-
1
-
-
77955320294
-
Big brother's little helpers: How choicepoint and other commercial data brokers collect and package your data for law enforcement, 29
-
Noting increased government outreach to corporations for customer information
-
See, e.g., Chris Jay Hoofnagle, Big Brother's Little Helpers: How Choicepoint and Other Commercial Data Brokers Collect and Package Your Data for Law Enforcement, 29 N.C. J. INT'L L. & COM. REG. 595, 621 (2004) (noting increased government outreach to corporations for customer information)
-
(2004)
N.C. J. Int'L L. & Com. Reg.
, vol.595
, pp. 621
-
-
Hoofnagle, C.J.1
-
2
-
-
78649377285
-
-
JAY STANLEY, THE SURVEILLANCE-INDUSTRIAL COMPLEX 10-11 (2004), (providing examples of corporations sharing data with the government)
-
JAY STANLEY, THE SURVEILLANCE-INDUSTRIAL COMPLEX 10-11 (2004), http://aclu.org/files/FilesPDFs/surveillance-report.pdf (providing examples of corporations sharing data with the government)
-
-
-
-
3
-
-
78649349123
-
-
Leslie Cauley & John Diamond, Telecoms Let NSA Spy on Calls, USA TODAY, Feb. 6, 2006, at A1 (reporting on telecom companies' role in facilitating government wiretapping of international communications without warrants or court orders)
-
see also Leslie Cauley & John Diamond, Telecoms Let NSA Spy on Calls, USA TODAY, Feb. 6, 2006, at A1 (reporting on telecom companies' role in facilitating government wiretapping of international communications without warrants or court orders)
-
-
-
-
4
-
-
78649369286
-
-
Mark Glassman, 4 More Airlines Named in Release of Data, N.Y. TIMES, June 24, 2004, at A17 (describing the practice among airlines of turning over passenger information to government contractors)
-
Mark Glassman, 4 More Airlines Named in Release of Data, N.Y. TIMES, June 24, 2004, at A17 (describing the practice among airlines of turning over passenger information to government contractors)
-
-
-
-
5
-
-
78649365359
-
-
Philip Shenon, Airline Gave Defense Firm Passenger Files, N.Y. TIMES, Sept. 20, 2003, at A1 (reporting that JetBlue voluntarily gave the Defense Department information on more than one million of its customers)
-
Philip Shenon, Airline Gave Defense Firm Passenger Files, N.Y. TIMES, Sept. 20, 2003, at A1 (reporting that JetBlue voluntarily gave the Defense Department information on more than one million of its customers)
-
-
-
-
6
-
-
78649388573
-
-
Mike Snider, Privacy Advocates Fear Trade-off for Security, USA TODAY, Sept. 13, 2001, at D8 (describing Internet service providers' cooperation with federal authorities)
-
Mike Snider, Privacy Advocates Fear Trade-off for Security, USA TODAY, Sept. 13, 2001, at D8 (describing Internet service providers' cooperation with federal authorities)
-
-
-
-
7
-
-
78649388572
-
Suspicious activity
-
CHI. TRIB., Nov. 23, 2007, at B3 reporting on commercial institutions' increased filing of "suspicious activity reports" to the U.S. government); Josh Meyer & Greg Miller, U.S. Secretly Tracks Global Bank Data, L.A. TIMES, June 23, 2006, at A1 (detailing financial institutions' cooperation with the government in efforts to detect terrorist financing patterns). When referring to the government in this Article, typically it is to the federal government. At times, however, the term government refers to state or local authorities, or some combination of "state actors" at the local, state, and federal level
-
Becky Yerak, "Suspicious Activity" Reports Soar from Banks, ther Depositories, CHI. TRIB., Nov. 23, 2007, at B3 (reporting on commercial institutions' increased filing of "suspicious activity reports" to the U.S. government); Josh Meyer & Greg Miller, U.S. Secretly Tracks Global Bank Data, L.A. TIMES, June 23, 2006, at A1 (detailing financial institutions' cooperation with the government in efforts to detect terrorist financing patterns). When referring to the government in this Article, typically it is to the federal government. At times, however, the term government refers to state or local authorities, or some combination of "state actors" at the local, state, and federal level.
