You are on page 1of 20

No.

520 August 4, 2004 Routing

Understanding Privacy—and
the Real Threats to It
by Jim Harper

Executive Summary

Properly defined, privacy is the subjective con- government surveillance, is a profound and well-
dition people experience when they have power to recognized threat to privacy. Governments also
control information about themselves. Because undermine privacy by collecting, cataloging, and
privacy is subjective, government regulation in the sharing personal information about citizens for
name of privacy can only create confidentiality or administrative purposes. Less acknowledged—
secrecy rules based on politicians’ and bureau- but no less important—is the wide variety of laws
crats’ guesses about what “privacy” should look and regulations that degrade citizens’ power to
like. The most important, but elusive, part of true protect privacy as they see fit.
privacy protection is consumers’ exercise of power Whether it is anti-privacy regulation, data col-
over information about themselves. Ultimately, lection required by all manner of government pro-
privacy is a product of personal responsibility and grams, or outright surveillance, the relationship of
autonomy. governments to privacy is typically antagonistic.
Law has dual, conflicting effects on privacy. Privacy thrives when aware and empowered citi-
Law is essential for protecting privacy because it zens are able to exercise control of information
backs individuals’ privacy-protecting decisions, about themselves. Thoughtful policymakers
but much legislation plays a significant role in should recognize the detrimental effects many
undermining privacy. Indeed, the principal threats programs have on consumers’ privacy and
to privacy come from governments. respond with proposals that reduce the role of
These threats fall into three classes. The first, government in individuals’ lives.

_____________________________________________________________________________________________________
Jim Harper is the editor of Privacilla.org and director of information policy studies at the Cato Institute.
Although privacy Introduction Damocles over the privacy and civil liberties
threats from of citizens.
The rapid growth of the Internet in the Conclusions about privacy should not be
business and new late 1990s stimulated an important civic dis- drawn lightly or hastily. The subject is too
technology are cussion of privacy and information practices. complicated for that. Good policy requires
Though the Internet spawned the discussion, reasoned analysis and thought. Examination
real, the clearest the privacy debate now extends across the reveals that true privacy is threatened most
menace to privacy economy—in financial services, health care, by government action and regulation.
comes from and many other areas.
The information practices now being reex-
governments. amined evolved over decades under princi- Defining Privacy
ples that are far older. So, even though the
Internet brought privacy to the fore, the dis- An essential starting point, long missing
cussion should not happen at “Internet in discussions of privacy, is a definition of the
speed.” Too many innovations and consumer concept itself. The word “privacy” is used
benefits are at stake. As it continues to casually to describe many concerns in the
mature, the privacy debate should be carried modern world, and few concepts have been
out deliberately and thoughtfully, by open discussed so much without ever being solidly
minds, with an aim toward developing sound defined. If privacy is going to be a serious
long-term policies. topic in information policy—something
The majority of proposals in Congress, more than a catch-word in interest-group
the states, and international bodies have politics—it needs definition. The attempt
focused on the private sector to achieve pri- below is a serious run at it, but more work
vacy goals.1 This reflects a consensus among from other perspectives will be worthwhile:
politicians and other elites that technology Privacy is a state of affairs or condition
and big business are the greatest privacy having to do with the amount of personal
threats we face. It is a consensus reinforced by information about individuals that is known
advocates of regulation who have used to others. People maintain privacy by con-
loaded terms like “Big Browser”2 to foment trolling who receives information about
privacy concerns. them and on what terms. Privacy is the subjec-
But George Orwell coined the term “Big tive condition that people experience when they
Brother” as a warning against the invasive have power to control information about them-
power of governments, not the private sec- selves and when they exercise that power consistent
tor.3 Governments are aggressive collectors, with their interests and values.
users, and sometime abusers of personal and
private information. A Personal, Subjective Condition
Although privacy threats from business Importantly, privacy is a subjective condi-
and new technology are real, the clearest tion. It is individual and personal. One per-
menace to privacy comes from governments. son cannot decide for another what his or her
Unlike other social institutions, governments sense of privacy is or should be.
extract information using the force of law. To illustrate this, one has only to make a
Governments alone can change the rules few comparisons: Some Americans are very
under which they hold information—with- reluctant to share their political beliefs, refus-
out recourse to those aggrieved. And govern- ing to divulge any of their leanings or the
ments routinely frustrate opportunities for votes they have cast. They keep their politics
individuals to protect privacy as they see fit. private. Their neighbors may post yard signs,
Where a web of laws and incentives constrain wear brightly colored pins, and go door-to-
private-sector use and misuse of data, gov- door to show affiliation with a political party
ernment databases hang like a sword of or candidate. The latter have a sense of priva-

2
cy that does not require withholding infor- law, for example, allows consumers to enter
mation about their politics. into enforceable agreements that restrict the
Health information is often deemed sharing of information involved in or derived
intensely private. Many people closely guard from transactions.5 Thanks to contract, one
it, sharing it only with doctors, close relatives, person may buy foot powder from another and
and loved ones. Others consent to have their elicit as part of the deal an enforceable promise
conditions, surgeries, and treatments broad- never to tell another soul about the purchase. In
cast on national television and the Internet addition to explicit terms, privacy-protecting
to help others in the same situation,4 or more confidentiality has long been an implied term
commonly, relish the attention, flowers, and in many contracts for professional and fiducia-
cards they receive when an illness or injury is ry services, like law, medicine, and financial ser-
publicized. Privacy varies in thousands of vices. Alas, legislation and regulation of recent
ways from individual to individual and from vintage have undermined those protections.6
circumstance to circumstance. Many laws protect privacy in other areas.
An important conclusion flows from the Real property law and the law of trespass
observation that privacy is a subjective condi- mean that people have legal backing when
tion: government regulation in the name of pri- they retreat into their homes, close their
vacy is based only on politicians’ and bureau- doors, and pull their curtains to prevent oth-
The best way to
crats’ guesses about what “privacy” should look ers from seeing what goes on within. The law protect true
like. Such rules can only ape the privacy-pro- of battery means that people may put on privacy is to leave
tecting decisions that millions of consumers clothes and have all the assurance law can
make in billions of daily actions, inactions, give that others will not remove their cloth- decisions about
transactions, and refusals. Americans make ing and reveal the appearance of their bodies how personal
their highly individual privacy judgments based without permission.
on culture, upbringing, experience, and the Whereas most laws protect privacy indi-
information is
individualized costs and benefits of interacting rectly, a body of U.S. state law protects priva- used to the
and sharing information. cy directly. The privacy torts provide baseline people affected.
The best way to protect true privacy is to protection for privacy by giving a cause of
leave decisions about how personal informa- action to anyone whose privacy is invaded in
tion is used to the people affected. Political any of four ways.7 The four privacy causes of
approaches take privacy decisionmaking action, available in nearly every state, are
power away from the people.
At its heart, privacy is a product of autono- • Intrusion upon seclusion or solitude, or
my and personal responsibility. Only empow- into private affairs;
ered, knowledgeable citizens can formulate • Public disclosure of embarrassing pri-
and protect true privacy for themselves, just as vate facts;
they individually pursue other conditions, like • Publicity that places a person in a false
happiness, piety, or success. light in the public eye; and
• Appropriation of one’s name or likeness.
The Role of Law
The legal environment determines whether While those torts do not mesh cleanly with
people have the power to control information privacy as defined here, they are established,
about themselves. Law has dual, conflicting baseline, privacy-protecting law.
effects on privacy: Much law protects the pri- Law is essential for protecting privacy, but
vacy-enhancing decisions people make. Other much legislation plays a significant role in
laws undermine individuals’ power to control undermining privacy. Dozens of regulatory,
information. tax, and entitlement programs deprive citi-
Various laws foster privacy by enforcing indi- zens of the ability to shield information from
viduals’ privacy-protecting decisions. Contract others. And as discussed below, governments

