english

There are no short cuts in resolving Mexico’s spiraling violence

A weak rule of law has been one of Mexico’s Achilles heels for a long time now, and the monopoly of violence by the state has been called into question there on several occasions since 2005 when organized crime started challenging the government of Vicente Fox. But at no point had it been put to…

       




english

Mexico is a prop in President Trump’s political narrative

When it comes to his country’s relationship with Mexico, U.S. President Donald Trump has decided to take a position that is at once reckless and suicidal. Reckless, because he is single-handedly scuttling a bilateral relationship with a nation that is vital to the prosperity, security, and well-being of the U.S. Suicidal, because the punitive tariffs…

       




english

Democrats should seize the day with North America trade agreement

The growing unilateralism and weaponization of trade policy by President Trump have turned into the most grievous risk for a rules-based international system that ensures fairness, reciprocity and a level playing field for global trade. If this trend continues, trade policy will end up being decided by interest groups with enough access to influence and…

       




english

We can afford more stimulus

With the economy in decline and the deficit rising sharply due to several major coronavirus-related relief bills, a growing chorus of voices is asking how we will pay for the policies that were enacted and arguing that further actions should be curtailed. But this is not the time to get wobbly.  Additional federal relief would…

       




english

Careful or careless? Perspectives on the CARES Act

The Coronavirus Aid, Relief, and Economic Security (CARES) Act, passed by the Senate on March 25 and expected to be rapidly approved by the House and President, is the largest aid package in history. The bipartisan deal allocates $2 trillion in an effort to mitigate the mounting fallout from the COVID-19 pandemic, including $1.5 trillion…

       




english

What are capital gains taxes and how could they be reformed?

The Vitals Over the past 40 years, the distributions of income and wealth have grown increasingly unequal. In addition, there has been growing understanding that the United States faces a long-term fiscal shortfall that must be addressed, at least in part, by raising revenues. For these and other reasons, proposals to raise taxes on wealthy…

       




english

Trillion dollar deficits as far as the eye can see: Four take-aways from CBO’s new budget outlook

The Congressional Budget Office's new Budget and Economic Outlook provides a useful update on the state of the economy and the budget. While the headline news is the return of trillion-dollar annual deficits, there is much more to consider. Here are four take-aways from the latest projections: 1. Interest rates have fallen and will remain…

       




english

How a VAT could tax the rich and pay for universal basic income

The Congressional Budget Office just projected a series of $1 trillion budget deficits—as far as the eye can see. Narrowing that deficit will require not only spending reductions and economic growth but also new taxes. One solution that I’ve laid out in a new Hamilton Project paper, "Raising Revenue with a Progressive Value-Added Tax,” is…

       




english

Rethinking unemployment insurance taxes and benefits

       




english

Taxing capital income: Mark-to-market and other approaches

Given increased income and wealth inequality, much recent attention has been devoted to proposals to increase taxes on the wealthy (such as imposing a tax on accumulated wealth). Since capital income is highly skewed toward the ultra-wealthy, methods of increasing taxes on capital income provide alternative approaches for addressing inequality through the tax system. Marking…

       




english

Saez and Zucman say that everything you thought you knew about tax policy is wrong

In their new book, The Triumph of Injustice: How the Rich Dodge Taxes and How to Make Them Pay, economists Emmanuel Saez and Gabriel Zucman challenge seemingly every fundamental element of conventional tax policy analysis. Given the attention the book has generated, it is worth stepping back and considering their sweeping critique of conventional wisdom.…

       




english

Revisiting the budget outlook: An update after the Bipartisan Budget Act of 2019

The Congressional Budget Office’s (CBO’s) latest federal budget projections (CBO 2019b), released in August, contain two major changes from their previous projections, which were issued in May (CBO 2019a).  First, the new projections incorporate the effects of the Bipartisan Budget Act of 2019 (BBA19), which substantially raised discretionary spending (as it is defined in CBO’s…

       




english

A fixable mistake: The Tax Cuts and Jobs Act

The Tax Cuts and Jobs Act of 2017 (TCJA, P.L. 115-97) was the largest tax overhaul since 1986. Rushed through Congress without adequate hearings and passed by a near-party-line vote, the law is a major legislative blunder badly in need of correction.  The overall critique is simple: by providing large, regressive, deficit-financed tax cuts to…

       




english

How Fear of Cities Can Blind Us From Solutions to COVID-19

       




english

The economic power of walkability in metro areas

You might be getting whiplash from the latest takes: millennials, a driving force behind the revival of cities, are now fleeing for the suburbs? While the latest census data do show this geographic phenomenon, we should be careful about using an old framing–city versus suburb–to understand a new trend: the growing market for walkable urban…

       




english

Catalytic development: (Re)making walkable urban places

Over the past several decades, demographic shifts and the rise of the knowledge economy have led to increasing demand for more walkable, mixed-use urban places.  Catalytic development is a new model of investment that takes a large scale, long-term approach to recreating such communities. The objectives of this model are exemplified in Amazon’s RFP for…

       




english

Catalytic development: (Re)creating walkable urban places

Since the mid-1990s, demographic and economic shifts have fundamentally changed markets and locations for real estate development. These changes are largely powered by growth of the knowledge economy, which, since the turn of the 21st century, has begun moving out of suburban office parks and into more walkable mixed-use places in an effort to attract…

       




english

Walk this Way:The Economic Promise of Walkable Places in Metropolitan Washington, D.C.

An economic analysis of a sample of neighborhoods in the Washington, D.C. metropolitan area using walkability measures finds that: More walkable places perform better economically. For neighborhoods within metropolitan Washington, as the number of environmental features that facilitate walkability and attract pedestrians increase, so do office, residential, and retail rents, retail revenues, and for-sale…

       




english

The Death of the Fringe Suburb

Drive through any number of outer-ring suburbs in America, and you’ll see boarded-up and vacant strip malls, surrounded by vast seas of empty parking spaces. These forlorn monuments to the real estate crash are not going to come back to life, even when the economy recovers. And that’s because the demand for the housing that…

       




english

Are the Millennials Driving Downtown Corporate Relocations?

In spite of the U.S. Census data for the past decade showing continued job de-centralization, there is now much anecdotal evidence for the just the opposite. The Chicago Crain’s Business Journal reports that companies such as Allstate, Motorola, AT&T, GE Capital, and even Sears are re-considering their fringe suburban locations, generally in stand alone campuses,…

       




english

Walk, Don’t Drive, to the Real Estate Recovery

The front page and lead home page New York Times story this past Saturday had the startling headline: “Bad Times Linger in Homebuilding.” The Times concludes that “A long term shift in behavior seems to be underway. Instead of wanting the biggest and newest, even if it requires a long commute, buyers now demand something…

       




english

Is NYC’s Bold Transportation Commissioner a Victim of Her Own Success?

The New York Times’ profile of celebrated and embattled New York City Transportation Commissioner, Janette Sadik-Khan, shows how getting things done in a democracy can be bad for your political future. Sadik-Khan has increased the amount of bike lanes by over 60 percent, removed cars from congested places like Herald and Times squares enabling them…

       




english

Boosting Jobs with the Right Kind of Housing and Transportation Efforts

Last week, President Obama called for “any idea, any proposal, any way we can get the economy growing faster so that people who need work can find it faster.” There is a tried and true idea that has always been used in past recoveries; activate the building of the built environment … but with a major…

       




english

The Constitution and Technology: How Far is Too Far?


Although we are early in the twenty-first century, breathtaking changes in technology are posing stark challenges to our constitutional values. From free speech to privacy, from liberty and personal autonomy to the right against self-incrimination, basic constitutional principles are under stress from technological advances unimaginable even a few decades ago, let alone during the founding era. In Constitution 3.0, we asked a group of provocative thinkers to imagine the ways in which technological change will challenge our constitutional and legal values in the year 2030.

