fix the paper

retort: a sharp and often angry reply.

foreordained: decided in advance.

When the topic of government surveillance comes up, some folks are quick to respond, “It’s OK. I have nothing to hide.” In this selection, Daniel J. Solove, the John Marshall Harlan Research Professor of Law at the George Washington University Law School and a leading expert on privacy law, seeks to demonstrate the fallacy of such a claim. The selection, which comes from Solove’s 2011 book Nothing to Hide: The False Tradeoff between Privacy and Security, has been praised by John W. Dean, who served as White House counsel for President Nixon, as “the best brief analysis of this issue.” As noted in the subtitle of Solove’s book, tradeoffs are quite relevant to this topic and to legal questions generally because courts, including the U.S. Supreme Court, find themselves balancing the competing interests of various parties. In this case, the relevant parties are individuals, on the one hand, and corporations or governments, on the other. As you read, notice the ways in which Solove is ultimately constructing a definitional argument about the complex nature of privacy, particularly in our contemporary society. You may also want to give some thought to things about your life you might not want made public; doing so will help you appreciate why Solove’s argument matters.

The Nothing-to-Hide Argument

DANIEL J. SOLOVE

When the government gathers or analyzes personal information, many people say they’re not worried. “I’ve got nothing to hide,” they declare. “Only if you’re doing something wrong should you worry, and then you don’t deserve to keep it private.”

The nothing-to-hide argument pervades discussions about privacy. The data security expert Bruce Schneier calls it the “most common retort° against privacy advocates.”1 The legal scholar Geoffrey Stone refers to it as an “all- too-common refrain.”2 In its most compelling form, it is an argument that the privacy interest is generally minimal, thus making the balance against security concerns a foreordained° victory for security. In this chapter, I’ll demonstrate how the argument stems from certain faulty assumptions about privacy and its value.

Daniel J. Solove. “The Nothing-to-Hide Argument” from Nothing to Hide: The False Tradeoff between Privacy and Security. Copyright © 2013 by Yale University Press. Reprinted by permission of the publisher.

734

I’ve Got Nothing to Hide”

The nothing-to-hide argument is everywhere. In Britain, for example, the gov- ernment has installed millions of public surveillance cameras in cities and towns, which are watched by officials via closed-circuit television. In a cam- paign slogan for the program, the government declares: “If you’ve got nothing to hide, you’ve got nothing to fear.”3 In the United States, one anonymous indi- vidual comments: “If [government officials] need to read my e-mails . . . so be it. I have nothing to hide. Do you?”4 Variations of nothing-to-hide arguments fre- quently appear in blogs, letters to the editor, television news interviews, and other forums. One blogger, in reference to profiling people for national security purposes, declares: “Go ahead and profile me, I have nothing to hide.”5 Another blogger proclaims: “So I don’t mind people wanting to find out things about me, I’ve got nothing to hide! Which is why I support [the government’s] efforts to find terrorists by monitoring our phone calls!”6 Some other examples include:

  •   much hidden from the government in the first place. I don’t think they care if I talk about my ornery neighbor.7 


  •   - ther does 99.99 percent of the population. If the wire-tapping stops one of these Sept. 11 incidents, thousands of lives are saved.8 


  •   have nothing to hide. And those that have something to hide should be found out, and get what they have coming to them.9 
The nothing-to-hide argument is not of recent vintage. One of the characters in Henry James’s° 1888 novel The Reverberator muses: “If these people had done bad things they ought to be ashamed of themselves and he couldn’t pity them, and if they hadn’t done them there was no need of making such a rumpus° about other people knowing.”10 
I encountered the nothing-to-hide argument so frequently in news inter- views, discussions, and the like that I decided to probe° the issue. I asked the readers of my blog, Concurring Opinions, whether there are good responses to the nothing-to-hide argument.11 I received a torrent° of comments: 


  •   bills for the last year?” 


  •   “I don’t need to justify my position. You need to justify yours. Come back with a warrant.”° 


Henry James (1843–1916): Ameri- can novelist and critic who spent much of his adult life in Britain and ultimately became a Brit-

ish subject. He is a major figure among late-nineteenth-century literary realists, known for his exploration of human conscious- ness and perception through the characters of his novels.

rumpus: commotion, uproar. probe: to examine something or

someone with great care.

torrent: literally, a powerful stream of fast-moving liq- uid, often water; here, used figuratively.

warrant: in legal contexts, a docu- ment that authorizes its holder to carry out actions such as making an arrest, searching and perhaps seizing property, or ensuring

that a judgment is carried out. In Toulmin argument (as discussed in Chapter 7), a warrant is the connection, often an unstated principle or assumed chain of reasoning, between a particular claim and the reason(s) that sup- ports it—the glue that holds the claim and reason together.

