83 Pages Posted: 31 Aug 2008 Last revised: 23 Dec 2013
Date Written: August 30, 2008
Nothing in society poses as grave a threat to privacy as the Internet Service Provider (ISP). ISPs carry their users' conversations, secrets, relationships, acts, and omissions. Until the very recent past, they had left most of these alone because they had lacked the tools to spy invasively, but with recent advances in eavesdropping technology, they can now spy on people in unprecedented ways. Meanwhile, advertisers and copyright owners have been tempting them to put their users' secrets up for sale, and judging from a recent flurry of reports, ISPs are giving in to the temptation and experimenting with new forms of spying. This is only the leading edge of a coming storm of unprecedented and invasive ISP surveillance.
This Article proposes an innovative new theory of communications privacy to help policymakers strike the proper balance between user privacy and ISP need. We cannot simply ban aggressive monitoring, because ISPs have legitimate reasons for scrutinizing communications on an Internet teeming with threats. Using this new theory, policymakers will be able to distinguish between an ISP's legitimate needs and mere desires.
In addition, this Article injects privacy into the network neutrality debate - a debate about who gets to control innovation on the Internet. Despite the thousands of pages that have already been written about the topic, nobody has recognized that we already enjoy mandatory network neutrality in the form of expansive wiretapping laws. The recognition of this idea will flip the status quo and reinvigorate a stagnant debate by introducing privacy and personal autonomy into a discussion that has only ever been about economics and innovation.
Keywords: privacy, Internet, cyberlaw, ISP, wiretap, charter, comcast, nebuad, phorm, network neutrality
JEL Classification: K2, K29, K4, K41, K42
Suggested Citation: Suggested Citation
Ohm, Paul, The Rise and Fall of Invasive ISP Surveillance (August 30, 2008). University of Illinois Law Review, 2009; U of Colorado Law Legal Studies Research Paper No. 08-22. Available at SSRN: https://ssrn.com/abstract=1261344