Will privacy become obsolete, for example, in a world where ubiquitous surveillance is becoming the norm? Imagine that Facebook and Google post live feeds to public and private surveillance cameras, allowing 24/7 tracking of any citizen in the world. How can we protect free speech now that Facebook, Google, and other private intermediaries have more power than any king, president, or Supreme Court justice to decide who can speak and who can be heard? How will advanced brain-scan technology affect the constitutional right against self-incrimination? And on a more elemental level, should people have the right to manipulate their genes and design their own babies? Should we be allowed to patent new forms of life that seem virtually human? And we then asked our contributors to propose ways of translating and preserving constitutional values in the year 2030, in the face of dizzying technological change.

The launch event for the book, held on December 13 at Brookings, provoked a vigorous conversation that mirrored the debates in the book itself. My co-editor Ben Wittes and I invited Tim Wu and Carter Snead to discuss their contributions to Constitution 3.0 and to debate a question the U.S. Supreme Court is now considering: should the police be allowed, without a valid warrant, to secretly put a Global Positioning System device on the bottom of a car of a suspected drug dealer in order to track his movements, 24/7, for a month? The panelists disagreed about the proper outcome: Tim Wu argued that Google and Facebook now have more power over our private data than any police agent or Supreme Court justice, and yet the Constitution, as currently interpreted, restricts private corporations far less rigorously than it constrains the police. Carter Snead insisted that it’s not enough for judges to predict how much privacy people actually expect in the face of new technologies; instead, they need to identify how much privacy we should demand in order to live in a free society rather than a police state. Benjamin Wittes dissented, arguing that Congress, rather than the Courts, should protect the privacy of our geo-locational information, whether collected by GPS devices or stored on cell phones. And I channeled the spirit of the patron saint of Constitution 3.0, Justice Louis Brandeis. Brandeis would have been impatient, I think, with the government’s statements that we have no expectations of privacy in public; instead, Brandeis would have insisted on translating the constitutional Framers’ prohibition on unreasonable searches and seizures into the 21st century. Now that GPS devices and cell phones can reveal far more about our movements, thoughts, and activities outside of the home than old style home break-ins could have revealed in the 18th century, Brandeis might have insisted that long term surveillance is unreasonable without a warrant.

If you watch the webcast, you’ll get a sense of debate among the panelists about who is best equipped to protect constitutional values in the face of new technologies: the Supreme Court, Congress, administrative agencies, private companies like Google and Facebook, political activism groups, or some combination of all of the above. Regardless of where you come out on these issues, I hope you’ll find the project of trying to imagine the constitutional challenges of the next few decades as challenging and rewarding as we did in writing the book.

 

Authors

Image Source: © Dan Anderson / Reuters
      
 
 




english

Constitution 3.0 : Freedom and Technological Change


Brookings Institution Press 2011 271pp.

Technological changes are posing stark challenges to America’s core values. Basic constitutional principles find themselves under stress from stunning advances that were unimaginable even a few decades ago, much less during the Founders’ era. Policymakers and scholars must begin thinking about how constitutional principles are being tested by technological change and how to ensure that those principles can be preserved without hindering technological progress.

Constitution 3.0, a product of the Brookings Institution’s landmark Future of the Constitution program, presents an invaluable roadmap for responding to the challenge of adapting our constitutional values to future technological developments. Renowned legal analysts Jeffrey Rosen and Benjamin Wittes asked a diverse group of leading scholars to imagine plausible technological developments in or near the year 2025 that would stress current constitutional law and to propose possible solutions. Some tackled issues certain to arise in the very near future, while others addressed more speculative or hypothetical questions. Some favor judicial responses to the scenarios they pose; others prefer legislative or regulatory responses.

Here is a sampling of the questions raised and answered in Constitution 3.0:

• How do we ensure our security in the face of the biotechnology revolution and our overwhelming dependence on internationally networked computers?

• How do we protect free speech and privacy in a world in which Google and Facebook have more control than any government or judge?

• How will advances in brain scan technologies affect the constitutional right against self-incrimination?

• Are Fourth Amendment protections against unreasonable search and seizure obsolete in an age of ubiquitous video and unlimited data storage and processing?

• How vigorously should society and the law respect the autonomy of individuals to manipulate their genes and design their own babies?

Individually and collectively, the deeply thoughtful analyses in Constitution 3.0 present an innovative roadmap for adapting our core legal values, in the interest of keeping the Constitution relevant through the 21st century.

Contributors include: Jamie Boyle, Erich Cohen, Robert George, Jack Goldsmith, Orin Kerr, Lawrence Lessig, Stephen Morse, John Robertson, Jeffrey Rosen, Christopher Slobogin, O. Carter Snead, Benjamin Wittes, Tim Wu, and Jonathan Zittrain.

ABOUT THE EDITORS

Jeffrey Rosen
Jeffrey Rosen is a non-resident senior fellow in Governance Studies at the Brookings Institution and a professor of law at the George Washington University in Washington, D.C. He also serves as legal editor for the New Republic and is the author of several books, including The Supreme Court: The Personalities and Rivalries that Defined America (Times Books, 2007) and The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age (Random House, 2005).
Benjamin Wittes
Benjamin Wittes is a senior fellow in Governance Studies at the Brookings Institution and served nine years as an editorial writer with the Washington Post. His previous books include Detention and Denial: The Case for Candor after Guantánamo (Brookings, 2010) and Law and the Long War: The Future of Justice in the Age of Terror (Penguin, 2008), and he is cofounder of the Lawfare blog.

Downloads

Ordering Information:
  • {CD2E3D28-0096-4D03-B2DE-6567EB62AD1E}, 978-0-8157-2212-0, $29.95 Add to Cart
  • {9ABF977A-E4A6-41C8-B030-0FD655E07DBF}, 9780815724506, $22.95 Add to Cart
      
 
 




english

Constitution 3.0: Freedom, Technological Change and the Law


Event Information

December 13, 2011
10:00 AM - 11:30 AM EST

Saul/Zilkha Rooms
The Brookings Institution
1775 Massachusetts Avenue, NW
Washington, DC 20036

Register for the Event

Technology unimaginable at the time of the nation’s founding now poses stark challenges to America’s core constitutional principles. Policymakers and legal scholars are closely examining how constitutional law is tested by technological change and how to preserve constitutional principles without hindering progress. In Constitution 3.0: Freedom and Technological Change (Brookings Institution Press, 2011), Governance Studies Senior Fellow Benjamin Wittes and Nonresident Senior Fellow Jeffrey Rosen asked a diverse group of leading scholars to imagine how technological developments plausible by the year 2025 could stress current constitutional law. The resulting essays explore scenarios involving information technology, genetic engineering, security, privacy and beyond.

On December 13, the Governance Studies program at Brookings hosted a Judicial Issues Forum examining the scenarios posed in Constitution 3.0 and the challenge of adapting our constitutional values to the technology of the near future. Wittes and Rosen offered key highlights and insights from the book and was joined by two key contributors, O. Carter Snead and Timothy Wu, who discussed their essays.

After the program, panelists took audience questions.

Video

Audio

Transcript

Event Materials

      
 
 




english

Interpreting the Constitution in the Digital Era


In an interview on NPR's Fresh Air, Jeffrey Rosen discusses how technological changes are challenging basic Constitutional principles of freedom of speech and our own individual autonomy.

TERRY GROSS, HOST:This is FRESH AIR. I'm Terry Gross. The digital world that we've come to rely on - the Internet, social networks, GPS's, street maps—also creates opportunities to collect information about us, track our movements and invade our privacy. Add to that brain scans that might reveal criminal tendencies and new developments in genetic medicine and biotechnology, and you have a lot of potential challenges to basic Constitutional principles that our founding father couldn't possibly have imagined.

