Lest We Forget

Gonazles v. Oregon (“right to die”) is about more than federalism.

Back-Door Paternalism

Shane Frederick, an assistant professor at MIT’s Sloan School of Management, suggests (in so many words) that the “best and brightest” should make decisions for the rest of us. He makes his case in “On the Ball: Cognitive Reflection and Decision Making.” Frederick begins well enough, with premises that seem well supported:

  • Bright people have a lower time preference than less-bright people; that is, bright people are more likely than the less-bright to forgo current gratification in favor of greater future gratification (e.g., more income), where the attainment of the greater gratification is fairly certain.
  • In addition, bright people are more risk-tolerant than less-bright people, where there is the prospect of a gain; that is they are more willing than the less-bright to gamble a given amount of money for the prospect of winning an even larger amount of money.

Here are excerpts of the evidence adduced by Frederick:

People with higher cognitive ability (or “IQ”) differ from those with lower cognitive ability in a variety of important and unimportant ways. On average, they live longer, earn more, have larger working memories, faster reaction times, and are more susceptible to visual illusions. . . .

Despite the diversity of phenomena related to IQ, few have attempted to understand – or even describe – its influences on judgment and decision making. Studies on time preference, risk preference, probability weighting, ambiguity aversion, endowment effects, anchoring, and other widely researched topics rarely make any reference to the possible effects of cognitive abilities (or cognitive traits). . . .

Many researchers have emphasized the distinction between two types of cognitive processes: those executed quickly with little conscious deliberation [System 1] and those that are slower and more reflective [System 2]. . . . System 1 processes occur spontaneously, and do not require or consume much attention. Recognizing that the face of the person entering the classroom belongs to your math teacher involves System 1 processes – it occurs instantly and effortlessly, and is unaffected by intellect, alertness, motivation or the difficulty of the math problem being attempted at the time. Conversely, finding [the square root of] 19163 to two decimal places without a calculator involves System 2 processes – mental operations requiring effort, motivation, concentration, and the execution of learned rules. . . .

By contrast, consider the problem below:

A bat and a ball cost $1.10. The bat costs $1.00 more than the ball.
How much does the ball cost? ____ cents

Here, an intuitive answer does spring quickly to mind: “10 cents.” But this “impulsive” answer is wrong. . . .

In a study conducted at Princeton, which measured time preferences using both real and hypothetical rewards, those answering “10 cents” were found to be significantly less patient than those answering “5 cents.” Motivated by this result, two other problems found to yield impulsive erroneous responses were included with the “bat and ball” problem to form a simple, three item “Cognitive Reflection Test” (CRT), shown in Figure 1. The three items on the CRT are “easy” in the sense that their solution is easily understood when explained, yet reaching the correct answer often requires the suppression of an erroneous answer that springs “impulsively” to mind.

Figure 1. The Cognitive Reflection Test (CRT)

(1) A bat and a ball cost $1.10 in total. The bat costs a dollar more than the ball. How much does the ball cost?
____ cents

(2) If it takes 5 machines 5 minutes to make 5 widgets, how long would it take 100
machines to make 100 widgets?
____ minutes

(3) In a lake, there is a patch of lily pads. Every day, the patch doubles in size. If it takes 48 days for the patch to cover the entire lake, how long would it take for the patch to cover half of the lake?
____ days

Over a 26-month period beginning in January, 2003, the CRT was administered to 3,428 respondents in 35 separate studies that also measured various decision making characteristics, like time and risk preferences. . . .

The notion that more intelligent people are more patient – that they devalue or “discount” future rewards less steeply – has prevailed for some time. . . .

The widely presumed relation between cognitive ability and patience has been tested in several studies, although rather unsystematically. . . .

Collectively, these studies offer some support for the view that cognitive ability and time preference are somehow connected, though none has identified the types of intertemporal decisions over which cognitive ability exerts influence, nor explained why it does so. Toward this end, I examined the relation between CRT scores and a wide variety of items intended to measure various aspects of “time preference.” . . . .

As predicted, those who scored higher on the CRT were generally more “patient”; their decisions implied lower discount rates. For short term choices between monetary rewards, the high CRT group was much more inclined to choose the later larger reward. . . . However, for choices involving longer horizons . . . , temporal preferences were weakly related or unrelated to CRT scores.

A tentative explanation for these results is as follows: a thoughtful respondent can find good reasons for discounting future monetary outcomes – the promiser could default, one may be predictably wealthier in the future (with correspondingly diminished marginal utility for further wealth gains), interest rates could increase (which increases the opportunity cost of foregoing the immediate reward), and inflation could reduce the future rewards’ real value (if the stated amount is interpreted as being denominated in nominal units). . . . However, such reasons do not apply with the same force for short term options; they are not sufficiently compelling to justify choosing $3400 this month over $3800 next month (which implies an annual discount rate of 280%). Hence, for choices . . . where the careful deliberation associated with “System 2” ought to strongly oppose one’s intuitive “System 1” preference for the more immediate reward . . . one observes considerable differences between CRT groups. . . .

Thus, greater cognitive reflection seemingly fosters the recognition or appreciation of considerations (like interest rates) that may favor the later larger reward. . . .

To assess the relation between CRT and risk preferences, I included several measures of risk preferences in my questionnaires, including choices between a certain gain (or loss) and some probability of a larger gain (or loss). For some items, expected value was maximized by choosing the gamble, and for some it was maximized by choosing the certain outcome.

. . . In the domain of gains, the high CRT group was more willing to gamble, particularly when the gamble had higher expected value . . . , but, notably, even when it did not. . . . This suggests that the correlation between cognitive ability and risk taking in gains is not due solely to a greater disposition to compute expected value or adopt that as the choice criterion. For items involving losses . . . , the higher CRT group was less riskseeking; they were more willing accept a sure loss to avoid playing a gamble with lower (more negative) expected value. . . .

Frederick then reinforces the connection between CRT and intelligence; for example:

[T]hough the CRT is intended to measure cognitive reflection, performance on it is surely aided by reading comprehension and mathematical skills (which the ACT [American College Test] and SAT [Scholastic Aptitude Test] also measure). Similarly, though Cacioppo et al. . . . claim that NFC [the “need for cognition scale] is “clearly separable” from intelligence, their list of ways in which those with high NFC were found to differ from those with low NFC sounds very much like the list one would create if people were sorted on any measure of cognitive ability. Namely, those with higher NFC were found to do better on arithmetic problems, anagrams, trivia tests, and college coursework, to be more knowledgeable, more influenced by the quality of an argument, to recall more of the information to which they are exposed, to generate more “task relevant thoughts” and to engage in greater “information-processing activity.”

The empirical and conceptual overlap between these tests suggests that they would all predict time and risk preferences. . . .

In his concluding discussion, Frederick jumps to the unwarranted implication that the “best and brightest” should make decisions for the rest of us; viz.:

[T]ime and risk preferences are sometime tied so strongly to measures of cognitive ability that they effectively function as such a measure themselves. For example, when a choice between a sure $500 and a 15% chance of $1,000,000 was presented to respondents (along with an eight item version of the CRT), only 25% of those who missed all eight problems chose the gamble, compared to 82% among those who solved them all. Should this result be interpreted to mean that choosing the gamble is the “correct” response for this item? . . .

. . . I suspect that if respondents were shown the respective test scores of those who chose the sure $500 vs. those who chose the 15% chance of $1,000,000, they would, in fact, feel more disposed to take the gamble; the correlation between cognitive ability and preference would hold some normative force for them. . . .

[A] relation between cognitive ability and preference does not, by itself, establish the correct choice for any particular individual. Two individuals with different cognitive abilities may experience outcomes differently, which may warrant different choices (for example, what magazines to read or movies to attend). But with respect to the example motivating this discussion, one must ask whether it is really plausible that people of differing cognitive abilities experience increments of wealth as differently as their choices suggest. It seems exceedingly unlikely that the low CRT group has a marked kink in their utility function around $W+500, beyond which an extra $999,500 confers little additional benefit. It seems more reasonable, instead, to override the conventional caveat about arguing with tastes . . . , and conclude that choosing the $500 is the “wrong answer” – much as 10 cents is the wrong answer in the “bat & ball” problem.

Whatever stance one adopts on the contentious normative issues of whether a preference can be “wrong” and whether more reflective people make “better” choices, respondents who score differently on the CRT make different choices, and this demands some explanation

Frederick, in effect, makes the following argument:

  • Bright people are good at getting right answers to questions for which there are right answers.
  • Bright people are good at evaluating prudent risks.
  • Bright people, therefore, are likely to be correct in all forms of risk-taking.
  • Thus all of us would do well to follow the instruction of bright people.

Frederick’s logic fails, first, because he blurs the distinction between (a) the kind of prudent risk-taking that’s involved in short-term financial transactions with fairly certain outcomes (which bright persons do well) and (b) straight-out gambling (for which bright persons seem to have a penchant). He compounds his confusion by treating gambling as a mere mathematical problem to which there is a right answer:

[C]hoosing the $500 is the “wrong answer” – much as 10 cents is the wrong answer in the “bat & ball” problem.

But getting the right answer to the “bat & ball” problem is trivial; it’s a closed problem to which there can be only one right answer. Frederick seems to think that getting the “right” answer to the betting problem depends only on being able to calculate the “expected value” of the prize (value of the prize x probability of winning it). Well, when the expected value is $150,000 and one stands to lose “only” $500, it would be stupid to take the $500 instead gambling on the million. Right? Wrong:

  • Expected value is an artificial construct; one cannot win the expected value of anything.
  • If there’s a 15% chance of winning the million, there’s an 85% chance of not winning the million.
  • A person to whom $500 is a lot of money (a month’s rent, for example) is stupid to gamble it with an 85% chance of losing it.

By Frederick’s logic, bright jerks should be put in the position of gambling away other people’s rent money. Or, to put it more generally, our affairs should be placed in the hands of the “best and brightest” — empowered by government to regulate our lives. (Frederick doesn’t come right out and say that, of course, but the subtext is clear.)

Actually, since the New Deal, successive Congresses, presidents, and Supreme Courts have been regulating our lives with the help of the “best and brightest” (a.k.a. the “brains trust”). And see where it has landed us.

In sum, Frederick’s paper amounts to nothing more than a contrived justification of statist paternalism.

Related posts:

Fear of the Free Market — Part I
Fear of the Free Market — Part II
Fear of the Free Market — Part III
The Rationality Fallacy
Socialist Calculation and the Turing Test
The Social Welfare Function
Libertarian Paternalism
A Libertarian Paternalist’s Dream World
The Short Answer to Libertarian Paternalism
Second-Guessing, Paternalism, Parentalism, and Choice
Another Thought about Libertarian Paternalism
“The Private Sector Isn’t Perfect”
Three Truths for Central Planners
Risk and Regulation

A Quick Thought for a Friday Afternoon

Most Democrats (and everyone to their left) favor abortion, oppose capital punishment, and oppose defense. (No, really, how can one claim to be in favor of defending the country when — just for example — one is opposed to intercepting enemy communications, detaining terrorists caught in battle, and questioning them rigorously?) Anyway, here’s how those preferences play out:

Murder innocents. Spare murderers.

It would make a great bumper sticker.

Ecoutez!

A president speaks:

“The leaders of states who would use terrorist means against us, as well as those who would consider using in one way or another weapons of mass destruction, must understand that they would lay themselves open to a firm and adapted response on our part,” Bush said during a visit to a nuclear submarine base. . . .

“This response could be a conventional one. It could also be of a different kind.”

Bush, who is commander-in-chief of the armed forces, said all of [his country’s] nuclear forces had been configured with the new strategy in mind and the number of nuclear warheads on . . . nuclear submarines had been reduced to allow targeted strikes.

