Notes on “I've got nothing to hide”

Published on

Recently I stumbled upon this paper about “I’ve Got Nothing to Hide” and Other Misunderstandings of Privacy by Daniel J. Solove

Do yourself a favor and read it here

Wiretapping, terrorism, analysis

The American government, after sep 11, engaged in mass surveillance and data-mining [1]

Authorizing NSA to do warrantless wiretapping and analysis suspicious behaviour of its citizen [2]

2002: Various programs, e.g. Total Information Awareness (TIA) [3] started collecting financial, health-related, educational and other data

Looking for patterns of potential terrorism behaviour of its citizen [4]

Ultimately the program has been defunded, after it got the public eyes (most likely continuing in clandestine fashion) [5]

2006: Analysis of customer records from major phone companies [6]

2006: Access to bank records from SWIFT (Society for Worldwide Interbank Financial Transactions) [7]

This brought to outrage by many, ignorance by many other making the point “I’ve got nothing to hide” [8]

“If an individual acts in lawful ways, there’s nothing to worry about” another point was made [9]

“A privacy harm exists only if skeletons in the closet are revealed” [10]

“If you have nothing to hide, then what do you have to fear?” [11]

Others ask: “If you aren’t doing anything wrong, then what do you have to hide?” [12]

The problem about privacy lies in this very question itself [13]

The “Nothing to hide” argument

Most common points made:

Nothing to hide, nothing to fear

Read my e-mails, I’ve got nothing to hide

Profile me, analyze me, I’ve done nothing bad or illegal, do you?

Monitor my phone calls, read what I say about my noisy neighbour, I’ve got nothing to hide

If you have something to hide, you should be found, arrested and sentenced [14]

Responses:

Do you have curtains? [15]

No need to justify my position, you need to justify yours (govt.): where is your warrant? [16]

Nothing to hide on my side, but nothing to show you either [17]

Show me you credit card bills of the last year [18]

It’s about things not being anyone’s business [19]

Stalin would have loved this [20]

Everybody has something to hide from somebody. you just need to look hard enough. [21]

By stating: “I’ve got nothing to hide” you’re totally OK with the government infringing rights of millions of people [22]

Which means also that you don’t really care what happens, as long as it doesn’t happen to you. [23]

For most people the trade-off of privacy vs security makes total sense. “If by collecting information about people, our nation is made secure and ready for terrorist attacks, it’s totally fine by me” [24]

This is why the argument against “nothing to hide” is very difficult to get across, since the protection against terrorist attacks outweighs whatever basic or moderate privacy interests someone might have. [25]

Conceptualizing privacy

“Nobody really seems to have any clear idea what privacy really is.” [26]

“It’s too vague and complex.” [27]

Understanding what privacy is, is essential to addressing privacy issues.

“Privacy covers intimate information, access and decisions” [28]

The problem with conceptualizing privacy with intimacy is that not all private information or decision we make are considered intimate (political views, social security number, religion etc). [29]

Orwell’s 1984 metaphor: focuses on the harms of surveillance (such as inhibition and social control) [30]

Another metaphor: Franz Kafka’s The Trial, a bureaucracy with inscrutable purposes that uses people’s information to make important decisions about them, yet denies the people the ability to participate in how their information is used [31]

Read about Taxonomy of Privacy in more detail.

The problem with the “nothing to hide” argument

The problem is the underlying assumption that privacy is about hiding bad things. [32]

The “Nothing to hide” argument comes from a wrong “premise that privacy is about hiding a wrong.” [33]

It’s also not about “secrecy”. [34]

And neither is it about data you give to third-parties (bank records, telephone numbers, messages, etc). [35]

Because third party records result in the government’s ability to access an extensive amount of personal information with minimal limitation or oversight. [36]

Information collection is a form of surveillance. dataveilleince (Roger Clarke) [37]

This misuse and collection of information can and will harm your right to free-speech, democracy and thought expression (there is doubt about that). [37:1]

Refer to socialcooling.com for more info.

Another problem is “secondary use”: the use of data for an unrelated use, ignoring the real reason why data was collected. this of course without the person’s consent. [38]

This is of course a very “modern” problem, never before in history of humanity had we had so much information available (digitally or physically).

The problem with the nothing to hide argument is that it focuses on just one or two particular kinds of privacy problems (the disclosure of personal information or surveillance) and not others. [39]

Privacy problems are often difficult to recognize, since it’s a very complicated and delicate matter.

In many instances, privacy is threatened not by singular egregious acts, but by a slow series of relatively minor acts which gradually begin to add up [40]

The nothing to hide argument speaks to some problems, but not to others. [41]

It represents a singular and narrow way of conceiving of privacy, and it wins by excluding consideration of the other problems often raised in government surveillance and data mining programs.

Final words

This is definitely the most interesting paper I’ve ever read about Privacy.

Do yourself a favor and read it here: “I’ve Got Nothing to Hide” and Other Misunderstandings of Privacy.