-
Reports Soar From Banks, Ther Depositories
-
-
Yerak, B.1
-
8
-
-
78649374400
-
-
Stevenson Swanson, Truckers, Doormen Vigilant for Threats, CHI. TRIB., Aug. 2, 2005, at C11 (reporting that thousands of doormen at residential buildings nationwide have received training to detect terrorist threats and encouragement to alert the authorities if they observe suspicious activity)
-
See Stevenson Swanson, Truckers, Doormen Vigilant for Threats, CHI. TRIB., Aug. 2, 2005, at C11 (reporting that thousands of doormen at residential buildings nationwide have received training to detect terrorist threats and encouragement to alert the authorities if they observe suspicious activity).
-
-
-
-
9
-
-
78649377848
-
-
Ricardo Alonso-Zaldivar, Pilots Asked To Be Vigilant, L.A. TIMES, Mar. 4, 2003, at A14 (noting the collaboration between the Transportation Safety Administration and the 500,000- member Aircraft Owners and Pilots Association to detect and report perceived security threats)
-
See Ricardo Alonso-Zaldivar, Pilots Asked To Be Vigilant, L.A. TIMES, Mar. 4, 2003, at A14 (noting the collaboration between the Transportation Safety Administration and the 500,000- member Aircraft Owners and Pilots Association to detect and report perceived security threats).
-
-
-
-
12
-
-
78649371843
-
-
Josh Meyer, As Terrorism Plots Evolve, FBI Relies on Agent John Q. Public, L.A. TIMES, May 12, 2007, at A1 (describing how the Fort Dix terrorist plot was foiled in part by a Circuit City employee alerting the authorities to suspicious materials on a laptop he was servicing)
-
See, e.g., Josh Meyer, As Terrorism Plots Evolve, FBI Relies on Agent John Q. Public, L.A. TIMES, May 12, 2007, at A1 (describing how the Fort Dix terrorist plot was foiled in part by a Circuit City employee alerting the authorities to suspicious materials on a laptop he was servicing).
-
-
-
-
13
-
-
78649361955
-
-
Larry Atkins, Beware of Cable Guys Snooping Around the Neighborhood, CHI. TRIB., July 23, 2002, at N19 (describing the practice of repairmen being enlisted to assist the authorities in reporting on suspicious activities in their customers' homes)
-
See Larry Atkins, Beware of Cable Guys Snooping Around the Neighborhood, CHI. TRIB., July 23, 2002, at N19 (describing the practice of repairmen being enlisted to assist the authorities in reporting on suspicious activities in their customers' homes)
-
-
-
-
14
-
-
78649349732
-
-
Stephanie Erickson, "Bright Eyes" Keeping Watch in 7 Counties, ORLANDO SENTINEL, July 21, 2005, at H1 (noting that Bright House technicians "are hooking up cable television lines and checking Internet connections on the fritz-all while keeping an eye out for terrorism")
-
Stephanie Erickson, "Bright Eyes" Keeping Watch in 7 Counties, ORLANDO SENTINEL, July 21, 2005, at H1 (noting that Bright House technicians "are hooking up cable television lines and checking Internet connections on the fritz-all while keeping an eye out for terrorism")
-
-
-
-
15
-
-
78649380049
-
-
Stacy Humes-Schulz, Alarm Bells Ring Over Terrorism Reporting System, FIN. TIMES, July 23, 2002, at 6 (reporting on the role repairmen and other service technicians, who do their work in clients' homes, would play in the Justice Department's Operation TIPS)
-
Stacy Humes-Schulz, Alarm Bells Ring Over Terrorism Reporting System, FIN. TIMES, July 23, 2002, at 6 (reporting on the role repairmen and other service technicians, who do their work in clients' homes, would play in the Justice Department's Operation TIPS).