It was the first time he had so clearly linked the threat of a nuclear response to a terrorist attack.

Oops. “Bush” est vraiment Jacques Chirac. Zat cow-boy.

Obtuse Nonsense

Mark A.R. Kleiman (The Reality-Based Community) closes a post with this observation:

All judges judge by their personal beliefs. Whose beliefs would you expect them to judge by?

Kleiman misses the point entirely. Judges should judge from their “beliefs” about the law: what it requires, like it or not. Too many judges, however, judge from what they would like the law to require. There is a vast difference between those two positions, but Kleiman is too obtuse to grasp it or too argumentative to admit it. Kleiman’s relativistic standard allows him to excuse seven decades of Leftist opinions that have made a mockery of the Constitution and denuded it of liberty. Just what one would expect from a “reality-based” blogger.

Fie on Steve Bainbridge, who recommends Kleiman’s post.

Too Many Shots

No, not too many shots of bourbon. Too many injections of vaccine in one day: tetanus/diptheria/pertussis, pneumococcal conjugate, and inactivated influenza. That was yesterday morning. By last night I began to experience the side effects: fever, aches, tiredness. They’re still with me today.

Well, getting all three shots in one office visit does mean fewer trips to the doc and less money out of pocket for co-payments. And it’s not like I have a real job to slog through. And a shot or two of bourbon in the evening does help to alleviate the aches. Thanks, doc.

Brian Leiter, Exposed

Brian Leiter — whose lunacies I have exposed here, here, and here — is now the subject of a blog titled, appropriately, Brian Leiter, Academic Thug. The blogger is Keith Burgess-Jackson, himself a philosopher (as Leiter claims to be) and an attorney (which Leiter is). Burgess-Jackson’s first post (12/25/05) sets out the purpose of the blog:

Brian Leiter has been abusing people with impunity for far too long. It’s time someone stood up to him. This blog is devoted to exposing his abusiveness. . . . If you have been abused by Leiter (as I have) and wish to become a member of this blog, please contact me through my blog AnalPhilosopher. I will allow you to blog anonymously, especially if you are untenured.

Nothing of a defamatory nature will be posted on this blog. That is to say, everything posted will be true. Nor is it an attack blog. It is a blog devoted to publicizing the awful truth about a very bad man—a man who uses his power as a tenured professor (and as a prominent ranker of law and philosophy programs) to humiliate, intimidate, degrade, and punish those with whom he disagrees. If you know of instances in which Leiter has abused (or tried to harm) someone, please bring them to my attention. Anonymity is assured. I will investigate the matter and, if appropriate, post links. . . .

The purpose of this blog, therefore, is to hold Leiter responsible for his abominable behavior. It is to give him his due. That is the essence of justice.

Thug now consists of 23 posts — all worth reading. I’ve added Thug to my daily reading routine.

(Thanks to Maverick Philosopher for the pointer.)

More Punishment Means Less Crime: A Footnote

In “More Punishment Means Less Crime” I argued — with statistical support — that making federal sentencing guidelines advisory rather than mandatory, as the Supreme Court has done, will lead a resurgence of the violent-crime rate. I followed up with “More About Crime and Punishment,” in which I cited a case in point, the sentencing of a rapist to 60 days in jail. Now we have this, from an exchange at Legal Affairs Debate Club between Douglas Berman and Frank O. Bowman III:

Berman: 1/16/06, 09:43 AM
Given the enormous and unexpected shocks to the federal sentencing system over the past three years—Congress’ enactment of the PROTECT Act, then the Supreme Court’s decision in Blakely v. Washington, and finally the Supreme Court’s decision in United States v. Booker—I am wary about making any predictions about what will be the future of federal sentencing. But I am happy to opine about what should be the future of federal sentencing: Congress should allow the advisory guideline system created by the Booker decision to continue to operate while the U.S. Sentencing Commission and others assess its efficacy and fairness. . . .

Bowman: 1/17/06, 09:01 AM
. . . A year has passed since the Booker decision. The Sentencing Commission has been gathering and promulgating data about post-Booker practice on a nearly monthly basis since April 2005. In consequence, we have a very good idea about how the post-Booker system has worked so far:

. . . since Booker, the rate of compliance with the Guidelines, by which I mean the percentage of cases sentenced within the guideline range calculated by the sentencing judge, has declined by about 11% nationally—from about 72% to about 61%.

. . . Virtually the entire country has experienced a decline in compliance with the guidelines. The compliance rate of every circuit has fallen, and compliance fell in more than 90% of all districts.

. . . the average length of a federal sentence in 2005 stayed the same as it was in 2004. On the other hand, the trend in sentence length (and guidelines compliance) from 2001-2004 was sharply up, the apparent result of conscious efforts by both Congress and the central administration of DOJ to increase guidelines adherence and criminal penalties. In short, the average federal sentence length post-Booker seems to reflect not maintenance of the status quo, but the sudden arrest of what had been a powerful and continuing upward surge.

. . . the decrease in guidelines compliance after Booker is almost entirely due to judicial action. Judges are using their new authority to reduce sentences below the range in almost 10% of all cases, and it is their exercise of this authority that is driving the decline in overall compliance rate.

I’ll make no comment now on these facts, other than to suggest that the argument for delay in response to Booker cannot much longer be premised on the claim that we don’t know how the new system will work. In fact, we have a very good idea of how it’s working.

Indeed we do. It’s working in favor of criminals. And that will lead to a resurgence of crime.

Related posts:
Does Capital Punishment Deter Homicide?
Libertarian Twaddle about the Death Penalty
Crime and Punishment
Abortion and Crime
Saving the Innocent?
Saving the Innocent?: Part II
More on Abortion and Crime
More Punishment Means Less Crime
More About Crime and Punishment
Clear Thinking about the Death Penalty
Let the Punishment Fit the Crime
Another Argument for the Death Penalty
Less Punishment Means More Crime
Crime, Explained

A Supreme Court Quiz

Q. When are Justices Scalia and Thomas for federalism?

A. Always, except when they’re against it, as in Gonzales v. Oregon.

Q. When are Justices Stevens, Kennedy, Souter, Ginsburg, and Breyer against federalism?

A. Always, except when they’re for it, as in Gonzales v. Oregon.

Celebrating My Heritage

In keeping with the spirit of the day, I celebrate my heritage and take pride in these, my biological (though not actual) kinsmen, who are pictured from top to bottom, as follows:

Marquis de Condorcet (French)
Johann Sebastian Bach (Saxon)
Edmund Burke (British)
Chief Stone Child, a.k.a. “Rocky Boy” (Chippewa)




(All images courtesy of Wikipedia.)

Debunking "Scientific Objectivity"

Alanyzer opens with this:

The first thing we must recognize is that the question of the nature of science is not a scientific question, but a philosophical one. . . .

. . . methodological naturalism [is] the claim that science can only appeal to natural causes as explanations. . . .

But there are some big problems with this appeal to methodological naturalism as an essential characteristic of science. Indeed, it sets up a dilemma that is likely to backfire on the scientific establishment. I’ll explain tomorrow in a follow-up post.

Here are portions of the follow-up post:

In yesterday’s post I gave some background on the Intelligent Design (ID) debate and noted that an increasingly popular move by the mainstream scientific establishment has been to stipulate that “science” requires methodological naturalism. In other words, the claim is that properly “scientific” explanations can only make reference to ‘natural’ laws and entities, the kinds of laws and entities that would presumably find inclusion in a completed form of physics. . . .

[T]his way of defining “science” is historically and philosophically arbitrary. Prior to the rise of Darwininsm and Comtean positivism in the 19th century, no one–not Galileo, not Newton, not Kepler, Boyle, you name it–would have thought to define “science” in terms of a commitment to methodological naturalism. Instead, beginning all the way back with Aristotle, the various sciences were defined in terms of the object of their study, not the types of explanatory entities they were allowed to invoke. . . .

Noted 19th-century logician, philosopher, and scientist Charles Sanders Peirce argued that to “block the road of inquiry” was to commit a cardinal sin against rationality. To “block the road of inquiry” is to set up a priori restrictions on where inquiry can go and on what kinds of answers it can reach. The reason why Peirce saw this as a sin against rationality was because it takes our focus off of truth and insulates certain ‘pet theories’ from potential refutation. It’s like saying “I’ve made up my mind about X, Y, and Z, and I refuse to countenance any evidence weighing against those opinions.” Such dogmatism, Peirce held, is antithetical to the spirit of science. Ironically, in the name of promoting genuine “science”, the mainstream scientific establishment wants to do the very thing that Peirce held to be fundamentally antithetical to science, i.e., block the road of inquiry. What they are saying, in effect, is that the only answers that will be tolerated are naturalistic answers.

Maverick Philosopher chimes in, with a “Fisking” of Daniel Dennett:

Dennett’s main point here is that belief in God and in an afterlife are epistemically on a par with belief in the Easter Bunny and black magic. . . . Few philosophers today would claim that that God and afterlife can be definitively proven. But no fair-minded person can deny that there are many powerful arguments in their support, and many powerful arguments against naturalism, and in particular, arguments against Dennett’s extreme version thereof.

What Dennett is suggesting, of course, is that religion is just a form of superstition. . . . It is also quite absurd to suggest that all the intelligent people — the brights — are on one side of the issue. . . .

Indeed, if one looks back through the history of philosophy, one sees that the greatest philosophers were theists of one sort or another, and that the atheists and materialists were second-string or worse. . . .

Another point that must be mentioned is Dennett’s tendentious and unclarified use of ‘supernatural.’ . . .

Is the supernatural perhaps that which violates the laws of nature? Is the supernatural the same as the miraculous? This may well be what Dennett has in mind. But God, unlike the Easter Bunny, Santa Claus, the Tooth Fairy and other Dennet favorites, need not be understood as violating any laws of nature. Think of a God that does not intervene miraculously in the workings of nature, but is merely the sustaining cause of the existence of nature. Then there would be a clear sense in which God would not be a supernatural being. Though outside of nature (and precisely because outside of nature) he would not violate any natural laws. Something not subject to natural laws cannot be said to violate them. . . .

At the very least, we need to know what ‘supernatural’ means to fully understand Dennett’s opposing of the naturalist brights to the supernaturalist dullards. Does it mean nonnatural, miraculous, or naturalistically inexplicable? If Dennett is using it as a bludgeon, as a portmanteau term of abuse, the way lefties use ‘fascist’ and ‘theocrat’ to tar their opponents, then that is contemptible.

Finally, Pat Michaels reminds us just how biased, venal, and opportunistic scientists can be:

Two recent events underscore how predictable is the distortion of global warming by those who gain from exaggeration. The events were the Montreal “Conference of the Parties” which had signed the United Nations’ Kyoto Protocol on global warming, and the fall meeting of the American Geophysical Union (AGU) in San Francisco. Both took place in early December.

The sheer volume of hype was impressive. Following are the headlines, along with the sources, generated on the afternoon of December 7, first from the Montreal UN conference. (University news sources are those that were eventually picked up in other stories). These were obtained from Google’s news search page.

•Global warming to halt ocean circulation (University of Illinois)

•Warming trend adds to hazard of Arctic trek (Salem OR News)

•Pacific islanders move to escape global warming (Reuters)

•Tuvalu: That sinking feeling (PBS)

•World weather disasters spell record losses in 2005 (Malaysia Star)

•Arctic peoples urge UN aid to protect cultures (Reuters)

•Threatened by warming, Arctic people file suit against US (AFP)

Next, from San Francisco:

•Ozone layer may take a decade longer to recover (New York Times)

•Earth is all out of new farmland (London Guardian)

•Forests could worsen global warming (UPI)

•Warming could free far more carbon from high arctic soil than earlier thought (University of Washington)

•Rain will take greater toll on reindeer, climate change model shows (University of Washington)

•Methane’s impacts on climate change may be twice previous estimates (NASA)

•Average temperatures climbing faster than thought in North America (Oregon State University)

How can things be so bad? . . .

