Legalism vs. Liberty

We have a Constitution that was written by men who knew what it meant to fight for liberty. As Justice Felix Frankfurter wrote,

we have had recent occasion to quote approvingly the statement of former Chief Justice Hughes that the war power of the Government is ‘the power to wage war successfully.’ . . . Therefore, the validity of action under the war power must be judged wholly in the context of war. That action is not to be stigmatized as lawless because like action in times of peace would be lawless. To talk about a military order that expresses an allowable judgment of war needs by those entrusted with the duty of conducting war as ‘an unconstitutional order’ is to suffuse a part of the Constitution with an atmosphere of unconstitutionality. The respective spheres of action of military authorities and of judges are of course very different. But within their sphere, military authorities are no more outside the bounds of obedience to the Constitution than are judges within theirs. . . . To recognize that military orders are ‘reasonably expedient military precautions’ in time of war and yet to deny them constitutional legitimacy makes of the Constitution an instrument for dialetic subtleties not reasonably to be attributed to the hard-headed Framers, of whom a majority had had actual participation in war. If a military order such as that under review does not transcend the means appropriate for conducting war, such action . . . is as constitutional as would be any authorized action by the Interstate Commerce Commission within the limits of the constitutional power to regulate commerce.

In spite of that, we now have men and women who seem opposed to the notion that fighting a war in order to win it is every bit as constitutional as regulating interstate commerce in order to dictate the labeling of canned goods. How is it that such men and women can go so wrong? Here’s how:

  • They understand, correctly, that citizens may not be deprived of liberty without due process of law.
  • They twist that principle to mean that due process of law is synonymous with liberty.
  • That leads them to challenge any defense of liberty that — in their view — violates due process, even if the result of their challenge is to enable the enemies of liberty

They have, in other words, mistaken means for ends and come down on the side of means, as opposed to ends. That is to say, they prefer the tokens of libert to liberty, itself. And sometimes they seem downright determined to help the enemies of liberty.

Related posts:

Getting It Wrong: Civil Libertarians and the War on Terror (A Case Study)
More about War and Civil Liberties
The Illogic of Knee-Jerk Civil Liberties Advocates
Torture and Morality
The Constitution and Warrantless “Eavesdropping”
NSA “Eavesdropping”: The Last Word (from Me)
Privacy, Security, and Electronic Surveillance
Privacy: Variations on the Theme of Liberty
Words for the Unwise
Recommended Reading about NSA’s Surveillance Program

Wishes Are Not Facts

A utopian syllogism:

1. It is human to err.

2. Humans do not wish to err.

3. Therefore, humans can avoid error by wishing not to err.

By (3), the wish (2) overcomes the fact (1), but only in the imagination. Wishes are not facts.

(Inspired by this post at Imlac’s Journal.)

Liberty, General Welfare, and the State

In an earlier post I said that “the economy isn’t a zero-sum game.” That assertion warrants explanation and elaboration. Here it is.

Gains from Specialization and Trade

Imagine a very simple economy in which Jack makes bread and Jill makes butter. Jack also could make butter and Jill also could make bread, but both of them have learned that they are better off if they specialize. Thus:

  • Jack can make 1 loaf of bread or 0.5 pound of butter a day. (The “rate of transformation” is linear; e.g., in Jill’s absence Jack would make 0.5 loaf of bread and 0.25 pound of butter daily.)
  • Jill can make 0.5 loaf of bread or 1 pound of butter a day. (Again, the rate of transformation is linear; e.g., in Jack’s absence Jill would make 0.25 loaf of bread and 0.5 pound of butter daily.)
  • If both Jack and Jill make bread and butter their total daily output might be, to continue the example, 0.75 loaf and 0.75 pounds.
  • Alternatively, if Jack specializes in bread and Jill specializes in butter their total daily output is 1 loaf and 1 pound.

Now, the question for Jack and Jill is this: At what rate should they exchange bread and butter so that both are better off than they would be in the absence of specialization and trade? There is no right answer to that question. The answer depends on Jack and Jill’s respective preferences for bread and butter, and on their respective negotiating skills. But of one thing we can be certain, Jack and Jill will strike a bargain that makes both of them better off than they would be in the absence of specialization and trade.

Consider some possibilities:

  • Jack makes 1 loaf of bread, keeps 0.5 loaf, and trades the other 0.5 loaf to Jill in exchange for 0.25 pound of butter. Jack, with 0.5 loaf and 0.25 pound, is where he would be in the absence of specialization and trade. Jill makes 1 pound of butter and trades 0.25 pound to Jack for 0.5 loaf of bread. Jill, with 0.5 loaf and 0.75 pound, is better off than she would be in the absence of specialization and trade (+0.25 loaf and +0.25 pound). This outcome is unlikely because Jack, seeing his lot unimproved, would have no incentive to specialize in bread and trade with Jill. Jill, therefore, would have an incentive to strike a bargain with Jack that makes both of them better off than they would be in the absence of specialization and trade.
  • At the other end of the spectrum of possible trades, Jill could end up no better off while Jack reaps all the gains to specialization and trade. But this outcome, too, is unlikely because Jill, seeing her lot unimproved, would have no incentive to specialize in butter and trade with Jack. Jack, therefore, would have an incentive to strike a bargain with Jill that makes both of them better off than they would be in the absence of specialization and trade.
  • More realistically, then, Jack and Jill make a trade that leaves both of them better off. For example, Jack trades 0.5 loaf to Jill for 0.5 pound of butter, leaving him ahead by 0.25 pound of butter. Jilll ends up with 0.5 loaf and 0.5 pound of butter, leaving her ahead by 0.25 loaf of bread.

In sum, liberty — which includes the right to engage in voluntary exchange — makes both Jack and Jill better off. Moreover, because they are better off they can convert some of their gains from trade into investments that yield even more output in the future. For example, to continue with this homely metaphor, imagine that Jill — fueled by additional food — is able to produce the usual amount of butter in less time, giving her time in which to design and build a churn that can produce butter at a faster rate.

Liberty advances the general welfare, which means the general well-being — not handouts.

Enter the State

Under a regime of liberty there is no “exploitation” of Jack by Jill, or vice versa, unless one of them cheats or robs the other. In the naïve libertarian view of the world, cheating and theft are irrational. If Jack cheats or steals from Jill, Jill refuses to trade with Jack until he made things right. If he refuses to do so he would face a lifetime of living less well than he could by trading honestly with Jill. Alternatively, Jack would come to understand that this thievery or cheating will weaken Jill and diminish her ability to produce 1 pound of butter a day. That understanding should cause Jack to desist from cheating or thievery.

But Jack would not desist from cheating or thievery if he had a taste for such things, nor would Jill if she had a taste for such things. (Wealth-maximization, contrary to many economists and all naïve libertarians, isn’t necessarily the be-all and end-all of human existence.) Even if neither Jack nor Jill has a taste for cheating or thievery, they must beware predators who have such tastes.

The Delusion of Statelessness (or Anarcho-Libertarianism)

An anarcho-capitalist (or anarcho-libertarian) would have Jack and Jill protect themselves (from each other and outside predators) by hiring a third party to enforce their trading contract and deal with predators. An anarcho-libertarian would call such a third party a private defense agency. But an entity that has the power to enforce contracts and keep the peace is the state, no matter what you call it.

In an effort to avoid the necessity of the state, the anarcho-libertarian posits competing private defense agencies. But if a generally peaceful and cooperative people cannot control one state (or private defense agency), such a people surely cannot control competing states — or warlords — all of them armed and many of them having a taste for dominance.

For a sample of the consequences of warlordism in the American experience, consider the Civil War. An anarcho-libertarian would be quick to call Abraham Lincoln a warlord. But it takes two warlords to foment a war. And so — with the creation of a rival warlord in the South — there was a civil war: a war that resulted in 50 percent more military deaths than did World War II (twice as many deaths per capita); a war with dire, long-lasting consequences for race relations in America (e.g., Jim Crow and “black redneck” culture); a war that would not have happened if the South had not chosen to form a “competing defense agency.” (For more about anarcho-libertarianism and defense, read this post and the posts linked at the bottom.)

The Busybody State

The lesson here is simple, the best way to reap the benefits of liberty is to create a single, accountable state with limited powers — and to be vigilant about enforcing the limits. When vigilance fails, those who control the levers of power will use that power to interfere with the lives, liberty, and property that they were hired to protect. The Framers of the Constitution knew that well, and so they designed a system of checks and balances to circumscribe the power of the state. (The design is still there, on paper, and — with time and the right Supreme Court — can be re-applied.)

The fact of the matter is that the state has no moral standing with respect to its citizens. For example, a person who “fails” to give money or assistance to a fellow citizen owes an apology to no one, especially not to the busybodies who happen to control the state. The state’s moral judgment in such matters is “superior” only in that it is enforceable through the power of the state. Let us not lose sight of this fact: Edward Kennedy and his ilk (of all political stripes) have no claim whatever to moral superiority.

To return to Jack and Jill, suppose that Jill becomes ill and incapable of producing anything. As a result, Jill has no income and Jack is reduced to providing for himself. It isn’t Jack’s fault that Jill is incapable of working; Jack is worse off because Jill isn’t working. It isn’t Jack’s fault if Jill has not somehow insured herself against illness (e.g., by stockpiling bread and butter). Is Jack nevertheless compelled to give Jill some of his reduce income?

Jack, out of empathy for a fellow human being, may wish to give Jill some of his bread and butter. (In fact, absent the busybody state, Jack would be more willing and able to do just that.) Jack may even make an economic calculation and decide that if he gives some of his bread and butter to Jill she will recover and return to work, making both of them better off. But when the state — namely, the controlling faction of busybodies — is empowered to dictate the terms of Jack’s chartity toward Jill, here’s what happens:

  • The busybody state taxes Jack by taking away some of the bread and butter he produces, which is less than he had when Jill was capable of working (a fact that never occurs to the busybody state).
  • The tax (whether it’s an income tax or a consumption tax) makes work less attractive to Jack, assuming that he is producing more than he needs for subsistence.
  • When work becomes less attractive in relation to leisure, Jack chooses more leisure and therefore produces less.
  • As a result, Jack has less “excess” food to stockpile against misfortune or to sustain himself in efforts to improve his bread-and-butter-making technology (which would enable him to give more aid to Jill).

In sum, when the state becomes Jack’s conscience, it is far more likely to make matters worse than it is to make them better. Jill’s plight is unfortunate, but Jack is the only person who is in a position to make the right decision about how to respond to Jill’s plight. It is false and cheap compassion for the busybody state to tell Jack what to do about Jill.

Moreover, the state’s patent willingness to extort aid from Jack has the effect of (a) blunting Jill’s incentive to build a stockpile of food for a “rainy day” and (b) blunting Jill’s incentive to return to work when she is able to do so.

The state’s busybody ways make both Jack and Jill worse off, in the end.

There’s much more to be said for an economic order of voluntary exchange, in which the state’s only role is to enforce contracts and keep the peace. Here’s some of it:

The Destruction of Income and Wealth by the State (start here)
Why Outsourcing Is Good: A Simple Lesson for Liberal Yuppies
Fear of the Free Market — Part I
Fear of the Free Market — Part II
Fear of the Free Market — Part III
Trade Deficit Hysteria
Social Injustice
The Sentinel: A Tragic Parable of Economic Reality
Why We Deserve What We Earn
Who Decides Who’s Deserving?
The Rationality Fallacy
Brains Sans Borders
Why Class Warfare Is Bad for Everyone
Fighting Myths with Facts
Debunking More Myths of Income Inequality
Free-Market Healthcare
Understanding Economic Growth
Socialist Calculation and the Turing Test
The Social Welfare Function
Funding the Welfare State
A Mathematician’s Insight
Giving Back to the Community
Computer Technology Will Replace Concrete
Second-Guessing, Paternalism, Parentalism, and Choice
A Non-Paradox for Libertarians
“The Private Sector Isn’t Perfect”
Whose Incompetence Do You Trust?
Understanding Outsourcing
Much Ado about Donning
Joe Stiglitz, Ig-Nobelist
A Simple Fallacy
Ten Commandments of Economics
More Commandments of Economics
Three Truths for Central Planners
Bits of Economic Wisdom
Productivity Growth and Tax Cuts
Zero-Sum Thinking
Risk and Regulation
Wal-Mart and Jobs
Economist, Heal Thyself

Liberty and "Fairness"

Todd Zywicki at The Volokh Conspiracy posts a question from a student:

I consider myself to be a classical liberal (free trade, freedom of expression, freedom of religion …)with an exceptionally large bleeding heart (there is no excuse for having hungry kids or the mentally ill out on the streets), but I am trying to understand what it means to be a libertarian.

My advice: I recommend Arnold Kling’s Learning Economics, which is available on the web, here. But I would like to deal directly with the student’s implied question, which seems to be how the “less fortunate” would cope under a regime of liberty.

The student implies that there is a tension between liberty and what he or she might call “fairness.” The idea seems to be that some kids are hungry and some mentally ill persons are homeless because . . . because what? Because persons who are not hungry or homeless have taken food and health care from the hungry and homeless? No, that can’t be the answer, if you understand that the economy isn’t a zero-sum game.

Perhaps the hungry are hungry and the homeless are homeless because those who are “more fortunate” aren’t paying enough taxes to provide for our “less fortunate” fellow citizens? On the contrary, taxes (and regulations) stifle economic growth, which benefits everyone who is willing and able to work. That includes the parents of children who might otherwise go hungry. That includes persons who are prone to mental illness but who would have greater access to health care, given a job and/or health-care benefits.

