Soft Surveillance: Mandatory Voluntarism and the Collection of Personal Data

Marx, Gary T.

IN TRURO, MASSACHUSETTS, at the end of 2004, police politely asked all male residents to provide a DNA sample to match with DNA material found at the scene of an unsolved murder. Residents were...

...To be sure the evidence of ebbs is undeniable, but even in the shadow of 9/11 there are some flows as well, particularly at the state and local level...
...talking in code and encrypting all communications...
...Residents were approached in a non-threatening manner and asked to help solve the crime...
...Consider the following: • the ubiquitous building signs, "In entering here you have agreed to be searched" • a message from the Social Security Admin36 DISSENT / Fall 2005 SOFT SURVEILLANCE istration to potential recipients: "While it is voluntary for you to furnish this information, we may not be able to pay benefits to your spouse unless you give us the information" • a Canadian airport announcement: "Notice: Security measures are being taken to observe and inspect persons...
...Many of the new controls may seem more acceptable (or at least are less likely to be challenged) because they are hidden or built-in and less invasive relative to the traditional forms of crossing personal and physical borders...
...In the convoluted logic of those who justify covert (or non-informed) data collection and use, individuals "volunteer" their data by walking or driving on public streets or entering a shopping mall...
...IN THE FACE Of the simplistic rhetoric of polarized ideologues in dangerous times, we need attention to trade-offs and to the appropriate weighing of conflicting values...
...It is central to current ideas about economic competitiveness...
...What matters most is the appropriateness of collecting the information and only secondarily the way that it is collected...
...A dangerous technology can be banned, regulated, or countered with a different technology...
...The abundance of new opportunities for self-expression offered by contemporary technologies must be considered alongside the less40 DISSENT / Fall 2005 SOFT SURVEILLANCE ened control we have over information in distant computer systems...
...A search is still a search, regardless of how it is carried out...
...Wartime restrictions (whether Lincoln's suspending of habeas corpus or limits on speech during the Second World War) have been lifted as calmer times returned...
...Rob Walker, "The Corporate Manufacture of Word of Mouth" (New York Times Magazine, December 5, 2004...
...Yet coercion at least has the virtue (if that's what it is) of letting the subject (or object) know what is happening...
...But of course it can, and in some ways it has...
...Nor does it involve the unwanted observation required for a urine drug sample...
...If our traditional notions of liberty disappear, it will not be because of a sudden coup d'état...
...The statement of a direct marketer nicely illustrates this: "Never ever underestimate the willingness of the American public to tell you about itself...
...New technologies overcome traditional barriers, such as darkness or walls...
...Thermal imaging technology applied from outside can offer a rough picture of a building's interior based on heat patterns...
...Those who fail to volunteer can be viewed as having something to hide or as being bad citizens...
...A guilty person would have to be very stupid indeed to come forth and volunteer a DNA sample...
...One's liberty can be used to smoke, eat rich foods, drive environmentally unfriendly cars, and watch unreality television, as well as to volunteer personal information—whether to government or the commercial sector...
...These are among twenty broad questions and related principles that I suggest be asked in any assessment of personal information collection...
...The social functions of reticence and embarrassment and the role of withheld personal information as a currency of trust, friendship, and intimacy are greatly weakened...
...Two decades later the hot-button cultural themes of threat, civil order, and security that Lewis emphasized are in greater ascendance and have been joined by the siren calls of consumption...
...Cell-phone cameras can be designed to emit a telltale sound before a picture is taken (this is required in Japan...
...Any social practice is likely to involve conflict of values...
...This permits a comprehensive record of flushed offerings over time...
...It is said to be of great benefit in the early diagnosis of health problems, and it can also determine drug use, recent sexual activity, and pregnancy...
...What is at stake here isn't merely improved advertising in intensely competitive industries but a new and morally ambiguous form of tattling...
...Whatever can be revealed from the analysis of blood or urine is also potentially found (although in smaller quantities) in saliva—not only evidence of disease and DNA, but also of drugs taken and pregnancy...
...The third reflected the affront experienced in our culture when certain personal borders were involuntarily crossed (for example, strip and body-cavity searches, taking body fluids, and to a lesser degree, fingerprinting...
...To take blood is to pierce the body's protective armor...
...As with other new forms of surveillance and detection, the process of gathering the DNA information is quick and painless, involving a mouth swab, and is generally not felt to be invasive...
...Sinclair Lewis, It Can't Happen Here (New York: Signet Classics, 1995, re-issued...