Scientists compete with each other for finite resources, just like bankers and corporations. In this case, successful competitors are those who are rewarded by their universities or institutions. In all science, this means publishing research articles in the refereed scientific literature. That research costs tremendous amounts of money and there really is only one provider: Uncle Sam (i.e. you and me).

No one gets much of this pie by claiming that his or her issue may, in fact, be no big deal. Instead, any issue – take global warming, acid rain, and obesity as examples, must be portrayed in the starkest of terms. Everything is a crisis, and all the crises are competing with each other.

Similar logic applies in the policy arena. Remember that the job of policymakers is precisely that: to make policy, which does not get made unless whatever policy there might be is “absolutely necessary” to avoid certain doom.

Then, finally, what gets played on TV and in the papers? More crises. Near-death experiences sell newspapers and attract viewers. Those who question this need only look at ratings for The Weather Channel. Some people may remember that it used to be the station where you turned to for round-the-clock national and local weather. The ratings were in the tank.

Now, in prime time, you are more likely to see the twentieth re-run of how this tornado went over that house and how everyone almost died, usually with some pretty snappy home video. Or, just to get your attention for sure, a re-enactment of the sinking of an oil rig in a howling cyclone — re-enacted because everyone on board drowned. Ratings have boomed.

Perhaps it is dismaying that science has become as blatantly biased in the direction of tragedy as television. But, given the way we fund and reward science and scientists, it was inevitable, and global warming is only one of many of science’s predictable distortions.

In sum, many (most?) of today’s scientists adhere to a flawed scientific framework. And, even by the standards of that framework, many of today’s scientists are nothing more than charlatans.

Related posts:

Climatology
Global Warming: Realities and Benefits
Words of Caution for the Cautious
Scientists in a Snit
Another Blow to Climatology?
Bad News for Politically Correct Science
Another Blow to Chicken-Little Science
Same Old Story, Same Old Song and Dance
Bad News for Enviro-nuts
Going Too Far with the First Amendment
Atheism, Religion, and Science
The Limits of Science
Three Perspectives on Life: A Parable
Beware of Irrational Atheism
The Hockey Stick Is Broken
The Creation Model
The Thing about Science
Religion and Personal Responsibility
Science in Politics, Politics in Science
Global Warming and Life
Evolution and Religion
Speaking of Religion…
Words of Caution for Scientific Dogmatists
Science, Evolution, Religion, and Liberty
Hurricanes and Global Warming
The Legality of Teaching Intelligent Design
Global Warming and the Liberal Agenda
Science, Logic, and God
A Dissonant Vision

Mister Hockey

Wayne (The Great One) Gretzky holds the all-time goal-scoring record for major-league hockey:

  • 894 goals in 1,487 regular-season games in the National Hockey League (1979-80 season through 1998-99 season), for an average of 0.601 goals per game
  • Another 46 regular-season goals in the 80 games he played in the World Hockey Association (1977-78 and 1978-79 seasons)
  • A total of 940 goals in 1,567 games, or 0.600 goals per game.

The raw numbers suggest that Gretzky far surpassed Gordie (Mr. Hockey) Howe, who finished his much longer career with the following numbers:

  • 801 regular-season goals in 1,767 NHL games (“only” 0.453 per goals per game), in an NHL career that spanned the seasons from 1946-47 through 1970-71 and 1979-80
  • Another 143 goals and 349 games in the WHA, from 1973-74 through 1978-79
  • A total of 944 goals in 2,116 games, or 0.446 goals per game.

That makes Gretzky the greater goal scorer, eh? Not so fast. Comparing Gretzky’s raw numbers with those of Howe is like comparing Pete Rose’s total base hits (4,256) with Ty Cobb’s (4,191), without mentioning that Rose compiled his hits in far more at-bats (14,053) than Cobb (11,429). Thus Cobb’s lifetime average of .367 far surpasses Rose’s average of .303. Moreover, Cobb compiled his higher average in an era when batting averages were generally lower than they were in Rose’s era.

Similarly, Howe scored most of his goals in an era when the average team scored between 2.5 and 3 goals a game, whereas Gretzky scored most of his goals in an era when the average team scored between 3.5 and 4 goals a game. The right way to compare Gretzky and Howe’s goal-scoring prowess is to compare the number of goals they scored in each season to the average output of a team in that season. This following graph does just that.


Sources: Howe’s season-by-season statistics, here; Gretzky’s season-by-season statistics, here; NHL season-by-season team statistics, beginning here; WHA season-by-season team statistics, here.

Gretzky got off to a faster start than Howe, but Howe has the better record from age 24 onward. Gretzky played 20 NHL seasons, the first ending when he was 19 years old and the last ending when he was 38 years old. Over the comparable 20-season span, Howe scored 5 percent more adjusted goals than did Gretzky. Moreover:

  • Howe’s adjusted-goal total for his NHL career (26 seasons) exceeds Gretzky’s by 30 percent.*
  • Howe’s adjusted-goal total for his entire NHL-WHA career (32 seasons) exceeds Gretzky’s (21 seasons**) by 43 percent.

Gordie Howe is not only Mister Hockey, he is also Mister Goal Scorer. “No doot aboot it.”
____________
* This writer, whose method is more complex than mine, gives Howe a 21-percent advantage over Gretzky for their respective NHL careers.

** I have omitted from these calculations Gretzky’s 3 goals in 8 games at the end of the 1978-79 WHA season.

Life’s Lessons

Judge Alito speaks for me. This is from his opening statement before the Senate Judiciary Committee, on January 9, 2006 (italicized words inserted by me):

I am who I am, in the first place, because of my parents and because of the things that they taught me.

And I know from my own experience as a parent that parents probably teach most powerfully not through their words but through their deeds. (As is obvious in the case of Senator Kennedy.) And my parents taught me through the stories of their lives. And I don’t take any credit for the things that they did or the things that they experienced, but they made a great impression on me.

My father was brought to this country as an infant. He lost his mother as a teenager young boy. He grew up in poverty. . . .

After he graduated from college in 1935, He dropped out of school after the eighth grade in the midst of the Depression, he found that teaching jobs for Italian-Americans were not easy to come by and he had to find other work for a while.

But eventually he became a teacher and he served in the Pacific during World War II skilled craftsman. And he worked, as has been mentioned, for many years at his trade in a nonpartisan position for the New Jersey legislature, which was an institution that he revered and gained the respect of his co-workers and customers.

His story is a story that is typical of a lot of Americans both back in his day and today. And it is a story, as far as I can see it, about the opportunities that our country offers, and also about the need for fairness and about hard work and perseverance. . . . My father never expected nor received a handout. He took it as his responsibility to support himself and his family, and he succeeded because he didn’t let his his poverty or lack of education stand in his way. . . .

I got here in part because of the community in which I grew up. It was a warm, but definitely an unpretentious, down-to-earth community. Most of the adults in the neighborhood were not college graduates. I attended the public schools. In my spare time, I played baseball and other sports with my friends.

And I have happy memories and strong memories of those days and good memories of the good sense and the decency of my friends and my neighbors.

And after I graduated from high school, I went only a full 12 100 miles down the road, but really to a different world when I entered Princeton a Big-Ten University. . . .

And this was a time of great intellectual excitement for me. Both College and law school opened up new worlds of ideas. But this was back in the late 1950s 1960s and early 1970s 1960s.

It was a few years before a time of turmoil at colleges and universities. But, even though I was then opposed to the war in Vietnam, I was appalled when And I saw some very smart people and very privileged people behaving irresponsibly. And I couldn’t help making a contrast between some of the worst of what I saw happening then on the campuses (and now in the behavior of Senators Kennedy, Schumer, et al.) and the good sense and the decency of the people back in my own community.

Words for the Unwise

Those who are trying to dismantle our defenses should read this:

Reliapundit links to a report which he says can be considered circumstantial proof that the NY Times, in leaking the NSA wiretapping program, has tipped off terrorists and thus made our job more difficult. Seems disposable phones are selling like hotcakes in certain quarters. They’re tough to trace. . . .

Maybe some Americans forget what 9/11 was like. It’s easy to do; we don’t like to dwell on what is sad and tragic, and we don’t like to feel insecure. And perhaps because our president and his team HAVE managed to keep us safe, HAVE managed to prevent another attack on our soil, using these (what the left would call) “impeachable” tactics, perhaps we are feeling a little too safe, a little over-confident. That must be true for some, particularly many Democrats, who would like to “kill the Patriot act,” as Sen. Harry Reid crowed, or leak every covert measure we are taking, (hello, New York Times, hello James Risen) or who seem to wish to tie the hands of the government at every turn in the War on Terror.

Feeling pretty safe, are you? Pretty secure? Has 9/11 become a faded memory for you?

I haven’t forgotten. . . .

I remember Tom Brokaw’s voice as the endless loop of a plane slamming into a tower played, “This,” he intoned, gravely, “is war.” . . .

I remember knowing, four years ago, that terrorists were evil and that terrorism needed defeating. I thought we all knew it.

I’m a New Yorker, and if it happens again in New York, I will hold these “pure, patriotically motivated” leakers (yes, they’re leakers) responsible, because they allowed their hate to take them too far.

I will wonder how Harry Reid and the NY Times and the leakers and “anonymous sources” they have lionized can live with all the blood on their hands, even as they (predictably) immediately blame the White House for not “connecting the dots.”

If it happens anywhere in America, (or, really, anywhere else) I will look toward the NY Times and the rest of the “pure, patriotically motivated” press and leftists, because they will have, by their actions and their rhetoric, enabled terrorists to move forward where they had perhaps formerly been stalled. By making the job of surveillance and information-sharing more difficult (drop the Patriot Act and Jamie Gorelick’s wall snaps back in place) and the terrorist’s job easier, they will have participated in something deadly – all because they wanted to “get” the president and keep him from succeeding – which means keep America from succeeding – which means keep the world from progressing away from the scourge of terrorism.

If it happens again, if after we’ve been safe for nearly 5 years only to find – after these “noble” leaks – that we are safe no longer, I will know where to look. Most Americans will know where to look.

I know right where to look.

Related posts:

Getting It Wrong: Civil Libertarians and the War on Terror (A Case Study) (05/18/04)
The Illogic of Knee-Jerk Privacy Adocates (10/06/04)
Treasonous Blogging? (03/05/05)
Absolutism (03/25/05)
Shall We All Hang Separately? (08/13/05)
Foxhole Rats (08/14/05)
Treasonous Speech? (08/18/05)
Foxhole Rats, Redux (08/22/05)
September 11: A Remembrance (09/11/05)
The Faces of Appeasement (11/19/05)
Give Me Liberty or Give Me Non-Aggression? (12/08/05)
We Have Met the Enemy . . . (12/13/05)
Whose Liberties Are We Fighting For? (12/16/05)
Prof. Bainbridge and the War on Terror (12/17/05)
The Constitution and Warrantless “Eavesdropping” (12/21/05)
NSA “Eavesdropping”: The Last Word (from Me) (12/28/05)
Privacy, Security, and Electronic Surveillance (01/06/06)
Privacy: Variations on the Theme of Liberty (01/11/06)
Worth Repeating (01/13/06)

Economics: The "Democrat" Science

From “AEA [American Economics Association] Ideology,” by William A. McEachern (Econ Journal Watch, January 2006):

One way of summarizing the findings is by showing those populations with no Republican contributors, those populations with one Republican contributor, and those populations with two Republican contributors, as is done in Tables 1, 2, and 3. . . . Among the entire eligible set listed in the three tables, the overall tally is 182 Democrat contributors to 10 Republican contributors [among advisory board members, officers, editors, and contributors to the American Economic Review, AER Papers & Proceedings, Journal of Economic Literature, and Journal of Economic Perspectives]. Democrat contributors filled 182 of a possible 1,583 slots, or 11.5 percent. Republican contributors filled 10, or 0.6 percent. . . .

