-
1
-
-
42349093630
-
-
See Technology and Privacy Advisory Committee, Report, Safeguarding Privacy in the Fight against Terrorism (TAPAC Report) 2-5 (Mar 1, 2004), online at http://www.cdt.org/security/usapatriot/20040300tapac.pdf (visited Jan 12, 2008) (discussing the Department of Defense's and other government agencies' use of data mining as a means of intelligence gathering).
-
See Technology and Privacy Advisory Committee, Report, Safeguarding Privacy in the Fight against Terrorism ("TAPAC Report") 2-5 (Mar 1, 2004), online at http://www.cdt.org/security/usapatriot/20040300tapac.pdf (visited Jan 12, 2008) (discussing the Department of Defense's and other government agencies' use of data mining as a means of intelligence gathering).
-
-
-
-
2
-
-
42349088360
-
Finding the Face of Terror in Data
-
Sept 10
-
John M. Poindexter, Finding the Face of Terror in Data, NY Times A25 (Sept 10,2003).
-
(2003)
NY Times
-
-
Poindexter, J.M.1
-
3
-
-
42349089832
-
-
Natl, Feb 25
-
Shane Harris, TIA Lives On, Natl J 66,66-67 (Feb 25, 2006).
-
(2006)
TIA Lives On
, vol.J 66
, pp. 66-67
-
-
Harris, S.1
-
4
-
-
42349085812
-
-
TAPAC Report at 5 (cited in note 1).
-
TAPAC Report at 5 (cited in note 1).
-
-
-
-
5
-
-
42349102081
-
-
See Daniel J. Solove, Marc Rotenberg, and Paul M. Schwartz, Information Privacy Law 603-04 (Aspen 2d ed 2006). Several successive versions of the screening program have been developed and abandoned. For example, after September 11, the government sought to develop the Computer Assisted Passenger Prescreening System II (CAPPS II)-a successor to the screening program in place before September 11. CAPPS II was abandoned because it grew too far beyond its original purpose; it was later replaced with a program called Secure Flight. This was later abandoned as well. The TSA continues to develop passenger screening data mining systems.
-
See Daniel J. Solove, Marc Rotenberg, and Paul M. Schwartz, Information Privacy Law 603-04 (Aspen 2d ed 2006). Several successive versions of the screening program have been developed and abandoned. For example, after September 11, the government sought to develop the Computer Assisted Passenger Prescreening System II (CAPPS II)-a successor to the screening program in place before September 11. CAPPS II was abandoned because it grew too far beyond its original purpose; it was later replaced with a program called Secure Flight. This was later abandoned as well. The TSA continues to develop passenger screening data mining systems.
-
-
-
-
6
-
-
42349104903
-
-
Leslie Cauley, NSA Has Massive Database of Americans' Phone Calls; 3 Telecoms Help Government Collect Billions of Domestic Records, USA Today IA (May 11, 2006) (quotation marks omitted).
-
Leslie Cauley, NSA Has Massive Database of Americans' Phone Calls; 3 Telecoms Help Government Collect Billions of Domestic Records, USA Today IA (May 11, 2006) (quotation marks omitted).
-
-
-
-
7
-
-
42349106324
-
-
But see Susan Page, Lawmakers: NSA Database Incomplete; Some Who Were Briefed about the Database Identify Who Participated and Who Didn't, USA Today 2A (June 30, 2006) (explaining that the database of domestic phone call records is incomplete because certain telecommunications providers did not provide the NSA with call records).
-
But see Susan Page, Lawmakers: NSA Database Incomplete; Some Who Were Briefed about the Database Identify Who Participated and Who Didn't, USA Today 2A (June 30, 2006) (explaining that the database of domestic phone call records is incomplete because certain telecommunications providers did not provide the NSA with call records).
-
-
-
-
8
-
-
42349091459
-
-
For more details on the MATRIX program, see, Praeger
-
For more details on the MATRIX program, see Jacqueline Klosek, The War on Privacy 51-53 (Praeger 2007);
-
(2007)
The War on Privacy
, pp. 51-53
-
-
Klosek, J.1
-
9
-
-
42349116472
-
-
GAO, Data Mining: Federal Efforts Cover a Wide Range of Uses, GAO-04-548, 5 (May 2004), online at http://www.gao.gov/new.items/d04548.pdf (visited Jan 12, 2008).