3
undermine privacy through both covert and responsibility to put on clothes might be able
overt surveillance; through administrative to sue people careless enough to look at them
recordkeeping and monitoring; and by frus- and to recount what they saw.
trating the ability of consumers to make pri- A law like that would be ridiculous. But
vacy-protecting choices when they interact legislation of precisely this character is a sta-
with others. ple of the regulation aimed at various eco-
nomic sectors today. The correct approach,
Consumer Knowledge and Choice obviously, is for consumers to be educated
Perhaps the most important, but elusive, about what they reveal when they interact
part of privacy protection is consumers’ exer- online and in business so that they know to
cise of power over information about them- wear the electronic and commercial equiva-
selves consistent with their interests and val- lents of clothing.
ues. This requires consumers and citizens to With the advance of the digital computer
be aware of the effects their behavior will have over the last few decades, storage and retrieval
on exposure of information about them. of information has become increasingly avail-
Technology and the world of commerce are able and widespread. The Internet’s even more
rapidly changing, and personal information is recent emergence has revealed the digital
both ubiquitous and mercurial. This makes medium to the public in dramatic fashion.
relationships between personal information, Though digitization is a tiny, incremental
behavior, and privacy difficult to catalog, even change in how information moves and is
for full-time students of information policy. stored, the consequences will be dramatic, and
Unfortunately, there is no horn that the benefits of the advance have already been
sounds when consumers are sufficiently tremendous.8 Individuals, and society as a
aware, or when their preferences are being whole, are now accommodating themselves to
honored. But study of other, more familiar, the fact that information can be recorded,
circumstances reveals how individuals have maintained, and transferred as never before.
traditionally protected privacy. Considering that information practices in
Consider privacy protection in the physical physical media evolved over hundreds of gen-
world. For millennia, humans have accommo- erations, society is adjusting to the digital
dated themselves to the fact that personal medium very well. Many consumers do
information travels through space and air. struggle, though, to understand how infor-
Without understanding how photons work, mation moves online. The persistence and
people know that hiding the appearance of reproducibility of information in digital
their bodies requires them to put on clothes. form is not intuitive for people who grew up
Without understanding sound waves, people with electric typewriters, though it is for their
know that keeping what they say from others children. Many people are going online and
requires them to lower their voices. engaging in e-commerce without knowing
From birth, humans train to protect pri- how their actions affect privacy. They are
The correct vacy. Over millions of years, humans, ani- right to worry that they are walking around
mals, and even plants have developed elabo- naked in the digital world.
approach is for rate rules and rituals of information sharing Caught by the rapid, Internet-inspired rise
consumers to be and information hiding based on the media of privacy as a consumer issue, many busi-
educated about of light and sound. nesses have been slow to make privacy-pro-
Tinkering with these rules and rituals tecting options available to their customers.
what they reveal today would be absurd. Imagine, for instance, Many markets are too monolithic in their
when they a privacy law that made it illegal to observe information offerings to accommodate what
and talk about a person who appeared naked may be a variety of consumer preferences.
interact online in public without giving the nudist a privacy Too often a consumer’s only option is to
and in business. notice to that effect. People who lacked the share information, which may be inconsis-

4
tent with his or her preferences, in order to right to free speech, the right to free exercise Privacy is not
buy a product or service. of religion, the right to associate with others, a gift from
That said, it is unclear whether protecting and the right to own property. These rights
the privacy of ordinary commercial informa- protect individuals from government inter- politicians or an
tion is a real demand of consumers, or ference and shelter essential human institu- entitlement that
whether it is something they only claim to tions like morality. People who seek morality
want when asked by any number of poorly as an entitlement from government are cen-
can be demanded
constructed public opinion surveys.9 Again, sors, at best. from govern-
there is no horn that sounds when con- Privacy is the same kind of “good.” It is ment. It is a
sumers are aware and satisfied. developed and maintained in the shelter of
Though it may be difficult to exercise, legal rights that give individuals autonomy. product of
consumers in a free market always have the Maintaining privacy requires that we know personal
power and choice to absent themselves from how information moves and that we refrain responsibility.
privacy-invading transactions. They may use from sharing what we wish to keep private.
cash if they are not comfortable about how Privacy is not a gift from politicians or an
credit card information may be used. They entitlement that can be demanded from gov-
may invest savings in tangible investments ernment. Privacy is a product of personal
like gold bullion if they do not trust financial responsibility.
institutions to protect information consis- Like moral living, privacy is the product of
tent with their values. They may refuse to go careful consideration and concerted effort by
online because they believe that their behav- individuals. To be sure, protecting privacy
ior on the Internet will be tracked, assembled, can be hard. It involves knowledge, vigilance,
and used contrary to their interests. Most and constant trade-offs. But if protecting pri-
importantly, they may educate themselves so vacy in private-sector interactions is hard,
that they can make these privacy-protecting protecting privacy from government is
choices intelligently. impossible.
Governments have the power to take per-
Privacy Is Not a “Right” sonal information from citizens by force of
Though generations of advocates have law. After they collect it, they can change the
called information privacy a “right,” the bet- rules under which they keep and use person-
ter view is that it is not. Privacy is a condition al information. And they often stand in the
people maintain by exercising personal ini- way of steps people might otherwise take to
tiative and responsibility. Other legal rights protect privacy. That makes governments the
allow them to do this. most formidable threat to privacy.
An example can illustrate how something Though nearly always animated by good
as vitally important as privacy is not a right: intentions, nearly every government program
Most people agree that individuals should be undermines privacy in some way. It is fair to
allowed to develop and follow their own sense say that lost privacy is a cost of government.
of morality, as long as they do not harm oth- Those interested in allowing individuals to
ers. People may decide for themselves, for protect their own conceptions of privacy will
example, whether a higher power exists; address this most significant threat to priva-
whether bad acts have consequences in a cy first.
future life; and whether to sing, pray, or
remain silent. These, one could argue, reflect a
“right” to morality. How Governments Threaten
As important as morality is, though, there Privacy
is no “right” to it. Instead, morality is a qual-
ity that individuals develop and practice in Governments threaten privacy in three
the shelter given by individual rights like the principal ways. Government surveillance is a