SOLOVE / The Nothing-to-Hide Argument 735

736 C H A P T E R 2 7 HOW HAS THE INTERNET CHANGED THE MEANING OF PRIVACY?

Joseph Stalin (1878–1953): dictator of the Soviet Union from 1924 until his death. Although his policies, which emphasized a state-controlled econ- omy and collectivism, transformed the USSR from a rural society into

an industrial power, he is also known for his brutality: millions of Soviets labeled “enemies of the state” were exiled, imprisoned, or executed at various periods during this era.

Aleksandr Solzhenitsyn (1918– 2008): Nobel Prize–winning novelist and historian known for his outspoken criticism of Soviet efforts to control the public and private lives of its citizens. His novel The Gulag Archipelago (published in the West in 1973 and in Russia in 1989) is based on his research into the history of the Soviet system of labor camps and the eight years he spent in a cor- rectional labor camp after making a disparaging remark about Stalin in a letter to a friend.

Friedrich Dürrenmatt (1921–1990):

Swiss author and playwright who created works for the stage and radio (before television was wide- spread, radio plays were quite popular). His work, often contro- versial, explored philosophical themes popular in Europe after World War II.

mock trial: a trial that is for prac- tice or fun rather than one that has legal consequences.

you, either.



else’s business.

° would [have] loved it. Why should anyone have to say more?12

On the surface it seems easy to dismiss the nothing-to-hide argument. 5 Everybody probably has something to hide from somebody. As the author Aleksandr Solzhenitsyn° declared, “Everyone is guilty of something or has something to conceal. All one has to do is look hard enough to find what it is.”13 Likewise, in Friedrich Dürrenmatt’s° novella Traps, which involves a seemingly innocent man put on trial by a group of retired lawyers for a mock trial° game, the man inquires what his crime shall be. “ ‘An altogether minor matter,’ the prosecutor replied. . . . ‘A crime can always be found.’ ”14

One can usually think of something that even the most open person would want to hide. As a commenter to my blog post noted, “If you have nothing to hide, then that quite literally means you are willing to let me pho- tograph you naked? And I get full rights to that photograph — so I can show it to your neighbors?”15 The Canadian privacy expert David Flaherty expresses

Joseph Stalin AP Photo, 1943

fix the paper 1fix the paper 2

Aleksandr Solzhenitsyn © Bettmann/Corbis

a similar idea when he argues: “There is no sentient° human being in the Western world who has little or no regard for his or her personal privacy; those who would attempt such claims cannot withstand even a few minutes’ questioning about intimate aspects of their lives without capitulating to the intrusiveness of certain subject matters.”16

Such responses attack the nothing-to-hide argument only in its most extreme form, which isn’t particularly strong. In a less extreme form, the nothing-to-hide argument refers not to all personal information but only to the type of data the government is likely to collect. Retorts to the nothing-to- hide argument about exposing people’s naked bodies or their deepest secrets are relevant only if the government is likely to gather this kind of informa- tion. In many instances, hardly anyone will see the information, and it won’t be disclosed to the public. Thus, some might argue, the privacy interest is minimal, and the security interest in preventing terrorism is much more important. In this less extreme form, the nothing-to-hide argument is a for- midable one.

Understanding Privacy

To evaluate the nothing-to-hide argument, we should begin by looking at how its adherents understand privacy. Nearly every law or policy involving privacy depends upon a particular understanding of what privacy is. The way problems are conceived has a tremendous impact on the legal and policy solutions used to solve them. As the philosopher John Dewey° observed, “A problem well put is half-solved.”17

What is “privacy”? Most attempts to understand privacy do so by attempt- ing to locate the essence of privacy — its core characteristics or the common denominator that links together the various things we classify under the rubric of “privacy.” Privacy, however, is too complex a concept to be reduced to a singular essence. It is a plurality° of different things that do not share one element in common but that nevertheless bear a resemblance to each other.18 For example, privacy can be invaded by the disclosure of your deep- est secrets. It might also be invaded if you’re watched by a Peeping Tom, even if no secrets are ever revealed to anyone. With the disclosure of secrets, the harm is that your concealed information is spread to others. With the Peep- ing Tom, the harm is that you’re being watched. You’d probably find it creepy regardless of whether the peeper finds out anything sensitive or discloses any information to others.

