Click Here: <A HREF="http://www.aci.net/kalliste/">The Home Page of J. Orlin
Grabbe</A>
-----
That Old Time Religion


May Day, May Pole


Sex worship through the ages.

May 1st or May Day was, according to the Encyclopedia Britannica (15th
edition, vol. 7, p. 202), "once mainly a springtime fertility festival that
can be traced back to the Magna Mater (Great Mother) festivals of Hellenistic
(Greco-Roman) times." Which is somewhat more interesting than the fact that
May 1 has also "become a festival of the laboring class in Socialist
countries."

In Celtic religion May 1, or Beltaine, is one of the four fire festivals of
the sacred year--the others being Lugnasad (August 1), Samhain (Nov. 1), and
Oimelc (Feb. 1).

The nature of the festival is illustrated by, among other things, the
Maypole. B.Z. Goldberg says, in The Sacred Fire: the Story of Sex in Religion,
 that "Generally . . . the Maypole is set up erect with its head decorated
with garlands and hence it prevails as a symbol of the lingam."

[Now... don't run for the dictionary: here it is from Webster's New Twentieth
Century Dictionary, Unabridged, 2nd edition: "lingam: (San.) in Hinduism, the
phallic symbol worshipped as representative of the god Siva or of the
reproductive powers of nature."]

According to a Philip Stubb, the May Day celebration of England in 1553 went
like this: "On Whitsunday all the young men and young women, husbands and
wives, and old men as well, run wildly into the woods, hills, and mountains
where they spend the night in pleasant pastimes and revelry. In the morning
they return bringing with them a birch and branches of trees. Some twenty or
forty oxen, each one have a nosegay of flowers placed on the tips of its
horns [themselves symbols of the lingam], bring home the Maypole. . . Behind
the Maypole follow two or three hundred men and women, and often even
children, with great devotion."


Privacy in the Digital Age


The Eroded Self



by Jeffrey Rosen


In cyberspace, there is no real wall between public and private. And the
version of you being constructed out there - from bits and pieces of stray
data - is probably not who you think you are.

Monica Lewinsky is a most unlikely spokesperson for the virtues of reticence.
But in addition to selling designer handbags, she has emerged after her
internship as an advocate of privacy in cyberspace. "People need to realize
that your e-mails can be read and made public, and that you need to be
cautious," she warned recently on "Larry King Live." Lewinsky was unsettled
by Kenneth Starr's decision to subpoena Washington bookstores for receipts of
her purchases; in her underappreciated biography, "Monica's Story," she
points to the bookstore subpoenas as one of the most invasive moments in the
Starr investigation. But she was also distraught when the prosecutors
subpoenaed her home computer. From the recesses of her hard drive, they
retrieved e-mail messages that she had tried unsuccessfully to delete, along
with the love letters she had drafted -- but never sent -- to the president.
"It was such a violation," Lewinsky complained to her biographer, Andrew
Morton.

Many Americans are beginning to understand just how she felt. As reading and
writing, health care and shopping and sex and gossip increasingly take a
place in cyberspace, it is suddenly dawning on us that the most intimate
details of our daily lives are being monitored, searched, recorded and stored
as meticulously as Monica Lewinsky's were. For most citizens, however, the
greatest threat to privacy comes not from special prosecutors but from
employers and from all-seeing Web sites and advertising networks that track
every move we make in cyberspace.
Consider the case of DoubleClick Inc. For the past few years, DoubleClick,
the Internet's largest advertising company, has been compiling detailed on
the browsing habits of millions of Web users by placing "cookie" files on our
hard drives. Cookies are electronic footprints that allow Web sites and
advertising networks to monitor our online movements with telescopic
precision -- including the search terms we enter as well as the articles we
skim and how long we spend skimming them. Once DoubleClick sends you a
cookie, you will receive targeted ads when you visit the Web sites of its
2,500 clients. So, for example, if you visit Alta Vista's auto section you
may be greeted by a cheerful ad from G.M. or Ford.

As long as users were confident that their virtual identities weren't being
linked to their actual identities, many were happy to accept DoubleClick
cookies in exchange for the convenience of navigating the Web more
efficiently. Then last November, DoubleClick bought Abacus Direct, a database
of names, addresses and information about off-line buying habits of 90
million households, compiled from the largest direct mail catalogs and
retailers in the nation. In January, DoubleClick began compiling profiles
linking individuals' actual names and addresses to Abacus's detailed records
of their online and off-line purchases. Suddenly, shopping that once seemed
anonymous was being archived in personally identifiable dossiers.

