http://www.nytimes.com/2002/04/14/magazine/14TECHNO.html?homepageinsidebox=&pagewanted=print&position=top

April 14, 2002
Silicon Valley's Spy Game
By JEFFREY ROSEN

G ilman Louie is one of the most successful computer-game developers of 
all time. ''I'm your classic entrepreneur,'' he told me recently. ''I 
started my first business with my fraternity brothers at San Francisco 
State.'' Louie, an amateur fighter pilot, had his first big success in 
1987 with a game called Falcon, which allowed players to simulate the 
flight of an F-16. Falcon sold millions of copies, not only to teenage 
boys but also to pilots in the United States Air Force, who found it so 
realistic that it helped them learn to fly real fighter jets. Louie's 
biggest success came in 1988, when he imported from the Soviet Union an 
unexpectedly addictive game called Tetris, which became the best-selling 
computer game ever. ''Between Nintendo sales and PC sales, 70 or 80 
million copies of that game sold,'' Louie says. ''We even found out that 
Hillary Clinton loved playing Tetris on the Game Boy.''

Lots of companies were impressed by Louie's success, including Hasbro, 
which put him in charge of creating its games Web site. And then in 1998, 
Louie was recruited by an even more powerful employer: the Central 
Intelligence Agency. ''The C.I.A. actually thought that my computer-game 
background was a valuable asset,'' Louie recalls. ''I look at the world as 
one big system -- one big game.''

The C.I.A. had just founded an unusual venture-capital firm called 
In-Q-Tel, and the agency wanted Louie to be the C.E.O. ''The 'Q' stands 
for the 'Q' factor -- it's named after the character in James Bond,'' says 
Louie. In-Q-Tel was the brainchild of George Tenet, the C.I.A. director, 
who believed that by investing $30 million a year in Internet startups in 
Silicon Valley, the C.I.A. could encourage the development of cutting-edge 
technologies that might be useful for national intelligence. Louie's 
marching orders were to provide venture capital for data-mining 
technologies that would allow the C.I.A. to monitor and profile potential 
terrorists as closely and carefully as Amazon monitors and profiles 
potential customers.

The valley has long indulged its own antiestablishment mythology -- 
rebellious, libertarian hackers in their parents' garages, bucking the 
system by inventing world-changing, personally empowering technologies -- 
and Louie was worried that persuading programmers to collaborate with the 
C.I.A. would be ''borderline ludicrous.'' Despite his doubts, Louie agreed 
to open one In-Q-Tel office in Menlo Park, Calif., and another near 
Washington. He quickly discovered that far from recoiling at the idea of 
working with the C.I.A., Internet entrepreneurs flocked to his door. The 
chance to play with the government's cool toys trumped their fears of Big 
Brother.

After the dot-com crash, Silicon Valley, desperate for venture capital, 
began to depend more and more on the federal government. Then came Sept. 
11, and the establishment of the Office of Homeland Security. In-Q-Tel now 
finds itself just one of several deep-pocketed federally financed 
investors that are eager to back technological solutions to our new 
security challenges. The Bush administration is asking Congress for $38 
billion for homeland security, and much of this money will be parceled out 
among competing federal agencies -- including the Defense Department and 
the F.B.I. -- which can then use the money either to invest directly in 
security technologies or to follow In-Q-Tel's model of providing venture 
capital to young companies in the private sector. Like the C.I.A., the 
Office of Homeland Security has concluded that the same technologies that 
were useful before Sept. 11 for tracking, profiling and targeting 
potential customers can be turned today on potential terrorists. In the 
wake of the bursting of the tech bubble and in the thick of the war on 
terrorism, Silicon Valley is reinventing itself as the new headquarters 
for the military-technological complex.


 As always, the entrepreneurs are following the money. In January, this 
led them to Las Vegas for the Consumer Electronics Show, the largest trade 
show of futuristic gadgets in North America. After Sept.11, the conference 
organizers decided to sponsor a special exhibition hall at the Riviera 
Hotel for technologies that are especially well suited to homeland 
defense. That old familiar gold-rush feeling was in the air at the 
Riviera: one speaker estimated that federal spending on security 
technologies would grow by 30 percent a year, rising to $62 billion by 
2006. (''God bless America'' read the PowerPoint slide, over an image of 
firefighters raising the flag.) In the buzzing exhibition hall, 
participants admired a hologram of the Statue of Liberty, as well as a man 
in a gigantic thumbprint costume, who had been hired by a company called 
DigitalPersona to advertise its fingerprint-recognition device.