...Yet the culture of social control is changing...
...We need to just say "no" when, after we pay with a credit card, a cashier asks for a phone number or when a Web page or warranty form asks for irrelevant personal information or a video store seeks a Social Security number...
...Regardless of whether they are compensated, the providers of information to marketing research are also volunteering information on those who share their characteristics and experiences...
...and only using restrooms certified to be monitor free...
...I]t isn't out there because we stole it . . . Someone gave it away and now it's out there for us to use...
...To be meaningful, choice should imply genuine alternatives and refusal costs that are not wildly exorbitant...
...The transit authority in Sheffield, England, as part of an anti-spitting campaign, distributed three thousand DNA swab kits to transportation staff...
...Is It Happening Here...
...In such a society, knowing more may only serve to increase the need for more information...
...DISSENT / Fall 2005 41 SOFT SURVEILLANCE The surveillance developments noted here are consistent with the strengthening of the neoliberal ethos of the last decade...
...The second task is to guard against the softer forms of secret and manipulative control...
...A diagnostic test routinely used in some Japanese employment contexts requires that each employee who enters a stall be identified through an access card...
...If the case for categorical information is strong, then the law ought to require it without need of the verbal gymnastics of asking for volunteers or arguing that subjects are in fact taking voluntary action in the full meaning of the term, when they aren't...
...In contrast, more traditional police methods, such as an arrest, a custodial interrogation, a search, a subpoena, or traffic stop, are "hard...
...No More Happy Overlaps There are also pragmatic issues: does the tactical work...
...Saliva samples can be taken easily and endlessly, and the changes charted in them make possible the early identification of problems...
...Consent obtained through deception or unreasonable or exploitative seduction or to avoid dire consequences is hardly consent...
...Hard forms of control are not receding, but soft forms are expanding...
...As consumers and citizens we have an interest in avoiding the manipulation, discrimination, and theft that can flow from combining bits of personal information that are innocuous by themselves...
...Offering disinformation may sometimes be appropriate...
...If the first, they fail to prevent disasters, bring miscarriages of justice, and waste resources...
...In Kyllo v. United States, a case involving the legality of a search warrant based on evidence from thermal-imaging technology, the dissenting judges argued that because the suspect did not take any actions to block the heat emissions that passed through his roof from his marijuana grow lights, he did not have an expectation of privacy...
...The positive reasons for rejecting such requests are ignored...
...Beyond the traditional Neighborhood Watch, we can note new post-9/11 programs, such as a police-sponsored C.A.T...
...The possibility of wrongful choice is an inherent risk of democracy...
...Posters proclaim "Spit...
...In one sense, there are two problems with the new surveillance technologies...
...RFID technology can build in notification by requiring that the chip make physical contact with the sensor (for example, touching the card or item to the sensor), rather than permitting it to be read covertly at a distance...
...The junk mail I receive for Groucho and Karl gives me a laugh as well as a way to track the erroneous information I sometimes provide...
...We gladly, if often barely consciously, give up this information in return for the ease of buying and communicating and the seductions of frequent-flyer and other reward programs...
...they chill liberty...
...Nor will the iron technologies of industrialization be the central means...
...There also appears to be an increase in federal prosecutors' asking corporations under investigation to waive their attorney/client privilege...
...Data shadows or ghosts based on tangents of personal information (stripped of context) increasingly affect our life chances...
...No passengers are obliged to submit to a search of persons or goods if they choose not to board our aircraft" A related form of soft surveillance involves corporations more than government...
...There is no fixed golden balance point...
...Facial-scanning requires only a tiny lens...
...The first was logistical...
...Sinclair Lewis hoped in 1935 that It Can't Happen Here...
...The general social value we place on sealed firstclass letters, window blinds, and bathroom doors, and our opposition to indiscriminate wiretapping, bugging, and informing, or to giving up anonymity in public places (absent cause), are hardly driven by an interest in aiding the guilty...
...At best we can hope to find a compass rather than a map and a moving equilibrium rather than a fixed point for decision making...
...In many of these cases citizens are at least informed of what is going on, even if the meaning of their consent is open to question...
...Of course our sense of self and social participation have always depended on validation from others—on seeing ourselves in, and through, their eyes...
...The accompanying rhetoric is often dishonest and insulting to one's intelligence...
...A person's DNA can be collected from a drinking glass or from discarded dental floss...
...Finally, technology needs to be seen as an opportunity, rather than a problem...
