메뉴 건너뛰기




Volumn 75, Issue 1, 2008, Pages 343-362

Data mining and the security-liberty debate

Author keywords

[No Author keywords available]

Indexed keywords


EID: 42349088345     PISSN: 00419494     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (72)

References (72)
  • 1
    • 42349093630 scopus 로고    scopus 로고
    • See Technology and Privacy Advisory Committee, Report, Safeguarding Privacy in the Fight against Terrorism (TAPAC Report) 2-5 (Mar 1, 2004), online at http://www.cdt.org/security/usapatriot/20040300tapac.pdf (visited Jan 12, 2008) (discussing the Department of Defense's and other government agencies' use of data mining as a means of intelligence gathering).
    • See Technology and Privacy Advisory Committee, Report, Safeguarding Privacy in the Fight against Terrorism ("TAPAC Report") 2-5 (Mar 1, 2004), online at http://www.cdt.org/security/usapatriot/20040300tapac.pdf (visited Jan 12, 2008) (discussing the Department of Defense's and other government agencies' use of data mining as a means of intelligence gathering).
  • 2
    • 42349088360 scopus 로고    scopus 로고
    • Finding the Face of Terror in Data
    • Sept 10
    • John M. Poindexter, Finding the Face of Terror in Data, NY Times A25 (Sept 10,2003).
    • (2003) NY Times
    • Poindexter, J.M.1
  • 3
    • 42349089832 scopus 로고    scopus 로고
    • Natl, Feb 25
    • Shane Harris, TIA Lives On, Natl J 66,66-67 (Feb 25, 2006).
    • (2006) TIA Lives On , vol.J 66 , pp. 66-67
    • Harris, S.1
  • 4
    • 42349085812 scopus 로고    scopus 로고
    • TAPAC Report at 5 (cited in note 1).
    • TAPAC Report at 5 (cited in note 1).
  • 5
    • 42349102081 scopus 로고    scopus 로고
    • See Daniel J. Solove, Marc Rotenberg, and Paul M. Schwartz, Information Privacy Law 603-04 (Aspen 2d ed 2006). Several successive versions of the screening program have been developed and abandoned. For example, after September 11, the government sought to develop the Computer Assisted Passenger Prescreening System II (CAPPS II)-a successor to the screening program in place before September 11. CAPPS II was abandoned because it grew too far beyond its original purpose; it was later replaced with a program called Secure Flight. This was later abandoned as well. The TSA continues to develop passenger screening data mining systems.
    • See Daniel J. Solove, Marc Rotenberg, and Paul M. Schwartz, Information Privacy Law 603-04 (Aspen 2d ed 2006). Several successive versions of the screening program have been developed and abandoned. For example, after September 11, the government sought to develop the Computer Assisted Passenger Prescreening System II (CAPPS II)-a successor to the screening program in place before September 11. CAPPS II was abandoned because it grew too far beyond its original purpose; it was later replaced with a program called Secure Flight. This was later abandoned as well. The TSA continues to develop passenger screening data mining systems.
  • 6
    • 42349104903 scopus 로고    scopus 로고
    • Leslie Cauley, NSA Has Massive Database of Americans' Phone Calls; 3 Telecoms Help Government Collect Billions of Domestic Records, USA Today IA (May 11, 2006) (quotation marks omitted).
    • Leslie Cauley, NSA Has Massive Database of Americans' Phone Calls; 3 Telecoms Help Government Collect Billions of Domestic Records, USA Today IA (May 11, 2006) (quotation marks omitted).
  • 7
    • 42349106324 scopus 로고    scopus 로고
    • But see Susan Page, Lawmakers: NSA Database Incomplete; Some Who Were Briefed about the Database Identify Who Participated and Who Didn't, USA Today 2A (June 30, 2006) (explaining that the database of domestic phone call records is incomplete because certain telecommunications providers did not provide the NSA with call records).
    • But see Susan Page, Lawmakers: NSA Database Incomplete; Some Who Were Briefed about the Database Identify Who Participated and Who Didn't, USA Today 2A (June 30, 2006) (explaining that the database of domestic phone call records is incomplete because certain telecommunications providers did not provide the NSA with call records).
