More Punishment Means Less Crime: A Footnote

In “More Punishment Means Less Crime” I argued — with statistical support — that making federal sentencing guidelines advisory rather than mandatory, as the Supreme Court has done, will lead a resurgence of the violent-crime rate. I followed up with “More About Crime and Punishment,” in which I cited a case in point, the sentencing of a rapist to 60 days in jail. Now we have this, from an exchange at Legal Affairs Debate Club between Douglas Berman and Frank O. Bowman III:

Berman: 1/16/06, 09:43 AM
Given the enormous and unexpected shocks to the federal sentencing system over the past three years—Congress’ enactment of the PROTECT Act, then the Supreme Court’s decision in Blakely v. Washington, and finally the Supreme Court’s decision in United States v. Booker—I am wary about making any predictions about what will be the future of federal sentencing. But I am happy to opine about what should be the future of federal sentencing: Congress should allow the advisory guideline system created by the Booker decision to continue to operate while the U.S. Sentencing Commission and others assess its efficacy and fairness. . . .

Bowman: 1/17/06, 09:01 AM
. . . A year has passed since the Booker decision. The Sentencing Commission has been gathering and promulgating data about post-Booker practice on a nearly monthly basis since April 2005. In consequence, we have a very good idea about how the post-Booker system has worked so far:

. . . since Booker, the rate of compliance with the Guidelines, by which I mean the percentage of cases sentenced within the guideline range calculated by the sentencing judge, has declined by about 11% nationally—from about 72% to about 61%.

. . . Virtually the entire country has experienced a decline in compliance with the guidelines. The compliance rate of every circuit has fallen, and compliance fell in more than 90% of all districts.

. . . the average length of a federal sentence in 2005 stayed the same as it was in 2004. On the other hand, the trend in sentence length (and guidelines compliance) from 2001-2004 was sharply up, the apparent result of conscious efforts by both Congress and the central administration of DOJ to increase guidelines adherence and criminal penalties. In short, the average federal sentence length post-Booker seems to reflect not maintenance of the status quo, but the sudden arrest of what had been a powerful and continuing upward surge.

. . . the decrease in guidelines compliance after Booker is almost entirely due to judicial action. Judges are using their new authority to reduce sentences below the range in almost 10% of all cases, and it is their exercise of this authority that is driving the decline in overall compliance rate.

I’ll make no comment now on these facts, other than to suggest that the argument for delay in response to Booker cannot much longer be premised on the claim that we don’t know how the new system will work. In fact, we have a very good idea of how it’s working.

Indeed we do. It’s working in favor of criminals. And that will lead to a resurgence of crime.

Related posts:
Does Capital Punishment Deter Homicide?
Libertarian Twaddle about the Death Penalty
Crime and Punishment
Abortion and Crime
Saving the Innocent?
Saving the Innocent?: Part II
More on Abortion and Crime
More Punishment Means Less Crime
More About Crime and Punishment
Clear Thinking about the Death Penalty
Let the Punishment Fit the Crime
Another Argument for the Death Penalty
Less Punishment Means More Crime
Crime, Explained

A Supreme Court Quiz

Q. When are Justices Scalia and Thomas for federalism?

A. Always, except when they’re against it, as in Gonzales v. Oregon.

Q. When are Justices Stevens, Kennedy, Souter, Ginsburg, and Breyer against federalism?

A. Always, except when they’re for it, as in Gonzales v. Oregon.

Celebrating My Heritage

In keeping with the spirit of the day, I celebrate my heritage and take pride in these, my biological (though not actual) kinsmen, who are pictured from top to bottom, as follows:

Marquis de Condorcet (French)
Johann Sebastian Bach (Saxon)
Edmund Burke (British)
Chief Stone Child, a.k.a. “Rocky Boy” (Chippewa)




(All images courtesy of Wikipedia.)

Debunking "Scientific Objectivity"

Alanyzer opens with this:

The first thing we must recognize is that the question of the nature of science is not a scientific question, but a philosophical one. . . .

. . . methodological naturalism [is] the claim that science can only appeal to natural causes as explanations. . . .

But there are some big problems with this appeal to methodological naturalism as an essential characteristic of science. Indeed, it sets up a dilemma that is likely to backfire on the scientific establishment. I’ll explain tomorrow in a follow-up post.

Here are portions of the follow-up post:

In yesterday’s post I gave some background on the Intelligent Design (ID) debate and noted that an increasingly popular move by the mainstream scientific establishment has been to stipulate that “science” requires methodological naturalism. In other words, the claim is that properly “scientific” explanations can only make reference to ‘natural’ laws and entities, the kinds of laws and entities that would presumably find inclusion in a completed form of physics. . . .

[T]his way of defining “science” is historically and philosophically arbitrary. Prior to the rise of Darwininsm and Comtean positivism in the 19th century, no one–not Galileo, not Newton, not Kepler, Boyle, you name it–would have thought to define “science” in terms of a commitment to methodological naturalism. Instead, beginning all the way back with Aristotle, the various sciences were defined in terms of the object of their study, not the types of explanatory entities they were allowed to invoke. . . .

Noted 19th-century logician, philosopher, and scientist Charles Sanders Peirce argued that to “block the road of inquiry” was to commit a cardinal sin against rationality. To “block the road of inquiry” is to set up a priori restrictions on where inquiry can go and on what kinds of answers it can reach. The reason why Peirce saw this as a sin against rationality was because it takes our focus off of truth and insulates certain ‘pet theories’ from potential refutation. It’s like saying “I’ve made up my mind about X, Y, and Z, and I refuse to countenance any evidence weighing against those opinions.” Such dogmatism, Peirce held, is antithetical to the spirit of science. Ironically, in the name of promoting genuine “science”, the mainstream scientific establishment wants to do the very thing that Peirce held to be fundamentally antithetical to science, i.e., block the road of inquiry. What they are saying, in effect, is that the only answers that will be tolerated are naturalistic answers.

Maverick Philosopher chimes in, with a “Fisking” of Daniel Dennett:

Dennett’s main point here is that belief in God and in an afterlife are epistemically on a par with belief in the Easter Bunny and black magic. . . . Few philosophers today would claim that that God and afterlife can be definitively proven. But no fair-minded person can deny that there are many powerful arguments in their support, and many powerful arguments against naturalism, and in particular, arguments against Dennett’s extreme version thereof.

What Dennett is suggesting, of course, is that religion is just a form of superstition. . . . It is also quite absurd to suggest that all the intelligent people — the brights — are on one side of the issue. . . .

Indeed, if one looks back through the history of philosophy, one sees that the greatest philosophers were theists of one sort or another, and that the atheists and materialists were second-string or worse. . . .

Another point that must be mentioned is Dennett’s tendentious and unclarified use of ‘supernatural.’ . . .

Is the supernatural perhaps that which violates the laws of nature? Is the supernatural the same as the miraculous? This may well be what Dennett has in mind. But God, unlike the Easter Bunny, Santa Claus, the Tooth Fairy and other Dennet favorites, need not be understood as violating any laws of nature. Think of a God that does not intervene miraculously in the workings of nature, but is merely the sustaining cause of the existence of nature. Then there would be a clear sense in which God would not be a supernatural being. Though outside of nature (and precisely because outside of nature) he would not violate any natural laws. Something not subject to natural laws cannot be said to violate them. . . .

At the very least, we need to know what ‘supernatural’ means to fully understand Dennett’s opposing of the naturalist brights to the supernaturalist dullards. Does it mean nonnatural, miraculous, or naturalistically inexplicable? If Dennett is using it as a bludgeon, as a portmanteau term of abuse, the way lefties use ‘fascist’ and ‘theocrat’ to tar their opponents, then that is contemptible.

Finally, Pat Michaels reminds us just how biased, venal, and opportunistic scientists can be:

Two recent events underscore how predictable is the distortion of global warming by those who gain from exaggeration. The events were the Montreal “Conference of the Parties” which had signed the United Nations’ Kyoto Protocol on global warming, and the fall meeting of the American Geophysical Union (AGU) in San Francisco. Both took place in early December.

The sheer volume of hype was impressive. Following are the headlines, along with the sources, generated on the afternoon of December 7, first from the Montreal UN conference. (University news sources are those that were eventually picked up in other stories). These were obtained from Google’s news search page.

•Global warming to halt ocean circulation (University of Illinois)

•Warming trend adds to hazard of Arctic trek (Salem OR News)

•Pacific islanders move to escape global warming (Reuters)

•Tuvalu: That sinking feeling (PBS)

•World weather disasters spell record losses in 2005 (Malaysia Star)

•Arctic peoples urge UN aid to protect cultures (Reuters)

•Threatened by warming, Arctic people file suit against US (AFP)

Next, from San Francisco:

•Ozone layer may take a decade longer to recover (New York Times)

•Earth is all out of new farmland (London Guardian)

•Forests could worsen global warming (UPI)

•Warming could free far more carbon from high arctic soil than earlier thought (University of Washington)

•Rain will take greater toll on reindeer, climate change model shows (University of Washington)

•Methane’s impacts on climate change may be twice previous estimates (NASA)

•Average temperatures climbing faster than thought in North America (Oregon State University)

How can things be so bad? . . .

Scientists compete with each other for finite resources, just like bankers and corporations. In this case, successful competitors are those who are rewarded by their universities or institutions. In all science, this means publishing research articles in the refereed scientific literature. That research costs tremendous amounts of money and there really is only one provider: Uncle Sam (i.e. you and me).

No one gets much of this pie by claiming that his or her issue may, in fact, be no big deal. Instead, any issue – take global warming, acid rain, and obesity as examples, must be portrayed in the starkest of terms. Everything is a crisis, and all the crises are competing with each other.

Similar logic applies in the policy arena. Remember that the job of policymakers is precisely that: to make policy, which does not get made unless whatever policy there might be is “absolutely necessary” to avoid certain doom.

Then, finally, what gets played on TV and in the papers? More crises. Near-death experiences sell newspapers and attract viewers. Those who question this need only look at ratings for The Weather Channel. Some people may remember that it used to be the station where you turned to for round-the-clock national and local weather. The ratings were in the tank.

Now, in prime time, you are more likely to see the twentieth re-run of how this tornado went over that house and how everyone almost died, usually with some pretty snappy home video. Or, just to get your attention for sure, a re-enactment of the sinking of an oil rig in a howling cyclone — re-enacted because everyone on board drowned. Ratings have boomed.

Perhaps it is dismaying that science has become as blatantly biased in the direction of tragedy as television. But, given the way we fund and reward science and scientists, it was inevitable, and global warming is only one of many of science’s predictable distortions.

In sum, many (most?) of today’s scientists adhere to a flawed scientific framework. And, even by the standards of that framework, many of today’s scientists are nothing more than charlatans.

Related posts:

Climatology
Global Warming: Realities and Benefits
Words of Caution for the Cautious
Scientists in a Snit
Another Blow to Climatology?
Bad News for Politically Correct Science
Another Blow to Chicken-Little Science
Same Old Story, Same Old Song and Dance
Bad News for Enviro-nuts
Going Too Far with the First Amendment
Atheism, Religion, and Science
The Limits of Science
Three Perspectives on Life: A Parable
Beware of Irrational Atheism
The Hockey Stick Is Broken
The Creation Model
The Thing about Science
Religion and Personal Responsibility
Science in Politics, Politics in Science
Global Warming and Life
Evolution and Religion
Speaking of Religion…
Words of Caution for Scientific Dogmatists
Science, Evolution, Religion, and Liberty
Hurricanes and Global Warming
The Legality of Teaching Intelligent Design
Global Warming and the Liberal Agenda
Science, Logic, and God
A Dissonant Vision

Mister Hockey

Wayne (The Great One) Gretzky holds the all-time goal-scoring record for major-league hockey:

  • 894 goals in 1,487 regular-season games in the National Hockey League (1979-80 season through 1998-99 season), for an average of 0.601 goals per game
  • Another 46 regular-season goals in the 80 games he played in the World Hockey Association (1977-78 and 1978-79 seasons)
  • A total of 940 goals in 1,567 games, or 0.600 goals per game.

The raw numbers suggest that Gretzky far surpassed Gordie (Mr. Hockey) Howe, who finished his much longer career with the following numbers:

  • 801 regular-season goals in 1,767 NHL games (“only” 0.453 per goals per game), in an NHL career that spanned the seasons from 1946-47 through 1970-71 and 1979-80
  • Another 143 goals and 349 games in the WHA, from 1973-74 through 1978-79
  • A total of 944 goals in 2,116 games, or 0.446 goals per game.

That makes Gretzky the greater goal scorer, eh? Not so fast. Comparing Gretzky’s raw numbers with those of Howe is like comparing Pete Rose’s total base hits (4,256) with Ty Cobb’s (4,191), without mentioning that Rose compiled his hits in far more at-bats (14,053) than Cobb (11,429). Thus Cobb’s lifetime average of .367 far surpasses Rose’s average of .303. Moreover, Cobb compiled his higher average in an era when batting averages were generally lower than they were in Rose’s era.

Similarly, Howe scored most of his goals in an era when the average team scored between 2.5 and 3 goals a game, whereas Gretzky scored most of his goals in an era when the average team scored between 3.5 and 4 goals a game. The right way to compare Gretzky and Howe’s goal-scoring prowess is to compare the number of goals they scored in each season to the average output of a team in that season. This following graph does just that.


Sources: Howe’s season-by-season statistics, here; Gretzky’s season-by-season statistics, here; NHL season-by-season team statistics, beginning here; WHA season-by-season team statistics, here.

Gretzky got off to a faster start than Howe, but Howe has the better record from age 24 onward. Gretzky played 20 NHL seasons, the first ending when he was 19 years old and the last ending when he was 38 years old. Over the comparable 20-season span, Howe scored 5 percent more adjusted goals than did Gretzky. Moreover:

  • Howe’s adjusted-goal total for his NHL career (26 seasons) exceeds Gretzky’s by 30 percent.*
  • Howe’s adjusted-goal total for his entire NHL-WHA career (32 seasons) exceeds Gretzky’s (21 seasons**) by 43 percent.

Gordie Howe is not only Mister Hockey, he is also Mister Goal Scorer. “No doot aboot it.”
____________
* This writer, whose method is more complex than mine, gives Howe a 21-percent advantage over Gretzky for their respective NHL careers.

