-
1
-
-
42349095059
-
-
Jeffrey W. Seifert, Data Mining and Homeland Security: An Overview 2 (Congressional Research Service, Jan 18, 2007), online at http://www.fas.org/sgp/crs/intel/RL31798.pdf (visited Jan 12, 2008).
-
Jeffrey W. Seifert, Data Mining and Homeland Security: An Overview 2 (Congressional Research Service, Jan 18, 2007), online at http://www.fas.org/sgp/crs/intel/RL31798.pdf (visited Jan 12, 2008).
-
-
-
-
2
-
-
42349105803
-
-
See id
-
See id.
-
-
-
-
3
-
-
42349115589
-
-
Id at 4
-
Id at 4.
-
-
-
-
4
-
-
42349086555
-
-
See Consolidated Appropriations Resolution, 2003, Pub L No 108-7, 117 Stat 11, 534 (stating that no funds appropriated or otherwise made available to the Department of Defense ... may be obligated or expended on research and development on the Total Information Awareness program, unless [statutory exceptions apply]).
-
See Consolidated Appropriations Resolution, 2003, Pub L No 108-7, 117 Stat 11, 534 (stating that "no funds appropriated or otherwise made available to the Department of Defense ... may be obligated or expended on research and development on the Total Information Awareness program, unless [statutory exceptions apply]").
-
-
-
-
5
-
-
42349115945
-
-
The Senate passed the measure by a voice vote. See 149 Cong Rec S 1379-02, 1416 (Jan 23, 2003);
-
The Senate passed the measure by a voice vote. See 149 Cong Rec S 1379-02, 1416 (Jan 23, 2003);
-
-
-
-
6
-
-
42349105612
-
-
Senate Rebuffs Domestic Spy Plan, Reuters (Jan 23, 2003), online at http://www.wired.com/ politics/law/news/2003/01/57386 (visited Jan 12, 2008).
-
Senate Rebuffs Domestic Spy Plan, Reuters (Jan 23, 2003), online at http://www.wired.com/ politics/law/news/2003/01/57386 (visited Jan 12, 2008).
-
-
-
-
7
-
-
42349099171
-
-
Consolidated Appropriations Resolution, 2003, 117 Stat at 536 ([T]he Total Information Awareness program should not be used to develop technologies for use in conducting intelligence activities or law enforcement activities against United States persons without appropriate consultation with Congress or without clear adherence to principles to protect civil liberties and privacy.).
-
Consolidated Appropriations Resolution, 2003, 117 Stat at 536 ("[T]he Total Information Awareness program should not be used to develop technologies for use in conducting intelligence activities or law enforcement activities against United States persons without appropriate consultation with Congress or without clear adherence to principles to protect civil liberties and privacy.").
-
-
-
-
9
-
-
42349115068
-
-
describing a variety of surveillance programs that survived the formal closure of TIA, See also generally, Natl, Feb 25
-
See also generally Shane Harris, TIA Lives On, Natl J 66 (Feb 25, 2006) (describing a variety of surveillance programs that survived the formal closure of TIA).
-
(2006)
TIA Lives On
, vol.J 66
-
-
Harris, S.1
-
10
-
-
42349088555
-
-
Lillie Coney, Statement to the Department of Homeland Security Data Privacy and Integrity Advisory Committee 1, 4 (Electronic Privacy Information Center, Sept 19, 2007), online at http://www.epic.org/privacy/fusion/fusion-dhs. pdf (visited Jan 12, 2008) (claiming that [i]t would be very difficult to imagine someone who would not be included in the system).
-
Lillie Coney, Statement to the Department of Homeland Security Data Privacy and Integrity Advisory Committee 1, 4 (Electronic Privacy Information Center, Sept 19, 2007), online at http://www.epic.org/privacy/fusion/fusion-dhs. pdf (visited Jan 12, 2008) (claiming that "[i]t would be very difficult to imagine someone" who would not be included in the system).
-
-
-
-
11
-
-
42349093637
-
-
Id at 3
-
Id at 3.
-
-
-
-
12
-
-
42349100974
-
-
GAO, Data Mining: Federal Efforts Cover a Wide Range of Uses, GAO-04-548, 7 (May 2004), online at http://www.gao.gov/new.items/d04548.pdf (visited Jan 12, 2008).
-
GAO, Data Mining: Federal Efforts Cover a Wide Range of Uses, GAO-04-548, 7 (May 2004), online at http://www.gao.gov/new.items/d04548.pdf (visited Jan 12, 2008).
-
-
-
-
13
-
-
42349092371
-
-
Id at 10
-
Id at 10.
-
-
-
-
14
-
-
42349096172
-
-
See id at 7 (noting, however, that the CIA and NSA did not respond to the audit).
-
See id at 7 (noting, however, that the CIA and NSA did not respond to the audit).
-
-
-
-
15
-
-
42349110583
-
Private Lives: The Agency That Could Be Big Brother
-
See also, sec 4 at, Dec 25
-
See also James Bamford, Private Lives: The Agency That Could Be Big Brother, NY Times sec 4 at 1 (Dec 25, 2005).
-
(2005)
NY Times
, pp. 1
-
-
Bamford, J.1
-
16
-
-
84873068098
-
-
cited in note 10, GAO, at
-
GAO, Data Mining at 30 (cited in note 10).
-
Data Mining
, pp. 30
-
-
-
17
-
-
42349098669
-
-
Id
-
Id.
-
-
-
-
18
-
-
42349117141
-
-
Walter Pincus, Protesters Found in Database; ACLU Is Questioning Entries in Defense Dept. System, Wash Post A8 (Jan 17, 2007). In April 2007, the Pentagon announced it would be ending the program.
-
Walter Pincus, Protesters Found in Database; ACLU Is Questioning Entries in Defense Dept. System, Wash Post A8 (Jan 17, 2007). In April 2007, the Pentagon announced it would be ending the program.
-
-
-
-
19
-
-
42349105246
-
Pentagon Intelligence Chief Proposes Ending a Database
-
Apr 25
-
Mark Mazzetti, Pentagon Intelligence Chief Proposes Ending a Database, NY Times A18 (Apr 25, 2007).
-
(2007)
NY Times
, vol.A18
-
-
Mazzetti, M.1
-
20
-
-
42349106862
-
-
Eric Lichtblau and Mark Mazzetti, Military Expands Intelligence Role in U.S., NY Times sec 1 at 1 (Jan 14, 2007) (describing claims that the documents are useful even when the initial suspicions are unproven).