...In the Truro case, a suspect was eventually arrested, but the arrest was based on other evidence...
...In criminal justice contexts these means involve some or all of the following: persuasion to gain voluntary compliance, universality or at least increased inclusiveness, and emphasis on the needs of the community relative to the rights of the individual...
...Smart machines can "smell" contraband, eliminating the need for a warrant or for asking subjects for permission to invade their olfactory space or "see" through their clothes and luggage...
...Thus electronic silencers can inhibit third parties from overhearing cell-phone and face-to-face conversations, and computer pri42 DISSENT / Fall 2005 SOFT SURVEILLANCE vacy screens can block sneaky peeks by anyone not directly in front of the screen...
...The subject often has little knowledge of the existence or consequences of these databases and of how they are constructed or might be challenged...
...A new variant goes beyond the traditional paid "volunteers" of the Nielsen ratings and other consumer research...
...It would be foolish to elevate consent to an absolute, but neither should we continue to slide into a world where meaningful consent is only of historical interest...
...Gary Marx, "Seeing Hazily (But Not Darkly) Through the Lens: Some Recent Empirical Studies of Surveillance Techwould show a citizen protecting privacy by always wearing gloves, a mask, and perfume...
...Ibid, "I'll Be Watching You: The New Surveillance" (Dissent, Winter 1985...
...Diagnostic spitting as a condition of employment is obviously of interest to employers concerned with rising health costs and resistance to urine drug tests—and eager to avoid liability for the illnesses of those who work around hazardous chemicals...
...We value privacy not to protect wrongdoing, but because an appropriate degree of control over personal and social information is central to our sense of self, autonomy, and material well-being—as well as being necessary for independent group actions...
...A bad law can be challenged in court or repealed...
...Relative to traditional authoritarian settings, many of the above examples show respect for the person in offering notice and some degree of choice and in minimizing invasiveness...
...A golden rule principle ought also to apply: Would the information collector be comfortable in being the subject, rather than the agent, of surveillance, if the situation were reversed...
...In failing to act in response to changed circumstances beyond his or her control, the individual is seen to be making a choice and, in a sense, volunteering to be searched...
...David Riesman...
...Computers scan dispersed personal records for suspicious cases, avoiding, at least initially, any direct review by a human...
...Authorities concerned with identifying those who spit when not requested to can also use the technology...
...This willful blurring of some of the lines between the public and private self and the ready availability of technologies to transmit and receive personal data give new meaning to David Riesman's concern with "other direction...
...Certainly we do not lack for contemporary examples of constricted or trampled legal rights (for example, the unwelcome elements of the Patriot Act or American citizens held on terrorism charges without trial...
...Yet there is something troubling about them...
...or using a credit card, computer, or telephone...
...This tactic of rounding up all the usual suspects and then some is still rare in the United States for historical, legal, and logistical reasons, but it is becoming more common...
...Converting privacy to a commodity in which the seller receives something in return to compensate for the invasion is a clever and defensible means of overcoming resistance...
...Volunteering one's data and being digitally recorded and tracked is coming to be taken for granted as a means of asserting selfhood...
...The idea of voluntary compliance seems to fit with increased individual choices, costs, and risks...
...Twenty years ago in reflections on the year and book 1984, I wrote in these pages, The first task of a society that would have liberty and privacy is to guard against the misuse of physical coercion by the state and private parties...
...Sealing juvenile criminal records does not reflect a perverse strategy for infiltrating miscreants into adult life, but rather an understanding of, and some compassion for, the mistakes of youth...
...Individuals need not be informed that their communications devices, vehicles, wallet cards, and consumer items increasingly will have RFID (Radio Frequency Identification) chips embedded in them that can be designed to be passively read by unseen sensors from up to thirty feet away...
...From one perspective, using technology to protect one's personal information may offer legal support for an expectation of privacy...
...They may also deter...
...GARY T. MARX is an electronic (garymarx.net) and itinerant scholar and author of Windows Into the Soul: Surveillance and Society in an Age of High Technology (University of Chicago Press, forthcoming...
...Once a technology becomes widely available and is well known, responsibility for protection shifts legally (as well of course as practically) to the individual, not to those who would cross personal borders...
...The default position should be meaningful consent, absent strong grounds for avoiding it...
...it is far better to say clearly that "as a condition of [entering here, working here, receiving this benefit, etc.] we require that you provide personal information...
...More troubling is the development of tactics that need not rely on the subject's consenting or PHOTO BY CLIVE NORRIS even being informed...