5
profound and well-recognized threat to pri- being observed sporadically in public cannot
vacy. With the growth of database technolo- violate reasonable privacy expectations, hav-
gies, overt surveillance has joined its covert ing data about our public movements cata-
sibling as a privacy threat. Less often high- loged by governments probably does.10
lighted is the extent to which governments There is a constant tension between sur-
undermine privacy by collecting, cataloging, veillance powers sought by law enforcement
and sharing personal information about citi- and the privacy-protecting rights enjoyed by
zens for administrative purposes. Even less all Americans. The rules laid down by the
acknowledged—but no less important—is the Constitution, chiefly in the Fourth Amend-
wide variety of laws and regulations that ment, demarcate the line between appropriate
degrade citizens’ power to protect privacy as and inappropriate surveillance.
they see fit. “Anti-privacy” law and regulation Fourth Amendment rules on surveillance.
is a pervasive cost of welfare-state govern- The Fourth Amendment is the most direct
ment. limit on the power of government to inquire
Privacy too often gives way to other social into people’s lives, arrest them, and seize
values, but it should be part of the calculus their property for criminal investigations. It
for all law and regulation. It would be intem- protects privacy indirectly by extending peo-
Surveillance perate to call for an end to government pro- ple’s power to conceal information from oth-
directly erodes grams in the name of privacy, but one of the ers. When people have concealed informa-
the power of most fruitful ways to restore privacy would tion from society as a whole, the Fourth
be to reduce the size and scope of govern- Amendment’s protections generally mean
individuals to ment programs and regulation. that they have also concealed information
control from agents of government, unless there is a
Surveillance sufficient legal basis to overcome the con-
information Law enforcement has a difficult job pre- cealment.
about themselves. venting and responding to crime. Agencies The Fourth Amendment says: “The right
and officers of the government are nobly of the people to be secure in their persons,
dedicated to protecting citizens and commu- houses, papers, and effects, against unreason-
nities from every kind of misdeed, from petty able searches and seizures, shall not be violat-
misdemeanors to heinous crimes and terror- ed . . . .” It is important to note again that the
ism. Information about people helps them Fourth Amendment does not protect privacy
do this. per se. It allows people to maintain privacy as
It is no wonder that, with the increasing they see fit. People who expose their affairs to
availability of technology, law enforcement the world expose their affairs to law enforce-
has sought to rely more and more heavily on ment.11 They can make no claim to a free-
surveillance. Technological surveillance ex- standing privacy “right.”
pands the law enforcement footprint and car- The Fourth Amendment requires a search
ries with it many law enforcement benefits. to be based on probable cause. That is, gov-
However, surveillance directly erodes the ernment investigators must have a reason-
power of individuals to control information able belief that a crime has been committed
about themselves and the terms on which it and that evidence or fruits of the crime can
is shared. Covert surveillance, like wiretap- be found. The first question a court will ask
ping, robs people of privacy because it strips when a citizen claims to have been unconsti-
them of the awareness they need to protect tutionally searched is whether that person
their privacy. Overt surveillance may erode had a reasonable expectation of privacy in the
privacy just as well. Devices like traffic cam- place, papers, or information that govern-
eras and face-scanning cameras make sub- ment agents have examined or taken.12
mitting to observation a condition of appear- Until 1967 the Fourth Amendment was
ing on public streets and highways. Though largely regarded as protecting places—namely

6
the home and the areas closely surrounding surveillance is a ‘search’ and is presumptively
the home. When the Bill of Rights was adopt- unreasonable without a warrant.”
ed, ours was a low-tech, mostly agrarian, and The case required the Court to confront
relatively immobile society. The home really “what limits there are on [the] power of tech-
was a person’s castle. As America has become nology to shrink the realm of guaranteed pri-
more mobile and technological, that early vacy.” In remanding Kyllo’s conviction, the
interpretation has had to change. Katz v. United Court essentially found that the reasonable-
States is the landmark Supreme Court decision ness of a search is to be judged in light of
that updated Fourth Amendment law. common privacy-protecting practices, not in
In Katz, FBI agents without a warrant light of privacy protection from the best tech-
placed electronic eavesdropping equipment nologies available. Thermal imagers are not
on the outside of a telephone booth where in general public use, so people desiring to
the defendant conducted his business. The keep the hours of their sauna private from
Court held that eavesdropping on Katz in neighbors do not line their walls with special
this way violated his Fourth Amendment insulation. The same expectation of privacy
rights because he justifiably relied on the pri- applies to law enforcement even if it has the
vacy of the telephone booth. The Court stat- technical capability to observe the heat pat-
ed, in a famous passage, “[T]he Fourth terns emanating from houses.
Amendment protects people, not places. The growth of surveillance continues. The
What a person knowingly exposes to the pub- Supreme Court’s ruling in Kyllo notwithstand-
lic . . . is not a subject of Fourth Amendment ing, government surveillance continues to
protection . . . . But what he seeks to preserve grow in prominence as a privacy-reducing law
as private, even in an area accessible to the enforcement tool. The USA PATRIOT Act and
public, may be constitutionally protected.” the Homeland Security Act are only two of the
Consistent with their goal of enforcing most recent in a long list of laws that reduce
the law, governments constantly seek in- the privacy protections Americans enjoy.
creased surveillance capability, often using The USA PATRIOT Act permits “pen reg-
new technology. In Kyllo v. United States,13 ister” and “trap and trace orders” for elec-
decided in June 2001, the Supreme Court tronic communications such as e-mail (akin
pushed back against technological surveil- to caller ID information made available to
lance, issuing an important opinion in the authorities). It authorized nationwide execu-
development of Fourth Amendment law. tion of court orders for pen registers, trap
Agents of the U.S. Department of the and trace devices, and access to stored e-mail The USA
Interior, suspicious that Danny Lee Kyllo was or communications records. And it lowers
growing marijuana in his home using high- the protections for stored voice mail, making PATRIOT Act
intensity lamps, had aimed an Agema it accessible to law enforcement on easier and the
Thermovision 210 thermal imager at his terms than telephonic conversations.14
triplex in Florence, Oregon. The imager Some argue that these are appropriate
Homeland
detected significantly more heat over the roof updates to the law in light of new technolo- Security Act are
of the garage and on a side wall of Kyllo’s gies, or that they are necessitated by the war only two of the
home than elsewhere on the premises. Using on terrorism. It is important to recognize
this information, the agents obtained a war- how this view holds that reduced privacy is most recent in a
rant, searched the home, and found the appropriate—not that privacy is equally pro- long list of laws
drugs they suspected. tected under the new law. And, as to the claim that reduce the
The Supreme Court reversed Kyllo’s con- that the act is an emergency measure justi-
viction. It found that when a novel device like fied by the war on terrorism, it has already privacy
a thermal imager is used “to explore details of been used in ordinary crime investigations protections
the home that would previously have been that have no nexus to national security or ter-
unknowable without physical intrusion, the rorism.15
Americans enjoy.