So, a regime of liberty would actually be to the advantage of most of the “less fortunate” among us. The “least fortunate” would benefit from private charity, which is stifled by the present regime, which I call the regulatory-welfare state.

For more about the effects of the regulatory-welfare state on the general welfare, go here. For evidence that taxation suppresses private charity, go here and read to the end.

Anarcho-Libertarian "Stretching"

Tim Swanson, writing at the website of the Ludwig von Mises Institute, announces with glee “An Anarchistic Oasis In The Middle Of The Desert.” The “anarchistic oasis” is the Dubai International Financial Centre (DIFC), which, according to an article quoted by Swanson,

is a free trade area, an enclave with no taxes or customs duties and no restrictions on foreign ownership. That, in itself, is nothing special: Dubai has nearly a dozen [free trade areas] already. But what’s unique about the . . . DIFC . . . is that Dubai’s normal civil and commercial laws do not apply within.

Under a formal decree of the United Arab Emirates, and local laws signed by the late Ruler of Dubai, the two authorities that hold absolute power carved out an area from which they withdrew their own system of laws. The concept is breathtaking: here in DIFC, English common law reigns supreme – and under a British chief justice. Although there are some similarities to the Vatican, Hong Kong and even Gaza, it is thought to be the first time that any state has done this.

State sponsorship of English common law under a British chief justice is hardly the stuff of anarchy, or even of Hayekian spontaneous order. Welcome as the rule of common law may be (and I welcome it), the DFIC is not an instance of anarchy in action. State-imposed anarchy is an oxymoron. The DFIC is an instance of state-sponsored liberty, such as Americans enjoyed (more or less) from 1789 until about 1933 — and moreso from 1865 until about 1933.

Conservatism, Libertarianism, and "The Authoritarian Personality"

The Myth

There is a renewed effort to identify conservatism with racism and authoritarianism. It’s not quite as overt as that (except on the hard Left), but it goes like this (corrective analysis in brackets):

  • Bush voters (and only Bush voters) are “conservative.” [What kind of “conservative”? A Burkean, limited-government, classical liberal who knows that evolved social traditions contain much wisdom and who therefore opposes change when it is imposed by the state? A neo-isolationist protectionist like Pat Buchanan, who spouts many of the same lines as “liberal” Lou Dobbs? A “redneck” who hates government except when it comes time to pick up his welfare check? A life-long Democrat who goes to church and tries to obey the Ten Commandments? The Burkean is a conservative. The Democrat has conservative tendencies (probably unacknowledged). Pat Buchanan, Lou Dobbs, and the “redneck” simply exude certain attitudes, not coherent philosophies of governance. Define your terms.]
  • Research “shows” that Bush voters are racist. [Actually, an uncontrolled, online “experiment” (see first three links above) purports to find an unspecified degree of correlation between (a) persons whose (unverified) zip codes coincide with congressional districts where Bush prevailed and (b) a somewhat more negative, self-reported (i.e., calculated) reaction to black persons than that of test-takers whose (unverified) zip codes coincide with congressional districts where Bush did not prevail. It would be just as valid to conclude that Bill Clinton is a racist because his daughter did not attend public schools in the mostly black District of Columbia. Actually, Bill Clinton’s condescendion toward black persons does strike me as a form of compensation for latent racist tendencies.]
  • Hitler and his adherents were racist authoritarians. [The part about “racist authoritarians” is an undeniable truth, which — when linked to the myth that Hitler was “conservative” — ties Republicans and “conservatives” (of whatever stripe) to racist authoritarianism. The modern liberal agenda of taxation and regulation is patently authoritarian in nature, yet a “good liberal” — who cannot see that his or her agenda is authoritarian — also denies his or her own racism by bending over backward to seem non-racist, regardless of the truth of the matter.]
  • Therefore, conservatives are racist authoritarians. [The implication here is that conservatism is authoritarian (and therefore racist, by the Hitler analogy). Yet, the reverse is true. Modern liberalism is authoritarian, and Burkean conservatives-classical liberals-libertarians have resisted modern liberalism since its ascendancy in the 1930s.]

The line of “reasoning” that I have just “fisked” illustrates three types of logical fallacy: false dilemma, false choice, and package deal. In this instance, the perpetrators of the fallacies do not know, or care, about their logical failings. Their aim is simply to convey the following message: Conservatism is sociopathic, if not psychopathic. They do not wish to distinguish among brands of conservatism: all are anathema to those who perpetrate and pertpetuate the myth that conservatism is a psychological illness on a par with Hitler’s pathological racist authoritarianism.

Academic Origins and Echoes

The effort to portray conservativism as an aberrant psychological disorder goes back to the publication in 1950 of The Authoritarian Personality, about which I was instructed by Prof. Milton Rokeach, author of The Open and Closed Mind (related links). Here is how Alan Wolfe, who is sympathetic to the thesis of The Authoritarian Personality, describes its principal author:

Theodor Adorno, the senior author, was a member of the influential Frankfurt school of “critical theory,” a Marxist-inspired effort to diagnose the cultural deformities of late capitalism.

Hmm. . . . Very interesting.

Wolfe continues:

Unlike much postwar social science, The Authoritarian Personality did not present data showing the correlations between authoritarianism and a variety of variables such as social class, religion, or political affiliation. Instead the authors tried to draw a composite picture of people with authoritarian leanings: Perhaps their most interesting finding was that such people identify with the strong and are contemptuous of the weak. Extensive case studies of particular individuals were meant to convey the message that people who seemed exceptionally conventional on the outside could be harboring radically intolerant thoughts on the inside.

Despite its bulk, prestigious authors, and seeming relevance, however, The Authoritarian Personality never did achieve its status as a classic. Four years after its publication, it was subject to strong criticism in Studies in the Scope and Method of “The Authoritarian Personality” (Free Press, 1954), edited by the psychologists Richard Christie and Marie Jahoda.Two criticisms were especially devastating, one political, the other methodological.

How, the University of Chicago sociologist Edward A. Shils wanted to know, could one write about authoritarianism by focusing only on the political right? In line with other works of the 1950s, such as Hannah Arendt’s Origins of Totalitarianism (Harcourt, Brace, 1951), Shils pointed out that “Fascism and Bolshevism, only a few decades ago thought of as worlds apart, have now been recognized increasingly as sharing many very important features.” The United States had its fair share of fellow travelers and Stalinists, Shils argued, and they too worshiped power and denigrated weakness. Any analysis that did not recognize that the extremes of left and right were similar in their authoritarianism was inherently flawed.

Herbert H. Hyman and Paul B. Sheatsley, survey-research specialists, scrutinized every aspect of The Authoritarian Personality’s methodology and found each wanting. Sampling was all but nonexistent. The wording of the questionnaire was flawed. The long, open-ended interviews were coded too subjectively. No method existed for determining what caused what. Whatever the subjects said about themselves could not be verified. The F scale lacked coherence.

Composite pictures, case studies, exclusion of Leftist dogmas, not to mention seriously flawed methods. Wolfe nevertheless defends the flawed methods by saying “social science being what it is, fault can be found with any methodology” — which is really a condemnation of social science, not its critics. (One might use Wolfe’s reasoning to excuse murder.)

Wolfe then tries to deflate Shils’s “political” criticism by arguing as follows:

Certainly the criticisms of Edward Shils seem misplaced 50 years on. Communism really did have some of the authoritarian characteristics of fascism, yet Communism is gone from the Soviet Union and without any influence in the United States. . . .

If one could find contemporary “authoritarians of the left” to match those on the right, the authors of The Authoritarian Personality could rightly be criticized for their exclusive focus on fascism.

Wolfe would have us believe that Communism and fascism are essentially different. They are not, in that both are extreme manifestations of authoritarianism. Wolfe also would have us believe that the official demise of Communism somehow precludes the rise of “authoritarians of the left.” But Wolfe, like a fish in water, is unable to see that liberty in the United States has receded largely because of the efforts of the Democrat Party. “Democrat” simply has a nicer ring than “Communist.” (It’s like the Ministry of Peace in Orwell’s Nineteen Eighty-Four.) Wolfe sees authoritarianism only when it seems to emanate from the Republican Party. Actually, now that the Communist Party is safely beyond criticism, Wolfe is free to apply the label “authoritarian” in the same undisriminating way that John Birchers used to apply the label “Communist.”

How does Rokeach’s work relate to Adorno’s? Here’s Rokeach, in his own words:

The Open and Closed Mind grew out of my need to better understand and thus to better resist
continuing pressures during my earlier years on my intellectual independence, on the one side from orthodox religion and on the other side from orthodox Marxism-Leninism.

Research as a continuation of adolescent rebellion? Hmm. . . . I wonder what Dr. Freud would make of that?

An Academician’s Corrective

Let’s turn to Australian psychologist John J. Ray, who assesses The Authoritarian Personality, The Open and Closed Mind, and related works in “Does Authoritarianism of Personality Go With Conservatism?“:

The problem that has plagued 30 years of work on authoritarianism is doubt about the validity of the scales used to measure it. From the start there was the apparently inexplicable fact that authoritarian governments on the world scene were at least as likely to be Left wing as Right wing. . . .

We now have data from three separate societies which suggest that when authoritarianism of personality is validly measured, it shows no association with political ideology. To reconcile this with previous findings we must insist on the distinction between authoritarianism of attitudes and authoritarianism of personality. One refers to how a person habitually feels and the other refers to how he behaves. . . .

It was because they failed to make such a distinction that Adorno, Frenkel-Brunswik, Levinson, and Sanford (1950) [The Authoritarian Personality] mistakenly identified the person who tended to admire traditional authority with the person who himself liked to dominate others. . . . One group admires authority because they would like to exercise it themselves while the other group admires it because they are so incapable of exercising it themselves. It is the former group that most of us would identify as authoritarian but the latter group which gets high scores on the F and related scales [devised by Adorno, Rokeach, and others]. . . .

It would seem, then, that if we wish to detect people something like the ones Adorno et al. (1950) had in mind, we need to know their scores on both a scale of authoritarian attitudes and a scale of authoritarian personality. It is only high scorers on both who fit their image of the Fascist personality. Authoritarian personalities alone are equally likely to be found on either side of the Left-Right divide. [All emphasis added by me.]

There’s more in Ray’s article about “Libertarians and the Authoritarian Personality.” Keep in mind, as you read the following excerpts, the proximity of Burkean conservatism to libertarianism:

The literature starts out with the now-famous book by Adorno, Frenkel-Brunswik, Levinson and Sanford, The Authoritarian Personality. This book had its genesis in an attempt by these four Jewish scholars to explain the rise of German Nazism. Most of the research reported in the book, however, was done in California.

These authors constructed a “scale” (list) of authoritarian attitudes which they administered to a wide variety of population samples. They found that those who “scored high” on this scale (endorsed most items on the list) tended to be sympathetic to the political Right and in fact showed “pre-fascist” personalities. . . .

A follow-up book by Christie and Jahoda challenged the California findings on both methodological and substantive grounds. . . . Methodologically, the point was raised that Adorno et al. had included in their list of attitudes only pro-authority items. There were no actual pro-liberty items. One could only express pro-liberty attitudes by rejecting pro-authority statements. . . . A high scorer could be either simply agreeable or a genuine authoritarian; in such circumstances, one could never be sure whether it was acquiescence which was correlating with right-wing attitudes or whether it was genuine authoritarianism.

The substantive point raised against the California studies [by Adorno et al.] was that they were simply obviously false. Right-wingers such as Nazis and Fascists may be authoritarians but equally so are Communists such as Mao and Stalin. Authoritarianism was to be found not at one end of the political spectrum but rather at both ends. . . .

A new proposal that substantially helped to resolve this dilemma was a long overdue reconceptualization of political allegiance along two dimensions rather than one. This reconceptualization was associated with the names of Rokeach and Eysenck. . . . They rightly identified authoritarianism/libertarianism as being at right angles to (unrelated to) the normal radical-conservative dimension of politics. . . .

Communists and Fascists could be shown to fall at opposite ends of the first dimension (radicalism-conservatism) but at the same end (authoritarian) of the second dimension. Democrats and Republicans on the other hand could be shown to fall also on opposite sides of the radicalism-conservatism divide but in the same position on the authoritarianism-libertarianism dimension (half-way between the two). . . .

Neat as this schema was, however, there proved to be a great deal of difficulty in showing that people’s individual attitudes could in fact be ordered in accordance with it. . . .

Rokeach’s scale (the “D” scale) also shared with the Adorno et al. “F” scale, the problem of one-way wording. Again there were no explicitly libertarian items.

Three attempts to remedy this problem were made by [me] using Australian data. . . . Three new scales were constructed wherein there were equal numbers of authoritarian and libertarian items. . . . The results obtained with balanced scales are then much more trustworthy than results from one-way-worded scales.

Thus, at this point, although we have seen that there are theoretical inadequacies in a one-dimensional description of political options and although there have been methodological inadequacies in much of the research in the area, the overall conclusion when all these are taken into account is still the same as that originally drawn by Adorno et al. — it is authoritarians, not libertarians, who tend to be politically right-wing and fascist.

In fact [I] showed that both by the mechanical/statistical procedures of factor analysis and by the criteria of various historical definitions, the Adorno et al. “F” scale was indistinguishable from a measure of conservatism. . . .

There are two very important ways, however, in which the Adorno et al. account has not been shown to be true. First, authoritarians /conservatives can not be shown to be psychologically sick, and, second, authoritarian attitudes can not be shown to go with authoritarian behaviour.

