This blog is devoted to evaluating vulnerable Democratic candidates, political news, law and current affairs. Author is a Political consultant specializing in opposition research for conservative candidates, attorneys and PACS at the local, state, and federal level.
“The Constitution is not an instrument for the government to restrain the people, it is an instrument for the people to restrain the government - lest it come to dominate our lives and interests.”
― Patrick Henry
Abstract: "If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so.
In addition to attacking the "Nothing-to Hide Argument," Solove exposes the fallacies of pro-security arguments that have often been used to justify government surveillance and data mining. These arguments - such as the "Luddite Argument,"the "War-Powers Argument," the "All-or-Nothing Argument," the "Suspicionless-Searches Argument," the "Deference Argument," and the "Pendulum Argument" - have skewed law and policy to favor security at the expense of privacy.
The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. But protecting privacy isn't fatal to security measures; it merely involves adequate oversight and regulation.
The primary focus of the book is on common pro-security arguments, but Solove also discusses concrete issues of law and technology, such as the Fourth Amendment Third Party Doctrine, the First Amendment, electronic surveillance statutes, the USA-Patriot Act, the NSA surveillance program, and government data mining. Number of Pages in PDF File: 29 Keywords: privacy, national security, Fourth Amendment, First Amendment, criminal procedure, surveillance, USA-Patriot Act, data mining JEL Classification: D82, H56, O30 Accepted Paper Series