-
-
-
-
16
-
-
78649382700
-
-
Robert Block, Private Eyes: In Terrorism Fight, Government Finds a Surprising Ally: FedEx, WALL ST. J., May 26, 2005, at A1 (detailing FedEx's post-9/11 assistance in counterterrorism efforts)
-
See Robert Block, Private Eyes: In Terrorism Fight, Government Finds a Surprising Ally: FedEx, WALL ST. J., May 26, 2005, at A1 (detailing FedEx's post-9/11 assistance in counterterrorism efforts).
-
-
-
-
17
-
-
78649355951
-
-
Associated Press, Excerpts from Bush's Briefing, CHI. TRIB., Oct. 12, 2001, at I18 ("The American people, obviously if they see something out of the norm that looks suspicious, they ought to notify local law authorities ⋯ .")
-
See Associated Press, Excerpts from Bush's Briefing, CHI. TRIB., Oct. 12, 2001, at I18 ("The American people, obviously if they see something out of the norm that looks suspicious, they ought to notify local law authorities ⋯ .")
-
-
-
-
19
-
-
78649355345
-
-
John J. Goldman, Workers Get Anti-terror Lessons, L.A. TIMES, May 27, 2004, at A26 (noting that the Attorney General and the FBI Director "called on the nation ⋯ to help find seven suspected al Qaeda operatives and to head off a possible attack in the U.S.")
-
John J. Goldman, Workers Get Anti-terror Lessons, L.A. TIMES, May 27, 2004, at A26 (noting that the Attorney General and the FBI Director "called on the nation ⋯ to help find seven suspected al Qaeda operatives and to head off a possible attack in the U.S.")
-
-
-
-
20
-
-
78649347160
-
-
Passengers Asked To Help Keep Transit Safe, USA TODAY, July 8, 2005, at A5 (reporting on government efforts to urge public transit users to advise the police if they see suspicious activities or items)
-
Passengers Asked To Help Keep Transit Safe, USA TODAY, July 8, 2005, at A5 (reporting on government efforts to urge public transit users to advise the police if they see suspicious activities or items)
-
-
-
-
21
-
-
78649338605
-
Encouraging citizens to report suspicious activity
-
N.Y. TIMES, Sept. 11, 2002, at A12, It is, to be sure, these ordinary folks who have been asked to be vigilant in their neighborhoods and who have also-now on several commercial flights-been the only ones standing between us and, perhaps, a handful of 9/11-like recurrences
-
Transcript of News Conference by Ashcroft and Ridge on Increased Alert, N.Y. TIMES, Sept. 11, 2002, at A12 (encouraging citizens to report suspicious activity). It is, to be sure, these ordinary folks who have been asked to be vigilant in their neighborhoods and who have also-now on several commercial flights-been the only ones standing between us and, perhaps, a handful of 9/11-like recurrences.
-
Transcript of News Conference by Ashcroft and Ridge on Increased Alert
-
-
-
23
-
-
78649353497
-
-
WASH. POST, Sept. 17
-
Charles Lane et al., A Sky Filled With Chaos, Uncertainty and True Heroism, WASH. POST, Sept. 17, 2001, at 3
-
(2001)
A Sky Filled With Chaos, Uncertainty and True Heroism
, pp. 3
-
-
Lane, C.1
-
24
-
-
78649385152
-
-
Scott Shane & Eric Lipton, Passengers' Actions Thwart a Plan To Down a Jet, N.Y. TIMES, Dec. 27, 2009, at A1
-
Scott Shane & Eric Lipton, Passengers' Actions Thwart a Plan To Down a Jet, N.Y. TIMES, Dec. 27, 2009, at A1.
