Articles by Jim Harper

Jim HarperJim is the Director of Information Policy Studies at The Cato Institute, the Editor of Web-based privacy think-tank Privacilla.org, and the Webmaster of WashingtonWatch.com. Prior to becoming a policy analyst, Jim served as counsel to committees in both the House and Senate.


ACLU Off Course

by on June 16, 2008 · 17 comments

Alex Harris at OpenMarket.org has a good write-up suggesting that the ACLU has lost its way on the question whether there should be net neutrality regulation. He quotes Barry Steinhardt saying, “No longer is the government the greatest threat to free speech online. The threat is now the companies that run the pipes.”

Barry is a friend and one of the nicest people I know. His dips into hyperbole are quotable wonders to behold – at least when they’re in defense of real civil liberties.

Barry, and all my friends at the ACLU, know the power of my blog posts. They no doubt shudder at the thought that I would turn my acid keyboard their way. This time it’s only a gentle chiding, but I say, Fear it! – FEAR THE BLOG POST! – should I lose patience . . . .

Over at Cato@Liberty, I have a post up about how the suspected release of nuclear plans to the A.Q. Khan smuggling network relates to your privacy – and to copyright law.

Via Randy Barnett on Volokh: Larry Lessig has a passionate defense of 9th Circuit Judge Alex Kozinski, whose family’s file server had some edgy and ribald files on it, which files could be accessed over the Internet. A lawyer with a grudge against Kozinski is apparently seeking to discredit the judge for the appearance of these files on his server, and there has been some discussion of whether Judge Kozinski should recuse himself from trying an obscenity case. (Though he is a circuit judge, he is sitting by designation as a trial judge.) Eugene Volokh has a similar post.

Kudos to Professor Lessig for his defense of Judge Kozinski, with whom he likely has some ideological differences. He didn’t have to say anything, and it’s to his credit that he did. Volokh is good to his long-time professional colleague.

On the merits, I share the views of both – what I’ve seen of the files are risque and sometimes boorish or gross, but they’re well within the mainstream of naughty Web humor. Were he not a respected judge sitting at an obscenity trial, the presence of these files on a family server would mean less than nothing.

The pair of comments intrigues me, though, because both draw real-world analogies to illustrate the privacy issues at play. Here’s Lessig:
Continue reading →

[Full disclosure, my site WashingtonWatch.com uses Google’s AdSense program and I use Google AdWords analytics to monitor the site’s usage.]

Google and Yahoo! have announced a non-exclusive agreement to run Google ads alongside Yahoo! search results. The usual suspects are ginning up to demand antitrust scrutiny, and I’m not persuaded. One self-identified “consumer” group sent me a release which says:

Google influences what consumers see in terms of advertising and search ranking, which lead consumers to click ahead in ways that benefit Google, its products and its sponsors. According to Steve Pociask, president of the American Consumer Institute, “[Google’s] dominance makes it harder for small firms to enter the market and differentiate themselves.” He adds, “the Justice Department should now realize that it’s dealing with what is essentially a monopoly and, without strong action, consumers will lose choice, differentiation and innovation for years to come.”

This argument doesn’t make sense, and it doesn’t make the case for antitrust scrutiny of the deal.
Continue reading →

I haven’t had a chance to interview Tim yet, but I assume he has ceased posting Bea Arthur porn on Usenet (as reported by PJ) because of several major ISPs’ capitulation to the New York Attorney General and agreement to cut off access to Usenet. Declan McCullagh has the most thought-through write-up.

I appeared on the BBC early yesterday morning (BBC-time) to discuss concerns with this. I didn’t know about Tim’s draconian action or I surely would have raised it as an example of the unfortunate fall-out from the preemptive censorship some ISPs have agreed to at the behest of the AG.

The Arizona legislature has passed a bill to refuse participation in the REAL ID Act. The House vote was 51 to 1.

The Future of News

by on June 10, 2008 · 8 comments

If you’re reading this, you know that access to news and information is changing.

Steve Boriss of The Future of News expands on this theme in a Cato TechKnowledge called “The Future of News: A Golden Age for Free Speech?

If there was ever any doubt that ID checks at airports are about control and not security, the Transportation Security Administration is clearing that up. Starting June 21, it says, “passengers that willfully refuse to provide identification at security checkpoint [sic] will be denied access to the secure area of airports.”

The claim is that this initiative is “the latest in a series designed to facilitate travel for legitimate passengers while enhancing the agency’s risk-based focus – on people, not things.” So let’s take a moment to look at how refusing airport access to the willful enhances security.

. . . OK! We’re done!

No terrorist or criminal would draw attention to him or herself by obstinately refusing an ID check. This is only done by the small coterie of civil libertarians and security experts who can’t stand the security pantomime that is airport identification checking. The rest of the people traveling without ID have lost theirs – and TSA officials at airports have no way of knowing which is which.

