The Unwanted Gaze: The Destruction of Privacy in America [NOOK Book]


As thinking, writing, and gossip increasingly take place in cyberspace, the part of our life that can be monitored and searched has vastly expanded. E-mail, even after it is deleted, becomes a permanent record that can be resurrected by employers or prosecutors at any point in the future. On the Internet, every website we visit, every store we browse in, every magazine we skim--and the amount of time we skim it--create electronic footprints that can be traced back to us, revealing detailed patterns about our ...
See more details below
The Unwanted Gaze: The Destruction of Privacy in America

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$13.99 price


As thinking, writing, and gossip increasingly take place in cyberspace, the part of our life that can be monitored and searched has vastly expanded. E-mail, even after it is deleted, becomes a permanent record that can be resurrected by employers or prosecutors at any point in the future. On the Internet, every website we visit, every store we browse in, every magazine we skim--and the amount of time we skim it--create electronic footprints that can be traced back to us, revealing detailed patterns about our tastes, preferences, and intimate thoughts.
In this pathbreaking book, Jeffrey Rosen explores the legal, technological, and cultural changes that have undermined our ability to control how much personal information about ourselves is communicated to others, and he proposes ways of reconstructing some of the zones of privacy that law and technology have been allowed to invade. In the eighteenth century, when the Bill of Rights was drafted, the spectacle of state agents breaking into a citizen's home and rummaging through his or her private diaries was considered the paradigm case of an unconstitutional search and seizure. But during the impeachment of President Bill Clinton, prosecutors were able to subpoena Monica Lewinsky's bookstore receipts and to retrieve unsent love letters from her home computer. And the sense of violation that Monica Lewinsky experienced is not unique. In a world in which everything that Americans read, write, and buy can be recorded and monitored in cyberspace, there is a growing danger that intimate personal information originally disclosed only to our friends and colleagues may be exposed to--and misinterpreted by--a less understanding audience of strangers.
Privacy is important, Rosen argues, because it protects us from being judged out of context in a world of short attention spans, a world in which isolated bits of intimate information can be confused with genuine knowledge. Rosen  also examines the expansion of sexual-harassment law that has given employers an incentive to monitor our e-mail, Internet browsing habits, and office romances. And he suggests that some forms of offensive speech in the workplace--including the indignities allegedly suffered by Paula Jones and Anita Hill--are better conceived of as invasions of privacy than as examples of sex discrimination. Combining discussions of current events--from Kenneth Starr's tapes to DoubleClick's on-line profiles--with inno-vative legal and cultural analysis, The Unwanted Gaze offers a powerful challenge to Americans to be proactive in the face of new threats to privacy in the twenty-first century.