My guest, Jeffrey Rosen has put together a new book that explores those challenges. Along with Benjamin Wittes, he co-edited Constitution 3.0: Freedom and Technological Change. It's a publication of the Brookings Institution's Project on Technology and the Constitution, which Rosen directs. He's also a law professor at George Washington University and legal editor for The New Republic.

His new book is a collection of essays in which a diverse group of legal scholars imagine plausible technological developments in or near the year 2025 that would stress current Constitutional law, and they propose possible solutions.

Jeffrey Rosen, welcome back to FRESH AIR. So what are the particular parts of the Constitution that you think really come into play here with new technologies?

JEFFREY ROSEN: Well, what's so striking is that none of the existing amendments give clear answers to the most basic questions we're having today. So, for example, think about global positioning system technologies, which the Supreme Court is now considering. Can the police, without a warrant, put a secret GPS device on the bottom of someone's car and track him 24/7 for a month?

Well, the relevant constitutional text is the Fourth Amendment which says the right of the people to be secure in their persons, houses, papers and effects against unreasonable searches and seizures, shall not be violated. But that doesn't answer the question: Is it an unreasonable search of our persons or effects to be monitored in public spaces?

Some courts have said no. Several lower court judges and the Obama administration argue that we have no expectation of privacy in public, because it's theoretically possible for our neighbors to put a tail on us or for the police to track us for 100 miles, as the court has said. Therefore, we have to assume the risk that we're being monitored, ubiquitously, 24/7 for a month.

But not everyone agrees. In a visionary opinion, Judge Douglas Ginsburg on the U.S. Court of Appeals for the D.C. Circuit said there's a tremendous difference between short-term and long-term surveillance. We may expect that our neighbors are watching when we walk on the street for a few blocks, but no one in practice expects to be tailed or surveilled for a month.

Ginsburg said we do have an expectation of privacy in the whole of our movements, and therefore when the police are going to engage in long-term surveillance, because they can learn so much more about us, they should have a warrant.

There was a remarkable moment in the oral argument for the global positioning system case. Chief Justice John Roberts, who asked the first question, he said: Isn't there a difference between 100-mile search of the kind we've approved in the past and watching someone for a month?

The government's lawyer resisted, and Roberts said: Is it the U.S. government's position that the police could put GPS devices inside the clothes of the members of this court, of these justices, or under our cars and track us for a month? And when the government's lawyer said yes, I think he may have lost the case.

 

Click here to read the full transcript »

Click here to download the full interview »

Authors

Publication: NPR
Image Source: Tom Grill
      
 
 




english

The Future of Spectrum


Executive Summary

In recent years, growth in demand for wireless services has sparked a boom in the mobile phone and wireless data sector.[i] During the past four years, the number of mobile phone subscribers tripled,[ii] and the number of jobs in the telecommunications field has nearly quintupled.[iii] New, better, and faster mobile devices, such as tablets and smartphones, have created multi-billion dollar industries of their own, such as Google Android and the Apple iOS “app stores.”[iv] And those technologies have contributed to the dawning of an always-on, always-connected culture.

But this growing demand for mobile Internet access requires a growing amount of wireless radio spectrum, portending serious problems for the future. At the moment, the United States has designated 547 MHz of spectrum to wireless broadband services, but the Federal Communications Commission (FCC) predicts a need for 637 MHz of spectrum by 2013, and 822 MHz of spectrum by 2014.[v] Without more spectrum allocated to wireless Internet connectivity, America risks short-circuiting the mobile broadband revolution.

The National Broadband Plan proposes a solution. It sets forth a detailed plan to make 300 MHz of spectrum available for wireless broadband use within the next five years, and another 200 MHz in the five years after that.[vi] It seeks to achieve this freeing of spectrum by auctioning unused spectrum, lifting burdensome regulations to enable wireless broadband service in certain spectrum ranges, and reallocating spectrum from other services – notably broadcast television – to enable such spectrum to be used for wireless broadband.[vii] Though many of these provisions are controversial, the FCC has already done serious work to achieve these goals. If the FCC can achieve its goals to enable the growth of wireless broadband, America will be able to unlock the full potential of the wireless broadband revolution and realize the potential of a new wave of American innovation.



[i] Federal Communications Commission, Connecting America: The National Broadband Plan 78 (2010) [hereinafter National Broadband Plan].

[ii] Id.

[iii] Lawrence H. Summers, Remarks on the President's Spectrum Initiative As Prepared for Delivery (2010 June 28).

[iv] Robin Wauters, Report: Mobile App Market Will Be Worth $25 Billion By 2015 – Apple’s Share: 20 percent, TechCrunch.com, 2011 January 18, http://techcrunch.com/2011/01/18/report-mobile-app-market-will-be-worth-25-billion-by-2015-apples-share-20/

[v] Federal Communications Commission, Mobile Broadband: The Benefits of Additional Spectrum 18 (2011) , available at http://download.broadband.gov/plan/fcc-staff-technical-paper-mobile-broadband-benefits-of-additional-spectrum.pdf (hereinafter Benefits of Additional Spectrum). [hereinafter Benefits of Additional Spectrum].

[vi] See National Broadband Plan, supra note 1, at 84.

[vii] Id.

Downloads

Authors

Image Source: © Luke MacGregor / Reuters
      
 
 




english

Facebook, Google, and the Future of Privacy and Free Speech


Introduction

It was 2025 when Facebook decided to post live feeds from public and private surveillance cameras, so they could be searched online. The decision hardly came as a surprise. Ever since Facebook passed the 500 million-member mark in 2010, it found increasing consumer demand for applications that allowed users to access surveillance cameras with publicly accessible IP addresses. (Initially, live feeds to cameras on Mexican beaches were especially popular.) But in the mid-2020s, popular demand for live surveillance camera feeds were joined by demands from the U.S. government that an open circuit television network would be invaluable in tracking potential terrorists. As a result, Facebook decided to link the public and private camera networks, post them live online, and store the video feeds without restrictions on distributed servers in the digital cloud.

Once the new open circuit system went live, anyone in the world could log onto the Internet, select a particular street view on Facebook maps and zoom in on a particular individual. Anyone could then back click on that individual to retrace her steps since she left the house in the morning or forward click on her to see where she was headed in the future. Using Facebook’s integrated face recognition app, users could click on a stranger walking down any street in the world, plug her image into the Facebook database to identify her by name, and then follow her movements from door-to-door. Since cameras were virtually ubiquitous in public and commercial spaces, the result was the possibility of ubiquitous identification and surveillance of all citizens virtually anywhere in the world—and by anyone. In an enthusiastic launch, Mark Zuckerberg dubbed the new 24/7 ubiquitous surveillance system “Open Planet.”

Open Planet is not a technological fantasy. Most of the architecture for implementing it already exists, and it would be a simple enough task for Facebook or Google, if the companies chose, to get the system up and running: face recognition is already plausible, storage is increasing exponentially; and the only limitation is the coverage and scope of the existing cameras, which are growing by the day. Indeed, at a legal Futures Conference at Stanford in 2007, Andrew McLaughlin, then the head of public policy at Google, said he expected Google to get requests to put linked surveillance networks live and online within the decade. How, he, asked the audience of scholars and technologists, should Google respond?

If “Open Planet” went live, would it violate the Constitution? The answer is that it might not under Supreme Court doctrine as it now exists—at least not if it were a purely-private affair, run by private companies alone and without government involvement. Both the First Amendment, which protects free speech, and the Fourth Amendment, which prohibits unreasonable searches and seizures, only restrict actions by the government. On the other hand, if the government directed Open Planet’s creation or used it to track citizens on government-owned, as well as private-sector, cameras, perhaps Facebook might be viewed as the equivalent of a state actor, and therefore restricted by the Constitution.

