amendment
    RECONCILING DATA PRIVACY AND THE FIRST AMENDMENT Neil M. Richards This Article challenges the First Amendment critique of data privacy regulaion- the claim that data privacy rules restrict the dissemination of truthful information and thus violate the FirstAmendment. The critique, which is ascendant in privacy discourse, warps legislative and judicial processes and threatens the consti- tutionalization of information policy. The First Amendment critique should be rejected for three reasons. First, it mistakenly equates privacy regulation with speech regulation. Building on scholarship examining the boundaries of First Amendment protection, this Article suggests that "speech restrictions" in a wide variety of commercial contexts have never triggered heightened First Amendment scru- tiny, refuting the claim that all information flow regulations fall within the First Amendment. Second, the critique inaccurately describes current First Amendment doctrine. To demonstrate this point, this Article divides regulations of information flows into four analytic categories and demonstrates how, in each category, ordinary doctrinal tools can be used to uphold the constitutionality of consumer privacy rules. Third, the critique is normatively unpersuasive. Relying on recent intellectual histories of American constitutional law, this Article argues that fundamental jurisprudentialreasons counsel against acceptance of the First Amendment critique. From the perspective of privacy law, there are striking parallels between the critique's advocacy of "freedom of information" and the discredited "freedom of contract" regime of Lochner. More importantly, from the perspective of First Amendment law, the critique threatens to obliterate the distinction between economic and political rights at the core of post-New Deal constitutionalism. Rejecting the FirstAmendment critique thus has real advantages.
    [Show full text]
  • Law, Technology, and Public Health in the COVID-19 Crisis
    Privacy in Pandemic: Law, Technology, and Public Health in the COVID-19 Crisis Tiffany C. Li* The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical AI. Public and private actors alike are using new technologies, like heat sensing, and technologically influenced programs, like contact tracing, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the emergency nature of the pandemic has drowned out many concerns. This Article is the first comprehensive account of privacy in pandemic that maps the terrain of privacy impacts related to technology and public health responses to the COVID-19 crisis. Many have written on the general need for better health privacy protections, education privacy protections, consumer privacy protections, and protections against government and corporate surveillance. However, this Article is the first comprehensive article to examine these problems of privacy and technology specifically in light of the pandemic, arguing that the lens of the pandemic exposes the need for both wide-scale and small-scale reform of privacy law. This Article approaches these problems with a focus on technical realities and social * Visiting Clinical Assistant Professor, Boston University School of Law; Fellow, Yale Law School Information Society Project. The author thanks Tally Amir, Chinmayi Arun, Jack M.
    [Show full text]
  • Understanding Emerging Threats to Online Advertising
    Understanding Emerging Threats to Online Advertising Ceren Budak Sharad Goel Justin Rao University of Michigan Stanford University Microsoft Research Georgios Zervas Boston University Questrom School of Business June 11, 2016 Abstract Two recent disruptions to the online advertising market are the widespread use of ad-blocking software and proposed restrictions on third-party tracking, trends that are driven largely by consumer concerns over privacy. Both primarily impact display advertising (as opposed to search and native social ads), and affect how retailers reach customers and how content producers earn revenue. It is, however, unclear what the consequences of these trends are. We investigate using anonymized web browsing his- tories of 14 million individuals, focusing on \retail sessions" in which users visit online sites that sell goods and services. We find that only 3% of retail sessions are initiated by display ads, a figure that is robust to permissive attribution rules and consistent across widely varying market segments. We further estimate the full distribution of how retail sessions are initiated, and find that search advertising is three times more important than display advertising to retailers, and search advertising is itself roughly three times less important than organic web search. Moving to content providers, we find that display ads are shown by 12% of websites, accounting for 32% of their page views; this reliance is concentrated in online publishing (e.g., news outlets) where the rate is 91%. While most consumption is either in the long-tail of websites that do not show ads, or sites like Facebook that show native, first-party ads, moderately sized web publishers account for a substantial fraction of consumption, and we argue that they will be most affected by changes in the display advertising market.