Under pressure from privacy advocates and from dot-com investors, DoubleClick
announced in March that it would postpone its profiling scheme until the
federal government and the e-commerce industry agree on privacy standards.
Still, the DoubleClick controversy points to the inherent threat to privacy
in a new economy that is based, in unprecedented ways, on the recording and
exchange of intimate personal information. Privacy protects us from being
misdefined and judged out of context. This protection is especially important
in a world of short attention spans, a world in which information can easily
be confused with knowledge. When intimate personal information circulates
among a small group of people who know you well, its significance can be
weighed against other aspects of your personality and character. (Monica
Lewinsky didn't mind that her friends knew she had given the president a copy
of Nicholson Baker's "Vox" because her friends knew that she was much more
than a person who would read a book about phone sex.) But when your browsing
habits -- or e-mail messages -- are exposed to strangers, you may be reduced,
in their eyes, to nothing more than the most salacious book you once read or
the most vulgar joke you once told. And even if your Internet browsing isn't
in any way embarrassing, you run the risk of being stereotyped as the kind of
person who would read a particular book or listen to a particular song. Your
public identity may be distorted by fragments of information that have little
to do with how you define yourself. In a world where citizens are bombarded
with information, people form impressions quickly, based on sound bites, and
these brief impressions tend to oversimplify and misrepresent our complicated
and often contradictory characters.

The sociologist Georg Simmel observed nearly 100 years ago that people are
often more comfortable confiding in strangers than in friends, colleagues or
neighbors. Confessions to strangers are cost-free because strangers move on;
you never expect to see them again, so you are not inhibited by embarrassment
or shame. In many ways the Internet is a technological manifestation of the
phenomenon of the stranger. There's no reason to fear the disclosure of
intimate information to faceless Web sites as long as those Web sites have no
motive or ability to collate the data into a personally identifiable profile
that could be disclosed to anyone you actually know. By contrast, the
prospect that your real identity might be linked to permanent databases of
your online -- and off-line -- behavior is chilling, because the databases
could be bought, subpoenaed or traded by employers, insurance companies,
ex-spouses and others who have the ability to affect your life in profound
ways.

The retreat of DoubleClick may seem like a victory for privacy, but it is
only an early battle in a much larger war -- one in which many expect privacy
to be vanquished. "You already have zero privacy -- get over it," Scott
McNealy, the C.E.O. of Sun Microsystems, memorably remarked last year in
response to a question at a product show introducing a new interactive
technology called Jini. Sun's cheerful Web site promises to usher in the
"networked home" of the future, in which the company's "gateway" software
will operate "like a congenial party host inside the home to help consumer
appliances communicate intelligently with each other and with outside
networks." In this chatty new world of electronic networking, your
refrigerator and coffee maker can talk to your television, and all can be
monitored from your office computer. The incessant information exchanged by
these gossiping appliances might, of course, generate detailed records of the
most intimate details of your daily life. Your liquor cabinet might tell
Pinkdot.com, the online grocer, that you are low on whiskey, prompting your
television to start blaring ads for alcoholics anonymous. But this may not be
what Sun Microsystems has in mind when it boasts about the pleasures of the
"connected family."

New evidence seems to emerge every day to support McNealy's grim verdict
about the triumph of online surveillance technology over privacy. A former
colleague of mine who runs a Web site for political junkies recently sent me
the "data trail" statistics that he receives each week. They disclose not
only the Internet addresses of individual browsers who visit his site,
clearly identifying their universities or corporate employers, but also the
Web sites each user visited previously and the articles he or she downloaded
there. And it's increasingly common to find programs in the workplace that
report back to a central server all the Internet addresses that employees
visit. After the respected dean of the Harvard Divinity School was forced to
step down in 1998 for downloading pornography on his home computer, a former
Harvard computer technician wrote an article for Salon, the online magazine,
criticizing his former colleagues for snitching on the dean. "In the server
room of one of my part-time jobs," the techie confessed, "I noticed that a
program called Gatekeeper displayed all the Internet usage in the office as
it happened. I sat and watched people send e-mail, buy and sell stocks on
e-trade and download pictures of Celine Dion. If I had wanted I could have
traced this usage back to the individual user."

A survey of nearly a thousand large companies conducted last year by the
American Management Association found that 45 percent monitored the e-mail,
computer files or phone calls of their workers, up from 35 percent two years
earlier. Some companies use Orwellian computer software with names like
Spector, Assentor or Investigator, available for as little as $99, that can
monitor and record every keystroke on the computer with videolike precision.
These virtual snoops can also be programmed to screen all incoming and
outgoing e-mail for forbidden words and phrases -- involving racism, body
parts or the name of your boss -- and can forward suspicious messages to a
supervisor for review. E-mail can be resurrected from computer hard drives
even after it has ostensibly been deleted. And companies are increasingly
monitoring jokes and e-mail sent from home as well as work over company
servers.

