Law in the Internet Society

View   r3  >  r2  ...
LouisEnriquezSaranoFirstEssay 3 - 11 Dec 2020 - Main.LouisEnriquezSarano
Line: 1 to 1
 
META TOPICPARENT name="FirstEssay"
Deleted:
<
<
 

Living in the Matrix

Changed:
<
<
-- By LouisEnriquezSarano - 09 Oct 2020

To solve a problem, one has to first know what the problem is. I argue that our collective failure to correctly identify the harms caused and threats posed by surveillance capitalism itself contributes to entrenching that very system. First, I briefly review a few of the more popular descriptions of this threat: (1) the threat to privacy, and (2) the threat to competitive capitalism, and (3) the threat to individual and collective autonomy. Second, I highlight an example of surveillance capitalism which these models fail to capture: the healthcare data market. The healthcare industry has no need to surveil individuals or to manipulate them into buying things. Nonetheless, the proliferation of a market in EHR data drastically undermines individual autonomy and medical ethics. Most important is that the health data market is that it would not exist but for privacy regulations, the Health Insurance Portability and Accountability Act (HIPAA). Thus, I hope to illustrate how misapprehending the pervasive threat of for-profit data collection and analysis can in fact exacerbate other problems, turning attempts to regain control into a futile game of whack-a-mole.

This reads like the roadmap paragraphs of a law review note, though with first-person pronouns. But no one reads law review articles, so they don't need to give readers a reason to read. You need to say clearly, in a sentence, what the point of your essay is, so readers can decide they want to go on.
>
>
-- By LouisEnriquezSarano - December 11, 2020
 
Changed:
<
<
The pivotal sentence in this current paragraph is "The healthcare industry has no need to surveil individuals or to manipulate them into buying things." This is self-evidently false. The things are patented molecules, sold at nearly infinite markup over cost, secured by state-granted twenty-year monopolies that can be indefinitely extended in travesty of law. The need for surveillance is overwhelming, because direct-to-consumer marketing is existentially necessary to the molecule merchants who, as the late Uwe Reinhardt once told NPR "have the largest equity stake in the US Congress."

You simply won't convince readers of your analysis if it depends, as this draft does, on the denial of that fact.

>
>
 
Deleted:
<
<

1. Big Brother and Big Other

 
Changed:
<
<
Big Brother conjures the titular persona’s watchful eye within our lives: The government watching us through security cameras or Google reading our emails (and everything else we do), to name just two examples. For years, it was thought that the digital revolution’s greatest threat was to our individual privacy, our right not to be seen. Others have grown more concerned with the FAANG companies’ threat to capitalism: for instance, Amazon or Apple using their platforms to crush small business. It’s only more recently that the popular conversation has come to consider the threats to our actual autonomy. Films like the Great Hack and the Social Dilemma examine how social media enables private interests to shape our politics and influence where we go, what we do, and, of course, what we buy. Shoshanna Zuboff gave two names to this phenomenon: Big Other and instrumentarian power. The value of the expanded metaphor is in demonstrating that Google, Facebook, et al. are not merely peeping Toms but part of “the sensate, computational, connected puppet that renders, monitors, computes, and modifies human behavior.” (The Age of Surveillance Capitalism 293). These revelations are alarming: put the right article in front of the right people at the right time and you can buy a democracy. As others have already noted, the weakness of the Big Brother/Other metaphor is that it only draws attention to a particular type of threat posed by surveillance capitalism—the term “surveillance” may itself cabin our perception of big tech’s activities.
>
>
One fulcrum in the fight to “reclaim” the net is the struggle to articulate what we have lost. While popular awareness of the threat posed by behavior collection firms (BCFs) is surely widening, the most popular metaphor today is still Orwell’s Big Brother. But that metaphor impedes the development of a unified theory of privacy because it fails to capture autonomy harms that are distinct from behavior collection and influence.
 
Changed:
<
<
What is the point of this paragraph? It uses crucial space to digress from your subject, but does not seem to contain an idea important to the effort.
>
>
One of the Big Brother paradigm’s most glaring weaknesses is its failure to convey the colonization of the human body by large medical technology and insurance firms (BigMed? ). Examining this development, alongside BCFs’ colonization of the human mind, yields a far more complete picture of the threats posed to human autonomy by the PwtMoG? . That picture is aptly described by comparison to the movie The Matrix—it illustrates how the PwtMoG? ’s holistically exploits our minds and bodies to produce profit while simultaneously deceiving us.
 