After displaying their wares, the technologists flocked to an In-Q-Tel 
reception near the exhibition hall, trolling for federal investors from 
the C.I.A., F.B.I. and Defense Department. ''All we served was 
pot-stickers and 7-Up,'' Louie recalls, ''but people didn't want to 
leave.''

In Las Vegas, several companies predicted that profiling techniques that 
are now used to detect credit-card fraud could soon be used to detect 
potential terrorists. A few weeks later, this prediction turned out to be 
a reality, when The Washington Post reported that the federal aviation 
authorities and two technology companies called Accenture and HNC Software 
are planning to test at airports a profiling system designed to analyze 
each passenger's living arrangements, travel and real-estate history, 
along with a great deal of demographic, financial and other personal 
information. Using data-mining and predictive software, the government 
then plans to assign each passenger a ''threat index'' based on his or her 
resemblance to a terrorist profile. Passengers with high threat indexes 
will be flagged as medium or high risks and will be taken aside for 
special searches and questioning.

Our system ''will check your associates,'' Brett Ogilvie of Accenture told 
Business Week. ''It will ask if you have made international phone calls to 
Afghanistan, taken flying lessons or purchased 1,000 pounds of 
fertilizer.'' The only problem: in order for the system to obtain answers 
to those questions, the nation's privacy laws will need to be relaxed. 
Federal laws currently restrict the personally identifiable information 
that the government can demand from credit-card and phone companies except 
as part of a specific investigation.

When I called Brett Ogilvie to ask what data Accenture proposes to 
analyze, his spokeswoman, Stacey Jones, said that she couldn't reveal that 
information: it's a trade secret. ''Anyone who is interested in beating 
the system can, once we start divulging what the systems are,'' she 
explained. I said that I wasn't interested in the specific profiling 
factors; I only wanted to know whether Accenture proposed to include 
information in its database that the government isn't now permitted to 
examine. But Jones stuck to her script: ''National security and client 
confidentiality prohibits us from divulging what the factors are.''

 Accenture's profiling scheme is open to question not only because it 
would almost certainly violate the privacy rights of airline passengers, 
but also because it seems unlikely to work. Investigators will tell you 
that people who commit credit-card fraud often fit a consistent profile -- 
using the stolen card to buy gas at self-service stations, for example, 
and then using it to buy clothes. By contrast, terrorists don't fit a 
consistent profile: you're looking for a needle in a haystack, but the 
color and the shape of the needle keep changing. Mohamed Atta might have 
been kept out of the country if immigration officials had been aware that 
there was a warrant for his arrest in Broward County, Florida. But 
Accenture's profiling system is not designed to check passengers against a 
watch list of suspected criminals or terrorists. Instead it is designed to 
compare the purchasing activities and personal behavior of millions of 
passengers with those exhibited in the past by a tiny group of terrorists 
-- to create a predictive profile of likely hijackers.

Lawrence Lessig, who teaches law at Stanford and is the nation's leading 
authority on the law and architecture of cyberspace, argues that the 
Accenture system is unworkable. ''I can understand these massive data 
systems to deal with things like stealing from the government or not 
paying your taxes -- systematic repetitive large-scale deviations from the 
law,'' he says. ''The problem I really have with the terrorism stuff is, 
do we have any good reason to believe we could ever predict this type of 
behavior?'' Because the sample of known terrorists is so small, Lessig 
says, the profiles are bound to be inaccurate.

The entrepreneurs of Silicon Valley are undaunted by questions about 
whether it makes sense to profile terrorists the way they profile 
e-business consumers; they haven't been so enthusiastic about a race to 
innovate since the height of the dot-com bubble. In the glory days of the 
late 90's, Silicon Valley was consumed by the search for the ''killer 
app,'' the software application that was just so cool and effective that 
everyone had to buy it. After Sept. 11, the consensus in the valley is 
that the national-security ''killer app'' will allow government agencies 
to access and share information about Americans that is currently stored 
in different databases -- from your chat-room gossip to your shopping 
history to your parking tickets, and perhaps even the payment history for 
your child-support checks.