For the 2,000 AEA member sample, the ratio of Democrat-to-Republican donors was 5.1 to 1. . . .

What’s the harm of having extremely high Democrat-to-Republican contribution ratios among those involved with AEA publications, especially among the discretionary journals? The Association recognized the possible harm more than 80 years ago when the Certificate of Incorporation called for “perfect freedom of economic discussion.” Recall that campaign contributors are also more likely to be politically engaged in other ways. We should not expect editors, referees, authors, reviewers, and acknowledgees who have contributed to campaigns to just turn off that mindset in their dealings with the Association’s publications.

As an example of possible harm of a lopsided political representation, consider the absence of a Republican contributor among the 247 book reviewers with U.S. affiliations appearing in the Journal of Economic Literature in 2003 and 2004. A JEL review will likely be the most visible, if not the only, review some books will ever receive. Couldn’t the same political sensibilities that motivated a reviewer to contribute to Democrats also shape his or her assessment of a book? . . .

But loading the dice, however unintentionally, with 20 Democrat contributors and no Republican contributors seems unfair to some authors and unhealthy for the profession. . . .

Mark Bauerlein, a professor of English at Emory University and research director at the National Endowment for the Arts, has argued that:

Any political position that dominates an institution without dissent deteriorates into smugness, complacency and blandness. . . . Groupthink is an anti-intellectual condition, ironically seductive in that the more one feels at ease with compatriots, the more one’s mind narrows (2004). . . .

. . . The AEA claims to be the “organ of no party.” That is, of course, true de jure, but contributor ratios that favor Democrats 9.5 to 1 among regular AER authors and 38 to 1 among authors in remaining publications at least raise a question whether the Association is de facto an “organ of no party.”

Thus, we read this, by noted economist William J. Baumol (also from Econ Journal Watch, January 2006):

There are, actually, at least two very good reasons why the entrepreneur is virtually never mentioned in modern theory of the firm and distribution. The first is that innovation is an entirely heterogeneous output. Production of whatever was an invention yesterday is mere repetition today. So that entrepreneurial activities do not incorporate the homogeneous elements that lend themselves to formal mathematical description, let alone the formal optimization analysis that is the foundation of the bulk of micro theory.

The more critical explanation of the absence of the entrepreneur is that in mainstream economics the theory is generally composed of equilibrium models in which structurally nothing is changing. Equilibrium models exclude the entrepreneur by their very nature. . . .

That’s true, as far as it goes. But Baumol goes on to say this:

My conclusion is not that the neoclassical theory is wrong in excluding the entrepreneur, for it is dealing with subjects for which she is irrelevant. But that does not mean that no theory of entrepreneurship is needed. . . . It would, in my view, be as indefensible to require all micro writing to give pride of place to the entrepreneur as to exclude him universally. . . .

But universal exclusion condemns us to leave out of our discussions what I consider to be the most critical issues that should be examined (though not exclusively) in microeconomic terms: the determinants of innovation and growth and the means by which they can be preserved and stimulated. . . . Why have the relatively free-market economies in the past two centuries been able to outstrip, probably by more than an order of magnitude, the performance in terms of growth and innovation, of all other forms of economic organization? The answer is not merely matter of pandering to what Veblen called the economic researcher’s idle curiosity. Rather it is the missing underpinning for growth policy in both the developed and the developing world.

A somewhat less “Democrat” profession would try harder to account for entrepreneurship, without which economic growth would be impossible.

Tidbits

Does this signal a return to Lochnerian due process?

This week, the Seventh Circuit Court of Appeals gave labor groups and their political cronies in Illinois a good, swift kick in their collective behinds.In 520 South Michigan Ave. Assoc., Ltd. v. Devine, the court reversed the district court’s dismissal of an employer’s challenge to an amendment to an Illinois law prohibiting the use of temporary workers during a strike. . . .

Illinois law makes it a crime to employ “professional strikebreakers.” A few years ago, the state broadened this prohibition to criminalize the hiring of day laborers and temporary staff during strikes. After the amendment was enacted, the plaintiff, who was in the midst of a strike and facing probing inquiries from the local Illinois states attorney for Cook County, sought a declaratory judgment that the Strikebreakers Act is preempted by federal law. The district court found that the employer lacked standing, but the Seventh Circuit disagreed and remanded the case for decision on the merits.

Rather than stop there, the Seventh Circuit then launched into a biting critique of the constitutionality of the amendment. According to the court, the Strikebreakers Act places an impermissible limit on the employer’s use of an economic tactic that is protected by federal law. . . . (From Lou Michels at Suits in the Workplace)

Escape from D.C. In which economist (and Englishman) Tim Harford writes of his impending reassignment from D.C. to London:

There’s another point to consider [in favor of taking the London assignment]. Even living in Hackney I would be less than an hour away from the shopping and the arts of one of the world’s great cities. To get quickly from DC to the heart of one of the world’s great cities requires a helicopter trip to Manhattan.

Last, and certainly least, is this bit of wisdom from a constitutional scholar très manqué:

I am dismayed that Judge Samuel Alito is receiving any consideration for such an important post as Supreme Court justice. His known views are extremely partisan, reactionary and contrary to the provisions of the Constitution and the wishes of the majority of the American people.

Karen Price
Austin

Contrary to which “provisions” of the Constitution, the one that guarantees everyone a free lunch or the one that says we should lie prostrate before our enemies? And which majority would that be, the one that lies along the Kennedy-Schumer axis?

Worth Repeating

In light of the attention given the “unitary executive theory” during the Alito hearings, I borrow from myself:

The legitimate function of the state is to protect its citizens from predators and parasites, it is not to protect predators and parasites. The critics of aggressive defense like to proclaim their dedication to civil liberties, but their statist agenda in domestic matters betrays their selective dedication to liberty.

There is a balance to be struck between privacy and liberty, but it should not — and need not — be struck in favor of our enemies. The Constitution is, first and foremost, a mutual defense pact, not a suicide pact.

I certainly don’t believe in the extreme version of the unitary executive theory, in which the president is a law unto himself. But (continuing to borrow from myself) I do believe that the president has wide latitude in foreign affairs — which encompasses the defense of the nation. I quote Sai Prakash, who writes about the Constitution’s Executive Vesting Clause (Article II, Section 1, Clause 1) in The Heritage Guide to the Constitution (pp. 179-82):

The [Executive Vesting Clause] . . . accords the President those foreign-affairs authorities not otherwise granted to Congress or shared with the Senate. . . .

The Articles of Confederation lacked an independent chief executive. Instead, the Continental Congress exercised the executive power, appointing and dominating the secretaries of the executive departments. Unfortunately, law execution under the direction of a distracted, plural executive was neighter vigorous nor swift. Congress likewise proved a poor steward of foreign affairs, with American diplomats complaining that Congress could not act with the requisite speed or secrecy. . . .

Resolving to avoid the problems plaguing state and national executives, the Constitution’s makers created an energetic, responsible, and unified executive. . . . The Anti-Federalists well understood the Framers’ design and criticized the unitary executive [but they lost the argument: ED] . . . .

. . . [T]he delegates [to the Constitutional Convention] spoke of the President’s principal foreign-affairs role, oftentimes referring to the Senate’s role in treaty-making as a limited exception to the grant of foreign-affairs authority to the President. . . .

. . . [T]raditional rules of statutory interpretation require us to take seriously the differences in phrasing across the three vesting clauses. Artilce I, Section 1 (“All legislative Powers herein granted shall be vested in a Congress of the United States. . . .”) makes clear that it vests no authorities separate from those enumerated in the rest of Article I. In contrast, Article III, Section 1 (“The judicial Power of the United States, shall be vested in one supreme Court, and in such inferior Courts as the Congress may . . . establish.”) clearly vests the federal courts with judicial authority. The Executive Vesting Clause reads like its Article III counterpart, in sharp contrast to the Article I introductory clause. . . .

In a case touching upon foreign affairs, the judiciary has recently reaffired that the executive power grants foreign-affairs authority to the President. See American Insurance Ass’n v. Garamendi (2003). This marks a departure from prior case law, which had grounded the executive’s foreign-affairs powers not in any constitutional text, but in necessity and sovereignty. See United States v. Curtiss-Wright Export Corp. (1936).

John Yoo and James C. Ho, writing in the same volume about the president’s role as commander in chief (pp. 195-8), have this to say:

. . .[S]ome originalist scholars have concluded that Congress’s war power is limited to its control over funding and its power to impeach executive officers. They contend that the President is constitutionally empowered to engage in hostilities with whatever resources Congress has made available to the executive. . . .

In summary, the argument for executive initiative rests on the background understanding that the vesting of “executive Power” and the “Commander in Chief” designation together constitute a substantive grant of authority to the President to conduct military operations.

The Framers intended the executive to be a passive enforcer of laws passed by Congress that bear on domestic affairs (and those laws were to be strictly limited in scope by Article I, Section 8, of the Constitution). At the same time, the Framers intended the executive to defend Americans actively against enemies foreign and domestic. No one has put it more clearly than Justice Felix Frankfurter:

. . . [W]e have had recent occasion to quote approvingly the statement of former Chief Justice Hughes that the war power of the Government is ‘the power to wage war successfully.’ . . . Therefore, the validity of action under the war power must be judged wholly in the context of war. That action is not to be stigmatized as lawless because like action in times of peace would be lawless. To talk about a military order that expresses an allowable judgment of war needs by those entrusted with the duty of conducting war as ‘an unconstitutional order’ is to suffuse a part of the Constitution with an atmosphere of unconstitutionality. The respective spheres of action of military authorities and of judges are of course very different. But within their sphere, military authorities are no more outside the bounds of obedience to the Constitution than are judges within theirs. . . . To recognize that military orders are ‘reasonably expedient military precautions’ in time of war and yet to deny them constitutional legitimacy makes of the Constitution an instrument for dialetic subtleties not reasonably to be attributed to the hard-headed Framers, of whom a majority had had actual participation in war. If a military order such as that under review does not transcend the means appropriate for conducting war, such action . . . is as constitutional as would be any authorized action by the Interstate Commerce Commission within the limits of the constitutional power to regulate commerce.

More from Fringe Watch

Fringe Watch has a third post about the Neo-Conned series of anti-war books, published by John Sharpe (through his IHS Press/Light in the Darkness imprint). The third installment focuses on Derek Holland and Roberto Fiore, noted “extreme nationalists,” and their ties to Sharpe. Some members of the anarcho-libertarian contingent at LewRockwell.com (“anti-state, anti-war, pro-market”) have contributed to and touted the Neo-Conned books (see here, here, and here). That is disturbing, given the provenance of the Neo-Conned series. Here, with permission, is what Fringe Watch has to say about Holland, Fiore, and Sharpe:

John Sharpe’s Ties to Holland and Fiore

In my last post I looked at the anti-Semitic propaganda of John Sharpe, whose IHS Press has published two anti-war books: Neo-Conned and Neo-Conned Again!, which are being heavily promoted in paleo-conservative and paleo-liberterian circles by the uninformed.