-
Eric Lichtblau and Mark Mazzetti, Military Expands Intelligence Role in U.S., NY Times sec 1 at 1 (Jan 14, 2007) (describing claims that the documents are useful "even when the initial suspicions are unproven").
-
-
-
-
21
-
-
42349114578
-
-
The most prominent effort in this regard is the FBI's System-to-Assess-Risk (STAR) program, which makes use of the Foreign Terrorist Tracking Task Force Data Mart, consisting of a wide array of sources, to acquire more information about suspected terrorists and other persons of interest. DOJ, Report on Data-mining Activities Pursuant to Section 126 of the USA Patriot Improvement and Reauthorization Act of 2005 7-10 (July 9, 2007), online at http://www.epic.org/privacy/fusion/doj-dataming.pdf (visited Jan 12, 2008).
-
The most prominent effort in this regard is the FBI's System-to-Assess-Risk (STAR) program, which makes use of the Foreign Terrorist Tracking Task Force "Data Mart," consisting of a wide array of sources, to acquire more information about suspected terrorists and other "persons of interest." DOJ, Report on "Data-mining" Activities Pursuant to Section 126 of the USA Patriot Improvement and Reauthorization Act of 2005 7-10 (July 9, 2007), online at http://www.epic.org/privacy/fusion/doj-dataming.pdf (visited Jan 12, 2008).
-
-
-
-
22
-
-
42349089294
-
-
See David Johnston and Eric Lipton, U.S. Report to Fault Wide Use of Special Subpoenas by F.B.I., NY Times Al (Mar 9, 2007).
-
See David Johnston and Eric Lipton, U.S. Report to Fault Wide Use of Special Subpoenas by F.B.I., NY Times Al (Mar 9, 2007).
-
-
-
-
23
-
-
42349108507
-
Anti-terrorism Program Mines IRS' Records; Privacy Advocates Are Concerned That Tax Data and Other Information May Be Used Improperly
-
C1 Jan 15
-
Dalia Naamani-Goldman, Anti-terrorism Program Mines IRS' Records; Privacy Advocates Are Concerned That Tax Data and Other Information May Be Used Improperly, LA Times C1 (Jan 15, 2007).
-
(2007)
LA Times
-
-
Naamani-Goldman, D.1
-
24
-
-
33748970058
-
Anglo-American Privacy and Surveillance
-
For a description of the types of information data brokers can produce, see
-
For a description of the types of information data brokers can produce, see Laura K. Donohue, Anglo-American Privacy and Surveillance, 96 J Crim L & Criminol 1059, 1142 (2006).
-
(2006)
96 J Crim L & Criminol
, vol.1059
, pp. 1142
-
-
Donohue, L.K.1
-
25
-
-
77955320294
-
Big Brother's Little Helpers: How ChoicePoint and Other Commercial Data Brokers Collect and Package Your Data for Law Enforcement
-
595
-
Chris Jay Hoofnagle, Big Brother's Little Helpers: How ChoicePoint and Other Commercial Data Brokers Collect and Package Your Data for Law Enforcement, 29 NC J Intl L & Comm Reg 595, 600 (2004).
-
(2004)
NC J Intl L & Comm Reg
, vol.29
, pp. 600
-
-
Jay Hoofnagle, C.1
-
26
-
-
42349087667
-
-
Accurint Overview, online at http://www.accurint.com/aboutus.html (visited Jan 12, 2008).
-
Accurint Overview, online at http://www.accurint.com/aboutus.html (visited Jan 12, 2008).
-
-
-
-
28
-
-
42349116301
-
-
See id at 1151-52. MATRIX downsized in large part because states involved in the consortium were concerned about both costs and privacy. See id.
-
See id at 1151-52. MATRIX downsized in large part because states involved in the consortium were concerned about both costs and privacy. See id.
-
-
-
-
29
-
-
42349093080
-
-
See, for example, Anita Ramasastry, Lost in Translation?: Data Mining, National Security and the Adverse Inference Problem, 22 Santa Clara Computer & High Tech L J 757, 794 (2006) ([P]erhaps the best way to begin to imagine how we can safeguard privacy in the wake of data mining is to require the government to provide robust data-mining privacy impact assessments.);
-
See, for example, Anita Ramasastry, Lost in Translation?: Data Mining, National Security and the "Adverse Inference" Problem, 22 Santa Clara Computer & High Tech L J 757, 794 (2006) ("[P]erhaps the best way to begin to imagine how we can safeguard privacy in the wake of data mining is to require the government to provide robust data-mining privacy impact assessments.");
-
-
-
-
30
-
-
42349110408
-
-
Jay Stanley and Barry Steinhardt, Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society Yl (ACLU, Jan 2003), online at www.aclu.org/FilesPDFs/aclu_report_bigger_monster_weaker_chains.pdf (visited Jan 12, 2008) (asserting that if programs like TIA are allowed to continue we will have the worst of both worlds: poor security and a supercharged surveillance tool that would destroy Americans' privacy and threaten our freedom).
-
Jay Stanley and Barry Steinhardt, Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society Yl (ACLU, Jan 2003), online at www.aclu.org/FilesPDFs/aclu_report_bigger_monster_weaker_chains.pdf (visited Jan 12, 2008) (asserting that if programs like TIA are allowed to continue we will "have the worst of both worlds: poor security and a supercharged surveillance tool that would destroy Americans' privacy and threaten our freedom").
-
-
-
-
31
-
-
42349088552
-
-
See Seifert, Data Mining and Homeland Security at 9, 11 (cited in note 1) (describing how the program would use data provided to the airline and then return a green, yellow, or red indication).
-
See Seifert, Data Mining and Homeland Security at 9, 11 (cited in note 1) (describing how the program would use data provided to the airline and then return a green, yellow, or red indication).
-
-
-
-
32
-
-
42349099537
-
-
William J. Krouse, The Multi-state Anti-terrorism Information Exchange (MATRIX) Pilot Project 9 (Congressional Research Service, Aug 18, 2004), online at http://www.fas.org/irp/crs/ RL32536.pdf (visited Jan 12, 2008).
-
William J. Krouse, The Multi-state Anti-terrorism Information Exchange (MATRIX) Pilot Project 9 (Congressional Research Service, Aug 18, 2004), online at http://www.fas.org/irp/crs/ RL32536.pdf (visited Jan 12, 2008).
-
-
-
-
33
-
-
42349096857
-
-
See Defense Advanced Research Projects Agency (DARPA), Report to Congress regarding the Terrorism Information Awareness Program 3-9 (May 20, 2003), online at http://www.eff.org/ Privacy/TIA/TIA-report.pdf (visited Jan 12, 2008).