** I have omitted from these calculations Gretzky’s 3 goals in 8 games at the end of the 1978-79 WHA season.

Life’s Lessons

Judge Alito speaks for me. This is from his opening statement before the Senate Judiciary Committee, on January 9, 2006 (italicized words inserted by me):

I am who I am, in the first place, because of my parents and because of the things that they taught me.

And I know from my own experience as a parent that parents probably teach most powerfully not through their words but through their deeds. (As is obvious in the case of Senator Kennedy.) And my parents taught me through the stories of their lives. And I don’t take any credit for the things that they did or the things that they experienced, but they made a great impression on me.

My father was brought to this country as an infant. He lost his mother as a teenager young boy. He grew up in poverty. . . .

After he graduated from college in 1935, He dropped out of school after the eighth grade in the midst of the Depression, he found that teaching jobs for Italian-Americans were not easy to come by and he had to find other work for a while.

But eventually he became a teacher and he served in the Pacific during World War II skilled craftsman. And he worked, as has been mentioned, for many years at his trade in a nonpartisan position for the New Jersey legislature, which was an institution that he revered and gained the respect of his co-workers and customers.

His story is a story that is typical of a lot of Americans both back in his day and today. And it is a story, as far as I can see it, about the opportunities that our country offers, and also about the need for fairness and about hard work and perseverance. . . . My father never expected nor received a handout. He took it as his responsibility to support himself and his family, and he succeeded because he didn’t let his his poverty or lack of education stand in his way. . . .

I got here in part because of the community in which I grew up. It was a warm, but definitely an unpretentious, down-to-earth community. Most of the adults in the neighborhood were not college graduates. I attended the public schools. In my spare time, I played baseball and other sports with my friends.

And I have happy memories and strong memories of those days and good memories of the good sense and the decency of my friends and my neighbors.

And after I graduated from high school, I went only a full 12 100 miles down the road, but really to a different world when I entered Princeton a Big-Ten University. . . .

And this was a time of great intellectual excitement for me. Both College and law school opened up new worlds of ideas. But this was back in the late 1950s 1960s and early 1970s 1960s.

It was a few years before a time of turmoil at colleges and universities. But, even though I was then opposed to the war in Vietnam, I was appalled when And I saw some very smart people and very privileged people behaving irresponsibly. And I couldn’t help making a contrast between some of the worst of what I saw happening then on the campuses (and now in the behavior of Senators Kennedy, Schumer, et al.) and the good sense and the decency of the people back in my own community.

Words for the Unwise

Those who are trying to dismantle our defenses should read this:

Reliapundit links to a report which he says can be considered circumstantial proof that the NY Times, in leaking the NSA wiretapping program, has tipped off terrorists and thus made our job more difficult. Seems disposable phones are selling like hotcakes in certain quarters. They’re tough to trace. . . .

Maybe some Americans forget what 9/11 was like. It’s easy to do; we don’t like to dwell on what is sad and tragic, and we don’t like to feel insecure. And perhaps because our president and his team HAVE managed to keep us safe, HAVE managed to prevent another attack on our soil, using these (what the left would call) “impeachable” tactics, perhaps we are feeling a little too safe, a little over-confident. That must be true for some, particularly many Democrats, who would like to “kill the Patriot act,” as Sen. Harry Reid crowed, or leak every covert measure we are taking, (hello, New York Times, hello James Risen) or who seem to wish to tie the hands of the government at every turn in the War on Terror.

Feeling pretty safe, are you? Pretty secure? Has 9/11 become a faded memory for you?

I haven’t forgotten. . . .

I remember Tom Brokaw’s voice as the endless loop of a plane slamming into a tower played, “This,” he intoned, gravely, “is war.” . . .

I remember knowing, four years ago, that terrorists were evil and that terrorism needed defeating. I thought we all knew it.

I’m a New Yorker, and if it happens again in New York, I will hold these “pure, patriotically motivated” leakers (yes, they’re leakers) responsible, because they allowed their hate to take them too far.

I will wonder how Harry Reid and the NY Times and the leakers and “anonymous sources” they have lionized can live with all the blood on their hands, even as they (predictably) immediately blame the White House for not “connecting the dots.”

If it happens anywhere in America, (or, really, anywhere else) I will look toward the NY Times and the rest of the “pure, patriotically motivated” press and leftists, because they will have, by their actions and their rhetoric, enabled terrorists to move forward where they had perhaps formerly been stalled. By making the job of surveillance and information-sharing more difficult (drop the Patriot Act and Jamie Gorelick’s wall snaps back in place) and the terrorist’s job easier, they will have participated in something deadly – all because they wanted to “get” the president and keep him from succeeding – which means keep America from succeeding – which means keep the world from progressing away from the scourge of terrorism.

If it happens again, if after we’ve been safe for nearly 5 years only to find – after these “noble” leaks – that we are safe no longer, I will know where to look. Most Americans will know where to look.

I know right where to look.

Related posts:

Getting It Wrong: Civil Libertarians and the War on Terror (A Case Study) (05/18/04)
The Illogic of Knee-Jerk Privacy Adocates (10/06/04)
Treasonous Blogging? (03/05/05)
Absolutism (03/25/05)
Shall We All Hang Separately? (08/13/05)
Foxhole Rats (08/14/05)
Treasonous Speech? (08/18/05)
Foxhole Rats, Redux (08/22/05)
September 11: A Remembrance (09/11/05)
The Faces of Appeasement (11/19/05)
Give Me Liberty or Give Me Non-Aggression? (12/08/05)
We Have Met the Enemy . . . (12/13/05)
Whose Liberties Are We Fighting For? (12/16/05)
Prof. Bainbridge and the War on Terror (12/17/05)
The Constitution and Warrantless “Eavesdropping” (12/21/05)
NSA “Eavesdropping”: The Last Word (from Me) (12/28/05)
Privacy, Security, and Electronic Surveillance (01/06/06)
Privacy: Variations on the Theme of Liberty (01/11/06)
Worth Repeating (01/13/06)

Economics: The "Democrat" Science

From “AEA [American Economics Association] Ideology,” by William A. McEachern (Econ Journal Watch, January 2006):

One way of summarizing the findings is by showing those populations with no Republican contributors, those populations with one Republican contributor, and those populations with two Republican contributors, as is done in Tables 1, 2, and 3. . . . Among the entire eligible set listed in the three tables, the overall tally is 182 Democrat contributors to 10 Republican contributors [among advisory board members, officers, editors, and contributors to the American Economic Review, AER Papers & Proceedings, Journal of Economic Literature, and Journal of Economic Perspectives]. Democrat contributors filled 182 of a possible 1,583 slots, or 11.5 percent. Republican contributors filled 10, or 0.6 percent. . . .

For the 2,000 AEA member sample, the ratio of Democrat-to-Republican donors was 5.1 to 1. . . .

What’s the harm of having extremely high Democrat-to-Republican contribution ratios among those involved with AEA publications, especially among the discretionary journals? The Association recognized the possible harm more than 80 years ago when the Certificate of Incorporation called for “perfect freedom of economic discussion.” Recall that campaign contributors are also more likely to be politically engaged in other ways. We should not expect editors, referees, authors, reviewers, and acknowledgees who have contributed to campaigns to just turn off that mindset in their dealings with the Association’s publications.

As an example of possible harm of a lopsided political representation, consider the absence of a Republican contributor among the 247 book reviewers with U.S. affiliations appearing in the Journal of Economic Literature in 2003 and 2004. A JEL review will likely be the most visible, if not the only, review some books will ever receive. Couldn’t the same political sensibilities that motivated a reviewer to contribute to Democrats also shape his or her assessment of a book? . . .

But loading the dice, however unintentionally, with 20 Democrat contributors and no Republican contributors seems unfair to some authors and unhealthy for the profession. . . .

Mark Bauerlein, a professor of English at Emory University and research director at the National Endowment for the Arts, has argued that:

Any political position that dominates an institution without dissent deteriorates into smugness, complacency and blandness. . . . Groupthink is an anti-intellectual condition, ironically seductive in that the more one feels at ease with compatriots, the more one’s mind narrows (2004). . . .

. . . The AEA claims to be the “organ of no party.” That is, of course, true de jure, but contributor ratios that favor Democrats 9.5 to 1 among regular AER authors and 38 to 1 among authors in remaining publications at least raise a question whether the Association is de facto an “organ of no party.”

Thus, we read this, by noted economist William J. Baumol (also from Econ Journal Watch, January 2006):

There are, actually, at least two very good reasons why the entrepreneur is virtually never mentioned in modern theory of the firm and distribution. The first is that innovation is an entirely heterogeneous output. Production of whatever was an invention yesterday is mere repetition today. So that entrepreneurial activities do not incorporate the homogeneous elements that lend themselves to formal mathematical description, let alone the formal optimization analysis that is the foundation of the bulk of micro theory.

The more critical explanation of the absence of the entrepreneur is that in mainstream economics the theory is generally composed of equilibrium models in which structurally nothing is changing. Equilibrium models exclude the entrepreneur by their very nature. . . .

That’s true, as far as it goes. But Baumol goes on to say this:

My conclusion is not that the neoclassical theory is wrong in excluding the entrepreneur, for it is dealing with subjects for which she is irrelevant. But that does not mean that no theory of entrepreneurship is needed. . . . It would, in my view, be as indefensible to require all micro writing to give pride of place to the entrepreneur as to exclude him universally. . . .

But universal exclusion condemns us to leave out of our discussions what I consider to be the most critical issues that should be examined (though not exclusively) in microeconomic terms: the determinants of innovation and growth and the means by which they can be preserved and stimulated. . . . Why have the relatively free-market economies in the past two centuries been able to outstrip, probably by more than an order of magnitude, the performance in terms of growth and innovation, of all other forms of economic organization? The answer is not merely matter of pandering to what Veblen called the economic researcher’s idle curiosity. Rather it is the missing underpinning for growth policy in both the developed and the developing world.

A somewhat less “Democrat” profession would try harder to account for entrepreneurship, without which economic growth would be impossible.

Tidbits

Does this signal a return to Lochnerian due process?

This week, the Seventh Circuit Court of Appeals gave labor groups and their political cronies in Illinois a good, swift kick in their collective behinds.In 520 South Michigan Ave. Assoc., Ltd. v. Devine, the court reversed the district court’s dismissal of an employer’s challenge to an amendment to an Illinois law prohibiting the use of temporary workers during a strike. . . .

Illinois law makes it a crime to employ “professional strikebreakers.” A few years ago, the state broadened this prohibition to criminalize the hiring of day laborers and temporary staff during strikes. After the amendment was enacted, the plaintiff, who was in the midst of a strike and facing probing inquiries from the local Illinois states attorney for Cook County, sought a declaratory judgment that the Strikebreakers Act is preempted by federal law. The district court found that the employer lacked standing, but the Seventh Circuit disagreed and remanded the case for decision on the merits.

Rather than stop there, the Seventh Circuit then launched into a biting critique of the constitutionality of the amendment. According to the court, the Strikebreakers Act places an impermissible limit on the employer’s use of an economic tactic that is protected by federal law. . . . (From Lou Michels at Suits in the Workplace)

Escape from D.C. In which economist (and Englishman) Tim Harford writes of his impending reassignment from D.C. to London:

There’s another point to consider [in favor of taking the London assignment]. Even living in Hackney I would be less than an hour away from the shopping and the arts of one of the world’s great cities. To get quickly from DC to the heart of one of the world’s great cities requires a helicopter trip to Manhattan.

Last, and certainly least, is this bit of wisdom from a constitutional scholar très manqué:

I am dismayed that Judge Samuel Alito is receiving any consideration for such an important post as Supreme Court justice. His known views are extremely partisan, reactionary and contrary to the provisions of the Constitution and the wishes of the majority of the American people.

Karen Price
Austin

Contrary to which “provisions” of the Constitution, the one that guarantees everyone a free lunch or the one that says we should lie prostrate before our enemies? And which majority would that be, the one that lies along the Kennedy-Schumer axis?

Worth Repeating

In light of the attention given the “unitary executive theory” during the Alito hearings, I borrow from myself:

The legitimate function of the state is to protect its citizens from predators and parasites, it is not to protect predators and parasites. The critics of aggressive defense like to proclaim their dedication to civil liberties, but their statist agenda in domestic matters betrays their selective dedication to liberty.

There is a balance to be struck between privacy and liberty, but it should not — and need not — be struck in favor of our enemies. The Constitution is, first and foremost, a mutual defense pact, not a suicide pact.

I certainly don’t believe in the extreme version of the unitary executive theory, in which the president is a law unto himself. But (continuing to borrow from myself) I do believe that the president has wide latitude in foreign affairs — which encompasses the defense of the nation. I quote Sai Prakash, who writes about the Constitution’s Executive Vesting Clause (Article II, Section 1, Clause 1) in The Heritage Guide to the Constitution (pp. 179-82):

The [Executive Vesting Clause] . . . accords the President those foreign-affairs authorities not otherwise granted to Congress or shared with the Senate. . . .

The Articles of Confederation lacked an independent chief executive. Instead, the Continental Congress exercised the executive power, appointing and dominating the secretaries of the executive departments. Unfortunately, law execution under the direction of a distracted, plural executive was neighter vigorous nor swift. Congress likewise proved a poor steward of foreign affairs, with American diplomats complaining that Congress could not act with the requisite speed or secrecy. . . .

Resolving to avoid the problems plaguing state and national executives, the Constitution’s makers created an energetic, responsible, and unified executive. . . . The Anti-Federalists well understood the Framers’ design and criticized the unitary executive [but they lost the argument: ED] . . . .

. . . [T]he delegates [to the Constitutional Convention] spoke of the President’s principal foreign-affairs role, oftentimes referring to the Senate’s role in treaty-making as a limited exception to the grant of foreign-affairs authority to the President. . . .

. . . [T]raditional rules of statutory interpretation require us to take seriously the differences in phrasing across the three vesting clauses. Artilce I, Section 1 (“All legislative Powers herein granted shall be vested in a Congress of the United States. . . .”) makes clear that it vests no authorities separate from those enumerated in the rest of Article I. In contrast, Article III, Section 1 (“The judicial Power of the United States, shall be vested in one supreme Court, and in such inferior Courts as the Congress may . . . establish.”) clearly vests the federal courts with judicial authority. The Executive Vesting Clause reads like its Article III counterpart, in sharp contrast to the Article I introductory clause. . . .