At the time of the framing of the Constitution, a far less intrusive invasion of privacy – namely, the warrantless search of private homes and desk drawers for seditious papers – was considered the paradigmatic case of an unreasonable and unconstitutional invasion of privacy. The fact that 24/7 ubiquitous surveillance may not violate the Constitution today suggests the challenge of translating the framers’ values into a world in which Google and Facebook now have far more power over the privacy and free speech of most citizens than any King, president, or Supreme Court justice. In this essay, I will examine four different areas where the era of Facebook and Google will challenge our existing ideas about constitutional protections for free speech and privacy: ubiquitous surveillance with GPS devices and online surveillance cameras; airport body scanners; embarrassing Facebook photos and the problem of digital forgetting; and controversial YouTube videos. In each area, I will suggest, preserving constitutional values requires a different balance of legal and technological solutions, combined with political mobilization that leads to changes in social norms.

Let’s start with Open Planet, and imagine sufficient government involvement to make the courts plausibly consider Facebook’s program the equivalent of state action. Imagine also that the Supreme Court in 2025 were unsettled by Open Planet and inclined to strike it down. A series of other doctrines might bar judicial intervention. The Court has come close to saying that we have no legitimate expectations of privacy in public places, at least when the surveillance technologies in question are in general public use by ordinary members of the public.[1]  As mobile camera technology becomes ubiquitous, the Court might hold that the government is entitled to have access to the same linked camera system that ordinary members of the public have become accustomed to browsing. Moreover, the Court has said that we have no expectation of privacy in data that we voluntarily surrender to third parties.[2] In cases where digital images are captured on cameras owned by third parties and stored in the digital cloud—that is, on distributed third party servers--we have less privacy than citizens took for granted at the time of the American founding. And although the founders expected a degree of anonymity in public, that expectation would be defeated by the possibility of 24/7 surveillance on Facebook.

The doctrinal seeds of a judicial response to Open Planet, however, do exist. A Supreme Court inclined to strike down ubiquitous surveillance might draw on recent cases involving decisions by the police to place a GPS tracking device on the car of a suspect without a warrant, tracking his movements 24/7. The Supreme Court has not yet decided whether prolonged surveillance, in the form of “dragnet-type law enforcement practices” violates the Constitution.[3] Three federal circuits have held that the use of a GPS tracking device to monitor someone’s movements in a car over a prolonged period is not a search because we have no expectations of privacy in our public movements.[4] But in a visionary opinion in 2010, Judge Douglas Ginsburg of the U.S. Court of Appeals disagreed. Prolonged surveillance is a search, he recognized, because no reasonable person expects that his movements will be continuously monitored from door to door; all of us have a reasonable expectation of privacy in the “whole” of our movements in public. [5] Ginsburg and his colleagues struck down the warrantless GPS surveillance of a suspect that lasted 24 hours a day for nearly a month on the grounds that prolonged, ubiquitous tracking of citizen’s movements in public is constitutionally unreasonable. “Unlike one’s movements during a single journey, the whole of one’s movements over the course of a month is not actually exposed to the public because the likelihood anyone will observe all those movements is effectively nil,” Ginsburg wrote. Moreover, “That whole reveals more – sometimes a great deal more – than does the sum of its parts.”[6] Like the “mosaic theory” invoked by the government in national security cases, Ginsburg concluded that “Prolonged surveillance reveals types of information not revealed by short-term surveillance, such as what a person does repeatedly, what he does not do, and what he does ensemble.  These types of information can each reveal more about a person than does any individual trip viewed in isolation.”[7] Ginsburg understood that 24/7 ubiquitous surveillance differs from more limited tracking not just in degree but in kind – it looks more like virtual stalking than a legitimate investigation – and therefore is an unreasonable search of the person.

Because prolonged surveillance on “Open Planet” potentially reveals far more about each of us than 24/7 GPS tracking does, providing real time images of all our actions, rather than simply tracking the movements of our cars, it could also be struck down as an unreasonable search of our persons. And if the Supreme Court struck down Open Planet on Fourth Amendment grounds, it might be influenced by the state regulations of GPS surveillance that Ginsburg found persuasive, or by Congressional attempts to regulate Facebook or other forms of 24/7 surveillance, such as the Geolocational Privacy and Surveillance Act proposed by Sen. Ron Wyden (D-OR) that would require officers to get a warrant before electronically tracking cell phones or cars.[8]

The Supreme Court in 2025 might also conceivably choose to strike down Open Planet on more expansive grounds, relying not just on the Fourth Amendment, but on the right to autonomy recognized in cases like Casey v. Planned Parenthood and Lawrence v. Texas. The right to privacy cases, beginning with Griswold v. Connecticut and culminating in Roe v. Wade and Lawrence, are often viewed as cases about sexual autonomy, but in Casey and Lawrence, Justice Anthony Kennedy recognized a far more sweeping principle of personal autonomy that might well protect individuals from totalizing forms of ubiquitous surveillance. Imagine an opinion written in 2025 by Justice Kennedy, still ruling the Court and the country at the age of 89. “In our tradition the State is not omnipresent in the home. And there are other spheres of our lives and existence, outside the home, where the State should not be a dominant presence,” Kennedy wrote in Lawrence. “Freedom extends beyond spatial bounds. Liberty presumes an autonomy of self that includes freedom of thought, belief, expression, and certain intimate conduct.”[9] Kennedy’s vision of an “autonomy of self” that depends on preventing the state from becoming a “dominant presence” in public as well as private places might well be invoked to prevent the state from participating in a ubiquitous surveillance system that prevents citizens from defining themselves and expressing their individual identities. Just as citizens in the Soviet Union were inhibited from expressing and defining themselves by ubiquitous KGB surveillance, Kennedy might hold, the possibility of ubiquitous surveillance on “Open Planet” also violates the right to autonomy, even if the cameras in question are owned by the private sector, as well as the state, and a private corporation provides the platform for their monitoring.  Nevertheless, the fact that the system is administered by Facebook, rather than the Government, might be an obstacle to a constitutional ruling along these lines. And if Kennedy (or his successor) struck down “Open Planet” with a sweeping vision of personal autonomy that didn’t coincide with the actual values of a majority of citizens in 2025, the decision could be the Roe of virtual surveillance, provoking backlashes from those who don’t want the Supreme Court imposing its values on a divided nation.

Would the Supreme Court, in fact, strike down “Open Planet” in 2025? If the past is any guide, the answer may depend on whether the public, in 2025, views 24/7 ubiquitous surveillance as invasive and unreasonable, or whether citizens have become so used to ubiquitous surveillance on and off the web, in virtual space and real space, that the public demands “Open Planet” rather than protesting against it. I don’t mean to suggest that the Court actually reads the polls. But in the age of Google and Facebook, technologies that thoughtfully balance privacy with free expression and other values have tended to be adopted only when companies see their markets as demanding some kind of privacy protection, or when engaged constituencies have mobilized in protest against poorly designed architectures and demanded better ones, helping to create a social consensus that the invasive designs are unreasonable.

The paradigmatic case of the kind of political mobilization on behalf of constitutional values that I have in mind is presented by my second case: the choice between the naked machine and the blob machine in airport security screening. In 2002, officials at Orlando International airport first began testing the millimeter wave body scanners that are currently at the center of a national uproar. The designers of the scanners at Pacific Northwest Laboratories offered U.S. officials a choice: naked machines or blob machines? The same researchers had developed both technologies, and both were equally effective at identifying contraband. But, as their nicknames suggest, the former displays graphic images of the human body, while the latter scrambles the images into a non-humiliating blob.[10]

Since both versions of the scanners promise the same degree of security, any sane attempt to balance privacy and safety would seem to favor the blob machines over the naked machines. And that’s what European governments chose. Most European airport authorities have declined to adopt body scanners at all, because of persuasive evidence that they’re not effective at detecting low-density contraband such as the chemical powder PETN that the trouser bomber concealed in his underwear on Christmas day, 2009. But the handful of European airports that have adopted body scanners, such as Schiphol airport in Amsterdam, have opted for a version of the blob machine. This is in part due to the efforts of European privacy commissioners, such as Germany’s Peter Schaar, who have emphasized the importance of designing body scanners in ways that protect privacy.

