Skip to main content

The USA: First in Technology and Last in Data Protection

  • Chapter
Handbook of Personal Data Protection
  • 130 Accesses

Abstract

While the USA ardently fought the Fascist powers of the Axis, it experienced its own dilemma with regard to data protection shortly after the end of World War II. ’Blacklists’ and ’Redlists’ became the order of the day throughout the USA. Federal government agencies began to keep lengthy dossiers on people who they considered to be security risks or, even worse, traitors to their country. One only had to be denounced by a fellow colleague in order to qualify for a government file. Thus, the USA, for the second time in its history experienced the phenomenon of the ’witch hunt.’ Indeed, some feel that current American policy on the notion of privacy is still tied to the Puritan ethic which disallowed privacy in a society of communalism and religious fanaticism. The return to the witch hunts in the late forties had many privacy advocates wondering if the USA was traveling down the trail already blazed by the Salem Puritans over 200 years earlier.

The saint and poet seek privacy

— Ralph Waldo Emerson, Culture

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bud and Ruth Schultz, It Did Happen Here. Berkeley: University of California Press, 1989, p. 112.

    Google Scholar 

  2. Ibid., p. xvi.

    Google Scholar 

  3. Michael A. Mussmano, Across the Street from the Courthouse, Philadelphia: Dorrance and Company, 1954. p.253.

    Google Scholar 

  4. Athan Theoharis, From the Secret Files of J. Edgar Hoover. Chicago: Ivan R. Dee, 1991. p. 4.

    Google Scholar 

  5. Ibid., pp. 15–47.

    Google Scholar 

  6. Mittgang, op. cit. pp. 52–57, 61–79, 87–89, 161–62, 172.

    Google Scholar 

  7. Theoharis, op. cit., p. 265–94.

    Google Scholar 

  8. Department of Health, Education and Welfare Secretary’s Advisory Committee on Automated Personal Data Systems, Records, Computers and the Rights of Citizens, Washington, DC: U.S. Government Printing Office, 1973. p. 41.

    Google Scholar 

  9. American Friends Service Committee, The Police Threat to Political Liberty, Philadelphia: American Friends Service Committee, 1979. pp. 102, 105.

    Google Scholar 

  10. Ibid.

    Google Scholar 

  11. Michael Dorman, Witch Hunt: The Underside of American Democracy. New York: Delacorte Press, 1976. p. 270.

    Google Scholar 

  12. Ibid., pp. 104–5.

    Google Scholar 

  13. Privacy Protection Study Commission, Personal Privacy in an Information Society: the Report of the Privacy Protection Study Commission. Washington, DC: US Government Printing Office, July 1977, p. 333.

    Google Scholar 

  14. ’Big Brother,’ The Economist, 24 August 1991, p. 27.

    Google Scholar 

  15. Arthur Miller, ’The Pendulum of Privacy,’ Security Management, December 1988, p. 58.

    Google Scholar 

  16. Herbert Mittgang, Dangerous Dossiers, New York: Donald Fine, Inc., 1988. pp. 308–9.

    Google Scholar 

  17. Theoharis, op. cit., p. 265.

    Google Scholar 

  18. U.S. General Accounting Office, Computers and Privacy: How the Government Obtains, Verifies, Uses and Protects Personal Data, Washington, DC: General Accounting Office (GAO/IMTEC-90-70-BR), August 1990, p. 12.

    Google Scholar 

  19. Telecommunications Report, September 3, 1990, p. 5.

    Google Scholar 

  20. U.S. General Accounting Office, Report to the U.S. Senate Committee on Government Affairs: Computer Matching Act, Many States did not Comply with 30-Day Notice or Data-Verification Provisions, Washington, DC: U.S. General Accounting Office (GAO/HRD-91-39), February 1991.

    Google Scholar 

  21. Ibid.

    Google Scholar 

  22. Theoharis, op. cit., p. 359.

    Google Scholar 

  23. Vanessa Jo Grimm, ’Behemoth DEA Database Tracks Drug Smugglers,’ Government Computer News, 8 July 1991, p. 85.

    Google Scholar 

  24. Leigh Rivenbark, ’FBI Plans Surveillance R&D Centers,’ Federal Computer Week, April 23, 1990, p. 4.

    Google Scholar 

  25. General Accounting Office, Money Laundering: Treasury’s Financial Crimes Enforcement Network (GAO/GGD-91–53) Washington, DC: General Accounting Office, March 1991. p. 5.

    Google Scholar 

  26. U.S. Office of Technology Assessment, Criminal Justice: New Technologies and the Constitution. Washington: Office of Technology Assessment, May 1988. p. 24.

    Google Scholar 

  27. Patricia A. Parker, ’Crime in National Parks,’ Government Executive, June 1991. pp. 55–6.

    Google Scholar 

  28. OTA, Criminal Justice: New Technologies and the Constitution, op. cit., pp. 45–46.

    Google Scholar 

  29. U.S. Office of Technology Assessment, Electronic Record Systems and Individual Privacy, Washington, DC: U.S. Congress, Office of Technology Assessment, June 1986, pp. 130–3.

    Google Scholar 

  30. ’Post Office Prioritizing Seen as Prying,’ The Virginia-Pilot and the Ledger Star, November 18, 1990, p. A6.

    Google Scholar 

  31. Diana Reynolds, ’FEMA and the NSC: The Rise of the National Security State,’ Covert Action Information Bulletin, No. 33, Winter 1990, pp. 54–6.

    Google Scholar 

  32. U.S. General Accounting Office, Computer Systems: Types and Sources of Department of State Lookout Records. Washington, DC: General Accounting Office (GAO/IMTEC-89–71FS), September 1989, pp. 8–9.

    Google Scholar 

  33. Simson L. Garfinkel, ’From Database to Blacklist,’ Christian Science Monitor, 1 August 1990, pp. 12–13.

    Google Scholar 

  34. Report of the Privacy Protection Study Commission, p. 334.

    Google Scholar 

  35. SAT and Achievements Tests Registration Bulletin 1990–91 (Southern Edition), p. 14.

    Google Scholar 

  36. Security Management, May 1989, p. 53.

    Google Scholar 

  37. Security Management, October 1990, pp. 14–15. Security Management is the official journal of the American Society for Industrial Security (ASIS). ASIS members include many members of the private investigations industry and the law enforcement community. This organization serves as a useful conduit for the unofficial sharing of personal information between these two communities. Equifax is not the only company that advertises its ability to gather large amounts of personal information. There appeared in the same issue of Security Management an advertisement for Nationwide Electronic Tracking, Inc. This company also claimed to have the capability of accessing national criminal, driving and credit histories for an inexpensive fee.

    Google Scholar 

  38. Spiros Simitis, ’Data Protection: Transcending the National Approach,’ Transnational Data and Communications Report, November 1989. p. 26.

    Google Scholar 

  39. James Bamford, The Puzzle Palace, New York: Penguin Books, 1983. p. 476.

    Google Scholar 

  40. H.R. 126 was re-introduced by Representative Collins as H.R. 280 in 1991.

    Google Scholar 

  41. Va. Code § 18.2–152–5.

    Google Scholar 

  42. John R. White, ’President’s Letter: Privacy,’ Communications of the ACM, Vol. 34, No. 4, April 1991, p. 11.

    Google Scholar 

Download references

Authors

Copyright information

© 1992 Palgrave Macmillan, a division of Macmillan Publishers Limited

About this chapter

Cite this chapter

Madsen, W. (1992). The USA: First in Technology and Last in Data Protection. In: Handbook of Personal Data Protection. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-12806-8_5

Download citation

Publish with us

Policies and ethics