...So rationality and efficiency increasingly clash with many of our basic Enlightenment ideas of individualism and dignity—ideas that were better articulated and less contestable, in technologically simpler times...
...No Easy Answers In an environment of intense concern about crime and terrorism and a legal framework generated in a far simpler time, the developments discussed above are hardly surprising...
...Such efforts draw on the higher civic traditions of democratic participation, self-help, and community...
...We need to overcome the polite tendency to acquiesce when we are inappropriately asked for personal information...
...These twin threats are part of the enduring paradox of democratic government that must be strong enough to maintain reasonable order but not so strong as to become undemocratic...
...The theme of volunteering as good citizenship or patriotism can increasingly be seen in other contexts...
...But the only way to respond to libertythreatening choices of the kind discussed here is through dialogue and education (tools that are already disproportionately available to those supporting the current developments...
...However, the nature of the means does not determine its acceptability...
...Data gathering is "naturally" folded into routine activities such as driving a car...
...Consider a Justice Department "Watch Your Car" program found in many states...
...But expectorating occurs easily, frequently, and is more "natural" than puncturing a vein...
...Another "soft" method involves disingenuous communication that seeks to create the impression that one is volunteering when that isn't the case...
...EYES (Community Anti-Terrorism Training Initiative), and efforts to encourage truckers, utility workers, taxi drivers, and delivery persons to report suspicious activity...
...If the second, they can further inequality and invidious social categorization...
...There is increased reliance on "soft" means for collecting personal information...
...The prying and often inane television talk and reality shows, Web cam pages, Web logs, the goofy waving of fans at televised events, and videotaping of conceptions, births, and last wills and testaments suggest the extent to which we have become both a performance and a spectator society—literally from the beginning of life to the end...
...having a closely shaved head...
...It's Out" and warn persons who spit that " . . . you can be traced—and prosecuted...
...This generates a suspicious society in which paranoia is entangled with reality...
...These volunteer intelligence and marketing agents report on their own and others' responses to products, take surveys, and participate in focus groups...
...Beyond the traditional reading of visual clues offered by facial expression, there are claims that 38 DISSENT / Fall 2005 SOFT SURVEILLANCE the covert analysis of heat patterns around the eyes and of tremors in the voice and the measurement of brain wave patterns offer windows into feelings and truth telling...
...More invasive searches were prohibited or inadmissible, absent cause and a warrant...
...Working together and sacrificing a bit of oneself for the common good, particularly in times of crisis, is hardly controversial...
...We must resist the appeals to morality and panic that can erode these procedures...
...Saliva is particularly interesting...
...One is that they don't work, and the other is that they work too well...
...Traditionally (if accidentally) there was a happy overlap between three factors that limited searches and protected personal information...
...Beyond the ease of gathering DNA, consider the change from a urine drug test requiring an observer, to drug tests that require a DISSENT / Fall 2005 37 SOFT SURVEILLANCE strand of hair, sweat, or saliva...
...My concern is more with cultural and behavioral developments than with the law...
...This may offer medical diagnostic advantages to the individual...
...Limited resources, the unpleasantness of invasive searchers (for both the searched and the searcher), and the ethos of a democratic society historically restricted searches...
...The cultural changes are worrisome because they are diffuse, subtle, and unseen— and they often reflect choices that are difficult to challenge in a democratic society...
...We must demand a principle of truth in volunteering...
...This collapsing of what can be done with what is right involves an inverted logic...
...The data analyst goes from known empirical cases to equivalent cases that are not directly known...
...And then there are those who agree to report their consumption behavior and attitudes in more detail as part of market research...
...Under these conditions one does not need a meteorologist to describe wind patterns...
...nologies" (Law and Social Inquiry, Spring 2005...
...What we don't know can hurt us as well...
...I note several forms of this, from requesting volunteers based on appeals to good citizenship or patriotism to using disingenuous communication to profiling based on lifestyle and consumption to utilizing hidden or low-visibility, information collection techniques...
...Yet we all have things to hide or, more properly, to reveal selectively, depending on the relationship and context...
...DISSENT / Fall 2005 43...
...There is no need for the observer to enter the space...
...This complicated issue of reducing the richness of personal and social contexts to a limited number of variables is at the core of the ability of science to predict...
...The automated analysis of urine offers many of the advantages of saliva...
...Diverse settings—national security, domestic law enforcement, public order maintenance, health and welfare, commerce, banking, insurance, public and private spaces and roles—do not allow for the rigid application of the same policies...