The most common justification for Internet and e-mail monitoring in the
workplace is fear of liability under sexual harassment law, which requires
companies to protect workers from speech that might be construed to create a
"hostile or offensive working environment." Because employers cannot be sure
in advance what sort of e-mail or Web browsing a particular employee might
find offensive, they have an incentive to monitor far more Internet activity
than the law actually forbids.

Changes in the delivery of books, music and television are extending these
technologies of surveillance beyond the office, blurring the boundaries
between work and home. Last summer, for example, Amazon.com was criticized
for a feature that uses ZIP codes and domain names to identify the most
popular books purchased online by employees at prominent corporations. (The
top choice at Charles Schwab: "Memoirs of a Geisha.") And anonymous browsing
continues to be under assault. The Sprint wireless Web phone that I bought in
March promptly revealed my new telephone number to Amazon's pre-programmed
Web site when I dialed in the hope of browsing discreetly for ordering
information about my new book.

The same technologies that are making it possible to download digitally
stored books, CD's and movies directly onto our hard drives will soon make it
possible for publishers and entertainment companies to record and monitor our
browsing habits with unsettling specificity. "Snitchware" programs can
regulate not only which books you read but also how many times you read them,
charging different royalties based on whether you copy from the book or
forward part of it to a friend. Television, too, is being redesigned to
create precise records of our viewing habits. A new electronic device known
as a personal video recorder makes it possible to store up to 30 hours of
television programs; it also enables viewers to skip commercials and to
create their own lineups. One of the current models, TiVo, establishes viewer
profiles that it then uses to make viewing suggestions and to record future
shows. And in a world where media conglomerates like AOL-Time Warner can
monitor your activities in cyberspace and then use your browsing habits to
determine the content that is beamed to you through television, books, movies
and magazines, the integrated media box of the future may have surveillance
capabilities that make DoubleClick's database look benign.

As if that weren't bad enough, Globally Unique Identifiers, or GUID's, are
making it possible to link every document you create, message you e-mail and
chat you post with your real-world identity. GUID's are a kind of serial
number that can be linked with your name and e-mail address when you register
online for a product or service. Last November, RealJukebox, one of the most
popular Internet music players, with 30 million registered users, became a
focus of media attention when privacy advocates noted that the player could
relay information to its parent company, RealNetworks, about the music each
user downloaded, and that this could be matched with a unique ID number that
pinpointed the user's identity. At a conference about privacy in cyberspace
held at the Stanford Law School in February, a lawyer for RealNetwork, Bob
Kimball, insisted that the company had never, in fact, matched the GUID's
with the data about music preferences. Nevertheless, hours after the media
outcry began, RealNetworks disabled the GUID's to avoid a DoubleClick-like
public relations debacle. But some currently available software products,
like Microsoft's Word 97 and Powerpoint 97, embed unique identifiers into
every document. Soon, all electronic documents created electronically may
have invisible markings that could be traced back to the author or recipient.

There is nothing new about the fear that new technologies of surveillance and
communication are altering the nature of privacy. A hundred years ago, in the
most famous essay on privacy ever written, Louis D. Brandeis and Samuel
Warren worried that new media technologies -- in particular the invention of
instant photographs and the tabloid press -- were invading "the sacred
precincts of private and domestic life." What outraged Brandeis and Warren
was a mild society item in The Boston Saturday Evening Gazette that described
a lavish breakfast party that Warren himself had put on for his daughter's
wedding. Although the information itself wasn't inherently salacious,
Brandeis and Warren were appalled that a domestic ceremony would be described
in a gossip column and discussed by strangers.

At the beginning of the 21st century, however, the Internet has vastly
expanded the aspects of private life that can be monitored and recorded. As a
result, cyberspace has increased the danger that personal information
originally disclosed to friends and colleagues may be exposed to, and
misinterpreted by, a less-understanding audience. Gossip that in Brandeis and
Warren's day might have taken place in a drawing room is now recorded in a
chat room and can be retrieved years later anywhere on earth. Several months
ago, The Washington Post, for example, described the case of James Rutt, a
man who worried that his Internet past might be misconstrued if taken out of
context.

