NEGATIVE-PRIVACY-SOLVENCY-GENERAL 112

BECAUSE OF THE BROAD ASSAULT ON PRIVACY, NARROW AFFIRMATIVE APPROACHES ARE MEANINGLESS

PIECEMEAL SOLUTIONS LIKE THE AFFIRMATIVE ALWAYS FAIL

Zillah R. Eisenstein, Prof. at Northeastern University, 1981; THE RADICAL FUTURE OF LIBERAL FEMINISM, EE2001-hxm p. 2 2 4

The state's interest in these matters is also reflected in repeated discussions of public policy, although references are piecemeal and fragmentary. This fragmentation reflects the policy that exists, rather than the lack of a policy, It also reflects the fact that the state's policies on the reproductive control of women are often contradictory and inconsistent. President Carter, for example, has made well known his aversion to abortion. In 1976 he stated in the Washington Post:

WAR TO PROTECT PRIVACY MUST BE A MULTI-FRONT STRUGGLE

St. Petersburg Times, July 06, 1999, SECTION: EDITORIAL; EDITORIALS; Pg. 12A TITLE: The erosion of privacy // acs-EE2001

While government collects more and more personal information about citizens, there is too little concern for preventing that data from being widely disseminated.

Anyone who cares about the privacy of his personal data is fighting a multifront war against the government, and losing badly.

SMALL ACTS OF PRIVACY PROTECTION ARE TOO LITTLE TOO LATE

Suzanne Choney, The San Diego Union-Tribune, December 21, 1999, SECTION: COMPUTER LINK Pg. 2 TITLE: Open debate on privacy puts spotlight on risks // acs-EE2001

Too little, too late

Tom Perrine, manager of security technologies at the San Diego Supercomputer Center, indicated that in some ways, laws may be too little too late.

"I have seen electronic commerce sites that don't use encryption," to protect customers' data, he said. He added that there's information out there that can be grabbed "even if credit card numbers are encrypted," and that he has also seen, "in theory," financial data stolen from home computers.

There's technology available, he said, that can produce "a single database that holds information about individuals including their Social Security number; date and place of birth; accident history, driver's license information; full genealogy and medical history (available via doctors, medical insurance, HMOs); financial history; credit status; and list of creditors (if you use online services for financial planning)."

"Credit card companies and insurers already have that information," he said. "They just haven't put it all together -- yet."

THERE IS NO SINGLE SOLUTION TO PROTECTING PRIVACY -- IT MUST BE A BROAD BASED MOVEMENT

Jeffrey Rosen, associate professor at the George Washington University Law School, The New York Times April 30, 2000, SECTION: Section 6; Page 46; TITLE: The Eroded Self // acs-EE2001

There is no single solution to the erosion of privacy in cyberspace: no single law that can be proposed or single technology that can be invented to stop the profilers and surveillants in their tracks. The battle for privacy must be fought on many fronts -- legal, political and technological -- and each new assault must be vigilantly resisted as it occurs. But the history of political responses to new technologies of surveillance provides some grounds for hope. Although Americans are seldom roused to defend privacy in the abstract, the most illiberal and intrusive technologies of surveillance have, in fact, provoked political outrage that has forced the data collectors to retreat. In 1967, after the federal government proposed to create a national data center that would store personal information from the I.R.S., the census and labor bureaus and the Social Security administration, Vance Packard wrote an influential article for this magazine that helped to kill the plan.