''Today, every federal intelligence and law-enforcement agency and all 
manner of state and local bodies maintain their own separate databases on 
suspected criminals,'' Larry Ellison, the founder and C.E.O. of Oracle 
Corporation , wrote in The Wall Street Journal last October. ''Do we need 
more databases? No, just the opposite. The biggest problem today is that 
we have too many. The single thing we could do to make life tougher for 
terrorists would be to ensure that all the information in myriad 
government databases was integrated into a single national file.'' Oracle, 
in fact, is the world's largest database manufacturer, and Ellison offered 
to donate the software for a single national database free of charge to 
the United States government. (The company, Ellison added, would charge 
for upgrades and maintenance.) 

 Oracle's office in Reston, Va., is near the headquarters of the C.I.A., 
which is appropriate enough: when Larry Ellison founded the company 25 
years ago, his first client was the C.I.A., to whom he sold a program 
called Oracle, the world's first ''relational'' database. At that time, 
information in computer databases was stored in unrelated files: a company 
like Ford, for example, could keep one file of its employees and another 
file of its departments, but it had no easy way of relating the two files. 
Ellison saw the commercial potential of the relational database and began 
marketing it in 1979. By the height of the dot-com boom in 2000, Ellison's 
net worth had soared to $80 billion, making him (briefly) the richest 
person in the world.

When I visited Oracle in January, the security guard in the lobby gave me 
a high-tech ID badge that could track where I was in the building at all 
times. I was ushered upstairs to a bright conference room where seven 
people were sitting around a huge oval table. One of them, David Carey, 
turned out to be the former No. 3 man at the C.I.A.; he had just retired 
as executive director after 32 years with the agency. Carey joined Oracle 
to head its new Information Assurance Center, which was founded in 
November to design homeland-security and disaster-recovery solutions and 
market them to the federal government.

Like his colleagues, Carey was in an expansive mood. He said that the 
United States government accounted for 23 percent of Oracle's 
multibillion-dollar licensing revenue last year and that he expected the 
federal side of the business to improve after Sept. 11. ''How do you say 
this without sounding callous?'' he asked. ''In some ways, Sept. 11 made 
business a bit easier. Previous to Sept. 11, you pretty much had to hype 
the threat and the problem.'' Carey said that last summer, leaders in the 
public and private sector wouldn't sit still for a briefing. Then his face 
brightened. ''Now they clamor for it!'' After Sept. 11, Carey and Ellison 
held a series of top-level meetings in Washington about the use of Oracle 
technology for homeland security. ''In November, Larry had a serious 
discussion with Vice President Cheney, and I met with Ridge, Ashcroft and 
Mueller,'' Carey says, referring to the director of the Office of Homeland 
Security, the attorney general and the director of the F.B.I.

I asked to see an example of Oracle's new homeland-security technology, 
and I was ushered into a demonstration hall outside the conference room 
that looked like something out of the last ''Star Wars'' movie. ''I'll 
give you an overview of 'Leaders,''' said Brian Jones, then the head of 
Oracle's health-care consulting unit. ''It stands for Lightweight 
Epidemiology Advanced Detection and Emergency Response System.'' By 
collecting health-care information from hospital emergency rooms across 
the country, Leaders is designed to monitor outbreaks of suspicious 
diseases and provide early warnings for biological attacks. 

 At 9:20 a.m. on Sept. 11, Jones had received a phone call from the 
Centers for Disease Control in Atlanta, which feared that the attack on 
the twin towers might be followed by a bioterrorism attack. Working for 10 
straight hours, Jones put into his computer the address of every hospital 
in New York State, to detect unusual disease outbreaks, like smallpox. 
''Every hospital was capable of submitting data to a repository,'' he 
explained. ''The Centers for Disease Control's experts could sit back in 
Atlanta and pull up a map just like I'm showing you here.'' Jones punched 
a key and a digital map of New York City appeared on the screen. Using a 
combination of 7,500 digital photographs and architectural plans of more 
than 6,000 miles of underground pipes, Oracle has created a detailed map 
of every building, sewer and water line and curb in the city. By the 
evening of Sept. 11, Jones was ready to monitor every emergency-room bed 
in the state.

Oracle is now working with the federal government to apply the same 
surveillance system to hospitals throughout the country. The system would 
allow hospitals to report incidents of suspicious diseases like anthrax, 
smallpox and Ebola to a central database. The program can then send out 
e-mail or voice-mail alerts to law-enforcement officials if it detects 
suspicious patterns of diseases anywhere in the country. Steve Cooperman, 
Oracle's new director of homeland security, said, ''We're going to build a 
bioterrorism shield, so eventually everyone is going to have to 
participate -- every hospital, every clinic, every lab.''