-
See Defense Advanced Research Projects Agency (DARPA), Report to Congress regarding the Terrorism Information Awareness Program 3-9 (May 20, 2003), online at http://www.eff.org/ Privacy/TIA/TIA-report.pdf (visited Jan 12, 2008).
-
-
-
-
34
-
-
42349086389
-
-
MATRIX is said to have assisted law enforcement officials in almost one thousand cases in a two-year period, primarily in terms of tracking down suspects and victims. See Florida Department of Law Enforcement, News Release, MATRIX Pilot Project Concludes Apr 15, 2005
-
MATRIX is said to have assisted law enforcement officials in almost one thousand cases in a two-year period, primarily in terms of tracking down suspects and victims. See Florida Department of Law Enforcement, News Release, MATRIX Pilot Project Concludes (Apr 15, 2005).
-
-
-
-
35
-
-
42349101747
-
-
Proponents of Secure Flight assert that, at worst, its margin of error is 30 percent and may be as low as 2 percent. See sources cited in Stephen W. Dummer, Comment, Secure Flight and Dataveillance, A New Type of Civil Liberties Erosion: Stripping Your Rights When You Don't Even Know It, 75 Miss L J 583, 606 nn 128-29 (2006).
-
Proponents of Secure Flight assert that, at worst, its margin of error is 30 percent and may be as low as 2 percent. See sources cited in Stephen W. Dummer, Comment, Secure Flight and Dataveillance, A New Type of Civil Liberties Erosion: Stripping Your Rights When You Don't Even Know It, 75 Miss L J 583, 606 nn 128-29 (2006).
-
-
-
-
36
-
-
42349083211
-
-
These data are highly suspect, however. See GAO, Aviation Security: Computer-assisted Passenger Prescreening System Faces Significant Implementation Challenges 15 (Feb 2004), online at http://www.gao.gov/new.items/d04385.pdf (visited Jan 12, 2008) ([A] senior program official said that TSA has no indication of the accuracy of information contained in government databases.); Dummer, 75 Miss L J at 607 & n 131 (reporting that between 400 and 1, 200 innocent people will be flagged per day).
-
These data are highly suspect, however. See GAO, Aviation Security: Computer-assisted Passenger Prescreening System Faces Significant Implementation Challenges 15 (Feb 2004), online at http://www.gao.gov/new.items/d04385.pdf (visited Jan 12, 2008) ("[A] senior program official said that TSA has no indication of the accuracy of information contained in government databases."); Dummer, 75 Miss L J at 607 & n 131 (reporting that between 400 and 1, 200 innocent people will be flagged per day).
-
-
-
-
37
-
-
42349112262
-
-
GAO, Data Mining at 9 (cited in note 10) (describing the C & P Data Analysis program used by the Veterans Benefits Administration); Hearing before the House Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, House Committee on Governmental Reform 3-4 (March 25, 2003) (testimony of Florida state Senator Paula B. Dockery) (discussing the use of data mining to investigate money laundering and narcotics smuggling);
-
GAO, Data Mining at 9 (cited in note 10) (describing the C & P Data Analysis program used by the Veterans Benefits Administration); Hearing before the House Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census, House Committee on Governmental Reform 3-4 (March 25, 2003) (testimony of Florida state Senator Paula B. Dockery) (discussing the use of data mining to investigate money laundering and narcotics smuggling);
-
-
-
-
38
-
-
42349102082
-
-
George Cahlink, Data Mining Taps the Trends; Data Mining Helps Managers Make Sense and Better Use of Mounds of Government Data, Gov Exec Mag 85 (Oct 1, 2000) (reporting that tracking down fraud is the most common use of data mining).
-
George Cahlink, Data Mining Taps the Trends; Data Mining Helps Managers Make Sense and Better Use of Mounds of Government Data, Gov Exec Mag 85 (Oct 1, 2000) (reporting that tracking down fraud is the most common use of data mining).
-
-
-
-
39
-
-
33745419724
-
Making the No Fly List Fly: A Due Process Model for Terrorist Watchlists, 115
-
Justin Florence, Making the No Fly List Fly: A Due Process Model for Terrorist Watchlists, 115 Yale L J 2148, 2153 (2006).
-
(2006)
Yale L J
, vol.2148
, pp. 2153
-
-
Florence, J.1
-
40
-
-
42349095989
-
-
US PIRG, Mistakes Do Happen: A Look at Errors in Consumer Credit Reports (June 17, 2004), online at http://www.uspirg.org/home/reports/ report-archives/financial-privacy-security/ financial-privacy-security/mistakes- do-happen-a-look-at-errors-in-consumer-credit-reports (visited Jan 12, 2008).
-
US PIRG, Mistakes Do Happen: A Look at Errors in Consumer Credit Reports (June 17, 2004), online at http://www.uspirg.org/home/reports/ report-archives/financial-privacy-security/ financial-privacy-security/mistakes- do-happen-a-look-at-errors-in-consumer-credit-reports (visited Jan 12, 2008).
-
-
-
-
41
-
-
42349114981
-
-
Id
-
Id.
-
-
-
-
42
-
-
58149139052
-
-
cited in note 1, discussing interoperability problems associated with searching and analyzing multiple, disparate databases, at
-
Seifert, Data Mining and Homeland Security at 22 (cited in note 1) (discussing "interoperability" problems associated with searching and analyzing multiple, disparate databases).
-
Data Mining and Homeland Security
, pp. 22
-
-
Seifert1
-
43
-
-
42349085279
-
-
Amy Belasco, Total Information Awareness Programs: Funding, Composition, and Oversight Issues 15-16 (Congressional Research Service, Mar 21, 2003), online at http://usacm.acm.org/ usacm/PDF/CRSTIAReport.pdf (visited Jan 12, 2008) (positing a 2.6:1 false positive rate in credit card fraud investigations).
-
Amy Belasco, Total Information Awareness Programs: Funding, Composition, and Oversight Issues 15-16 (Congressional Research Service, Mar 21, 2003), online at http://usacm.acm.org/ usacm/PDF/CRSTIAReport.pdf (visited Jan 12, 2008) (positing a 2.6:1 false positive rate in credit card fraud investigations).
-
-
-
-
44
-
-
42349115944
-
-
See id at 16 providing an example producing a 200:1 false positive rate
-
See id at 16 (providing an example producing a 200:1 false positive rate).
-
-
-
-
45
-
-
42349116644
-
-
According to the New York Times, the NSA program generated thousands of tips in the months following 9/11 but virtually none panned out.