-
-
-
-
25
-
-
78649345650
-
-
David Brooks, Op-Ed. Column, The God that Fails, N.Y. TIMES, Jan. 1, 2010, at A29. Brooks, writing in the immediate aftermath of a thwarted attempt to ignite a bomb on a Detroitbound flight, notes: At some point, it's worth pointing out that it wasn't the centralized system that stopped terrorism in this instance. As with the shoe bomber, as with the [United 93] plane that went down in Shanksville, Pa., it was decentralized citizen action. The plot was foiled by nonexpert civilians who had the advantage of the concrete information right in front of them-and the spirit to take the initiative
-
See generally David Brooks, Op-Ed. Column, The God that Fails, N.Y. TIMES, Jan. 1, 2010, at A29. Brooks, writing in the immediate aftermath of a thwarted attempt to ignite a bomb on a Detroitbound flight, notes: At some point, it's worth pointing out that it wasn't the centralized system that stopped terrorism in this instance. As with the shoe bomber, as with the [United 93] plane that went down in Shanksville, Pa., it was decentralized citizen action. The plot was foiled by nonexpert civilians who had the advantage of the concrete information right in front of them-and the spirit to take the initiative.
-
-
-
-
26
-
-
78649371842
-
-
hereinafter 9/11 COMMISSION REPORT, describing the need to devote greater resources to intelligence gathering
-
See NAT'L COMM'N ON TERRORIST ATTACKS UPON THE U.S., THE 9/11 COMMISSION REPORT, at xv-xvi, 339 (2004) [hereinafter 9/11 COMMISSION REPORT] (describing the need to devote greater resources to intelligence gathering)
-
(2004)
Nat'l Comm'n on Terrorist Attacks upon the U.S., the 9/11 Commission Report
, vol.15-16
, pp. 339
-
-
-
27
-
-
33846056437
-
-
Anne Joseph O'Connell, The Architecture of Smart Intelligence: Structuring and Overseeing Agencies in the Post 9/11 World, 94 CAL. L. REV. 1655, 1655 (2006) (stating that the attacks of September 11 "resulted, at least in part, from a massive breakdown in the intelligence system designed to identify threats to the nation's security and to provide policymakers with sufficient information to protect against them")
-
Anne Joseph O'Connell, The Architecture of Smart Intelligence: Structuring and Overseeing Agencies in the Post 9/11 World, 94 CAL. L. REV. 1655, 1655 (2006) (stating that the attacks of September 11 "resulted, at least in part, from a massive breakdown in the intelligence system designed to identify threats to the nation's security and to provide policymakers with sufficient information to protect against them")
-
-
-
-
28
-
-
53149088880
-
-
Jon D. Michaels, All the President's Spies: Private-Public Intelligence Partnerships in the War on Terror, 96 CAL. L. REV. 901, 901-02 (2008) (describing the need for greater intelligence-gathering capacities)
-
Jon D. Michaels, All the President's Spies: Private-Public Intelligence Partnerships in the War on Terror, 96 CAL. L. REV. 901, 901-02 (2008) (describing the need for greater intelligence-gathering capacities).
-
-
-
-
29
-
-
78649344947
-
-
Jon D. Michaels, Beyond Accountability: The Constitutional, Democratic, and Strategic Problems with Privatizing War, 82 WASH. U. L.Q. 1001 (2004) (describing private military firms' responsibilities in supplementing, complementing, and, at times, standing in for U.S. military personnel in zones of armed engagement)
-
See, e.g., Jon D. Michaels, Beyond Accountability: The Constitutional, Democratic, and Strategic Problems with Privatizing War, 82 WASH. U. L.Q. 1001 (2004) (describing private military firms' responsibilities in supplementing, complementing, and, at times, standing in for U.S. military personnel in zones of armed engagement)
-
-
-
-
30
-
-
78649389456
-
-
Martha Minow, Outsourcing Power: How Privatizing Military Efforts Challenges Accountability, Professionalism, and Democracy, 46 B.C. L. REV. 989, 992-93 (2005) (discussing private contractors' involvement in U.S. military engagements, surveillance programs, and military-detention operations); PAUL R. VERKUIL, OUTSOURCING SOVEREIGNTY 23-42 (2007) (describing private-sector involvement in a range of national security domains)
-
Martha Minow, Outsourcing Power: How Privatizing Military Efforts Challenges Accountability, Professionalism, and Democracy, 46 B.C. L. REV. 989, 992-93 (2005) (discussing private contractors' involvement in U.S. military engagements, surveillance programs, and military-detention operations); PAUL R. VERKUIL, OUTSOURCING SOVEREIGNTY 23-42 (2007) (describing private-sector involvement in a range of national security domains)
-
-
-
-
31
-
-
78649375545
-
-
James Risen & Mark Mazzetti, Blackwater Guards Tied to Secret Raids by C.I.A., N.Y. TIMES, Dec. 11, 2009, at A1 (reporting on the role private security guards played in CIA operations in Iraq and Afghanistan)
-
James Risen & Mark Mazzetti, Blackwater Guards Tied to Secret Raids by C.I.A., N.Y. TIMES, Dec. 11, 2009, at A1 (reporting on the role private security guards played in CIA operations in Iraq and Afghanistan).
