Nothing to Hide: The False Tradeoff Between Privacy and Security"If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. Why can't we have both? In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn't fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. Nothing to Hide makes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy. -- David Cole |
Contents
1 Introduction | 1 |
Values How We Should Assess and Balance the Values of Privacy and Security | 19 |
Times of Crisis How the Law Should Address Matters of National Security | 53 |
Constitutional Rights How the Constitution Should Protect Privacy | 91 |
Other editions - View all
Nothing to Hide: The False Tradeoff Between Privacy and Security Daniel J. Solove Limited preview - 2011 |
Nothing to Hide: The False Tradeoff Between Privacy and Security Daniel J. Solove No preview available - 2011 |
Common terms and phrases
activities agencies Amendment rights argue Athan balance Billy Budd Bruce Schneier Chapter civil liberties Congress constitutional crime Criminal Procedure data mining debate ECPA electronic surveillance electronic-surveillance enforcement engage ernment espionage evidence exclusionary rule expectation of privacy federal fingerprint FISA foreign intelligence Fourth Amendment protection government information gathering government officials government surveillance government’s hide hindsight bias investigation involved IP addresses issue last visited Aug law-enforcement officials ment national security national-security nothing-to-hide argument obtain Patriot Act Pen Register Pen Register Act people’s person police Posner privacy and security privacy test probable cause problem protect privacy reasonable expectation records requires secrecy paradigm secret secrets privilege security measures security theater September 11 statutes Stored Communications Act supra technologies terrorism terrorist there’s third party doctrine threat tion U.S. citizens U.S. Supreme Court United vacy video surveillance violations Wiretap Act wiretapping