Various measures of authoritarianism have repeatedly been found not to correlate with various measures of maladjustment. . . . Attributes that authoritarianism has been found to correlate with (e.g., rigidity, dogmatism) are obviously not always maladaptive. As “stick-to-it-iveness”, such attributes might in some circumstances be, in fact, rather admired. . . .

The failure of authoritarian attitudes to relate to authoritarian behaviour is . . . a more serious failure of the Adorno et al. account. In fact, to psychologists the attitude/behaviour discrepancy is a familiar phenomenon. It is certainly true in other fields such as racism. . . . One cannot even guess whether the acknowledged motivation is the real motivation or not. . . .

Since a distinction is necessary between authoritarian attitudes and behaviour, a very obvious question becomes: Given that we have seen authoritarian attitudes to be characteristically conservative, is it also true that those who behave in an authoritarian way are conservative? The evidence on this question is not yet extensive but so far all available results show no relationship between the two whatever. . . . People who behave in an authoritarian way are equally likely to be from the Left, the Right or the center. [All emphasis added by me.]

In sum, the authors of The Authoritarian Personality define conservatism to be authoritarian. They then wrongly assert that “authoritarians” (conservatives) are psychologically “sick” and that they behave in an authoritarian manner. The fact, however, is that authoritarian behavior knows no ideological bounds. The histories of Germany, Japan, Italy, Russia, Britain (under Labour), and the U.S. (beginning especially with the New Deal) amply demonstrate that fact.

Obiter Dicta

One can be a rigid Democrat, a rigid Republican, and even a rigid libertarian. Rigidity, like compromise, is sometimes a useful way to approach the world, and sometimes a self-defeating way to approach the world. As a Burkean conservative-libertarian, I find anarcho-libertarianism especially rigid and self-defeating. Anarcho-libertarians are loathe to face the reality that government is unlikely to go away. Their answer to all problems, it seems, is to wish government away. All would be better in their best of all imaginary worlds.

Other libertarians (those whose beliefs are closer to mine) take the prosaic view that half a loaf is better than none. For example, in the best of all possible anarcho-libertarian worlds there would be no Social Security. That “best” world being an extremely unlikely one, pragmatic libertarians applaud Social Security reforms — such as private accounts — that would at least make Social Security something more like a real investment program and something less than the transfer-payment Ponzi scheme that it is.

Rigid, impractical libertarianism is no defense against the authoritarianism of Left and Right.

The Fatal Naïveté of Anarcho-Libertarianism

The anarcho-libertarians at the Ludwig von Mises Institute are at it again. They’re flogging “The Production of Security,” by Gustave de Molinari (1819-1912). The idea, as usual, is to sell the notion that police services and even national defense can be provided through competitive, private firms. Toward the beginning of the essay Molinari asserts that

if everyone had, in one word, an instinctive horror of any act harmful to another person, it is certain that security would exist naturally on earth, and that no artificial institution would be necessary to establish it. Unfortunately this is not the way things are. The sense of justice seems to be the perquisite of only a few eminent and exceptional temperaments. Among the inferior races, it exists only in a rudimentary state. Hence the innumerable criminal attempts, ever since the beginning of the world, since the days of Cain and Abel, against the lives and property of individuals.

Well, there seem to be enough of “the inferior races” (of all races) to guarantee that “criminal attempts” will continue, without abatement, unless the potential victims of those attempts establish institutions for the purpose of deterring and punishing crime. Molinari, of course, believes that private institutions can do the job. Toward the end of the essay he says that

[u]nder the rule of free competition, war between the producers of security entirely loses its justification. Why would they make war? To conquer consumers? But the consumers would not allow themselves to be conquered. They would be careful not to allow themselves to be protected by men who would unscrupulously attack the persons and property of their rivals. If some audacious conqueror tried to become dictator, they would immediately call to their aid all the free consumers menaced by this aggression, and they would treat him as he deserved. Just as war is the natural consequence of monopoly, peace us the natural consequence of liberty.

Under a regime of liberty, the natural organization of the security industry would not be different from that of other industries. In small districts a single entrepreneur could suffice. This entrepreneur might leave his business to his son, or sell it to another entrepreneur. In larger districts, one company by itself would bring together enough resources adequately to carry on this important and difficult business. If it were well managed, this company could easily last, and security would last with it. In the security industry, just as in most of the other branches of production, the latter mode of organization will probably replace the former, in the end.

The “customers would not allow themselves to be conquered”? Tell that to those who pay gangsters for “protection” and to the residents of gang-ridden areas. Molinari conveniently forgets that the ranks of “competitors” are open to “the inferior races,” who in their viciousness will and do “unscrupulously attack the persons and property of their rivals.” If not everyone is honorable, as Molinari admits, why would we expect private providers of security be honorable? Why would they not extort their customers while fighting each other? The result is bound to be something worse than life under an accountable state monopoly (such as we have in the U.S.) — something fraught with violence and fear. Think of The Roaring Twenties without the glossy coat of Hollywood glamour.

Molinari and his anarcho-libertarian descendants exhibit the Anne Frank syndrome. About three weeks before Frank and her family were betrayed and arrested, she wrote this:

It’’s a wonder I haven’’t abandoned all my ideals, they seem so absurd and impractical. Yet I cling to them because I still believe, in spite of everything, that people are truly good at heart.

Molinari and his ilk do not express the jejune belief that all “people are truly good at heart,” yet they persist in the belief that the security can be achieved in the absence of an accountable state. That is, like Anne Frank, they assume — contrary to all evidence — that “people are truly good at heart.” But competition, by itself, does not and cannot prevent criminal acts. Competition, to be beneficial, must be conducted within the framework of a rule of law. That rule of law must be enforced by a state which is accountable to its citizens for the preservation of their liberty.

The present rule of law in the United States is far from perfect, but it is far more perfect than the alternative dreamt of by anarcho-libertarians.

Related posts:

Defense, Anarcho-Capitalist Style
But Wouldn’t Warlords Take Over?
My View of Warlordism, Seconded

"Natural Rights" and Libertarianism

UPDATED, 01/25/06

Some relevant reading:

Natural Rights: Useful Fiction, by John Henke at QandO NEW

Government: The Social Contract Market, by Jon Henke at QandO

Rights Schmights, by Max Borders at TCS Daily

The Right in My Garage, by Jon Henke at QandO

The Paradox of Libertarianism, A Footnote to My Theory of Rights, and The Origin and Essence of Rights, by moi

Back-Door Paternalism

Shane Frederick, an assistant professor at MIT’s Sloan School of Management, suggests (in so many words) that the “best and brightest” should make decisions for the rest of us. He makes his case in “On the Ball: Cognitive Reflection and Decision Making.” Frederick begins well enough, with premises that seem well supported:

  • Bright people have a lower time preference than less-bright people; that is, bright people are more likely than the less-bright to forgo current gratification in favor of greater future gratification (e.g., more income), where the attainment of the greater gratification is fairly certain.
  • In addition, bright people are more risk-tolerant than less-bright people, where there is the prospect of a gain; that is they are more willing than the less-bright to gamble a given amount of money for the prospect of winning an even larger amount of money.

Here are excerpts of the evidence adduced by Frederick:

People with higher cognitive ability (or “IQ”) differ from those with lower cognitive ability in a variety of important and unimportant ways. On average, they live longer, earn more, have larger working memories, faster reaction times, and are more susceptible to visual illusions. . . .

Despite the diversity of phenomena related to IQ, few have attempted to understand – or even describe – its influences on judgment and decision making. Studies on time preference, risk preference, probability weighting, ambiguity aversion, endowment effects, anchoring, and other widely researched topics rarely make any reference to the possible effects of cognitive abilities (or cognitive traits). . . .

Many researchers have emphasized the distinction between two types of cognitive processes: those executed quickly with little conscious deliberation [System 1] and those that are slower and more reflective [System 2]. . . . System 1 processes occur spontaneously, and do not require or consume much attention. Recognizing that the face of the person entering the classroom belongs to your math teacher involves System 1 processes – it occurs instantly and effortlessly, and is unaffected by intellect, alertness, motivation or the difficulty of the math problem being attempted at the time. Conversely, finding [the square root of] 19163 to two decimal places without a calculator involves System 2 processes – mental operations requiring effort, motivation, concentration, and the execution of learned rules. . . .

By contrast, consider the problem below:

A bat and a ball cost $1.10. The bat costs $1.00 more than the ball.
How much does the ball cost? ____ cents

Here, an intuitive answer does spring quickly to mind: “10 cents.” But this “impulsive” answer is wrong. . . .

In a study conducted at Princeton, which measured time preferences using both real and hypothetical rewards, those answering “10 cents” were found to be significantly less patient than those answering “5 cents.” Motivated by this result, two other problems found to yield impulsive erroneous responses were included with the “bat and ball” problem to form a simple, three item “Cognitive Reflection Test” (CRT), shown in Figure 1. The three items on the CRT are “easy” in the sense that their solution is easily understood when explained, yet reaching the correct answer often requires the suppression of an erroneous answer that springs “impulsively” to mind.

Figure 1. The Cognitive Reflection Test (CRT)

(1) A bat and a ball cost $1.10 in total. The bat costs a dollar more than the ball. How much does the ball cost?
____ cents

(2) If it takes 5 machines 5 minutes to make 5 widgets, how long would it take 100
machines to make 100 widgets?
____ minutes

(3) In a lake, there is a patch of lily pads. Every day, the patch doubles in size. If it takes 48 days for the patch to cover the entire lake, how long would it take for the patch to cover half of the lake?
____ days

Over a 26-month period beginning in January, 2003, the CRT was administered to 3,428 respondents in 35 separate studies that also measured various decision making characteristics, like time and risk preferences. . . .

The notion that more intelligent people are more patient – that they devalue or “discount” future rewards less steeply – has prevailed for some time. . . .

The widely presumed relation between cognitive ability and patience has been tested in several studies, although rather unsystematically. . . .

Collectively, these studies offer some support for the view that cognitive ability and time preference are somehow connected, though none has identified the types of intertemporal decisions over which cognitive ability exerts influence, nor explained why it does so. Toward this end, I examined the relation between CRT scores and a wide variety of items intended to measure various aspects of “time preference.” . . . .

As predicted, those who scored higher on the CRT were generally more “patient”; their decisions implied lower discount rates. For short term choices between monetary rewards, the high CRT group was much more inclined to choose the later larger reward. . . . However, for choices involving longer horizons . . . , temporal preferences were weakly related or unrelated to CRT scores.

A tentative explanation for these results is as follows: a thoughtful respondent can find good reasons for discounting future monetary outcomes – the promiser could default, one may be predictably wealthier in the future (with correspondingly diminished marginal utility for further wealth gains), interest rates could increase (which increases the opportunity cost of foregoing the immediate reward), and inflation could reduce the future rewards’ real value (if the stated amount is interpreted as being denominated in nominal units). . . . However, such reasons do not apply with the same force for short term options; they are not sufficiently compelling to justify choosing $3400 this month over $3800 next month (which implies an annual discount rate of 280%). Hence, for choices . . . where the careful deliberation associated with “System 2” ought to strongly oppose one’s intuitive “System 1” preference for the more immediate reward . . . one observes considerable differences between CRT groups. . . .

Thus, greater cognitive reflection seemingly fosters the recognition or appreciation of considerations (like interest rates) that may favor the later larger reward. . . .

To assess the relation between CRT and risk preferences, I included several measures of risk preferences in my questionnaires, including choices between a certain gain (or loss) and some probability of a larger gain (or loss). For some items, expected value was maximized by choosing the gamble, and for some it was maximized by choosing the certain outcome.

. . . In the domain of gains, the high CRT group was more willing to gamble, particularly when the gamble had higher expected value . . . , but, notably, even when it did not. . . . This suggests that the correlation between cognitive ability and risk taking in gains is not due solely to a greater disposition to compute expected value or adopt that as the choice criterion. For items involving losses . . . , the higher CRT group was less riskseeking; they were more willing accept a sure loss to avoid playing a gamble with lower (more negative) expected value. . . .

Frederick then reinforces the connection between CRT and intelligence; for example:

[T]hough the CRT is intended to measure cognitive reflection, performance on it is surely aided by reading comprehension and mathematical skills (which the ACT [American College Test] and SAT [Scholastic Aptitude Test] also measure). Similarly, though Cacioppo et al. . . . claim that NFC [the “need for cognition scale] is “clearly separable” from intelligence, their list of ways in which those with high NFC were found to differ from those with low NFC sounds very much like the list one would create if people were sorted on any measure of cognitive ability. Namely, those with higher NFC were found to do better on arithmetic problems, anagrams, trivia tests, and college coursework, to be more knowledgeable, more influenced by the quality of an argument, to recall more of the information to which they are exposed, to generate more “task relevant thoughts” and to engage in greater “information-processing activity.”

The empirical and conceptual overlap between these tests suggests that they would all predict time and risk preferences. . . .

In his concluding discussion, Frederick jumps to the unwarranted implication that the “best and brightest” should make decisions for the rest of us; viz.:

[T]ime and risk preferences are sometime tied so strongly to measures of cognitive ability that they effectively function as such a measure themselves. For example, when a choice between a sure $500 and a 15% chance of $1,000,000 was presented to respondents (along with an eight item version of the CRT), only 25% of those who missed all eight problems chose the gamble, compared to 82% among those who solved them all. Should this result be interpreted to mean that choosing the gamble is the “correct” response for this item? . . .

. . . I suspect that if respondents were shown the respective test scores of those who chose the sure $500 vs. those who chose the 15% chance of $1,000,000, they would, in fact, feel more disposed to take the gamble; the correlation between cognitive ability and preference would hold some normative force for them. . . .