    [Show full text]
  • Commercial Data Privacy and Innovation in the Internet Economy: a Dynamic Policy Framework
    COMMERCIAL DATA PRIVACY AND INNOVATION IN THE INTERNET ECONOMY: A DYNAMIC POLICY FRAMEWORK THE DEPARTMENT OF COMMERCE INTERNET POLICY TASK FORCE MESSAGE FROM SECRETARY OF COMMERCE GARY LOCKE The Internet is an extraordinary platform for innovation, economic growth, and social communication. Using the Internet, entrepreneurs reach global markets, political groups organize, and major companies manage their supply chains and deliver services to their customers. Simply stated, the Internet is becoming the central nervous system of our information economy and society. Over the last 15 years, personal computers, mobile phones, and other devices have transformed how we access and use information. As powerful, exciting, and innovative as these developments are, they also bring with them new concerns. New devices and applications allow the collection and use of personal information in ways that, at times, can be contrary to many consumers’ privacy expectations. Addressing these issues in a way that protects the tremendous economic and social value of the Internet without stifling innovation requires a fresh look at Internet policy. For this reason, in April 2010, I launched an Internet Policy Task Force (IPTF), which brings together the technical, policy, trade, and legal expertise of the entire Department. The following report – or green paper – recommends consideration of a new framework for addressing online privacy issues in the United States. It recommends that the U.S. government articulate certain core privacy principles—in order to assure baseline consumer protections—and that, collectively, the government and stakeholders come together to address specific privacy issues as they arise. We believe this framework will both improve the state of affairs domestically and advance interoperability among different privacy regimes around the world so that, globally, Internet services can continue to flourish.
    [Show full text]
  • Platform Justice: Content Moderation at an Inflection Point 3
    A HOOVER INSTITUTION ESSAY ON Platform Justice C ONTENT MODERATION at an INFLECTION POINT DANIELLE CITRON & QUINTA JURECIC Aegis Series Paper No. 1811 In June 2016, Facebook Vice President Andrew Bosworth circulated an internal memorandum describing the company’s mission. “We connect people,” he wrote. “Maybe someone finds love. Maybe [Facebook] even saves the life of someone on the brink of suicide. Maybe it costs a life by exposing someone to bullies. Maybe someone dies in a terrorist attack coordinated on our tools.”1 Bosworth was not speaking metaphorically. The month after he distributed the memo, Facebook was sued by the parents of five victims of terrorist attacks conducted by Hamas, which had made extensive use of the company’s platform to recruit and organize. Days before, the social media platform had inadvertently broadcast a murder over the streaming app Facebook Live. National Security, Technology, and Law and Technology, Security, National Yet the outrage Facebook weathered in the aftermath of this violence was nothing compared to the scathing criticism it endured two years later after Buzzfeed News published Bosworth’s memo. When the memo leaked in March 2018, Facebook was neck-deep in controversies over its influence on the 2016 presidential election, including the use of the platform’s ad-targeting function by Russian trolls to sow political discord and the harvesting of user data under false pretenses by the Trump-affiliated political consultancy Cambridge Analytica.2 Meanwhile, Facebook’s competitors, Twitter and Google, faced mounting criticism over their failure to curb disinformation and abusive content.3 In 2016, Bosworth’s memo might have been an awkward attempt at self-reflection.