-
-
-
-
32
-
-
78649382103
-
-
Michaels, supra note 9 at 902 (indicating that the private sector's "comparative advantage over the government in [data gathering] is a function both of industry's unparalleled access to the American public's intimate affairs ⋯ and of regulatory asymmetries" that at times enable private organizations to "obtain and share information more easily and under fewer legal restrictions than the government can"). For background on data gathering and analysis
-
See Michaels, supra note 9 at 902 (indicating that the private sector's "comparative advantage over the government in [data gathering] is a function both of industry's unparalleled access to the American public's intimate affairs ⋯ and of regulatory asymmetries" that at times enable private organizations to "obtain and share information more easily and under fewer legal restrictions than the government can"). For background on data gathering and analysis.
-
-
-
-
34
-
-
78649339960
-
-
Infra notes 26 and 70. As Solove notes, Personal information [mined from business databases] can help the government detect fraud, espionage, fugitives, drug distribution rings, and terrorist cells. Information about a person's financial transactions, purchases, and religious and political beliefs can assist the investigation of suspected criminals and can be used to profile people for more thorough searches at airports. SOLOVE, supra, at 166
-
see also infra notes 26 and 70. As Solove notes, Personal information [mined from business databases] can help the government detect fraud, espionage, fugitives, drug distribution rings, and terrorist cells. Information about a person's financial transactions, purchases, and religious and political beliefs can assist the investigation of suspected criminals and can be used to profile people for more thorough searches at airports. SOLOVE, supra, at 166.
-
-
-
-
35
-
-
78649359908
-
-
Infra note 37 and accompanying text
-
See infra note 37 and accompanying text.
-
-
-
-
37
-
-
78649388270
-
-
Andy Newman, Citizen Snoops Wanted (Call Toll-Free), N.Y. TIMES, July 21, 2002, at D1
-
See Andy Newman, Citizen Snoops Wanted (Call Toll-Free), N.Y. TIMES, July 21, 2002, at D1
-
-
-
-
38
-
-
78649374399
-
-
Eileen Sullivan & P. Solomon Banda, Anti-terror Citizens Watch Endorsed by Police Chiefs, STAR-LEDGER (Newark, N.J.), Oct. 4, 2009, at 11
-
Eileen Sullivan & P. Solomon Banda, Anti-terror Citizens Watch Endorsed by Police Chiefs, STAR-LEDGER (Newark, N.J.), Oct. 4, 2009, at 11.
-
-
-
-
39
-
-
78649392143
-
-
For example, the private, border-patrol "militias" might fall into this category of selfappointed deputies, as might the so-called private Internet vigilantes who monitor and seek to disable Jihadist Web sites and chat rooms. For further discussion of these groups, see infra notes 124-25
-
For example, the private, border-patrol "militias" might fall into this category of selfappointed deputies, as might the so-called private Internet vigilantes who monitor and seek to disable Jihadist Web sites and chat rooms. For further discussion of these groups, see infra notes 124-25.
-
-
-
-
40
-
-
58149292014
-
-
STANLEY, supra note 1, at 2; cf. Jack M. Balkin, The Constitution in the National Surveillance State, 93 MINN. L. REV. 1, 7 (2008) (describing the "National Surveillance State" and noting that "[i]n the National Surveillance State, the line between public and private modes of surveillance and security has blurred if not vanished. Public and private enterprises are thoroughly intertwined.")