-
According to the New York Times, the NSA program generated thousands of tips in the months following 9/11 but virtually none panned out.
-
-
-
-
46
-
-
42349116110
-
-
Lowell Bergman, et al, Domestic Surveillance: The Program; Spy Agency Data after Sept. 11 Led F.B.I, to Dead Ends, NY Times Al (Jan 17, 2006) (reporting how the NSA flooded the FBI with tips, virtually all of which were dead ends or innocent Americans).
-
Lowell Bergman, et al, Domestic Surveillance: The Program; Spy Agency Data after Sept. 11 Led F.B.I, to Dead Ends, NY Times Al (Jan 17, 2006) (reporting how the NSA flooded the FBI with tips, virtually all of which were "dead ends or innocent Americans").
-
-
-
-
47
-
-
42349108851
-
-
See also note 16 and accompanying text. Seisint claimed to have generated a list of 120, 000 names with High Terrorist Factor (HTF) scores and that scores of arrests were made based on this information. The validity of these arrests, assuming they occurred, has not been corroborated, and the HTF feature was reportedly dropped because of concerns about privacy abuses. Brian Bergstein, Database Measured Terrorism Quotient, AP (May 23, 2004).
-
See also note 16 and accompanying text. Seisint claimed to have generated a list of 120, 000 names with "High Terrorist Factor" (HTF) scores and that "scores of arrests" were made based on this information. The validity of these arrests, assuming they occurred, has not been corroborated, and the HTF feature was reportedly dropped because of concerns about privacy abuses. Brian Bergstein, Database Measured "Terrorism Quotient," AP (May 23, 2004).
-
-
-
-
48
-
-
42349085098
-
-
For examples of profiling in domestic spying, see ACLU, FBI Counterterrorism Unit Spies on Peaceful, Faith-Based Protest Group (May 4, 2006, online at (visited Jan 12, 2008, describing the results of a FOIA request showing the FBI spied on School of the Americas Watch);
-
For examples of profiling in domestic spying, see ACLU, FBI Counterterrorism Unit Spies on Peaceful, Faith-Based Protest Group (May 4, 2006), online at http://www.aclu.org/safefree/spying/25442prs20060504.html (visited Jan 12, 2008) (describing the results of a FOIA request showing the FBI spied on School of the Americas Watch);
-
-
-
-
49
-
-
42349083395
-
-
William E. Gibson, Boca Activist Blasts Spying Acts: Anti-Bush Groups Targeted, He Says, S Fla Sun-Sentinel 3A (Jan 21, 2006) (reporting on the use of a domestic spying program to investigate the Truth Project, a political group adverse to President Bush's politics);
-
William E. Gibson, Boca Activist Blasts Spying Acts: Anti-Bush Groups Targeted, He Says, S Fla Sun-Sentinel 3A (Jan 21, 2006) (reporting on the use of a domestic spying program to investigate the Truth Project, a political group adverse to President Bush's politics);
-
-
-
-
51
-
-
42349103293
-
-
Matthew Rothschild, Rumsfeld Spies on Quakers and Grannies, The Progressive (Dec 16, 2005), online at http://progressive.org/mag_mc121605 (visited Jan 12, 2008) (criticizing Pentagon pohtical spying and linking to a partial spreadsheet from the Pentagon listing some of the targeted pohtical groups).
-
Matthew Rothschild, Rumsfeld Spies on Quakers and Grannies, The Progressive (Dec 16, 2005), online at http://progressive.org/mag_mc121605 (visited Jan 12, 2008) (criticizing Pentagon "pohtical spying" and linking to a partial spreadsheet from the Pentagon listing some of the targeted pohtical groups).
-
-
-
-
52
-
-
42349086554
-
-
The federal government has admitted as much with respect to immigrants. See Privacy Act of 1974: System of Records, 68 Fed Reg 45265-01, 45268 (2003) (describing [r]outine uses of records maintained in the system ... [by] Federal, State, local, international, or foreign agencies or authorities, including those concerned with law enforcement, visas and immigration).
-
The federal government has admitted as much with respect to immigrants. See Privacy Act of 1974: System of Records, 68 Fed Reg 45265-01, 45268 (2003) (describing "[r]outine uses of records maintained in the system ... [by] Federal, State, local, international, or foreign agencies or authorities, including those concerned with law enforcement, visas and immigration").
-
-
-
-
54
-
-
42349105801
-
-
Justin Rood, FBI Terror Watch List Out of Control, ABC News: The Blotter (June 13, 2007), online at http://blogs.abcnews.com/ theblotter/2007/06/fbi_terror_watc.html (visited Jan 12, 2008).
-
Justin Rood, FBI Terror Watch List "Out of Control," ABC News: The Blotter (June 13, 2007), online at http://blogs.abcnews.com/ theblotter/2007/06/fbi_terror_watc.html (visited Jan 12, 2008).
-
-
-
-
55
-
-
42349092552
-
Digital IDs Can Help Prevent Terrorism
-
Oct 8
-
Larry Ellison, Digital IDs Can Help Prevent Terrorism, Wall St J A26 (Oct 8, 2001).
-
(2001)
Wall St J
, vol.A26
-
-
Ellison, L.1
-
56
-
-
42349097518
-
-
A number of prosecutions have been brought against government officials who have misused databases. See generally, for example, United States v Stanley, 2006 WL 2792904 (ND Okla) (upholding an indictment against Tulsa police officers charged with theft of confidential information stored in police department computers);
-
A number of prosecutions have been brought against government officials who have misused databases. See generally, for example, United States v Stanley, 2006 WL 2792904 (ND Okla) (upholding an indictment against Tulsa police officers charged with "theft" of confidential information stored in police department computers);
-
-
-
-
57
-
-
42349099903
-
-
United States v Czubinski, 106 F3d 1069 (1st Cir 1997) (reversing the conviction of an 1RS employee prosecuted for trolling 1RS databases for personal enjoyment). Two other cases involving allegedly similar facts are United States v Fudge (convicting an FBI analyst of improperly using law enforcement databases) and United States v Pellicano (alleging bribery of Los Angeles police to obtain access to law enforcement databases), neither of which are reported. Email from Howard W. Cox, Assistant Deputy Chief, DOJ Computer Crime & Intellectual Property Section, to Christopher Slobogin (Oct 25, 2007).