-
GAO, Data Mining: Federal Efforts Cover a Wide Range of Uses, GAO-04-548, 5 (May 2004), online at http://www.gao.gov/new.items/d04548.pdf (visited Jan 12, 2008).
-
-
-
-
10
-
-
84873068098
-
-
cited in note 7, GAO, at
-
GAO, Data Mining at 2 (cited in note 7).
-
Data Mining
, pp. 2
-
-
-
12
-
-
33646405991
-
Secret Service: Against Privacy and Transparency
-
Apr 17
-
William J. Stuntz, Secret Service: Against Privacy and Transparency, New Republic 12,12 (Apr 17, 2006).
-
(2006)
New Republic
, vol.12
, pp. 12
-
-
Stuntz, W.J.1
-
13
-
-
42349106323
-
-
Id at 14
-
Id at 14.
-
-
-
-
14
-
-
84866436415
-
Constitutional Law in the Age of Balancing, 96
-
analyzing the evolution and acceptance of the balancing of interests in a wide array of different constitutional issues and discussing some of the problems that have since arisen, See
-
See T Alexander Aleinikoff, Constitutional Law in the Age of Balancing, 96 Yale L J 943, 965-72 (1987) (analyzing the evolution and acceptance of the balancing of interests in a wide array of different constitutional issues and discussing some of the problems that have since arisen).
-
(1987)
Yale L J
, vol.943
, pp. 965-972
-
-
Alexander Aleinikoff, T.1
-
16
-
-
42349087666
-
-
Id at 27
-
Id at 27.
-
-
-
-
17
-
-
42349111894
-
-
Id at 37
-
Id at 37.
-
-
-
-
19
-
-
42349083394
-
-
Id at 5
-
Id at 5.
-
-
-
-
20
-
-
42349085617
-
-
Id at 16
-
Id at 16.
-
-
-
-
21
-
-
42349117315
-
-
See id at 6
-
See id at 6.
-
-
-
-
22
-
-
42349104725
-
-
Id at 31
-
Id at 31.
-
-
-
-
23
-
-
42349109484
-
-
Id at 18
-
Id at 18.
-
-
-
-
25
-
-
0033262726
-
-
See, 84 Iowa L Rev 941,954-55
-
See Daniel J. Solove, The Darkest Domain: Deference, Judicial Review, and the Bill of Rights, 84 Iowa L Rev 941,954-55 (1999).
-
(1999)
The Darkest Domain: Deference, Judicial Review, and the Bill of Rights
-
-
Solove, D.J.1
-
26
-
-
42349113817
-
-
460 F3d 260 (2d Cir 2006).
-
460 F3d 260 (2d Cir 2006).
-
-
-
-
27
-
-
42349111715
-
-
Id at 267-68
-
Id at 267-68.
-
-
-
-
28
-
-
42349105800
-
-
Id at 269
-
Id at 269.
-
-
-
-
29
-
-
42349101909
-
-
Id at 273 quotation marks omitted
-
Id at 273 (quotation marks omitted).
-
-
-
-
30
-
-
42349095437
-
-
Id quotation marks omitted
-
Id (quotation marks omitted).
-
-
-
-
31
-
-
42349115412
-
-
The court declared: We will not peruse, parse, or extrapolate four months' worth of data in an attempt to divine how many checkpoints the City ought to deploy in the exercise of its day-to-day police power. Counter-terrorism experts and politically accountable officials have undertaken the delicate and esoteric task of deciding how best to marshal their available resources in light of the conditions prevailing on any given day. We will not-and may not-second-guess the minutiae of their considered decisions.
-
The court declared: We will not peruse, parse, or extrapolate four months' worth of data in an attempt to divine how many checkpoints the City ought to deploy in the exercise of its day-to-day police power. Counter-terrorism experts and politically accountable officials have undertaken the delicate and esoteric task of deciding how best to marshal their available resources in light of the conditions prevailing on any given day. We will not-and may not-second-guess the minutiae of their considered decisions.
-
-
-
-
32
-
-
42349111537
-
-
Id at 274
-
Id at 274.
-
-
-
-
34
-
-
42349088551
-
-
See id at 958-59, 967-68
-
See id at 958-59, 967-68.
-
-
-
-
35
-
-
42349089648
-
-
See Posner and Vermeule, Terror in the Balance at 32 (cited in note 16).
-
See Posner and Vermeule, Terror in the Balance at 32 (cited in note 16).