From the Hardcover edition.
Read More Show Less

Editorial Reviews

Francine Prose
...a measured and bracingly sane examination...What Jeffrey Rosen's book [has] is the virtue of brevity and concision, of thoughtfulness, as well as the willingness and the ability to imagine alternatives. His clear voice speaks directly to those of us who still wish to claim a few pribate moments when Big Brother isn't watching like some hideous cyber homunculus lurking inside our computer and monitoring each spasmodic little dance that our fingers perform on the keyboard.
The New York Observer
Alex Kozinski
Rosen has vividly captured the threat to privacy posed by cyberspace and sexual harassment law. This remarkably rich and detailed book sharpens our understanding of a problem that most of us prefer not to think about.
The New York Times Book Review
Lawrence H. Tribe
Jeffrey Rosen performs a great service by exploring the many facets of privacy and the variety of ways it is under siege today. Moving swiftly past the most conventional wisdom about these matters, he sheds interesting light on many of the less obvious functions of privacy protection–not the least of which is its role in reducing the risk that we will be judged out of context and ultimately misunderstood in a world of depressingly short attention spans.
—Tyler Professor of Constitutional Law, Harvard Law School
Janet Malcolm
Jeffrey Rosen has written an indespensable analysis of the judicial foundation of the Starr inquisition (among other insupportable assaults on individual freedom). His lucid writing and subtle thinking are exhilerating. When a problem is identified with such clarity and precision, its solution no longer seems impossible.
—author of The Crime of Sheila McGough
Alan Brinkly
Jeffrey Rosen has the rare ability to write about complex areas of the law with grace and clarity. In this book, he addresses one of the most important and controversial legal questions of our time: the much-contested right to privacy, which Rosen persuasively argues has been seriously damaged by a wide range of intrusive innovations in law and society. Beginning with the Lewinsky scandal, Rosen ranges widely through critical moments in recent history and presents a disturbing picture of how law and technology have combined to imperil an important, if relatively recently asserted, right.
—Alan Nevins Profesor of History, Columbia University
Kirkus Reviews
A comprehensive and disturbing assessment of the often well-intentioned legal efforts that have culminated in a multi-pronged assault on civic notions of privacy and discretion—usefully epitomized by the Lewinsky affair. Rosen (George Washington Univ. Law School/New Republic) deftly examines the daunting web of our wired, voyeuristic culture in developing a well-modulated argument for individual privacy in the public sphere. Much of Rosen's thesis revolves around such diverse phenomena as sexual-harassment law and the increasingly commonplace workplace monitoring of e-communication. Yet Rosen is also concerned with what he persuasively views as a generalized whittling-down of the sanctity of the citizen's space and "papers," noting that protections guaranteed in landmark 18th- and 19th-century decisions have been tarnished by recent, infamous proceedings like the Bob Packwood affair (alongside less notorious but interesting cases). Still, Rosen is not tremendously polemical: his arguments are subtly modulated, combining sophisticated legal discussion with a keen sense of our contemporary scene's foibles, funny and otherwise (as in Bill Clinton's ironic support for Susan Molinari's amendments regarding evidence admission to his 1994 crime bill, which later facilitated the Paula Jones lawsuit). Structurally, Rosen follows a sleek line, with simply titled chapters like "Privacy at Home" and "Privacy at Work" that allows his study to function both as an over-arching narrative of this grandiose erosion of the private society and as a handbook for those concerned enough to contemplate resistance, at least on the personal orcommunitylevel. Such individuals may be most alarmed by the chapter "Privacy in Cyberspace," which presents recent controversial cases—such as that of a Harvard Divinity School dean ousted for downloading pornography—and describes how every e-mail is centrally preserved and every online move tracked. Rosen ably navigates these murky waters where sexual-harassment, libel, and invasion of privacy jurisprudence intersect with the mutated informational boundaries of cyberspace; his debut is a cohesive, attractive, and informative take on a truly unsettling, even grotesque face of contemporary life.
From the Publisher
"Brilliant and haunting…a pleasure to read."–The Washington Post Book World

“Rosen makes a complex subject fascinating by showing us how vulnerable we all are. His message: Pay attention. It could happen to you.”–The Denver Post

“This remarkably rich and detailed book sharpens our understanding of a problem that most of us prefer not to think about.”–The New York Times Book Review

Read More Show Less

Product Details

  • ISBN-13: 9780307766601
  • Publisher: Knopf Doubleday Publishing Group
  • Publication date: 4/20/2011
  • Sold by: Random House
  • Format: eBook
  • Pages: 300
  • Sales rank: 747,566
  • File size: 2 MB

Meet the Author

Jeffrey Rosen is an associate professor at the George Washington University Law School and legal affairs editor of The New Republic. He is a graduate of Harvard College; Balliol College, Oxford, where he was a Marshall Scholar; and Yale Law School. His essays and book reviews have appeared in many publications, including The New York Times Magazine and The New Yorker. He lives in Washington, D.C.

From the Hardcover edition.
Read More Show Less

Read an Excerpt


This book began as an effort to understand the constitutional, legal, and political drama that culminated in the impeachment and acquittal of President Bill Clinton. But that strange and singular confluence of events prompted me to think about the Clinton impeachment as a window onto a less unusual phenomenon that affects all Americans: namely, the erosion of privacy, at home, at work, and in cyberspace, so that intimate personal information-from diaries, e-mail, and computer files to records of the books we read and the Web sites we brows-is increasingly vulnerable to being wrenched out of context and exposed to the world. What follows is an attempt to explore the legal, technological, and cultural changes that have undermined our ability to control how much information about ourselves is communicated to others. I would also like to explore ways of reconstructing some of the zones of privacy that law and technology have been allowed to invade.

In January of 1998, when Kenneth Starr began to examine allegations that President Clinton had lied under oath about an adulterous affair, I became interested in trying to identify the legal forces that converged in Paula Jones's sexual harassment suit and in the subsequent impeachment investigation. Why, for example, were Jones's lawyers permitted to go on a fishing expedition into the President's sexual history, asking him to identify all the women with whom he had sexual relations as governor and president? Merely by accusing Clinton of an unwanted advance, Jones was able to violate not only his privacy but also that of Monica Lewinsky, who was forced to describe her own consensual sexual activities under oath. How could the law permit such unreasonable searches, in which the investigation of the offense seemed more invasive than the offense itself?

