PRIVACY + SECURITY BLOG

News, Developments, and Insights

high-tech technology background with eyes on computer display

Not a Suicide Pact - Richard Posner

I’ve just finished reading Judge Richard Posner’s new book, Not a Suicide Pact: The Constitution in a Time of National Emergency (Oxford, 2006). The book is a slender volume, with a remarkable feat for a law professor — absolutely no footnotes or endnotes or citations of any sort save a short bibliography at the end.

Before I began reading Posner’s book, I was surprised that some reviewers, such as Dahlia Lithwick, praised the book as measured and balanced:

In his new book, “Not a Suicide Pact: The Constitution in a Time of National Emergency,” Posner approaches the wartime civil liberties problem in precisely the manner the Bush administration will not: with a dispassionate weighing of what is won against what is forsaken each time the government engages in data mining, indefinite detentions or the suppression of free speech.

I do not share Lithwick’s enthusiasm. Posner’s book struck me as a very broad defense of the Bush Administration’s policies (with a few exceptions) and as advocating a balancing between civil liberties and national security in which national security will nearly always win out. Posner is masterful in his rhetoric, though, and manages to sound judicious and measured even though the implications of what he is arguing often are rather extreme.

Posner begins by arguing for a “living Constitution,” which means that the Constitution should not be rigidly interpreted but should evolve with the times. In this respect, he agrees with Justice Brennan and other liberal jurists. Some reviewers, such as Michiko Kakutani of the New York Times attacked Posner’s living Constitution argument:

This willingness to bend the Constitution reflects Judge Posner’s archly pragmatic approach to the law and his penchant for eschewing larger principles in favor of utilitarian, cost-benefit analysis. Efficiency, market dynamics and short-term consequences are what concern Judge Posner, not enduring values or legal precedents.

One result is a depressing relativism in which there are no higher ideals and no absolute rights worth protecting. . . .

I agree with Posner on the point about the living Constitution. Posner’s point is that like it or not, the Constitution is already a living Constitution: “So much of the constitutional text is vague or obsolete that a great deal of judicial patchwork is required for the Constitution to remain serviceable more than two centuries after it was written.” (p. 19). The problem with Posner’s arguments, however, is not in his embracing of pragmatism, balancing, and an evolving Constitution but in the way he goes about his balancing.

Posner argues for judicial restraint because “when in doubt about the actual or likely consequences of a measure, the pragmatic, empiricist judge will be inclined to give the other branches of government their head.” (p. 27). Why? It is not self-evident at all that the executive branch has made the most wise decisions on national security throughout history. More importantly, it is not clear why the executive branch is better at balancing civil liberties and national security. If anything, it seems to me that the executive branch might weigh national security too much.

Posner argues that the threat of terrorism is very grave: “The research that I have been conducting for the past several years on catastrophic risks, international terrorism, and national security intelligence has persuaded me that we live in a time of grave and increasing danger, comparable to what the nation faced at the outset of World War II.” (p. 3). Really? As I’ve argued before, perhaps the dangers of terrorism are being weighed too heavily. Regardless of whether I’m wrong or right, Posner does little to question and analyze the dangers of terrorism, which he largely assumes.

Posner makes a straw man out of civil libertarians, who he claims “are reluctant to acknowledge that national emergencies in general, or the threat of modern terrorism in particular, justify anycurtailment of the civil liberties that were accepted on the eve of the emergency.” (p. 41). Why not take on the more nuanced civil libertarians, who don’t have such an absolutist view? Most civil libertarians are not absolutists but are arguing that certain programs that curtail civil liberties do not provide sufficient benefits in addressing the risk of terrorism (which they don’t assess at such a grave level as Posner does) to justify the costs. They are just engaging in a different cost-benefit analysis, but Posner seems to paint anybody who doesn’t engage in his particular cost-benefit analysis as unpragmatic and absolutist.

Throughout the book, Posner’s cost-benefit analysis always seems to favor the curtailment of rights. He does try to moderate his stances by articulating some limits, but these are minimal at best. Thus, he justifies detention of enemy combatants but throws the civil libertarians a bone by arguing that there should be judicial review of detentions. (p. 60-61). But he then says that a “heavy burden” can be placed “on the detainee to prove that he is not a terrorist.” (p. 61) .

At one point, Posner takes issue with John Yoo’s argument that “Article II of the Constitution authorizes [the President] to conduct war in any manner he sees fit; we are at war with al-Qaeda; therefore it is the sole prerogative of the president to decide what if any rights to accord to persons captured in this war.” (p. 67). At least Posner rejects the most extreme arguments, but these are low-hanging fruit. In all other respects, Posner’s purportedly more measured approach ultimately justifies nearly every measure the Bush Administration has taken. He just does it in a way that sounds more judicious, but the result is largely the same.

Another limitation Posner advances is that his special departures from rights “are warranted only for terrorism that potentially threatens national security. ‘Ecoterrorism’ and “animal rights terrorism’ do not. These are serious crimes, but they inflict only property damage, usually modest, and are orders of magnitude less menacing that Islamist terrorism.” (p. 63). What exactly is “national security”? What is “terrorism”? Posner appears to recognize the fuzziness of these terms when he says that “a biological Unabomber could be a greater menace than al-Qaeda.” (p. 63) But he never really provides a convincing clear definition of when his special rules should apply. As a result, he fails to provide an answer to the slippery slope problem — if we have special rules for terrorism, why not also apply these rules to ordinary murder and other crimes? After all, at least based on past statistics, the chances of being killed via ordinary crime are much higher than being killed from terrorism.