The U.S. Department of Homeland Security made a very different choice. It deployed the naked body scanners without any opportunity for public comment—then appeared surprised by the backlash. Remarkably, however, the backlash was effective. After a nationwide protest inspired by the Patrick Henry of the anti-Naked Machines movement, a traveler who memorably exclaimed “Don’t Touch my Junk,” President Obama called on the TSA to go back to the drawing board. And a few months after authorizing the intrusive pat downs, in February 2011, the TSA announced that it would begin testing, on a pilot basis, versions of the very same blob machines that the agency had rejected nearly a decade earlier. According to the latest version, to be tested in Las Vegas and Washington, D.C, the TSA will install software filters on its body scanner machines that detects potential threat items and indicates their location on a generic, blob like outline of each passenger that will appear on a monitor attached to the machine. Passengers without suspicious items will be cleared as “OK,” those with suspicious items will be taken aside for additional screening. The remote rooms in which TSA agents view images of the naked body will be eliminated. According to news reports, TSA began testing the filtering software in the fall of 2010 – precisely when the protests against the naked machines went viral. If the filtering software is implemented across the country, converting naked machines into blob machines, the political victory for privacy will be striking.

Of course, it’s possible that courts might strike down the naked machines as unreasonable and unconstitutional, even without the political protests. In a 1983 opinion upholding searches by drug-sniffing dogs, Justice Sandra Day O’Connor recognized that a search is most likely to be considered constitutionally reasonable if it is very effective at discovering contraband without revealing innocent but embarrassing information.[11] The backscatter machines seem, under O'Connor's view, to be the antithesis of a reasonable search: They reveal a great deal of innocent but embarrassing information and are remarkably ineffective at revealing low-density contraband.

It’s true that the government gets great deference in airports and at the borders, where routine border searches don’t require heightened suspicion. But the Court has held that non-routine border searches, such as body cavity or strip searches, do require a degree of individual suspicion.  And although the Supreme Court hasn't evaluated airport screening technology, lower courts have emphasized, as the U.S. Court of Appeals for the 9th Circuit ruled in 2007, that "a particular airport security screening search is constitutionally reasonable provided that it 'is no more extensive nor intensive than necessary, in the light of current technology, to detect the presence of weapons or explosives.'"[12]

It’s arguable that since the naked machines are neither effective nor minimally intrusive – that is, because they might be designed with blob machine like filters that promise just as much security while also protecting privacy – that courts might strike them down. As a practical matter, however, both lower courts and the Supreme Court seem far more likely to strike down strip searches that have inspired widespread public opposition – such as the strip search of a high school girl wrongly accused of carrying drugs, which the Supreme Court invalidated by a vote of 8-1,[13] then they are of searches that, despite the protests of a mobilized minority, the majority of the public appears to accept.

The tentative victory of the blob machines over the naked machines, if it materializes, provides a model for successful attempts to balance privacy and security: government can be pressured into striking a reasonable balance between privacy and security by a mobilized minority of the public when the privacy costs of a particular technology are dramatic, visible, widely distributed, and people experience the invasions personally as a kind of loss of control over the conditions of their own exposure.

But can we be mobilized to demand a similarly reasonable balance when the threats to privacy come not from the government but from private corporations and when those responsible for exposing too much personal information about us are none other than ourselves? When it comes to invasions of privacy by fellow citizens, rather than by the government, we are in the realm not of autonomy but of dignity and decency. (Autonomy preserves a sphere of immunity from government intrusion in our lives; dignity protects the norms of social respect that we accord to each other.) And since dignity is a socially constructed value, it’s unlikely to be preserved by judges--or by private corporations--in the face of the expressed preferences of citizens who are less concerned about dignity than exposure.

This is the subject of our third case, which involves a challenge that, in big and small ways, is confronting millions of people around the globe: how best to live our lives in a world where the Internet records everything and forgets nothing—where every online photo, status update, Twitter post and blog entry by and about us can be stored forever.[14] Consider the case of Stacy Snyder. Four years ago, Snyder, then a 25-year-old teacher in training at Conestoga Valley High School in Lancaster, Pa., posted a photo on her MySpace page that showed her at a party wearing a pirate hat and drinking from a plastic cup, with the caption “Drunken Pirate.” After discovering the page, her supervisor at the high school told her the photo was “unprofessional,” and the dean of Millersville University School of Education, where Snyder was enrolled, said she was promoting drinking in virtual view of her under-age students. As a result, days before Snyder’s scheduled graduation, the university denied her a teaching degree. Snyder sued, arguing that the university had violated her First Amendment rights by penalizing her for her (perfectly legal) after-hours behavior. But in 2008, a federal district judge rejected the claim, saying that because Snyder was a public employee whose photo didn’t relate to matters of public concern, her “Drunken Pirate” post was not protected speech.[15]

When historians of the future look back on the perils of the early digital age, Stacy Snyder may well be an icon. With Web sites like LOL Facebook Moments, which collects and shares embarrassing personal revelations from Facebook users, ill-advised photos and online chatter are coming back to haunt people months or years after the fact.

Technological advances, of course, have often presented new threats to privacy. In 1890, in perhaps the most famous article on privacy ever written, Samuel Warren and Louis Brandeis complained that because of new technology — like the Kodak camera and the tabloid press — “gossip is no longer the resource of the idle and of the vicious but has become a trade.”[16] But the mild society gossip of the Gilded Age pales before the volume of revelations contained in the photos, video and chatter on social-media sites and elsewhere across the Internet. Facebook, which surpassed MySpace in 2008 as the largest social-networking site, now has more than 500 million members, or 22 percent of all Internet users, who spend more than 500 billion minutes a month on the site. Facebook users share more than 25 billion pieces of content each month (including news stories, blog posts and photos), and the average user creates 70 pieces of content a month.

Today, as in Brandeis’s day, the value threatened by gossip on the Internet – whether posted by us our by others – is dignity. (Brandeis called it an offense against honor.) But American law has never been good at regulating offenses against dignity – especially when regulations would clash with other values, such as protections for free speech. And indeed, the most ambitious proposals in Europe to create new legal rights to escape your past on the Internet are very hard to reconcile with the American free speech tradition.

The cautionary tale here is Argentina, which has dramatically expanded the liability of search engines like Google and Yahoo for offensive photographs that harm someone’s reputation. Recently, an Argentinean judge held Google and Yahoo liable for causing “moral harm” and violating the privacy of Virginia Da Cunha, a pop star, by indexing pictures of her that were linked to erotic content. The ruling against Google and Yahoo was overturned on appeal in August, but there are at least 130 similar cases pending in Argentina to force search engines to remove or block offensive content. In the U.S., search engines are protected by the Communications Decency Act, which immunizes Internet service providers from hosting content posted by third parties. But as liability against search engines expands abroad, it will seriously curtain free speech:  Yahoo says that the only way to comply with injunctions about is to block all sites that refer to a particular plaintiff.[17]

In Europe, recent proposals to create a legally enforceable right to escape your past have come from the French. The French data commissioner, Alex Turc, who has proposed a right to oblivion – namely a right to escape your past on the Internet. The details are fuzzy, but it appears that the proposal would rely on an international body – say a commission of forgetfulness – to evaluate particular take down requests and order Google and Facebook to remove content that, in the view of commissioners, violated an individuals’ dignitary rights.