...Technologies can be designed to protect personal information and notify individuals when their information is collected or has been compromised...
...This blame-the-victim caveat subjectus logic cries out for a cartoon entitled, "Where will it end...
...We lack an adequate conceptual, ethical, and legal framework for considering this spillover effect from voluntary to involuntary disclosure involving third parties...
...It simultaneously weakens many social protections and pays less attention to the ways the social order produces bad choices and collective problems...
...There can be psychological gratifications from revelation for both the revealer and the recipient of the information...
...The issue of searches and the crossing of traditional borders between the civil and state sectors or the self and others involves much more than painless, quick, inexpensive (or positively rewarding), and non-embarrassing means...
...Here we confront the insatiable information appetite generated by scientific knowledge in a risk-adverse society...
...A related form of voluntarism involves using citizens as adjuncts to law enforcement by watching others...
...The recent development of non-electrical sensors now makes it possible to detect molecules at minute levels in saliva...
...Because these are often subtle, indirect, invisible, diffuse, deceptive, and shrouded in benign justifications, this is clearly the more difficult task...
...It was not costor time-effective to search everyone...
...We need a situational or contextual perspective that acknowledges the richness of different contexts, as well as the multiplicity of conflicting values within and across them...
...The Truro case illustrates expanding trends in surveillance and social control...
...watching television...
...or by choosing to use a phone, computer, or a credit card...
...But contemporary forms of validation induce a sense of pseudo-authenticity, an unbecoming narcissism, and a suspicious spy culture...
...That data belongs to us...
...Although many call, few are chosen (10 percent-15 percent) for this highly coveted role...
...But it also speaks to some need of the modern person (and perhaps, in particular, the American) to see and be seen and to know and be known about through the ubiquitous camera and related means...
...However the procedures for accountability and oversight so central to the founding and endurance of the country must remain strong...
...When we are told that for the good of the community we must voluntarily submit to searches or provide information, we run the danger of the tyranny of turning presumptions of innocence upside down...
...There is no single answer to how the new personal information collection techniques ought to be viewed and what, if anything, should (or can) be done about them...
...The different roles of employeremployee, merchant-consumer, landlordrenter, police-suspect, and health providerpatient involve legitimate conflicts of interests...
...We can also note changes in a related cultural area, involving the willing, even gleeful public exposure of private information— whether in dress styles, cell phone conversations, or the mass media...
...The consequences of these are then left to individual and private solutions...
...In principle such means are restricted by law and policy to persons there are reasons to suspect, and thus they implicitly recognize the liberty of the individual relative to the needs of the community...
...Consent involves participants who are fully aware of the surveillance system's presence and potential risks and of the conditions under which it operates...
...The face still remains a tool for protecting inner feelings and thoughts, but for how long...
...Plea bargaining shares a similar logic of coercive "volunteering," often hidden under a judicially sanctified and sanitized veneer of disguised coercion...
...Contrary to the familiar Orwellian concerns about the all-knowing eyes and ears of government, recent history suggests to some observers the reverse problem—blindness, deafness, and inefficiency (for example, the 9/11 danger known only in retrospect, the failure of various airline passenger screening programs, wrongful convictions, and so on...
...And your record will be on the national DNA database...
...et al., The Lonely Crowd (Yale University Press, 2001...
...Forever...
...Consider, for example, the many cities that have passed resolutions critical of the Patriot Act...
...They are presumed to be universally applicable absent cause to deny them...
...They seek to create "buzz" about new products without revealing their connection to the sponsoring business...
...Rather, it will occur slowly, with an appeal to traditional American values in a Teflon- and sugar-coated technological context of low visibility, fear, and convenience...
...Absent that, we have trickery, double-talk, and inequitable relationships...
...I have found no cases where the request for voluntarily offered samples solved the case...
...The willingness to offer personal information and the fascination with the private aspects of others' lives is a partial legacy of the openness and transparency of the 1960s...
...In the same World Cup League of Disingenuousness is the statement of a personnel manager in a one-industry town, "We don't require anyone to take a drug test, only those who choose to work here...
...The second was law...
...Night-vision technology illuminates what darkness traditionally protected (and the technology is itself protected, unlike an illuminated spotlight...
...This may work fine for business or medical decisions, but civil liberties and civil rights are not based on statistical categories...
...The moral and practical issues around the initial collection of information are distinct from its subsequent uses and protections...
...by failing to hide their faces or wear gloves or encrypt their communications...