Rutt had spent years unburdening himself in a chat group. Although he had
been happy to speak candidly in the sympathetic confines of a space
characterized as "a virtual corner bar," once he was appointed to a new
position as C.E.O. of Network Solutions Inc., he feared that his musings
about sex, politics and his own weight problem might embarrass him, or worse.
Fortunately for Rutt, the chat group offered a special software feature
called Scribble that allowed him to erase a decade of his own postings. But
as intimate information about our lives is increasingly recorded, archived
and not easily deleted, there is a growing danger that a part of our
identities will come to be mistaken for who we are. In certain circles today
it is not uncommon for prospective romantic partners, before going out on
dates, to perform background checks on each other, scouring the Internet for
as much personal information as possible. And these searches can be a
deal-breaker: a friend of mine, after being set up on a blind date, ran an
Internet search and discovered that her prospective partner had been
described in an article for an online magazine as one of the 10 worst dates
of all time; the article included intimate details about his sexual equipment
and performance that she was unable to banish from her mind during their
first -- and only -- dinner. These are the sort of details, of course, that
friends often exchange in informal gossip networks. The difference now is
that the most intimate personal information is often recorded indelibly and
can be retrieved with chilling efficiency by strangers around the globe.

In a famous essay on reputation published in 1890, E.L. Godkin, the editor of
the Nation, elaborated on the distinction between oral and written gossip. As
long as gossip was oral, and circulated among acquaintances rather than
strangers, Godkin wrote, its objects were often spared the mortification of
knowing they were being gossiped about. Oral gossip is a flexible way of
enforcing communal norms while still respecting privacy. When neighbors
gossip about one anothers' intimate activities, those who behave badly will
soon feel the indirect effects of social disapproval. The wrongdoers can then
correct their misbehavior without feeling that their public faces have been
assaulted. And because all of the relevant parties know one another well
based on close personal observation, individual transgressions can be weighed
against the broader picture of an individual's personality.

Cyberspace, however, has blurred the distinction between oral and written
gossip by recording and publishing the kind of private information that used
to be exchanged around the water cooler. Unlike oral gossip, Internet gossip
is hard to answer, because its potential audience is anonymous and unbounded.
A Web site called Disgruntled Housewife (www.disgruntledhousewife.com) offers
an appalling feature called the Dick List, designed to promote "girly
solidarity through bile-spewing," in which women from around the country
write in to describe the most intimate secrets of former lovers they dislike.
(The men are identified by their home towns and sometimes by their full
names, a few letters of which are fatuously omitted.) Furthermore, when the
gossip is archived, it can come back to haunt. If, in a moment of youthful
enthusiasm, I posted intemperate comments to an Internet newsgroup, those
comments could be retrieved years later simply by typing my name or Internet
protocol address into a popular search engine. For more and more citizens the
most important way of exchanging gossip is e-mail. But instead of giving
private e-mail the same legal protections as private letters, courts are
increasingly treating e-mail as if it were no more private than a postcard.
In an entirely circular legal test, the Supreme Court has held that
constitutional protections against unreasonable searches depend on whether
citizens have subjective expectations of privacy that society is prepared to
accept as reasonable. This means that as technologies of surveillance and
data collection have become ever more intrusive, expectations of privacy have
naturally diminished, with a corresponding reduction in constitutional
protections. More recently, courts have held that merely by adopting a
written policy that warns employees that their e-mail may be monitored,
employers will lower expectations of privacy in a way that gives them
virtually unlimited discretion to monitor e-mail.

Even when employers promise to respect the privacy of e-mail, courts are
upholding their right to break their promises without warning. A few years
ago in a case in Pennsylvania, the Pillsbury Company repeatedly promised its
employees that all e-mail would remain confidential and that no employee
would be fired based on intercepted e-mail. Michael Smyth, a Pillsbury
employee, received an e-mail message from his supervisor over the company's
computer network, which he read at home. Relying on the company's promise
about the privacy of e-mail, he sent an intemperate reply to the supervisor,
supposedly saying at one point that he felt like killing "the backstabbing
bastards" on the sales force, and referring to a holiday party as the "Jim
Jones Koolaid affair."

Despite the company's promises, it proceeded to retrieve from its computers
dozens of e-mail messages that Smyth had sent and received, and then fired
him for transmitting "inappropriate and unprofessional comments." Smyth sued,
arguing that the company had invaded his right to privacy by firing him. But
the court blithely dismissed his claim on the grounds that Pillsbury owned
the computer system and therefore could intercept e-mail sent from home or
work without invading its workers' legitimate expectations of privacy.