In a case touching upon foreign affairs, the judiciary has recently reaffired that the executive power grants foreign-affairs authority to the President. See American Insurance Ass’n v. Garamendi (2003). This marks a departure from prior case law, which had grounded the executive’s foreign-affairs powers not in any constitutional text, but in necessity and sovereignty. See United States v. Curtiss-Wright Export Corp. (1936).

John Yoo and James C. Ho, writing in the same volume about the president’s role as commander in chief (pp. 195-8), have this to say:

. . .[S]ome originalist scholars have concluded that Congress’s war power is limited to its control over funding and its power to impeach executive officers. They contend that the President is constitutionally empowered to engage in hostilities with whatever resources Congress has made available to the executive. . . .

In summary, the argument for executive initiative rests on the background understanding that the vesting of “executive Power” and the “Commander in Chief” designation together constitute a substantive grant of authority to the President to conduct military operations.

The Framers intended the executive to be a passive enforcer of laws passed by Congress that bear on domestic affairs (and those laws were to be strictly limited in scope by Article I, Section 8, of the Constitution). At the same time, the Framers intended the executive to defend Americans actively against enemies foreign and domestic. No one has put it more clearly than Justice Felix Frankfurter:

. . . [W]e have had recent occasion to quote approvingly the statement of former Chief Justice Hughes that the war power of the Government is ‘the power to wage war successfully.’ . . . Therefore, the validity of action under the war power must be judged wholly in the context of war. That action is not to be stigmatized as lawless because like action in times of peace would be lawless. To talk about a military order that expresses an allowable judgment of war needs by those entrusted with the duty of conducting war as ‘an unconstitutional order’ is to suffuse a part of the Constitution with an atmosphere of unconstitutionality. The respective spheres of action of military authorities and of judges are of course very different. But within their sphere, military authorities are no more outside the bounds of obedience to the Constitution than are judges within theirs. . . . To recognize that military orders are ‘reasonably expedient military precautions’ in time of war and yet to deny them constitutional legitimacy makes of the Constitution an instrument for dialetic subtleties not reasonably to be attributed to the hard-headed Framers, of whom a majority had had actual participation in war. If a military order such as that under review does not transcend the means appropriate for conducting war, such action . . . is as constitutional as would be any authorized action by the Interstate Commerce Commission within the limits of the constitutional power to regulate commerce.

More from Fringe Watch

Fringe Watch has a third post about the Neo-Conned series of anti-war books, published by John Sharpe (through his IHS Press/Light in the Darkness imprint). The third installment focuses on Derek Holland and Roberto Fiore, noted “extreme nationalists,” and their ties to Sharpe. Some members of the anarcho-libertarian contingent at LewRockwell.com (“anti-state, anti-war, pro-market”) have contributed to and touted the Neo-Conned books (see here, here, and here). That is disturbing, given the provenance of the Neo-Conned series. Here, with permission, is what Fringe Watch has to say about Holland, Fiore, and Sharpe:

John Sharpe’s Ties to Holland and Fiore

In my last post I looked at the anti-Semitic propaganda of John Sharpe, whose IHS Press has published two anti-war books: Neo-Conned and Neo-Conned Again!, which are being heavily promoted in paleo-conservative and paleo-liberterian circles by the uninformed.

My own experience bears directly on this subject. Starting in the 1980s, I became acquainted with the British National Front (NF), the premier “revolutionary nationalist” and racialist movement before its implosion in 1989. Out of that collapse emerged an even more radical outfit called the International Third Position (ITP) headed by Derek Holland and Roberto Fiore.

Both Holland and Fiore have received considerable treatment in works on European extremist nationalism, including Fascism: A History by Roger Eatwell (1997) and Black Sun: Aryan Cults, Esoteric Nazism and the Politics of Identity by Nicholas Goodrick-Clarke (2002).

As Chairman of the NF, and later the ITP’s chief ideologue, Holland exerted a decisive influence. He authored The Political Soldier, which is the Koran of militant nationalists throughout Europe. In many places it invokes the imagery of Muslism fanatics as nationalist “martyrs.” He has been a supporter of radical Arab regimes, visiting Libya in 1988 and Iraq in 1990 (photo and information on the Libyan trip is available online).

Given these credentials it is hardly surprising that Holland should back the Neo-Conned anti-war series as a director of IHS Press. Some people may be misled by the fact that Holland now operates under his Irish Gaelic name, Deric O’Huallachain (having relocated to Ireland from the UK a few years ago). However, earlier copies of the Virginia SCC certificate for IHS Press shows it as Derek Holland.

From the moment that IHS Press was established in 2001, people expressed concern, but were reassured (as was this writer) that Holland had put his extremism “behind him.” Apparently that didn’t stop him from being guest speaker at the February 2002 racial nationalist Nationaldemokratisk Ungdom (NDU) in Sweden. In March of that year the German neo-nazi Deutsche Stimme (German Voice) featured his essay, “Theory and Strategy: The Path of the Political Soldier.” An overnight transition from political radicalism to religious orthodoxy seems improbable. And his activities in Ireland have covered as recently as 2005 in the Brandsma Review.

Roberto Fiore, Holland’s close collaborator, was a member of the political wing of the Armed Revolutionary Nuclei which claimed responsibility for the 1980 Bologna bomb attack which claimed 85 lives. In 1997 Fiore came out of hiding in the UK to head the openly fascist Forza Nuova party in Italy.

What is the link to Neo-Conned? Fiore, as part of the ITP, helped set up the St. George Educational Trust (more here) which is the UK counterpart to, and collaborator with, Sharpe’s pseudo-Catholic Legion of St. Louis.

Privacy: Variations on the Theme of Liberty

This post is an abridgement of the much longer version at Liberty Corner II. The complete version provides much supporting detail that I have omitted here.

I begin by addressing privacy as a right. I then turn to private-sector issues, namely, identity theft and the use of personal information by businesses. In the next substantive portion of this post I address privacy vis-a-vis government, disposing quickly of the national ID card to focus on warrantless “eavesdropping” and data-mining. I then offer a brief summary and conclusion.

IS PRIVACY AN ABSOLUTE RIGHT?

Privacy in the Law

Privacy is one among many values that liberty should serve. An individual’s desire for privacy is as legitimate as a desire for, say, a Lamborghini, a full head of hair, and perpetual youth. Seriously, privacy is a legitimate pursuit, yet (like a Lamborghini) it cannot an absolute right. For — as I have argued elsewhere — if privacy were an absolute right, it would be possible to get away with murder in one’s home simply by committing murder there. In fact, if there are any absolute rights, privacy certainly isn’t one of them. Privacy really is a bargain that individuals strike with the rest of the world. We cannot act in the world without ceding some privacy, so the question is how to decide when the bargain we are being asked to strike is a good one or a bad one, given the benefits and risks of ceding some privacy.

You may now ask: “What about the Constitution, the Bill of Rights, and all of that?” Read the Constitution and Bill of Rights and you will find that there is nothing about privacy in them. The Fourth and Fifth Amendments come closest to being “privacy” amendments, but they’re really about due process of law. The vaunted Ninth Amendment doesn’t protect an unemurated privacy right.

There is neverthess a notion that the Fourteenth Amendment guarantees privacy as a matter of substantive due process. As I have explained, however, substantive due process protects constitutionally guaranteed rights (e.g., liberty of contract). It does not protect imaginary rights, such as the non-existent general right to privacy.

The notion of a general right to privacy is a fairly recent invention of the Supreme Court. It was conjured to serve the Court’s legislative agenda in Griswold v. Connecticut (overturning a Connecticut law that banned the sale of contraceptives) and Roe v. Wade (overturning a Texas anti-abortion law).

There are, of course, federal and State laws that define specific areas of privacy. All such federal and State laws are carve-outs — delineations of specific areas of privacy. They are not general guarantees of privacy. Do we need even more carve-outs to deal with the “privacy crisis”? Let us begin by defining the real privacy problem.

Privacy in the Real World

You may, in spite of what I have just said, think that you have a “right” to privacy. But try that line with prospective creditors, who have a “right” to know enough about you to decide whether to extend credit to you; try that line with banks, which have a “right” to know enough about you so that they can safeguard your savings from impostors; and try that line with the police, who have a “right” (constitutionally) to obtain a warrant to search your home if you are suspected of a crime.

If you want absolute privacy you should not have a job (working for someone else), a credit card, a checking account, a brokerage account, a 401(k), a house, land, a car, a legalized marriage, children who were born in a hospital or educated formally, a formal education of your own, a telephone, an Internet connection, or almost any of the other trappings of what we call civilization. The real issue is the extent to which you are willing to forgo some aspects of privacy in order to work for someone else (other than the Mob), possess a credit card, etc.

PRIVACY ISSUES IN THE PRIVATE SECTOR

Dealing With “Identity Theft”

Let’s be clear about what is being stolen in “identity theft.” An identity thief’s real crime isn’t stealing a person’s identity, it’s using information about that person to steal from that person and/or to steal from others. With that understood, the solution to “identity theft” is straightforward: Fraud is fraud and theft is theft, and they ought to be prosecuted as such.

Moreover, businesses that abet “identity theft” through lax verification and security procedures should be held accountable for their misfeasance.

On to the tougher issue of how to cope with banks, lenders, vendors, and the like.

A Market Solution for Other Private-Sector Issues

So, beyond the obvious penalties for “identity theft” and for misfeasance on the part of businesses that hold personal information, the answer to the private-sector privacy quandary lies . . . in the private sector. The answer, specifically, is the use of what I will call “privacy brokers.” These would be companies that are qualified to explain to an individual his privacy options, and authorized to exercise the individual’s preferences on his behalf. Such firms would be fully knowledgeable of applicable laws and the ins-and-outs of the privacy policies of companies with which an individual might do business. (Bear with me as I explain why I’m not inventing a new and costly middleman.)

How would privacy brokers be paid? If they were paid by businesses, consumers rightly wouldn’t trust them. But how likely is it that consumers will shell out what looks like additional money for a service that, to most consumers, might seem unnecessary? After, in spite of all the personal information that’s afloat in the databases of businesses, credit-card issuers, and credit-rating agencies, relatively few consumers have been defrauded or otherwise compromised.

The answer, of course, is that consumers already are paying for the services of credit-rating agencies through the prices charged by businesses and the interest charged by credit-card issuers. It would be relatively easy for credit-rating agencies to transform themselves into privacy brokers. Privacy brokers would collect all of the information now required by creditors, but they would collect it as consumers’ agents, after duly informing consumers of their options and the risks and benefits of those options. Each consumer would agree to compensate his privacy broker by assigning a share of his credit purchases to the broker. Conveniently enough, the consumer’s creditors would no longer be paying the former credit-rating agency (now a privacy broker) a share of the consumer’s credit purchases for the same information. Thus the consumer would not see any increase in prices or interest charges.

Privacy brokers would compete on the basis of price, service, and reputation. If a privacy broker were to allow its data to be compromised, it would quickly lose customers to existing competitors and new entrants to the privacy-brokerage business. Moreover, privacy brokers — each with tens of millions of clients — would have considerable leverage over businesses’ privacy policies. As a selling point, privacy brokers could use that leverage on the behalf of their clients. Privacy brokers could, for example, negotiate reductions in the amount of personal information that is kept on consumers, ensure that consumers never have to opt-out when it comes to third-party use of personal information, and (most importantly) extract enforceable guarantees about the security of personal information. Those kinds of pro-consumer activities would be fostered by competition among privacy brokers.

PRIVACY VIS-A-VIS GOVERNMENT

Is a National ID Card a Good Idea?

A well-designed ID card might prevent some kinds of “identity theft” if the identifying information embedded in the card could be read only by secure machines and would not be accessible to opportunistic thieves (e.g., unskilled restaurant and department-store employees).

But well-heeled terrorist organizations would find ways to create seemingly legitimate ID cards for their members. And there’s the rub. Possession of a single piece of ID, one that is presumed to be authoritative, would make it easier for terrorists to gain access to vulnerable sites (e.g., passenger aircraft) and to elude investigation by deflecting suspicion.

Uncle Sam already knows (or can know) everything about me. A national ID card wouldn’t make a difference in that respect. But it would make it easier for terrorists to terrorize. The card is therefore a bad idea.

Privacy or Liberty?

It is sometimes necessary for government to intrude on privacy for the sake of liberty. If, for example, the punishment of crime fosters the security of life, limb, and property by deterring yet more crime, then liberty is served by certain types of governmental intrusion on privacy (e.g., searches of private property, questioning of suspects and witnesses, and compulsion of testimony in criminal cases).

Similarly, the defense of the United States (which includes the defense of Americans and American interests abroad), may justify governmental intrusions on privacy. But there must be restraints on governmental intrusion to ensure that no instance of intrusion is broader than required for the accomplishment of a legitimate governmental function. From a libertarian perspective, that rules out any governmental intrusion of privacy which isn’t aimed at promoting justice or defending citizens and their property.

Thus, for example, government is improperly intrusive when it issues a census questionnaire that asks for more information than is necesary to enumerate the population. By contrast, government is properly vigilant when it engages in clandestine surveillance that is warranted by a known threat to the life and limb of Americans (e.g., the continuing threat from al Qaeda).

Those who reflexively oppose certain provisions of the Patriot Act (e.g., the issuance of national security letters for library reading lists) and those who bemoan NSA intercepts of international communications want privacy to take precedence over other manifestations of liberty. As I wrote here, “There can be no absolute liberties where life is at stake. Without life, liberty is meaningless.”

It is clear that it is fully within the president’s constitutional authority to order electronic surveillance of communications between persons in the U.S. and persons overseas. It is especially clear that such surveillance is legitimate because of its war-related purpose.