[A] relation between cognitive ability and preference does not, by itself, establish the correct choice for any particular individual. Two individuals with different cognitive abilities may experience outcomes differently, which may warrant different choices (for example, what magazines to read or movies to attend). But with respect to the example motivating this discussion, one must ask whether it is really plausible that people of differing cognitive abilities experience increments of wealth as differently as their choices suggest. It seems exceedingly unlikely that the low CRT group has a marked kink in their utility function around $W+500, beyond which an extra $999,500 confers little additional benefit. It seems more reasonable, instead, to override the conventional caveat about arguing with tastes . . . , and conclude that choosing the $500 is the “wrong answer” – much as 10 cents is the wrong answer in the “bat & ball” problem.

Whatever stance one adopts on the contentious normative issues of whether a preference can be “wrong” and whether more reflective people make “better” choices, respondents who score differently on the CRT make different choices, and this demands some explanation

Frederick, in effect, makes the following argument:

  • Bright people are good at getting right answers to questions for which there are right answers.
  • Bright people are good at evaluating prudent risks.
  • Bright people, therefore, are likely to be correct in all forms of risk-taking.
  • Thus all of us would do well to follow the instruction of bright people.

Frederick’s logic fails, first, because he blurs the distinction between (a) the kind of prudent risk-taking that’s involved in short-term financial transactions with fairly certain outcomes (which bright persons do well) and (b) straight-out gambling (for which bright persons seem to have a penchant). He compounds his confusion by treating gambling as a mere mathematical problem to which there is a right answer:

[C]hoosing the $500 is the “wrong answer” – much as 10 cents is the wrong answer in the “bat & ball” problem.

But getting the right answer to the “bat & ball” problem is trivial; it’s a closed problem to which there can be only one right answer. Frederick seems to think that getting the “right” answer to the betting problem depends only on being able to calculate the “expected value” of the prize (value of the prize x probability of winning it). Well, when the expected value is $150,000 and one stands to lose “only” $500, it would be stupid to take the $500 instead gambling on the million. Right? Wrong:

  • Expected value is an artificial construct; one cannot win the expected value of anything.
  • If there’s a 15% chance of winning the million, there’s an 85% chance of not winning the million.
  • A person to whom $500 is a lot of money (a month’s rent, for example) is stupid to gamble it with an 85% chance of losing it.

By Frederick’s logic, bright jerks should be put in the position of gambling away other people’s rent money. Or, to put it more generally, our affairs should be placed in the hands of the “best and brightest” — empowered by government to regulate our lives. (Frederick doesn’t come right out and say that, of course, but the subtext is clear.)

Actually, since the New Deal, successive Congresses, presidents, and Supreme Courts have been regulating our lives with the help of the “best and brightest” (a.k.a. the “brains trust”). And see where it has landed us.

In sum, Frederick’s paper amounts to nothing more than a contrived justification of statist paternalism.

Related posts:

Fear of the Free Market — Part I
Fear of the Free Market — Part II
Fear of the Free Market — Part III
The Rationality Fallacy
Socialist Calculation and the Turing Test
The Social Welfare Function
Libertarian Paternalism
A Libertarian Paternalist’s Dream World
The Short Answer to Libertarian Paternalism
Second-Guessing, Paternalism, Parentalism, and Choice
Another Thought about Libertarian Paternalism
“The Private Sector Isn’t Perfect”
Three Truths for Central Planners
Risk and Regulation

Privacy: Variations on the Theme of Liberty

I have noted elsewhere that the mainstream media seem to have missed an opportunity to declare a “privacy crisis.” Nevertheless, there is in the air (so to speak) a quasi-hysterical view that privacy is the be-all and end-all of existence — above and beyond life, liberty, and the pursuit of happiness. It is past time for a balanced view of privacy. Thus this post.

I begin by addressing privacy as a right. I then turn to private-sector issues, namely, identity theft and the use of personal information by businesses. In the next substantive portion of this post I address privacy vis-a-vis government, disposing quickly of the national ID card to focus on warrantless “eavesdropping” and data-mining. I then offer a brief summary and conclusion.

IS PRIVACY AN ABSOLUTE RIGHT?

Privacy in the Law

Privacy is one among many values that liberty should serve. An individual’s desire for privacy is as legitimate as a desire for, say, a Lamborghini, a full head of hair, and perpetual youth. Seriously, privacy is a legitimate pursuit, yet (like a Lamborghini) it cannot an absolute right. For — as I have argued elsewhere — if privacy were an absolute right, it would be possible to get away with murder in one’s home simply by committing murder there. In fact, if there are any absolute rights, privacy certainly isn’t one of them. Privacy really is a bargain that individuals strike with the rest of the world. We cannot act in the world without ceding some privacy, so the question is how to decide when the bargain we are being asked to strike is a good one or a bad one, given the benefits and risks of ceding some privacy.

You may now ask: “What about the Constitution, the Bill of Rights, and all of that?” Read the Constitution and Bill of Rights and you will find that there is nothing about privacy in them. The Fourth and Fifth Amendments come closest to being “privacy” amendments, but they’re really about due process of law. The vaunted Ninth Amendment doesn’t protect an unemurated privacy right. Rather, as I explained here, in drafting the Ninth Amendment Madison had in mind no particular unenumerated rights:

It is clear from its text and from Madison’s statement [upon presenting the Bill of Rights to the House of Representatives] that the [Ninth] Amendment states but a rule of construction, making clear that a Bill of Rights might not by implication be taken to increase the powers of the national government in areas not enumerated, and that it does not contain within itself any guarantee of a right or a proscription of an infringement.

Thomas McAffee, writing about the Ninth Amendment in The Heritage Guide to the Constitution (pp. 366-71), comes to the same conclusion:

. . . Madison . . . affirmed that the reason for the Ninth Amendment was not to expand the power of the Court to find new rights, but rather to restrict the ability of the Court to expand the legislative powers of Congress. Madison continued to maintain that that was the central meaning of the Ninth Amendment throughout his life, and his interpretation was seconded by most commentators of the time.

There is neverthess a notion that the Fourteenth Amendment guarantees privacy as a matter of substantive due process. As I have explained, however, substantive due process protects constitutionally guaranteed rights (e.g., liberty of contract). It does not protect imaginary rights, such as the non-existent general right to privacy.

The notion of a general right to privacy is a fairly recent invention of the Supreme Court. It was conjured to serve the Court’s legislative agenda in Griswold v. Connecticut (overturning a Connecticut law that banned the sale of contraceptives) and Roe v. Wade (overturning a Texas anti-abortion law). But, as I wrote here,

the Roe v. Wade majority acknowledged that abortion is not even an unenumerated right. It then manufactured from specified procedural rights enumerated in the Bill of Rights — rights which are totally unrelated to abortion — and from strained precedents involving “penumbras” and “emanations,” a general right to privacy in order to find a “privacy” right to abortion. . . .

It is therefore unsurprising that the majority in Roe v. Wade could not decide whether the general privacy right is located in the Ninth Amendment or the Fourteenth Amendment. Neither amendment, of course, is the locus of a general privacy right because none is conferred by the Constitution, nor could the Constitution ever confer such a right, for it would interfere with such truly compelling state interests as the pursuit of justice. The majority simply chose to ignore that unspeakable consequence by conjuring a general right to privacy for the limited purpose of ratifying abortion.

The spuriousness of the majority’s conclusion is evident in its flinching from the logical end of its reasoning: abortion anywhere at anytime. Instead, the majority delivered this:

The privacy right involved, therefore, cannot be said to be absolute. . . . We, therefore, conclude that the right of personal privacy includes the abortion decision, but that this right is not unqualified and must be considered against important state interests in regulation.

And so, the Court brought us right back to where we were in the beginning — without a general or absolute right to privacy.

There are, of course, federal and State laws that define specific areas of privacy. At the federal level, for example, there is the Medical Information Privacy and Security Act (MIPSA). As described by Wikipedia, MIPSA

contains important provisions requiring accesses to generate an audit trail, and for patients to be able to partition their data so that for example genetic information is not revealed when they go for a flu jab. Individuals have a right to access, copy, edit and augment their information.

Wikipedia summarizes State law thusly:

Most states in the U.S. grant a right to privacy and recognise four torts:

  1. Intrusion upon seclusion or solitude, or into private affairs;
  2. Public disclosure of embarrassing private facts;
  3. Publicity which places a person in a false light in the public eye; and
  4. Appropriation of name or likeness.

All such federal and State laws are carve-outs — delineations of specific areas of privacy. They are not general guarantees of privacy. Do we need even more carve-outs to deal with the “privacy crisis”? Let us begin by defining the real privacy problem.

Privacy in the Real World

You may, in spite of what I have just said, think that you have a “right” to privacy. But try that line with prospective creditors, who have a “right” to know enough about you to decide whether to extend credit to you; try that line with banks, which have a “right” to know enough about you so that they can safeguard your savings from impostors; and try that line with the police, who have a “right” (constitutionally) to obtain a warrant to search your home if you are suspected of a crime.

If you want absolute privacy you should not have a job (working for someone else), a credit card, a checking account, a brokerage account, a 401(k), a house, land, a car, a legalized marriage, children who were born in a hospital or educated formally, a formal education of your own, a telephone, an Internet connection, or almost any of the other trappings of what we call civilization. The real issue is the extent to which you are willing to forgo some aspects of privacy in order to work for someone else (other than the Mob), possess a credit card, etc.

Given that privacy is neither an absolute right nor something that many of us choose to purchase by forgoing the trappings of civilization, let’s consider what we really seek when we claim to seek privacy. Suppose that, unknown to you, someone gathers information about you that you had not intended to disclose. You have suffered no harm unless the gathering of such information

  • enables a person, business, or government to manipulate your behavior by presenting information or options in ways calculated to lead you to certain decisions (e.g., see my posts about “libertarian paternalism” here, here, here, and here)
  • causes unsubstantiated harm to your reputation
  • results in blackmail or the theft of your property
  • results in the imposition of a civil or criminal penalty for an act or acts that you did not commit.

Beyond that, there is no reason to give special preference to privacy over other considerations; for example, a lender’s need for information about your credit-worthiness, government’s legitimate interest in protecting citizens from terrorism.

PRIVACY ISSUES IN THE PRIVATE SECTOR

Dealing With “Identity Theft”

Let’s be clear about what is being stolen in “identity theft.” An identity thief’s real crime isn’t stealing a person’s identity, it’s using information about that person to steal from that person and/or to steal from others. With that understood, the solution to “identity theft” is straightforward: Fraud is fraud and theft is theft, and they ought to be prosecuted as such.

Moreover, businesses that abet “identity theft” through lax verification and security procedures should be held accountable for their misfeasance.

On to the tougher issue of how to cope with banks, lenders, vendors, and the like.

A Market Solution for Other Private-Sector Issues

Should there be restrictions on the scope of personal information that private data aggregators are allowed to gather? If so, how should those restrictions should be enforced? One option is individual choice, in which each person picks the set of privacy bargains that suits his or her taste for privacy, on the one hand, and ease of transacting business, on the other hand. The other option is for government to establish one-size-fits-all rules — even beyond those it already has laid down — such as a ban on the use of universal identification numbers (e.g., Social Security numbers) by banks, credit agencies, insurers, and the like.

The problem with one-size-fits-all rules — especially one as sweeping as a ban on the use of universal ID numbers — is that they make it harder and more expensive for consumers to transact business. A consumer’s credit rating, which now follows him wherever he goes, thanks (or no thanks) mainly to his Social Security number, is (for almost all consumers) a boon, not a bane. Without the SSN or some other universal identifier, we would revert the days of local and regional credit-rating agencies. The higher cost of verifying a purchasers’ credit would, of course, reduce the volume of transactions and lead to higher prices. Small businesses would be especially hard-hit.

So, beyond the obvious penalties for “identity theft” and for misfeasance on the part of businesses that hold personal information, the answer to the private-sector privacy quandary lies . . . in the private sector. The answer, specifically, is the use of what I will call “privacy brokers.” These would be companies that are qualified to explain to an individual his privacy options, and authorized to exercise the individual’s preferences on his behalf. Such firms would be fully knowledgeable of applicable laws and the ins-and-outs of the privacy policies of companies with which an individual might do business. (Bear with me as I explain why I’m not inventing a new and costly middleman.)

How would privacy brokers be paid? If they were paid by businesses, consumers rightly wouldn’t trust them. But how likely is it that consumers will shell out what looks like additional money for a service that, to most consumers, might seem unnecessary? After, in spite of all the personal information that’s afloat in the databases of businesses, credit-card issuers, and credit-rating agencies, relatively few consumers have been defrauded or otherwise compromised.

The answer, of course, is that consumers already are paying for the services of credit-rating agencies through the prices charged by businesses and the interest charged by credit-card issuers. It would be relatively easy for credit-rating agencies to transform themselves into privacy brokers. Privacy brokers would collect all of the information now required by creditors, but they would collect it as consumers’ agents, after duly informing consumers of their options and the risks and benefits of those options. Each consumer would agree to compensate his privacy broker by assigning a share of his credit purchases to the broker. Conveniently enough, the consumer’s creditors would no longer be paying the former credit-rating agency (now a privacy broker) a share of the consumer’s credit purchases for the same information. Thus the consumer would not see any increase in prices or interest charges.

Privacy brokers would compete on the basis of price, service, and reputation. If a privacy broker were to allow its data to be compromised, it would quickly lose customers to existing competitors and new entrants to the privacy-brokerage business. Moreover, privacy brokers — each with tens of millions of clients — would have considerable leverage over businesses’ privacy policies. As a selling point, privacy brokers could use that leverage on the behalf of their clients. Privacy brokers could, for example, negotiate reductions in the amount of personal information that is kept on consumers, ensure that consumers never have to opt-out when it comes to third-party use of personal information, and (most importantly) extract enforceable guarantees about the security of personal information. Those kinds of pro-consumer activities would be fostered by competition among privacy brokers.