The prospect of every hospital in America reporting your medical condition 
to a central Oracle database might cause some patients alarm. (Oracle 
insists that the information can be stored in ways that can't be linked to 
individual patients.) The same potential for invasions of privacy is 
raised by Larry Ellison's proposal to centralize all of the separate 
criminal databases run by federal and state authorities into a single 
national database. After we filed back into the conference room, David 
Carey explained that Oracle is already discussing with various federal 
agencies methods of sharing information that are currently restricted by 
law.

''We think of it as a triangle,'' said Tim Hoechst, a senior vice 
president for technology at Oracle, holding up a Dorito. ''At one corner 
is privacy, at one corner is assurance of security -- how safe is the data 
-- and at another corner is usability. It's all a matter of trade-offs. 
What we focus on is making the Dorito here, and putting you in any corner 
that you feel comfortable with. On Sept. 12, most Americans would say, 
Privacy out the window; go catch the folks. So we would have moved it all 
the way to usability. But maybe day to day, we move it a little bit more 
toward security.''

 As the databases are consolidated, I asked, who should decide the proper 
balance between privacy and access? How do you avoid a situation in which 
someone could be kept off a plane because he had skipped jury duty or had 
an overdue parking ticket? A hush fell over the room, and people looked 
awkwardly at their sandwiches.

Finally Hoechst spoke up. ''You'll notice that we all became suspiciously 
quiet when we started talking about policy questions,'' he said. ''At 
Oracle, we leave that to our customers to decide. We become a little 
stymied when we start talking about the 'should wes' and the 'whys' and 
the 'hows,' because it's not our expertise.''

The Tom Lehrer song about the Nazi rocket scientist who defected to 
America popped into my head: ''Once ze rockets are up, who cares where 
they come down?/That's not my department,' says Wernher von Braun.''

''I expect that if you ask Larry Ellison the question he'd give you a much 
better answer,'' one of Hoechst's associates chimed in. Hoechst agreed. 
''My experience with him is that he knows an extraordinary amount about a 
lot of things. Every time I think I know something, he knows much more. 
He's read more books on it.''


So I set off for Silicon Valley to meet Larry Ellison. The Oracle campus 
near the San Francisco airport is known as the Emerald City, for its 
artificial lakes and silo-shaped towers of glass and silver. Ellison's 
private palace, however, is a $30 million mansion in nearby Atherton, 
modeled on the Katsura Imperial Villa in Kyoto. I was checked in there by 
two bodyguards with dark shirts and dark tans and escorted into the house 
to wait. The living room was large and airy, with lots of blond wood and 
shoji screens. It overlooked a beautiful Japanese garden, where ducks swam 
and waterfalls shimmered.

Ellison appeared a few minutes later from behind one of the screens, 
wearing a pressed charcoal suit over a black turtleneck. He appeared fit 
and tanned, with piercing hazel eyes and a trimmed beard slightly flecked 
with gray. He suggested that we talk in the garden, but the loud whine of 
a neighbor's mulcher made this impossible. (In Silicon Valley, even $30 
million doesn't buy you quiet.) Defeated by the noise, we retreated to the 
dining room, with its high-backed black lacquer chairs and black lacquer 
table.

Ellison is not a shy or enigmatic billionaire. He is entertainingly 
indiscreet -- he answered every question with a torrent of confident 
opinions. ''The Oracle database is used to keep track of basically 
everything,'' he said. ''The information about your banks, your checking 
balance, your savings balance is stored in an Oracle database. Your 
airline reservation is stored in an Oracle database. What books you bought 
on Amazon is stored in an Oracle database. Your profile on Yahoo is stored 
in an Oracle database.'' Much of the information in these separate 
commercial databases is also centralized in large databases maintained by 
credit-card companies like TRW to detect fraud and to decide whether 
customers should get credit at the mall.

When it comes to government data, by contrast, there are hundreds of 
separate, disconnected databases. ''The huge problem is the fragmented 
data,'' he said. ''We knew Mohamed Atta was wanted. It's just that we 
didn't check the right database when he came into the country.'' Ellison 
wants to consolidate the hundreds of separate state and federal databases 
into a single Oracle database, using the centralized credit-card databases 
as a model. ''We already have this large centralized database to keep 
track of where you work, how much you earn, where your kids go to school, 
were you late on your last mortgage payment, when's the last time you got 
a raise,'' he said. ''Well, my God, there are hundreds of places we have 
to look to see if you're a security risk.'' He dismissed the risks of 
privacy violations: ''I really don't understand. Central databases already 
exist. Privacy is already gone.''