-
-
-
-
38
-
-
42349095436
-
-
See Daniel J. Solove, Melville's Billy Budd and Security in Times of Crisis, 26 Cardozo L Rev 2443, 2457-59 (2005);
-
See Daniel J. Solove, Melville's Billy Budd and Security in Times of Crisis, 26 Cardozo L Rev 2443, 2457-59 (2005);
-
-
-
-
39
-
-
34548217495
-
Can Pragmatism Be Radical? Richard Posner and Legal Pragmatism, 113
-
Michael Sullivan and Daniel J. Solove, Can Pragmatism Be Radical? Richard Posner and Legal Pragmatism, 113 Yale L J 687,711-13 (2003).
-
(2003)
Yale L J
, vol.687
, pp. 711-713
-
-
Sullivan, M.1
Solove, D.J.2
-
40
-
-
42349093254
-
-
Sullivan and Solove, 113 Yale L J at 712 (cited in note 35).
-
Sullivan and Solove, 113 Yale L J at 712 (cited in note 35).
-
-
-
-
43
-
-
33746028811
-
-
See, for example, Arialdi M. Miniño, Melonie P. Heron, and Betty L. Smith, Deaths: Preliminary Data for 2004,54 Natl Vital Stats Rep 19,28 table 7 (2006), online at http://www.cdc.gov/nchs/data/nvsr/nvsr54/nvsr54_19.pdf (visited Jan 12,2008).
-
See, for example, Arialdi M. Miniño, Melonie P. Heron, and Betty L. Smith, Deaths: Preliminary Data for 2004,54 Natl Vital Stats Rep 19,28 table 7 (2006), online at http://www.cdc.gov/nchs/data/nvsr/nvsr54/nvsr54_19.pdf (visited Jan 12,2008).
-
-
-
-
44
-
-
42349093832
-
-
See id
-
See id.
-
-
-
-
45
-
-
42349107947
-
-
See Jeordan Legon, Survey: Shark Summer Bred Fear, Not Facts CNN.com (Mar 14, 2003), online at http://www.cnn.com/2003/TECH/ science/03/13/shark.study/ (visited Jan 12, 2008).
-
See Jeordan Legon, Survey: "Shark Summer" Bred Fear, Not Facts CNN.com (Mar 14, 2003), online at http://www.cnn.com/2003/TECH/ science/03/13/shark.study/ (visited Jan 12, 2008).
-
-
-
-
46
-
-
42349115942
-
Air-Traveler Screening, Privacy Concerns Collide
-
See, Oct 3
-
See Fred Bayles, Air-Traveler Screening, Privacy Concerns Collide, USA Today 6A (Oct 3, 2003).
-
(2003)
USA Today
, vol.6 A
-
-
Bayles, F.1
-
47
-
-
42349114183
-
-
See, for example, Robert O'Harrow, Jr., No Place to Hide 56-63 (Free Press 2005) (discussing the lobbying efforts of Acxiom, a data brokerage company, to convince politicians of data mining's potential value for counterterrorism purposes).
-
See, for example, Robert O'Harrow, Jr., No Place to Hide 56-63 (Free Press 2005) (discussing the lobbying efforts of Acxiom, a data brokerage company, to convince politicians of data mining's potential value for counterterrorism purposes).
-
-
-
-
48
-
-
42349094348
-
-
Posner and Vermeule, Terror in the Balance at 12 (cited in note 16).
-
Posner and Vermeule, Terror in the Balance at 12 (cited in note 16).
-
-
-
-
49
-
-
42349089103
-
-
Wartime Executive Power and the National Security Agency's Surveillance Authority, Hearing before the Senate Committee on the Judiciary, 109th Cong, 2d Sess 10,15 (2006) (testimony of Alberto Gonzales, Attorney General).
-
Wartime Executive Power and the National Security Agency's Surveillance Authority, Hearing before the Senate Committee on the Judiciary, 109th Cong, 2d Sess 10,15 (2006) (testimony of Alberto Gonzales, Attorney General).
-
-
-
-
50
-
-
42349088361
-
-
Bob Sullivan, Have You Been Wiretapped? MSNBC.com (Jan 10,2006), online at http-i/red-tape.msnbc.com/2006/01/have_you_been_w.html (visited Jan 12,2008) (quotation marks omitted).
-
Bob Sullivan, Have You Been Wiretapped? MSNBC.com (Jan 10,2006), online at http-i/red-tape.msnbc.com/2006/01/have_you_been_w.html (visited Jan 12,2008) (quotation marks omitted).
