Abstract
While the USA ardently fought the Fascist powers of the Axis, it experienced its own dilemma with regard to data protection shortly after the end of World War II. ’Blacklists’ and ’Redlists’ became the order of the day throughout the USA. Federal government agencies began to keep lengthy dossiers on people who they considered to be security risks or, even worse, traitors to their country. One only had to be denounced by a fellow colleague in order to qualify for a government file. Thus, the USA, for the second time in its history experienced the phenomenon of the ’witch hunt.’ Indeed, some feel that current American policy on the notion of privacy is still tied to the Puritan ethic which disallowed privacy in a society of communalism and religious fanaticism. The return to the witch hunts in the late forties had many privacy advocates wondering if the USA was traveling down the trail already blazed by the Salem Puritans over 200 years earlier.
The saint and poet seek privacy
— Ralph Waldo Emerson, Culture
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bud and Ruth Schultz, It Did Happen Here. Berkeley: University of California Press, 1989, p. 112.
Ibid., p. xvi.
Michael A. Mussmano, Across the Street from the Courthouse, Philadelphia: Dorrance and Company, 1954. p.253.
Athan Theoharis, From the Secret Files of J. Edgar Hoover. Chicago: Ivan R. Dee, 1991. p. 4.
Ibid., pp. 15–47.
Mittgang, op. cit. pp. 52–57, 61–79, 87–89, 161–62, 172.
Theoharis, op. cit., p. 265–94.
Department of Health, Education and Welfare Secretary’s Advisory Committee on Automated Personal Data Systems, Records, Computers and the Rights of Citizens, Washington, DC: U.S. Government Printing Office, 1973. p. 41.
American Friends Service Committee, The Police Threat to Political Liberty, Philadelphia: American Friends Service Committee, 1979. pp. 102, 105.
Ibid.
Michael Dorman, Witch Hunt: The Underside of American Democracy. New York: Delacorte Press, 1976. p. 270.
Ibid., pp. 104–5.
Privacy Protection Study Commission, Personal Privacy in an Information Society: the Report of the Privacy Protection Study Commission. Washington, DC: US Government Printing Office, July 1977, p. 333.
’Big Brother,’ The Economist, 24 August 1991, p. 27.
Arthur Miller, ’The Pendulum of Privacy,’ Security Management, December 1988, p. 58.
Herbert Mittgang, Dangerous Dossiers, New York: Donald Fine, Inc., 1988. pp. 308–9.
Theoharis, op. cit., p. 265.
U.S. General Accounting Office, Computers and Privacy: How the Government Obtains, Verifies, Uses and Protects Personal Data, Washington, DC: General Accounting Office (GAO/IMTEC-90-70-BR), August 1990, p. 12.
Telecommunications Report, September 3, 1990, p. 5.
U.S. General Accounting Office, Report to the U.S. Senate Committee on Government Affairs: Computer Matching Act, Many States did not Comply with 30-Day Notice or Data-Verification Provisions, Washington, DC: U.S. General Accounting Office (GAO/HRD-91-39), February 1991.
Ibid.
Theoharis, op. cit., p. 359.
Vanessa Jo Grimm, ’Behemoth DEA Database Tracks Drug Smugglers,’ Government Computer News, 8 July 1991, p. 85.
Leigh Rivenbark, ’FBI Plans Surveillance R&D Centers,’ Federal Computer Week, April 23, 1990, p. 4.
General Accounting Office, Money Laundering: Treasury’s Financial Crimes Enforcement Network (GAO/GGD-91–53) Washington, DC: General Accounting Office, March 1991. p. 5.
U.S. Office of Technology Assessment, Criminal Justice: New Technologies and the Constitution. Washington: Office of Technology Assessment, May 1988. p. 24.
Patricia A. Parker, ’Crime in National Parks,’ Government Executive, June 1991. pp. 55–6.
OTA, Criminal Justice: New Technologies and the Constitution, op. cit., pp. 45–46.
U.S. Office of Technology Assessment, Electronic Record Systems and Individual Privacy, Washington, DC: U.S. Congress, Office of Technology Assessment, June 1986, pp. 130–3.
’Post Office Prioritizing Seen as Prying,’ The Virginia-Pilot and the Ledger Star, November 18, 1990, p. A6.
Diana Reynolds, ’FEMA and the NSC: The Rise of the National Security State,’ Covert Action Information Bulletin, No. 33, Winter 1990, pp. 54–6.
U.S. General Accounting Office, Computer Systems: Types and Sources of Department of State Lookout Records. Washington, DC: General Accounting Office (GAO/IMTEC-89–71FS), September 1989, pp. 8–9.
Simson L. Garfinkel, ’From Database to Blacklist,’ Christian Science Monitor, 1 August 1990, pp. 12–13.
Report of the Privacy Protection Study Commission, p. 334.
SAT and Achievements Tests Registration Bulletin 1990–91 (Southern Edition), p. 14.
Security Management, May 1989, p. 53.
Security Management, October 1990, pp. 14–15. Security Management is the official journal of the American Society for Industrial Security (ASIS). ASIS members include many members of the private investigations industry and the law enforcement community. This organization serves as a useful conduit for the unofficial sharing of personal information between these two communities. Equifax is not the only company that advertises its ability to gather large amounts of personal information. There appeared in the same issue of Security Management an advertisement for Nationwide Electronic Tracking, Inc. This company also claimed to have the capability of accessing national criminal, driving and credit histories for an inexpensive fee.
Spiros Simitis, ’Data Protection: Transcending the National Approach,’ Transnational Data and Communications Report, November 1989. p. 26.
James Bamford, The Puzzle Palace, New York: Penguin Books, 1983. p. 476.
H.R. 126 was re-introduced by Representative Collins as H.R. 280 in 1991.
Va. Code § 18.2–152–5.
John R. White, ’President’s Letter: Privacy,’ Communications of the ACM, Vol. 34, No. 4, April 1991, p. 11.
Copyright information
© 1992 Palgrave Macmillan, a division of Macmillan Publishers Limited
About this chapter
Cite this chapter
Madsen, W. (1992). The USA: First in Technology and Last in Data Protection. In: Handbook of Personal Data Protection. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-12806-8_5
Download citation
DOI: https://doi.org/10.1007/978-1-349-12806-8_5
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-12808-2
Online ISBN: 978-1-349-12806-8
eBook Packages: Palgrave Social & Cultural Studies CollectionSocial Sciences (R0)