Later on, Posner argues that in cases of “special” national security surveillance, if an intelligence officer “discovers that one of the parties to the communication seems to be planning a murder, though a murder having nothing to do with any terrorist plot” then she should “refrain from notifying the authorities.” (p. 98-99). This is because, Posner says, “[t]here is much wild talk in private conversations.” (p. 99). Yet “wild talk” could just as readily apply to terrorism as to murder. And in many cases, it would be relatively easy to determine whether the talk were serious planning or just wild talk. Posner then notes: “But if the evidence is of a crime related to national security, then sharing it with law enforcement authorities should be (and is) required.” (P. 99). He notes that there may be other exceptions: “Serial killing is not terrorism, but it is such a serious crime that clues to it picked up in national security surveillance should be communicated to law enforcement officials.” (p. 99). So the test now becomes what is “serious” crime and what isn’t, which makes the standard sufficiently muddy to provide little guidance for when intelligence officers can share their intelligence. And he said earlier that ecoterrorism is a “serious” crime yet not worthy of being subject to the special rules (p. 63), so it remains quite unclear precisely what standard Posner seems to have in mind.

Rarely does Posner spend much time exploring the values of rights. My impression, after reading his book, was that rights for Posner were not that important, a luxury at best. Posner does not analyze the benefits of rights with nearly a fraction of the vigor by which he extols the benefits of national security measures. Thus, he discounts the harms of surveillance by arguing that

All manner of e-mail and other Internet “conversations” are monitored and recorded by employers and vendors. Probably most people would prefer to have their communications monitored by an agency interested only in national security than by their employers. . . . It is easy to exaggerate the private as well as social harm from unobtrusive surveillance.” (p.90).

Well, if Posner says so, it must be true. Little attempt is made to try to understand and articulate the harms of surveillance. Posner goes on to justify the NSA surveillance program because “such surveillance might cause our foreign terrorist enemies to abandon or greatly curtail their use of telephone, e-mail, and other means of communicating electronically with people in the United States who may be members of terrorist sleeper cells.” (p. 95). As I read through this example and others of Posner’s balancing, I kept wondering: If Posner is right that the threat of terrorism is extremely grave, then when would civil liberties ever win out over national security protections?

Posner even goes on to propose more extreme surveillance programs than the Bush Administration is currently engaging in: “I believe that the government could, in the present emergency, intercept all electronic communications inside or outside the United States, of citizens as well as of foreigners, without being deemed to violate the Fourth Amendment, provided that computers were used to winnow the gathered data, blocking human inspection of intercepted communications that contained no clues to terrorist activity.” (p. 99-100). Wow! There really doesn’t appear to be much of a limit at all. Terrorism is so grave in Posner’s book that nearly any measure to protect against it would be justified. Moreover, how are computers to do this winnowing? Putting aside the issue of what constitutes “terrorism” and perhaps other “serious” crimes, is there really a way to isolate only communications regarding terrorism?

Moreover, in Posner’s arguments, as in the arguments of many on the national security side of the balance, there seems to be the view that rights are merely bans and restrictions on surveillance, but this is not how rights currently work. The Fourth Amendment rarely bans surveillance; it requires judicial oversight of such surveillance and it requires that the government make an attempt to justify its measures. So the balance isn’t between no surveillance versus surveillance — it is more accurately stated as measuring the extent to which certain forms of judicial oversight and other procedural requirements reduce the effectiveness of the surveillance. The reduction in effectiveness is what should be weighed against civil liberties, not the full value of the surveillance.

At other points in the book, Posner begs the hard questions. He notes that government agencies frequently overclassify information, creating “a culture of secrecy that inhibits the production and flow of information to which the public should be entitled.” (p. 107). He argues that abuses from data mining can be curtailed because of “the growth of a culture of leaking and whistleblowing” which “make American government a fishbowl.” (p. 98). But then he argues that we must have stronger laws against leakers and that “government must be able to punish the media when they knowingly publish [classified information].” (p. 106). Posner gives us no idea how all this fits together.

In short, I found the book to be quite frustrating at times. Posner writes clearly and well as always, and he certainly knows how to be engaging and interesting. That’s a lot, but it is far from enough.

NOTE: This isn’t the first time I’ve critiqued Posner on these issues. For those interested in reading more of my critiques of Posner, I take on Posner’s views on security and legal pragmatism here, his views on Melville’s Billy Budd and security here, his views on judicial restraint here, and his call for extensive surveillance here.

Originally Posted at Concurring Opinions

* * * *

This post was authored by Professor Daniel J. Solove, who through TeachPrivacy develops computer-based privacy training, data security training, HIPAA training, and many other forms of awareness training on privacy and security topics. Professor Solove also posts at his blog at LinkedIn. His blog has more than 1 million followers.

Professor Solove is the organizer, along with Paul Schwartz, of the Privacy + Security Forum and International Privacy + Security Forum, annual events designed for seasoned professionals.

If you are interested in privacy and data security issues, there are many great ways Professor Solove can help you stay informed:
*
LinkedIn Influencer blog
*
Twitter
*
Newsletter

TeachPrivacy Ad Privacy Training Security Training 01