My bottom line here is that there is an effective, efficient market answer to concerns about securing privacy vis-a-vis the private sector. But the private sector must act before Congress imposes an inefficient, one-size-fits-all, “solution” on us. There is still time to act, according to a story in Wired News (November 10), which says that “Congress is unlikely to pass any data-security bills by the end of the year, according to Hill watchers.”

PRIVACY VIS-A-VIS GOVERNMENT

Is a National ID Card a Good Idea?

A national ID card would be a good idea if its use would decrease the likelihood of terrorism, but it wouldn’t– as I will explain.

I have no objection to carrying an ID card. I already carry several, the possession of which by another person would give that person access to just about anything he might want to know about me: my date of birth, SSN, health history, driving record, criminal record (zilch, sorry), and so on.

A well-designed ID card might even prevent some kinds of “identity theft” if the identifying information embedded in the card could be read only by secure machines and would not be accessible to opportunistic thieves (e.g., unskilled restaurant and department-store employees).

But well-heeled terrorist organizations would find ways to create seemingly legitimate ID cards for their members. And there’s the rub. Possession of a single piece of ID, one that is presumed to be authoritative, would make it easier for terrorists to gain access to vulnerable sites (e.g., passenger aircraft) and to elude investigation by deflecting suspicion.

Uncle Sam already knows (or can know) everything about me. A national ID card wouldn’t make a difference in that respect. But it would make it easier for terrorists to terrorize. The card is therefore a bad idea.

Privacy or Liberty?

It is sometimes necessary for government to intrude on privacy for the sake of liberty. If, for example, the punishment of crime fosters the security of life, limb, and property by deterring yet more crime, then liberty is served by certain types of governmental intrusion on privacy (e.g., searches of private property, questioning of suspects and witnesses, and compulsion of testimony in criminal cases).

Similarly, the defense of the United States (which includes the defense of Americans and American interests abroad), may justify governmental intrusions on privacy. But there must be restraints on governmental intrusion to ensure that no instance of intrusion is broader than required for the accomplishment of a legitimate governmental function. From a libertarian perspective, that rules out any governmental intrusion of privacy which isn’t aimed at promoting justice or defending citizens and their property.

Thus, for example, government is improperly intrusive when it issues a census questionnaire that asks for more information than is necesary to enumerate the population. By contrast, government is properly vigilant when it engages in clandestine surveillance that is warranted by a known threat to the life and limb of Americans (e.g., the continuing threat from al Qaeda).

Those who reflexively oppose certain provisions of the Patriot Act (e.g., the issuance of national security letters for library reading lists) and those who bemoan NSA intercepts of international communications want privacy to take precedence over other manifestations of liberty. As I wrote here, “There can be no absolute liberties where life is at stake. Without life, liberty is meaningless.” The Framers of the Constitution recognized that principle:

. . . When the Fourth Amendment was written, the sole remedy for an illegal search or seizure was a lawsuit for money damages. Government officials used warrants as a defense against such lawsuits. Today a warrant seems the police officer’s foe — one more hoop to jump through — but at the time of the Founding it was the constable’s friend, a legal defense against any subsequent claim. Thus it was perfectly reasonable to specify limits on warrants (probable cause, particular description of the places to be search and the things to be seized) but never to require their use. (From the “Warrant Clause,” by Prof. William J. Stuntz of Harvard Law in The Heritage Guide to the Constitution, pp. 326-9.)

Thus, by the original meaning of the Constitution, all warrantless searches may be permissible. But judges and legislators have so changed the meaning of the Constitution that these views have instead become prevalent: government cannot conduct searches without a warrant; warrantless searches are “invasions of privacy” (as if privacy were either constitutionally guaranteed or some sort of “natural right’). Moreover, there is — especially among “civil libertarians,” anti-American Americans, and right-wing loonies — a preference for an undifferentiated right to “privacy” over “the common defence, “to provide for which the Constitution was adopted. Antidotes to such views may be found here:

President had legal authority to OK taps (Chicago Tribune)
Our domestic intelligence crisis (Richard A. Posner)
Many posts by Tom Smith of The Right Coast (start here and scroll up)
Eavesdropping Ins and Outs (Mark R. Levin, writing at National Review Online)
The FISA Act And The Definition Of ‘US Persons’ (Ed Morrissey of Captain’s Quarters)
A Colloquy with the Times (John Hinderaker of Power Line)
September 10 America (editorial at National Review Online)
A Patriot Acts (Ben Stein, writing at The American Spectator)
More on the NSA Wiretaps (Dale Franks of QandO)
The President’s War Power Includes Surveillance (John Eastman, writing at The Remedy)
Warrantless Intelligence Gathering, Redux (UPDATED) (Jeff Goldstein, writing at Protein Wisdom)
FISA Court Obstructionism Since 9/11 (Ed Morrissey of Captain’s Quarters)
FISA vs. the Constitution (Robert F. Turner, writing at OpinionJournal)
Wisdom in Wiretaps (an editorial from OpinionJournal)
Under Clinton, NY Times Called Surveillance a Necessity (William Tate, writing at The American Thinker)
Experts’ Letter on NSA Program (by Tom Smith of The Right Coast)
LEGAL AUTHORITIES SUPPORTING THE ACTIVITIES OF THE
NATIONAL SECURITY AGENCY DESCRIBED BY THE PRESIDENT
(U.S. Department of Justice)
Terrorists on Tap (Victoria Toensing, writing at OpinionJournal)
Letter from Chairman, Senate Intelligence Committee, to Chairman and Ranking Member of Senate Judiciary Committee
Letter from H. Bryan Cunningham to Chairman and Ranking Member of Senate Judiciary Committee
Has The New York Times Violated the Espionage Act? (article in Commentary by Gabriel Schoenfeld)
Point of No Return (Thomas Sowell, writing at RealClearPolitics)
Letter from John C. Eastman to Chairman of House Judiciary Committee
FISA Chief Judge Speaks Out, Bamford Misinforms (a post at The Strata-Sphere)
DoJ Responds to Congressional FISA Questions (another post at The Strata-Sphere)

As for the president’s authority in foreign affairs — which encompasses the defense of the nation — I quote Sai Prakash, who writes about the Constitution’s Executive Vesting Clause (Article II, Section 1, Clause 1) in The Heritage Guide to the Constitution (pp. 179-82):

The [Executive Vesting Clause] . . . accords the President those foreign-affairs authorities not otherwise granted to Congress or shared with the Senate. . . .

The Articles of Confederation lacked an independent chief executive. Instead, the Continental Congress exercised the executive power, appointing and dominating the secretaries of the executive departments. Unfortunately, law execution under the direction of a distracted, plural executive was neighter vigorous nor swift. Congress likewise proved a poor steward of foreign affairs, with American diplomats complaining that Congress could not act with the requisite speed or secrecy. . . .

Resolving to avoid the problems plaguing state and national executives, the Constitution’s makers created an energetic, responsible, and unified executive. . . . The Anti-Federalists well understood the Framers’ design and criticized the unitary executive [but they lost the argument: ED] . . . .

. . . [T]he delegates [to the Constitutional Convention] spoke of the President’s principal foreign-affairs role, oftentimes referring to the Senate’s role in treaty-making as a limited exception to the grant of foreign-affairs authority to the President. . . .

. . . [T]raditional rules of statutory interpretation require us to take seriously the differences in phrasing across the three vesting clauses. Artilce I, Section 1 (“All legislative Powers herein granted shall be vested in a Congress of the United States. . . .”) makes clear that it vests no authorities separate from those enumerated in the rest of Article I. In contrast, Article III, Section 1 (“The judicial Power of the United States, shall be vested in one supreme Court, and in such inferior Courts as the Congress may . . . establish.”) clearly vests the federal courts with judicial authority. The Executive Vesting Clause reads like its Article III counterpart, in sharp contrast to the Article I introductory clause. . . .

In a case touching upon foreign affairs, the judiciary has recently reaffired that the executive power grants foreign-affairs authority to the President. See American Insurance Ass’n v. Garamendi (2003). This marks a departure from prior case law, which had grounded the executive’s foreign-affairs powers not in any constitutional text, but in necessity and sovereignty. See United States v. Curtiss-Wright Export Corp. (1936).

John Yoo and James C. Ho, writing in the same volume about the president’s role as commander in chief (pp. 195-8), have this to say:

. . .[S]ome originalist scholars have concluded that Congress’s war power is limited to its control over funding and its power to impeach executive officers. They contend that the President is constitutionally empowered to engage in hostilities with whatever resources Congress has made available to the executive. . . .

In summary, the argument for executive initiative rests on the background understanding that the vesting of “executive Power” and the “Commander in Chief” designation together constitute a substantive grant of authority to the President to conduct military operations.

It is clear that it is fully within the president’s constitutional authority to order electronic surveillance of communications between persons in the U.S. and persons overseas. It is especially clear that such surveillance is legitimate because of its war-related purpose.

The Framers intended the executive to be a passive enforcer of laws passed by Congress that bear on domestic affairs (and those laws were to be strictly limited in scope by Article I, Section 8, of the Constitution). At the same time, the Framers intended the executive to defend Americans actively against enemies foreign and domestic. No one has put it more clearly than Justice Felix Frankfurter:

. . . [W]e have had recent occasion to quote approvingly the statement of former Chief Justice Hughes that the war power of the Government is ‘the power to wage war successfully.’ . . . Therefore, the validity of action under the war power must be judged wholly in the context of war. That action is not to be stigmatized as lawless because like action in times of peace would be lawless. To talk about a military order that expresses an allowable judgment of war needs by those entrusted with the duty of conducting war as ‘an unconstitutional order’ is to suffuse a part of the Constitution with an atmosphere of unconstitutionality. The respective spheres of action of military authorities and of judges are of course very different. But within their sphere, military authorities are no more outside the bounds of obedience to the Constitution than are judges within theirs. . . . To recognize that military orders are ‘reasonably expedient military precautions’ in time of war and yet to deny them constitutional legitimacy makes of the Constitution an instrument for dialetic subtleties not reasonably to be attributed to the hard-headed Framers, of whom a majority had had actual participation in war. If a military order such as that under review does not transcend the means appropriate for conducting war, such action . . . is as constitutional as would be any authorized action by the Interstate Commerce Commission within the limits of the constitutional power to regulate commerce.

To get down to cases — the case of NSA surveillance, in particular — Tom Smith of The Right Coast has this to say:

. . . [I]t strikes me as just wrong, and very counter-intuitive, to think of the Fourth Amendment as limiting the President’s Article II wartime powers at all. If this were the case, it would mean something like the President’s powers to wage war against those US citizens who had decided to fight for the enemy, had to be conducted within something like the proscriptions of constitutional criminal procedure. Surely, that can’t be right. This is not to say the President’s Article II powers are unlimited. That is what, I take it, the Youngstown Steel case is about. But if FISA really does subject Article II wartime powers to the procedural rigamarole in FISA, then it would be unconstitutional. . . . So where that leaves us, it seems to me, is fairly clear. The President did not violate FISA, as that statute has been interpreted by the highest court other than the Supreme Court that has has the power to interpret it, and indeed specializes in interpreting it, so presumably is due some deference for that, and thus, for the President’s action to be illegal, it would have to have exceeded his Article II powers. . . . While it is logically possible that the NSA program exceeded the Article II powers, it strikes me as a very implausible claim. We are not talking here about nationalizing the steel industry, or interring all Muslims or something of that sort. We are talking about data-mining calls and emails which have an elevated probability of being connected to terrorism, because they are within a network anchored by phone numbers or email addresses found in al Qaeda phones or computers, or because of charateristics of the calls or emails. If anyone thinks . . . that doing that is outside the President’s Article II powers, they have a ludicrously narrow conception of those powers, a conception simply inconsistent with the President’s discharge of his duty to prevent future catastrophic terrorist attacks on the people of the United States. That alone suggests it is an incorrect conception of those powers, a fact even the Supreme Court is likely to notice.

What we see in the dispute about such things as the Patriot Act and NSA surveillance is a failure to distinguish between the free exercise of liberty, on the one hand, and the necessary exercise of governmental power to preserve liberty, on the other hand. That failure is unwitting — but nonetheless dangerous — when it emanates from persons who simply have no understanding of the Constitution or who wish to live in a dream-world in which government simply cannot encroach upon their privacy for any reason. That failure is entirely witting — and essentially subversive — when it emanates from persons who simply wish to twist the meaning of the Constitution so that it serves their anti-libertarian agenda: statism at home and surrender abroad.

What About Government Data-Mining?

There is, nevertheless, a real threat that surveillance could lead to the creation of massive databases that could be misused by government officials. Tom Smith observes that

technology on the data mining front is moving very fast. In fact, the term data mining is too narrow and somewhat dated. For just a taste of one cutting edge approach, check this out. This company takes a semantic network approach to unstructured databases. There are other approaches as well.

What I am getting at is, if the government puts together a huge database — and . . . it is within their capabilities, well within — then with tech from the private sector, not to mention what NSA geniuses come up with, then what they can figure out about individuals, firms, and so on, really does not have any clear limit. It is not at all far fetched to say if the government wanted to, it could know more about people than they know about themselves, a lot more.

There are many questions here. The first is whether the storage of this information violates constitutional protections. I think sentience may make some difference here. If every email you have sent in the last five years is stored in some place the government has access to, but they do not actually access it, then I’m not sure your privacy has been affected at all.