  • 8
    • 42349091459 scopus 로고    scopus 로고
    • For more details on the MATRIX program, see, Praeger
    • For more details on the MATRIX program, see Jacqueline Klosek, The War on Privacy 51-53 (Praeger 2007);
    • (2007) The War on Privacy , pp. 51-53
    • Klosek, J.1
  • 9
    • 42349116472 scopus 로고    scopus 로고
    • GAO, Data Mining: Federal Efforts Cover a Wide Range of Uses, GAO-04-548, 5 (May 2004), online at http://www.gao.gov/new.items/d04548.pdf (visited Jan 12, 2008).
    • GAO, Data Mining: Federal Efforts Cover a Wide Range of Uses, GAO-04-548, 5 (May 2004), online at http://www.gao.gov/new.items/d04548.pdf (visited Jan 12, 2008).
  • 10
    • 84873068098 scopus 로고    scopus 로고
    • cited in note 7, GAO, at
    • GAO, Data Mining at 2 (cited in note 7).
    • Data Mining , pp. 2
  • 12
    • 33646405991 scopus 로고    scopus 로고
    • Secret Service: Against Privacy and Transparency
    • Apr 17
    • William J. Stuntz, Secret Service: Against Privacy and Transparency, New Republic 12,12 (Apr 17, 2006).
    • (2006) New Republic , vol.12 , pp. 12
    • Stuntz, W.J.1
  • 13
    • 42349106323 scopus 로고    scopus 로고
    • Id at 14
    • Id at 14.
  • 14
    • 84866436415 scopus 로고
    • Constitutional Law in the Age of Balancing, 96
    • analyzing the evolution and acceptance of the balancing of interests in a wide array of different constitutional issues and discussing some of the problems that have since arisen, See
    • See T Alexander Aleinikoff, Constitutional Law in the Age of Balancing, 96 Yale L J 943, 965-72 (1987) (analyzing the evolution and acceptance of the balancing of interests in a wide array of different constitutional issues and discussing some of the problems that have since arisen).
    • (1987) Yale L J , vol.943 , pp. 965-972
    • Alexander Aleinikoff, T.1
  • 16
    • 42349087666 scopus 로고    scopus 로고
    • Id at 27
    • Id at 27.
  • 17
    • 42349111894 scopus 로고    scopus 로고
    • Id at 37
    • Id at 37.
  • 19
    • 42349083394 scopus 로고    scopus 로고
    • Id at 5
    • Id at 5.
  • 20
    • 42349085617 scopus 로고    scopus 로고
    • Id at 16
    • Id at 16.
  • 21
    • 42349117315 scopus 로고    scopus 로고
    • See id at 6
    • See id at 6.
  • 22
    • 42349104725 scopus 로고    scopus 로고
    • Id at 31
    • Id at 31.
  • 23
    • 42349109484 scopus 로고    scopus 로고
    • Id at 18
    • Id at 18.
  • 26
    • 42349113817 scopus 로고    scopus 로고
    • 460 F3d 260 (2d Cir 2006).
    • 460 F3d 260 (2d Cir 2006).
  • 27
    • 42349111715 scopus 로고    scopus 로고
    • Id at 267-68
    • Id at 267-68.
  • 28
    • 42349105800 scopus 로고    scopus 로고
    • Id at 269
    • Id at 269.
  • 29
    • 42349101909 scopus 로고    scopus 로고
    • Id at 273 quotation marks omitted
    • Id at 273 (quotation marks omitted).
  • 30
    • 42349095437 scopus 로고    scopus 로고
    • Id quotation marks omitted
    • Id (quotation marks omitted).
  • 31
    • 42349115412 scopus 로고    scopus 로고
    • The court declared: We will not peruse, parse, or extrapolate four months' worth of data in an attempt to divine how many checkpoints the City ought to deploy in the exercise of its day-to-day police power. Counter-terrorism experts and politically accountable officials have undertaken the delicate and esoteric task of deciding how best to marshal their available resources in light of the conditions prevailing on any given day. We will not-and may not-second-guess the minutiae of their considered decisions.
    • The court declared: We will not peruse, parse, or extrapolate four months' worth of data in an attempt to divine how many checkpoints the City ought to deploy in the exercise of its day-to-day police power. Counter-terrorism experts and politically accountable officials have undertaken the delicate and esoteric task of deciding how best to marshal their available resources in light of the conditions prevailing on any given day. We will not-and may not-second-guess the minutiae of their considered decisions.