This can't be right. I'm at home as I type these words, but the computer on
which I'm typing is owned by the law school I teach at, as is the network
that supplies my e-mail access. I would be appalled if anyone suggested that
the provision of these research tools gave my law school the right to monitor
all the e-mail I send and receive. In 1877, the Supreme Court held that
postal inspectors need a search warrant to open first-class mail, regardless
of whether it is sent from the office or from home. And searches of e-mail
can be even more invasive than searches of written letters. Georg Simmel
wrote about the ways in which written letters are peculiarly subject to
misinterpretation. Because letters lack the contextual accompaniments --
sound of voice, tone, gesture, facial expression" -- that, in spoken
conversation, are a source of obfuscation and clarification, Simmel argued,
letters can be more easily misinterpreted than speech. With e-mail, the
possibilities for misinterpretation are even more acute. E-mail combines the
intimacy of the telephone with the infinite retrievability of a letter. And
because e-mail messages are often dashed off quickly, they may, when taken
out of context, provide an inaccurate window onto someone's emotions. In
1997, for example, Judge Thomas Penfield Jackson chose Lawrence Lessig of
Harvard Law School to advise him in overseeing the antitrust dispute between
the government and Microsoft. When Microsoft challenged Lessig's appointment
as a "special master," Netscape officials turned over to the Justice
Department an e-mail message that Lessig had written to an acquaintance at
Netscape in which he joked that he had "sold my soul" by downloading
Microsoft's Internet Explorer. The Justice Department, in turn, gave Lessig's
e-mail to Microsoft, which claimed he was biased and demanded his
resignation.

In fact, Lessig's e-mail had been quoted out of context. As the full text of
the e-mail makes clear, Lessig had downloaded Microsoft's Internet Explorer
to enter a contest to win a PowerBook. After installing the Explorer, he
discovered that his Netscape bookmarks had been erased. In a moment of
frustration, he fired off the e-mail to the Netscape acquaintance, whom he
had met at a cyberspace conference, describing what had happened and quoting
a Jill Sobule song that had been playing on his car stereo: "Sold my soul,
and nothing happened." And although a court ultimately required Lessig to
step down as special master for technical reasons having nothing to do with
his misinterpreted e-mail, he discovered that strangers were left with the
erroneous impression that the e-mail "proved" that he was biased, and that it
was this that brought about his resignation. The experience taught Lessig
that, in a world where most electronic footsteps are recorded and all records
can be instantly retrieved, it is very easy for sentiments to be taken out of
their original context by people who want to do someone ill.

"The thing I felt most about the Microsoft case was not the actual invasion
(as I said, I didn't really consider it much of an invasion)," Lessig wrote
in an e-mail message to me after the ordeal. "What I hated most was that the
issue was just not important enough for people to understand enough to
understand the truth. It deserved one second of the nation's attention, but
to understand the issue would have required at least a minute's
consideration. But I didn't get, and didn't deserve, a minute's
consideration. Thus, for most, the truth was lost." Lessig felt ill treated,
in short, not because he wasn't able to explain himself, but because, in a
world of short attention spans, he was never given the chance. In what might
be seen as poetic justice, Microsoft itself was embarrassed in the antitrust
trial that followed when e-mail from top executives, from Bill Gates on down,
was turned over to the government and introduced in court.

Unchastened by Lessig's experience, I behave as if my online life isn't virtua
lly transparent, even though I understand on some level that it is. Not long
ago, I visited my law school's computer center to find out how many of my
online activities were in fact being monitored. "If I happen to be in the
server room, I can watch you send e-mail, and I'll know who you're sending it
to," said the discreet head of the center. Beyond that, I was pleased to
learn, the law school has decided not to install the programs that many
companies use to monitor the browsing, reading and writing of their employees
in real time, or to make regular copies of hard drives, including the cache
files that record all the Internet documents a user has downloaded. But if I,
like the former dean of Harvard Divinity School, asked school technicians to
repair my home computer, the school would be able to reconstruct my personal
and professional online activities with granular precision.