    [Show full text]
  • Faculty Positions Announced Students Speak on Schedule Springfield Project Aids Area Youths Council Officers Elected Cost Winner
    I, THE nthusi- strong st and T," said nment, are go- ok for- le most )ecause irk pre- Vol. 70, ;ses the No.9 Deerfield Academy, Deerfield, Mass. 01342 MAY 24, 1996 ; a con- )etition 5. The Faculty Positions Announced Springfield Project Aids Area Youths t Lake Kristin Searle feature Michael Drake Heises and Mr. Fraker for this course, will be published . Deer- this fall. Mr. Fraker will con- Many months of planning on the The new faculty positions for tinue to such as teach Advanced Placement U.S part of several Deerfield faculty as well next year were announced on April History 1, Cho- 29. in addition to chairing the depart- as teachers from Chestnut Middle School The new dean of faculty will be Richard ment. d crew in Springfield reached an exciting climax Bonanno, who is currently the coordina- xl work As the foreign language chair, this spring with the institution of a com- tor of the Parker Technology Center. The Ms. Lyons hopes to further computer in- munity service project known assistant head as "The of student life will be cur- tegration into classroom teaching, require Springfield Project." rent Dean of Students Pamela Bonanno. placement rst tests for all new students, and From Deerfield, three members Stephen Murray will be the dean of stu- make upper level language courses con- of the community were centrally involved dents for juniors and seniors, while Heidi tent-based, as at universities, rather than in the planning of this project. Paloma ;ed of: Valk will be the dean for freshmen and sequential.
    [Show full text]
  • Through the Classroom Window Mcif[]ZhgHcH\Y5Bbiu` :IbxDfcj]XYGhixybhg H\YÉbubw]U`GiddcfhH\Ym ByyxHcUhhu]BUGU]Bh AufmágYxiwuh]Cb"
    Fall 2008 Through the Classroom Window Mcif[]Zhghch\Y5bbiU` :ibXdfcj]XYghiXYbhg h\YÉbUbW]U`giddcfhh\Ym bYYXhcUhhU]bUGU]bh AUfmÁgYXiWUh]cb" 5`iabUYdUfh]W]dUh]cb ]bh\Y5bbiU`:ibX]gU aYUgifYcZgUh]gZUWh]cb ]bmcifYXiWUh]cb"=h ]adfcjYgcifbUh]cbU` fUb_]b[g]bCA<Sea& E]`ZR@S^]`bUbX]bWfYUgYg h\YjU`iYcZmcifXY[fYY" G]c`UWTb[OYSa ORWTTS`S\QS >ZSOaSac^^]`bbVS/\\cOZ4c\R G]c1O\;OYSO2WTTS`S\QS PgdWaWbW\Uca]\ZW\SOb eeeaOW\b[O`gaSRcUWdS Mcif[]ZhWci`X\Y`dUmcib[kcaUbµ ]`PgQOZZW\U&A;1&&% ÉbXUd`UWYUhGU]bhAUfmÁgµ k\YfYg\YWcadYhYgUbXWccdYfUhYgk]h\dYYfgµ cbUbYjYbd`Um]b[ÉY`Xµ UbXX]gWcjYfg]b\YfgY`ZUghfYb[h\ UXf]jYµ g\YX]Xbch_bckg\Y\UXµ k\YfYg\YdYfZYWhg\YfU]aµ gch\Uhk\UhYjYfdUh\g\YW\ccgYg]b`]ZYµ g\YÁ``VYfYUXmhchU_Yh\Yg\ch" Volume 83, Number 3 tableof contents Fall 2008 The Saint Mary’s College Courier (USPS 135-340) is published four times a year by Saint Mary’s College, Notre Dame, IN 46556-5001. Periodicals postage paid at the Post Offi ce at Notre Dame, IN 46556 and at additional mailing offi ces. POSTMASTER: Send address changes to Alumnae Relations, Saint Mary’s College, 110 Le Mans Hall, Notre Dame, IN 46556-5001. Copyright 2008 Saint Mary’s College, Notre Dame, IN 46556. Reproduction in whole or part is prohibited without written permission. The opinions expressed are those of the authors or their subjects and are not necessarily shared by the College or the editor. Shari Rodriguez Vice President for College Relations [email protected] Page 8 Page 10 Karen Zagrocki McDonald ’76 Acting Assistant Vice President Integrated Marketing Communications [email protected] Courier Staff: Scot Erin Briggs Editor features [email protected] Natalie Davis Miller Staff Writer 6 Redefi ning Summer 14 Preparing the Way Shannon E.