-
-
-
-
51
-
-
42349113088
-
-
National Security Agency, Rasmussen Reports (Dec 28,2005), online at http://www.ras-mussenreports.com/2005/NSA.htm (visited Jan 12,2008).
-
National Security Agency, Rasmussen Reports (Dec 28,2005), online at http://www.ras-mussenreports.com/2005/NSA.htm (visited Jan 12,2008).
-
-
-
-
52
-
-
42349086710
-
Our Domestic Intelligence Crisis
-
Dec 21
-
Richard A. Posner, Our Domestic Intelligence Crisis, Wash Post A31 (Dec 21, 2005).
-
(2005)
Wash Post
-
-
Posner, R.A.1
-
55
-
-
33644925852
-
A Taxonomy of Privacy, 154
-
See
-
See Daniel J. Solove, A Taxonomy of Privacy, 154 U Pa L Rev 477, 484-89 (2006).
-
(2006)
U Pa L Rev
, vol.477
, pp. 484-489
-
-
Solove, D.J.1
-
56
-
-
34247545822
-
-
See Daniel J. Solove, The First Amendment as Criminal Procedure, 82 NYU L Rev 112, 143-51 (2007) (discussing Supreme Court decisions on chilling effects and the First Amendment, and their implications for government information gathering).
-
See Daniel J. Solove, The First Amendment as Criminal Procedure, 82 NYU L Rev 112, 143-51 (2007) (discussing Supreme Court decisions on chilling effects and the First Amendment, and their implications for government information gathering).
-
-
-
-
57
-
-
42349115413
-
-
425 US 435 1976
-
425 US 435 (1976).
-
-
-
-
58
-
-
42349094886
-
-
Id at 442
-
Id at 442.
-
-
-
-
59
-
-
42349105799
-
-
442 US 735 1979
-
442 US 735 (1979).
-
-
-
-
60
-
-
42349084129
-
-
Id at 743
-
Id at 743.
-
-
-
-
63
-
-
42349092551
-
-
See Frederick Schauer, Profiles, Probabilities, and Stereotypes 173-74 (Belknap 2003) (discussing the tradeoff between profiles constructed in advance and those made on a case-by-case basis).
-
See Frederick Schauer, Profiles, Probabilities, and Stereotypes 173-74 (Belknap 2003) (discussing the tradeoff between profiles constructed in advance and those made on a case-by-case basis).
-
-
-
-
64
-
-
42349112071
-
-
Id at 173
-
Id at 173.
-
-
-
-
65
-
-
76649112070
-
Data Matching, Data Mining, and Due Process
-
1
-
Daniel J. Steinbock, Data Matching, Data Mining, and Due Process, 40 Ga L Rev 1, 82 (2005).
-
(2005)
Ga L Rev
, vol.40
, pp. 82
-
-
Steinbock, D.J.1
-
67
-
-
42349096856
-
-
Letter from James Madison to W.T. Barry (Aug 4, 1822), in Gaillard Hunt, ed, 9 The Writings of James Madison 103, 103 (GP. Putnam's Sons 1910).
-
Letter from James Madison to W.T. Barry (Aug 4, 1822), in Gaillard Hunt, ed, 9 The Writings of James Madison 103, 103 (GP. Putnam's Sons 1910).
-
-
-
-
69
-
-
42349091984
-
-
Posner and Vermeule, Terror in the Balance at 55 (cited in note 16).
-
Posner and Vermeule, Terror in the Balance at 55 (cited in note 16).
-
-
-
-
70
-
-
42349115065
-
Bush on the Patriot Act and Eavesdropping
-
Dec 18
-
Bush on the Patriot Act and Eavesdropping, NY Times A43 (Dec 18, 2005).
-
(2005)
NY Times
-
-
-
72
-
-
42349091811
-
-
Mary-Rose Papandrea, Under Attack: The Public's Right to Know and the War on Terror, 25 BC Third World L J 35,79 (2005) (arguing that the Freedom of Information Act and the First Amendment have proved to be insufficient tools for the public to monitor government counter-terrorism efforts).
-
Mary-Rose Papandrea, Under Attack: The Public's Right to Know and the War on Terror, 25 BC Third World L J 35,79 (2005) (arguing that the Freedom of Information Act and the First Amendment have proved to be insufficient tools for the public to monitor government counter-terrorism efforts).
-
-
-
|