 As Ellison spoke, it occurred to me that he was proposing to reconstruct 
America's national security strategy along the lines of Oracle's business 
model. When Oracle moved its business to the Internet in 1995, Ellison 
complained that its customer information was scattered across hundreds of 
separate databases, which meant that the German office couldn't share 
information about customers with the French office. By consolidating 130 
separate databases into a single database on the Internet, Ellison said, 
Oracle saved a billion dollars a year and found it easier to track, 
monitor and discriminate among its customers. This was what Ellison now 
wanted to do for America.

I asked if there would be any controls on access to the database. For 
example, would Ellison want people to be kept off a plane because they 
were late on their alimony payments?

''Oh, no, I don't think we would keep anyone off on alimony payments,'' 
Ellison said. ''But if the system designed to catch terrorists also 
catches mere bank robbers and deadbeat dads, that's O.K. I think that's a 
good thing. I don't think it's a bad thing.''

There are, at the moment, legal restrictions prohibiting the sharing of 
data by government agencies. The most important restriction was passed in 
1974, to prevent President Nixon from ordering dragnet surveillance of 
Vietnam protesters and searching for their youthful marijuana arrests. I 
asked Ellison whether these legal restrictions should be relaxed. ''Oh, 
absolutely,'' he said. ''I mean absolutely. The prohibitions are absurd. 
It's this fear of an all-too-powerful government rising up and snatching 
away our liberties.'' Since Sept. 11, Ellison argued, those qualms no 
longer make any sense: ''It's our lives that are at risk, not our 
liberties,'' he said.

Ellison proposes to link the central government database to a system of 
digital identification cards that would be optional for citizens but 
mandatory for aliens. He wants each card holder to provide a thumbprint or 
iris scan that would be stored in the central database. I recalled that 
Lawrence Lessig of Stanford Law School had explained to me that a national 
fingerprint database was probably the most invasive of all possible 
designs for an identification system, because it would allow the 
government to dust for fingerprints in a nightclub or a protest scene and 
identify everyone who was there. I asked Ellison why the government 
couldn't minimize these privacy concerns by storing the fingerprint on the 
ID card.

Ellison dismissed the suggestion. ''Everyone's got this amorphous idea 
that the government will somehow misuse this,'' he said, ''but no one has 
given me a substantive example of what will happen that's bad.''

I tried again. What about the centralized storage of health information, 
as Oracle was proposing to do with the Leaders system. Would Ellison want 
government officials to have access to personally identifiable genetic 
information?

''I feel like Alice has fallen through the looking glass,'' Ellison said. 
His voice rose; he was starting to get a little testy. ''Does this other 
database bother you here? We can't touch that database because I won't be 
able to use my credit card. Like, I won't be able to go to the mall!'' He 
took on the voice of Sean Penn's stoner from ''Fast Times at Ridgemont 
High.'' ''Like, that's really disturbing. Like, don't mess with my mall 
experience. O.K., so people have to die over here without this, but that's 
not going to affect my experience going to the mall.'' He exhaled, and in 
his regular billionaire voice asked, ''I mean, what the hell is going 
on?'' 

 Ellison said he was late for an appointment at Intel  and started to make 
motions to leave. I tried one more question. Were there no differences 
between Oracle and the United States government, I asked, that should make 
us hesitate before centralizing all of our national databases using Oracle 
as a model?

''From the information-science standpoint, there's no difference at all,'' 
he replied. ''These central databases are cheaper and better and they 
solve all these problems. We can manage credit risks that way. We should 
be managing security risks in exactly the same way.''

It's not surprising, of course, that Larry Ellison sincerely believes that 
what's good for Oracle is good for America. But there are, in fact, 
differences between an e-business and the American government, differences 
that perhaps should make us hesitate before reconstructing America along 
the business model of the Oracle Corporation.