There are many other forms of invasion of privacy, such as blackmail or 10 the improper use of your personal data. Your privacy can also be invaded if the government compiles an extensive dossier° about you. Privacy thus

sentient: conscious, capable of feeling and perceiving.

SOLOVE / The Nothing-to-Hide Argument 737

John Dewey (1859–1952): Ameri- can philosopher, educational theorist and reformer, and psychologist.

plurality: here, multitude.

dossier: collection of documents or information, a file.

738 C H A P T E R 2 7 HOW HAS THE INTERNET CHANGED THE MEANING OF PRIVACY?

George Orwell (1903–1950): pen name of Eric Arthur Blair, an English writer known for his prose style, his allegiance to democratic socialism, and his efforts to fight what he perceived as social injus- tice. Orwell wrote novels, essays, and criticism and is also known for his journalistic writings. He coined several terms that are now part of the English language, including cold war, thought crime, thought police, Big Brother, and doublethink—all things he railed against. His name has also become part of the lan- guage: Orwellian refers, always pejoratively, to authoritarian or totalitarian states or practices.

Franz Kafka (1883–1924): writer born in Prague whose works were especially influential after his death. In fact, the word Kaf- kaesque now refers to situations like those described in Kafka’s writings, which are characterized by alienation, brutality, and ines- capable bureaucracies. Though he claimed German, the language in which he wrote, as his native language, he also spoke Czech fluently. As nationalism increased among Czech- and German- speakers in Prague, the city of his birth, he, like the Jews of the city generally, was left to question where, and if, he belonged.

involves so many different things that it is impossible to reduce them all to one simple idea. We need not do so.

In many cases, privacy issues never get balanced against conflicting inter- ests because courts, legislators, and others fail to recognize that privacy is implicated. People don’t acknowledge certain problems because they don’t fit into their particular one-size-fits-all conception of privacy. Regardless of whether we call something a “privacy” problem, it still remains a problem, and problems shouldn’t be ignored. We should pay attention to all the differ- ent problems that spark our desire to protect privacy.

To describe the problems created by the collection and use of personal data, many commentators use a metaphor based on George Orwell’s° Nine- teen Eighty-Four.19 Orwell depicted a harrowing totalitarian society ruled by a government called Big Brother that watched its citizens obsessively and demanded strict discipline. The Orwell metaphor, which focuses on the harms of surveillance (such as inhibition and social control), might be apt to describe government monitoring of citizens. But much of the data gathered in computer databases isn’t particularly sensitive, such as one’s race, birth date, gender, address, or marital status. Many people don’t care about con- cealing the hotels they stay at, the cars they own, or the kind of beverages they drink. Frequently, though not always, people wouldn’t be inhibited or embarrassed if others knew this information.

A different metaphor better captures the problems: Franz Kafka’s° The Trial. Kafka’s novel centers around a man who is arrested but not informed

fix the paper 3fix the paper 4

George Orwell Keystone/Getty Images

Franz Kafka AP Photo

why. He desperately tries to find out what triggered his arrest and what’s in store for him. He finds out that a mysterious court system has a dossier on him and is investigating him, but he’s unable to learn much more. The Trial depicts a bureaucracy with inscrutable purposes that uses people’s informa- tion to make important decisions about them, yet denies the people the abil- ity to participate in how their information is used.20 The problems portrayed by the Kafkaesque metaphor are of a different sort from the problems caused by surveillance. They often do not result in inhibition. Instead, they are problems of information processing — the storage, use, or analysis of data — rather than of information collection. They affect the power relation- ships between people and the institutions of the modern state. They not only frustrate the individual by creating a sense of helplessness and powerless- ness, they also affect social structure by altering the kind of relationships people have with the institutions that make important decisions about their lives.

Legal and policy solutions focus too much on the problems under the Orwellian metaphor — those of surveillance — and aren’t adequately address- ing the Kafkaesque problems—those of information processing.21 The diffi- culty is that commentators are trying to conceive of the problems caused by databases in terms of surveillance when, in fact, these problems are different.

The Problem with the Nothing-to-Hide Argument

Commentators often attempt to refute the nothing-to-hide argument by 15 pointing to things people want to hide. But the problem with the nothing-to- hide argument is the underlying assumption that privacy is about hiding bad things. By accepting this assumption we concede far too much ground and invite an unproductive discussion of information people would likely want to hide. As Bruce Schneier aptly notes, the nothing-to-hide argument stems from a faulty “premise that privacy is about hiding a wrong.”22 Surveillance, for example, can inhibit such lawful activities as free speech, free associa- tion, and other First Amendment rights essential for democracy.

