[Infowarrior] - Schneier: It's Time to Drop the 'Expectation of Privacy' Test
Richard Forno
rforno at infowarrior.org
Tue Mar 31 12:54:48 UTC 2009
It's Time to Drop the 'Expectation of Privacy' Test
Commentary by Bruce Schneier Email 03.26.09
http://www.wired.com/politics/security/commentary/securitymatters/2009/03/securitymatters_0326
In the United States, the concept of "expectation of privacy" matters
because it's the constitutional test, based on the Fourth Amendment,
that governs when and how the government can invade your privacy.
Based on the 1967 Katz v. United States Supreme Court decision, this
test actually has two parts. First, the government's action can't
contravene an individual's subjective expectation of privacy; and
second, that expectation of privacy must be one that society in
general recognizes as reasonable. That second part isn't based on
anything like polling data; it is more of a normative idea of what
level of privacy people should be allowed to expect, given the
competing importance of personal privacy on one hand and the
government's interest in public safety on the other.
The problem is, in today's information society, that definition test
will rapidly leave us with no privacy at all.
In Katz, the Court ruled that the police could not eavesdrop on a
phone call without a warrant: Katz expected his phone conversations to
be private and this expectation resulted from a reasonable balance
between personal privacy and societal security. Given NSA's large-
scale warrantless eavesdropping, and the previous administration's
continual insistence that it was necessary to keep America safe from
terrorism, is it still reasonable to expect that our phone
conversations are private?
Between the NSA's massive internet eavesdropping program and Gmail's
content-dependent advertising, does anyone actually expect their e-
mail to be private? Between calls for ISPs to retain user data and
companies serving content-dependent web ads, does anyone expect their
web browsing to be private? Between the various computer-infecting
malware, and world governments increasingly demanding to see laptop
data at borders, hard drives are barely private. I certainly don't
believe that my SMSes, any of my telephone data, or anything I say on
LiveJournal or Facebook -- regardless of the privacy settings -- is
private.
Aerial surveillance, data mining, automatic face recognition,
terahertz radar that can "see" through walls, wholesale surveillance,
brain scans, RFID, "life recorders" that save everything: Even if
society still has some small expectation of digital privacy, that will
change as these and other technologies become ubiquitous. In short,
the problem with a normative expectation of privacy is that it changes
with perceived threats, technology and large-scale abuses.
Clearly, something has to change if we are to be left with any privacy
at all. Three legal scholars have written law review articles that
wrestle with the problems of applying the Fourth Amendment to
cyberspace and to our computer-mediated world in general.
George Washington University's Daniel Solove, who blogs at Concurring
Opinions, has tried to capture the byzantine complexities of modern
privacy. He points out, for example, that the following privacy
violations -- all real -- are very different: A company markets a list
of 5 million elderly incontinent women; reporters deceitfully gain
entry to a person's home and secretly photograph and record the
person; the government uses a thermal sensor device to detect heat
patterns in a person's home; and a newspaper reports the name of a
rape victim. Going beyond simple definitions such as the divulging of
a secret, Solove has developed a taxonomy of privacy, and the harms
that result from their violation.
His 16 categories are: surveillance, interrogation, aggregation,
identification, insecurity, secondary use, exclusion, breach of
confidentiality, disclosure, exposure, increased accessibility,
blackmail, appropriation, distortion, intrusion and decisional
interference. Solove's goal is to provide a coherent and comprehensive
understanding of what is traditionally an elusive and hard-to-explain
concept: privacy violations. (This taxonomy is also discussed in
Solove's book, Understanding Privacy.)
Orin Kerr, also a law professor at George Washington University, and a
blogger at Volokh Conspiracy, has attempted to lay out general
principles for applying the Fourth Amendment to the internet. First,
he points out that the traditional inside/outside distinction -- the
police can watch you in a public place without a warrant, but not in
your home -- doesn't work very well with regard to cyberspace.
Instead, he proposes a distinction between content and non-content
information: the contents for example. The police should be required
to get a warrant for the former, but not for the latter. Second, he
proposes that search warrants should be written for particular
individuals and not for particular internet accounts.
Meanwhile, Jed Rubenfeld of Yale Law School has tried to reinterpret
(.pdf) the Fourth Amendment not in terms of privacy, but in terms of
security. Pointing out that the whole "expectations" test is circular
-- what the government does affects what the government can do -- he
redefines everything in terms of security: the security that our
private affairs are private.
This security is violated when, for example, the government makes
widespread use of informants, or engages in widespread eavesdropping
-- even if no one's privacy is actually violated. This neatly bypasses
the whole individual privacy versus societal security question -- a
balancing that the individual usually loses -- by framing both sides
in terms of personal security.
I have issues with all of these articles. Solove's taxonomy is
excellent, but the sense of outrage that accompanies a privacy
violation -- "How could they know/do/say that!?" -- is an important
part of the harm resulting from a privacy violation. The non-content
information that Kerr believes should be collectible without a warrant
can be very private and personal: URLs can be very personal, and it's
possible to figure out browsed content just from the size of encrypted
SSL traffic. Also, the ease with which the government can collect all
of it -- the calling and called party of every phone call in the
country -- makes the balance very different. I believe these need to
be protected with a warrant requirement. Rubenfeld's reframing is
interesting, but the devil is in the details. Reframing privacy in
terms of security still results in a balancing of competing rights.
I'd rather take the approach of stating the -- obvious to me --
individual and societal value of privacy, and giving privacy its
rightful place as a fundamental human right. (There's additional
commentary on Rubenfeld's thesis at ArsTechnica.)
The trick here is to realize that a normative definition of the
expectation of privacy doesn't need to depend on threats or
technology, but rather on what we -- as society -- decide it should
be. Sure, today's technology make it easier than ever to violate
privacy. But it doesn't necessarily follow that we have to violate
privacy. Today's guns make it easier than ever to shoot virtually
anyone for any reason. That doesn't mean our laws have to change.
No one knows how this will shake out legally. These three articles are
from law professors; they're not judicial opinions. But clearly
something has to change, and ideas like these may someday form the
basis of new Supreme Court decisions that brings legal notions of
privacy into the 21st century.
---
Bruce Schneier is chief security technology officer of BT. His new
book is Schneier on Security.
More information about the Infowarrior
mailing list