But here is something that worries me, though maybe it shouldn’t. Search algorithms are already astonishingly powerful. They are advancing rapidly. It may be possible soon to pull out from such things as patterns of emails, phone calls, puchases and the like, people likely to be involved in drug trafficing, money laundering, whatever. If an impartial algorithm can troll through a database and produce a list of people who really are, to some high degree of probability, connected with herion trafficking say, should that be enough to support a warrant to start the really intrusive, traditional sort of surveillance?

I have already made clear that I think the President should be able to do exactly this if it is necessary to fight a war. But law enforcement agencies doing it does strike me as pretty creepy. It could be an extremely powerful law enforcement tool, though.

It is one thing to create databases that enable law-enforcement officials to detect and avert attacks on Americans and Americans’ interests, at home and abroad. It is quite another thing to create and use such databases for the purpose, say, of anticipating or imagining criminal conspiracies.

How, then, is it possible to protect Americans from acts of war, terrorism, insurrection, or rebellion without subjecting them to the very real danger of overreaching on the part of government officials — who will be tempted to misuse the information to which they have access? We learned — on September 11, 2001 — that it is folly to put a firewall between domestic and foreign intelligence. The firewall must be placed elsewhere; here is how I would construct it and where I would place it:

  • No government agency (including contractors) may collect or store personal information other than that which is gathered pursuant to a specific, constitutionally authorized exercise of authority (e.g., issuing driving licenses, maintaining tax and property records, investigating crimes that have been reported, maintaining records of arrests and convictions, algorithmically surveilling communications for the purpose of detecting possible terrorist activity).
  • The federal government (and only particular units of the federal government, as authorized by law) may collate such information in a database or databases that may be used only for the purposes of detecting conspiracies to commit acts of war, terrorism, insurrection, or rebellion against the United States, a State, or the citizens of the United States or their property.
  • Information gleaned from such a database may be used, without judicial approval, to avert an imminent attack or to respond to an attack.
  • Otherwise, the information gleaned from such a database may be used, with judicial approval, to initiate surveillance of persons or property within the jurisdiction of the United States — and then only for the purpose of preventing acts of war, terrorism, insurrection, or rebellion.
  • Actions against persons or property outside the jurisdiction of the United States must be taken in accordance with the 1973 War Powers Resolution and/or applicable treaties.
  • Information gleaned from such a database may never be used for any purpose other than the prevention of or response to acts of war, terrorism, insurrection, or rebellion against the United States, a State, or the citizens of the United States or their property.

Details would be supplied by statute. Compliance would be monitored by a commission; the president, Congress (by concurrent resolution), and the chief justice of the United States each would appoint one-third of the commission’s members.

SUMMARY AND CONCLUSION

Privacy is not, never has been, and never should be an absolute right. To make it such would be incompatible with the defense of life, liberty, and property.

With respect to privacy in the private sector, we should remember that a one-size-fits-all regulation has the predictable effect of fitting almost no one and generally forcing buyers and sellers to make inferior choices. Government should protect Americans from force and fraud. Beyond that, it is up to Americans to decide for themselves how much privacy they wish to enjoy in their voluntary transactions. They could do so quite effectively, and at no additional cost, with the help of “privacy brokers” — firms that would do for consumers what they now do for businesses.

Turning to privacy vis-a-vis government, we should remember that government legitimately seeks to protect the lives and property of Americans, so that they can pursue happiness as they see it. Privacy absolutists — those who place privacy above security — endanger us all. They would render us defenseless against very real and potent threats to liberty and the pursuit of happiness. The idea of a national ID card fails because it would create a vulnerability, not because it would threaten privacy in the land of the ubiquitous Social Security number. On the other hand, there is a legitimate place for the surveillance of telecommunications and for data-mining, as long as the use of both is confined to the protection of life, liberty, and property against our enemies. A way of ensuring that surveillance and data-mining are not misused is to establish an oversight commission comprising members of all three branches of the federal government.

The legitimate function of the state is to protect its citizens from predators and parasites, it is not to protect predators and parasites. The critics of aggressive defense like to proclaim their dedication to civil liberties, but their statist agenda in domestic matters betrays their selective dedication to liberty.

There is a balance to be struck between privacy and liberty, but it should not — and need not — be struck in favor of our enemies. The Constitution is, first and foremost, a mutual defense pact, not a suicide pact.

Related collections of posts:
The Constitution: Original Meaning, Subversion, and Remedies
Economics: Principles and Issues
War, Self-Defense, and Civil Liberties

The "Privacy Crisis"

This is an appendix to “Privacy: Variations on the Theme of Liberty.”

In the first half of 2005, when “identity theft” and the possibility of a national ID card were hot stories, I was sure that the mainstream media would declare a “privacy crisis.” But the MSM has the attention span of a fly, and so its gaze wandered to other issues, not the least of them being the indictment of VP Cheney’s chief of staff for allegedly having committed a crime by lying about something he might or might not have said about a crime that probably wasn’t committed. The MSM returned to the privacy issue in a big way with the disclosure in December that President Bush had authorized warrantless intercepts by the National Security Agency of communications between persons in the U.S. and overseas.

Here, then, is a summary of what the media — if they had the attention span of a two-year old — would call a “privacy crisis.”

My exposure to the “privacy crisis” began on February 5, 2005, when I watched “this amusing advert” (courtesy: Alex Tabarrok at Marginal Revolution).

In late February and early March I learned of the massive thefts of personal information from databases at ChoicePoint and LexixNexis. Those thefts led predictably to calls for more stringent regulation of private data aggregators, which in mid-March encountered resistance on the part of ChoicePoint and LexisNexis to a ban on the sale of Social Security numbers.

Also in mid-March, Glen Whitman of Agoraphilia weighed in with “Accomplices to Identity Theft,” which points to an MSN Money article that pins some of the blame for identity theft on lenders:

Now that intruders have raided a second big consumer database, we’re bound to hear lots more calls for increased federal oversight of the companies that buy and sell our personal information.

What will get far less attention, unfortunately, is the fact that these incursions wouldn’t be so incredibly damaging to consumers’ finances if lenders didn’t make that information worth stealing in the first place.

Think about it: The only reason an identity thief cares about knowing your Social Security Number or other private data is that it can be used to open accounts in your name and commit fraud. Lax verification procedures at credit card companies and other financial institutions make that possible — even easy.

“Companies are so eager to grant credit,” said Linda Foley, executive director of the Identity Theft Resource Center, “that they will grant it to almost anyone for any reason.”

(Whitman reasonably asked whether “lenders [should] be made liable for damages to identity theft victims, or punished in some other way when they facilitate identity theft, in order to give them an incentive to adopt more scrupulous lending practices?”)

On March 27, Wired News worried me with a report that “Amazon Knows Who You Are“; thus:

Amazon.com has one potentially big advantage over its rival online retailers: It knows things about you that you may not know yourself.Though plenty of companies have detailed systems for tracking customer habits, both critics and boosters say Amazon is the trailblazer, having collected information longer and used it more proactively. It even received a patent recently on technology aimed at tracking information about the people for whom its customers buy gifts.

Amazon sees such data gathering as the best way to keep customers happy and loyal, a relationship-building technique that analysts consider potentially crucial to besting other online competitors.

“In general, we collect as much information as possible such that we can provide you with the best feedback,” said Werner Vogels, Amazon’s chief technology officer.

But some privacy advocates believe Amazon is getting dangerously close to becoming Big Brother with your credit card number.

I was next faced with William Safire’s dire warning about the end of privacy in his April 10 review of Robert O’Harrow Jr.’s No Place to Hide and Patrick Radden Keefe’s Chatter: Dispatches from the Secret World of Global Eavesdropping:

O’Harrow notes that many consumers find it convenient to be in a marketing dossier that knows their personal preferences, habits, income, professional and sexual activity, entertainment and travel interests and foibles. These intimately profiled people are untroubled by the device placed in the car they rent that records their speed and location, the keystroke logger that reads the characters they type, the plastic hotel key that transmits the frequency and time of entries and exits or the hidden camera that takes their picture at a Super Bowl or tourist attraction. They fill out cards revealing personal data to get a warranty, unaware that the warranties are already provided by law. ”Even as people fret about corporate intrusiveness,” O’Harrow writes about a searching survey of subscribers taken by Conde Nast Publications, ”they often willingly, even eagerly, part with intimate details about their lives.”

Such acquiescence ends — for a while — when snoopers get caught spilling their data to thieves or exposing the extent of their operations. The industry took some heat when a young New Hampshire woman was murdered by a stalker who bought her Social Security number and address from an online information service. But its lobbyists managed to extract the teeth from Senator Judd Gregg’s proposed legislation, and the intercorporate trading of supposedly confidential Social Security numbers has mushroomed.

Safire moved on to “snooping” by the government and its links to private data-mining:

When an article in The New York Times by John Markoff, followed by another in The Washington Post by O’Harrow, revealed the Pentagon’s intensely invasive Total Information Awareness program headed by Vice Admiral John Poindexter of Iran-Contra infamy, a conservative scandalmonger took umbrage. (”Safire’s column was like a blowtorch on dry tinder,” O’Harrow writes in the book’s only colorful simile.) The Poindexter program’s slogan, ”Knowledge Is Power,” struck many as Orwellian. Senators Ron Wyden and Russell D. Feingold were able to limit funding for the government-sponsored data mining, and Poindexter soon resigned. A Pentagon group later found that ”T.I.A. was a flawed effort to achieve worthwhile ends” and called for ”clear rules and policy guidance, adopted through an open and credible political process.” But O’Harrow reports in ”No Place to Hide” that a former Poindexter colleague at T.I.A. ”said government interest in the program’s research actually broadened after it was apparently killed by Congress.”

There are many issues swirling around in the maelstrom of utterances about privacy….

Of all the companies in the security-industrial complex, none is more dominant or acquisitive than ChoicePoint of Alpharetta, Ga. This data giant collects, stores, analyzes and sells literally billions of demographic, marketing and criminal records to police departments and government agencies that might otherwise be criticized (or de-funded) for building a national identity base to make American citizens prove they are who they say they are. With its employee-screening, shoplifter-blacklisting and credit-reporting arms, ChoicePoint is also, in the author’s words, ”a National Nanny that for a fee could watch or assess the background of virtually anybody.”…

A second book — not as eye-opening as O’Harrow’s original reporting but a short course in what little we know of international government surveillance — is ”Chatter: Dispatches from the Secret World of Global Eavesdropping,” by Patrick Radden Keefe. This third-year student at Yale Law School dares to make his first book an examination of what he calls the liberty-security matrix….

Keefe’s useful research primer on today’s surveillance society, and especially O’Harrow’s breakthrough reporting on the noxious nexus of government and commercial snooping, open the way for the creation of privacy beats for journalism’s coming generation of search engineers. A small furor is growing about the abuse of security that leads to identity theft. We’ll see how long the furor lasts before the commercial-public security combine again slams privacy against the wall of secrecy….

I next wrung my hands about the national ID card that seems to be in the making (via Wired News):

02:00 AM May. 12, 2005 PT

Legislation supporting a standardized national driver’s license may have won unanimous approval in the Senate on Tuesday, but the bill’s apparently smooth passage left some jagged edges in its wake….

Supporters of the bill say it would prevent terrorists and undocumented immigrants from obtaining legitimate documents that would help them move freely through the country. Last year, the 9/11 Commission called for tightening control over government-issued IDs because 18 of the 19 hijackers in the Sept. 11, 2001, terror attacks used U.S. IDs to pass through airport security.

But opponents of the bill say it would create a national ID card and a de facto national database — a concept that Congress rejected when it was first proposed several years ago.

The act would force states to produce standardized, tamper-resistant driver’s licenses that would include machine-readable, encoded data. States wouldn’t be required to comply. But those that don’t comply would create hardship for residents, who wouldn’t be able to use their licenses as official identification to travel on airplanes, collect federal benefits or gain access to federal buildings.

On July 15 Wired News reported on a bill now before Congress that “strives to protect privacy“:

A bipartisan group of senators introduced comprehensive identity-theft legislation Thursday that throws some of the burden for preventing the increasingly common crime onto businesses and other organizations that collect personal information. The new legislation also would give consumers more control over their personal data.

The Identity Theft Protection Act, introduced in the Senate commerce committee by a bipartisan coalition, addresses problems with recent high-profile data breaches by requiring entities that collect sensitive information, such as Social Security numbers, to secure the data physically and technologically and to notify consumers nationwide when data is compromised.

The bill also allows consumers to freeze their credit reports to help prevent unauthorized parties from accessing private data or opening new credit accounts in an individual’s name without their permission.

On July 17 Wired News reported about the threat of “Google-opoly”:

Google is at once a powerful search engine and a growing e-mail provider. It runs a blogging service, makes software to speed web traffic and has ambitions to become a digital library. And it is developing a payments service.

Although many internet users eagerly await each new technology from Google, its rapid expansion is also prompting concerns that the company may know too much: what you read, where you surf and travel, whom you write.

“This is a lot of personal information in a single basket,” said Chris Hoofnagle, senior counsel with the Electronic Privacy Information Center. “Google is becoming one of the largest privacy risks on the internet.”

An InformationWeek Weblog entry dated November 4 had this to say about “spychips”:

“Spychips” is a scary new book out by consumer-privacy advocates Katherine Albrecht and Liz McIntyre, and it should be must-reading for anyone who doesn’t “get” the concerns over RFID chips. Even if half of what the book says in the planning or thinking stages is true, that’s more than enough to make anyone nervous about the potential — or even planned, if the authors are to be believed — misuse of this technology.