My own experience bears directly on this subject. Starting in the 1980s, I became acquainted with the British National Front (NF), the premier “revolutionary nationalist” and racialist movement before its implosion in 1989. Out of that collapse emerged an even more radical outfit called the International Third Position (ITP) headed by Derek Holland and Roberto Fiore.

Both Holland and Fiore have received considerable treatment in works on European extremist nationalism, including Fascism: A History by Roger Eatwell (1997) and Black Sun: Aryan Cults, Esoteric Nazism and the Politics of Identity by Nicholas Goodrick-Clarke (2002).

As Chairman of the NF, and later the ITP’s chief ideologue, Holland exerted a decisive influence. He authored The Political Soldier, which is the Koran of militant nationalists throughout Europe. In many places it invokes the imagery of Muslism fanatics as nationalist “martyrs.” He has been a supporter of radical Arab regimes, visiting Libya in 1988 and Iraq in 1990 (photo and information on the Libyan trip is available online).

Given these credentials it is hardly surprising that Holland should back the Neo-Conned anti-war series as a director of IHS Press. Some people may be misled by the fact that Holland now operates under his Irish Gaelic name, Deric O’Huallachain (having relocated to Ireland from the UK a few years ago). However, earlier copies of the Virginia SCC certificate for IHS Press shows it as Derek Holland.

From the moment that IHS Press was established in 2001, people expressed concern, but were reassured (as was this writer) that Holland had put his extremism “behind him.” Apparently that didn’t stop him from being guest speaker at the February 2002 racial nationalist Nationaldemokratisk Ungdom (NDU) in Sweden. In March of that year the German neo-nazi Deutsche Stimme (German Voice) featured his essay, “Theory and Strategy: The Path of the Political Soldier.” An overnight transition from political radicalism to religious orthodoxy seems improbable. And his activities in Ireland have covered as recently as 2005 in the Brandsma Review.

Roberto Fiore, Holland’s close collaborator, was a member of the political wing of the Armed Revolutionary Nuclei which claimed responsibility for the 1980 Bologna bomb attack which claimed 85 lives. In 1997 Fiore came out of hiding in the UK to head the openly fascist Forza Nuova party in Italy.

What is the link to Neo-Conned? Fiore, as part of the ITP, helped set up the St. George Educational Trust (more here) which is the UK counterpart to, and collaborator with, Sharpe’s pseudo-Catholic Legion of St. Louis.

Privacy: Variations on the Theme of Liberty

This post is an abridgement of the much longer version at Liberty Corner II. The complete version provides much supporting detail that I have omitted here.

I begin by addressing privacy as a right. I then turn to private-sector issues, namely, identity theft and the use of personal information by businesses. In the next substantive portion of this post I address privacy vis-a-vis government, disposing quickly of the national ID card to focus on warrantless “eavesdropping” and data-mining. I then offer a brief summary and conclusion.

IS PRIVACY AN ABSOLUTE RIGHT?

Privacy in the Law

Privacy is one among many values that liberty should serve. An individual’s desire for privacy is as legitimate as a desire for, say, a Lamborghini, a full head of hair, and perpetual youth. Seriously, privacy is a legitimate pursuit, yet (like a Lamborghini) it cannot an absolute right. For — as I have argued elsewhere — if privacy were an absolute right, it would be possible to get away with murder in one’s home simply by committing murder there. In fact, if there are any absolute rights, privacy certainly isn’t one of them. Privacy really is a bargain that individuals strike with the rest of the world. We cannot act in the world without ceding some privacy, so the question is how to decide when the bargain we are being asked to strike is a good one or a bad one, given the benefits and risks of ceding some privacy.

You may now ask: “What about the Constitution, the Bill of Rights, and all of that?” Read the Constitution and Bill of Rights and you will find that there is nothing about privacy in them. The Fourth and Fifth Amendments come closest to being “privacy” amendments, but they’re really about due process of law. The vaunted Ninth Amendment doesn’t protect an unemurated privacy right.

There is neverthess a notion that the Fourteenth Amendment guarantees privacy as a matter of substantive due process. As I have explained, however, substantive due process protects constitutionally guaranteed rights (e.g., liberty of contract). It does not protect imaginary rights, such as the non-existent general right to privacy.

The notion of a general right to privacy is a fairly recent invention of the Supreme Court. It was conjured to serve the Court’s legislative agenda in Griswold v. Connecticut (overturning a Connecticut law that banned the sale of contraceptives) and Roe v. Wade (overturning a Texas anti-abortion law).

There are, of course, federal and State laws that define specific areas of privacy. All such federal and State laws are carve-outs — delineations of specific areas of privacy. They are not general guarantees of privacy. Do we need even more carve-outs to deal with the “privacy crisis”? Let us begin by defining the real privacy problem.

Privacy in the Real World

You may, in spite of what I have just said, think that you have a “right” to privacy. But try that line with prospective creditors, who have a “right” to know enough about you to decide whether to extend credit to you; try that line with banks, which have a “right” to know enough about you so that they can safeguard your savings from impostors; and try that line with the police, who have a “right” (constitutionally) to obtain a warrant to search your home if you are suspected of a crime.

If you want absolute privacy you should not have a job (working for someone else), a credit card, a checking account, a brokerage account, a 401(k), a house, land, a car, a legalized marriage, children who were born in a hospital or educated formally, a formal education of your own, a telephone, an Internet connection, or almost any of the other trappings of what we call civilization. The real issue is the extent to which you are willing to forgo some aspects of privacy in order to work for someone else (other than the Mob), possess a credit card, etc.

PRIVACY ISSUES IN THE PRIVATE SECTOR

Dealing With “Identity Theft”

Let’s be clear about what is being stolen in “identity theft.” An identity thief’s real crime isn’t stealing a person’s identity, it’s using information about that person to steal from that person and/or to steal from others. With that understood, the solution to “identity theft” is straightforward: Fraud is fraud and theft is theft, and they ought to be prosecuted as such.

Moreover, businesses that abet “identity theft” through lax verification and security procedures should be held accountable for their misfeasance.

On to the tougher issue of how to cope with banks, lenders, vendors, and the like.

A Market Solution for Other Private-Sector Issues

So, beyond the obvious penalties for “identity theft” and for misfeasance on the part of businesses that hold personal information, the answer to the private-sector privacy quandary lies . . . in the private sector. The answer, specifically, is the use of what I will call “privacy brokers.” These would be companies that are qualified to explain to an individual his privacy options, and authorized to exercise the individual’s preferences on his behalf. Such firms would be fully knowledgeable of applicable laws and the ins-and-outs of the privacy policies of companies with which an individual might do business. (Bear with me as I explain why I’m not inventing a new and costly middleman.)

How would privacy brokers be paid? If they were paid by businesses, consumers rightly wouldn’t trust them. But how likely is it that consumers will shell out what looks like additional money for a service that, to most consumers, might seem unnecessary? After, in spite of all the personal information that’s afloat in the databases of businesses, credit-card issuers, and credit-rating agencies, relatively few consumers have been defrauded or otherwise compromised.

The answer, of course, is that consumers already are paying for the services of credit-rating agencies through the prices charged by businesses and the interest charged by credit-card issuers. It would be relatively easy for credit-rating agencies to transform themselves into privacy brokers. Privacy brokers would collect all of the information now required by creditors, but they would collect it as consumers’ agents, after duly informing consumers of their options and the risks and benefits of those options. Each consumer would agree to compensate his privacy broker by assigning a share of his credit purchases to the broker. Conveniently enough, the consumer’s creditors would no longer be paying the former credit-rating agency (now a privacy broker) a share of the consumer’s credit purchases for the same information. Thus the consumer would not see any increase in prices or interest charges.

Privacy brokers would compete on the basis of price, service, and reputation. If a privacy broker were to allow its data to be compromised, it would quickly lose customers to existing competitors and new entrants to the privacy-brokerage business. Moreover, privacy brokers — each with tens of millions of clients — would have considerable leverage over businesses’ privacy policies. As a selling point, privacy brokers could use that leverage on the behalf of their clients. Privacy brokers could, for example, negotiate reductions in the amount of personal information that is kept on consumers, ensure that consumers never have to opt-out when it comes to third-party use of personal information, and (most importantly) extract enforceable guarantees about the security of personal information. Those kinds of pro-consumer activities would be fostered by competition among privacy brokers.

PRIVACY VIS-A-VIS GOVERNMENT

Is a National ID Card a Good Idea?

A well-designed ID card might prevent some kinds of “identity theft” if the identifying information embedded in the card could be read only by secure machines and would not be accessible to opportunistic thieves (e.g., unskilled restaurant and department-store employees).

But well-heeled terrorist organizations would find ways to create seemingly legitimate ID cards for their members. And there’s the rub. Possession of a single piece of ID, one that is presumed to be authoritative, would make it easier for terrorists to gain access to vulnerable sites (e.g., passenger aircraft) and to elude investigation by deflecting suspicion.

Uncle Sam already knows (or can know) everything about me. A national ID card wouldn’t make a difference in that respect. But it would make it easier for terrorists to terrorize. The card is therefore a bad idea.

Privacy or Liberty?

It is sometimes necessary for government to intrude on privacy for the sake of liberty. If, for example, the punishment of crime fosters the security of life, limb, and property by deterring yet more crime, then liberty is served by certain types of governmental intrusion on privacy (e.g., searches of private property, questioning of suspects and witnesses, and compulsion of testimony in criminal cases).

Similarly, the defense of the United States (which includes the defense of Americans and American interests abroad), may justify governmental intrusions on privacy. But there must be restraints on governmental intrusion to ensure that no instance of intrusion is broader than required for the accomplishment of a legitimate governmental function. From a libertarian perspective, that rules out any governmental intrusion of privacy which isn’t aimed at promoting justice or defending citizens and their property.

Thus, for example, government is improperly intrusive when it issues a census questionnaire that asks for more information than is necesary to enumerate the population. By contrast, government is properly vigilant when it engages in clandestine surveillance that is warranted by a known threat to the life and limb of Americans (e.g., the continuing threat from al Qaeda).

Those who reflexively oppose certain provisions of the Patriot Act (e.g., the issuance of national security letters for library reading lists) and those who bemoan NSA intercepts of international communications want privacy to take precedence over other manifestations of liberty. As I wrote here, “There can be no absolute liberties where life is at stake. Without life, liberty is meaningless.”

It is clear that it is fully within the president’s constitutional authority to order electronic surveillance of communications between persons in the U.S. and persons overseas. It is especially clear that such surveillance is legitimate because of its war-related purpose.

The Framers intended the executive to be a passive enforcer of laws passed by Congress that bear on domestic affairs (and those laws were to be strictly limited in scope by Article I, Section 8, of the Constitution). At the same time, the Framers intended the executive to defend Americans actively against enemies foreign and domestic. No one has put it more clearly than Justice Felix Frankfurter:

. . . [W]e have had recent occasion to quote approvingly the statement of former Chief Justice Hughes that the war power of the Government is ‘the power to wage war successfully.’ . . . Therefore, the validity of action under the war power must be judged wholly in the context of war. That action is not to be stigmatized as lawless because like action in times of peace would be lawless. To talk about a military order that expresses an allowable judgment of war needs by those entrusted with the duty of conducting war as ‘an unconstitutional order’ is to suffuse a part of the Constitution with an atmosphere of unconstitutionality. The respective spheres of action of military authorities and of judges are of course very different. But within their sphere, military authorities are no more outside the bounds of obedience to the Constitution than are judges within theirs. . . . To recognize that military orders are ‘reasonably expedient military precautions’ in time of war and yet to deny them constitutional legitimacy makes of the Constitution an instrument for dialetic subtleties not reasonably to be attributed to the hard-headed Framers, of whom a majority had had actual participation in war. If a military order such as that under review does not transcend the means appropriate for conducting war, such action . . . is as constitutional as would be any authorized action by the Interstate Commerce Commission within the limits of the constitutional power to regulate commerce.