-
United States v Czubinski, 106 F3d 1069 (1st Cir 1997) (reversing the conviction of an 1RS employee prosecuted for trolling 1RS databases for personal enjoyment). Two other cases involving allegedly similar facts are United States v Fudge (convicting an FBI analyst of improperly using law enforcement databases) and United States v Pellicano (alleging bribery of Los Angeles police to obtain access to law enforcement databases), neither of which are reported. Email from Howard W. Cox, Assistant Deputy Chief, DOJ Computer Crime & Intellectual Property Section, to Christopher Slobogin (Oct 25, 2007).
-
-
-
-
58
-
-
84928448532
-
Teleinformatics, Transborder Data Flows and the Emerging Struggle for Information: An Introduction to the Arrival of the New Information Age
-
89
-
Anthony Paul Miller, Teleinformatics, Transborder Data Flows and the Emerging Struggle for Information: An Introduction to the Arrival of the New Information Age, 20 Colum J L & Soc Probs 89, 111-12 (1986).
-
(1986)
Colum J L & Soc Probs
, vol.20
, pp. 111-112
-
-
Paul Miller, A.1
-
61
-
-
42349085813
-
-
Barbara Cassin, The New World According to Google, Le Nouvel Observateur (Feb 8, 2007), online at http://hebdo.nouvelobs.com/p2205/articles/ a332473.html (visited Jan 12, 2008). An unofficial English translation is online at http://www.truthout.org/docs_2006/021307G.shtml (visited Jan 12, 2008).
-
Barbara Cassin, The New World According to Google, Le Nouvel Observateur (Feb 8, 2007), online at http://hebdo.nouvelobs.com/p2205/articles/ a332473.html (visited Jan 12, 2008). An unofficial English translation is online at http://www.truthout.org/docs_2006/021307G.shtml (visited Jan 12, 2008).
-
-
-
-
62
-
-
42349105420
-
-
For a fairly up-to-date description of the statutes and a critique of them, see, 75 Miss L J 139
-
For a fairly up-to-date description of the statutes and a critique of them, see Christopher Slobogin, Transaction Surveillance by the Government, 75 Miss L J 139, 149-64 (2005).
-
(2005)
Transaction Surveillance by the Government
, pp. 149-164
-
-
Slobogin, C.1
-
63
-
-
42349107370
-
-
According to the GAO, none of the five best-known data mining efforts aimed at terrorists have complied with federal law requiring an assessment of their impact on privacy. Matthew B. Stannard, U.S. Phone-Call Database Ignites Privacy Uproar; Data Mining: Commonly Used in Business to Find Patterns, It Rarely Focuses on Individuals, San Fran Chron A1 (May 12, 2006).
-
According to the GAO, none of the five best-known data mining efforts aimed at terrorists have complied with federal law requiring an assessment of their impact on privacy. Matthew B. Stannard, U.S. Phone-Call Database Ignites Privacy Uproar; Data Mining: Commonly Used in Business to Find Patterns, It Rarely Focuses on Individuals, San Fran Chron A1 (May 12, 2006).
-
-
-
-
64
-
-
42349117140
-
-
In this discussion, I entirely sidestep the important issue of whether the constitutional analysis changes when the government can make a plausible claim that a wartime enemy is involved. Compare John Yoo, The Terrorist Surveillance Program and the Constitution, 14 Geo Mason U L Rev 565, 566 (2007) (arguing that the NSA program, described below, is a constitutional exercise of the president's wartime powers),
-
In this discussion, I entirely sidestep the important issue of whether the constitutional analysis changes when the government can make a plausible claim that a wartime enemy is involved. Compare John Yoo, The Terrorist Surveillance Program and the Constitution, 14 Geo Mason U L Rev 565, 566 (2007) (arguing that the NSA program, described below, is a constitutional exercise of the president's wartime powers),
-
-
-
-
65
-
-
33745955352
-
-
with David Cole and Mark S. Lederman, The National Security Agency's Domestic Spying Program: Framing the Debate, 81 Ind L J 1355, 1359 (2006) (arguing to the contrary in the course of introducing a symposium on War, Terrorism, and Torture: Limits on Presidential Power in the 21st Century).
-
with David Cole and Mark S. Lederman, The National Security Agency's Domestic Spying Program: Framing the Debate, 81 Ind L J 1355, 1359 (2006) (arguing to the contrary in the course of introducing a symposium on "War, Terrorism, and Torture: Limits on Presidential Power in the 21st Century").
-
-
-
-
66
-
-
42349107752
-
-
See Whalen v Roe, 429 US 589, 605 (1977) (stating that [t]he right to collect and use [medical] data for public purposes is typically accompanied by a concomitant statutory or regulatory duty to avoid unwarranted disclosures and that such a duty arguably has its roots in the Constitution).
-
See Whalen v Roe, 429 US 589, 605 (1977) (stating that "[t]he right to collect and use [medical] data for public purposes is typically accompanied by a concomitant statutory or regulatory duty to avoid unwarranted disclosures" and that such a duty "arguably has its roots in the Constitution").
-
-
-
-
67
-
-
42349101910
-
-
See Daniel J. Steinbock, Designating the Dangerous: From Blacklists to Watchlists, 30 Seattle U L Rev 65, 105-10 (2006) (assessing the value of adversarial proceedings to contest inclusion on a watchlist as being impractical).
-
See Daniel J. Steinbock, Designating the Dangerous: From Blacklists to Watchlists, 30 Seattle U L Rev 65, 105-10 (2006) (assessing the value of adversarial proceedings to contest inclusion on a watchlist as being impractical).
-
-
-
-
68
-
-
0347315060
-
Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People from Speaking about You, 52
-
See
-
See Eugene Volokh, Freedom of Speech and Information Privacy: The Troubling Implications of a Right to Stop People from Speaking about You, 52 Stan L Rev 1049, 1051 (2000).
-
(2000)
Stan L Rev
, vol.1049
, pp. 1051
-
-
Volokh, E.1
-
69
-
-
34247545822
-
The First Amendment as Criminal Procedure
-
See, 112
-
See Daniel J. Solove, The First Amendment as Criminal Procedure, 82 NYU L Rev 112, 114-15 (2007).
-
(2007)
NYU L Rev
, vol.82
, pp. 114-115
-
-
Solove, D.J.1
-
70
-
-
42349106860
-
-
Despite his First Amendment concerns, Volokh would recognize implicit privacyprotective contracts between citizens and information-gathering entities in situations where privacy is generally expected. See Volokh, 52 Stan L Rev at 1057-60 (cited in note 52). My argument below (based in part on empirical research) is that people expect privacy with respect to the information obtained through data mining and thus implicitly contract for it. Solove argues that the First Amendment is needed to pick up the slack created by the Court's third-party records cases. See Solove, 82 NYU L Rev at 123-28 (cited in note 53). I argue that the Fourth Amendment, properly construed, should lead to reversal of those cases.