The Framers intended the executive to be a passive enforcer of laws passed by Congress that bear on domestic affairs (and those laws were to be strictly limited in scope by Article I, Section 8, of the Constitution). At the same time, the Framers intended the executive to defend Americans actively against enemies foreign and domestic. No one has put it more clearly than Justice Felix Frankfurter:

. . . [W]e have had recent occasion to quote approvingly the statement of former Chief Justice Hughes that the war power of the Government is ‘the power to wage war successfully.’ . . . Therefore, the validity of action under the war power must be judged wholly in the context of war. That action is not to be stigmatized as lawless because like action in times of peace would be lawless. To talk about a military order that expresses an allowable judgment of war needs by those entrusted with the duty of conducting war as ‘an unconstitutional order’ is to suffuse a part of the Constitution with an atmosphere of unconstitutionality. The respective spheres of action of military authorities and of judges are of course very different. But within their sphere, military authorities are no more outside the bounds of obedience to the Constitution than are judges within theirs. . . . To recognize that military orders are ‘reasonably expedient military precautions’ in time of war and yet to deny them constitutional legitimacy makes of the Constitution an instrument for dialetic subtleties not reasonably to be attributed to the hard-headed Framers, of whom a majority had had actual participation in war. If a military order such as that under review does not transcend the means appropriate for conducting war, such action . . . is as constitutional as would be any authorized action by the Interstate Commerce Commission within the limits of the constitutional power to regulate commerce.

To get down to cases — the case of NSA surveillance, in particular — Tom Smith of The Right Coast has this to say:

. . . [I]t strikes me as just wrong, and very counter-intuitive, to think of the Fourth Amendment as limiting the President’s Article II wartime powers at all. If this were the case, it would mean something like the President’s powers to wage war against those US citizens who had decided to fight for the enemy, had to be conducted within something like the proscriptions of constitutional criminal procedure. Surely, that can’t be right. This is not to say the President’s Article II powers are unlimited. That is what, I take it, the Youngstown Steel case is about. But if FISA really does subject Article II wartime powers to the procedural rigamarole in FISA, then it would be unconstitutional. . . . So where that leaves us, it seems to me, is fairly clear. The President did not violate FISA, as that statute has been interpreted by the highest court other than the Supreme Court that has has the power to interpret it, and indeed specializes in interpreting it, so presumably is due some deference for that, and thus, for the President’s action to be illegal, it would have to have exceeded his Article II powers. . . . While it is logically possible that the NSA program exceeded the Article II powers, it strikes me as a very implausible claim. We are not talking here about nationalizing the steel industry, or interring all Muslims or something of that sort. We are talking about data-mining calls and emails which have an elevated probability of being connected to terrorism, because they are within a network anchored by phone numbers or email addresses found in al Qaeda phones or computers, or because of charateristics of the calls or emails. If anyone thinks . . . that doing that is outside the President’s Article II powers, they have a ludicrously narrow conception of those powers, a conception simply inconsistent with the President’s discharge of his duty to prevent future catastrophic terrorist attacks on the people of the United States. That alone suggests it is an incorrect conception of those powers, a fact even the Supreme Court is likely to notice.

What we see in the dispute about such things as the Patriot Act and NSA surveillance is a failure to distinguish between the free exercise of liberty, on the one hand, and the necessary exercise of governmental power to preserve liberty, on the other hand. That failure is unwitting — but nonetheless dangerous — when it emanates from persons who simply have no understanding of the Constitution or who wish to live in a dream-world in which government simply cannot encroach upon their privacy for any reason. That failure is entirely witting — and essentially subversive — when it emanates from persons who simply wish to twist the meaning of the Constitution so that it serves their anti-libertarian agenda: statism at home and surrender abroad.

What About Government Data-Mining?

There is, nevertheless, a real threat that surveillance could lead to the creation of massive databases that could be misused by government officials. It is one thing to create databases that enable law-enforcement officials to detect and avert attacks on Americans and Americans’ interests, at home and abroad. It is quite another thing to create and use such databases for the purpose, say, of anticipating or imagining criminal conspiracies.

How, then, is it possible to protect Americans from acts of war, terrorism, insurrection, or rebellion without subjecting them to the very real danger of overreaching on the part of government officials — who will be tempted to misuse the information to which they have access? We learned — on September 11, 2001 — that it is folly to put a firewall between domestic and foreign intelligence. The firewall must be placed elsewhere; here is how I would construct it and where I would place it:

  • No government agency (including contractors) may collect or store personal information other than that which is gathered pursuant to a specific, constitutionally authorized exercise of authority (e.g., issuing driving licenses, maintaining tax and property records, investigating crimes that have been reported, maintaining records of arrests and convictions, algorithmically surveilling communications for the purpose of detecting possible terrorist activity).
  • The federal government (and only particular units of the federal government, as authorized by law) may collate such information in a database or databases that may be used only for the purposes of detecting conspiracies to commit acts of war, terrorism, insurrection, or rebellion against the United States, a State, or the citizens of the United States or their property.
  • Information gleaned from such a database may be used, without judicial approval, to avert an imminent attack or to respond to an attack.
  • Otherwise, the information gleaned from such a database may be used, with judicial approval, to initiate surveillance of persons or property within the jurisdiction of the United States — and then only for the purpose of preventing acts of war, terrorism, insurrection, or rebellion.
  • Actions against persons or property outside the jurisdiction of the United States must be taken in accordance with the 1973 War Powers Resolution and/or applicable treaties.
  • Information gleaned from such a database may never be used for any purpose other than the prevention of or response to acts of war, terrorism, insurrection, or rebellion against the United States, a State, or the citizens of the United States or their property.

Details would be supplied by statute. Compliance would be monitored by a commission; the president, Congress (by concurrent resolution), and the chief justice of the United States each would appoint one-third of the commission’s members.

SUMMARY AND CONCLUSION

Privacy is not, never has been, and never should be an absolute right. To make it such would be incompatible with the defense of life, liberty, and property.

With respect to privacy in the private sector, we should remember that a one-size-fits-all regulation has the predictable effect of fitting almost no one and generally forcing buyers and sellers to make inferior choices. Government should protect Americans from force and fraud. Beyond that, it is up to Americans to decide for themselves how much privacy they wish to enjoy in their voluntary transactions. They could do so quite effectively, and at no additional cost, with the help of “privacy brokers” — firms that would do for consumers what they now do for businesses.

Turning to privacy vis-a-vis government, we should remember that government legitimately seeks to protect the lives and property of Americans, so that they can pursue happiness as they see it. Privacy absolutists — those who place privacy above security — endanger us all. They would render us defenseless against very real and potent threats to liberty and the pursuit of happiness. The idea of a national ID card fails because it would create a vulnerability, not because it would threaten privacy in the land of the ubiquitous Social Security number. On the other hand, there is a legitimate place for the surveillance of telecommunications and for data-mining, as long as the use of both is confined to the protection of life, liberty, and property against our enemies. A way of ensuring that surveillance and data-mining are not misused is to establish an oversight commission comprising members of all three branches of the federal government.

The legitimate function of the state is to protect its citizens from predators and parasites, it is not to protect predators and parasites. The critics of aggressive defense like to proclaim their dedication to civil liberties, but their statist agenda in domestic matters betrays their selective dedication to liberty.

There is a balance to be struck between privacy and liberty, but it should not — and need not — be struck in favor of our enemies. The Constitution is, first and foremost, a mutual defense pact, not a suicide pact.

Related collections of posts:
The Constitution: Original Meaning, Subversion, and Remedies
Economics: Principles and Issues
War, Self-Defense, and Civil Liberties

CLICK HERE TO READ THE ENTIRE POST AT LIBERTY CORNER II.

Privacy: Variations on the Theme of Liberty

I have noted elsewhere that the mainstream media seem to have missed an opportunity to declare a “privacy crisis.” Nevertheless, there is in the air (so to speak) a quasi-hysterical view that privacy is the be-all and end-all of existence — above and beyond life, liberty, and the pursuit of happiness. It is past time for a balanced view of privacy. Thus this post.

I begin by addressing privacy as a right. I then turn to private-sector issues, namely, identity theft and the use of personal information by businesses. In the next substantive portion of this post I address privacy vis-a-vis government, disposing quickly of the national ID card to focus on warrantless “eavesdropping” and data-mining. I then offer a brief summary and conclusion.

IS PRIVACY AN ABSOLUTE RIGHT?

Privacy in the Law

Privacy is one among many values that liberty should serve. An individual’s desire for privacy is as legitimate as a desire for, say, a Lamborghini, a full head of hair, and perpetual youth. Seriously, privacy is a legitimate pursuit, yet (like a Lamborghini) it cannot an absolute right. For — as I have argued elsewhere — if privacy were an absolute right, it would be possible to get away with murder in one’s home simply by committing murder there. In fact, if there are any absolute rights, privacy certainly isn’t one of them. Privacy really is a bargain that individuals strike with the rest of the world. We cannot act in the world without ceding some privacy, so the question is how to decide when the bargain we are being asked to strike is a good one or a bad one, given the benefits and risks of ceding some privacy.

You may now ask: “What about the Constitution, the Bill of Rights, and all of that?” Read the Constitution and Bill of Rights and you will find that there is nothing about privacy in them. The Fourth and Fifth Amendments come closest to being “privacy” amendments, but they’re really about due process of law. The vaunted Ninth Amendment doesn’t protect an unemurated privacy right. Rather, as I explained here, in drafting the Ninth Amendment Madison had in mind no particular unenumerated rights:

It is clear from its text and from Madison’s statement [upon presenting the Bill of Rights to the House of Representatives] that the [Ninth] Amendment states but a rule of construction, making clear that a Bill of Rights might not by implication be taken to increase the powers of the national government in areas not enumerated, and that it does not contain within itself any guarantee of a right or a proscription of an infringement.

Thomas McAffee, writing about the Ninth Amendment in The Heritage Guide to the Constitution (pp. 366-71), comes to the same conclusion:

. . . Madison . . . affirmed that the reason for the Ninth Amendment was not to expand the power of the Court to find new rights, but rather to restrict the ability of the Court to expand the legislative powers of Congress. Madison continued to maintain that that was the central meaning of the Ninth Amendment throughout his life, and his interpretation was seconded by most commentators of the time.

There is neverthess a notion that the Fourteenth Amendment guarantees privacy as a matter of substantive due process. As I have explained, however, substantive due process protects constitutionally guaranteed rights (e.g., liberty of contract). It does not protect imaginary rights, such as the non-existent general right to privacy.

The notion of a general right to privacy is a fairly recent invention of the Supreme Court. It was conjured to serve the Court’s legislative agenda in Griswold v. Connecticut (overturning a Connecticut law that banned the sale of contraceptives) and Roe v. Wade (overturning a Texas anti-abortion law). But, as I wrote here,

the Roe v. Wade majority acknowledged that abortion is not even an unenumerated right. It then manufactured from specified procedural rights enumerated in the Bill of Rights — rights which are totally unrelated to abortion — and from strained precedents involving “penumbras” and “emanations,” a general right to privacy in order to find a “privacy” right to abortion. . . .

It is therefore unsurprising that the majority in Roe v. Wade could not decide whether the general privacy right is located in the Ninth Amendment or the Fourteenth Amendment. Neither amendment, of course, is the locus of a general privacy right because none is conferred by the Constitution, nor could the Constitution ever confer such a right, for it would interfere with such truly compelling state interests as the pursuit of justice. The majority simply chose to ignore that unspeakable consequence by conjuring a general right to privacy for the limited purpose of ratifying abortion.

The spuriousness of the majority’s conclusion is evident in its flinching from the logical end of its reasoning: abortion anywhere at anytime. Instead, the majority delivered this:

The privacy right involved, therefore, cannot be said to be absolute. . . . We, therefore, conclude that the right of personal privacy includes the abortion decision, but that this right is not unqualified and must be considered against important state interests in regulation.

And so, the Court brought us right back to where we were in the beginning — without a general or absolute right to privacy.

There are, of course, federal and State laws that define specific areas of privacy. At the federal level, for example, there is the Medical Information Privacy and Security Act (MIPSA). As described by Wikipedia, MIPSA

contains important provisions requiring accesses to generate an audit trail, and for patients to be able to partition their data so that for example genetic information is not revealed when they go for a flu jab. Individuals have a right to access, copy, edit and augment their information.

Wikipedia summarizes State law thusly:

Most states in the U.S. grant a right to privacy and recognise four torts:

  1. Intrusion upon seclusion or solitude, or into private affairs;
  2. Public disclosure of embarrassing private facts;
  3. Publicity which places a person in a false light in the public eye; and
  4. Appropriation of name or likeness.

All such federal and State laws are carve-outs — delineations of specific areas of privacy. They are not general guarantees of privacy. Do we need even more carve-outs to deal with the “privacy crisis”? Let us begin by defining the real privacy problem.

Privacy in the Real World

You may, in spite of what I have just said, think that you have a “right” to privacy. But try that line with prospective creditors, who have a “right” to know enough about you to decide whether to extend credit to you; try that line with banks, which have a “right” to know enough about you so that they can safeguard your savings from impostors; and try that line with the police, who have a “right” (constitutionally) to obtain a warrant to search your home if you are suspected of a crime.

If you want absolute privacy you should not have a job (working for someone else), a credit card, a checking account, a brokerage account, a 401(k), a house, land, a car, a legalized marriage, children who were born in a hospital or educated formally, a formal education of your own, a telephone, an Internet connection, or almost any of the other trappings of what we call civilization. The real issue is the extent to which you are willing to forgo some aspects of privacy in order to work for someone else (other than the Mob), possess a credit card, etc.

Given that privacy is neither an absolute right nor something that many of us choose to purchase by forgoing the trappings of civilization, let’s consider what we really seek when we claim to seek privacy. Suppose that, unknown to you, someone gathers information about you that you had not intended to disclose. You have suffered no harm unless the gathering of such information

  • enables a person, business, or government to manipulate your behavior by presenting information or options in ways calculated to lead you to certain decisions (e.g., see my posts about “libertarian paternalism” here, here, here, and here)
  • causes unsubstantiated harm to your reputation
  • results in blackmail or the theft of your property
  • results in the imposition of a civil or criminal penalty for an act or acts that you did not commit.

Beyond that, there is no reason to give special preference to privacy over other considerations; for example, a lender’s need for information about your credit-worthiness, government’s legitimate interest in protecting citizens from terrorism.

PRIVACY ISSUES IN THE PRIVATE SECTOR

Dealing With “Identity Theft”

Let’s be clear about what is being stolen in “identity theft.” An identity thief’s real crime isn’t stealing a person’s identity, it’s using information about that person to steal from that person and/or to steal from others. With that understood, the solution to “identity theft” is straightforward: Fraud is fraud and theft is theft, and they ought to be prosecuted as such.