7
If not properly The list of surveillance laws, technologies, for good. Red-light cameras can improve safe-
limited, red-light and programs is long and growing. The ty—as long as they are not used in conjunction
Communications Assistance for Law En- with shortened yellow-light times. When we
cameras, speed forcement Act,16 for example, was passed in are able to use traffic cameras to find stolen
cameras, and 1994. For the first time in history, telecommu- vehicles, for example, the effect on car-jacking
nications companies were required to modify may be dramatic. Criminals will know that
biometric sensors their equipment to facilitate government sur- they have only minutes from when they steal a
may be used to veillance. Federal authorities are working car to when that car effectively turns them in.
catalog the assiduously to extend CALEA requirements to These technologies may help authorities learn
Internet applications that provide voice com- about the last movements of missing persons
movements of munications, such as Voice over Internet more easily thanks to records of where their
innocent citizens, Protocol (VoIP).17 From there, little logical dif- cars were. But, to protect privacy, records such
contrary to their ference prevents its extension to all Internet as these should be destroyed promptly if they
communications. are not being put to such a use.
privacy Such pretensions are well-founded in Biometrics is yet another emerging tech-
expectations and recent history. “Carnivore,” for example, is a nology that can be used for government sur-
specialized computer developed by the FBI veillance.19 Despite a checkered record, facial
their Fourth and equipped with software that can scan scanning and other biometric techniques will
Amendment Internet traffic at extremely high speed. It probably persist and grow as tools of govern-
rights. attaches to the systems of Internet service ment surveillance.
providers (ISPs) and can be used either legiti- If not properly limited, red-light cameras,
mately, to observe Internet use that is subject speed cameras, and biometric sensors may be
to a valid search warrant, or illegitimately, to used not just to search for crime suspects but
observe the behavior of everyone using a par- to catalog the movements of innocent citi-
ticular ISP, including entirely innocent people. zens, contrary to their privacy expectations
As electronic devices are incorporated into and their Fourth Amendment rights. With-
our interactions with government, they give out protections for innocent people, law
governments more and more opportunities enforcement will follow its natural tendency
for monitoring and surveillance. In the area to catalog the actions and movements of all
of transportation, electronic devices, such as citizens. We know this because the plans have
the “E-ZPass” on Northeast toll roads and already been announced.
Northern Virginia’s “Smart Tag,” put govern- The Transportation Security Agency’s
ment officials in a position to monitor the Computer Assisted Passenger Pre-Screening
movements of citizens. program (CAPPS II) will maintain records of
Red-light cameras and speed cameras are all travelers in the United States, without
another part of the rapidly growing Big regard to whether they are suspected of any
Brother infrastructure. Little technical differ- wrongdoing. CAPPS II starts from the premise
ence separates a digital camera that takes occa- that law enforcement can stop all travelers to
sional snapshots from one that records contin- demand their papers, which demands review
uous footage. Equipped with optical character in terms of constitutional Due Process.
recognition technology, traffic cameras may CAPPS II becomes a privacy threat by main-
soon have the technical capability to read taining records of all those who are stopped.
license plates and scan traffic for specific cars. Privacy Act notices issued by the Transpor-
Networked cameras will be able to track cars tation Security Administration suggest that
throughout a city and on the highways. And traveler information will be disposed of
database technology will make it possible to promptly, but such commitments can change
create permanent records of the movements of at any time.20 Unchecked, surveillance of
all cars captured on camera.18 Americans may expand to wherever they are
Of course, these technologies can be used on the move.

8
“Data-veillance.” Real-time, technological stantly survey the financial movements of
monitoring of Americans’ public activity is the entire society in order to root out bad
only the newest, most dramatic form of sur- actors, using the financial services sector as a
veillance. It joins a long, growing, and sort of deputy investigator. The privacy of
deplorable tradition of amassing databases individual consumers’ financial data is oblit-
of information about citizens’ financial and erated by programs such as this.21
commercial privacy in service to ends dictat- FinCEN implicates more than privacy, of
ed by government. course. It is the quintessential example of a
The Financial Crimes Enforcement Net- government database system that can be
work, or “FinCEN,” is the premier example. used to investigate people instead of crimes.
FinCEN is a network of databases and finan- An investigator, rightly or wrongly convinced
cial records maintained by the U.S. Treasury of the guilt of a certain party, may use
Department. The FinCEN surveillance system FinCEN to investigate that person, looking
handles more than 140 million computerized for wrongdoing of any kind rather than the
financial records compiled from 21,000 crime the investigator is tasked with solving.
depository institutions and 200,000 nonbank Especially today, when exceedingly complex
financial institutions. Banks, casinos, broker- regulation trips up nearly everyone some-
age firms, and money transmitters all must how, this is an inversion of the proper way to
Anti-drug
file reports with FinCEN on cash transactions fight crime. Crime fighters should always laws take a
over $10,000. And FinCen is the repository for identify and punish perpetrators of known tremendous toll
“Suspicious Activity Reports,” which regula- crimes. They should not identify people ‘suit-
tors have required financial institutions to file able for punishment’ and then identify what on the privacy of
under the Bank Secrecy Act for years. An they may have done wrong. innocents.
explicit legal requirement to do this was FinCEN is one of many surveillance pro-
resoundingly rejected in 1999, then made law grams that undermine the privacy all
in the USA PATRIOT Act after the September Americans should enjoy. It is at the leading
11 attacks. edge of a trend toward deploying data collect-
FinCEN also uses a variety of law enforce- ed by governments into surveillance tools.
ment databases, including those operated by Elements of the proposed CAPPS II program
the Drug Enforcement Agency and the and the widely discredited Total Information
Defense Department, in addition to commer- Awareness program would go even further,
cial databases of public records. FinCEN may using private-sector information such as cred-
also use databases held by the Central it card purchases, car rentals, and the like for
Intelligence Agency, the National Security routine government decisionmaking and
Agency, and the Defense Intelligence Agency. investigation purposes. These practices unac-
FinCEN shares information with investi- ceptably blur the line between privately and
gators from dozens of agencies, including the publicly held data.
Bureau of Alcohol, Tobacco, and Firearms; As discussed below, databases are routine-
the Drug Enforcement Administration; the ly shared among federal agencies and between
Federal Bureau of Investigation; the U.S. the federal and state governments for admin-
Secret Service; the Internal Revenue Service; istrative purposes. Legislation enacted in a
the Customs Service; and the the U.S. Postal time of crisis could convert them all to sur-
Inspection Service. Agents from all of those veillance purposes, when they are not already
agencies can investigate names, addresses, being used in this way.
and Social Security numbers through Though occasionally necessary, neither
FinCEN. Field agents and state and local law database surveillance nor traditional surveil-
enforcement can access data from FinCEN lance is ever desirable. They should be
remotely. reduced at every turn. Unfortunately, a par-
The theory behind FinCEN is to con- ticular breed of crime law necessitates them.