The invasions of privacy continued to multiply during the Starr investigation and the impeachment trial that followed. Many examples of the erosion of privacy by means of technology seemed to sit uneasily with the public-the DNA testing, the retrieval of e-mails that Lewinsky and a friend had tried unsuccessfully to delete, the tape recordings, the release of the secret grand jury transcripts on the Internet. But Lewinsky herself was especially unsettled by Starr's decision to subpoena a Washington bookstore for receipts of all of her book purchases since 1995. In her memoir, Lewinsky pointed to the bookstore subpoenas as one of the most invasive moments in the Starr investigation, along with the moment when prosecutors retrieved from her home computer the love letters that she had drafted, but never sent, to the President. "It was such a violation," she complained to her biographer, Andrew Morton. "It seemed that everyone in America had rights except for Monica Lewinsky. I felt like I wasn't a citizen of this country anymore."

Monica Lewinsky is an improbable spokesperson for the virtues of reticence, but her ordeal raises deep questions about recent changes in law and technology that threaten individual control over personal information. In the late eighteenth century, the spectacle of state agents breaking into a suspect's home and rummaging through his or her private diaries was considered the paradigm case of the unreasonable searches and seizures that the framers of the Bill of Rights intended to forbid. In the most famous essay on privacy ever written, published in the Harvard Law Review in 1890, Louis D. Brandeis, the future Supreme Court justice, and Samuel D. Warren, his former law partner, announced confidently that "the common law secures to each individual the right of determining, ordinarily, to what extent his thoughts, sentiments, and emotions shall be communicated to others." The legal principle that prevented prosecutors from scrutinizing diaries, letters, books, and private papers, Warren and Brandeis wrote, was the same principle that, in their view, should prevent gossip columnists from writing about the sex lives of citizens. They called that principle the right to an "inviolate personality" and said that it was part of the most general "right to be let alone."

In asserting a right to privacy that could constrain the press, the two lawyers were treading on adventurous ground; yet it was a matter of general agreement, in the 1890s, that the Constitution prohibited prosecutors and civil plaintiffs from rummaging through private papers in search of sexual secrets or anything else. How, then, could that consensus have eroded to the point that Lewinsky's unsent love letters could be retrieved from her home computer? Part of the answer, I will argue, has to do with an unfortunate confluence of decisions by the Supreme Court. The legal forces that culminated in the Clinton impeachment-in particular, the erosion of privacy law, embodied in Fourth and Fifth Amendment protections for individual control over personal information, and the expansion of sexual harassment law, to a point where people can be interrogated about the details of their consensual relationships on the flimsiest of allegations-are the product of surprisingly recent Supreme Court decisions. It was during the 1970s and 1980s, for example, that the principle that private diaries couldn't be subpoenaed as "mere evidence" in civil or white-collar criminal cases was quietly allowed to wither away. And it was during the 1980s and 1990s that the Supreme Court recognized sexually explicit speech and conduct that created a "hostile or offensive working environment" as a form of gender discrimination, a development that made it increasingly difficult for lower courts and employers to distinguish consensual affairs from illegal forms of sexual coercion.

The Lewinsky investigation might never have occurred, however, if these two unfortunate legal trends hadn't converged with a third novel and illiberal law: the Independent Counsel Act, which encouraged a level of inquisitorial zeal in which ordinary prosecutors-constrained, as they are, by time, money, and public accountability-are less likely to indulge. Now that both parties have experienced the excesses of monomaniacal independent counsels, that law, mercifully, has been allowed to expire. But like a blinding klieg light that exposes the fissures in every surface on which it is turned, the independent counsel law served the jarring yet useful purpose of revealing the fault lines in the legal and technological protections for privacy today.

A hundred years ago, Brandeis and Warren worried that changes in technology as well as law were altering the nature of privacy. "Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life, and numerous mechanical devices threaten to make good the prediction that 'what is whispered in the closet shall be proclaimed from the housetops,'" they wrote. But it was not, in fact, the desire to be let alone that motivated Brandeis and Warren to write their famous article; it was instead the desire to restrict discussion of an intimate family event to the sympathetic boundaries of their own social circle. What outraged Brandeis and Warren was a mild society item in the Boston Saturday Evening Gazette that described a lavish breakfast party Warren himself had put on for his daughter's wedding. Although the information itself wasn't inherently salacious, Brandeis and Warren were appalled that a domestic ceremony would be described in a gossip column and discussed by strangers. For this reason, they conceived of privacy in geographic or spatial terms. The press, they wrote, was "overstepping" the "bounds of propriety and of decency," and intruding on "the domestic circle."