Moreover, businesses that abet “identity theft” through lax verification and security procedures should be held accountable for their misfeasance.

On to the tougher issue of how to cope with banks, lenders, vendors, and the like.

A Market Solution for Other Private-Sector Issues

Should there be restrictions on the scope of personal information that private data aggregators are allowed to gather? If so, how should those restrictions should be enforced? One option is individual choice, in which each person picks the set of privacy bargains that suits his or her taste for privacy, on the one hand, and ease of transacting business, on the other hand. The other option is for government to establish one-size-fits-all rules — even beyond those it already has laid down — such as a ban on the use of universal identification numbers (e.g., Social Security numbers) by banks, credit agencies, insurers, and the like.

The problem with one-size-fits-all rules — especially one as sweeping as a ban on the use of universal ID numbers — is that they make it harder and more expensive for consumers to transact business. A consumer’s credit rating, which now follows him wherever he goes, thanks (or no thanks) mainly to his Social Security number, is (for almost all consumers) a boon, not a bane. Without the SSN or some other universal identifier, we would revert the days of local and regional credit-rating agencies. The higher cost of verifying a purchasers’ credit would, of course, reduce the volume of transactions and lead to higher prices. Small businesses would be especially hard-hit.

So, beyond the obvious penalties for “identity theft” and for misfeasance on the part of businesses that hold personal information, the answer to the private-sector privacy quandary lies . . . in the private sector. The answer, specifically, is the use of what I will call “privacy brokers.” These would be companies that are qualified to explain to an individual his privacy options, and authorized to exercise the individual’s preferences on his behalf. Such firms would be fully knowledgeable of applicable laws and the ins-and-outs of the privacy policies of companies with which an individual might do business. (Bear with me as I explain why I’m not inventing a new and costly middleman.)

How would privacy brokers be paid? If they were paid by businesses, consumers rightly wouldn’t trust them. But how likely is it that consumers will shell out what looks like additional money for a service that, to most consumers, might seem unnecessary? After, in spite of all the personal information that’s afloat in the databases of businesses, credit-card issuers, and credit-rating agencies, relatively few consumers have been defrauded or otherwise compromised.

The answer, of course, is that consumers already are paying for the services of credit-rating agencies through the prices charged by businesses and the interest charged by credit-card issuers. It would be relatively easy for credit-rating agencies to transform themselves into privacy brokers. Privacy brokers would collect all of the information now required by creditors, but they would collect it as consumers’ agents, after duly informing consumers of their options and the risks and benefits of those options. Each consumer would agree to compensate his privacy broker by assigning a share of his credit purchases to the broker. Conveniently enough, the consumer’s creditors would no longer be paying the former credit-rating agency (now a privacy broker) a share of the consumer’s credit purchases for the same information. Thus the consumer would not see any increase in prices or interest charges.

Privacy brokers would compete on the basis of price, service, and reputation. If a privacy broker were to allow its data to be compromised, it would quickly lose customers to existing competitors and new entrants to the privacy-brokerage business. Moreover, privacy brokers — each with tens of millions of clients — would have considerable leverage over businesses’ privacy policies. As a selling point, privacy brokers could use that leverage on the behalf of their clients. Privacy brokers could, for example, negotiate reductions in the amount of personal information that is kept on consumers, ensure that consumers never have to opt-out when it comes to third-party use of personal information, and (most importantly) extract enforceable guarantees about the security of personal information. Those kinds of pro-consumer activities would be fostered by competition among privacy brokers.

My bottom line here is that there is an effective, efficient market answer to concerns about securing privacy vis-a-vis the private sector. But the private sector must act before Congress imposes an inefficient, one-size-fits-all, “solution” on us. There is still time to act, according to a story in Wired News (November 10), which says that “Congress is unlikely to pass any data-security bills by the end of the year, according to Hill watchers.”

PRIVACY VIS-A-VIS GOVERNMENT

Is a National ID Card a Good Idea?

A national ID card would be a good idea if its use would decrease the likelihood of terrorism, but it wouldn’t– as I will explain.

I have no objection to carrying an ID card. I already carry several, the possession of which by another person would give that person access to just about anything he might want to know about me: my date of birth, SSN, health history, driving record, criminal record (zilch, sorry), and so on.

A well-designed ID card might even prevent some kinds of “identity theft” if the identifying information embedded in the card could be read only by secure machines and would not be accessible to opportunistic thieves (e.g., unskilled restaurant and department-store employees).

But well-heeled terrorist organizations would find ways to create seemingly legitimate ID cards for their members. And there’s the rub. Possession of a single piece of ID, one that is presumed to be authoritative, would make it easier for terrorists to gain access to vulnerable sites (e.g., passenger aircraft) and to elude investigation by deflecting suspicion.

Uncle Sam already knows (or can know) everything about me. A national ID card wouldn’t make a difference in that respect. But it would make it easier for terrorists to terrorize. The card is therefore a bad idea.

Privacy or Liberty?

It is sometimes necessary for government to intrude on privacy for the sake of liberty. If, for example, the punishment of crime fosters the security of life, limb, and property by deterring yet more crime, then liberty is served by certain types of governmental intrusion on privacy (e.g., searches of private property, questioning of suspects and witnesses, and compulsion of testimony in criminal cases).

Similarly, the defense of the United States (which includes the defense of Americans and American interests abroad), may justify governmental intrusions on privacy. But there must be restraints on governmental intrusion to ensure that no instance of intrusion is broader than required for the accomplishment of a legitimate governmental function. From a libertarian perspective, that rules out any governmental intrusion of privacy which isn’t aimed at promoting justice or defending citizens and their property.

Thus, for example, government is improperly intrusive when it issues a census questionnaire that asks for more information than is necesary to enumerate the population. By contrast, government is properly vigilant when it engages in clandestine surveillance that is warranted by a known threat to the life and limb of Americans (e.g., the continuing threat from al Qaeda).

Those who reflexively oppose certain provisions of the Patriot Act (e.g., the issuance of national security letters for library reading lists) and those who bemoan NSA intercepts of international communications want privacy to take precedence over other manifestations of liberty. As I wrote here, “There can be no absolute liberties where life is at stake. Without life, liberty is meaningless.” The Framers of the Constitution recognized that principle:

. . . When the Fourth Amendment was written, the sole remedy for an illegal search or seizure was a lawsuit for money damages. Government officials used warrants as a defense against such lawsuits. Today a warrant seems the police officer’s foe — one more hoop to jump through — but at the time of the Founding it was the constable’s friend, a legal defense against any subsequent claim. Thus it was perfectly reasonable to specify limits on warrants (probable cause, particular description of the places to be search and the things to be seized) but never to require their use. (From the “Warrant Clause,” by Prof. William J. Stuntz of Harvard Law in The Heritage Guide to the Constitution, pp. 326-9.)

Thus, by the original meaning of the Constitution, all warrantless searches may be permissible. But judges and legislators have so changed the meaning of the Constitution that these views have instead become prevalent: government cannot conduct searches without a warrant; warrantless searches are “invasions of privacy” (as if privacy were either constitutionally guaranteed or some sort of “natural right’). Moreover, there is — especially among “civil libertarians,” anti-American Americans, and right-wing loonies — a preference for an undifferentiated right to “privacy” over “the common defence, “to provide for which the Constitution was adopted. Antidotes to such views may be found here:

President had legal authority to OK taps (Chicago Tribune)
Our domestic intelligence crisis (Richard A. Posner)
Many posts by Tom Smith of The Right Coast (start here and scroll up)
Eavesdropping Ins and Outs (Mark R. Levin, writing at National Review Online)
The FISA Act And The Definition Of ‘US Persons’ (Ed Morrissey of Captain’s Quarters)
A Colloquy with the Times (John Hinderaker of Power Line)
September 10 America (editorial at National Review Online)
A Patriot Acts (Ben Stein, writing at The American Spectator)
More on the NSA Wiretaps (Dale Franks of QandO)
The President’s War Power Includes Surveillance (John Eastman, writing at The Remedy)
Warrantless Intelligence Gathering, Redux (UPDATED) (Jeff Goldstein, writing at Protein Wisdom)
FISA Court Obstructionism Since 9/11 (Ed Morrissey of Captain’s Quarters)
FISA vs. the Constitution (Robert F. Turner, writing at OpinionJournal)
Wisdom in Wiretaps (an editorial from OpinionJournal)
Under Clinton, NY Times Called Surveillance a Necessity (William Tate, writing at The American Thinker)
Experts’ Letter on NSA Program (by Tom Smith of The Right Coast)
LEGAL AUTHORITIES SUPPORTING THE ACTIVITIES OF THE
NATIONAL SECURITY AGENCY DESCRIBED BY THE PRESIDENT
(U.S. Department of Justice)
Terrorists on Tap (Victoria Toensing, writing at OpinionJournal)
Letter from Chairman, Senate Intelligence Committee, to Chairman and Ranking Member of Senate Judiciary Committee
Letter from H. Bryan Cunningham to Chairman and Ranking Member of Senate Judiciary Committee
Has The New York Times Violated the Espionage Act? (article in Commentary by Gabriel Schoenfeld)
Point of No Return (Thomas Sowell, writing at RealClearPolitics)
Letter from John C. Eastman to Chairman of House Judiciary Committee
FISA Chief Judge Speaks Out, Bamford Misinforms (a post at The Strata-Sphere)
DoJ Responds to Congressional FISA Questions (another post at The Strata-Sphere)

As for the president’s authority in foreign affairs — which encompasses the defense of the nation — I quote Sai Prakash, who writes about the Constitution’s Executive Vesting Clause (Article II, Section 1, Clause 1) in The Heritage Guide to the Constitution (pp. 179-82):

The [Executive Vesting Clause] . . . accords the President those foreign-affairs authorities not otherwise granted to Congress or shared with the Senate. . . .

The Articles of Confederation lacked an independent chief executive. Instead, the Continental Congress exercised the executive power, appointing and dominating the secretaries of the executive departments. Unfortunately, law execution under the direction of a distracted, plural executive was neighter vigorous nor swift. Congress likewise proved a poor steward of foreign affairs, with American diplomats complaining that Congress could not act with the requisite speed or secrecy. . . .

Resolving to avoid the problems plaguing state and national executives, the Constitution’s makers created an energetic, responsible, and unified executive. . . . The Anti-Federalists well understood the Framers’ design and criticized the unitary executive [but they lost the argument: ED] . . . .

. . . [T]he delegates [to the Constitutional Convention] spoke of the President’s principal foreign-affairs role, oftentimes referring to the Senate’s role in treaty-making as a limited exception to the grant of foreign-affairs authority to the President. . . .

. . . [T]raditional rules of statutory interpretation require us to take seriously the differences in phrasing across the three vesting clauses. Artilce I, Section 1 (“All legislative Powers herein granted shall be vested in a Congress of the United States. . . .”) makes clear that it vests no authorities separate from those enumerated in the rest of Article I. In contrast, Article III, Section 1 (“The judicial Power of the United States, shall be vested in one supreme Court, and in such inferior Courts as the Congress may . . . establish.”) clearly vests the federal courts with judicial authority. The Executive Vesting Clause reads like its Article III counterpart, in sharp contrast to the Article I introductory clause. . . .

In a case touching upon foreign affairs, the judiciary has recently reaffired that the executive power grants foreign-affairs authority to the President. See American Insurance Ass’n v. Garamendi (2003). This marks a departure from prior case law, which had grounded the executive’s foreign-affairs powers not in any constitutional text, but in necessity and sovereignty. See United States v. Curtiss-Wright Export Corp. (1936).

John Yoo and James C. Ho, writing in the same volume about the president’s role as commander in chief (pp. 195-8), have this to say:

. . .[S]ome originalist scholars have concluded that Congress’s war power is limited to its control over funding and its power to impeach executive officers. They contend that the President is constitutionally empowered to engage in hostilities with whatever resources Congress has made available to the executive. . . .

In summary, the argument for executive initiative rests on the background understanding that the vesting of “executive Power” and the “Commander in Chief” designation together constitute a substantive grant of authority to the President to conduct military operations.

It is clear that it is fully within the president’s constitutional authority to order electronic surveillance of communications between persons in the U.S. and persons overseas. It is especially clear that such surveillance is legitimate because of its war-related purpose.

The Framers intended the executive to be a passive enforcer of laws passed by Congress that bear on domestic affairs (and those laws were to be strictly limited in scope by Article I, Section 8, of the Constitution). At the same time, the Framers intended the executive to defend Americans actively against enemies foreign and domestic. No one has put it more clearly than Justice Felix Frankfurter:

. . . [W]e have had recent occasion to quote approvingly the statement of former Chief Justice Hughes that the war power of the Government is ‘the power to wage war successfully.’ . . . Therefore, the validity of action under the war power must be judged wholly in the context of war. That action is not to be stigmatized as lawless because like action in times of peace would be lawless. To talk about a military order that expresses an allowable judgment of war needs by those entrusted with the duty of conducting war as ‘an unconstitutional order’ is to suffuse a part of the Constitution with an atmosphere of unconstitutionality. The respective spheres of action of military authorities and of judges are of course very different. But within their sphere, military authorities are no more outside the bounds of obedience to the Constitution than are judges within theirs. . . . To recognize that military orders are ‘reasonably expedient military precautions’ in time of war and yet to deny them constitutional legitimacy makes of the Constitution an instrument for dialetic subtleties not reasonably to be attributed to the hard-headed Framers, of whom a majority had had actual participation in war. If a military order such as that under review does not transcend the means appropriate for conducting war, such action . . . is as constitutional as would be any authorized action by the Interstate Commerce Commission within the limits of the constitutional power to regulate commerce.