''Depending on how these technologies are designed, they can respect 
traditional values of liberty or not,'' says Lawrence Lessig, ''and 
whether they do depends on the values that drive the designers and the 
institutions we build to check the design.'' Although Lessig's 
path-breaking book ''Code and Other Laws of Cyberspace'' argues that it's 
possible to design technologies that protect privacy and security at the 
same time, he has become pessimistic that Silicon Valley, left to its own 
devices, will get the balance right. ''The reality is that all the market 
power is going to be on the side of delivering the security, and there's 
no strong claim on the other side for delivering the privacy,'' he says. 
''There's no court that will stand up and push the demand for heightened 
review for privacy, and there's no politician. And then you have Larry 
Ellison types riding in with the glow of the market. He's like a rich 
version of a North Korean dictator.''


Here, then, is the Catch-22 of the integrated databases that are being 
constructed in the wake of Sept. 11: the technologists want the 
politicians to decide the balance between privacy and security, but 
because the technology is so complicated and unfamiliar, very few 
politicians seem up to the task. I visited Maria Cantwell, the newly 
elected senator from the state of Washington and perhaps the most 
technologically savvy member of the Senate. (She complains that 
Congressional rules prohibit her from taking her BlackBerry wireless 
communicator onto the Senate floor but allow her to use a spittoon.) 
Cantwell learned about the importance of Internet privacy as an executive 
for RealNetworks , which markets one of the most popular Internet music 
players. In 1999, RealNetworks got into trouble when privacy advocates 
noticed that the player could send information to RealNetworks about the 
music each user downloaded. RealNetworks had the capability to match this 
data with a Globally Unique Identifier, or GUID, that exposed the user's 
identity. Although RealNetworks insisted that it had never, in fact, 
matched the music data with the GUID, the company was eager to avoid a 
public-relations disaster, and so it quickly disabled the GUID. The 
experience helped turn Cantwell into a crusader for privacy, but her time 
in the Senate has made her more pessimistic that her colleagues in 
Congress have the understanding or inclination to regulate technology in a 
meaningful way. 

 ''What I don't think people realize is that we are just at the tip of the 
iceberg,'' she told me. ''I think they're trying to be prescriptive on 
some very basic things, not understanding the world that's yet to come. I 
try to explain some of the new technology to my colleagues'' -- by which 
she means her fellow senators. ''You're going to be able to be driving and 
say, 'Hey, take me to the nearest Starbucks ,' and they all think that's 
great. And then I say, but it also might be stored in a database that may 
also be able to track where you were at 2 o'clock in the morning.''

Cantwell worries that her Senate colleagues are so swept up in the search 
for a technological solution to our security problems that regulating 
access to the databases isn't on their agenda. ''I mean, databases can 
become a threat in themselves if you don't think through the right 
safeguards,'' she said. ''People are getting enamored with the power of 
the technology and not thinking through the privacy issues and how they 
might apply.''

In the face of Congressional indifference and judicial passivity, it has 
fallen to the technologists to sort out the appropriate balance between 
liberty and security. But this is a challenge that the technologists are 
ill equipped -- by culture and temperament -- to meet.

The gonzo entrepreneurs of Silicon Valley like to think of themselves as 
antigovernment libertarians; the business nostrums of the precrash era 
assumed that the Internet would lead inevitably to the end of hierarchy 
and centralized authority and the flourishing of individual creativity. 
When the e-business technologies of tracking, classifying, profiling and 
monitoring were used to identify the preferences of American consumers and 
to mirror back to each of us a market-segmented version of ourselves, 
Silicon Valley could argue that it was serving the cause of freedom and 
individual choice. But when the same software applications are used by the 
government to track, classify, profile and monitor American citizens, they 
become not technologies of liberty but technologies of state surveillance 
and discrimination. They threaten the ability of Americans to define their 
identity in the future free from government predictions based on their 
behavior in the past. Far from leading inevitably to the end of 
centralized authority, the age of the Internet turns out to include 
powerful economic and political forces that are determined to centralize 
as much information about individuals as possible.

The technology for integrated databases already exists, waiting to be 
activated by the flip of a switch. In the wake of Sept. 11, few 
politicians or judges seem willing to keep the forces of centralization in 
check. And no one should count on the technologists to police themselves.

I had one last question for Larry Ellison. ''In 20 years, do you think the 
global database is going to exist, and will it be run by Oracle?'' I 
asked.

''I do think it will exist, and I think it is going to be an Oracle 
database,'' he replied. ''And we're going to track everything.''

Jeffrey Rosen is an associate professor at George Washington University 
Law School and the legal affairs editor of The New Republic. His last 
article for The Times Magazine was about the growth of surveillance.

Reply via email to