At the beginning of the twenty-first century, new technologies of communication have increased the danger that intimate personal information originally disclosed to our friends and colleagues may be exposed to-and misinterpreted by-a less understanding audience. For as thinking and writing increasingly take place in cyberspace, the part of our life that can be monitored and searched has vastly expanded. E-mail, even after it is ostensibly deleted, becomes a permanent record that can be resurrected by employers or prosecutors at any point in the future. On the Internet, every Web site we visit, every store we browse in, every magazine we skim, and the amount of time we spend skimming it, create electronic footprints that can be traced back to us, revealing detailed patterns about our tastes, preferences, and intimate thoughts. A friend who runs a Web site for political junkies recently sent me the "data trail" statistics that he receives each week. They disclose not only the Internet addresses of individual browsers who visit his site, clearly identifying their universities and corporate employers, but also the Web sites each user visited previously and the articles he or she downloaded there. has announced a similarly creepy feature that uses zip codes and domain names to identify the most popular books purchased on-line by employees at prominent corporations. (The top choice at Charles Schwab: Memoirs of a Geisha.)

The sense of violation that Monica Lewinsky and the customers experienced when their reading habits were exposed points to a central value of privacy that I want to explore in this book. Privacy protects us from being misdefined and judged out of context in a world of short attention spans, a world in which information can easily be confused with knowledge. True knowledge of another person is the culmination of a slow process of mutual revelation. It requires the gradual setting aside of social masks, the incremental building of trust, which leads to the exchange of personal disclosures. It cannot be rushed; this is why, after intemperate self-revelation in the heat of passion, one may feel something close to self-betrayal. True knowledge of another person, in all of his or her complexity, can only be achieved with a handful of friends, lovers, or family members. In order to flourish, the intimate relationships on which true knowledge of another person depends need space as well as time: sanctuaries from the gaze of the crowd in which slow mutual self-disclosure is possible.

When intimate personal information circulates among a small group of people who know us well, its significance can be weighed against other aspects of our personality and character. By contrast, when intimate information is removed from its original context and revealed to strangers, we are vulnerable to being misjudged on the basis of our most embarrassing, and therefore most memorable, tastes and preferences. Monica Lewinsky didn't mind that her friends knew she had given the President a copy of Nicholson Baker's Vox, because her friends knew that she was much more than the type of person who would read a book about phone sex. But when our reading habits or private e-mails are exposed to strangers, we may be reduced, in the public eye, to nothing more than the most salacious book we once read or the most vulgar joke we once told. Even if the books we read aren't in any way embarrassing-Memoirs of a Geisha was a well-regarded novel-we run the risk of being stereotyped as the kind of person who would read a particular book or listen to a particular song. In a world in which citizens are bombarded with information, people form impressions quickly, based on sound bites, and these impressions are likely to oversimplify and misrepresent our complicated and often contradictory characters.

Defenders of transparency argue that more information, rather than less, is the best way to protect us against this sort of misjudgment. We might think differently about a Charles Schwab employee who ordered Memoirs of a Geisha from if we knew that she also listened to gangsta rap and subscribed to Popular Mechanics. But even if we saw the logs of everything she had read and downloaded this week, we wouldn't come close to knowing who she really is. (Instead, we would misjudge her in all sorts of new ways.) In a surrealist world in which complete logs of every citizen's reading habits were available on the Internet, the limits of other citizens' attention spans would guarantee that no one could focus long enough to read someone else's browsing logs from beginning to end. Instead, overwhelmed by information, citizens would change the channel or click to a more interesting web site. In a world of short attention spans, privacy is necessary to protect citizens from the misjudgments that can result from the exposure of too much information as well as too little information. Filtered or unfiltered, information wrenched out of context is no substitute for the genuine knowledge that can only emerge slowly over time.

From the Hardcover edition.

Read More Show Less

Table of Contents

Prologue: The Unwanted Gaze 3
Ch. 1 Privacy at Home 26
Ch. 2 Privacy at Work 54
Ch. 3 Jurisprurience 91
Ch. 4 Privacy in Court 128
Ch. 5 Privacy in Cyberspace 159
Epilogue: What Is Privacy Good For? 196
Afterword to the Vintage Edition 225
Acknowledgments 233
Notes 235
Index 269
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)