From an American perspective, the very intrusiveness of this proposal is enough to make it implausible: how could we rely on bureaucrats to protect our dignity in cases where we have failed to protect it on our own? Europeans, who have less of a free speech tradition and far more of a tradition of allowing people to remove photographs taken and posted against their will, will be more sympathetic to the proposal. But from the perspective of most American courts and companies, giving people the right selectively to delete their pasts from public discourse would pose unacceptably great threats to free speech.

A far more promising solution to the problem of forgetting on the Internet is technological. And there are already small-scale privacy apps that offer disappearing data. An app called TigerText allows text-message senders to set a time limit from one minute to 30 days, after which the text disappears from the company’s servers, on which it is stored, and therefore, from the senders’ and recipients’ phones. (The founder of TigerText, Jeffrey Evans, has said he chose the name before the scandal involving Tiger Woods’s supposed texts to a mistress.)[18]

Expiration dates could be implemented more broadly in various ways. Researchers at the University of Washington, for example, are developing a technology called Vanish that makes electronic data “self-destruct” after a specified period of time. Instead of relying on Google, Facebook or Hotmail to delete the data that is stored “in the cloud” — in other words, on their distributed servers — Vanish encrypts the data and then “shatters” the encryption key. To read the data, your computer has to put the pieces of the key back together, but they “erode” or “rust” as time passes, and after a certain point the document can no longer be read. The technology doesn’t promise perfect control — you can’t stop someone from copying your photos or Facebook chats during the period in which they are not encrypted. But as Vanish improves, it could bring us much closer to a world where our data don’t linger forever.

Facebook, if it wanted to, could implement expiration dates on its own platform, making our data disappear after, say, three days or three months unless a user specified that he wanted it to linger forever. It might be a more welcome option for Facebook to encourage the development of Vanish-style apps that would allow individual users who are concerned about privacy to make their own data disappear without imposing the default on all Facebook users.

So far, however, Zuckerberg, Facebook’s C.E.O., has been moving in the opposite direction — toward transparency, rather than privacy. In defending Facebook’s recent decision to make the default for profile information about friends and relationship status public, Zuckerberg told the founder of the publication TechCrunch that Facebook had an obligation to reflect “current social norms” that favored exposure over privacy. “People have really gotten comfortable not only sharing more information and different kinds but more openly and with more people, and that social norm is just something that has evolved over time,” [19] he said.

It’s true that a German company, X-Pire, recently announced the launch of a Facebook app that will allow users automatically to erase designated photos. Using electronic keys that expire after short periods of time, and obtained by solving a Captcha, or graphic that requires users to type in a fixed number combinations, the application ensures that once the time stamp on the photo has expired, the key disappears.[20] X-Pire is a model for a sensible, blob-machine-like solution to the problem of digital forgetting. But unless Facebook builds X-Pire-like apps into its platform – an unlikely outcome given its commercial interests – a majority of Facebook users are unlikely to seek out disappearing data options until it’s too late. X-Pire, therefore, may remain for the foreseeable future a technological solution to a grave privacy problem—but a solution that doesn’t have an obvious market.

The courts, in my view, are better equipped to regulate offenses against autonomy, such as 24/7 surveillance on Facebook, than offenses against dignity, such as drunken Facebook pictures that never go away. But that regulation in both cases will likely turn on evolving social norms whose contours in twenty years are hard to predict.

Finally, let’s consider one last example of the challenge of preserving constitutional values in the age of Facebook and Google, an example that concerns not privacy but free speech.[21]

At the moment, the person who arguably has more power than any other to determine who may speak and who may be heard around the globe isn’t a king, president or Supreme Court justice. She is Nicole Wong, the deputy general counsel of Google, and her colleagues call her “The Decider.” It is Wong who decides what controversial user-generated content goes down or stays up on YouTube and other applications owned by Google, including Blogger, the blog site; Picasa, the photo-sharing site; and Orkut, the social networking site. Wong and her colleagues also oversee Google’s search engine: they decide what controversial material does and doesn’t appear on the local search engines that Google maintains in many countries in the world, as well as on Google.com. As a result, Wong and her colleagues arguably have more influence over the contours of online expression than anyone else on the planet.

At the moment, Wong seems to be exercising that responsibility with sensitivity to the values of free speech. Google and Yahoo can be held liable outside the United States for indexing or directing users to content after having been notified that it was illegal in a foreign country. In the United States, by contrast, Internet service providers are protected from most lawsuits involving having hosted or linked to illegal user-generated content. As a consequence of these differing standards, Google has considerably less flexibility overseas than it does in the United States about content on its sites, and its “information must be free” ethos is being tested abroad.

For example, on the German and French default Google search engines, Google.de and Google.fr, you can’t find Holocaust-denial sites that can be found on Google.com, because Holocaust denial is illegal in Germany and France. Broadly, Google has decided to comply with governmental requests to take down links on its national search engines to material that clearly violates national laws. But not every overseas case presents a clear violation of national law. In 2006, for example, protesters at a Google office in India demanded the removal of content on Orkut, the social networking site, that criticized Shiv Sena, a hard-line Hindu political party popular in Mumbai. Wong eventually decided to take down an Orkut group dedicated to attacking Shivaji, revered as a deity by the Shiv Sena Party, because it violated Orkut terms of service by criticizing a religion, but she decided not to take down another group because it merely criticized a political party. “If stuff is clearly illegal, we take that down, but if it’s on the edge, you might push a country a little bit,” Wong told me. “Free-speech law is always built on the edge, and in each country, the question is: Can you define what the edge is?”

Over the past couple of years, Google and its various applications have been blocked, to different degrees, by 24 countries. Blogger is blocked in Pakistan, for example, and Orkut in Saudi Arabia. Meanwhile, governments are increasingly pressuring telecom companies like Comcast and Verizon to block controversial speech at the network level. Europe and the U.S. recently agreed to require Internet service providers to identify and block child pornography, and in Europe there are growing demands for network-wide blocking of terrorist-incitement videos. As a result, Wong and her colleagues worry that Google’s ability to make case-by-case decisions about what links and videos are accessible through Google’s sites may be slowly circumvented, as countries are requiring the companies that give us access to the Internet to build top-down censorship into the network pipes.

It is not only foreign countries that are eager to restrict speech on Google and YouTube. In May, 2006, Joseph Lieberman who has become the A. Mitchell Palmer of the digital age, had his staff contacted Google and demanded that the company remove from YouTube dozens of what he described as jihadist videos. After viewing the videos one by one, Wong and her colleagues removed some of the videos but refused to remove those that they decided didn’t violate YouTube guidelines. Lieberman wasn’t satisfied. In an angry follow-up letter to Eric Schmidt, the C.E.O. of Google, Lieberman demanded that all content he characterized as being “produced by Islamist terrorist organizations” be immediately removed from YouTube as a matter of corporate judgment — even videos that didn’t feature hate speech or violent content or violate U.S. law. Wong and her colleagues responded by saying, “YouTube encourages free speech and defends everyone’s right to express unpopular points of view.” Recently, Google and YouTube announced new guidelines prohibiting videos “intended to incite violence.”

That category scrupulously tracks the Supreme Court’s rigorous First Amendment doctrine, which says that speech can be banned only when it poses an imminent threat of producing serious lawless action. Unfortunately, Wong and her colleagues recently retreated from that bright line under further pressure from Lieberman. In November, 2010, YouTube added a new category that viewers can click to flag videos for removal: “promotes terrorism.” There are 24 hours of video uploaded on YouTube every minute, and a series of categories viewers can use to request removal, including “violent or repulsive content” or inappropriate sexual content. Although hailed by Senator Lieberman, the new “promotes terrorism category” is potentially troubling because it goes beyond the narrow test of incitement to violence that YouTube had previously used to flag terrorism related videos for removal. YouTube’s capitulation to Lieberman shows that a user generated system for enforcing community standards will never protect speech as scrupulously as unelected judges enforcing strict rules about when speech can be viewed as a form of dangerous conduct.