Perhaps the only sane response to the new technologies of surveillance in
cyberspace is unapologetic paranoia. If so, my candidate for the perfectly
rational man is K., one of my former students. K. wears green Army fatigues
and black boots and spends much of his day shredding and covering his
electronic tracks. "In my home office, I have five computers with AtGuard
personal firewalls," he explained to me not long ago. "With AtGuard you can
monitor how many backdoors you have open to the Internet, so if someone is
spying on you with a hacking program like BackOrifice or NetBus, you can kill
that connection." Whenever an uninvited Web site tries to send K. a cookie,
AtGuard fires back a cookie that says, "Keep your cookies off my hard drive."
Aware that files and e-mail can be resurrected from his hard drive even after
they are ostensibly deleted, K. also uses a suite of security tools called
Kremlin. Every time K. turns off his computer, Kremlin does a "secure total
wipe" of his 20 gigabyte hard drive, scribbling electronic graffiti, in the
form of zeroes and ones, over all the free space so that any lurking, partly
deleted files will be rendered illegible. This takes more than an hour. K.
also uses Kremlin to encrypt his personal documents in a secure folder on his
hard drive, and he carefully chose a nonsense password, garbled with upper-
and lowercase letters and numbers, so that it can't easily be cracked by a
"brute force attack program" that might hypothetically bombard his computer
with millions of random words generated from an electronic dictionary.
Impressed by his vigilance, I asked K. what, precisely, he was trying to
hide. "It's more an ideological act than anything else," he said. "I know
that I can be surveilled at all times, so I feel like I have a responsibility
to resist."

Not everyone agrees that there is reason to resist the brave new world of
virtual exposure. This is, after all, an exhibitionistic culture in which
people cheerfully enact the most intimate moments of their daily lives on Web
cams and on Fox TV. It is a culture in which Wesleyan students are offered a
chance to live in a "naked" dorm and in which 2,000 confessional souls have
chosen to post their most private thoughts on a site called Diarist.net,
which boasts, "We've got everything you need to know all about the people who
tell all." Defenders of transparency argue that there's no reason to worry
about privacy if you have nothing to hide, and that more information, rather
than less, is the best way to protect us against being judged out of context.
We might think differently about a Charles Schwab employee who ordered
"Memoirs of a Geisha" from Amazon.com, for example, if we knew that she also
listened to the Doors and subscribed to Popular Mechanics.

But the defenders of transparency are confusing secrecy with privacy, and
secrecy is only a small dimension of privacy. Even if we saw an Amazon.com
profile of everything the Charles Schwab employee had read and downloaded
this week, we wouldn't come close to knowing who she really is. (Instead, we
would misjudge her in all sorts of new ways.) In a surreal world where
complete logs of every citizen's reading habits were available on the
Internet, the limits of other citizens' attention spans would guarantee that
no one could focus long enough to read someone else's browsing logs from
beginning to end. Instead, overwhelmed by information, citizens would change
the channel or click to a more interesting Web site.

Even the most sophisticated surveillance technologies can't begin to absorb,
analyze and understand the sheer volume of information. The F.B.I. recently
asked Congress for $75 million to finance a series of surveillance
systems,including a new project called Digital Storm, which will allow it to
vastly expand its recordings of foreign and domestic telephone and cell-phone
calls, after receiving judicial authorization.

But because it can't possibly hire enough agents to listen to the recordings
from beginning to end, the F.B.I. plans to use "data mining" technology to
search for suspicious key words. This greatly increases the risk that
information will be taken out of context: as "60 Minutes" reported, the
Canadian Security Agency identified a mother as a potential terrorist after
she told a friend on the phone that her son had "bombed" in his school play.
Filtered or unfiltered, information taken out of context is no substitute for
the genuine knowledge that can emerge only slowly over time.
Moreover, defenders of transparency have adopted a unified vision of human
personality, which views social masks as a way of misrepresenting the true
self. But as the sociologist Erving Goffman argued in the 1960's, this take
on personality is simplistic and misleading. Instead of behaving in a way
that is consistent with a single character, people reveal different parts of
themselves in different contexts. I may -- and do -- wear different social
masks when interacting with my students, my editors, my colleagues and my dry
cleaner. Far from being inauthentic, each of these masks helps me try to
behave in a manner that is appropriate to the different roles demanded by
these different social settings. If these masks were to be violently torn
away, what would be exposed is not my true self but the spectacle of a
wounded and defenseless man.

Goffman also maintained that individuals, like actors in a theater, need
backstage areas where they can let down their public masks, tell dirty jokes,
collect themselves and relieve the tensions that are an inevitable part of
public performance. In the new economy of information exchange, white collar
workers are increasingly forced to work under constant surveillance like the
dehumanized hero of "The Truman Show," a character who has been placed on an
elaborate stage set without his knowledge or consent and whose every move, as
he interacts with the actors who have been hired to play his friends and
family, is broadcast by hidden video cameras.
The inhibiting effects on creativity and efficiency are palpable. Surveys of
the health consequences of monitoring in the workplace have suggested that
electronically monitored workers experience higher levels of depression,
tension and anxiety and lower levels of productivity than those who are not
monitored. Unsure about when, precisely, electronic monitoring may take
place, employees will necessarily be far more guarded and less spontaneous,
and the increased formality of conversation and e-mail can make communication
less efficient. Moreover, spying on people without their knowledge is an
indignity. It fails to treat its objects as fully deserving of respect, and
treats them instead like animals in a zoo, deceiving them about the nature of
their own surroundings.