Changed:
<
<

2. The Electronic Health Record: Profiting from the Human Body

>
>
At first blush this metaphor may seem facetious; but rallying activists and the broader public around a more compelling, less abstract, articulation of the PwtMoG? is a crucial step toward building political momentum. It may also encourage a unified, rather than piecemeal, transformation of the net into one that protects our autonomy instead of exploiting our vulnerabilities.
 
Deleted:
<
<
Surveillance capitalists, ironically, need not watch us or control our behavior to profit from human life without consent, indeed laws meant to protect our privacy actually birthed the market for health data.
 
Changed:
<
<
This is not a coherent topic sentence for what follows.
>
>

1 Big Brother and Big Other

 
Changed:
<
<
The modern electronic health record (EHR) owes its widespread use to the Health Information Technology for Economic and Clinical Health Act (HITECH). Prior to its 2009 passage, only some 10% of physicians used an EHR. Now, thanks to $36 billion in subsidies, around 90% have adopted the technology. EHRs were well suited to the burgeoning surveillance economy, which Zuboff described as relying on simultaneous economies of scale and scope (Zuboff, 95, 201). EHRs contain patients’ vital signs, medical histories, family histories, illness diagnoses, immunization records, radiological images, test results and more. The EHR vendors and large insurance firms have amassed billions of dollars by refining EHR data and either selling it directly to pharmaceutical firms, or selling research conducted using the data. (Adam Tanner, Our Bodies Our Data: How Companies Make Billions Selling Our Medical Records 3–4 (2017)). HIPAA, which was meant to protect against the perceived threat of emergent digital technologies, made this market possible. By restricting the flow of EHR data, except for “healthcare operations,” treatment, or payment, it directs EHR data towards the large firms. Meanwhile it blesses the sale of de-identified data. Together these provisions form a data pipeline (the exceptions) and a moat (the prohibition on other transfers of data) that secure the large healthcare firms’ positions atop the EHR data market. The industry’s mechanics are more complex, but the punchline is that via our EHRs large firms can profit off of our bodies without our consent or knowledge. They don’t need to surveil us or to nudge us into buying anything. Perhaps more distressing is that our conception of surveillance capitalism as “Big Brother” or even “Big Other” totally fails to capture the healthcare surveillance industry. It is precisely this failure which leads to the passage of laws like HIPAA; as long as society misapprehends surveillance capitalism’s threat, it will fail to free itself.
>
>
As others have already noted, the weakness of the Big Brother metaphor is that it only draws attention to a particular type of threat posed by the PwtMoG? . It conjures the watchful eye: The government watching us through security cameras, Google reading our emails, etc. Thus people could be forgiven for believing that net’s only real threat is that it lets strangers learn things about us that we would rather keep secret.
 
Changed:
<
<

3. Living in the Matrix

>
>
More recently, the popular conversation has come to consider BCFs’ broader threats to our autonomy. Popular movies examine how social media became a tool BCFs use to influence where we go, what we do, what we buy, and even how we vote. Shoshanna Zuboff called this phenomenon “Big Other,” expanding the metaphor to demonstrate that Google, Facebook, et al. are not merely peeping Toms but part of “the sensate, computational, connected puppet that renders, monitors, computes, and modifies human behavior.” (The Age of Surveillance Capitalism 293). But “Big Other,” is a bit less rhetorically powerful than Big Brother, and in any event only marginally more descriptive of the totality of the danger presented by PwtMoG? .
 