-
STANLEY, supra note 1, at 2; cf. Jack M. Balkin, The Constitution in the National Surveillance State, 93 MINN. L. REV. 1, 7 (2008) (describing the "National Surveillance State" and noting that "[i]n the National Surveillance State, the line between public and private modes of surveillance and security has blurred if not vanished. Public and private enterprises are thoroughly intertwined.").
-
-
-
-
41
-
-
78649388910
-
-
Infra section II(B)(4)
-
See infra section II(B)(4).
-
-
-
-
42
-
-
78649349733
-
-
Some classic Fourth Amendment cases provide support for the rationale that people do not assume-and, at least in this context, aren't penalized for not assuming-that business relations with access to their personal property will use that access to facilitate criminal investigations
-
Some classic Fourth Amendment cases provide support for the rationale that people do not assume-and, at least in this context, aren't penalized for not assuming-that business relations with access to their personal property will use that access to facilitate criminal investigations.
-
-
-
-
43
-
-
78649381512
-
-
Stoner v. California, 376 U.S. 483, 489 (1964) (holding that hotel managers may not admit police into guests' rooms absent a warrant)
-
See Stoner v. California, 376 U.S. 483, 489 (1964) (holding that hotel managers may not admit police into guests' rooms absent a warrant)
-
-
-
-
44
-
-
78649370671
-
-
Chapman v. United States, 365 U.S. 610, 617 (1961) (holding that a landlord may not grant the police warrantless entry into a tenant's residence)
-
Chapman v. United States, 365 U.S. 610, 617 (1961) (holding that a landlord may not grant the police warrantless entry into a tenant's residence)
-
-
-
-
45
-
-
78649390981
-
-
United States v. Jeffers, 342 U.S. 48, 51 (1951) indicating that a hotel staff had access to a room for purposes of cleaning and maintenance but not the authority to admit police). There is, however, no corresponding Fourth Amendment protection where third parties, such as banks and telecoms, transfer customer data to the government absent the production of a warrant or the customer's consent
-
United States v. Jeffers, 342 U.S. 48, 51 (1951) indicating that a hotel staff had access to a room for purposes of cleaning and maintenance but not the authority to admit police). There is, however, no corresponding Fourth Amendment protection where third parties, such as banks and telecoms, transfer customer data to the government absent the production of a warrant or the customer's consent.
-
-
-
-
46
-
-
78649343143
-
-
Smith v. Maryland, 442 U.S. 735, 743-45 (1979) (holding that there is no constitutional expectation of privacy that prohibits telecoms from facilitating warrantless government pen registers)
-
See Smith v. Maryland, 442 U.S. 735, 743-45 (1979) (holding that there is no constitutional expectation of privacy that prohibits telecoms from facilitating warrantless government pen registers)
-
-
-
-
47
-
-
78649370092
-
-
United States v. Miller, 425 U.S. 435, 440-41 (1976) (holding that the Fourth Amendment does not prevent banks from turning over customer financial records even in the absence of a warrant or customer consent)
-
United States v. Miller, 425 U.S. 435, 440-41 (1976) (holding that the Fourth Amendment does not prevent banks from turning over customer financial records even in the absence of a warrant or customer consent).
-
-
-
-
48
-
-
78649387981
-
-
Anecdotal evidence suggests that private-sector support for counterterrorism operations has at times proven quite valuable
-
Anecdotal evidence suggests that private-sector support for counterterrorism operations has at times proven quite valuable.