In "The Unbearable Lightness of Being," Milan Kundera describes how the
police destroyed an important figure of the Prague Spring by recording his
conversations with a friend and then broadcasting them as a radio serial.
Reflecting on his novel in an essay on privacy, Kundera writes, "Instantly
Prochazka was discredited: because in private, a person says all sorts of
things, slurs friends, uses coarse language, acts silly, tells dirty jokes,
repeats himself, makes a companion laugh by shocking him with outrageous
talk, floats heretical ideas he'd never admit in public and so forth."
Freedom is impossible in a society that refuses to respect the fact that "we
act different in private than in public," Kundera argues, a reality that he
calls "the very ground of the life of the individual." By requiring citizens
to live in glass houses without curtains, totalitarian societies deny their
status as individuals, and "this transformation of a man from subject to
object is experienced as shame."

A liberal state should respect the distinction between public and private
speech because it recognizes that the ability to expose in some contexts
aspects of our identity that we conceal in other contexts is indispensable to
freedom, friendship, even love. Friendship and romantic love can't be
achieved without intimacy, and intimacy, in turn, depends upon the selective
and voluntary disclosure of personal information that we don't share with
everyone else. Moreover, as Kundera recognized, privacy is also necessary for
the development of human individuality. Any writer will understand the
importance of reflective solitude in refining arguments and making unexpected
connections: in an odd but widely shared experience, many of us seem to have
our best ideas when we are in the shower. Indeed, studies of creativity show
that it's during periods of daydreaming and seclusion that the most creative
thought takes place, as individuals allow ideas and impressions to run freely
through their minds without fear that their untested thoughts will be exposed
and taken out of context.

[I] t is surprising how recently changes in law and technology have been
permitted to undermine sanctuaries of privacy that Americans have long taken
for granted. But even more surprising has been our relatively tepid response
to the new technologies of exposure. But there is no reason to surrender to
technological determinism; no reason to accept the smug conclusion of Silicon
Valley that in the war between privacy and technology, privacy is doomed. On
the contrary, there is a range of technological, legal and political
responses that might help us rebuild in cyberspace some of the privacy and
anonymity that we demand in real space.

The most effective responses may be forms of self-help that allow citizens to
cover their electronic tracks, along the lines of the Kremlin technology that
my student uses to scour his hard drive or the Scribble technology that James
Rutt used to erase his own chat. The fact that e- mail, for example, is hard
to delete and easy to retrieve is partly a consequence of current technology,
and technology can change. Companies with names like Disappearing Inc. and
ZipLip have introduced a form of self-deleting e-mail that uses encryption
technology to make messages nearly impossible to read soon after they are
received. When I send you a message, Disappearing Inc. scrambles the e-mail
with an encrypted key and then gives you the same key to unscramble it. I can
specify how long I want the key to exist, and after the key is destroyed, the
message can't be read without a herculean code-breaking effort.

At the moment the most advanced technology of anonymity and pseudonymity in
cyberspace is offered by companies like Zero-Knowledge Systems, which is
based in Montreal. For a modest fee, you can disaggregate your identity with
a software package called Freedom, which initially gives you five digital
pseudonyms, or "nyms," that you can assign to different activities, from
discussing politics to surfing the Web. (Why any of us needs five pseudonyms
isn't entirely clear, but the enthusiasm of the privacy idealists is sweet in
its way.) On the Freedom system, no one, not even Zero-Knowledge itself, can
trace your pseudonyms back to your actual identity.

"You can trust us because we're not asking you to trust us," says Austin
Hill, Zero-Knowledge's 26-year-old president. Hill has a messianic air about
his role in vindicating what he considers to be the universal human rights of
privacy, free speech and the possibility of redemption in a world where
youthful errors can follow you for the rest of your life. "Twenty years from
now, I'm going to be able to talk to my grandkids and say I played an
instrumental role in making the world a better place," he says. "As the Blues
Brothers say, everyone here feels that we're on a mission from God."