-
Despite his First Amendment concerns, Volokh would recognize implicit privacyprotective contracts between citizens and information-gathering entities in situations where privacy is generally expected. See Volokh, 52 Stan L Rev at 1057-60 (cited in note 52). My argument below (based in part on empirical research) is that people expect privacy with respect to the information obtained through data mining and thus implicitly contract for it. Solove argues that the First Amendment is needed to pick up the slack created by the Court's third-party records cases. See Solove, 82 NYU L Rev at 123-28 (cited in note 53). I argue that the Fourth Amendment, properly construed, should lead to reversal of those cases.
-
-
-
-
71
-
-
42349100054
-
-
389 US 347, 362 (1967) (Harlan concurring). See also California v Ciraolo, 476 US 207, 211 (1986).
-
389 US 347, 362 (1967) (Harlan concurring). See also California v Ciraolo, 476 US 207, 211 (1986).
-
-
-
-
72
-
-
42349101153
-
-
For a defense of this quantification of Fourth Amendment standards, see Christopher Slobogin, Let's Not Bury Terry: A Call for Rejuvenation of the Proportionality Principle, 72 St John's L Rev 1053, 1082-85 (1998) (describing probable cause as a 50 percent level of certainty and reasonable suspicion as 30 percent, and arguing that such percentages should be increased but still on a sliding scale).
-
For a defense of this quantification of Fourth Amendment standards, see Christopher Slobogin, Let's Not Bury Terry: A Call for Rejuvenation of the Proportionality Principle, 72 St John's L Rev 1053, 1082-85 (1998) (describing probable cause as a 50 percent level of certainty and reasonable suspicion as 30 percent, and arguing that such percentages should be increased but still on a sliding scale).
-
-
-
-
73
-
-
42349087098
-
-
425 US 435 1976
-
425 US 435 (1976).
-
-
-
-
74
-
-
42349097193
-
-
Id at 442, quoting Katz, 389 US at 351.
-
Id at 442, quoting Katz, 389 US at 351.
-
-
-
-
75
-
-
42349115758
-
-
Miller, 425 US at 443.
-
Miller, 425 US at 443.
-
-
-
-
76
-
-
42349093835
-
-
442 US 735 1979
-
442 US 735 (1979).
-
-
-
-
77
-
-
42349099169
-
-
See id at 742
-
See id at 742.
-
-
-
-
78
-
-
42349093256
-
-
See 425 US at 442
-
See 425 US at 442.
-
-
-
-
79
-
-
42349107753
-
-
532 US 67 2001
-
532 US 67 (2001).
-
-
-
-
80
-
-
42349104904
-
-
See id at 86
-
See id at 86.
-
-
-
-
81
-
-
42349097026
-
-
Id at 78
-
Id at 78.
-
-
-
-
82
-
-
42349104029
-
-
547 US 103 2006
-
547 US 103 (2006).
-
-
-
-
83
-
-
42349095058
-
-
Id at 114
-
Id at 114.
-
-
-
-
84
-
-
42349112449
-
-
Id at 128 (Roberts dissenting) (emphasis omitted).
-
Id at 128 (Roberts dissenting) (emphasis omitted).
-
-
-
-
85
-
-
42349084882
-
-
Id at 115 n 4 majority
-
Id at 115 n 4 (majority).
-
-
-
-
86
-
-
42349110790
-
Beyond the (Current) Fourth Amendment: Protecting Third Party Information, Third Parties, and the Rest of Us Too
-
See, 975
-
See Stephen E. Henderson, Beyond the (Current) Fourth Amendment: Protecting Third Party Information, Third Parties, and the Rest of Us Too, 34 Pepperdine L Rev 975, 985-1018 (2007).
-
(2007)
Pepperdine L Rev
, vol.34
, pp. 985-1018
-
-
Henderson, S.E.1
-
87
-
-
42349088553
-
-
See People v Abbott, 208 Cal Rptr 738, 741 (1984).
-
See People v Abbott, 208 Cal Rptr 738, 741 (1984).
-
-
-
-
88
-
-
42349099353
-
-
See generally In re Maxfield, 945 P2d 196 (Wash 1997) (four justices holding that electricity records are protected by the state constitution, four justices disagreeing with that holding, and one justice agreeing with the dissent's constitutional analysis but finding a statutory basis for siding with the first group of justices).
-
See generally In re Maxfield, 945 P2d 196 (Wash 1997) (four justices holding that electricity records are protected by the state constitution, four justices disagreeing with that holding, and one justice agreeing with the dissent's constitutional analysis but finding a statutory basis for siding with the first group of justices).
-
-
-
-
89
-
-
42349093257
-
-
See, for example, Commonwealth v Duncan, 817 A2d 455, 463 (Pa 2003) ([A] particular ATM card number is obviously different in kind from the disclosure of substantive bank records ...A person's name and address do not, by themselves, reveal anything concerning his personal affairs, opinions, habits or associations. Such innocuous information does not provide or complete a virtual current biography) (quotation marks omitted).
-
See, for example, Commonwealth v Duncan, 817 A2d 455, 463 (Pa 2003) ("[A] particular ATM card number is obviously different in kind from the disclosure of substantive bank records ...A person's name and address do not, by themselves, reveal anything concerning his personal affairs, opinions, habits or associations. Such innocuous information does not provide or complete a virtual current biography") (quotation marks omitted).
-
-
-
-
90
-
-
42349096340
-
-
See also People v Sporleder, 666 P2d 135, 142 (Colo 1983) (fearing that allowing the government to acquire all of an individual's telephone records would give it the capacity to create a virtual mosaic of a person's life).
-
See also People v Sporleder, 666 P2d 135, 142 (Colo 1983) (fearing that allowing the government to acquire all of an individual's telephone records would give it the capacity to create a "virtual mosaic of a person's life").
-
-
-
-
91
-
-
42349084519
-
-
See Henderson, 34 Pepperdine L Rev at 988-89 (cited in note 70).
-
See Henderson, 34 Pepperdine L Rev at 988-89 (cited in note 70).
-
-
-
-
92
-
-
42349109614
-
-
533 US 27 2001
-
533 US 27 (2001).
-
-
-
-
93
-
-
42349113456
-
-
Id at 37-38 (The Fourth Amendment's protection of the home has never been tied to measurement of the quality or quantity of information obtained__In the home, our cases show, all details are intimate details, because the entire area is held safe from prying government eyes.).