  • 32
    • 42349111537 scopus 로고    scopus 로고
    • Id at 274
    • Id at 274.
  • 34
    • 42349088551 scopus 로고    scopus 로고
    • See id at 958-59, 967-68
    • See id at 958-59, 967-68.
  • 35
    • 42349089648 scopus 로고    scopus 로고
    • See Posner and Vermeule, Terror in the Balance at 32 (cited in note 16).
    • See Posner and Vermeule, Terror in the Balance at 32 (cited in note 16).
  • 38
    • 42349095436 scopus 로고    scopus 로고
    • See Daniel J. Solove, Melville's Billy Budd and Security in Times of Crisis, 26 Cardozo L Rev 2443, 2457-59 (2005);
    • See Daniel J. Solove, Melville's Billy Budd and Security in Times of Crisis, 26 Cardozo L Rev 2443, 2457-59 (2005);
  • 39
    • 34548217495 scopus 로고    scopus 로고
    • Can Pragmatism Be Radical? Richard Posner and Legal Pragmatism, 113
    • Michael Sullivan and Daniel J. Solove, Can Pragmatism Be Radical? Richard Posner and Legal Pragmatism, 113 Yale L J 687,711-13 (2003).
    • (2003) Yale L J , vol.687 , pp. 711-713
    • Sullivan, M.1    Solove, D.J.2
  • 40
    • 42349093254 scopus 로고    scopus 로고
    • Sullivan and Solove, 113 Yale L J at 712 (cited in note 35).
    • Sullivan and Solove, 113 Yale L J at 712 (cited in note 35).
  • 43
    • 33746028811 scopus 로고    scopus 로고
    • See, for example, Arialdi M. Miniño, Melonie P. Heron, and Betty L. Smith, Deaths: Preliminary Data for 2004,54 Natl Vital Stats Rep 19,28 table 7 (2006), online at http://www.cdc.gov/nchs/data/nvsr/nvsr54/nvsr54_19.pdf (visited Jan 12,2008).
    • See, for example, Arialdi M. Miniño, Melonie P. Heron, and Betty L. Smith, Deaths: Preliminary Data for 2004,54 Natl Vital Stats Rep 19,28 table 7 (2006), online at http://www.cdc.gov/nchs/data/nvsr/nvsr54/nvsr54_19.pdf (visited Jan 12,2008).
  • 44
    • 42349093832 scopus 로고    scopus 로고
    • See id
    • See id.
  • 45
    • 42349107947 scopus 로고    scopus 로고
    • See Jeordan Legon, Survey: Shark Summer Bred Fear, Not Facts CNN.com (Mar 14, 2003), online at http://www.cnn.com/2003/TECH/ science/03/13/shark.study/ (visited Jan 12, 2008).
    • See Jeordan Legon, Survey: "Shark Summer" Bred Fear, Not Facts CNN.com (Mar 14, 2003), online at http://www.cnn.com/2003/TECH/ science/03/13/shark.study/ (visited Jan 12, 2008).
  • 46
    • 42349115942 scopus 로고    scopus 로고
    • Air-Traveler Screening, Privacy Concerns Collide
    • See, Oct 3
    • See Fred Bayles, Air-Traveler Screening, Privacy Concerns Collide, USA Today 6A (Oct 3, 2003).
    • (2003) USA Today , vol.6 A
    • Bayles, F.1
  • 47
    • 42349114183 scopus 로고    scopus 로고
    • See, for example, Robert O'Harrow, Jr., No Place to Hide 56-63 (Free Press 2005) (discussing the lobbying efforts of Acxiom, a data brokerage company, to convince politicians of data mining's potential value for counterterrorism purposes).
    • See, for example, Robert O'Harrow, Jr., No Place to Hide 56-63 (Free Press 2005) (discussing the lobbying efforts of Acxiom, a data brokerage company, to convince politicians of data mining's potential value for counterterrorism purposes).
  • 48
    • 42349094348 scopus 로고    scopus 로고
    • Posner and Vermeule, Terror in the Balance at 12 (cited in note 16).
    • Posner and Vermeule, Terror in the Balance at 12 (cited in note 16).
  • 49
    • 42349089103 scopus 로고    scopus 로고
    • Wartime Executive Power and the National Security Agency's Surveillance Authority, Hearing before the Senate Committee on the Judiciary, 109th Cong, 2d Sess 10,15 (2006) (testimony of Alberto Gonzales, Attorney General).
    • Wartime Executive Power and the National Security Agency's Surveillance Authority, Hearing before the Senate Committee on the Judiciary, 109th Cong, 2d Sess 10,15 (2006) (testimony of Alberto Gonzales, Attorney General).
  • 50
    • 42349088361 scopus 로고    scopus 로고
    • Bob Sullivan, Have You Been Wiretapped? MSNBC.com (Jan 10,2006), online at http-i/red-tape.msnbc.com/2006/01/have_you_been_w.html (visited Jan 12,2008) (quotation marks omitted).