To get down to cases — the case of NSA surveillance, in particular — Tom Smith of The Right Coast has this to say:

. . . [I]t strikes me as just wrong, and very counter-intuitive, to think of the Fourth Amendment as limiting the President’s Article II wartime powers at all. If this were the case, it would mean something like the President’s powers to wage war against those US citizens who had decided to fight for the enemy, had to be conducted within something like the proscriptions of constitutional criminal procedure. Surely, that can’t be right. This is not to say the President’s Article II powers are unlimited. That is what, I take it, the Youngstown Steel case is about. But if FISA really does subject Article II wartime powers to the procedural rigamarole in FISA, then it would be unconstitutional. . . . So where that leaves us, it seems to me, is fairly clear. The President did not violate FISA, as that statute has been interpreted by the highest court other than the Supreme Court that has has the power to interpret it, and indeed specializes in interpreting it, so presumably is due some deference for that, and thus, for the President’s action to be illegal, it would have to have exceeded his Article II powers. . . . While it is logically possible that the NSA program exceeded the Article II powers, it strikes me as a very implausible claim. We are not talking here about nationalizing the steel industry, or interring all Muslims or something of that sort. We are talking about data-mining calls and emails which have an elevated probability of being connected to terrorism, because they are within a network anchored by phone numbers or email addresses found in al Qaeda phones or computers, or because of charateristics of the calls or emails. If anyone thinks . . . that doing that is outside the President’s Article II powers, they have a ludicrously narrow conception of those powers, a conception simply inconsistent with the President’s discharge of his duty to prevent future catastrophic terrorist attacks on the people of the United States. That alone suggests it is an incorrect conception of those powers, a fact even the Supreme Court is likely to notice.

What we see in the dispute about such things as the Patriot Act and NSA surveillance is a failure to distinguish between the free exercise of liberty, on the one hand, and the necessary exercise of governmental power to preserve liberty, on the other hand. That failure is unwitting — but nonetheless dangerous — when it emanates from persons who simply have no understanding of the Constitution or who wish to live in a dream-world in which government simply cannot encroach upon their privacy for any reason. That failure is entirely witting — and essentially subversive — when it emanates from persons who simply wish to twist the meaning of the Constitution so that it serves their anti-libertarian agenda: statism at home and surrender abroad.

What About Government Data-Mining?

There is, nevertheless, a real threat that surveillance could lead to the creation of massive databases that could be misused by government officials. Tom Smith observes that

technology on the data mining front is moving very fast. In fact, the term data mining is too narrow and somewhat dated. For just a taste of one cutting edge approach, check this out. This company takes a semantic network approach to unstructured databases. There are other approaches as well.

What I am getting at is, if the government puts together a huge database — and . . . it is within their capabilities, well within — then with tech from the private sector, not to mention what NSA geniuses come up with, then what they can figure out about individuals, firms, and so on, really does not have any clear limit. It is not at all far fetched to say if the government wanted to, it could know more about people than they know about themselves, a lot more.

There are many questions here. The first is whether the storage of this information violates constitutional protections. I think sentience may make some difference here. If every email you have sent in the last five years is stored in some place the government has access to, but they do not actually access it, then I’m not sure your privacy has been affected at all.

But here is something that worries me, though maybe it shouldn’t. Search algorithms are already astonishingly powerful. They are advancing rapidly. It may be possible soon to pull out from such things as patterns of emails, phone calls, puchases and the like, people likely to be involved in drug trafficing, money laundering, whatever. If an impartial algorithm can troll through a database and produce a list of people who really are, to some high degree of probability, connected with herion trafficking say, should that be enough to support a warrant to start the really intrusive, traditional sort of surveillance?

I have already made clear that I think the President should be able to do exactly this if it is necessary to fight a war. But law enforcement agencies doing it does strike me as pretty creepy. It could be an extremely powerful law enforcement tool, though.

It is one thing to create databases that enable law-enforcement officials to detect and avert attacks on Americans and Americans’ interests, at home and abroad. It is quite another thing to create and use such databases for the purpose, say, of anticipating or imagining criminal conspiracies.

How, then, is it possible to protect Americans from acts of war, terrorism, insurrection, or rebellion without subjecting them to the very real danger of overreaching on the part of government officials — who will be tempted to misuse the information to which they have access? We learned — on September 11, 2001 — that it is folly to put a firewall between domestic and foreign intelligence. The firewall must be placed elsewhere; here is how I would construct it and where I would place it:

  • No government agency (including contractors) may collect or store personal information other than that which is gathered pursuant to a specific, constitutionally authorized exercise of authority (e.g., issuing driving licenses, maintaining tax and property records, investigating crimes that have been reported, maintaining records of arrests and convictions, algorithmically surveilling communications for the purpose of detecting possible terrorist activity).
  • The federal government (and only particular units of the federal government, as authorized by law) may collate such information in a database or databases that may be used only for the purposes of detecting conspiracies to commit acts of war, terrorism, insurrection, or rebellion against the United States, a State, or the citizens of the United States or their property.
  • Information gleaned from such a database may be used, without judicial approval, to avert an imminent attack or to respond to an attack.
  • Otherwise, the information gleaned from such a database may be used, with judicial approval, to initiate surveillance of persons or property within the jurisdiction of the United States — and then only for the purpose of preventing acts of war, terrorism, insurrection, or rebellion.
  • Actions against persons or property outside the jurisdiction of the United States must be taken in accordance with the 1973 War Powers Resolution and/or applicable treaties.
  • Information gleaned from such a database may never be used for any purpose other than the prevention of or response to acts of war, terrorism, insurrection, or rebellion against the United States, a State, or the citizens of the United States or their property.

Details would be supplied by statute. Compliance would be monitored by a commission; the president, Congress (by concurrent resolution), and the chief justice of the United States each would appoint one-third of the commission’s members.

SUMMARY AND CONCLUSION

Privacy is not, never has been, and never should be an absolute right. To make it such would be incompatible with the defense of life, liberty, and property.

With respect to privacy in the private sector, we should remember that a one-size-fits-all regulation has the predictable effect of fitting almost no one and generally forcing buyers and sellers to make inferior choices. Government should protect Americans from force and fraud. Beyond that, it is up to Americans to decide for themselves how much privacy they wish to enjoy in their voluntary transactions. They could do so quite effectively, and at no additional cost, with the help of “privacy brokers” — firms that would do for consumers what they now do for businesses.

Turning to privacy vis-a-vis government, we should remember that government legitimately seeks to protect the lives and property of Americans, so that they can pursue happiness as they see it. Privacy absolutists — those who place privacy above security — endanger us all. They would render us defenseless against very real and potent threats to liberty and the pursuit of happiness. The idea of a national ID card fails because it would create a vulnerability, not because it would threaten privacy in the land of the ubiquitous Social Security number. On the other hand, there is a legitimate place for the surveillance of telecommunications and for data-mining, as long as the use of both is confined to the protection of life, liberty, and property against our enemies. A way of ensuring that surveillance and data-mining are not misused is to establish an oversight commission comprising members of all three branches of the federal government.

The legitimate function of the state is to protect its citizens from predators and parasites, it is not to protect predators and parasites. The critics of aggressive defense like to proclaim their dedication to civil liberties, but their statist agenda in domestic matters betrays their selective dedication to liberty.

There is a balance to be struck between privacy and liberty, but it should not — and need not — be struck in favor of our enemies. The Constitution is, first and foremost, a mutual defense pact, not a suicide pact.

Related collections of posts:
The Constitution: Original Meaning, Subversion, and Remedies
Economics: Principles and Issues
War, Self-Defense, and Civil Liberties

The "Privacy Crisis"

This is an appendix to “Privacy: Variations on the Theme of Liberty.”

In the first half of 2005, when “identity theft” and the possibility of a national ID card were hot stories, I was sure that the mainstream media would declare a “privacy crisis.” But the MSM has the attention span of a fly, and so its gaze wandered to other issues, not the least of them being the indictment of VP Cheney’s chief of staff for allegedly having committed a crime by lying about something he might or might not have said about a crime that probably wasn’t committed. The MSM returned to the privacy issue in a big way with the disclosure in December that President Bush had authorized warrantless intercepts by the National Security Agency of communications between persons in the U.S. and overseas.

Here, then, is a summary of what the media — if they had the attention span of a two-year old — would call a “privacy crisis.”

My exposure to the “privacy crisis” began on February 5, 2005, when I watched “this amusing advert” (courtesy: Alex Tabarrok at Marginal Revolution).

In late February and early March I learned of the massive thefts of personal information from databases at ChoicePoint and LexixNexis. Those thefts led predictably to calls for more stringent regulation of private data aggregators, which in mid-March encountered resistance on the part of ChoicePoint and LexisNexis to a ban on the sale of Social Security numbers.

Also in mid-March, Glen Whitman of Agoraphilia weighed in with “Accomplices to Identity Theft,” which points to an MSN Money article that pins some of the blame for identity theft on lenders:

Now that intruders have raided a second big consumer database, we’re bound to hear lots more calls for increased federal oversight of the companies that buy and sell our personal information.

What will get far less attention, unfortunately, is the fact that these incursions wouldn’t be so incredibly damaging to consumers’ finances if lenders didn’t make that information worth stealing in the first place.

Think about it: The only reason an identity thief cares about knowing your Social Security Number or other private data is that it can be used to open accounts in your name and commit fraud. Lax verification procedures at credit card companies and other financial institutions make that possible — even easy.

“Companies are so eager to grant credit,” said Linda Foley, executive director of the Identity Theft Resource Center, “that they will grant it to almost anyone for any reason.”

(Whitman reasonably asked whether “lenders [should] be made liable for damages to identity theft victims, or punished in some other way when they facilitate identity theft, in order to give them an incentive to adopt more scrupulous lending practices?”)

On March 27, Wired News worried me with a report that “Amazon Knows Who You Are“; thus:

Amazon.com has one potentially big advantage over its rival online retailers: It knows things about you that you may not know yourself.Though plenty of companies have detailed systems for tracking customer habits, both critics and boosters say Amazon is the trailblazer, having collected information longer and used it more proactively. It even received a patent recently on technology aimed at tracking information about the people for whom its customers buy gifts.

Amazon sees such data gathering as the best way to keep customers happy and loyal, a relationship-building technique that analysts consider potentially crucial to besting other online competitors.

“In general, we collect as much information as possible such that we can provide you with the best feedback,” said Werner Vogels, Amazon’s chief technology officer.

But some privacy advocates believe Amazon is getting dangerously close to becoming Big Brother with your credit card number.

I was next faced with William Safire’s dire warning about the end of privacy in his April 10 review of Robert O’Harrow Jr.’s No Place to Hide and Patrick Radden Keefe’s Chatter: Dispatches from the Secret World of Global Eavesdropping:

O’Harrow notes that many consumers find it convenient to be in a marketing dossier that knows their personal preferences, habits, income, professional and sexual activity, entertainment and travel interests and foibles. These intimately profiled people are untroubled by the device placed in the car they rent that records their speed and location, the keystroke logger that reads the characters they type, the plastic hotel key that transmits the frequency and time of entries and exits or the hidden camera that takes their picture at a Super Bowl or tourist attraction. They fill out cards revealing personal data to get a warranty, unaware that the warranties are already provided by law. ”Even as people fret about corporate intrusiveness,” O’Harrow writes about a searching survey of subscribers taken by Conde Nast Publications, ”they often willingly, even eagerly, part with intimate details about their lives.”

Such acquiescence ends — for a while — when snoopers get caught spilling their data to thieves or exposing the extent of their operations. The industry took some heat when a young New Hampshire woman was murdered by a stalker who bought her Social Security number and address from an online information service. But its lobbyists managed to extract the teeth from Senator Judd Gregg’s proposed legislation, and the intercorporate trading of supposedly confidential Social Security numbers has mushroomed.

Safire moved on to “snooping” by the government and its links to private data-mining:

When an article in The New York Times by John Markoff, followed by another in The Washington Post by O’Harrow, revealed the Pentagon’s intensely invasive Total Information Awareness program headed by Vice Admiral John Poindexter of Iran-Contra infamy, a conservative scandalmonger took umbrage. (”Safire’s column was like a blowtorch on dry tinder,” O’Harrow writes in the book’s only colorful simile.) The Poindexter program’s slogan, ”Knowledge Is Power,” struck many as Orwellian. Senators Ron Wyden and Russell D. Feingold were able to limit funding for the government-sponsored data mining, and Poindexter soon resigned. A Pentagon group later found that ”T.I.A. was a flawed effort to achieve worthwhile ends” and called for ”clear rules and policy guidance, adopted through an open and credible political process.” But O’Harrow reports in ”No Place to Hide” that a former Poindexter colleague at T.I.A. ”said government interest in the program’s research actually broadened after it was apparently killed by Congress.”

There are many issues swirling around in the maelstrom of utterances about privacy….

Of all the companies in the security-industrial complex, none is more dominant or acquisitive than ChoicePoint of Alpharetta, Ga. This data giant collects, stores, analyzes and sells literally billions of demographic, marketing and criminal records to police departments and government agencies that might otherwise be criticized (or de-funded) for building a national identity base to make American citizens prove they are who they say they are. With its employee-screening, shoplifter-blacklisting and credit-reporting arms, ChoicePoint is also, in the author’s words, ”a National Nanny that for a fee could watch or assess the background of virtually anybody.”…

A second book — not as eye-opening as O’Harrow’s original reporting but a short course in what little we know of international government surveillance — is ”Chatter: Dispatches from the Secret World of Global Eavesdropping,” by Patrick Radden Keefe. This third-year student at Yale Law School dares to make his first book an examination of what he calls the liberty-security matrix….

Keefe’s useful research primer on today’s surveillance society, and especially O’Harrow’s breakthrough reporting on the noxious nexus of government and commercial snooping, open the way for the creation of privacy beats for journalism’s coming generation of search engineers. A small furor is growing about the abuse of security that leads to identity theft. We’ll see how long the furor lasts before the commercial-public security combine again slams privacy against the wall of secrecy….

I next wrung my hands about the national ID card that seems to be in the making (via Wired News):

02:00 AM May. 12, 2005 PT

Legislation supporting a standardized national driver’s license may have won unanimous approval in the Senate on Tuesday, but the bill’s apparently smooth passage left some jagged edges in its wake….

Supporters of the bill say it would prevent terrorists and undocumented immigrants from obtaining legitimate documents that would help them move freely through the country. Last year, the 9/11 Commission called for tightening control over government-issued IDs because 18 of the 19 hijackers in the Sept. 11, 2001, terror attacks used U.S. IDs to pass through airport security.

But opponents of the bill say it would create a national ID card and a de facto national database — a concept that Congress rejected when it was first proposed several years ago.