9
Victimless crime laws drive surveillance. In cial institutions and, ultimately, regulators
traditional crime-fighting, law enforcement and government investigators.
becomes aware of a crime when the victim The growth in money-laundering laws and
complains about it. This course is not fol- investigations represents a shift from trying to
lowed in victimless crime laws. Victimless address crime directly to trying to address
crimes have no complaining witness because crime by tracking its instruments and fruits.
all parties consent to the illegal behavior, Money-laundering laws and investigations are
even though they may harm themselves. For poor substitutes for attacking crime head-on.
such crimes to be discovered, law enforce- Among other things, they compromise the
ment must take its observation of the public privacy of innocent, law-abiding people right
to unusual lengths. The natural effect is to along with the criminals.
dramatically erode privacy for everyone. Gambling is another victimless crime that
Anti-drug laws, while they may be the holds out much privacy-invading potential,
product of beneficent motives, take a thanks to the growth of the Internet. For dif-
tremendous toll on the privacy of innocents. ferent reasons, gambling opponents and
While the War on Drugs has raged, a string of holders of existing gambling franchises are
U.S. Supreme Court cases has eroded the concerned that Internet gambling will spill
Fourth Amendment’s privacy protections.22 across state and national borders and become
Because so many Fourth Amendment ubiquitous worldwide.24 Some politicians are
search and seizure cases have dealt with genuinely interested in the financial and
whether evidence of illegal drugs should be social well-being of their constituents. Others
suppressed, courts have sometimes bent over are worried about losing a revenue stream for
backwards to validate dubious law enforce- local gambling interests, including state gov-
ment activity as lawful search and seizure. ernments.
The result is that every American has a weak- Internet gambling laws threaten to increase
ened right to walk or drive public streets free government monitoring of the Internet,
from interference with their persons, their including monitoring of innocent, law-abid-
possessions, and their privacy. ing citizens. The Internet, of course, substi-
Money-laundering laws began as a fairly tutes a network for the card room where law
direct outgrowth of the perverse economic enforcement could formerly go to break up an
incentives drug laws create and the difficulty illegal game. But it carries perfectly legitimate
with enforcing them. Prior to September 11, communication and commerce right along-
2001, the groundwork was being laid for a side “illegal” traffic. Law enforcers tapping
careful review of whether money-laundering into the Internet looking for gambling will be
laws and practices effectively prevented sorely tempted to abandon limits on the
crime.23 The results of such a review probably source, destination, and type of Internet traffic
Victimless would not have supported the anti-money- that they review. More than any previous sur-
crimes, such as laundering regime. The War on Terrorism veillance regime, Internet surveillance will
drug use, money has unfortunately given new life to money bring law enforcement into close proximity
laundering laws. with the private communications of entirely
laundering, and Though they are motivated by crime pre- law-abiding Americans.
illegal gambling, vention, most measures to prevent money Victimless crimes like drug use, money
are some of laundering undermine financial privacy, best laundering, and illegal gambling are some of
evidenced by programs like FinCEN. The the primary drivers of law enforcement sur-
the primary administrative burdens are suffered, and the veillance. Of necessity, government surveil-
drivers of law expenses paid, by everyone who uses the lance deprives people of privacy, taking away
banking system. They prevent financial their power to define what information
enforcement anonymity and put reams of data about con- about themselves will be shared, and on what
surveillance. sumer banking activity in the hands of finan- terms.

10
Database Nation, Indeed wrong. The cost in lost privacy is dispropor- Law-abiding
Whereas surveillance for crime control is tionate to the law enforcement benefit. citizens should
an antagonistic collection of personal infor- If employment information is too mun-
mation, governments erode citizens’ power dane to get worked up about in terms of pri- resist the growth
and privacy for beneficent reasons too. To pro- vacy, there are plenty of other government of databases like
vide benefits and entitlements—and, of course, databases that collect far more sensitive infor-
to tax—governments take personal informa- mation—by law and without the consent of
CODIS because
tion from citizens by the bushel. Nearly every citizens. The Centers for Medicare and they ultimately
new policy or program justifies new or Medicaid Services, for example, maintains a represent threats
expanded databases of information—and a database called OASIS, or Outcome and
shrunken sphere of personal privacy. The Assessment Information Set, which collects to the privacy and
helping hand of government routinely strips data on all Medicare and Medicaid patients civil rights of
away privacy before it goes to work. receiving skilled home health care services. everyone.
The National Directory of New Hires pro- The OASIS system collects a breathtaking
vides a good example. This is a database of amount of information. OASIS “data sets”
information on all newly hired employees, include name, Social Security number, resi-
quarterly wage reports, and unemployment dence, birth date, gender, payment sources for
insurance claims in the United States. The health care, recent medical treatment, current
impulse behind this database is laudable—to condition, risk factors, living arrangements,
help states locate parents who have skipped safety hazards in patient’s residence, sanita-
out on their child support obligations. But, tion of residence, identity of people assisting
like many databases with laudable purposes, patient, vision and speech status, ability to
it catalogs everyone to get at the small num- breathe, ability to move bowels and urinate,
ber of bad people who renege on their child- cognitive function, and much more.26
support obligations. Doctors often need such information to
Such databases also have clear tendencies provide health care, but whether it should be
to grow and adopt new uses, uses that, at collected in a government database is anoth-
some point, may vary dramatically from their er question entirely. OASIS shows how
original purposes. Already, the New Hires Medicare and Medicaid deprive patients of
database has been expanded to track down the power to protect the privacy of often
student loan defaulters. The Internal Rev- deeply personal information.
enue Service may access the database for the As the cost of health care continues to spi-
purpose of administering the Earned Income ral upward, politicians and bureaucrats will
Tax Credit program and verifying claims undoubtedly be pressured to make new uses
with respect to employment in tax returns. of the information in this database, looking
The Social Security Administration may for ways that personal information can be
access it for any reason whatsoever.25 used to cut costs. In light of new priorities,
There may be plenty of good reasons to current promises about privacy will be set
have confidential employment relationships. aside with impunity—because the govern-
Employers and employees can at least be ment holds the data.
indifferent to each other’s personal details in Speaking of highly personal and sensitive
the day-labor context. But it is it is illegal not information—and speaking of acronyms—
to make records of employment relation- there is CODIS, the Combined DNA Index
ships because employment is a key avenue System. Established as a pilot project in 1990
through which the government collects and enshrined into law by Congress in
information about people. The National 1994,27 CODIS gives federal funds to states
Directory of New Hires is a national employ- that assist the FBI in collecting DNA infor-
ment dragnet designed to get at the relatively mation. Today, 48 of the 50 states, the U.S.
small number of people who may actually do Army, the FBI, and Puerto Rico participate in