Albrecht is by no means without bias here — she also is the founder and director of Consumers Against Supermarket Privacy Invasion and Numbering (CASPIN), which, among other things, has organized events such as the recent consumer protest against RFID use at a Dallas Wal-Mart. She definitely has an ax to grind.

So it would be easy to dismiss the concerns highlighted in the book, and the evidence backing them were it not for where Albrecht and McIntyre dug up some of this stuff. They wielded the Freedom Of Information Act, hunted through corporate Web sites, crawled through company reports, and excavated some very interesting proposals filed at the patent office.
They even checked up on the government. Much of this is stuff you could track yourself, except for perhaps a page with what Albrecht claimed was misleading information on RFID, which allegedly was removed from a medical-products company’s Web site after the publication of “Spychips.”

McIntyre is quoted in a CASPIN release saying that “…companies like IBM, Procter & Gamble, Bank of America, BellSouth, and Philips will also have some explaining to do when people read about their patent pending ways to use RFID to track people through the things they wear, carry, and throw away. Consumers will realize these companies have an RFID agenda that should concern us all.” Like what? Well, like embedding the chips in shoes so that the wearer can be tracked in RFID reader-equipped buildings. There is even a reference to a company that wants to implant RFID chips inside of people. How nice.

Indeed, as RFID reporter Laurie Sullivan notes in a recent story, the start of what has privacy advocates and some consumers worried is already happening: “Check the next Hewlett-Packard printer you buy at Wal-Mart or that Ann Taylor blouse you picked up. Chances are a radio-frequency ID tag came home with your purchase.”

I don’t think anyone cares about the really neat uses of RFID — to track Alzheimer patients or newborns, manage inventory, or track the shipment of goods. Sun, for example, is trialing an RFID-fueled asset-tracking service that supposedly lets the company verify any item’s location and physical characteristics within an hour, without linking to a network. And Ford just announced an RFID just-in-time delivery system, which will enable better coordination of 40 to 50 shipments a day of truck parts. Lots of people would like their appliances and cars to alert them before a major failure.

But none of this changes the fact that RFID can be used badly, invasively, and secretly, something “Spychips” makes plenty clear. Even potentially useful applications, such as installing biometric or RFID chips in passports and licenses, have as many cons as there are pros. It’s worth stopping to take a breath and think this stuff out. Which is what some people are doing.

Sullivan has reported on a bill pending in the California Senate that is seeking to put a three-year moratorium on using RFID chips in various government-issued documents — driver’s licenses, library cards, etc. And in a somewhat related action, Microsoft is pushing for a national, federal standard on protecting consumer data. Obviously, one of the concerns about RFID tracking is who will have access to any data that is collected.

To get an idea of where Albrecht is coming from, and to judge her views on RFID for yourself, listen to Sullivan’s two-part podcast with the privacy advocate and author. You can access part one here.

Not to let the Patriot Act go unmentioned, there’s this (from Wired News of November 6):

Lawmakers expressed concern Sunday [November 6] that the FBI was aggressively pushing the powers of the anti-terrorist USA Patriot Act to access private phone and financial records of ordinary people.”We should be looking at that very closely,” said Sen. Joseph Biden (D-Delaware), who is a member of the Senate Judiciary Committee. “It appears to me that this is, if not abused, being close to abused.”

Sen. Chuck Hagel (R-Nebraska), a member of the Senate Intelligence Committee, agreed, saying the government’s expanded power highlights the risks of balancing national security against individual rights.

“It does point up how dangerous this can be,” said Hagel, who appeared with Biden on ABC’s This Week.

Under the Patriot Act, the FBI issues more than 30,000 national security letters allowing the investigations each year, a hundredfold increase over historic norms, The Washington Post reported Sunday, quoting unnamed government sources.

The security letters, which were first used in the 1970s, allow access to people’s phone and e-mail records, as well as financial data and the internet sites they surf. The 2001 Patriot Act removed the requirement that the records sought be those of someone under suspicion.

As a result, FBI agents can review the digital records of a citizen as long as the bureau can certify that the person’s records are “relevant” to a terrorist investigation. . . .

Issued by the FBI without review by a judge, the letters are used to obtain electronic records from “electronic communications service providers.” Such providers include internet service companies but also universities, public interest organizations and almost all libraries, because most provide access to the internet.

Last September in an ACLU lawsuit, a federal judge in New York struck down this provision as unconstitutional on grounds that it restrains free speech and bars or deters judicial challenges to government searches. That ruling has been suspended pending an appeal to the New York-based 2nd U.S. Circuit Court of Appeals.

In a hearing last week the court suggested it might require the government to permit libraries, major corporations and other groups to challenge FBI demands for records.

The Patriot Act provision involving national security letters was enacted permanently in 2001, so it was not part of Congress’ debate last summer over extending some Patriot Act provisions.

As the Dec. 31 deadline has approached for Congress to renew provisions of the act, the House and Senate have voted to make noncompliance with a national security letter a criminal offense.

Finally, on December 16, The New York Times disclosed the NSA intercepts, about which an editorialist at Wired News erroneously wrote this:

This week, The New York Times revealed that the Bush administration ignored the Foreign Intelligence Surveillance Act, or FISA, and intercepted telephone calls and e-mails from American citizens without a warrant. FISA requires that investigators provide a judge with evidence that there’s reason to believe the person they plan to place under surveillance is an agent of a foreign power. . . .

There is no legal justification for these warrantless interceptions, which included calls to and from American citizens.

John Schmidt, a former associate attorney general in the Clinton administration, set the record straight:

President Bush’s post- Sept. 11, 2001, authorization to the National Security Agency to carry out electronic surveillance into private phone calls and e-mails is consistent with court decisions and with the positions of the Justice Department under prior presidents.

The president authorized the NSA program in response to the 9/11 terrorist attacks on America. An identifiable group, Al Qaeda, was responsible and believed to be planning future attacks in the United States. Electronic surveillance of communications to or from those who might plausibly be members of or in contact with Al Qaeda was probably the only means of obtaining information about what its members were planning next. No one except the president and the few officials with access to the NSA program can know how valuable such surveillance has been in protecting the nation.

In the Supreme Court’s 1972 Keith decision holding that the president does not have inherent authority to order wiretapping without warrants to combat domestic threats, the court said explicitly that it was not questioning the president’s authority to take such action in response to threats from abroad.

Four federal courts of appeal subsequently faced the issue squarely and held that the president has inherent authority to authorize wiretapping for foreign intelligence purposes without judicial warrant. . . .

The passage of the Foreign Intelligence Surveillance Act in 1978 did not alter the constitutional situation. That law created the Foreign Intelligence Surveillance Court that can authorize surveillance directed at an “agent of a foreign power,” which includes a foreign terrorist group. Thus, Congress put its weight behind the constitutionality of such surveillance in compliance with the law’s procedures.

But as the 2002 Court of Review noted, if the president has inherent authority to conduct warrantless searches, “FISA could not encroach on the president’s constitutional power.”

Every president since FISA’s passage has asserted that he retained inherent power to go beyond the act’s terms. Under President Clinton, deputy Atty. Gen. Jamie Gorelick testified that “the Department of Justice believes, and the case law supports, that the president has inherent authority to conduct warrantless physical searches for foreign intelligence purposes.” . . .

Should we be afraid of this inherent presidential power? Of course. If surveillance is used only for the purpose of preventing another Sept. 11 type of attack or a similar threat, the harm of interfering with the privacy of people in this country is minimal and the benefit is immense. The danger is that surveillance will not be used solely for that narrow and extraordinary purpose.

But we cannot eliminate the need for extraordinary action in the kind of unforeseen circumstances presented by Sept.11. I do not believe the Constitution allows Congress to take away from the president the inherent authority to act in response to a foreign attack. That inherent power is reason to be careful about who we elect as president, but it is authority we have needed in the past and, in the light of history, could well need again.

(For more on the NSA issue, go here and follow the links at the end of the post.)

Risk and Regulation

Robert Higgs makes this acute observation:

Risk is an inescapable condition. However much people may prefer to live in a world of complete certainty, they simply cannot do so. Just banishing risk, whether by regulation or otherwise, is not a feasible option.

Higgs goes on to argue against the irrationality of drug-safety regulation; for example:

Whether the condition to be treated is life-threatening or simply unpleasant, the [Food and Drug Administration] requires the same rigid, elaborate, and time-consuming testing. Once again, the regulators frustrate the desires of consumers by insisting that one size (testing procedure) fits all (drugs and patients), regardless of the urgency with which consumers desire access to certain drugs. In some cases this regulatory intransigence creates the absurd situation in which the FDA denies dying patients access to a new drug because the manufacturer has not yet established beyond a reasonable doubt that the drug will not harm the users.

Rationality will get you nowhere in the face of massive ignorance. The ability of government bureaucracies to write regulations leads most Americans to believe that those regulations will “solve problems.” When a “problem” is not solved because actually solving it would be prohibitively expensive (as in reducing traffic fatalities to zero), Americans assume that “they” (corporations, for example) have simply found a “loophole” or “bought” someone. That kind of thinking leads, inexorably, to more regulation. It is beyond the ken of most Americans that regulation creates problems rather than solving them. Those unseen problems are the loss of freedom and fortune.

Other related posts:

Fear of the Free Market — Part I
Fear of the Free Market — Part II
Fear of the Free Market — Part III

The Paradox of Libertarianism

Chris Matthew Sciabarra’s article, “Libertarianism,” first appeared in the International Encyclopedia of Economic Sociology (2006, pp. 403-7). Sciabarra leads off with this:

Libertarianism is the political ideology of voluntarism, a commitment to voluntary action in a social context, where no individual or group of individuals can initiate the use of force against others.

Sciabarra’s rendition of libertarianism emphasizes the non-aggression principle. My version has a somewhat different emphasis and allows for a minimal state:

If you are doing no harm to anyone, no one should harm you physically, coerce you, defraud or deceive you, steal from you, or tell you how to live your life. “No one” includes government, except to the extent that government is empowered — by the people — to defend life, liberty, and property through the circumscribed use of police, courts, and armed forces.

The first sentence of my version is operationally equivalent to the quotation I pulled from Sciabarra’s entry. To put it more simply:

The core of libertarianism is liberty: briefly, the negative right to be left alone — in one’s person, pursuits, and property — as long as one leaves others alone.

The problem with all such formulations, however, is that they gloss over two important questions:

  1. What is harm and who defines it?
  2. How does one ensure that one is “left alone” in a world where there are predators and parasites who will not subscribe voluntarily to a pact of mutual restraint?

The paradox of libertarianism lies in the answers to those two questions, which I’ll answer in reverse order.

Here is how one ensure that one is “left alone”:

  1. All members of a group agree as to what specifically constitutes harm.
  2. All members of the group agree to honor the obligation to leave other members alone, as long as those other members do not commit acts that are recognized as harmful.
  3. By the same token, all members of the honor the obligation to defend a fellow member or members against predators (renegades within the group, or outsiders).

The “catch” is point 1, which requires an answer to the question “What is harm and who defines it?”

To be a member of the group and to merit its protection (through mutual restraint and mutual defense) requires acceptance of a common, specific definition of harm. Various members might prefer different definitions. (For example, some might view abortion as harmless; some might view it as the murder of a prospective member of the group; and others might view it as an act that will inevitably lead to harm because it invites, say, euthanasia.) But unless each member subscribes to the same, specific definition of harm there can be no basis for mutual restraint — or for mutual defense. Where some see harm — from other members of the group or from outsiders — others may see no harm.

In summary: Liberty rests on an agreed definition of harm, and on an accompanying agreement to act with mutual restraint and in mutual defense. Given the variety of human wants and preferences, the price of mutual restraint and mutual defense is necessarily some loss of liberty. That is, each person must accept, and abide by, a definition of harm that is not the definition by which he would abide were he able to do so. But, in return for mutual restraint and mutual defense, he must abide by that compromise definition.

That insight carries important implications for the “anything goes” or “do your own thing” school of pseudo-libertarianism. That school consists of those libertarians who believe that harm is in the mind of the doer, or who believe that they can define harm while standing on the outside of society looking in. Thus they proclaim abortion and same-sex “marriage” (among other things) to be harmless — just because they favor abortion and same-sex “marriage” or cannot see the harm in them.

But, as I have explained, that is not how liberty is defined. So the paradox of libertarianism is this: Libertarians cannot properly define it.

Capitalism, Liberty, and Christianity

William Grimes, writing in The New York Times, reviews Rodney Stark’s The Victory of Reason: How Christianity Led to Freedom, Capitalism, and Western Success:

Mr. Stark, the author of “The Rise of Christianity” and “One True God: Historical Consequences of Monotheism,” is sick and tired of reading that religion impeded scientific progress and stunted human freedom. To those who say that capitalism and democracy developed only after secular-minded thinkers turned the light of reason on the obscurantism of the Dark Ages, he has a one-word answer: nonsense.

“The success of the West, including the rise of science, rested entirely on religious foundations, and the people who brought it about were devout Christians,” he argues in this provocative, exasperating and occasionally baffling exercise in revisionism. Capitalism, and the scientific revolution that powered it, did not emerge in spite of religion but because of it.

. . . Mr. Stark argues [that] . . . . [d]espite the prejudiced arguments of anticlerical Enlightenment thinkers, free inquiry and faith in human reason were intrinsic to Christian thought. Christianity, alone among the world’s religions, conceived of God as a supremely rational being who created a coherent world whose inner workings could be discovered through the application of reason and logic. Consequently, it was only in the West, rather than in Asia or the Middle East, that alchemy evolved into chemistry, astrology into astronomy.