The act would force states to produce standardized, tamper-resistant driver’s licenses that would include machine-readable, encoded data. States wouldn’t be required to comply. But those that don’t comply would create hardship for residents, who wouldn’t be able to use their licenses as official identification to travel on airplanes, collect federal benefits or gain access to federal buildings.

On July 15 Wired News reported on a bill now before Congress that “strives to protect privacy“:

A bipartisan group of senators introduced comprehensive identity-theft legislation Thursday that throws some of the burden for preventing the increasingly common crime onto businesses and other organizations that collect personal information. The new legislation also would give consumers more control over their personal data.

The Identity Theft Protection Act, introduced in the Senate commerce committee by a bipartisan coalition, addresses problems with recent high-profile data breaches by requiring entities that collect sensitive information, such as Social Security numbers, to secure the data physically and technologically and to notify consumers nationwide when data is compromised.

The bill also allows consumers to freeze their credit reports to help prevent unauthorized parties from accessing private data or opening new credit accounts in an individual’s name without their permission.

On July 17 Wired News reported about the threat of “Google-opoly”:

Google is at once a powerful search engine and a growing e-mail provider. It runs a blogging service, makes software to speed web traffic and has ambitions to become a digital library. And it is developing a payments service.

Although many internet users eagerly await each new technology from Google, its rapid expansion is also prompting concerns that the company may know too much: what you read, where you surf and travel, whom you write.

“This is a lot of personal information in a single basket,” said Chris Hoofnagle, senior counsel with the Electronic Privacy Information Center. “Google is becoming one of the largest privacy risks on the internet.”

An InformationWeek Weblog entry dated November 4 had this to say about “spychips”:

“Spychips” is a scary new book out by consumer-privacy advocates Katherine Albrecht and Liz McIntyre, and it should be must-reading for anyone who doesn’t “get” the concerns over RFID chips. Even if half of what the book says in the planning or thinking stages is true, that’s more than enough to make anyone nervous about the potential — or even planned, if the authors are to be believed — misuse of this technology.

Albrecht is by no means without bias here — she also is the founder and director of Consumers Against Supermarket Privacy Invasion and Numbering (CASPIN), which, among other things, has organized events such as the recent consumer protest against RFID use at a Dallas Wal-Mart. She definitely has an ax to grind.

So it would be easy to dismiss the concerns highlighted in the book, and the evidence backing them were it not for where Albrecht and McIntyre dug up some of this stuff. They wielded the Freedom Of Information Act, hunted through corporate Web sites, crawled through company reports, and excavated some very interesting proposals filed at the patent office.
They even checked up on the government. Much of this is stuff you could track yourself, except for perhaps a page with what Albrecht claimed was misleading information on RFID, which allegedly was removed from a medical-products company’s Web site after the publication of “Spychips.”

McIntyre is quoted in a CASPIN release saying that “…companies like IBM, Procter & Gamble, Bank of America, BellSouth, and Philips will also have some explaining to do when people read about their patent pending ways to use RFID to track people through the things they wear, carry, and throw away. Consumers will realize these companies have an RFID agenda that should concern us all.” Like what? Well, like embedding the chips in shoes so that the wearer can be tracked in RFID reader-equipped buildings. There is even a reference to a company that wants to implant RFID chips inside of people. How nice.

Indeed, as RFID reporter Laurie Sullivan notes in a recent story, the start of what has privacy advocates and some consumers worried is already happening: “Check the next Hewlett-Packard printer you buy at Wal-Mart or that Ann Taylor blouse you picked up. Chances are a radio-frequency ID tag came home with your purchase.”

I don’t think anyone cares about the really neat uses of RFID — to track Alzheimer patients or newborns, manage inventory, or track the shipment of goods. Sun, for example, is trialing an RFID-fueled asset-tracking service that supposedly lets the company verify any item’s location and physical characteristics within an hour, without linking to a network. And Ford just announced an RFID just-in-time delivery system, which will enable better coordination of 40 to 50 shipments a day of truck parts. Lots of people would like their appliances and cars to alert them before a major failure.

But none of this changes the fact that RFID can be used badly, invasively, and secretly, something “Spychips” makes plenty clear. Even potentially useful applications, such as installing biometric or RFID chips in passports and licenses, have as many cons as there are pros. It’s worth stopping to take a breath and think this stuff out. Which is what some people are doing.

Sullivan has reported on a bill pending in the California Senate that is seeking to put a three-year moratorium on using RFID chips in various government-issued documents — driver’s licenses, library cards, etc. And in a somewhat related action, Microsoft is pushing for a national, federal standard on protecting consumer data. Obviously, one of the concerns about RFID tracking is who will have access to any data that is collected.

To get an idea of where Albrecht is coming from, and to judge her views on RFID for yourself, listen to Sullivan’s two-part podcast with the privacy advocate and author. You can access part one here.

Not to let the Patriot Act go unmentioned, there’s this (from Wired News of November 6):

Lawmakers expressed concern Sunday [November 6] that the FBI was aggressively pushing the powers of the anti-terrorist USA Patriot Act to access private phone and financial records of ordinary people.”We should be looking at that very closely,” said Sen. Joseph Biden (D-Delaware), who is a member of the Senate Judiciary Committee. “It appears to me that this is, if not abused, being close to abused.”

Sen. Chuck Hagel (R-Nebraska), a member of the Senate Intelligence Committee, agreed, saying the government’s expanded power highlights the risks of balancing national security against individual rights.

“It does point up how dangerous this can be,” said Hagel, who appeared with Biden on ABC’s This Week.

Under the Patriot Act, the FBI issues more than 30,000 national security letters allowing the investigations each year, a hundredfold increase over historic norms, The Washington Post reported Sunday, quoting unnamed government sources.

The security letters, which were first used in the 1970s, allow access to people’s phone and e-mail records, as well as financial data and the internet sites they surf. The 2001 Patriot Act removed the requirement that the records sought be those of someone under suspicion.

As a result, FBI agents can review the digital records of a citizen as long as the bureau can certify that the person’s records are “relevant” to a terrorist investigation. . . .

Issued by the FBI without review by a judge, the letters are used to obtain electronic records from “electronic communications service providers.” Such providers include internet service companies but also universities, public interest organizations and almost all libraries, because most provide access to the internet.

Last September in an ACLU lawsuit, a federal judge in New York struck down this provision as unconstitutional on grounds that it restrains free speech and bars or deters judicial challenges to government searches. That ruling has been suspended pending an appeal to the New York-based 2nd U.S. Circuit Court of Appeals.

In a hearing last week the court suggested it might require the government to permit libraries, major corporations and other groups to challenge FBI demands for records.

The Patriot Act provision involving national security letters was enacted permanently in 2001, so it was not part of Congress’ debate last summer over extending some Patriot Act provisions.

As the Dec. 31 deadline has approached for Congress to renew provisions of the act, the House and Senate have voted to make noncompliance with a national security letter a criminal offense.

Finally, on December 16, The New York Times disclosed the NSA intercepts, about which an editorialist at Wired News erroneously wrote this:

This week, The New York Times revealed that the Bush administration ignored the Foreign Intelligence Surveillance Act, or FISA, and intercepted telephone calls and e-mails from American citizens without a warrant. FISA requires that investigators provide a judge with evidence that there’s reason to believe the person they plan to place under surveillance is an agent of a foreign power. . . .

There is no legal justification for these warrantless interceptions, which included calls to and from American citizens.

John Schmidt, a former associate attorney general in the Clinton administration, set the record straight:

President Bush’s post- Sept. 11, 2001, authorization to the National Security Agency to carry out electronic surveillance into private phone calls and e-mails is consistent with court decisions and with the positions of the Justice Department under prior presidents.

The president authorized the NSA program in response to the 9/11 terrorist attacks on America. An identifiable group, Al Qaeda, was responsible and believed to be planning future attacks in the United States. Electronic surveillance of communications to or from those who might plausibly be members of or in contact with Al Qaeda was probably the only means of obtaining information about what its members were planning next. No one except the president and the few officials with access to the NSA program can know how valuable such surveillance has been in protecting the nation.

In the Supreme Court’s 1972 Keith decision holding that the president does not have inherent authority to order wiretapping without warrants to combat domestic threats, the court said explicitly that it was not questioning the president’s authority to take such action in response to threats from abroad.

Four federal courts of appeal subsequently faced the issue squarely and held that the president has inherent authority to authorize wiretapping for foreign intelligence purposes without judicial warrant. . . .

The passage of the Foreign Intelligence Surveillance Act in 1978 did not alter the constitutional situation. That law created the Foreign Intelligence Surveillance Court that can authorize surveillance directed at an “agent of a foreign power,” which includes a foreign terrorist group. Thus, Congress put its weight behind the constitutionality of such surveillance in compliance with the law’s procedures.

But as the 2002 Court of Review noted, if the president has inherent authority to conduct warrantless searches, “FISA could not encroach on the president’s constitutional power.”

Every president since FISA’s passage has asserted that he retained inherent power to go beyond the act’s terms. Under President Clinton, deputy Atty. Gen. Jamie Gorelick testified that “the Department of Justice believes, and the case law supports, that the president has inherent authority to conduct warrantless physical searches for foreign intelligence purposes.” . . .

Should we be afraid of this inherent presidential power? Of course. If surveillance is used only for the purpose of preventing another Sept. 11 type of attack or a similar threat, the harm of interfering with the privacy of people in this country is minimal and the benefit is immense. The danger is that surveillance will not be used solely for that narrow and extraordinary purpose.

But we cannot eliminate the need for extraordinary action in the kind of unforeseen circumstances presented by Sept.11. I do not believe the Constitution allows Congress to take away from the president the inherent authority to act in response to a foreign attack. That inherent power is reason to be careful about who we elect as president, but it is authority we have needed in the past and, in the light of history, could well need again.

(For more on the NSA issue, go here and follow the links at the end of the post.)

A Dissonant Vision

I noted, way back on June 8, 2004, Thomas Sowell’s A Conflict of Visions: Ideological Origins of Political Struggles. There, at the end of chapter 2, Sowell explains that

[t]he dichotomy between constrained and unconstrained visions is based on whether or not inherent limitations of man are among the key elements included in each vision….These different ways of conceiving man and the world lead not merely to different conclusions but to sharply divergent, often diametrically opposed, conclusions on issues ranging from justice to war.

Thus, in chapter 5, Sowell writes:

The enormous importance of evolved systemic interactions in the constrained vision does not make it a vision of collective choice, for the end results are not chosen at all — the prices, output, employment, and interest rates emerging from competition under laissez-faire economics being the classic example. Judges adhering closely to the written law — avoiding the choosing of results per se — would be the analogue in law. Laissez-faire economics and “black letter” law are essentially frameworks, with the locus of substantive discretion being innumerable individuals.

By contrast,

those in the tradition of the unconstrained vision almost invariably assume that some intellectual and moral pioneers advance far beyond their contemporaries, and in one way or another lead them toward ever-higher levels of understanding and practice. These intellectual and moral pioneers become the surrogate decision-makers, pending the eventual progress of mankind to the point where all can make moral decisions.

That observation helps to explain why persons who hew to the unconstrained vision — liberals, that is — also have become apocalyptic in their outlook: the environmentwill kill us, our food is poisonous, defense is a military-industrial plot, we’re running out of oil, we can’t defeat terrorism, etc., etc., etc. I will make the connection below but, first, let’s hear from Joe Kaplinsky, who reviews a book full of such apocalyptic tripe — James Howard Kunstler’s, The Long Emergency: Surviving the Converging Catastrophes of the Twenty-First Century (bolded emphasis added by me):

As recently as a decade ago it was unusual to encounter books predicting the imminent collapse of civilisation and probable extinction of the human race. . . . Today such works are common. The core elements of the litany are predictable: climate change, disease, terrorism, and an-out-of-control world economy. Other elements such as killer asteroids, nanotechnology or chemical pollution can be added according to taste.

James Howard Kunstler’s The Long Emergency: Surviving the Converging Catastrophes of the Twenty-First Century clearly fits the genre. While not neglecting any of the usual suspects, Kunstler builds his litany around the increasingly fashionable panic over oil depletion. The Long Emergency has received a warm welcome, featuring on the front covers of both the leftish British publication the New Statesman and Pat Buchanan’s old-right American Conservative.

The picture of the future put forward in The Long Emergency is truly grim. The best-case scenario is a mass die-off followed by a forced move back to the land, complete with associated feudal relations. As the title implies, this is to be an ongoing state rather than a crisis to be overcome . . . .

The successes of science and the Enlightenment present a conundrum for green pessimists. How to explain away the failed predictions of collapse from Malthus on, through to Paul Ehrlich and the Club of Rome in the 1970s?

. . . Conceding that Malthus may have got his facts wrong here, Kunstler wants to rehabilitate Malthus’ larger point: a focus on mechanisms of social restraint as a counterpoint against the claims of Enlightenment optimists such as Godwin and Condorcet. . . .

Kunstler also puts forward a second explanation for the successful economic growth of the twentieth century: oil. ‘Malthus was certainly correct, but cheap oil has skewed the equation over the past hundred years’, he says. He claims that oil, and fossil fuels more broadly, have been responsible for the gains of the twentieth century, from agriculture to medicine to transport.

Furthermore, Kunstler claims that this was a one-shot deal. Having used up our oil he thinks we are about to descend back into Malthusianism – for which we are worse prepared, because we have invested so much economically and psychologically in a modern world that is unsustainable. Our past progress, he thinks, is only setting ourselves up for a fall. He calls suburbia and the motorcar the ‘greatest misallocation of resources in history’.

The deeper theme of The Long Emergency is not oil so much as human powerlessness. The projection of all the products of human resourcefulness on to fossil fuels is only one example of this. Another example is disease. . . .

Kunstler’s discussion of emerging diseases is headed ‘Nature Bites Back’. Such a notion endows Nature with intentions, interests, and intrinsic moral value. Yet without pausing to defend such implausible assumptions, Kunstler ploughs straight on: in ‘response to unprecedented habitat destruction by humans and invasion of the wilderness, the Earth itself seems to be sending forth new and much more lethal diseases, as though it has a kind of protective immune system with antibody-like agents aimed with remarkable precision at the source of the problem: Homo Sapiens.’