Google remains a better guardian for free speech than internet companies like Facebook and Twitter, which have refused to join the Global Network Initiative, an industry-wide coalition committed to upholding free speech and privacy. But the recent capitulation of YouTube shows that Google’s “trust us” model may not be a stable way of protecting free speech in the twenty-first century, even though the alternatives to trusting Google – such as authorizing national regulatory bodies around the globe to request the removal of controversial videos – might protect less speech than Google’s “Decider” model currently does.

I’d like to conclude by stressing the complexity of protecting constitutional values like privacy and free speech in the age of Google and Facebook, which are not formally constrained by the Constitution. In each of my examples – 24/7 Facebook surveillance, blob machines, escaping your Facebook past, and promoting free speech on YouTube and Google -- it’s possible to imagine a rule or technology that would protect free speech and privacy, while also preserving security—a blob-machine like solution. But in some areas, those blob-machine-like solutions are more likely, in practice, to be adopted then others. Engaged minorities may demand blob machines when they personally experience their own privacy being violated; but they may be less likely to rise up against the slow expansion of surveillance cameras, which transform expectations of privacy in public. Judges in the American system may be more likely to resist ubiquitous surveillance in the name of Roe v. Wade-style autonomy than they are to create a legal right to allow people to edit their Internet pasts, which relies on ideas of dignity that in turn require a social consensus that in America, at least, does not exist. As for free speech, it is being anxiously guarded for the moment by Google, but the tremendous pressures, from consumers and government are already making it hard to hold the line at removing only speech that threatens imminent lawless action.

In translating constitutional values in light of new technologies, it’s always useful to ask: What would Brandeis do? Brandeis would never have tolerated unpragmatic abstractions, which have the effect of giving citizens less privacy in the age of cloud computing than they had during the founding era. In translating the Constitution into the challenges of our time, Brandeis would have considered it a duty actively to engage in the project of constitutional translation in order to preserve the Framers’ values in a startlingly different technological world. But the task of translating constitutional values can’t be left to judges alone: it also falls to regulators, legislators, technologists, and, ultimately, to politically engaged citizens. As Brandeis put it, “If we would guide by the light of reason, we must let our minds be bold.”


[1] See Florida v. Riley, 488 U.S. 445 (1989) (O’Connor, J., concurring).
[2] See United States v. Miller, 425 U.S. 435 (1976).
[3] See United States v. Knotts, 460 U.S. 276, 283-4 (1983).
[4] See United States v. Pineda-Morena, 591 F.3d 1212 (9th Cir. 2010); United States v. Garcia, 474 F.3d 994 (7th Cir. 2007); United States v. Marquez, 605 F.3d 604 (8th Cir. 2010).
[5] See United States v. Maynard, 615 F.3d 544 (D.C. Cir 2010).
[6] 615 F.3d at 558.  
[7] Id. at 562.
[8] See Declan McCullagh, “Senator Pushes for Mobile Privacy Reform,” CNet News, March 22, 2011, available at http://m.news.com/2166-12_3-20045723-281.html
[9] Lawrence v. Texas, 539 U.S. 558, 562 (2003).
[10] The discussion of the blob machines is adapted from “Nude Breach,” New Republic, December 13, 2010.
[11] United States v. Place, 462 U.S. 696 (1983).
[12] U.S. v. Davis, 482 F.2d 893, 913 (9th Cir. 1973).
[13] Safford Unified School District v. Redding, 557 U.S. ___ (2009).
[14] The discussion of digital forgetting is adapted from “The End of Forgetting,” New York Times Magazine, July 25, 2010.
[15]Snyder v. Millersville University, No. 07-1660 (E.D. Pa. Dec. 3, 2008).
[16] Brandeis and Warren, “The Right to Privacy,” 4 Harv. L. Rev. 193 (1890).
[17] Vinod Sreeharsha, Google and Yahoo Win Appeal in Argentine Case, N.Y.  Times, August 20, 2010, B4.
[18] See Belinda Luscombe, “Tiger Text: An iPhone App for Cheating Spouses?”, Time.com, Feb. 26, 2010, available at http://www.time.com/time/business/article/0,8599,1968233,00.html
[19]Marshall Kirkpatrick, “Facebook’s Zuckerbeg Says the Age of Privacy Is Over,” ReadWriteWeb.com, January 9, 2010, available at http://www.readwriteweb.com/archives/facebooks_zuckerberg_says_the_age_of_privacy_is_ov.php
[20] Aemon Malone, “X-Pire Aims to Cut down on Photo D-Tagging on Facebook,” Digital Trends.com, January 17, 2011, available at http://www.digitaltrends.com/social-media/x-pire-adds-expiration-date-to-digital-photos/
[21] The discussion of free speech that follows is adapted from “Google’s Gatekeepers,” New York Times Magazine, November 30, 2008.

Downloads

Authors

Image Source: David Malan
      
 
 




english

Universal Service Fund Reform: Expanding Broadband Internet Access in the United States


Executive Summary

Two-thirds of Americans have broadband Internet access in their homes.[1] But because of poor infrastructure or high prices, the remaining third of Americans do not. In some areas, broadband Internet is plainly unavailable because of inadequate infrastructure: More than 14 million Americans – approximately 5 percent of the total population – live in areas where terrestrial (as opposed to mobile) fixed broadband connectivity is unavailable.[2] The effects of insufficient infrastructure development have contributed to racial and cultural disparities in broadband access; for example, terrestrial broadband is available to only 10 percent of residents on tribal lands.[3]

Even where terrestrial broadband connectivity is available, however, the high price of broadband service can be prohibitive, especially to lower income Americans. While 93 percent of adults earning more than $75,000 per year are wired for broadband at home, the terrestrial broadband adoption rate is only 40 percent among adults earning less than $20,000 annually.[4] These costs also contribute to racial disparities; almost 70 percent of whites have adopted terrestrial broadband at home,   but only 59 percent of blacks and 49 percent of Hispanics have done the same.[5]

America's wireless infrastructure is better developed, but many Americans still lack wireless broadband coverage. According to a recent study, 3G wireless networks cover a good portion of the country, including 98 percent of the United States population,[6] but certain states have dramatically lower coverage rates than others. For example, only 71 percent of West Virginia's population is covered by a 3G network.[7] Wireless providers will likely use existing 3G infrastructure to enable the impending transition to 4G networks.[8] Unless wireless infrastructure expands quickly, those Americans that remain unconnected may be left behind.

Though America is responsible for the invention and development of Internet technology, the United States has fallen behind competing nations on a variety of important indicators, including broadband adoption rate and price. According to the Organization for Economic Cooperation and Development's survey of 31 developed nations, the United States is ranked fourteenth in broadband penetration rate (i.e. the number of subscribers per 100 inhabitants); only 27.1 percent of Americans have adopted wired broadband subscriptions, compared to 37.8 percent of residents of the Netherlands.[9]

America also trails in ensuring the affordability of broadband service. The average price for a medium-speed (2.5Mbps-10Mbps) Internet plan in America is the seventeenth lowest among its competitor nations. For a medium-speed plan, the average American must pay $38 per month, while an average subscriber in Japan (ranked first) pays only $22 for a connection of the same quality.[10]

The National Broadband Plan (NBP), drafted by the Federal Communication Commission and released in 2010, seeks to provide all Americans with affordable broadband Internet access.[11] Doing so will not be cheap; analysts project that developing the infrastructure necessary for full broadband penetration will require $24 billion in subsidies and spending.[12] President Obama’s stimulus package has already set aside $4.9 billion to develop broadband infrastructure,[13] and some small ongoing federal programs receive an annual appropriation to promote broadband penetration.[14] However, these funding streams will only account for one-third of the $24 billion necessary to achieve the FCC's goal of full broadband penetration.[15] Moreover, developing infrastructure alone is not enough; many low-income Americans are unable to afford Internet access, even if it is offered in their locality.