Freedom makes traceability difficult by encrypting e-mail and Web-browsing
requests and sending them through at least three intermediary routers on the
way to their final destinations: each message is wrapped like an onion in
three layers of cryptography, and each router can peel off only one layer of
the onion to learn the next stop in the path of the message. Because no
single router knows both the source of the message and its destination, the
identity of the sender and the recipient is difficult to link. Zero-Knowledge
assigns pseudonyms using the same technology, and so the company itself can't
link the pseudonyms to individual users; if it is subpoenaed it can only turn
over a list of its customers, who can hope for anonymity in numbers.
But should people be forced to resort to esoteric encryption technology with
names like ZipLip and Zero-Knowledge every time they want to send e-mail or
browse the Web? Until anonymous browsers become widespread enough to be
socially acceptable, their Austin Powers-like aura may deter all but the most
secretive users who have something serious to hide. Moreover, every
technological advance for privacy will eventually provoke a technological
response. For this reason, some privacy advocates, like Marc Rotenberg, the
director of the Electronic Privacy Information Center, argue that anonymity
on the Internet should be a legal right, rather than something achieved with
a commercial product.

Americans increasingly seem to agree that Congress should save us from the
worst excesses of online profiling. In a Business Week poll conducted in
March, 57 percent of the respondents said that the government should pass
laws regulating how personal information can be collected and used on the
Internet. The European Union for example, has adopted the principle that
information gathered for one purpose can't be sold or disclosed for another
purpose without the consent of the individual concerned. But efforts to pass
comprehensive privacy legislation in the United States have long been
thwarted by a political reality: the beneficiaries of privacy -- all of us,
in the abstract -- are anonymous and diffuse, while the corporate opponents
of privacy are well organized and well heeled.

In the hope that the political tide may be turning, Senator Robert Torricelli
has introduced a bill that would forbid a Web site from collecting or selling
personal data unless users checked a box allowing it to do so. This "opt in"
proposal has been vigorously and successfully resisted by the e-commerce
lobby, which insists that it would cripple the use of online profiling and
cause advertising revenues to plummet.

The e-commerce lobby prefers a more modest Senate proposal that would require
Web sites to display a clearly marked box allowing users to "opt out" of data
collection and resale. But it's not clear that "opt out" proposals would
provide meaningful protection for privacy. Many users, when confronted with
boilerplate privacy policies, tend to click past them as quickly as teenage
boys click past the age certification screens on X-rated Web sites.

Moreover, many people seem happy to waive their privacy rights in exchange
for free stuff. There is now a cottage industry of companies with names like
Free PC, Dash.com and Gator.com that offer their users product discounts,
giveaways or even cash in exchange for permission to track, record and
profile every move they make, and to bombard them with targeted ads on the
basis of their proclivities.

This is about as rational as allowing a camera into your bedroom in exchange
for a free toaster. But as Monica Lewinsky discovered, it's easy to forget
why privacy is important until information you care about is taken out of
context, and by that point, it's usually too late. "One of the things that I
was a little bit disappointed about," Lewinsky told Larry King, "was that
people didn't seem to pay too much attention about their privacy issues." In
what will hopefully be the last indignity for Lewinsky, some of her
previously undiscovered e-mail messages to Betty Currie surfaced only a few
weeks ago, when the White House turned them over in response to a subpoena in
an unrelated case. In cyberspace, as in cheap horror movies, your ghosts can
rise up to haunt you just when you think the danger has passed.

There is no single solution to the erosion of privacy in cyberspace: no
single law that can be proposed or single technology that can be invented to
stop the profilers and surveillants in their tracks. The battle for privacy
must be fought on many fronts -- legal, political and technological -- and
each new assault must be vigilantly resisted as it occurs. But the history of
political responses to new technologies of surveillance provides some grounds
for hope. Although Americans are seldom roused to defend privacy in the
abstract, the most illiberal and intrusive technologies of surveillance have,
in fact, provoked political outrage that has forced the data collectors to
retreat. In 1967, after the federal government proposed to create a national
data center that would store personal information from the I.R.S., the census
and labor bureaus and the Social Security administration, Vance Packard wrote
an influential article for this magazine that helped to kill the plan.

We are trained in this country to think of all concealment as a form of
hypocrisy. But perhaps we are about to learn how much may be lost in a
culture of transparency -- the capacity for creativity and eccentricity, for
the development of self and soul, for understanding, friendship and even
love. There is nothing inevitable about the erosion of privacy in cyberspace,
just as there is nothing inevitable about its reconstruction. We have the
ability to rebuild some of the private spaces we have lost. What we need now
is the will.
The New York Times Magazine, April 30, 2000
-----
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
All My Relations.
Omnia Bona Bonis,
Adieu, Adios, Aloha.
Amen.
Roads End

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance�not soap-boxing�please!  These are sordid
matters
and 'conspiracy theory'�with its many half-truths, misdirections and outright
frauds�is used politically by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html
<A HREF="http://home.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to