    [Show full text]
  • Regulating Online Behavioral Advertising, 44 J. Marshall L. Rev
    The John Marshall Law Review Volume 44 | Issue 4 Article 2 Summer 2011 Regulating Online Behavioral Advertising, 44 J. Marshall L. Rev. 899 (2011) Steven C. Bennett Follow this and additional works at: http://repository.jmls.edu/lawreview Part of the Computer Law Commons, Consumer Protection Law Commons, Internet Law Commons, Marketing Law Commons, and the Privacy Law Commons Recommended Citation Steven C. Bennett, Regulating Online Behavioral Advertising, 44 J. Marshall L. Rev. 899 (2011) http://repository.jmls.edu/lawreview/vol44/iss4/2 This Article is brought to you for free and open access by The oJ hn Marshall Institutional Repository. It has been accepted for inclusion in The oJ hn Marshall Law Review by an authorized administrator of The oJ hn Marshall Institutional Repository. REGULATING ONLINE BEHAVIORAL ADVERTISING STEVEN C. BENNETT* Online behavioral advertising ("OBA"), sometimes known as profiling or behavioral targeting, can be used by on-line publishers and internet marketers to increase the efficiency and effectiveness of their advertising campaigns.' OBA works by collecting data on a user's behavior on the Internet including browsing habits, search queries, and web site viewing history. OBA generally seeks to in- crease the relevance of advertising displayed to the user, based on data collected about the user, with the aim of increasing the strength of the connection between advertising efforts and pur- chasing behavior. Recently, the Federal Trade Commission ("FTC"), the De- partment of Commerce ("DOC"), and congressional leaders have suggested a need for more intensive regulation of OBA. The chief objective of such regulation is to ensure that consumer privacy is protected and that abuses of consumer information do not occur.
    [Show full text]
  • Privacy As Privilege: the Stored Communications Act and Internet Evidence Contents
    PRIVACY AS PRIVILEGE: THE STORED COMMUNICATIONS ACT AND INTERNET EVIDENCE Rebecca Wexler CONTENTS INTRODUCTION .......................................................................................................................... 2723 I. THE INTERNET AND THE TELEGRAPH ....................................................................... 2730 A. The Puzzle ........................................................................................................................ 2731 B. The Stored Communications Act .................................................................................. 2735 C. Telegraph Privacy Statutes ............................................................................................. 2741 II. PRIVACY AS PRIVILEGE .................................................................................................... 2745 A. Statutory Privileges ........................................................................................................ 2745 1. Defining Statutory Privileges ................................................................................... 2745 2. Common Features of Privileges ............................................................................... 2748 3. Confidentiality Without Privilege ........................................................................... 2750 4. The Current Stored Communications Act Privilege ............................................. 2753 B. The Rules that Govern Statutory Privilege Construction .........................................
    [Show full text]
  • Anonymity, Faceprints, and the Constitution Kimberly L
    University of Baltimore Law ScholarWorks@University of Baltimore School of Law All Faculty Scholarship Faculty Scholarship Winter 2014 Anonymity, Faceprints, and the Constitution Kimberly L. Wehle University of Baltimore School of Law, [email protected] Follow this and additional works at: http://scholarworks.law.ubalt.edu/all_fac Part of the Constitutional Law Commons, Fourth Amendment Commons, and the Privacy Law Commons Recommended Citation Anonymity, Faceprints, and the Constitution, 21 Geo. Mason L. Rev. 409 (2014) This Article is brought to you for free and open access by the Faculty Scholarship at ScholarWorks@University of Baltimore School of Law. It has been accepted for inclusion in All Faculty Scholarship by an authorized administrator of ScholarWorks@University of Baltimore School of Law. For more information, please contact [email protected]. 2014] 409 ANONYMITY, FACEPRINTS, AND THE CONSTITUTION Kimberly N. Brown' INTRODUCTION Rapid technological advancement has dramatically expanded the war­ rantless powers of government to obtain information about individual citi­ zens directly from the private domain. Biometrics technology I-such as voice recognition, hand measurement, iris and retinal imaging, and facial recognition technology ("FRT")-offers enormous potential for law en­ forcement and national security. But it comes at a cost. Although much of the American public is complacent with government monitoring for securi­ ty reasons,2 people also expect to go about daily life in relative obscurity­ unidentifiable to others they do not already know, do not care to know, or are not required to know-so long as they abide by the law. The reality is quite different. The government and the private sector have the capacity for surveillance of nearly everyone in America.