Changed:
<
<
Convincingly conveying the full range of surveillance capitalism’s pathologies lies at the heart of swaying public opinion and securing digital freedom for ourselves and future generations. The best I can offer is the seminal science fiction movie, The Matrix. In that film human bodies are cultivated to produce energy for the machine overlords. Meanwhile their minds are connected to a vast simulation meant to lull them into submission. The metaphor captures the exploitation of both human bodies and minds, the sentience of the networked threat, and the lie that is our apparently harmless online world. The metaphor is imperfect, not least of all because it is silly. But I hope that drawing attention to surveillance capitalism’s new frontiers, created in part by privacy laws, will help expand the national dialogue and push us towards more comprehensive solutions, whatever they may be.
>
>

2 The EHR and the Colonization of Human Bodies

 
Changed:
<
<
This is a very good start. The problems are, fortunately, not in the details, only in the fundamentals.
>
>
The PwtMoG? ’s infiltrated the human body in many ways, but none as all-consuming as the electronic health records (EHR). Through the EHR BigMed? is engaged in a continual bodily harvest distinct from the BCFs’ behavioral harvest—not least because it takes place in the shadow of HIPAA, a law meant to protect individual privacy.
 
Changed:
<
<
The best route to improvement is to restructure, so that a clear central idea is stated at the beginning of the next draft, continuously developed through the text, leading to a conclusion that expands upon the original idea, now fully expressed, and gives the reader somewhere further to take the thought process on her own. The current animating central idea is that privacy legislation creates surveillance markets. This is demonstrated on the basis of a single example, which would be insufficient no matter which example was selected. The existing example is flawed, because HIPAA did not create the desire for portable medical records. It is even more flawed, as I have pointed out, because of the "doesn't need to surveil or sell things" fantasy about the context.
>
>
The modern electronic health record (EHR) owes its widespread use to 2009’s Health Information Technology for Economic and Clinical Health Act (HITECH). Following its passage EHR adoption by physicians increased from around 10% to 90%. EHRs contain patients’ vital signs, medical histories, family histories, immunization records, radiological images, test results and more. They were are well-suited to the surveillance economy, which relies on simultaneous economies of scale and scope (Zuboff, 95, 201). The largest BigMed? firms have hundreds of millions of patient medical records. These firms have amassed billions of dollars by refining EHR data and selling it to pharmaceutical firms. (Tanner, Our Bodies Our Data: How Companies Make Billions Selling Our Medical Records 3–4 (2017)).
 
Changed:
<
<
The problem of the EHR is the problem of regulatory capture. The presence of competing incompatible methods of encapsulating health records suited the oligopolizing structure of US health care delivery. If you had followed instead the evolution of the VA's VISTA system and the Bluebell free software EHR you could see clearly what the present analysis misses.
>
>
BigMed? ’s modus operandi is no different from that of any other of the PwtMoG? ’s arms. But mechanically speaking, it has been empowered and, critically, shielded from scrutiny, by HIPAA. That is because HIPAA focused only on preventing healthcare providers from disseminating patients’ identities accompanied by sensitive medical information and not on governing the actual use of that information, not to mention individual patients’ rights in their EHRs as meaningful representations of their bodies. By restricting the flow of EHR data, except for “healthcare operations,” treatment, or payment, it directs EHR data towards BigMed? . Meanwhile it blesses the unregulated sale of de-identified data. Together these provisions form a data pipeline (the exceptions) and a moat (the prohibition on other transfers of data), securing BigMed? ’s hold on the EHR data market.
 
Added:
>
>
The punchline is that via our EHRs BigMed? profits from our bodies without our consent or knowledge—two foundational principles of autonomy. More distressing is that our conception of the PwtMoG? as Big Brother/Other totally fails to capture this bodily colonization, thereby shielding it from the outrage directed at the exploitation of human minds.
 
Added:
>
>

3 Living in the Matrix

 
Added:
>
>
Conveying the breadth of the PwtMoG? ’s infiltration of both human minds and bodies lies at the heart of swaying public opinion and preserving our autonomy and our bodily freedom. The best I can offer is The Matrix. In the film humans are cultivated to produce energy for the machine overlords. Meanwhile their minds are connected to a vast simulation meant to lull them into submission. It captures the exploitation of both human bodies and minds, the sentience of the networked threat, and the lie of our apparently harmless online world. The metaphor is, of course, imperfect. But it draws attention to the true nature of the PwtMoG? and in doing so, pushes us towards solutions that comprehensively preserve freedom from exploitation.
 
Deleted:
<
<

You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:
 
Deleted:
<
<
Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.

Revision 3r3 - 11 Dec 2020 - 07:24:11 - LouisEnriquezSarano
Revision 2r2 - 15 Nov 2020 - 12:35:16 - EbenMoglen
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM