Why Privacy Matters - Even If You Have Nothing To Hide

A analysis on the ethics of surveillance, and the importance of defending your rights

“If you do nothing wrong, why should you be worried about your privacy?” This is one of the most common arguments used to dismiss concerns about surveillance and data collection. In his article Why Privacy Matters Even If You Have ‘Nothing to Hide’, Daniel J. Solove critiques this perspective, calling it “the most common retort against privacy advocates” (Solove, 2011).

Solove challenges the simplicity of this argument through both humor and analysis. He highlights its flaws with provocative phrases such as “show me yours and I’ll show you mine,” “so do you have curtains?”, and “if you don’t have anything to hide, then you don’t have a life” (Solove, 2011). These rebuttals underscore the absurdity of equating privacy with wrongdoing.

More importantly, Solove explains that the “nothing to hide” argument falsely assumes privacy is only about hiding illegal or unethical behavior. In reality, privacy protects personal dignity, autonomy, and freedom from unjust scrutiny. Accepting this argument allows both governments and corporations to overreach, often under the guise of protecting the public.

Consider the real-life example reported in The Guardian, where a father took a photo of his son’s groin to send to a doctor for a medical consultation. The image, automatically backed up to Google Photos, was flagged as child sexual abuse material (CSAM). As a result, Google terminated the father’s account. Despite being cleared of any wrongdoing by authorities, Google refused to reinstate his access (Bhuiyan, 2022). This case demonstrates how the “nothing to hide” mindset can justify sweeping, invasive surveillance—even when it harms innocent people.

Let’s assume, for argument’s sake, that we all agree CSAM must be eliminated. A supporter of surveillance might say, “It’s good that Google scans everyone’s photos to find such content.” The opposing view argues that such scanning is an invasion of privacy, especially without user consent. In this case, Google’s refusal to reverse the account ban, even after the user was cleared, illustrates how automated systems can cause real damage—especially when due process is ignored.

Solove outlines two major ways organizations violate privacy: aggregation and exclusion. Aggregation refers to how seemingly harmless bits of data, when combined, can reveal deeply personal information (Solove, 2011). Exclusion occurs when individuals have no control over how their data is used—often without their knowledge. This leads to additional privacy harms like secondary use (using your data for unrelated purposes) and distortion (drawing incorrect conclusions from incomplete or misleading data).

I agree with Solove’s position: the “nothing to hide” argument functions like a psychological trick, used to justify mass surveillance. It minimizes legitimate privacy concerns by framing them as suspicious or paranoid. In truth, technology has evolved so rapidly—and become so deeply embedded in our lives—that protecting digital privacy requires far greater scrutiny than in the past. As Christensen and Jansson (2014) write, “while surveillance as an apparatus of state and capitalism is nothing new, the intense level of mediatization… render[s] current forms of surveillance significantly different in character.” This means we need modern laws and safeguards to defend privacy in a digital world.

Privacy and Social Media

Social media platforms play a major role in this debate. As Levinson-Waldman, Panduranga, and Patel (2022) note, social media is now a primary way people engage with news, public discourse, and one another. At the same time, over nine U.S. federal agencies were actively monitoring social media as of 2022, using it for investigations, threat detection, situational awareness, and immigration screening.

This raises constitutional concerns. Does social media surveillance violate the First Amendment, which protects free speech? Legally, you are protected from being targeted for exercising your constitutional rights. Yet in practice, this protection is often ignored. Private companies also collect data at massive scale. Facebook, for example, built a database of faces that can recognize users even if they don’t have a Facebook account or didn’t upload the photo themselves (Meta, 2018; Graf, 2023). This is chilling when paired with government surveillance. After 9/11, intelligence funding ballooned to $44 billion annually, and private companies became heavily involved in national security operations (Boghosian, 2013). Imagine the government requesting access to a company’s facial recognition database to build a legal case—without your knowledge or consent. Something as innocent as a photo shared with friends could be repurposed as evidence.

The State and Their Exploitative Use of Social Media and the Internet

Take the case of Mahmoud Khalil, arrested for participating in pro-Palestine rallies at Columbia University (News, 2025). His identity and activities were made public by a pro-Israel doxxing website and a Zionist group on social media. One tweet accused him—without evidence—of supporting violence and claimed he appeared on ICE’s deportation list (Worldwide, 2025). In this case, social media didn’t just reflect public discourse; it enabled law enforcement to identify and locate Khalil, ultimately contributing to his arrest.

Surveillance also raises Fourth Amendment issues. The amendment protects against “unreasonable searches and seizures,” including digital data when there’s a reasonable expectation of privacy. However, content posted publicly online is typically not considered private, meaning law enforcement doesn’t need a warrant to access it (Levinson-Waldman, Panduranga, & Patel, 2022). What’s more, while you can legally protect your phone’s PIN under the Fifth Amendment, your fingerprint can legally be compelled—raising new ethical questions about consent and self-incrimination (Purdue Global Law School, 2022).

The core ethical dilemma in surveillance often boils down to consent and purpose. Do individuals know they’re being watched? Is the data being used responsibly? Is it secure? These questions must be addressed as surveillance becomes more pervasive.

Surveillance Today In Kalamazoo

These issues though, are not abstract. They are not a distant problem only experienced in other places. They even happen here in your own back yard. For example, do you own a car? Do you drive it places? Id like to look at the recent discovery of Grand Rapids Public Safety using Kalamazoo Public Safety’s Automatic License Plate Readers. There are currently 49 known Automatic License Plate Reader in Kalamazoo. June 6th, 2025 Kalamazoo Public Safety determined that “outside agencies” (GRPD) were accessing data from Kalamazoo Public Safety’s Automatic License Plate Readers (ALPR) with the reason of “immigration-related violations” (Tunison, 2025). The Flock ALPR systems allow for officers to type in a license plate number within a time frame, and search for any entries. If the plate was read during the provided timeframe, it shows the intersection where it was captured, as well as the date and time, though no information is provided about the driver or the vehicle registration (Tunison, 2025). Why does GRPD have access to Kalamazoo’s ALPR system? And why would they need it? We are two cities with a 52 mile gap between us. With that being said, how many police or immigrant arrests were contributed to GRPD and others accessing the Flock ALPR system?

I think now it is more than ever important to outline some kind of data policy applied to our government and police departments. To defend our rights, we must advocate for clear, ethical limits on both corporate and governmental data practices, before the expectation of privacy disappears entirely. And we can start with some of the policies outlined by the ACLU:

  1. License Plate Readers should be used by Law Enforcement, and Law Enforcement Only.
  2. The government must not store data about innocent people.
  3. People should be able to find out if plate data of vehicles registered to them.
  4. Law Enforcement agencies should not share license plate reader data.
  5. Any entity that uses license plate readers should be required to report.

Privacy is not about secrecy. It is about autonomy, dignity, and protecting data from misuse, misinterpretation, and overreach—whether by governments, corporations, or automated systems. From facial recognition databases to license plate readers, we are witnessing a slow erosion of privacy through normalization and lack of oversight. We must preserve our rights, we must demand transparency, accountability, and robust limitations on data collection and sharing. Privacy is a necessity foundation of a free society.


P.S: If you are generally interested in seeing the places that you are being tracked by Automatic License Plate Readers you can find them listed below as of Today June 11th 2025, or find a more recent map at https://deflock.me:

ALPR Cameras and Locations in Kalamazoo

  1. North and West Dunkley Street, Facing North
  2. North and West Dunkley Street, Facing South
  3. East Patterson and North Brudick Street Facing West
  4. West Patterson and North Burdick Street Facing East
  5. Gull Road and Riverview Drive Facing East Facing North East on Gull Road
  6. Gull Street and Rever Street Facing South West
  7. West North Street and Douglas Avenue, Facing North West Towards Dayshas
  8. East Main Street and Phelps Avenue Facing North East
  9. East Main Street and Horace Avenue Facing South West
  10. Mill Street After Soisson Field Facing North
  11. North Westnedge Avenue and West Michigan Avenue by Citgo Facing South
  12. North Drake Road when Entering The Strip Mall with Lowes and Hardings
  13. South Howard Street Before Goldsworth Valley Drive Facing North
  14. South Howard Street After Sutherland Avenue Facing South East
  15. Portage Street and Stockbridge Facing North
  16. Portage Street and Stockbridge Facing South
  17. Portage Steet and Stockbridge Facing East
  18. Portage Street and Stockbridge Facing West
  19. West KL Avenue and South Drake Road Facing East
  20. West KL Avenue and South Drake Road Facing West
  21. West KL Avenue and West Michigan Avenue Facing East
  22. West Michigan Avenue Before Century Avenue Facing South West
  23. South 11th Street and Coddington Lane Facing South
  24. West Michigan Avenue and South 11th Street Facing North East
  25. South 11th Street and Stadium Drive Facing North
  26. Stadium Drive and Rambling Road Facing East
  27. Stadium Drive and Before Biggby’s Facing West
  28. Miller Road and Fulford Street Facing South
  29. Whites Road and Bronson Boulevard Facing West
  30. East Cork Street and East Cork Street Court Facing North East and West
  31. Campus Drive Before College Circle Facing South West
  32. Campus Drive After College Circle Facing North West
  33. South Westnedge Avenue and Denway Drive Facing North
  34. South Westnedge Avenue and Denway Drive Facing South
  35. West Kilgore Road and Oakland Drive Facing East
  36. Oakland Drive and West Kilgore Road Facing South
  37. South Westnedge Avenue and West Kilgore Road Facing South
  38. Lovers Lane and East Kilgore Road Facing North
  39. Lovers Lane and East Kilgore Road Facing South
  40. Portage Road and Airview Boulevard Facing North
  41. South Westnedge Avenue and East Millham Avenue Facing North
  42. West Milham Road and Oakland Drive Facing East
  43. West Milham Road and South 12th Street Facing West
  44. Romence Road and South Westnedge Avenue Facing South
  45. Sprinkle Road and Romance Road East
  46. East Centre Avenue and Sprinkle Road
  47. West Centre Avenue and Angling Road Facing South East
  48. East Centre Avenue and Lovers Lane Facing East
  49. East Centre Avenue and Lovers Lane Facing North

Bibliography

GNU General Public License v3.0
Built with Hugo
Theme Stack designed by Jimmy