To close this funding gap and to make broadband more accessible, the National Broadband Plan proposes to transform the Universal Service Fund – a subsidy program that spends $8.7 billion every year to develop infrastructure and improve affordability for telephone service – into a program that would do the same for broadband Internet.



[1] Federal Communications Commission, Connecting America: The National Broadband Plan 23 (2010) [hereinafter National Broadband Plan].
[2] Id. at 10.
[3] Id. at 23.
[4] Id.
[5] Id.
[6] Id. at 146.
[7] Id.
[8] Id.
[9] Organization for Economic Cooperation and Development, OECD Broadband Portal, OECD.org, (table 1d(1)) (last accessed Jan. 28, 2011).
[10] Id. (table 4m) (last accessed Jan. 28, 2011).
[11] National Broadband Plan, supra note 1, at 9-10.
[12] Id. at 136.
[13] Id. at 139.
[14] Id.
[15] Id.

Downloads

Authors

Image Source: Donald E. Carroll
      
 
 




english

Experts assess the nuclear Non-Proliferation Treaty, 50 years after it went into effect

March 5, 2020 marks the 50th anniversary of the entry into effect of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). Five decades on, is the treaty achieving what was originally envisioned? Where is it succeeding in curbing the spread of nuclear weapons, and where might it be falling short? Four Brookings experts on defense…

       




english

Averting a new Iranian nuclear crisis

Iran’s January 5, 2020 announcement that it no longer considers itself bound by the restrictions on its nuclear program contained in the Joint Comprehensive Plan of Action (JCPOA, aka the “nuclear deal”) raises the specter of the Islamic Republic racing to put in place the infrastructure needed to produce nuclear weapons quickly and the United…

       




english

US-DPRK negotiations: Time to pivot to an interim agreement

Executive Summary: If and when U.S.-North Korea working-level talks resume, as agreed by U.S. President Donald Trump and Chairman Kim Jong Un at their brief June 30 meeting at the Demilitarized Zone, prospects for overcoming the current impasse will depend heavily on whether the Trump administration is now prepared to recognize that the North is…

       




english

070219 Einhorn CBC

       




english

Constraining Iran’s nuclear and missile capabilities

The Trump administration’s “maximum pressure campaign” is putting Iran under great stress, but it is unlikely to compel Tehran to accept its far-reaching demands. The United States needs a new strategy for constraining Iran’s future nuclear capabilities as well as its missile program. Two new Brookings monographs—“Constraining Iran’s Future Nuclear Capabilities” by Robert Einhorn and…

       




english

Constraining Iran’s missile capabilities

For decades, the United States has sought to constrain Iran’s missile program, both because it poses a conventional military threat to regional stability and because it can provide a delivery capability for nuclear weapons should Iran acquire them. But despite the efforts of the United States and others to impede Iranian procurement of missile-related materials,…

       




english

Constraining Iran’s future nuclear capabilities

The United States needs a new strategy for effectively constraining Iran’s future nuclear capabilities. The Trump administration’s current approach has little chance of succeeding. But simply returning the United States to the Joint Comprehensive Plan of Action (JCPOA) is not a long-term solution. By the time the United States would return to the 2015 deal,…

       




english

After the Trump-Kim summit 2.0: What’s next for US policy on North Korea?

The summit meeting between President Donald Trump and North Korean Leader Kim Jong Un on February 27 and 28 in Vietnam brought the two leaders together for the second time in less than a year. U.S.-North Korea negotiations on nuclear issues have been at a stalemate since the first summit in Singapore that touted lofty…

       




english

On North Korea, press for complete denuclearization, but have a plan B

The goal President Trump will try to advance in Vietnam – the complete denuclearization of North Korea – is a goal genuinely shared by the ROK, China, Japan, Russia, and many other countries. For the ROK, it would remove a major asymmetry with its northern neighbor and a barrier to North-South reconciliation. For China, it…

       




english

Managing risk: Nuclear weapons in the new geopolitics

Director's summarySince the end of the Cold War, more attention has been given to nuclear non-proliferation issues at large than to traditional issues of deterrence, strategic stability, and arms control. Given the state of current events and the re-emergence of great power competition, we are now starting to see a rebalance, with a renewed focus on questions…

       




english

End Game

How Israelis envision and plan for the future of their country Does Israel have a plan? What does the country want to look like in 10 or 20 years? What borders does it hope to have? Will the West Bank or the Gaza Strip be part of it? Will the Palestinians residing the territories be…

       




english

What does the Gantz-Netanyahu coalition government mean for Israel?

After three inconclusive elections over the last year, Israel at last has a new government, in the form of a coalition deal between political rivals Benjamin Netanyahu and Benny Gantz. Director of the Center for Middle East Policy Natan Sachs examines the terms of the power-sharing deal, what it means for Israel's domestic priorities as…

       




english

In Israel, Benny Gantz decides to join with rival Netanyahu

After three national elections, a worldwide pandemic, months of a government operating with no new budget, a prime minister indicted in three criminal cases, and a genuine constitutional crisis between the parliament and the supreme court, Israel has landed bruised and damaged where it could have been a year ago. This week, Israeli opposition leader…

       




english

Israel is back on the brink

In the endless loop of Israeli politics, one could easily have failed to notice that on Monday, the country held its third national election in less than a year. This numbing political repetition, however, masks the high stakes of these recurring elections. After the second election, in September, I wrote that one thing emerged from…

       




english

Around the halls: Brookings experts on the Middle East react to the White House’s peace plan

On January 28 at the White House, President Trump unveiled his plan for Middle East peace alongside Israeli Prime Minister Benjanim Netanyahu. Below, Brookings experts on the peace process and the region more broadly offer their initial takes on the announcement. Natan Sachs (@natansachs), Director of the Center for Middle East Policy: This is a…

       




english

Around the halls: What Brookings experts hope to hear in the Iowa debate

Iran and the recent the U.S. strike that killed Quds Force commander Qasem Soleimani will loom large for the Democratic candidates participating in the debate in Iowa. It may be tempting for the candidates to use this issue primarily as an opportunity to criticize the current administration and issue vague appeals for a return to…

       




english

Around the halls: Experts discuss the recent US airstrikes in Iraq and the fallout

U.S. airstrikes in Iraq on December 29 — in response to the killing of an American contractor two days prior — killed two dozen members of the Iranian-backed militia Kata'ib Hezbollah. In the days since, thousands of pro-Iranian demonstrators gathered outside the U.S. embassy in Baghdad, with some forcing their way into the embassy compound…

       




english

Timeline: A tumultuous year in Israeli politics

Israelis voted in two Knesset elections in 2019, and a third will now follow in early 2020. Meanwhile, Attorney General Avichai Mandelblit announced the indictment of Prime Minister Benjamin Netanyahu, escalating the legal drama surrounding the prime minister. The task of forming a new coalition may be just as difficult after the third election as…

       




english

What does Netanyahu’s indictment mean for Israel?

Israel is "entering uncharted territory," with Prime Minister Benjamin Netanyahu facing indictment and Israel's political parties unable to form a governing coalition following a second election cycle in September. Natan Sachs, fellow and director of the Center for Middle East Policy, examines what the criminal charges will mean politically for both Netanyahu and Likud, and…

       




english

Israel’s Netanyahu is indicted amid political gridlock

Israeli Attorney General Avichai Mandelblit ended months of speculation today in announcing his decision to indict Prime Minister Benjamin Netanyahu on charges of bribery, fraud, and breach of trust. The move caps a dramatic and tumultuous year in Israeli politics. If convicted, Netanyahu could face prison time, potentially making him the second consecutive Israeli prime…