To get down to cases — the case of NSA surveillance, in particular — Tom Smith of The Right Coast has this to say:

. . . [I]t strikes me as just wrong, and very counter-intuitive, to think of the Fourth Amendment as limiting the President’s Article II wartime powers at all. If this were the case, it would mean something like the President’s powers to wage war against those US citizens who had decided to fight for the enemy, had to be conducted within something like the proscriptions of constitutional criminal procedure. Surely, that can’t be right. This is not to say the President’s Article II powers are unlimited. That is what, I take it, the Youngstown Steel case is about. But if FISA really does subject Article II wartime powers to the procedural rigamarole in FISA, then it would be unconstitutional. . . . So where that leaves us, it seems to me, is fairly clear. The President did not violate FISA, as that statute has been interpreted by the highest court other than the Supreme Court that has has the power to interpret it, and indeed specializes in interpreting it, so presumably is due some deference for that, and thus, for the President’s action to be illegal, it would have to have exceeded his Article II powers. . . . While it is logically possible that the NSA program exceeded the Article II powers, it strikes me as a very implausible claim. We are not talking here about nationalizing the steel industry, or interring all Muslims or something of that sort. We are talking about data-mining calls and emails which have an elevated probability of being connected to terrorism, because they are within a network anchored by phone numbers or email addresses found in al Qaeda phones or computers, or because of charateristics of the calls or emails. If anyone thinks . . . that doing that is outside the President’s Article II powers, they have a ludicrously narrow conception of those powers, a conception simply inconsistent with the President’s discharge of his duty to prevent future catastrophic terrorist attacks on the people of the United States. That alone suggests it is an incorrect conception of those powers, a fact even the Supreme Court is likely to notice.

What we see in the dispute about such things as the Patriot Act and NSA surveillance is a failure to distinguish between the free exercise of liberty, on the one hand, and the necessary exercise of governmental power to preserve liberty, on the other hand. That failure is unwitting — but nonetheless dangerous — when it emanates from persons who simply have no understanding of the Constitution or who wish to live in a dream-world in which government simply cannot encroach upon their privacy for any reason. That failure is entirely witting — and essentially subversive — when it emanates from persons who simply wish to twist the meaning of the Constitution so that it serves their anti-libertarian agenda: statism at home and surrender abroad.

What About Government Data-Mining?

There is, nevertheless, a real threat that surveillance could lead to the creation of massive databases that could be misused by government officials. It is one thing to create databases that enable law-enforcement officials to detect and avert attacks on Americans and Americans’ interests, at home and abroad. It is quite another thing to create and use such databases for the purpose, say, of anticipating or imagining criminal conspiracies.

How, then, is it possible to protect Americans from acts of war, terrorism, insurrection, or rebellion without subjecting them to the very real danger of overreaching on the part of government officials — who will be tempted to misuse the information to which they have access? We learned — on September 11, 2001 — that it is folly to put a firewall between domestic and foreign intelligence. The firewall must be placed elsewhere; here is how I would construct it and where I would place it:

  • No government agency (including contractors) may collect or store personal information other than that which is gathered pursuant to a specific, constitutionally authorized exercise of authority (e.g., issuing driving licenses, maintaining tax and property records, investigating crimes that have been reported, maintaining records of arrests and convictions, algorithmically surveilling communications for the purpose of detecting possible terrorist activity).
  • The federal government (and only particular units of the federal government, as authorized by law) may collate such information in a database or databases that may be used only for the purposes of detecting conspiracies to commit acts of war, terrorism, insurrection, or rebellion against the United States, a State, or the citizens of the United States or their property.
  • Information gleaned from such a database may be used, without judicial approval, to avert an imminent attack or to respond to an attack.
  • Otherwise, the information gleaned from such a database may be used, with judicial approval, to initiate surveillance of persons or property within the jurisdiction of the United States — and then only for the purpose of preventing acts of war, terrorism, insurrection, or rebellion.
  • Actions against persons or property outside the jurisdiction of the United States must be taken in accordance with the 1973 War Powers Resolution and/or applicable treaties.
  • Information gleaned from such a database may never be used for any purpose other than the prevention of or response to acts of war, terrorism, insurrection, or rebellion against the United States, a State, or the citizens of the United States or their property.

Details would be supplied by statute. Compliance would be monitored by a commission; the president, Congress (by concurrent resolution), and the chief justice of the United States each would appoint one-third of the commission’s members.

SUMMARY AND CONCLUSION

Privacy is not, never has been, and never should be an absolute right. To make it such would be incompatible with the defense of life, liberty, and property.

With respect to privacy in the private sector, we should remember that a one-size-fits-all regulation has the predictable effect of fitting almost no one and generally forcing buyers and sellers to make inferior choices. Government should protect Americans from force and fraud. Beyond that, it is up to Americans to decide for themselves how much privacy they wish to enjoy in their voluntary transactions. They could do so quite effectively, and at no additional cost, with the help of “privacy brokers” — firms that would do for consumers what they now do for businesses.

Turning to privacy vis-a-vis government, we should remember that government legitimately seeks to protect the lives and property of Americans, so that they can pursue happiness as they see it. Privacy absolutists — those who place privacy above security — endanger us all. They would render us defenseless against very real and potent threats to liberty and the pursuit of happiness. The idea of a national ID card fails because it would create a vulnerability, not because it would threaten privacy in the land of the ubiquitous Social Security number. On the other hand, there is a legitimate place for the surveillance of telecommunications and for data-mining, as long as the use of both is confined to the protection of life, liberty, and property against our enemies. A way of ensuring that surveillance and data-mining are not misused is to establish an oversight commission comprising members of all three branches of the federal government.

The legitimate function of the state is to protect its citizens from predators and parasites, it is not to protect predators and parasites. The critics of aggressive defense like to proclaim their dedication to civil liberties, but their statist agenda in domestic matters betrays their selective dedication to liberty.

There is a balance to be struck between privacy and liberty, but it should not — and need not — be struck in favor of our enemies. The Constitution is, first and foremost, a mutual defense pact, not a suicide pact.

Related collections of posts:
The Constitution: Original Meaning, Subversion, and Remedies
Economics: Principles and Issues
War, Self-Defense, and Civil Liberties

CLICK HERE TO READ THE ENTIRE POST AT LIBERTY CORNER II.

Privacy: Variations on the Theme of Liberty

I have noted elsewhere that the mainstream media seem to have missed an opportunity to declare a “privacy crisis.” Nevertheless, there is in the air (so to speak) a quasi-hysterical view that privacy is the be-all and end-all of existence — above and beyond life, liberty, and the pursuit of happiness. It is past time for a balanced view of privacy. Thus this post.

I begin by addressing privacy as a right. I then turn to private-sector issues, namely, identity theft and the use of personal information by businesses. In the next substantive portion of this post I address privacy vis-a-vis government, disposing quickly of the national ID card to focus on warrantless “eavesdropping” and data-mining. I then offer a brief summary and conclusion.

IS PRIVACY AN ABSOLUTE RIGHT?

Privacy in the Law

Privacy is one among many values that liberty should serve. An individual’s desire for privacy is as legitimate as a desire for, say, a Lamborghini, a full head of hair, and perpetual youth. Seriously, privacy is a legitimate pursuit, yet (like a Lamborghini) it cannot an absolute right. For — as I have argued elsewhere — if privacy were an absolute right, it would be possible to get away with murder in one’s home simply by committing murder there. In fact, if there are any absolute rights, privacy certainly isn’t one of them. Privacy really is a bargain that individuals strike with the rest of the world. We cannot act in the world without ceding some privacy, so the question is how to decide when the bargain we are being asked to strike is a good one or a bad one, given the benefits and risks of ceding some privacy.

You may now ask: “What about the Constitution, the Bill of Rights, and all of that?” Read the Constitution and Bill of Rights and you will find that there is nothing about privacy in them. The Fourth and Fifth Amendments come closest to being “privacy” amendments, but they’re really about due process of law. The vaunted Ninth Amendment doesn’t protect an unemurated privacy right. Rather, as I explained here, in drafting the Ninth Amendment Madison had in mind no particular unenumerated rights:

It is clear from its text and from Madison’s statement [upon presenting the Bill of Rights to the House of Representatives] that the [Ninth] Amendment states but a rule of construction, making clear that a Bill of Rights might not by implication be taken to increase the powers of the national government in areas not enumerated, and that it does not contain within itself any guarantee of a right or a proscription of an infringement.

Thomas McAffee, writing about the Ninth Amendment in The Heritage Guide to the Constitution (pp. 366-71), comes to the same conclusion:

. . . Madison . . . affirmed that the reason for the Ninth Amendment was not to expand the power of the Court to find new rights, but rather to restrict the ability of the Court to expand the legislative powers of Congress. Madison continued to maintain that that was the central meaning of the Ninth Amendment throughout his life, and his interpretation was seconded by most commentators of the time.

There is neverthess a notion that the Fourteenth Amendment guarantees privacy as a matter of substantive due process. As I have explained, however, substantive due process protects constitutionally guaranteed rights (e.g., liberty of contract). It does not protect imaginary rights, such as the non-existent general right to privacy.

The notion of a general right to privacy is a fairly recent invention of the Supreme Court. It was conjured to serve the Court’s legislative agenda in Griswold v. Connecticut (overturning a Connecticut law that banned the sale of contraceptives) and Roe v. Wade (overturning a Texas anti-abortion law). But, as I wrote here,

the Roe v. Wade majority acknowledged that abortion is not even an unenumerated right. It then manufactured from specified procedural rights enumerated in the Bill of Rights — rights which are totally unrelated to abortion — and from strained precedents involving “penumbras” and “emanations,” a general right to privacy in order to find a “privacy” right to abortion. . . .

It is therefore unsurprising that the majority in Roe v. Wade could not decide whether the general privacy right is located in the Ninth Amendment or the Fourteenth Amendment. Neither amendment, of course, is the locus of a general privacy right because none is conferred by the Constitution, nor could the Constitution ever confer such a right, for it would interfere with such truly compelling state interests as the pursuit of justice. The majority simply chose to ignore that unspeakable consequence by conjuring a general right to privacy for the limited purpose of ratifying abortion.

The spuriousness of the majority’s conclusion is evident in its flinching from the logical end of its reasoning: abortion anywhere at anytime. Instead, the majority delivered this:

The privacy right involved, therefore, cannot be said to be absolute. . . . We, therefore, conclude that the right of personal privacy includes the abortion decision, but that this right is not unqualified and must be considered against important state interests in regulation.

And so, the Court brought us right back to where we were in the beginning — without a general or absolute right to privacy.

There are, of course, federal and State laws that define specific areas of privacy. At the federal level, for example, there is the Medical Information Privacy and Security Act (MIPSA). As described by Wikipedia, MIPSA

contains important provisions requiring accesses to generate an audit trail, and for patients to be able to partition their data so that for example genetic information is not revealed when they go for a flu jab. Individuals have a right to access, copy, edit and augment their information.

Wikipedia summarizes State law thusly:

Most states in the U.S. grant a right to privacy and recognise four torts:

  1. Intrusion upon seclusion or solitude, or into private affairs;
  2. Public disclosure of embarrassing private facts;
  3. Publicity which places a person in a false light in the public eye; and
  4. Appropriation of name or likeness.

All such federal and State laws are carve-outs — delineations of specific areas of privacy. They are not general guarantees of privacy. Do we need even more carve-outs to deal with the “privacy crisis”? Let us begin by defining the real privacy problem.