-
Id at 37-38 ("The Fourth Amendment's protection of the home has never been tied to measurement of the quality or quantity of information obtained__In the home, our cases show, all details are intimate details, because the entire area is held safe from prying government eyes.").
-
-
-
-
94
-
-
42349102599
-
-
See In re Maxfield, 945 P2d at 207 (Guy dissenting) (Electrical consumption information, unlike telephone or bank records or garbage, does not reveal discrete information about a customer's activities.).
-
See In re Maxfield, 945 P2d at 207 (Guy dissenting) ("Electrical consumption information, unlike telephone or bank records or garbage, does not reveal discrete information about a customer's activities.").
-
-
-
-
95
-
-
0347033951
-
Three Concepts of Privacy, 89
-
See
-
See Robert C. Post, Three Concepts of Privacy, 89 Georgetown L J 2087, 2092, 2094 (2001).
-
(2001)
Georgetown L J 2087
, vol.2092
, pp. 2094
-
-
Post, R.C.1
-
96
-
-
25144444373
-
A Social Networks Theory of Privacy, 72
-
See
-
See Lior Jacob Strahilevitz, A Social Networks Theory of Privacy, 72 U Chi L Rev 919, 932 (2005).
-
(2005)
U Chi L Rev
, vol.919
, pp. 932
-
-
Jacob Strahilevitz, L.1
-
97
-
-
42349099539
-
-
See id at 931-35
-
See id at 931-35.
-
-
-
-
98
-
-
42349088182
-
-
Id at 967
-
Id at 967.
-
-
-
-
99
-
-
13344274350
-
Public Privacy: Camera Surveillance of Public Places and the Right to Anonymity
-
See
-
See Christopher Slobogin, Public Privacy: Camera Surveillance of Public Places and the Right to Anonymity, 11 Miss L J 213, 275-76 (2002);
-
(2002)
11 Miss L
, vol.J 213
, pp. 275-276
-
-
Slobogin, C.1
-
100
-
-
0348236668
-
Reasonable Expectations of Privacy and Autonomy in Fourth Amendment Cases: An Empirical Look at "Understandings Recognized and Permitted by Society," 42
-
Christopher Slobogin and Joseph Schumacher, Reasonable Expectations of Privacy and Autonomy in Fourth Amendment Cases: An Empirical Look at "Understandings Recognized and Permitted by Society," 42 Duke L J 727, 735-37 (1993).
-
(1993)
Duke L J
, vol.727
, pp. 735-737
-
-
Slobogin, C.1
Schumacher, J.2
-
102
-
-
42349106326
-
-
See Chimel v California, 395 US 752, 763 (1969).
-
See Chimel v California, 395 US 752, 763 (1969).
-
-
-
-
103
-
-
42349117319
-
-
See United States v Ross, 456 US 798, 807-08 (1982).
-
See United States v Ross, 456 US 798, 807-08 (1982).
-
-
-
-
104
-
-
42349116811
-
-
See Terry v Ohio, 392 US 1, 30 (1968).
-
See Terry v Ohio, 392 US 1, 30 (1968).
-
-
-
-
105
-
-
42349095438
-
-
Compare Brown v Texas, 443 US 47, 50 (1979) (When the officers detained appellant for the purpose of requiring him to identify himself, they performed a seizure subject to the requirements of the Fourth Amendment.),
-
Compare Brown v Texas, 443 US 47, 50 (1979) ("When the officers detained appellant for the purpose of requiring him to identify himself, they performed a seizure subject to the requirements of the Fourth Amendment."),
-
-
-
-
106
-
-
42349097694
-
-
with INS v Delgado, 466 US 210, 216-17 (1984) (holding that police questioning is not a seizure unless the person reasonably believes he is not free to leave).
-
with INS v Delgado, 466 US 210, 216-17 (1984) (holding that police questioning is not a seizure unless the person reasonably believes he is not free to leave).
-
-
-
-
107
-
-
42349085618
-
-
See City of Indianapolis v Edmond, 531 US 32, 44, 47 (2000) (declining to approve a program whose primary purpose is ultimately indistinguishable from the general interest in crime control, but carefully indicating that this ruling did not alter the constitutionality of sobriety and border checkpoints).
-
See City of Indianapolis v Edmond, 531 US 32, 44, 47 (2000) (declining "to approve a program whose primary purpose is ultimately indistinguishable from the general interest in crime control," but carefully indicating that this ruling did not alter the constitutionality of "sobriety and border checkpoints").
-
-
-
-
108
-
-
42349101555
-
72 Miss L J at 280-85 (cited in note 82) (addressing the relevance of survey findings to Fourth Amendment analysis); Slobogin and Schumacher
-
See
-
See Slobogin, 72 Miss L J at 280-85 (cited in note 82) (addressing the relevance of survey findings to Fourth Amendment analysis); Slobogin and Schumacher, 42 Duke L J at 743-51 (cited in note 82) (addressing internal and external validity issues).
-
Duke L J at 743-51 (cited in note 82) (addressing internal and external validity issues)
, vol.42
-
-
Slobogin1
-
110
-
-
42349093636
-
-
387 US 523, 539 (1967) (recognizing that using a reasonableness approach to the Fourth Amendment neither endangers time-honored doctrines applicable to criminal investigations nor makes a nullity of the probable cause requirement... [but] merely gives full recognition to the competing public and private interests here at stake).
-
387 US 523, 539 (1967) (recognizing that using a reasonableness approach to the Fourth Amendment "neither endangers time-honored doctrines applicable to criminal investigations nor makes a nullity of the probable cause requirement... [but] merely gives full recognition to the competing public and private interests here at stake").
-
-
-
-
111
-
-
42349108676
-
-
392 US 1, 21 1968
-
392 US 1, 21 (1968).
-
-
-
-
112
-
-
42349105802
-
-
Id at 21 (alterations in original), quoting Camara, 387 US at 536-37.
-
Id at 21 (alterations in original), quoting Camara, 387 US at 536-37.
-
-
-
-
113
-
-
42349103829
-
Inside Bush's Secret Spy Net; Your Phone Records Have Been Enlisted in the War on Terrorism. Should That Make You Worry More or Less?