    • Bob Sullivan, Have You Been Wiretapped? MSNBC.com (Jan 10,2006), online at http-i/red-tape.msnbc.com/2006/01/have_you_been_w.html (visited Jan 12,2008) (quotation marks omitted).
  • 51
    • 42349113088 scopus 로고    scopus 로고
    • National Security Agency, Rasmussen Reports (Dec 28,2005), online at http://www.ras-mussenreports.com/2005/NSA.htm (visited Jan 12,2008).
    • National Security Agency, Rasmussen Reports (Dec 28,2005), online at http://www.ras-mussenreports.com/2005/NSA.htm (visited Jan 12,2008).
  • 52
    • 42349086710 scopus 로고    scopus 로고
    • Our Domestic Intelligence Crisis
    • Dec 21
    • Richard A. Posner, Our Domestic Intelligence Crisis, Wash Post A31 (Dec 21, 2005).
    • (2005) Wash Post
    • Posner, R.A.1
  • 55
    • 33644925852 scopus 로고    scopus 로고
    • A Taxonomy of Privacy, 154
    • See
    • See Daniel J. Solove, A Taxonomy of Privacy, 154 U Pa L Rev 477, 484-89 (2006).
    • (2006) U Pa L Rev , vol.477 , pp. 484-489
    • Solove, D.J.1
  • 56
    • 34247545822 scopus 로고    scopus 로고
    • See Daniel J. Solove, The First Amendment as Criminal Procedure, 82 NYU L Rev 112, 143-51 (2007) (discussing Supreme Court decisions on chilling effects and the First Amendment, and their implications for government information gathering).
    • See Daniel J. Solove, The First Amendment as Criminal Procedure, 82 NYU L Rev 112, 143-51 (2007) (discussing Supreme Court decisions on chilling effects and the First Amendment, and their implications for government information gathering).
  • 57
    • 42349115413 scopus 로고    scopus 로고
    • 425 US 435 1976
    • 425 US 435 (1976).
  • 58
    • 42349094886 scopus 로고    scopus 로고
    • Id at 442
    • Id at 442.
  • 59
    • 42349105799 scopus 로고    scopus 로고
    • 442 US 735 1979
    • 442 US 735 (1979).
  • 60
    • 42349084129 scopus 로고    scopus 로고
    • Id at 743
    • Id at 743.
  • 63
    • 42349092551 scopus 로고    scopus 로고
    • See Frederick Schauer, Profiles, Probabilities, and Stereotypes 173-74 (Belknap 2003) (discussing the tradeoff between profiles constructed in advance and those made on a case-by-case basis).
    • See Frederick Schauer, Profiles, Probabilities, and Stereotypes 173-74 (Belknap 2003) (discussing the tradeoff between profiles constructed in advance and those made on a case-by-case basis).
  • 64
    • 42349112071 scopus 로고    scopus 로고
    • Id at 173
    • Id at 173.
  • 65
    • 76649112070 scopus 로고    scopus 로고
    • Data Matching, Data Mining, and Due Process
    • 1
    • Daniel J. Steinbock, Data Matching, Data Mining, and Due Process, 40 Ga L Rev 1, 82 (2005).
    • (2005) Ga L Rev , vol.40 , pp. 82
    • Steinbock, D.J.1
  • 67
    • 42349096856 scopus 로고    scopus 로고
    • Letter from James Madison to W.T. Barry (Aug 4, 1822), in Gaillard Hunt, ed, 9 The Writings of James Madison 103, 103 (GP. Putnam's Sons 1910).
    • Letter from James Madison to W.T. Barry (Aug 4, 1822), in Gaillard Hunt, ed, 9 The Writings of James Madison 103, 103 (GP. Putnam's Sons 1910).
  • 69
    • 42349091984 scopus 로고    scopus 로고
    • Posner and Vermeule, Terror in the Balance at 55 (cited in note 16).
    • Posner and Vermeule, Terror in the Balance at 55 (cited in note 16).
  • 70
    • 42349115065 scopus 로고    scopus 로고
    • Bush on the Patriot Act and Eavesdropping
    • Dec 18
    • Bush on the Patriot Act and Eavesdropping, NY Times A43 (Dec 18, 2005).
    • (2005) NY Times
  • 72
    • 42349091811 scopus 로고    scopus 로고
    • Mary-Rose Papandrea, Under Attack: The Public's Right to Know and the War on Terror, 25 BC Third World L J 35,79 (2005) (arguing that the Freedom of Information Act and the First Amendment have proved to be insufficient tools for the public to monitor government counter-terrorism efforts).
    • Mary-Rose Papandrea, Under Attack: The Public's Right to Know and the War on Terror, 25 BC Third World L J 35,79 (2005) (arguing that the Freedom of Information Act and the First Amendment have proved to be insufficient tools for the public to monitor government counter-terrorism efforts).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.