Privacy in the Real World

You may, in spite of what I have just said, think that you have a “right” to privacy. But try that line with prospective creditors, who have a “right” to know enough about you to decide whether to extend credit to you; try that line with banks, which have a “right” to know enough about you so that they can safeguard your savings from impostors; and try that line with the police, who have a “right” (constitutionally) to obtain a warrant to search your home if you are suspected of a crime.

If you want absolute privacy you should not have a job (working for someone else), a credit card, a checking account, a brokerage account, a 401(k), a house, land, a car, a legalized marriage, children who were born in a hospital or educated formally, a formal education of your own, a telephone, an Internet connection, or almost any of the other trappings of what we call civilization. The real issue is the extent to which you are willing to forgo some aspects of privacy in order to work for someone else (other than the Mob), possess a credit card, etc.

Given that privacy is neither an absolute right nor something that many of us choose to purchase by forgoing the trappings of civilization, let’s consider what we really seek when we claim to seek privacy. Suppose that, unknown to you, someone gathers information about you that you had not intended to disclose. You have suffered no harm unless the gathering of such information

  • enables a person, business, or government to manipulate your behavior by presenting information or options in ways calculated to lead you to certain decisions (e.g., see my posts about “libertarian paternalism” here, here, here, and here)
  • causes unsubstantiated harm to your reputation
  • results in blackmail or the theft of your property
  • results in the imposition of a civil or criminal penalty for an act or acts that you did not commit.

Beyond that, there is no reason to give special preference to privacy over other considerations; for example, a lender’s need for information about your credit-worthiness, government’s legitimate interest in protecting citizens from terrorism.

PRIVACY ISSUES IN THE PRIVATE SECTOR

Dealing With “Identity Theft”

Let’s be clear about what is being stolen in “identity theft.” An identity thief’s real crime isn’t stealing a person’s identity, it’s using information about that person to steal from that person and/or to steal from others. With that understood, the solution to “identity theft” is straightforward: Fraud is fraud and theft is theft, and they ought to be prosecuted as such.

Moreover, businesses that abet “identity theft” through lax verification and security procedures should be held accountable for their misfeasance.

On to the tougher issue of how to cope with banks, lenders, vendors, and the like.

A Market Solution for Other Private-Sector Issues

Should there be restrictions on the scope of personal information that private data aggregators are allowed to gather? If so, how should those restrictions should be enforced? One option is individual choice, in which each person picks the set of privacy bargains that suits his or her taste for privacy, on the one hand, and ease of transacting business, on the other hand. The other option is for government to establish one-size-fits-all rules — even beyond those it already has laid down — such as a ban on the use of universal identification numbers (e.g., Social Security numbers) by banks, credit agencies, insurers, and the like.

The problem with one-size-fits-all rules — especially one as sweeping as a ban on the use of universal ID numbers — is that they make it harder and more expensive for consumers to transact business. A consumer’s credit rating, which now follows him wherever he goes, thanks (or no thanks) mainly to his Social Security number, is (for almost all consumers) a boon, not a bane. Without the SSN or some other universal identifier, we would revert the days of local and regional credit-rating agencies. The higher cost of verifying a purchasers’ credit would, of course, reduce the volume of transactions and lead to higher prices. Small businesses would be especially hard-hit.

So, beyond the obvious penalties for “identity theft” and for misfeasance on the part of businesses that hold personal information, the answer to the private-sector privacy quandary lies . . . in the private sector. The answer, specifically, is the use of what I will call “privacy brokers.” These would be companies that are qualified to explain to an individual his privacy options, and authorized to exercise the individual’s preferences on his behalf. Such firms would be fully knowledgeable of applicable laws and the ins-and-outs of the privacy policies of companies with which an individual might do business. (Bear with me as I explain why I’m not inventing a new and costly middleman.)

How would privacy brokers be paid? If they were paid by businesses, consumers rightly wouldn’t trust them. But how likely is it that consumers will shell out what looks like additional money for a service that, to most consumers, might seem unnecessary? After, in spite of all the personal information that’s afloat in the databases of businesses, credit-card issuers, and credit-rating agencies, relatively few consumers have been defrauded or otherwise compromised.

The answer, of course, is that consumers already are paying for the services of credit-rating agencies through the prices charged by businesses and the interest charged by credit-card issuers. It would be relatively easy for credit-rating agencies to transform themselves into privacy brokers. Privacy brokers would collect all of the information now required by creditors, but they would collect it as consumers’ agents, after duly informing consumers of their options and the risks and benefits of those options. Each consumer would agree to compensate his privacy broker by assigning a share of his credit purchases to the broker. Conveniently enough, the consumer’s creditors would no longer be paying the former credit-rating agency (now a privacy broker) a share of the consumer’s credit purchases for the same information. Thus the consumer would not see any increase in prices or interest charges.

Privacy brokers would compete on the basis of price, service, and reputation. If a privacy broker were to allow its data to be compromised, it would quickly lose customers to existing competitors and new entrants to the privacy-brokerage business. Moreover, privacy brokers — each with tens of millions of clients — would have considerable leverage over businesses’ privacy policies. As a selling point, privacy brokers could use that leverage on the behalf of their clients. Privacy brokers could, for example, negotiate reductions in the amount of personal information that is kept on consumers, ensure that consumers never have to opt-out when it comes to third-party use of personal information, and (most importantly) extract enforceable guarantees about the security of personal information. Those kinds of pro-consumer activities would be fostered by competition among privacy brokers.

My bottom line here is that there is an effective, efficient market answer to concerns about securing privacy vis-a-vis the private sector. But the private sector must act before Congress imposes an inefficient, one-size-fits-all, “solution” on us. There is still time to act, according to a story in Wired News (November 10), which says that “Congress is unlikely to pass any data-security bills by the end of the year, according to Hill watchers.”

PRIVACY VIS-A-VIS GOVERNMENT

Is a National ID Card a Good Idea?

A national ID card would be a good idea if its use would decrease the likelihood of terrorism, but it wouldn’t– as I will explain.

I have no objection to carrying an ID card. I already carry several, the possession of which by another person would give that person access to just about anything he might want to know about me: my date of birth, SSN, health history, driving record, criminal record (zilch, sorry), and so on.

A well-designed ID card might even prevent some kinds of “identity theft” if the identifying information embedded in the card could be read only by secure machines and would not be accessible to opportunistic thieves (e.g., unskilled restaurant and department-store employees).

But well-heeled terrorist organizations would find ways to create seemingly legitimate ID cards for their members. And there’s the rub. Possession of a single piece of ID, one that is presumed to be authoritative, would make it easier for terrorists to gain access to vulnerable sites (e.g., passenger aircraft) and to elude investigation by deflecting suspicion.

Uncle Sam already knows (or can know) everything about me. A national ID card wouldn’t make a difference in that respect. But it would make it easier for terrorists to terrorize. The card is therefore a bad idea.

Privacy or Liberty?

It is sometimes necessary for government to intrude on privacy for the sake of liberty. If, for example, the punishment of crime fosters the security of life, limb, and property by deterring yet more crime, then liberty is served by certain types of governmental intrusion on privacy (e.g., searches of private property, questioning of suspects and witnesses, and compulsion of testimony in criminal cases).

Similarly, the defense of the United States (which includes the defense of Americans and American interests abroad), may justify governmental intrusions on privacy. But there must be restraints on governmental intrusion to ensure that no instance of intrusion is broader than required for the accomplishment of a legitimate governmental function. From a libertarian perspective, that rules out any governmental intrusion of privacy which isn’t aimed at promoting justice or defending citizens and their property.

Thus, for example, government is improperly intrusive when it issues a census questionnaire that asks for more information than is necesary to enumerate the population. By contrast, government is properly vigilant when it engages in clandestine surveillance that is warranted by a known threat to the life and limb of Americans (e.g., the continuing threat from al Qaeda).

Those who reflexively oppose certain provisions of the Patriot Act (e.g., the issuance of national security letters for library reading lists) and those who bemoan NSA intercepts of international communications want privacy to take precedence over other manifestations of liberty. As I wrote here, “There can be no absolute liberties where life is at stake. Without life, liberty is meaningless.” The Framers of the Constitution recognized that principle:

. . . When the Fourth Amendment was written, the sole remedy for an illegal search or seizure was a lawsuit for money damages. Government officials used warrants as a defense against such lawsuits. Today a warrant seems the police officer’s foe — one more hoop to jump through — but at the time of the Founding it was the constable’s friend, a legal defense against any subsequent claim. Thus it was perfectly reasonable to specify limits on warrants (probable cause, particular description of the places to be search and the things to be seized) but never to require their use. (From the “Warrant Clause,” by Prof. William J. Stuntz of Harvard Law in The Heritage Guide to the Constitution, pp. 326-9.)

Thus, by the original meaning of the Constitution, all warrantless searches may be permissible. But judges and legislators have so changed the meaning of the Constitution that these views have instead become prevalent: government cannot conduct searches without a warrant; warrantless searches are “invasions of privacy” (as if privacy were either constitutionally guaranteed or some sort of “natural right’). Moreover, there is — especially among “civil libertarians,” anti-American Americans, and right-wing loonies — a preference for an undifferentiated right to “privacy” over “the common defence, “to provide for which the Constitution was adopted. Antidotes to such views may be found here:

President had legal authority to OK taps (Chicago Tribune)
Our domestic intelligence crisis (Richard A. Posner)
Many posts by Tom Smith of The Right Coast (start here and scroll up)
Eavesdropping Ins and Outs (Mark R. Levin, writing at National Review Online)
The FISA Act And The Definition Of ‘US Persons’ (Ed Morrissey of Captain’s Quarters)
A Colloquy with the Times (John Hinderaker of Power Line)
September 10 America (editorial at National Review Online)
A Patriot Acts (Ben Stein, writing at The American Spectator)
More on the NSA Wiretaps (Dale Franks of QandO)
The President’s War Power Includes Surveillance (John Eastman, writing at The Remedy)
Warrantless Intelligence Gathering, Redux (UPDATED) (Jeff Goldstein, writing at Protein Wisdom)
FISA Court Obstructionism Since 9/11 (Ed Morrissey of Captain’s Quarters)
FISA vs. the Constitution (Robert F. Turner, writing at OpinionJournal)
Wisdom in Wiretaps (an editorial from OpinionJournal)
Under Clinton, NY Times Called Surveillance a Necessity (William Tate, writing at The American Thinker)
Experts’ Letter on NSA Program (by Tom Smith of The Right Coast)
LEGAL AUTHORITIES SUPPORTING THE ACTIVITIES OF THE
NATIONAL SECURITY AGENCY DESCRIBED BY THE PRESIDENT
(U.S. Department of Justice)
Terrorists on Tap (Victoria Toensing, writing at OpinionJournal)
Letter from Chairman, Senate Intelligence Committee, to Chairman and Ranking Member of Senate Judiciary Committee
Letter from H. Bryan Cunningham to Chairman and Ranking Member of Senate Judiciary Committee
Has The New York Times Violated the Espionage Act? (article in Commentary by Gabriel Schoenfeld)
Point of No Return (Thomas Sowell, writing at RealClearPolitics)
Letter from John C. Eastman to Chairman of House Judiciary Committee
FISA Chief Judge Speaks Out, Bamford Misinforms (a post at The Strata-Sphere)
DoJ Responds to Congressional FISA Questions (another post at The Strata-Sphere)

As for the president’s authority in foreign affairs — which encompasses the defense of the nation — I quote Sai Prakash, who writes about the Constitution’s Executive Vesting Clause (Article II, Section 1, Clause 1) in The Heritage Guide to the Constitution (pp. 179-82):

The [Executive Vesting Clause] . . . accords the President those foreign-affairs authorities not otherwise granted to Congress or shared with the Senate. . . .