    [Show full text]
  • Anonymity, Obscurity, and Technology: Reconsidering Privacy in the Age of Biometrics
    ANONYMITY, OBSCURITY, AND TECHNOLOGY: RECONSIDERING PRIVACY IN THE AGE OF BIOMETRICS JONATHAN TURLEY ABSTRACT For decades, cinematic and literary works have explored worlds without privacy: fishbowl societies with continual, omnipresent surveillance. For those worried about a post-privacy world, facial recognition technology and other biometric technology could well be the expanding portal to that dystopia. These technologies are rapidly transforming a society predicated on privacy into a diaphanous society where identity and transparency are defining elements. Biometric technology is perfectly suited to evade current privacy protections and doctrines because it presents new challenges to the existing legal framework protecting privacy. The greatest threat of this technological shift is to democratic activities—the very reason that countries such as China have invested so heavily into biometric surveillance systems. This Article explores how our traditional privacy notions fit into a new age of biometrics. It seeks to frame the debate on what values society’s notions of privacy protect, and how to protect them. After exploring prior approaches and definitions to privacy, it proposes a shift from an emphasis on anonymity to a focus on obscurity. The truth is that we now live in a “nonymous” world where our movements and associations will be made increasingly transparent. This Article concludes by recommending a comprehensive approach to biometric technology that would obscure increasingly available images and data while recasting privacy protections to fit a new and unfolding biometric reality. This obscurity will allow participation in society to continue unimpeded by the chilling effects created by the new technology. Without it, our democratic society will never be the same.
    [Show full text]
  • Danielle Keats Citron, Professor of Law, Boston University School of Law
    PREPARED WRITTEN TESTIMONY AND STATEMENT FOR THE RECORD FOR Danielle Keats Citron, Professor of Law, Boston University School of Law HEARING ON “Fostering a Healthier Internet to Protect Consumers” BEFORE THE House Committee on Energy and Commerce October 16, 2019 John D. Dingell Room, 2123, Rayburn House Office Building Washington, D.C. INTRODUCTION Thank you for inviting me to appear before you to testify about corporate responsibility for online activity and fostering a healthy internet to protect consumers. My name is Danielle Keats Citron. I am a Professor of Law at the Boston University School of Law. In addition to my home institution, I am an Affiliate Faculty at the Berkman Klein Center at Harvard Law School, Affiliate Scholar at Stanford Law School’s Center on Internet & Society, Affiliate Fellow at Yale Law School’s Information Society Project, and Tech Fellow at NYU Law’s Policing Project. I am also a 2019 MacArthur Fellow. My scholarship focuses on privacy, free speech, and civil rights. I have published more than 30 articles in major law reviews and more than 25 opinion pieces for major news outlets.1 My book Hate Crimes in Cyberspace tackled the phenomenon of cyber stalking and what law, companies, and society can do about it.2 As a member of the American Law Institute, I serve as an adviser on Restatement (Third) Torts: Defamation and Privacy and the Restatement (Third) Information Privacy Principles Project. In my own writing and with coauthors Benjamin Wittes, Robert Chesney, Quinta Jurecic, and Mary Anne Franks, I have explored the significance of Section 230 to civil rights and civil liberties in a digital age.3 * * * Summary: In the early days of the commercial internet, lawmakers recognized that federal agencies could not possibly tackle all noxious activity online.
    [Show full text]