-
The idea is to sift through all that data, using a process called link analysis, searching for patterns, a burst of calls from pay phones in Detroit to cell phones in Pakistan, for instance, See, for example, May 22
-
See, for example, Karen Tumulty, Inside Bush's Secret Spy Net; Your Phone Records Have Been Enlisted in the War on Terrorism. Should That Make You Worry More or Less?, Time 32, 35 (May 22, 2006) ("The idea is to sift through all that data, using a process called link analysis, searching for patterns - a burst of calls from pay phones in Detroit to cell phones in Pakistan, for instance.");
-
(2006)
Time
, vol.32
, pp. 35
-
-
Tumulty, K.1
-
114
-
-
42349100223
-
-
Leslie Cauley, NSA Has Massive Database of Americans' Phone Calls; 3 Telecoms Help Government Collect Billions of Domestic Records, USA Today 1A (May 11, 2006) (reporting that the NSA used telephone records from AT&T, Verizon, and BellSouth while attempting to create a database of every call ever made in the US).
-
Leslie Cauley, NSA Has Massive Database of Americans' Phone Calls; 3 Telecoms Help Government Collect Billions of Domestic Records, USA Today 1A (May 11, 2006) (reporting that the NSA used telephone records from AT&T, Verizon, and BellSouth while attempting "to create a database of every call ever made" in the US).
-
-
-
-
117
-
-
42349089291
-
-
How is the government to meet the burden demanded by this proportionality analysis? Sometimes the government's profile may satisfy the requisite certainty level on its face, as in an investigation of purchasing fraud where the profile singles out those individuals who have bought items they are clearly not authorized to buy. Other types of profiles might be tested through hypothetical computer runs, something the government is apparently doing now. See DARPA, Report at 17 cited in note 28, describing use of synthetic data to test the efficacy of data mining processes, As a last resort, an actual data mining program could be carried out on a small sample under secure conditions to determine its efficacy. Finally, if the government can provide a convincing explanation as to why relevant data cannot be obtained, while at the same time suggesting why the relevant hit rate can be met, it might be allowed to proceed
-
How is the government to meet the burden demanded by this proportionality analysis? Sometimes the government's profile may satisfy the requisite certainty level on its face, as in an investigation of purchasing fraud where the profile singles out those individuals who have bought items they are clearly not authorized to buy. Other types of profiles might be tested through hypothetical computer runs, something the government is apparently doing now. See DARPA, Report at 17 (cited in note 28) (describing use of "synthetic data" to test the efficacy of data mining processes). As a last resort, an actual data mining program could be carried out on a small sample under secure conditions to determine its efficacy. Finally, if the government can provide a convincing explanation as to why relevant data cannot be obtained, while at the same time suggesting why the relevant hit rate can be met, it might be allowed to proceed.
-
-
-
-
118
-
-
42349094177
-
-
See, for example, Yoo, 14 Geo Mason L Rev at 577 (cited in note 49) (Data mining is the best hope for an innovative counterterrorism strategy to detect and prevent future al Qaeda attacks.).
-
See, for example, Yoo, 14 Geo Mason L Rev at 577 (cited in note 49) ("Data mining is the best hope for an innovative counterterrorism strategy to detect and prevent future al Qaeda attacks.").
-
-
-
-
119
-
-
42349095266
-
-
The analogue in traditional Fourth Amendment jurisprudence might be the hot pursuit doctrine, where the courts have struggled to differentiate between hot and lukewarm pursuit, but have refused to adopt exceptions based solely on the seriousness of the crime. See Charles H. Whitebread and Christopher Slobogin, Criminal Procedure: An Analysis of Cases and Concepts § 8.03 at 228-32 (Foundation 5th ed 2008). It is worth noting in this regard that Germany, whichhas had considerable experience with dragnet information gathering, much of it negative, permits event-driven surveillance only in response to a specifically articulated danger.
-
The analogue in traditional Fourth Amendment jurisprudence might be the hot pursuit doctrine, where the courts have struggled to differentiate between hot and lukewarm pursuit, but have refused to adopt exceptions based solely on the seriousness of the crime. See Charles H. Whitebread and Christopher Slobogin, Criminal Procedure: An Analysis of Cases and Concepts § 8.03 at 228-32 (Foundation 5th ed 2008). It is worth noting in this regard that Germany, whichhas had considerable experience with dragnet information gathering, much of it negative, permits event-driven surveillance only in response to a specifically articulated danger.
-
-
-
-
120
-
-
42349084518
-
-
See Francesca Bignami, European versus American Liberty: A Comparative Privacy Analysis of Antiterrorism Data Mining, 48 BC L Rev 609, 654-55 (2007) (describing a German court decision finding unconstitutional a post-9/11 data-mining program aimed at identifying people with certain characteristics-male, age 18-40, student or former student, Islamic faith, citizenship or birthplace in a country with a predominantly Islamic population-because there were no facts demonstrating an imminent and specific endangerment).
-
See Francesca Bignami, European versus American Liberty: A Comparative Privacy Analysis of Antiterrorism Data Mining, 48 BC L Rev 609, 654-55 (2007) (describing a German court decision finding unconstitutional a post-9/11 data-mining program aimed at identifying people with certain characteristics-male, age 18-40, student or former student, Islamic faith, citizenship or birthplace in a country with a predominantly Islamic population-because there were no facts demonstrating "an imminent and specific endangerment").
-
-
-
-
121
-
-
42349089293
-
-
See Bruce Schneier, Beyond Fear: Thinking Sensibly about Security in an Uncertain World 253-54 (Copernicus 2003) (explaining why it is very difficult to uncover terrorist plots through data mining).
-
See Bruce Schneier, Beyond Fear: Thinking Sensibly about Security in an Uncertain World 253-54 (Copernicus 2003) (explaining why it is very difficult to uncover terrorist plots through data mining).
-
-
-
-
122
-
-
27344450574
-
Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data
-
For a description of how selective revelation might work, see, 2
-
For a description of how selective revelation might work, see K.A. Taipale, Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data, 5 Colum Sci & Tech L Rev 2, 79-80 (2003).
-
(2003)
Colum Sci & Tech L Rev
, vol.5
, pp. 79-80
-
-
Taipale, K.A.1
-
123
-
-
42349089292
-
-
According to one source, the technology has yet to reach the stage at which anonymity can be preserved. See Palo Alto Research Company, Privacy Appliance, online at http://www.parc.com/ research/projects/privacyappliance (visited Jan 12, 2008) (describing yet-to-be-developed protocols that ensure inference control, that is, protection against the identification of an individual through combining different pieces of information).
-
According to one source, the technology has yet to reach the stage at which anonymity can be preserved. See Palo Alto Research Company, Privacy Appliance, online at http://www.parc.com/ research/projects/privacyappliance (visited Jan 12, 2008) (describing yet-to-be-developed protocols that ensure "inference control," that is, protection against the identification of an individual through combining different pieces of information).
-
-
-
|