11
the program, collecting DNA samples for the Data Information System.”32 The informa-
federal database. tion contained in that system is just about
As with so many government databases, everything under the sun, as the Federal
the original purpose of CODIS—to collect Register announcement reflects:
only information about convicted sex offend-
ers—was entirely laudable. Now that CODIS The categories of records in the system
is established, however, the push to expand it will include veterans’ names, addresses,
has begun. As the CODIS program notes on dates of birth, VA claim numbers, SSNs,
its website, the data includes “individuals and military service information; med-
convicted of sex offenses (and other violent ical benefit application and eligibility
crimes), with many states now expanding leg- information; code sheets and follow-up
islation to include other felonies.”28 The time notes; sociological, diagnostic, counsel-
when misdemeanors are added to the list ing, rehabilitation, drug and alcohol,
may not be far away. dietetic, medical, surgical, dental, psy-
The temptations presented to bureaucrats chological, and/or psychiatric medical
and law enforcement by massive government information; prosthetic, pharmacy,
databases of DNA information are great. nuclear medicine, social work, clinical
A number of Law-abiding citizens should resist the growth laboratory and radiology information;
bureaucracies and of databases like CODIS because they ulti- patient scheduling information; family
politicians are mately represent threats to the privacy and information such as next of kin, spouse
civil rights of everyone. and dependents; names, addresses,
moving to make Of course, separate databases are one Social Security numbers and dates of
tax policy even thing. Combined databases and dossiers are birth; family medical history, employ-
quite another. The federal government is very ment information; financial informa-
more invasive much in that business, too. tion; third-party health plan informa-
than it already is. Government exchange and merger of citi- tion; information related to ionizing
zens’ personal information is systematic and radiation and Agent Orange; date of
routine.29 During the 18-month period from death; VA claim and insurance file num-
September 1999 to February 2001, federal bers; travel benefits information; mili-
agencies announced 47 times—more than tary decorations; disability or pension
once every two weeks—that they would payment information; information on
exchange and merge personal information indebtedness arising from 38 U.S.C.
from databases about American citizens. benefits; medical and dental treatment
These programs are only the tip of an in the Armed Forces and claim informa-
information-trading iceberg. The data-shar- tion; applications for compensation,
ing programs surveyed in the Privacilla report pension, education and rehabilitation
were only the federal agency programs that benefits; information related to incarcer-
exchange and merge databases of personal ation in a penal institution; medication
information under the Computer Matching profile such as name, quantity, pre-
and Privacy Protection Act, an amendment scriber, dosage, manufacturer, lot num-
to the Privacy Act of 1974 that deals with a ber, cost and administration instruction;
subset of Privacy Act records.30 Under the pharmacy dispensing information such
broader Privacy Act, federal agencies can as pharmacy name and address.33
combine databases and redeploy them at will
after announcing a new “routine use” in the And the list goes on.
Federal Register.31 This database is held by the Veterans
The Veterans Administration announced Administration, which has suffered from noto-
one such “routine use” in January of 2001, rious computer security lapses. Testimony in
when it established a new “Consolidated September 2000 revealed to the House

12
Veterans Affairs Committee that a security comply with, rather than complex and puni-
company hired by the VA’s Office of Inspector tive, tax laws would see higher compliance
General had no trouble breaking into the VA’s without requiring reporting and investiga-
computer system and taking total control of tion of individuals’ personal financial details.
it.34 An assistant inspector general at VA was Proposals to replace the current income tax
reported saying that the hackers “owned the with a flat tax or national sales tax would
system” and that the VA didn’t even know its have the significant additional benefit of
systems were attacked. The hackers-for-hire enhancing privacy.
had access to the confidential data of veterans, But a number of bureaucracies and politi-
including their personal histories and medical cians are moving to make tax policy even more
and financial information, in addition to VA’s invasive than it already is. The Paris-based
internal data and business systems. Organization for Economic Cooperation and
Receiving government benefits is costly in Development, for example, consistently works
terms of privacy. Paying for them is costly to increase the ability of its member govern-
too. Taxation is one of the most pervasive ments to access the financial information of
ways that governments threaten the privacy their citizens.37 The OECD issued a report in
of citizens. To implement tax policies, gov- April, 2000, called “Improving Access to Bank
ernments must collect truly massive quanti- Information for Tax Purposes.”38 “Bank infor-
ties of data. This includes name, address, mation” is, of course, a euphemism for customer
phone number, Social Security number, information held by banks.
income, occupation, marital status, parental Similarly, a group of U.S. state govern-
status, investment transactions, home own- ment and tax collection associations contin-
ership, medical expenses, purchases, foreign ues to press an effort to expand the collection
assets, charitable giving, and so on. of taxes on retail sales via e-commerce, cata-
The list is very, very long because politi- log, and phone.39 Touted as “streamlined” or
cians are enamored of social engineering simplified taxation, these proposals would
through tax policy. Anyone compiling a invariably require massive databases of con-
dossier on our behavior would find the files of sumer-purchasing information. All destina-
the taxing authorities a terrific resource. tion-based systems to tax remote commerce
This resource has been misused again and (that is, taxing where the consumer resides
again in recent history. In 1971 a paranoid rather than where the seller resides) would
President Richard Nixon vowed to select an require consumers’ purchases to be tracked The only
IRS commissioner who would make sure that and stored in databases.
“every income tax return I want to see I see.”35 Government databases cover myriad sub- satisfactory
Sen. Frank Church’s Senate Select Committee jects. With technology’s advance, they may protection for
to Study Governmental Operations with soon contain nearly every citizen activity that
Respect to Intelligence Activities found in can be observed by government.40 Databases,
privacy in the
1975 that the IRS regularly gave any tax return of course, are only the digitized portion of case of public
requested to the Federal Bureau of Investi- those substantial collections of information records is to
gation and the Central Intelligence Agency. known as public records. Public records poli-
The IRS at that time had specialized, secret cy as a whole is in need of reconsideration reduce the role of
staff whose job was to conduct surveillance from the standpoint of privacy.41 government in
and intelligence-gathering activities against The solution is smaller government. Public the intimate
various political groups without any basis in records represent a wide variety of informa-
tax law enforcement.36 tion that is held by government, including details of citizens’
Loss of privacy is a direct cost of most tax deeds to property and liens, drivers’ license personal, social,
laws, which could be reformulated to reduce information, crime records, tax records, enti-
the need for broad collection of individual tlement program records, and so on. Public
and economic
financial information. Made fair and easy to records threaten privacy and related interests lives.

13
The U.S. in a variety of ways. They are produced at the zens’ personal, social, and economic lives.
government’s expense of Americans’ power over informa- To the extent records are collected, they
tion about themselves. They create opportu- should generally be available to the public to
long battle nity for law enforcement snooping. They pre- prevent secret government databases from
against private vent anonymity and pseudonymity. They can becoming common practice. Information in
be improperly used by bureaucrats or public records should be kept secret only if
use of strong released indiscriminately to wrongdoers in that will have a substantial role in preventing
encryption is the public. And, acquired by criminals, they identified and discrete harms to the public.
probably the best can be used to further fraud and violent Massive collections of public records—and
crimes. particularly public records databases—are a
example of Public records have many beneficial uses, sword of Damocles hanging over privacy and
anti-privacy of course. Public records enable the press and civil liberties. Only shrinking the need for
regulation. community leaders to investigate and thwart such records by shrinking government’s role
wrongdoing. Reporters have used such can reduce the threat.
records to uncover alcohol abuse by airline Shrinking government’s role can expand
pilots and school bus drivers. Millions of peo- privacy by lessening the interference of regu-
ple change their last names each year due to lation with individuals’ privacy-protecting
marriage and divorce, and millions of con- decisions. Anti-privacy law and regulation is
sumers move every year. Credit reporting the third kind of threat that governments
agencies and others use public records to track pose to privacy.
these changes and preserve the good credit
records of many people, while protecting Anti-Privacy Law and Regulation
against people who would hide their bad cred- Perhaps the least recognized category of
it history or other negative background. government threats to privacy is what can be
Public access to government records also called “anti-privacy” law and regulation.
plays a large part in ensuring open govern- Myriad laws and rules deprive people of
ment. Access to public records allows citizens autonomy, preventing them in various ways
to monitor the functions of their govern- from taking steps to protect privacy as they
ment directly, and it allows the press to fully see fit. Anti-privacy law and regulation may
exercise its watchdog role. prevent people from using privacy-protecting
Blanketing public records with secrecy is technologies, it may prohibit privacy-protect-
not a satisfactory solution. That would com- ing contracts, or, by distorting markets, it
promise important open-government values may push people to give up privacy in ways
and prevent beneficial uses. Governments they ordinarily would not.
should not be able to keep secret records on The U.S. government’s long battle against
citizens. Nor is redaction, or editing, of records private use of strong encryption is probably
made available to the public a satisfactory the best example of anti-privacy regulation.
solution. That would leave fallible govern- Encryption is a way to encode computer files
ment officials and bureaucracies in control of so that only someone with access to a mathe-
citizens’ personal information—and unan- matical “key” can read them. Encryption can
swerable for their conduct. protect computer systems and intellectual
Instead, loss of privacy must be recog- property from industrial spies and malicious
nized as a cost of government programs that hackers. Just as importantly, encryption can
require citizens to be counted, cataloged, help individuals control what they reveal
measured, tested, and watched. The only sat- when they use digital technology. Encryption
isfactory protection for privacy in the case of is essential for protecting individual privacy
public records is to reduce the need for pub- in the digital age.
lic records in the first place, by reducing the Instead of viewing it as an empowering tech-
role of government in intimate details of citi- nology, the U.S. government originally viewed