This new rule will do nothing to improve airport security, but watch for the incident when a TSA agent “doesn’t believe” someone who has truly lost his or her driver’s license and tries to strand a traveler in a faraway city.

Orin Kerr has a post up on the Volokh Conspiracy addressing my post here on his draft paper defending the third-party doctrine.

He echoes back the divide between us on what should animate analysis of the Fourth Amendment:

I treat the Fourth Amendment as a doctrine about criminal procedure, while Jim treats it as a way of ensuring a free society. The two approaches lead to very different criteria for analyzing Fourth Amendment rules. My approach generally focuses on whether rules pragmatically balance public safety and civil liberties in a regime backed by the exclusionary rule, whereas Jim’s approach looks to what is necessary to protect civil liberties and generally assumes that other legal mechanisms can take care of public safety concerns.

I do treat the Fourth Amendment as a tool for ensuring a free society, but I don’t put the “free society thesis” ahead of the text of the amendment, which I parroted repeatedly in my post. It’s odd – though well within mainstream legal thought – to treat as criminal procedure a part of our fundamental law that makes no mention of criminals whatsoever.

Kerr raises the original meaning of the amendment – actually, what motivated its authors. I’m not sure why he does this – to justify not working with its actual text? According to one scholar, the intent of the Framers in the Fourth Amendment was to prevent general warrants. They did this and proscribed unreasonable searches so, whatever their intention, they included more in the amendment. And I maintain that it was to secure the people against unreasonable searches, because that’s what it says.

“I suspect many criminal procedure scholars are drawn to this notion because many crimpro scholars are strongly civil libertarian,” Kerr says. “But the judges see themselves doing something very different; they see themselves figuring out the rules of criminal investigations. As a result, judges normally find most Fourth Amendment scholarship pretty unhelpful.”

He is writing for these judges: “My general approach is to work within the consensus understanding held by the rulemakers and to think about how to apply that understanding rather than to change it.” Kerr characterizes his work as “descriptive: I think this is what the Fourth Amendment means because this is what the Justices and the judges think it means.”

But there’s a problem with this claim: His paper is called “The Case for the Third-Party Doctrine” (emphasis added) and it provides justification for that doctrine. That’s not description. Would you believe it if a lineman in a football game stood up between plays and said, “Y’know, I’m not really in this.”

But before I’m sucked under by the legal-academic vortex Kerr threw in front of me, I should note that he never addresses my challenge to his theory of technological neutrality:

The interplay of the Fourth Amendment and technology is interesting, but I don’t think technological neutrality is a terribly relevant or useful metric for Fourth Amendment doctrine. Since the Fourth Amendment was adopted, technology has certainly shifted the scope of human enterprise. I imagine that in the late 1700’s most everything of deep import to people’s lives—personal and professional—happened in or near the home, so it was natural that the home was a place of high Fourth Amendment protection, and “home” was a useful proxy for “what should be protected.”

Since then, technological changes of all kinds have given us the freedom to take our lives outward. We move around much more within our communities and from one to another; we stay in different places and move our residences much more often; we communicate and transact using new technologies; and our things—both tangible and digital—come to rest many more places than they used to.

What matters is not maintaining “technological neutrality,” but maintaining people’s security in their persons, houses, papers, and effects despite changes in technology. Kept in place, the third-party doctrine will cause changes in technology to undermine people’s privacy. It must be abandoned to preserve the privacy status quo and to restore the level of privacy sought by the Framers through the language they used in the Fourth Amendment.

Peter Swire of the Center for American Progress has a paper out called “No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime.” He identifies how local law enforcement lacks the ability and incentive to address various wrongs done on the Internet because of their complexity and their multi-jurisdictional nature.

Swire has identified a real problem. Just like everyone else, law enforcement struggles to keep up in the changing online environment. And it’s true that local law enforcement lacks incentive to expend efforts going after a distant cybercrime ring for the benefit of one local complainant and thousands of strangers.

(He calls this a “commons problem” and I understand how he means it to illustrate that law enforcement personnel and organizations are economic actors. Crime victims are a sort of public good to them and they can’t enjoy the benefits of caring for most of those who would benefit from their work. I think this fits more neatly in the public choice box: local law enforcement in one jurisdiction doesn’t get any benefit – budgetary, political, or otherwise – from helping strangers, so they won’t.)

His conclusion is that there should be more federal law enforcement – such as by the Federal Trade Commission and Justice Department – or “federated” law enforcement, combinations of state and federal authorities: “A more federated approach recognizes the usefulness of enforcement task forces that draw on multiple jurisdictions. Federal?state task forces, for instance, have been used widely for drug prosecutions and, more recently, in fighting terrorism.”

While these are logical conclusions, I would be reluctant to call for greater federal law enforcement. There isn’t authority for it in the constitution, and the uses of “federated” law enforcement he identifies – in the “War on Drugs” and the “War on Terror” – have not been shining examples we ought to follow.
Continue reading →