The deeper problem with the nothing-to-hide argument is that it myopi- cally° views privacy as a form of secrecy. In contrast, understanding privacy as a plurality of related issues demonstrates that the disclosure of bad things is just one among many difficulties caused by government security mea- sures. To return to my discussion of literary metaphors, the problems are not just Orwellian but Kafkaesque. Government information-gathering programs are problematic even if no information people want to hide is uncovered. In

myopically: literally and meta- phorically, in a shortsighted manner.

SOLOVE / The Nothing-to-Hide Argument 739

740 C H A P T E R 2 7 HOW HAS THE INTERNET CHANGED THE MEANING OF PRIVACY?

innocuous: unimportant or not harmful.

The Trial, the problem is not inhibited behavior but rather a suffocating pow- erlessness and vulnerability created by the court system’s use of personal data and its denial to the protagonist of any knowledge of or participation in the process. The harms are bureaucratic ones — indifference, error, abuse, frustration, and lack of transparency and accountability.

One such harm, for example, which I call aggregation, emerges from the fusion of small bits of seemingly innocuous° data. When combined, the infor- mation becomes much more telling. By joining pieces of information we might not take pains to guard, the government can glean information about us that we might indeed wish to conceal. For example, suppose you bought a book about cancer. This purchase isn’t very revealing on its own, for it just indicates an interest in the disease. Suppose you bought a wig. The purchase of a wig, by itself, could be for a number of reasons. But combine these two pieces of information, and now the inference can be made that you have can- cer and are undergoing chemotherapy.

Another potential problem with the government’s harvest of personal data is one I call exclusion. Exclusion occurs when people are prevented from having knowledge about how information about them is being used, and when they are barred from accessing and correcting errors in that data. Many government national security measures involve maintaining a massive data- base of information that individuals cannot access. Indeed, because they involve national security, the very existence of these programs is often kept secret. This kind of information processing, which blocks subjects’ knowl- edge and involvement, resembles in some ways a kind of due-process problem. It is a structural° problem involving the way people are treated by government institutions and creating a power imbalance between individu- als and the government. To what extent should government officials have such a significant power over citizens? This issue isn’t about what informa- tion people want to hide but about the power and the structure of government.

A related problem involves secondary use. Secondary use is the exploita- tion of data obtained for one purpose for an unrelated purpose without the subject’s consent. How long will personal data be stored? How will it be used? What could it be used for in the future? The potential future uses of any piece of personal information are vast, and without limits on or accountability for how that information is used, it is hard for people to assess the dangers of the data’s being in the government’s control.

Yet another problem with government gathering and use of personal data 20 is distortion. Although personal information can reveal quite a lot about people’s personalities and activities, it often fails to reflect the whole person.

structural: here, part of the struc- ture of the social system, includ- ing government.

It can paint a distorted picture, especially since records are reductive° — they often capture information in a standardized format with many details omitted.

For example, suppose government officials learn that a person has bought a number of books on how to manufacture methamphetamine. That infor- mation makes them suspect that he’s building a meth lab. What is missing from the records is the full story: The person is writing a novel about a char- acter who makes meth. When he bought the books, he didn’t consider how suspicious the purchase might appear to government officials, and his records didn’t reveal the reason for the purchases. Should he have to worry about government scrutiny of all his purchases and actions? Should he have to be concerned that he’ll wind up on a suspicious-persons list? Even if he isn’t doing anything wrong, he may want to keep his records away from gov- ernment officials who might make faulty inferences from them. He might not want to have to worry about how everything he does will be perceived by officials nervously monitoring for criminal activity. He might not want to have a computer flag him as suspicious because he has an unusual pattern of behavior.

The problem with the nothing-to-hide argument is that it focuses on just one or two particular kinds of privacy problems—the disclosure of personal information or surveillance — while ignoring others. It assumes a particular view about what privacy entails to the exclusion of other perspectives.

It is important to distinguish here between two ways of justifying a national security program that demands access to personal information. The first way is not to recognize a problem. This is how the nothing-to-hide argu- ment works — it denies even the existence of a problem. The second manner of justifying such a program is to acknowledge the problems but contend that the benefits of the program outweigh the privacy sacrifice. The first jus- tification influences the second, because the low value given to privacy is based upon a narrow view of the problem. The key misunderstanding is that the nothing-to-hide argument views privacy in a particular way—as a form of secrecy, as the right to hide things. But there are many other types of harm involved beyond exposing one’s secrets to the government.