-
-
-
-
49
-
-
78649352907
-
Office of the inspector gen
-
DEP'T OF DEF. ET AL., noting that the Terrorist Surveillance Program "may have contributed to a counterterrorism success"
-
See OFFICE OF THE INSPECTOR GEN., DEP'T OF DEF. ET AL., UNCLASSIFIED REPORT ON THE PRESIDENT'S SURVEILLANCE PROGRAM 36 (2009) (noting that the Terrorist Surveillance Program "may have contributed to a counterterrorism success")
-
(2009)
Unclassified Report on the President's Surveillance Program 36
-
-
-
50
-
-
78649350329
-
-
Brian Harmon et al., Jet Passengers Foil Shoe-Bomb Suspect: "We Tied Him Up with Everything We Had," N.Y. DAILY NEWS, Dec. 23, 2001, at 3 (reporting that airline passengers and flight attendants overpowered a man with explosives packed in his shoe)
-
Brian Harmon et al., Jet Passengers Foil Shoe-Bomb Suspect: "We Tied Him Up with Everything We Had," N.Y. DAILY NEWS, Dec. 23, 2001, at 3 (reporting that airline passengers and flight attendants overpowered a man with explosives packed in his shoe)
-
-
-
-
51
-
-
78649370959
-
-
Meyer, supra note 5 (describing a retail service technician's assistance in foiling a domestic terrorism plot)
-
Meyer, supra note 5 (describing a retail service technician's assistance in foiling a domestic terrorism plot)
-
-
-
-
52
-
-
78649336875
-
-
Matthew Purdy & Lowell Bergman, Unclear Danger: Inside the Lackawanna Terror Case, N.Y. TIMES, Oct. 12, 2003, at A1 (noting the significance of an anonymous tip from an Arab-American citizen in identifying the Lackawanna Six)
-
Matthew Purdy & Lowell Bergman, Unclear Danger: Inside the Lackawanna Terror Case, N.Y. TIMES, Oct. 12, 2003, at A1 (noting the significance of an anonymous tip from an Arab-American citizen in identifying the Lackawanna Six)
-
-
-
-
53
-
-
78649350902
-
-
Shane & Lipton, supra note 8 (describing how airline passengers extinguished a fire and restrained the so-called Shoe Bomber when he tried to ignite a bomb on a commercial flight and how passengers did the same when Farouk Abdulmutallab attempted to ignite a bomb on a Christmas Day 2009 flight to Detroit)
-
Shane & Lipton, supra note 8 (describing how airline passengers extinguished a fire and restrained the so-called Shoe Bomber when he tried to ignite a bomb on a commercial flight and how passengers did the same when Farouk Abdulmutallab attempted to ignite a bomb on a Christmas Day 2009 flight to Detroit)
-
-
-
-
54
-
-
78649345649
-
-
Jim VandeHei & Dan Eggen, Cheney Cites Justifications for Domestic Eavesdropping, WASH. POST, Jan. 5, 2006, at A2 (reporting on former Vice President Cheney's claim that warrantless eavesdropping on U.S. persons helped thwart terrorist attacks)
-
Jim VandeHei & Dan Eggen, Cheney Cites Justifications for Domestic Eavesdropping, WASH. POST, Jan. 5, 2006, at A2 (reporting on former Vice President Cheney's claim that warrantless eavesdropping on U.S. persons helped thwart terrorist attacks).
-
-
-
-
55
-
-
78649380337
-
-
But see Lowell Bergman et al., Spy Agency Data After Sept. 11 Led F.B.I. to Dead Ends, N.Y. TIMES, Jan. 17, 2006, at A1 (citing intelligence officials' admissions that "virtually all" of the information that the National Security Agency collected in the aftermath of 9/11 led to dead ends)
-
But see Lowell Bergman et al., Spy Agency Data After Sept. 11 Led F.B.I. to Dead Ends, N.Y. TIMES, Jan. 17, 2006, at A1 (citing intelligence officials' admissions that "virtually all" of the information that the National Security Agency collected in the aftermath of 9/11 led to dead ends).
-
-
-
-
56
-
-
78649338303
-
-
It bears mentioning that this contribution builds on two of my recent projects-one that examines how private-public intelligence operations inhibit meaningful congressional and judicial oversight
-
It bears mentioning that this contribution builds on two of my recent projects-one that examines how private-public intelligence operations inhibit meaningful congressional and judicial oversight
-
-
-
-
57
-
-
78649389755
-
-
Michaels, supra note 9, and another that considers how privatization can and does expand the Executive's ability to carry out policy objectives otherwise beyond its reach
-
see Michaels, supra note 9, and another that considers how privatization can and does expand the Executive's ability to carry out policy objectives otherwise beyond its reach.