The Articles of Confederation lacked an independent chief executive. Instead, the Continental Congress exercised the executive power, appointing and dominating the secretaries of the executive departments. Unfortunately, law execution under the direction of a distracted, plural executive was neighter vigorous nor swift. Congress likewise proved a poor steward of foreign affairs, with American diplomats complaining that Congress could not act with the requisite speed or secrecy. . . .

Resolving to avoid the problems plaguing state and national executives, the Constitution’s makers created an energetic, responsible, and unified executive. . . . The Anti-Federalists well understood the Framers’ design and criticized the unitary executive [but they lost the argument: ED] . . . .

. . . [T]he delegates [to the Constitutional Convention] spoke of the President’s principal foreign-affairs role, oftentimes referring to the Senate’s role in treaty-making as a limited exception to the grant of foreign-affairs authority to the President. . . .

. . . [T]raditional rules of statutory interpretation require us to take seriously the differences in phrasing across the three vesting clauses. Artilce I, Section 1 (“All legislative Powers herein granted shall be vested in a Congress of the United States. . . .”) makes clear that it vests no authorities separate from those enumerated in the rest of Article I. In contrast, Article III, Section 1 (“The judicial Power of the United States, shall be vested in one supreme Court, and in such inferior Courts as the Congress may . . . establish.”) clearly vests the federal courts with judicial authority. The Executive Vesting Clause reads like its Article III counterpart, in sharp contrast to the Article I introductory clause. . . .

In a case touching upon foreign affairs, the judiciary has recently reaffired that the executive power grants foreign-affairs authority to the President. See American Insurance Ass’n v. Garamendi (2003). This marks a departure from prior case law, which had grounded the executive’s foreign-affairs powers not in any constitutional text, but in necessity and sovereignty. See United States v. Curtiss-Wright Export Corp. (1936).

John Yoo and James C. Ho, writing in the same volume about the president’s role as commander in chief (pp. 195-8), have this to say:

. . .[S]ome originalist scholars have concluded that Congress’s war power is limited to its control over funding and its power to impeach executive officers. They contend that the President is constitutionally empowered to engage in hostilities with whatever resources Congress has made available to the executive. . . .

In summary, the argument for executive initiative rests on the background understanding that the vesting of “executive Power” and the “Commander in Chief” designation together constitute a substantive grant of authority to the President to conduct military operations.

It is clear that it is fully within the president’s constitutional authority to order electronic surveillance of communications between persons in the U.S. and persons overseas. It is especially clear that such surveillance is legitimate because of its war-related purpose.

The Framers intended the executive to be a passive enforcer of laws passed by Congress that bear on domestic affairs (and those laws were to be strictly limited in scope by Article I, Section 8, of the Constitution). At the same time, the Framers intended the executive to defend Americans actively against enemies foreign and domestic. No one has put it more clearly than Justice Felix Frankfurter:

. . . [W]e have had recent occasion to quote approvingly the statement of former Chief Justice Hughes that the war power of the Government is ‘the power to wage war successfully.’ . . . Therefore, the validity of action under the war power must be judged wholly in the context of war. That action is not to be stigmatized as lawless because like action in times of peace would be lawless. To talk about a military order that expresses an allowable judgment of war needs by those entrusted with the duty of conducting war as ‘an unconstitutional order’ is to suffuse a part of the Constitution with an atmosphere of unconstitutionality. The respective spheres of action of military authorities and of judges are of course very different. But within their sphere, military authorities are no more outside the bounds of obedience to the Constitution than are judges within theirs. . . . To recognize that military orders are ‘reasonably expedient military precautions’ in time of war and yet to deny them constitutional legitimacy makes of the Constitution an instrument for dialetic subtleties not reasonably to be attributed to the hard-headed Framers, of whom a majority had had actual participation in war. If a military order such as that under review does not transcend the means appropriate for conducting war, such action . . . is as constitutional as would be any authorized action by the Interstate Commerce Commission within the limits of the constitutional power to regulate commerce.

To get down to cases — the case of NSA surveillance, in particular — Tom Smith of The Right Coast has this to say:

. . . [I]t strikes me as just wrong, and very counter-intuitive, to think of the Fourth Amendment as limiting the President’s Article II wartime powers at all. If this were the case, it would mean something like the President’s powers to wage war against those US citizens who had decided to fight for the enemy, had to be conducted within something like the proscriptions of constitutional criminal procedure. Surely, that can’t be right. This is not to say the President’s Article II powers are unlimited. That is what, I take it, the Youngstown Steel case is about. But if FISA really does subject Article II wartime powers to the procedural rigamarole in FISA, then it would be unconstitutional. . . . So where that leaves us, it seems to me, is fairly clear. The President did not violate FISA, as that statute has been interpreted by the highest court other than the Supreme Court that has has the power to interpret it, and indeed specializes in interpreting it, so presumably is due some deference for that, and thus, for the President’s action to be illegal, it would have to have exceeded his Article II powers. . . . While it is logically possible that the NSA program exceeded the Article II powers, it strikes me as a very implausible claim. We are not talking here about nationalizing the steel industry, or interring all Muslims or something of that sort. We are talking about data-mining calls and emails which have an elevated probability of being connected to terrorism, because they are within a network anchored by phone numbers or email addresses found in al Qaeda phones or computers, or because of charateristics of the calls or emails. If anyone thinks . . . that doing that is outside the President’s Article II powers, they have a ludicrously narrow conception of those powers, a conception simply inconsistent with the President’s discharge of his duty to prevent future catastrophic terrorist attacks on the people of the United States. That alone suggests it is an incorrect conception of those powers, a fact even the Supreme Court is likely to notice.

What we see in the dispute about such things as the Patriot Act and NSA surveillance is a failure to distinguish between the free exercise of liberty, on the one hand, and the necessary exercise of governmental power to preserve liberty, on the other hand. That failure is unwitting — but nonetheless dangerous — when it emanates from persons who simply have no understanding of the Constitution or who wish to live in a dream-world in which government simply cannot encroach upon their privacy for any reason. That failure is entirely witting — and essentially subversive — when it emanates from persons who simply wish to twist the meaning of the Constitution so that it serves their anti-libertarian agenda: statism at home and surrender abroad.

What About Government Data-Mining?

There is, nevertheless, a real threat that surveillance could lead to the creation of massive databases that could be misused by government officials. Tom Smith observes that

technology on the data mining front is moving very fast. In fact, the term data mining is too narrow and somewhat dated. For just a taste of one cutting edge approach, check this out. This company takes a semantic network approach to unstructured databases. There are other approaches as well.

What I am getting at is, if the government puts together a huge database — and . . . it is within their capabilities, well within — then with tech from the private sector, not to mention what NSA geniuses come up with, then what they can figure out about individuals, firms, and so on, really does not have any clear limit. It is not at all far fetched to say if the government wanted to, it could know more about people than they know about themselves, a lot more.

There are many questions here. The first is whether the storage of this information violates constitutional protections. I think sentience may make some difference here. If every email you have sent in the last five years is stored in some place the government has access to, but they do not actually access it, then I’m not sure your privacy has been affected at all.

But here is something that worries me, though maybe it shouldn’t. Search algorithms are already astonishingly powerful. They are advancing rapidly. It may be possible soon to pull out from such things as patterns of emails, phone calls, puchases and the like, people likely to be involved in drug trafficing, money laundering, whatever. If an impartial algorithm can troll through a database and produce a list of people who really are, to some high degree of probability, connected with herion trafficking say, should that be enough to support a warrant to start the really intrusive, traditional sort of surveillance?

I have already made clear that I think the President should be able to do exactly this if it is necessary to fight a war. But law enforcement agencies doing it does strike me as pretty creepy. It could be an extremely powerful law enforcement tool, though.

It is one thing to create databases that enable law-enforcement officials to detect and avert attacks on Americans and Americans’ interests, at home and abroad. It is quite another thing to create and use such databases for the purpose, say, of anticipating or imagining criminal conspiracies.

How, then, is it possible to protect Americans from acts of war, terrorism, insurrection, or rebellion without subjecting them to the very real danger of overreaching on the part of government officials — who will be tempted to misuse the information to which they have access? We learned — on September 11, 2001 — that it is folly to put a firewall between domestic and foreign intelligence. The firewall must be placed elsewhere; here is how I would construct it and where I would place it:

  • No government agency (including contractors) may collect or store personal information other than that which is gathered pursuant to a specific, constitutionally authorized exercise of authority (e.g., issuing driving licenses, maintaining tax and property records, investigating crimes that have been reported, maintaining records of arrests and convictions, algorithmically surveilling communications for the purpose of detecting possible terrorist activity).
  • The federal government (and only particular units of the federal government, as authorized by law) may collate such information in a database or databases that may be used only for the purposes of detecting conspiracies to commit acts of war, terrorism, insurrection, or rebellion against the United States, a State, or the citizens of the United States or their property.
  • Information gleaned from such a database may be used, without judicial approval, to avert an imminent attack or to respond to an attack.
  • Otherwise, the information gleaned from such a database may be used, with judicial approval, to initiate surveillance of persons or property within the jurisdiction of the United States — and then only for the purpose of preventing acts of war, terrorism, insurrection, or rebellion.
  • Actions against persons or property outside the jurisdiction of the United States must be taken in accordance with the 1973 War Powers Resolution and/or applicable treaties.
  • Information gleaned from such a database may never be used for any purpose other than the prevention of or response to acts of war, terrorism, insurrection, or rebellion against the United States, a State, or the citizens of the United States or their property.

Details would be supplied by statute. Compliance would be monitored by a commission; the president, Congress (by concurrent resolution), and the chief justice of the United States each would appoint one-third of the commission’s members.

SUMMARY AND CONCLUSION

Privacy is not, never has been, and never should be an absolute right. To make it such would be incompatible with the defense of life, liberty, and property.

With respect to privacy in the private sector, we should remember that a one-size-fits-all regulation has the predictable effect of fitting almost no one and generally forcing buyers and sellers to make inferior choices. Government should protect Americans from force and fraud. Beyond that, it is up to Americans to decide for themselves how much privacy they wish to enjoy in their voluntary transactions. They could do so quite effectively, and at no additional cost, with the help of “privacy brokers” — firms that would do for consumers what they now do for businesses.

Turning to privacy vis-a-vis government, we should remember that government legitimately seeks to protect the lives and property of Americans, so that they can pursue happiness as they see it. Privacy absolutists — those who place privacy above security — endanger us all. They would render us defenseless against very real and potent threats to liberty and the pursuit of happiness. The idea of a national ID card fails because it would create a vulnerability, not because it would threaten privacy in the land of the ubiquitous Social Security number. On the other hand, there is a legitimate place for the surveillance of telecommunications and for data-mining, as long as the use of both is confined to the protection of life, liberty, and property against our enemies. A way of ensuring that surveillance and data-mining are not misused is to establish an oversight commission comprising members of all three branches of the federal government.

The legitimate function of the state is to protect its citizens from predators and parasites, it is not to protect predators and parasites. The critics of aggressive defense like to proclaim their dedication to civil liberties, but their statist agenda in domestic matters betrays their selective dedication to liberty.

There is a balance to be struck between privacy and liberty, but it should not — and need not — be struck in favor of our enemies. The Constitution is, first and foremost, a mutual defense pact, not a suicide pact.

Related collections of posts:
The Constitution: Original Meaning, Subversion, and Remedies
Economics: Principles and Issues
War, Self-Defense, and Civil Liberties