Blood, Death, and Privacy

One of the difficulties with the nothing-to-hide argument is that it looks for a singular and visceral° kind of injury. Ironically, this underlying conception of injury is sometimes shared by those advocating for greater privacy protec- tions. For example, the law professor Ann Bartow argues that in order to have

reductive: here, overly simplistic.

SOLOVE / The Nothing-to-Hide Argument 741

visceral: relating to feelings rather than reason.

742 C H A P T E R 2 7 resonance: here, effect on

people’s emotions.

HOW HAS THE INTERNET CHANGED THE MEANING OF PRIVACY?

a real resonance,° privacy problems must “negatively impact the lives of liv- ing, breathing human beings beyond simply provoking feelings of unease.” She urges that privacy needs more “dead bodies” and that privacy’s “lack of blood and death, or at least of broken bones and buckets of money, distances privacy harms from other [types of harm].”23

Bartow’s objection is actually consistent with the nothing-to-hide argu- 25 ment. Those advancing the nothing-to-hide argument have in mind a par- ticular kind of appalling privacy harm, one where privacy is violated only when something deeply embarrassing or discrediting is revealed. Like Bartow, proponents of the nothing-to-hide argument demand a dead-bodies type of harm.

Bartow is certainly right that people respond much more strongly to blood and death than to more abstract concerns. But if this is the standard to rec- ognize a problem, then few privacy problems will be recognized. Privacy is not a horror movie, most privacy problems don’t result in dead bodies, and demanding more palpable harms will be difficult in many cases.

In many instances, privacy is threatened not by a single egregious° act but by the accretion° of a slow series of relatively minor acts. In this respect, pri- vacy problems resemble certain environmental harms which occur over time through a series of small acts by different actors. Although society is more likely to respond to a major oil spill, gradual pollution by a multitude of dif- ferent actors often creates worse problems.

Privacy is rarely lost in one fell swoop. It is often eroded over time, little bits dissolving almost imperceptibly until we finally begin to notice how much is gone. When the government starts monitoring the phone numbers people call, many may shrug their shoulders and say, “Ah, it’s just numbers, that’s all.” Then the government might start monitoring some phone calls. “It’s just a few phone calls, nothing more,” people might declare. The government might install more video cameras in public places, to which some would respond, “So what? Some more cameras watching in a few more places. No big deal.” The increase in cameras might ultimately expand to a more elaborate network of video surveil- lance. Satellite surveillance might be added, as well as the tracking of people’s movements. The government might start analyzing people’s bank records. “It’s just my deposits and some of the bills I pay — no problem.” The government may then start combing through credit card records, then expand to Internet service provider (ISP) records, health records, employment records, and more. Each step may seem incremental, but after a while, the government will be watching and knowing everything about us.

“My life’s an open book,” people might say. “I’ve got nothing to hide.” But now the government has a massive dossier of everyone’s activities, interests,

egregious: horrible, shocking. accretion: a gradual accumulation or increase.

reading habits, finances, and health. What if the government leaks the infor- mation to the public? What if the government mistakenly determines that based on your pattern of activities, you’re likely to engage in a criminal act? What if it denies you the right to fly? What if the government thinks your financial transactions look odd — even if you’ve done nothing wrong — and freezes your accounts? What if the government doesn’t protect your infor- mation with adequate security, and an identity thief obtains it and uses it to defraud you? Even if you have nothing to hide, the government can cause you a lot of harm.

“But the government doesn’t want to hurt me,” some might argue. In 30 many cases, this is true, but the government can also harm people inadver- tently, due to errors or carelessness.

Silencing the Nothing-to-Hide Argument

When the nothing-to-hide argument is unpacked,° and its underlying assumptions examined and challenged, we can see how it shifts the debate to its terms, then draws power from its unfair advantage. The nothing-to- hide argument speaks to some problems, but not to others. It represents a singular and narrow way of conceiving of privacy, and it wins by excluding consideration of the other problems often raised with government security measures. When engaged directly, the nothing-to-hide argument can ensnare°, for it forces the debate to focus on its narrow understanding of pri- vacy. But when confronted with the plurality of privacy problems implicated by government data collection and use beyond surveillance and disclosure, the nothing-to-hide argument, in the end, has nothing to say.