14
encryption as a threat to the capabilities of law doing so directly. This drives people to com-
enforcement. While it is true that encryption promise privacy in ways they ordinarily would
can be used by criminals, its widespread use not. Among the many concerns about health
would create more benefits than harms, espe- privacy (and discrimination based on health
cially in the area of personal privacy. status) is the problem of businesses having
Ultimately, encryption technology cannot employees’ personal health information and
be controlled. Past policies limiting the use of using it to make decisions about them. The
encryption kept it away from law-abiding root of this problem is federal tax policy,
people, threatening their privacy, without which distorts the market for health insurance
restricting the criminals and terrorists using by discouraging individuals from buying the
such technology in spite of the laws. right insurance for their particular needs.44
Anti-privacy laws that prevent privacy- Massive federal regulation aimed at
protecting contracts and agreements take health privacy is the product of systematic,
myriad forms. The Bank Secrecy Act, for disempowering interference with health care
example, prevents financial institutions from markets by the federal government. Rather
assuring their customers of privacy in finan- than imposing new regulations on how
cial information. In fact, it deputizes them health plans may use information, Congress
into reporting activities that banks or their should address the source of the problem by
Rather than
employees deem “suspicious.” taking from business and restoring to con- impose new
Congress and the Federal Communi- sumers the incentives to buy insurance. A regulations on
cations Commission have ensured that the provision in the recent Medicare prescription
location of mobile phone users can be tracked. drug law expanding Health Savings Accounts how health
E911, or enhanced 911, is a Federal Com- may begin to achieve this goal.45 plans use infor-
munications Commission program that was Nearly every law has consequences for pri-
created for the obviously good purpose of vacy, and many laws are very harmful to priva-
mation, Congress
helping authorities locate emergency callers.42 cy indeed. All of them are intended to protect should restore to
But E911 also represents a significant threat citizens from various ills, but when privacy is consumers the
to privacy in that it forces a location-tracking added to the analysis, the bargain they offer is
technology onto mobile phone users. sometimes far less attractive. Privacy should be incentive to buy
Ironically, pro-regulation privacy advocates a consideration whenever a new law or regula- insurance.
tout the threat in having commercial mobile tion is considered. If it is not, anti-privacy law
phone providers able to pinpoint customer and regulation will flourish—to the detriment
location; they blame these businesses for con- of the technologies, contracts, and markets
sidering using this data, overlooking the fact that protect privacy on the true terms real con-
that the U.S. federal government mandated sumers want.
mobile phone tracking in the first place.43
Most consumers assuredly would want track-
ing for its safety, convenience, and commercial Conclusion
benefits. Some consumers may value privacy
enough to forgo the public safety benefits of Claims by regulators and politicians that
mobile phone tracking. The latter will not they are going to deliver privacy usually
have this privacy-protecting choice thanks to involve some kind of regulation placed on the
the anti-privacy E911 mandate. private sector. The most productive approach,
Another example of anti-privacy law and however, would be for our representatives in
regulation is the federal government’s tax Congress and the state legislatures to reduce
treatment of employee health benefits. the privacy-eroding features of the laws and
Current tax policy creates strong incentives for programs they themselves pass and oversee.
employers to purchase health care for their Whether it is anti-privacy regulation, data
employees, discouraging consumers from collection required by all manner of govern-

15
ment programs, or outright surveillance, the 7. “The Privacy Torts: How U.S. State Law Quietly
Leads the Way in Privacy Protection,” http:
relationship of governments to privacy is typ- //www.privacilla.org/releases/Torts_Report.html.
ically antagonistic. Privacy thrives when
aware and empowered citizens are able to 8. Information about the ongoing growth in the
exercise control of information about them- electronic economy is available from the Depart-
ment of Commerce’s E-Stats Web page, http://
selves. It is not a gift from politicians or an www.census.gov/eos/www/ebusiness614.htm.
entitlement bestowed by government.
As the privacy debate matures, it should 9. Solveig Singleton and Jim Harper, “With a
become clearer that governments are a chief Grain of Salt: What Consumer Privacy Surveys
Don’t Tell Us,” Competitive Enterprise Institute,
threat to privacy. Thoughtful policymakers in June 1, 2001, http://www.cei.org/gencon/025,02
the future will recognize the detrimental effects 061.cfm.
many programs have on consumers’ privacy
and respond with proposals that reduce the 10. See James W. Harper, “Testimony at a Hearing
on Red-Light Cameras, U.S. House of Represen-
role of government in individuals’ lives. tatives Committee on Transportation and
Infrastructure Subcommittee on Highways and
Transit,” http://www.privacilla.org/releases/red-
Notes light_camera_testimony.html.
1. Of the 23 proposals listed in a June 2002 11. The “plain view” doctrine illustrates this point
Congressional Research Report on pending legis- well. A government agent observing objects and
lation, 17 were aimed at the private sector, 4 dealt facts from a place where he or she is authorized to
with the government sector, and 2 addressed be does not conduct a “search” within the mean-
both. Half of the proposals aimed at government ing of the Fourth Amendment. See Harris v. United
required only reporting or study. See Marcia S. States, 390 U.S. 234 (1968).
Smith, “Internet Privacy: Overview and Pending
Legislation,” Congressional Research Service 12. U. S. v. Katz, 389 U.S. 347 (1967).
(June 20, 2002; Order Code RL31408), http:
//usinfo.state.gov/usa/infousa/tech/reports/rl31 13. 533 U.S. 27 (2001).
408.pdf.
14. See Charles Doyle, “The USA PATRIOT Act: A
2. Nicholas Morehead, “Dems: ‘Big Browser’ Is Sketch,” Congressional Research Service, April 18,
Watching,” Wired News (Oct. 16, 2000), http:// 2002, http://www.fas.org/irp/crs/RS21203.pdf.
www.wired.com/news/privacy/0,1848,39466,00.ht
ml; Sen. John Edwards, “Big Browser Is Watching” 15. See Clarence Page, “All of a Sudden the Patriot
(July 14, 2000), http://edwards.senate.gov/press/ Act Isn’t Just about Terrorists Anymore,” Salt Lake
2000/columns/0714_browser.html. Tribune, Nov. 15, 2003, http://www.sltrib.com/
2003/Nov/11152003/commenta/commenta.asp.
3. George Orwell, 1984 (New York: Harcourt,
Brace, Jovanovich, 1949). 16. Pub. L. No. 103-414, 108 Stat. 4279.