Mr. Stark gets down to cases quickly. He rapidly administers a few bracing slaps to Max Weber’s theory that the Protestant ethic of self-denial and reinvestment propelled capitalism, pointing out that capitalism was in full flower in Italy centuries before the Reformation. . . .

The most persuasive chapters in “The Victory of Reason” describe the early stirrings of free-market enterprise and scientific experimentation on the monastic estates that spread throughout Western Europe after the ninth century. It was during the so-called Dark Ages that Christian monks, throwing off “the stultifying grip of Roman repression and mistaken Greek idealism,” developed innovations like the water wheel, horseshoes, fish farming, the three-field system of agriculture, eyeglasses and clocks. “All of these remarkable developments can be traced to the unique Christian conviction that progress was a God-given obligation, entailed in the gift of reason,” writes Mr. Stark, who has described himself in interviews, surprisingly, as not religious in any conventional sense.

The seeming contradiction between Stark’s lack of religiosity and his understanding of the nexus of Christianity, liberty, and capitalism is not at all surprising. Stark has the ability, so lacking in many of today’s “rational” thinkers (i.e., anti-religious bigots) to confront the facts. There is, first of all, the libertarianism of the last six of the Ten Commandments. As the Catholic Encyclopedia puts it:

The precepts [of the last six of the Commandments] are meant to protect man in his natural rights against the injustice of his fellows.

  • His life is the object of the Fifth;
  • the honour of his body as well as the source of life, of the Sixth;
  • his lawful possessions, of the Seventh;
  • his good name, of the Eighth;
  • And in order to make him still more secure in the enjoyment of his rights, it is declared an offense against God to desire to wrong him, in his family rights by the Ninth;
  • and in his property rights by the Tenth.

Also from the Catholic Encyclopedia, here is some wisdom about rights and justice:

. . . We sometimes say that the unemployed have a right to work, that the needy have a right to assistance, and it may be conceded that those phrases are quite correct, provided that such a right is understood as a claim in charity not as a claim in justice. For, at least if we confine our attention to natural law and ordinary circumstances, the assistance to which a man in need has a claim does not belong to him in justice before it is handed over to him, when it becomes his. His claim to it rests on the fact that he is a brother in distress, and his brotherhood constitutes his title to our pity, sympathy, and help. It may, of course, happen that positive law does something more than this for the poor and needy; it may be that the law of the land has given a legal right to the unemployed to have employment provided for them, or to the poor a legal right to relief; then, of course, the claim will be one of justice.

A claim in justice, or a right in the strict sense, is a moral and lawful faculty of doing, possessing, or exacting something. If it be a moral and lawful faculty of doing something for the benefit of others, it belongs to the class of rights of jurisdiction. Thus a father has the natural right to bring up and educate his son, not for his own, but for the son’s benefit. A lawful sovereign has the right to rule his subjects for the common good. The largest class of rights which justice requires that we should render to others are rights of ownership. Ownership is the moral faculty of using something subordinate to us for our own advantage. The owner of a house may dispose of it as he will. He may live in it, or let it, or leave it unoccupied, or pull it down, or sell it; he may make changes in it, and in general he may deal with it as he likes, because it is his. Because it is his, he has a right to all the uses and advantages which it possesses. It is his property, and as such its whole being should subserve his need and convenience. Because it belongs to him he must be preferred to all others as to the enjoyment of the uses to which it can be put. He has the right to exclude others from the enjoyment of its uses, it belongs with all the advantages which it can confer to him alone. Were anyone else to make use of the house against the reasonable wish of the owner, he would offend against justice, he would not be render- ing to the owner what belongs to him.

Finally, St. Pope Pius X (quoted by Father Stephen DeLallo) said this in his motu proprio Fin Dalla Prima of December 18, 1903:

IV. Of the goods of the earth man has not merely the use, like the brute creation, but he has also the right of permanent proprietorship—and not merely of those things which are consumed by use, but also of those which are not consumed by use. (Encyclical Rerum Novarum.)

V. The right of private property, the fruit of labor or industry, or of concession or donation by others, is an incontrovertible natural right; and everybody can dispose reasonably of such property as he thinks fit. (Encyclical Rerum Novarum.)

VI. To heal the breach between rich and poor, it is necessary to distinguish between justice and charity. There can be no claim for redress except when justice is violated. (Encyclical Rerum Novarum.) . . . .

XI. For the settlement of the social question much can be done by the capitalists and workers themselves, by means of institutions designed to provide timely aid for the needy and to bring together and unite mutually the two classes. Among these institutions are mutual aid societies, various kinds of private insurance societies, orphanages for the young, and, above all, associations among the different trades and professions. (Encyclical Rerum Novarum.)

Private property, voluntary exchange, and voluntary charity. These are concepts that our statist regime has long since subverted.

Rodney Stark’s thesis is entirely consistent with the teachings of the Church. As I wrote a few weeks ago,

One does not have to be a believer to understand the intimate connection between religion and liberty. . . . Strident atheists of Singer’s ilk like to blame religion for the world’s woes. But the worst abuses of humanity in the 20th century arose from the irreligious and anti-religious regimes of Hitler, Stalin, and Mao.

(Thanks to my son for pointing me to the second set of quotations from the Catholic Encyclopedia and to the piece by Fr. DeLallo.)

Related posts:

Judeo-Christian Values and Liberty (02/20/05)
Religion and Liberty (08/25/05)
Science, Evolution, Religion, and Liberty (08/31/05)

A Final Thought for 2005

I refuse to bow to the conventional libertarian-liberal wisdom that a vigorous defense of liberty should not include selective surveillance, indefinite detention of enemies, or aggressive interrogation of the same. Eternal vigilance is the price we must pay for life, liberty, and the pursuit of happiness.

The Bill of Rights, Updated

You probably once knew (and have since forgotten) that there were 12 amendments in Bill of Rights, as originally proposed. Here’s the story, in brief:

On September 25, 1789, the First Congress of the United States . . . proposed to the state legislatures 12 amendments to the Constitution that met arguments most frequently advanced against it. The first two proposed amendments, which concerned the number of constituents for each Representative and the compensation of Congressmen, were not ratified. Articles 3 to 12, however, ratified by three-fourths of the state legislatures, constitute the first 10 amendments of the Constitution, known as the Bill of Rights.

Lo and behold, the Bill of Rights actually comprises 11 amendments — not 10, but 11. How’s that? The original Second Amendment was ratified 13 years ago:

AMENDMENT XXVII

Originally proposed Sept. 25, 1789. Ratified May 7, 1992.

No law, varying the compensation for the services of the Senators and Representatives, shall take effect, until an election of representatives shall have intervened.

That’ll help you sleep better at night, no?

The Constitution and Warrantless "Eavesdropping"

FOUR LINKS ADDED, 12/22/05
ONE LINK ADDED, 12/23/05
ONE LINK ADDED, 12/24/05
TWO LINKS ADDED, 12/28/05

. . . no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. (Amendment IV, Constitution of the United States)

Apropos the flap about NSA intercepts of international phone calls, there’s this from Prof. William J. Stuntz of Harvard Law:

. . . When the Fourth Amendment was written, the sole remedy for an illegal search or seizure was a lawsuit for money damages. Government officials used warrants as a defense against such lawsuits. Today a warrant seems the police officer’s foe — one more hoop to jump through — but at the time of the Founding it was the constable’s friend, a legal defense against any subsequent claim. Thus it was perfectly reasonable to specify limits on warrants (probable cause, particular description of the places to be search and the things to be seized) but never to require their use. (From the “Warrant Clause” article in The Heritage Guide to the Constitution, pp. 326-9.)

Thus, by the original meaning of the Constitution, all warrantless searches may be permissible. Judges and legislators have so changed the meaning of the Constitution that, instead, these views are prevalent: government cannot conduct searches without a warrant; warrantless searches are “invasions of privacy.” Moreover, there is — especially among “civil libertarians,” anti-American Americans, and right-wing loonies — a preference for an undifferentiated right to “privacy” (which is not guaranteed by the Constitution) over “the common defence” (to provide for which the Constitution was adopted). Antidotes to such views may be found here:

President had legal authority to OK taps
(Chicago Tribune)
Our domestic intelligence crisis (Richard A. Posner)
Several posts by Tom Smith of The Right Coast (start here and scroll up)
Eavesdropping Ins and Outs (Mark R. Levin, writing at National Review Online)
The FISA Act And The Definition Of ‘US Persons’ (Ed Morrissey of Captain’s Quarters)
A Colloquy with the Times (John Hinderaker of Power Line)
September 10 America (editorial at National Review Online)
A Patriot Acts (Ben Stein, writing at The American Spectator)
More on the NSA Wiretaps (Dale Franks of QandO)
The President’s War Power Includes Surveillance (John Eastman, writing at The Remedy)
Warrantless Intelligence Gathering, Redux (UPDATED) (Jeff Goldstein, writing at Protein Wisdom)
FISA Court Obstructionism Since 9/11 (Ed Morrissey of Captain’s Quarters)
FISA vs. the Constitution (Robert F. Turner, writing at OpinionJournal)

Related posts:

War, Self-Defense, and Civil Liberties (a collection of posts)
Prof. Bainbridge Flunks (11/15/05)
Prof. Bainbridge and the War on Terror (12/18/05)

Anarchy: An Empty Concept

Anarchy is “a political theory holding all forms of governmental authority to be unnecessary and undesirable and advocating a society based on voluntary cooperation and free association of individuals and groups.” (From Merriam-Webster, via Wikiquote.)

. . . The word “anarchy,” as anarchists use it, does not imply chaos or anomie, but rather a harmonious rulerless society. However, ideas about how an anarchist society might work vary considerably, especially with respect to economics. Also, there is disagreement about how a free society might be brought about. (From a Wikipedia article about “Anarchism.”)

The state is “the group of people comprising the government. . . .” (From TheFreeDictionary)

Politics is the process by which decisions are made within groups. Although the term is generally applied to behavior within governments, politics is also observed in all human group interactions, including corporate, academic, and religious institutions. (From the Wikipedia article on “Politics.”)

A group of persons consists of a voluntary association as long as each member of the group is free to leave the group. The fact that leaving the group might result in a hardship for the leaver (e.g., relocation to an area with less fertile ground) does not negate the group’s voluntary character. Those who choose to stay do so because membership in the group best serves their interests. Acceptance of annoyances (e.g., noisy neighbors) in return for benefits (e.g., division of labor) is simply an inescapable fact of life.

A group of persons may be said to live in anarchy only if all of the rules that affect everyone in the group (e.g., where to live, how best to defend the group against predators) are made by unanimous, informed consent, which might be tacit. It follows, then, that a group might — by unanimous, informed consent — give a subset of its members the authority to make such decisions. The group’s members might delegate such authority, willingly and unanimously, because each member believes it to be in his or her best interest to do so. (The reasons for that belief might vary, but they probably would include the notion of comparative advantage; that is, those who are not in the governing subset would have time to pursue those activities at which they are most productive.) With a governing subset — or government — the group would no longer live in anarchy, even if the group remains harmonious and membership in it remains voluntary.

The government becomes illegitimate only when it exceeds its grant of authority and resists efforts to curb those excesses or to redefine the grant of authority. The passage of time, during which there are changes in the group’s membership, does not deligitimate the government as long as the group’s new members voluntarily assent to governance. Voluntary assent, as discussed above, may consist simply in choosing to remain a member of the group.

Now, ask yourself how likely it is that a group larger than, say, a nuclear family or a band of hunter-gatherers might choose to go without a government. Self-interest dictates that even relatively small groups will choose — for reasons of economy, if nothing else — to place certain decisions in the hands of a government.

All talk of anarchy as a viable option to limited government is nothing more than talk. Empy talk, at that.

Religion and Liberty, P.S.

A few days ago I said:

One does not have to be a believer to understand the intimate connection between religion and liberty, about which I have written here and here. Strident atheists of Singer’s ilk like to blame religion for the world’s woes. But the worst abuses of humanity in the 20th century arose from the irreligious and anti-religious regimes of Hitler, Stalin, and Mao.

Ed Driscoll concludes an entry about post-religious Europe with this:

[P]ost-religious societies invariably do little more than replace one form of organized religion with another: an endlessly spiraling bureaucracy that does its best to stifle the believers–and everyone else.

‘Nuff said.

Whose Liberties Are We Fighting For?

A few weeks ago the media disclosed “secret” prisons overseas, where the CIA apparently has been holding baddies. That disclosure will lead to “investigations,” which probably will lead to the end of the “secret” prison program.

In the past few days we have had:

  • the disclosure of selective, warrantless NSA intercepts authorized in the aftermath of 9/11
  • a “victory” for those who oppose the use of torture, apparently under any condition
  • the Senate’s refusal (thus far) to extend a few provisions of the Patriot Act that are set to expire December 31.

What we have here is a concerted effort to hinder the U.S. government’s efforts to detect and thwart terrorist plots. All of this sensitivity about “civil liberties” (including the “liberties” of our enemies) reminds me of the complacency that we felt before 9/11.

What will it take to shake us from that complacency? You know what it will take: a successful terrorist attack in the U.S. that might have been prevented had the media and “civil libertarians” not been so successful in their efforts to protect “civil liberties.”

If the media and “civil libertarians” really cared about civil liberties they would not be in favor of vast government programs that suppress social and economic freedoms. They are the enemies of liberty, and — thanks to them — innocent Americans probably will die.

The legitimate function of the state is to protect its citizens from predators and parasites, it is not — as the left and its dupes would have it — to protect predators and parasites.