Foot notes


  1. James Risen & Eric Lichtblau, Bush Lets U.S. Spy on Callers Without Courts: Secret Order to Widen Domestic Monitoring, N.Y. TIMES, Dec. 16, 2005, at A1 ↩︎

  2. James Risen & Eric Lichtblau, Bush Lets U.S. Spy on Callers Without Courts: Secret Order to Widen Domestic Monitoring, N.Y. TIMES, Dec. 16, 2005, at A1 ↩︎

  3. John Markoff, Pentagon Plans a Computer System That Would Peek at Personal Data of Americans, N.Y. TIMES, Nov. 9, 2002, at A12. ↩︎

  4. Leslie Cauley, NSA Has Massive Database of Americans’ Phone Calls, USA TODAY, May 11, 2006, at A1; Susan Page, Lawmakers: NSA Database Incomplete, USA TODAY, June 30, 2006, at A1. ↩︎

  5. DANIEL J. SOLOVE, THE DIGITAL PERSON: TECHNOLOGY AND PRIVACY IN THE INFORMATION AGE 169 (2004). ↩︎

  6. Leslie Cauley, NSA Has Massive Database of Americans’ Phone Calls, USA TODAY, May 11, 2006, at A1; Susan Page, Lawmakers: NSA Database Incomplete, USA TODAY, June 30, 2006, at A1. ↩︎

  7. Eric Lichtblau & James Risen, Bank Data Sifted in Secret by U.S. to Block Terror, N.Y. TIMES, June 23, 2006, at A1. ↩︎

  8. See infra text accompanying notes 12–33. ↩︎

  9. See infra text accompanying notes 12–33. ↩︎

  10. See infra text accompanying notes 12–33. ↩︎

  11. Bruce Schneier, Commentary, The Eternal Value of Privacy, WIRED, May 18, 2006, http://www.wired.com/news/columns/1,70886-0.html. ↩︎

  12. Bruce Schneier, Commentary, The Eternal Value of Privacy, WIRED, May 18, 2006, http://www.wired.com/news/columns/1,70886-0.html. ↩︎

  13. See infra text accompanying notes 12–33. ↩︎

  14. JEFFREY ROSEN, THE NAKED CROWD: RECLAIMING SECURITY AND FREEDOM IN AN ANXIOUS AGE (2004). ↩︎

  15. Comment of Adam to Concurring Opinions, supra note 17 (May 23, 2006, 16:27 EST). ↩︎

  16. Comment of Dissent to Concurring Opinions, supra note 17 (May 24, 2006, 07:48 EST). ↩︎

  17. Comment of Ian to Concurring Opinions, supra note 17 (May 24, 2006, 19:51 EST). ↩︎

  18. Comment of annegb to Concurring Opinions, http://www.concurringopinions.com/archives/2006/05/is_there_a_good.html#comments (May 23, 2006, 11:37 EST). ↩︎

  19. Comment of Catter to Concurring Opinions, supra note 17 (Oct. 16, 2006, 11:36 PM EST). ↩︎

  20. Comment of Kevin to Concurring Opinions, supra note 17 (July 24, 2006, 12:36 EST). ↩︎

  21. ALEKSANDR SOLZHENITSYN, CANCER WARD 192 (Nicholas Bethell & David Burg trans., Noonday Press 1991) (1968). ↩︎

  22. Comment of BJ Horn to Concurring Opinions, supra note 17 (June 2, 2006, 18:58 EST). ↩︎

  23. Comment of BJ Horn to Concurring Opinions, supra note 17 (June 2, 2006, 18:58 EST). ↩︎

  24. Comment of MJ to Concurring Opinions, supra note 17 (May 23, 2006, 17:30 EST). ↩︎

  25. See infra text accompanying notes 12–33. ↩︎

  26. Judith Jarvis Thomson, The Right to Privacy, in PHILOSOPHICAL DIMENSIONS OF PRIVACY: AN ANTHOLOGY 272, 272 (Ferdinand David Schoeman ed., 1984). ↩︎

  27. Robert C. Post, Three Concepts of Privacy, 89 GEO. L.J. 2087, 2087 (2001). ↩︎

  28. JULIE C. INNESS, PRIVACY, INTIMACY, AND ISOLATION 56 (1992). ↩︎

  29. Samuel D. Warren & Louis D. Brandeis, The Right to Privacy, 4 HARV. L. REV. 193, 193 (1890). ↩︎

  30. GEORGE ORWELL, 1984 (Signet Classic 1984) (1949); SOLOVE, supra note 4, at 7. ↩︎

  31. FRANZ KAFKA, THE TRIAL 50–58 (Willa & Edwin Muir trans., Random House 1956) (1937); SOLOVE, supra note 4, at 8–9. ↩︎

  32. Schneier, supra note 10. ↩︎

  33. See infra text accompanying notes 12–33. ↩︎

  34. See infra text accompanying notes 12–33. ↩︎

  35. SOLOVE, supra note 4, at 165–209; see also Daniel J. Solove, Digital Dossiers and the Dissipation of Fourth Amendment Privacy, 75 S. CAL. L. REV. 1083, 1117–37 (2002). ↩︎

  36. SOLOVE, supra note 4, at 165–209; see also Daniel J. Solove, Digital Dossiers and the Dissipation of Fourth Amendment Privacy, 75 S. CAL. L. REV. 1083, 1117–37 (2002). Privacy, and Definitions of Terms, AUSTRALIAN NATIONAL UNIVERSITY, Aug. 7, 2006, http://www.anu.edu.au/people/Roger.Clarke/DV/Intro.html. ↩︎

  37. See infra text accompanying notes 12–33. ↩︎ ↩︎

  38. See infra text accompanying notes 12–33. ↩︎

  39. See infra text accompanying notes 12–33. ↩︎

  40. See infra text accompanying notes 12–33. ↩︎

  41. See infra text accompanying notes 12–33. ↩︎

Here, have a slice of pizza 🍕