4. See, e.g., “One Man’s Experience of Healing from 17. See, for example, Patrick W. Kelly, Deputy
Cancer,” http://www.christopher-sheppard.com/ General Counsel, Federal Bureau of Investigation,
health.htm; and Cram et al., “The Impact of a Letter to John Rogovan, General Counsel, FCC,
Celebrity Promotional Campaign on the Use of January 28, 2004, http://www.neca.org/wawatch
Colon Cancer Screening: the Katie Couric Effect,” /wwpdf/013004_7.pdf.
As the privacy Archives of Internal Medicine (2003), http://arch
inte.ama-assn.org/cgi/content/full/163/13/1601. 18. See Harper, “Testimony at a Hearing on Red-
debate matures, it Light Cameras.”
5. See “Contracts,” http://www.privacilla.org/bus
should become iness/contracts.html. 19. See generally, Clyde Wayne Crews Jr., “Human
Bar Code: Monitoring Biometric Technologies in
clearer that 6. The Gramm-Leach-Bliley Act and federal regu- a Free Society,” Cato Institute Policy Analysis no.
governments are lations under the Health Insurance Portability 452, September 17, 2002, http://www.cato.org
and Accountability Act institutionalized sharing /pubs/pas/pa-452es.html.
a chief threat to of personal information with government
authorities and various “approved” institutions. 20. See “Comments of Privacilla.org on ‘Notice of
privacy. See 15 U.S.C. §§ 6802(e)(5)&(8); various subsec- Status of System of Records; Interim Final Notice;
tions of 45 C.F.R. 164.512. Request for Further Comments,’” September 30,

16
2003, http://www.privacilla.org/releases/TSA_ 34. House Committee on Veterans’ Affairs,
comments_09-30-03.pdf. Subcommittee on Oversight and Investigations,
“Hearing II on Information Technology,” Septem-
21. See James W. Harper, “Prepared Remarks to ber 21, 2000, http://veterans.house.gov/hearings
the Bank Secrecy Act Advisory Group, U.S. /schedule106/sept00/9-21-00/witness. htm.
Department of Treasury,” October 22, 2003, http:
//www.privacilla.org/releases/BSAAG_remarks_1 35. Charlotte Twight, Dependent on D.C. (Washing-
0-22-03.html. ton: Cato Institute, 2002), p. 271.

22. Declan McCullagh, “Privacy a Victim of the 36. See Daniel J. Pilla, “Why You Can’t Trust the
Drug War,” Wired News, December 11, 2000, http: IRS,” Cato Institute Policy Analysis no. 222, Wash-
//www.wired.com/news/politics/0,1283,40532, ington, April 15, 1995, http://www.cato.org/pubs
00.html. /pas/pa222.html.

23. See, for example, U.S. Department of the 37. See The Prosperity Institute, Task Force on
Treasury, Office of Enforcement, “The 2001 Information Exchange and Financial Privacy,
National Money Laundering Strategy,” http:// “Report on Financial Privacy, Law Enforcement, and
www.ustreas.gov/press/releases/docs/ml2001.pdf Terrorism,” Alexandria, Virginia, March 25, 2002,
http://www.911investigations.net/IMG/pdf/doc-
24. See National Gambling Impact Study 386.pdf.
Commission, http://govinfo.library.unt.edu/ngisc
/index.html. 38. See Organization for Economic Cooperation
and Development, “Improving Access to Bank
25. Office of Child Support Enforcement, U.S. Information for Tax Purposes: The 2003 Progress
Department of Health and Human Services, Report,” http://www.oecd.org/dataoecd/5/0/149
“Accuracy of Data Maintained by the National 43184.pdf.
Directory of New Hires and the Effectiveness of
Security Procedures,” July 31, 2002, http://www2 39. See Streamlined Sales Tax Project, http://
.acf.hhs.gov/programs/cse/pubs/2002/reports/n www.streamlinedsalestax.org/.
dnh_data_accuracy.html#N100C9.
40. See, for example, “Computer Security: How
26. See Center for Health Services Research, Vulnerable Are Federal Computers?” Testimony of
“Outcome and Assessment Information Set Solveig Singleton, then director of information
(OASIS B-1),” December 2002, http://www.cms.h studies at the Cato Institute, before a hearing of the
hs.gov/oasis/soc.pdf. Subcommittee on Government Management,
Information, and Technology, September 11, 2000,
27. The DNA Identification Act of 1994, Pub. L. http://www.house.gov/reform/gmit/hear
No. 103-322. ings/2000hearings/000911computersecuri
ty/000911ss.htm.
28. National DNA Index System Web page,
http://www.fbi.gov/hq/lab/codis/national.htm. 41. A beginning step has been taken in Alan
Charles Raul, Privacy and the Digital State: Balancing
29. “Privacy and Federal Agencies: Government Public Information and Personal Privacy (Boston:
Exchange and Merger of Citizens’ Personal Kluwer Academic Publishers, 2001).
Information Is Systematic and Routine,” March
2001, http://www.privacilla.org/releases/Govern 42. See Federal Communications Commission, “En-
ment_Data_Merger.html. hanced 911,” http://www.fcc.gov/911/enhanced/.

30. See U.S. Department of Justice, “Overview of the 43. See generally, Federal Trade Commission
Privacy Act of 1974, Computer Matching,” 2002, workshop, “The Mobile Wireless Web, Data
http://www.usdoj.gov/04foia/1974compmatch. Services and Beyond: Emerging Technologies and
htm. Consumer Issues,” December 11–12, 2000, http:
//www.ftc.gov/bcp/workshops/wireless/.
31. 5 U.S.C. § 552a(b)(3).
44. See “Health Privacy in the Hands of Govern-
32. Department of Veterans Affairs, “Report of ment: The HIPAA Privacy Regulation—Troubled
New System of Records—Consolidated Data Process, Troubling Results,” April 2003, http://
Information System—VA (97VA105),” Federal www.privacilla.org/releases/HIPAA_Report.html.
Register 66 (January 16, 2001): 3650.
45. Medicare Prescription Drug Improvement
33. Ibid., p. 3652. and Modernization Act of 2003, Pub. L. No. 108-
173, Title XII, § 1201.

17
Published by the Cato Institute, Policy Analysis is a regular Additional copies of Policy Analysis are $6.00 each ($3.00
series evaluating government policies and offering proposals each for five or more). To order, or for a complete listing of
for reform. Nothing in Policy Analysis should be construed as available studies, write the Cato Institute, 1000 Massachusetts
necessarily reflecting the views of the Cato Institute or as an Ave., N.W., Washington, D.C. 20001 or call toll
attempt to aid or hinder the passage of any bill before Con- free 1-800-767-1241 (8:30 a.m.-4:30 p.m. eastern
gress. Contact the Cato Institute for reprint permission. time). Fax (202) 842-3490 • www.cato.org

You might also like