...Information collection is unseen and automated (in a favored engineering goal, "the human is out of the loop"), generating the appearance of actions that are neutral and objective and ignoring the choices inherent in the design of the system...
...Barry Glassner, The Culture of Fear (Basic Books, 2000...
...Exchanges and less invasive searches are certainly preferable to data rip-offs and more invasive searches...
...However, no direct benefits flow to the mass of persons the sponsoring agency learns about...
...If only the guilty need worry, why bother with a Bill of Rights and other limits on authority...
...These supports are no longer overlapping...
...Because a given case can be classified relative to a statistical model as involving a high or low risk, it is presumed to be understood and thus controllable (at least on statistical or "probabilistic" bases...
...There also comes a point beyond which social pressure seems unreasonable...
...Typical is a phone company executive who, in defense of unblockable caller ID, said, "When you choose to make a phone call you are choosing to release your telephone number...
...This can provide information that is not otherwise available—in return for indicting only lower level personnel...
...Even if we don't know what you look like...
...insulating home, office, and packages in thermal-imageresistant tinfoil...
...There is a chilling drift into a society where you have to provide ever-more personal information in order to prove that you are the kind of person who does not merit even more intensive scrutiny...
...A healthy, if necessarily qualified, suspicion of authority is also a factor in restricting information sought by the DISSENT / Fall 2005 39 SOFT SURVEILLANCE more powerful...
...From genuine to mandatory voluntarism and from open to secret data collection—these are points on continuums...
...We are also often complicit in their application— whether out of fear, convenience, or for frequentshopper awards...
...Jagged cycles rather than clean linearity will continue to characterize this turbulent history...
...Volunteers are given free samples and talking points...
...According to a New York Times Magazine story, Procter and Gamble for example has 240,000 volunteers in its teenage product propaganda/ diffusion network...
...Beyond the paper shredder, which has become routine in many homes, the cartoon David Altheide, Creating Fear: News and the Construction of Crisis (Aldine de Gruyter, 2002...
...There thus is no Fourth Amendment issue, and the police action should not require a warrant...
...New hidden or low-visibility technologies increasingly offer the tempting possibility of bypassing awareness, and thus any need for direct consent, altogether...
...Democratic governments need to be reasonably effective and to maintain their legitimacy (even as research on the complex relationships between effectiveness and legitimacy is needed...
...They may also involve a crossing of intimate personal borders, as with a strip or body-cavity search...
...Instead, they are being undermined by the mass media's encouragement of fear and perceptions of crises and by the seductiveness of consumption—together with the development of inexpensive, less invasive, broad searching tools...
...Other factors being equal, soft ways are to be preferred to hard, even if the control/instrumental goals of those applying the surveillance remain the same...
...This makes such requests seem harmless relative to the experience of having blood drawn, having an observer watch while a urine drug sample is produced, or being patted down or undergoing a more probing physical search...
...Note the implicit bargain with respect to technologies of consumption in which the collection of personally identifiable (and often subsequently marketed) information is built into the very activity...
...Many Americans are drawn to new communications technologies like nails to a magnet, unable to resist the prurient call to watch others, but also with a near Dostoyevskian compulsion to offer information about themselves...
...There are parallels to DNA analysis here: an individual who voluntarily offers his or her information also simultaneously offers information on family members who have not agreed to this...
...Searching Made Easy Many forms of voluntarism are encouraged by techniques designed to be less directly invasive...
...Decals that car owners place on their vehicles serve as an invitation to police anywhere in the United States to stop the car if they see it being driven late at night...
...Appreciating complexity is surely a virtue, but being immobilized by it is not...
...Similarly X-ray and scent machines "search" persons and goods for contraband without touching them...
...Inkless fingerprints can be taken without the stained thumb symbolic of the arrested person...
...They involve coercion and threat to gain involuntary compliance...
...Classified government programs are said to permit the remote reading of computers and their transmissions without the need to directly install a bugging device...
...The smile that accompanies the statement, "an offer you can't refuse" reflects that understanding...
...E-ZPass toll collection systems can be programmed to deduct payment, while protecting the anonymity of the driver...
...There are important moral differences between what can be known through the unaided senses and what can only be known through technologically enhanced senses...
...Still, the growing institutionalization of civil rights and civil liberties over the last century (involving race, gender, children, work, freedom of expression and association, searches, and lifestyles) is unlikely to be reversed...

Vol. 52 • September 2005 • No. 4


 
Developed by
Kanda Software
  Kanda Software, Inc.