text
stringlengths 0
118
|
---|
c y : A N
|
e w U
|
n
|
d
|
e
|
r
|
s
|
t
|
a
|
n
|
d
|
i n
|
g
|
data-mining project called Total Information Awareness under the
|
leadership of Admiral John Poindexter. T he program involved col
|
lecting extensive information about people, such as financial, educa
|
tional, health, and other data. T he information would then be analyzed
|
for behavior patterns to identify terrorists. According to Poindexter,
|
“The only way to detect. . . terrorists is to look for patterns of activity
|
that are based on observations from past terrorist attacks as well as es
|
timates about how terrorists will adapt to our measures to avoid detec
|
tion.”45 W hen the program came to light, a public outcry erupted that
|
led to the demise of the program when the U.S. Senate voted to deny it
|
funding. Nevertheless, many components of Total Information Aware
|
ness continue in various government agencies in a less systematic and
|
more clandestine fashion.46
|
Beyond Total Information Awareness, the government engages in a
|
number of data-mining programs—about 200 according to a 2004
|
government report.47 One example is the M ulti-State Anti-Terrorism
|
Information Exchange (MATRIX), a database of personal informa
|
tion used by various states.48 Another is the National Security Ad
|
ministration (NSA) data-mining program on telephone records.
|
After September 11, the NSA obtained customer records from sev
|
eral major phone companies and analyzed them to identify potential
|
terrorists.49 The telephone-call database was reported to be the
|
“largest database ever assembled in the world.”50 T he government
|
has also been devising a series of data-mining programs for airline
|
passenger screening.51
|
Some scholars argue that data mining does not pose a significant
|
threat to privacy. Much of the information involves relatively in
|
nocuous daily transactions and is not particularly sensitive or revealing.
|
Moreover, Richard Posner argues:
|
T he collection, mainly through electronic means, of vast amounts
|
of personal data is said to invade privacy. But machine collection
|
and processing of data cannot, as such, invade privacy. Because of
|
their volume, the data are first sifted by computers, which search
|
for names, addresses, phone numbers, etc., that may have intelli
|
gence value. This initial shifting, far from invading privacy (a
|
computer is not a sentient being), keeps most private data from
|
being read by any intelligence officer.52
|
Privacy: A New Understanding
|
193
|
Posner’s argument is one commonly made about the privacy of per
|
sonal information in large databases. The data is stored and analyzed
|
by computers. N o human might actually see the information. The pri
|
mary concern with data mining, according to Posner, is that the infor
|
mation might be used to blackmail people or leaked in order to “ridi
|
cule or embarrass.”53
|
Posner focuses only on problems of information dissemination (dis
|
closure and blackmail), but data mining also implicates several prob
|
lems of information collection and information processing. Data
|
mining often begins with the collection of personal information, usu
|
ally from various third parties that possess people’s data. Under cur
|
rent Supreme C ourt Fourth Amendment jurisprudence, when the
|
government gathers data from third parties, there is no Fourth
|
Amendment protection because people lack a “reasonable expectation
|
of privacy” in information exposed to others) As I argued extensively
|
in my book The Digital Person, the lack of Fourth Amendment protec
|
tion of third-party records results in the government’s ability to access
|
an extensive amount of personal information with minimal limitation
|
or oversight.54 Many scholars have referred to the collection of infor
|
mation as a form of surveillance. “Dataveillance,” a term coined by
|
Roger Clarke, refers to the “systemic use of personal data systems in
|
the investigation or monitoring of the actions or communications of
|
one or more persons.”55 Christopher Slobogin has referred to the
|
gathering of personal information in business records as “transac
|
tional surveillance.”56 Surveillance can create chilling effects on im
|
portant activities, especially ones essential for democracy, such as free
|
speech and free association.57
|
Surveillance, however, like disclosure, is just one of the problems
|
created by data mining. Far too often, discussions of government data
|
mining define the problem solely in terms of surveillance or disclo
|
sure. I have argued that this way of understanding the problem has
|
been embodied by the metaphor of George Orwell’s novel Nineteen
|
Eighty-four. 58 In Orwell’s novel, a totalitarian government known as
|
Big Brother engages in repressive surveillance of its citizens.59 The
|
problem, as understood by Orwell’s metaphor, is one of surveillance,
|
which chills people’s behavior. Privacy is violated when people can no
|
longer conceal information they want to hide. But data mining is
|
problematic even if no information we want to hide is uncovered. An
|
194
|
P
|
r
|
i v a
|
c y : A N
|
e w U
|
n
|
d
|
e
|
r
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.