Human beings are pushed to one side, as puppets or parasites, while nature is endowed with superhuman powers. It is this process which transforms any of the difficulties we face from problems to be solved into warnings of apocalypse to come.

The most striking example of the sense of powerlessness is as it applies to Kunstler himself. He has long argued against suburbia and the car, in favour of a ‘New Urbanism’. In places it is perhaps possible to read The Long Emergency as a revenge fantasy. Embittered at his inability to convince others that they should change their ways, Kunstler takes refuge under the wing of Nature’s avenging angel. He can be ignored (he attributes this to a psychological flaw in his detractors); the inhuman laws of nature cannot. . . .

The global economy, or perhaps even any economy based on monetary exchange, is apparently an ‘hallucination’. Only a low-energy, local economy in which we are in touch with the land, claims Kunstler, can avoid the destructive effects of entropy. . . .

. . . But entropy doesn’t have any mystical qualities. It is a thermodynamic variable like any other. There is no more reason to connect a breakdown of civilisation with an increase in entropy than with, say, an increase in atmospheric pressure or the Earth’s magnetic field. Kunstler’s discussion of this topic is plain and simple pseudoscience.

His underlying argument about human powerlessness also cannot stand. In abolishing old problems, progress brings new problems. How could it not? The new problems can sometimes appear larger than the old, existing on a global scale. But this just arises from human society operating on a global scale, which carries with it the benefits of global cooperation, trade and travel. History shows that exchanging older problems for newer, sometimes greater, ones has been a good bargain.

The capacity to solve problems expands faster than the problems themselves. It is harder to defend a modern city – with skyscrapers, highways, and energy infrastructure – against a flood or an earthquake. But alongside the technologies that enabled us to build modern cities we have created solutions that make them resilient to natural disasters. That is why life is better in the more developed parts of the world.

While it is always possible that we will stumble at the next hurdle, science confirms that we have a good chance of flourishing in the future, too. The core of The Long Emergency is the anxiety that problems will outweigh solutions. It is summed up by Kunstler’s complaint that by following the path of progress humanity is continually setting itself an exam. Alienated from progress he has no answers himself and fears we are relying on a few techno-geeks to come up with a fix. He is haunted by the question, what if we fail?

This question assumes overwhelming significance for Kunstler because he seems to believe we must fail. A more reasoned approach balances it against two other questions. What if we succeed? Everything worthwhile in human culture and civilisation has come from such successes. What if we do not try?

The emphasis on social restraints — to a Leftist of Kunstler’s ilk — means social engineering writ large. He wants a society that operates according to his strictures. But society refuses to cooperate, and so he conjures historically and scientifically invalid explanations for the behavior of man and nature. By doing so he is able to convince himself and his fellow travelers that the socialist vision is the correct one. He and his ilk cannot satisfy their power-lust in the real world, so they retaliate by imagining a theoretical world of doom. It is as if they walk around under a thought balloon which reads “Take that!”

More Innumeracy and Illogic from the Left

TomPaine.com, a leftist blog, features a “Daily Indicator,” Here’s today’s:

Percent of physicians accepting new Medicare patients, despite congressional cuts to Medicare reimbursement fees: 73

The link is to a Yahoo! News article about the findings of a study which

suggests that doctors would not quit seeing Medicare patients if Congress had gone ahead with a proposed 4.4 cut in reimbursement rates in 2006. . . .

Presumably, “Paine” thinks that such findings attest to the benefits of regulation in general and socialized medicine in particular. The study’s clear implication, however, is that Medicare overpays doctors. That’s unsurprising, given the tendency of regulatory bodies to identify with the industries and professions they are supposed to regulate.

Well Said

From Occam’s Carbuncle, a Canadian blog:

Wilfrid Laurier[*] once said that the 20th century would belong to Canada. As it turned out, the times were driven by all things American, both good and bad. I don’t propose that we should try to take on another whole century as our very own. Rather, I think that what Canada should aim for is simply to become freest nation on earth. Let liberty be our great project. The field is open. . . . We can make personal liberty, autonomy and responsibility the building blocks of our society, our true values. I think they are the strongest and least discussed values of the majority of Canadians. Of course, if you ask ten people what liberty means, you’ll get ten different answers. Let’s argue about it. Debating the meaning of liberty can’t possibly be a waste of time. Making liberty the cornerstone of a country strikes me as a great enterprise.

As “Occam” rightly points out, “America has often been described as the leader of the free world. I don’t think they’ve done much to earn that title in the last few years, with their explosive growth of government at all levels.” This has happened, in large part, because the GOP — which rose to power on the promise of smaller government — has lost its bearings. OpinionJournal puts it this way:

The real House GOP problem isn’t about lobbyists so much as it is the atrophying of its principles. As their years in power have stretched on, House Republicans have become more passionate about retaining power than in using that power to change or limit the federal government. Gathering votes for serious policy is difficult and tends to divide a majority. Re-election unites them, however, so the leadership has gradually settled for raising money on K Street and satisfying Beltway interest groups to sustain their incumbency.

This strategy has maintained a narrow majority, but at the cost of doing anything substantial. The last year in particular was an historic lost opportunity. House Republicans were also the main culprit in watering down Medicare reform, while Ohio’s Mike Oxley has run the Financial Services Committee more or less as liberal Barney Frank would. Beyond welfare reform and tax cuts (and perhaps health-savings accounts), the GOP has achieved little in the last decade that will outlast the next Democratic majority.

We Americans may have much to learn from the debate in Canada. We should be paying attention to it.
__________
* From Wikipedia:

The Right Honourable Sir Wilfrid Laurier, PC, KC, GCMG, BCL, DCL, LLD, LittD (November 20, 1841February 17, 1919) was the seventh Prime Minister of Canada from July 11, 1896, to October 7, 1911. . . .

Laurier led Canada during a period of rapid growth, industrialization, and immigration. His long career straddles a period of major political and economic change. As Prime Minister he was instrumental in ushering Canada into the 20th century and in gaining greater autonomy from Britain for his country.

John Sharpe’s Legion of St. Louis

Fringe Watch has posted “John Sharpe’s Legion of St. Louis.” This is the second Fringe Watch post about Neo-Conned series of anti-war books, published by John Sharpe (through his IHS Press/Light in the Darkness affiliate). It seems that Sharpe has ties to anti-Semitic, anti-American extremist politics. It is disconcerting therefore, to find that some members of the anarcho-capitalist contingent at LewRockwell.com (“anti-state, anti-war, pro-market”) have contributed to and touted the Neo-Conned books (see here, here, and here). They have let their opposition to the present war blind them to the agenda that animates the Neo-Conned books. Here, with permission, is “John Sharpe’s Legion of St. Louis”:

John Sharpe’s Legion of St. Louis

In my last entry I revealed the disturbing extremist connections of John Sharpe’s IHS Press, publisher of two anti-war books: Neo-Conned and Neo-Conned Again!. If it is argued that we “can’t shoot the messenger” it is also true that we needn’t believe the messenger when he cites dubious authorities.

This is not about Mr. Sharpe’s political past. It is about his political present. And while otherwise respectable individuals (deceived by Mr. Sharpe) have contributed to IHS Press volumes, the fact remains that neo-fascist propagandists, with whom Sharpe collaborates, have adopted an “entryist” Marxist-style means of infiltrating conservative circles to their own advantage – and the obvious disadvantage of their unwitting allies. For now, we’ll concentrate on the hard evidence of John Sharpe as a far-right mole.

Sharpe heads up the Legion of St. Louis (LSL), though his name no longer appears on the site. But it can be verified from other sources, such as this article published in 2002. On the LSL booklist page we find the following for sale:

1) Henry Ford’s International Jew, a pseudo-historical study in anti-Semitism used by Hitler and other extremists to justify their conspiratorial view of Jews and, ergo, their desire to eliminate them.

2) The New Unhappy Lords, the “Mein Kampf” of British neo-fascism by A. K. Chesterton. Chesterton founded the racialist National Front, which was the direct predecessor of groups involved in the establishment of the Legion of St. Louis and IHS Press.

3) Strange Gods of Judaism by the conspiracy-obsessed Michael A. Hoffman II. Mr. Hoffman is a veteran of American neo-nazism and a promoter of Holocaust revisionism. For a sampling of Hoffman’s rhetoric, see “The White Separatist FAQ.”

While John Sharpe’s proclivities have yet to receive widespread coverage, they are documented by Searchlight magazine (“Faith-based fascists bridging the waters“) – a UK liberal source, as well as the conservative Irish Catholic journal The Brandsma Review.

If that’s not enough, consider the absurdities posted by Mr. Sharpe in the wake of the 9/11 terror attacks (the LSL news page). He sounds more like Michael Moore than an advocate of traditional conservatism. There is the assertion that “America wasn’t attacked. America isn’t the World Trade Center, nor is it the Pentagon. At least those things don’t represent our America, nor should they for our readers.” Sharpe made the presumptuous claims early on that Bin Ladin had nothing to do with the attacks – a point that not even al Qaeda debates now. If you’re Mr. Sharpe, it seems anything’s better than the mainstream media…. Unfortunately, as with his Neo-Conned series, it’s a false alternative – an ideological equivalent of “out of the frying pan and into the fire.”

Risk and Regulation

Robert Higgs makes this acute observation:

Risk is an inescapable condition. However much people may prefer to live in a world of complete certainty, they simply cannot do so. Just banishing risk, whether by regulation or otherwise, is not a feasible option.

Higgs goes on to argue against the irrationality of drug-safety regulation; for example:

Whether the condition to be treated is life-threatening or simply unpleasant, the [Food and Drug Administration] requires the same rigid, elaborate, and time-consuming testing. Once again, the regulators frustrate the desires of consumers by insisting that one size (testing procedure) fits all (drugs and patients), regardless of the urgency with which consumers desire access to certain drugs. In some cases this regulatory intransigence creates the absurd situation in which the FDA denies dying patients access to a new drug because the manufacturer has not yet established beyond a reasonable doubt that the drug will not harm the users.

Rationality will get you nowhere in the face of massive ignorance. The ability of government bureaucracies to write regulations leads most Americans to believe that those regulations will “solve problems.” When a “problem” is not solved because actually solving it would be prohibitively expensive (as in reducing traffic fatalities to zero), Americans assume that “they” (corporations, for example) have simply found a “loophole” or “bought” someone. That kind of thinking leads, inexorably, to more regulation. It is beyond the ken of most Americans that regulation creates problems rather than solving them. Those unseen problems are the loss of freedom and fortune.

Other related posts:

Fear of the Free Market — Part I
Fear of the Free Market — Part II
Fear of the Free Market — Part III

Privacy, Security, and Electronic Surveillance

Interesting takes on privacy, spawned by the controversy about NSA surveillance of internet and cell-phone communications.

From Orin Kerr (The Volokh Conspiracy):

For those with criminal law experience, this was basically a large-scale pen regsister/trap-and-trace or wiretap. . . .

[T]he details of the program from [James] Risen’s book [State of War: State of War : The Secret History of the C.I.A. and the Bush Administration] arguably explains the national security interest in keeping the domestic surveillance program a secret. It’s not that terrorists may suddenly realize that they may be monitored; that argument never made much sense, as every member of Al-Qaeda must know that they may be monitored. Rather, I suspect the security issue is twofold. In the short term, terrorist groups now know that they can stand a significantly better chance of hiding their communications from the NSA by chosing communications systems that don’t happen to route through the U.S. And in the long term, some countries may react to the disclosures of the program by redesigning their telecommunications networks so less traffic goes through the United States. The more people abroad know that the NSA can easily watch their communications routed through the U.S., the less people will be willing to route their communications through the U.S. Cf. Bruce Hayden’s comment. No doubt it was a long-term priority of the NSA to ensure that lots of international communications traffic was routed through the U.S., where the NSA could have much better access to it. Indeed, Risen’s book more or less says this. The disclosure of the program presumably helps frustrate that objective.

From anarcho-libertarian David Friedman (Ideas):

A computer wiretap is not really an invasion of privacy–nobody is listening. Why should it require a search warrant? If I were an attorney for the FBI, facing a friendly judiciary, I would argue that a computerized tap is at most equivalent to a pen register, which keeps track of who calls whom and does not currently require a warrant. The tap only rises to the level of a search when a human being listens to the recorded conversation. Before doing so, the human being will, of course, go to a judge, offer the judge the computer’s report on key words and phrases detected, and use that evidence to obtain a warrant.

And from Tom Smith (The Right Coast):

Jack Balkin has a very good point here.

To add to it a little bit, technology on the data mining front is moving very fast. In fact, the term data mining is too narrow and somewhat dated. For just a taste of one cutting edge approach, check this out. This company takes a semantic network approach to unstructured databases. There are other approaches as well.

What I am getting at is, if the government puts together a huge database — and Jack is absolutely correct; it is within their capabilities, well within — then with tech from the private sector, not to mention what NSA geniuses come up with, then what they can figure out about individuals, firms, and so on, really does not have any clear limit. It is not at all far fetched to say if the government wanted to, it could know more about people than they know about themselves, a lot more.

There are many questions here. The first is whether the storage of this information violates constitutional protections. I think sentience may make some difference here. If every email you have sent in the last five years is stored in some place the government has access to, but they do not actually access it, then I’m not sure your privacy has been affected at all.

But here is something that worries me, though maybe it shouldn’t. Search algorithms are already astonishingly powerful. They are advancing rapidly. It may be possible soon to pull out from such things as patterns of emails, phone calls, puchases and the like, people likely to be involved in drug trafficing, money laundering, whatever. If an impartial algorithm can troll through a database and produce a list of people who really are, to some high degree of probability, connected with herion trafficking say, should that be enough to support a warrant to start the really intrusive, traditional sort of surveillance?

I have already made clear that I think the President should be able to do exactly this if it is necessary to fight a war. But law enforcement agencies doing it does strike me as pretty creepy. It could be an extremely powerful law enforcement tool, though.

The use of surveillance to create databases from which law-enforcement officials can, with proper judicial oversight, solve crimes and detect actual criminal conspiracies is one thing; the use of those same databases to anticipate or imagine conspiracies is quite another thing, against which we should be on guard. But the second possiblity should not serve as an excuse to prevent the use of surveillance to detect actual or incipient conspiracies to commit acts of war against the United States.

P.S. This is worth reading.