-
-
-
-
58
-
-
77955575643
-
-
Jon D. Michaels, Privatization's Pretensions, 77 U. CHI. L. REV. 717 (2010). This contribution provides a platform for synthesizing some of the material covered in that other work, and it builds on that platform to make novel interventions into the study of the use and misuse of legal-status distinctions between government actors and private actors in structuring private-public partnerships
-
see Jon D. Michaels, Privatization's Pretensions, 77 U. CHI. L. REV. 717 (2010). This contribution provides a platform for synthesizing some of the material covered in that other work, and it builds on that platform to make novel interventions into the study of the use and misuse of legal-status distinctions between government actors and private actors in structuring private-public partnerships.
-
-
-
-
59
-
-
78649351198
-
-
JAMES BAMFORD, BODY OF SECRETS 22 (2001) (recounting Western Union's assistance during World War II and the Cold War in providing the U.S. government with copies of foreign diplomatic dispatches)
-
See JAMES BAMFORD, BODY OF SECRETS 22 (2001) (recounting Western Union's assistance during World War II and the Cold War in providing the U.S. government with copies of foreign diplomatic dispatches)
-
-
-
-
60
-
-
78649362872
-
-
RON SUSKIND, THE ONE PERCENT DOCTRINE 35 (2006) (describing private intelligence and security assistance that dates back to the Civil War)
-
RON SUSKIND, THE ONE PERCENT DOCTRINE 35 (2006) (describing private intelligence and security assistance that dates back to the Civil War)
-
-
-
-
61
-
-
78649372699
-
-
TIM SHORRICK, SPIES FOR HIRE 76 (2008) (noting the corporate assistance to the NSA and CIA during the Cold War)
-
TIM SHORRICK, SPIES FOR HIRE 76 (2008) (noting the corporate assistance to the NSA and CIA during the Cold War)
-
-
-
-
62
-
-
33748970058
-
-
Laura K. Donohue, Anglo-American Privacy and Surveillance, 96 J. CRIM. L. & CRIMINOLOGY 1059, 1080-81 (2006) (describing Operation SHAMROCK, an NSA-telecom collaboration that facilitated U.S.-intelligence operations during the Cold War). While routinized, the relationships between the private sector and the government remained largely informal collaborations that lacked, for instance, a statutory or regulatory foundation
-
Laura K. Donohue, Anglo-American Privacy and Surveillance, 96 J. CRIM. L. & CRIMINOLOGY 1059, 1080-81 (2006) (describing Operation SHAMROCK, an NSA-telecom collaboration that facilitated U.S.-intelligence operations during the Cold War). While routinized, the relationships between the private sector and the government remained largely informal collaborations that lacked, for instance, a statutory or regulatory foundation.
-
-
-
-
63
-
-
78649336874
-
-
INTELLIGENCE ACTIVITIES AND THE RIGHTS OF AMERICANS: HEARINGS BEFORE THE SELECT COMM. TO STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO INTELLIGENCE ACTIVITIES, 94th Cong. 57-58 (1975) (statement of Sen. Frank Church, Chairman, Select Comm. to Study Governmental Operations with Respect to Intelligence Agencies) (noting corporate-government collaborations that were intentionally kept informal)
-
See INTELLIGENCE ACTIVITIES AND THE RIGHTS OF AMERICANS: HEARINGS BEFORE THE SELECT COMM. TO STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO INTELLIGENCE ACTIVITIES, 94th Cong. 57-58 (1975) (statement of Sen. Frank Church, Chairman, Select Comm. to Study Governmental Operations with Respect to Intelligence Agencies) (noting corporate-government collaborations that were intentionally kept informal)
-
-
-
-
64
-
-
78649383272
-
-
Donohue, supra ("To keep [Operation SHAMROCK] under the radar, NSA deliberately refrained from formalizing the relationship in any sort of (traceable) document.")
-
Donohue, supra ("To keep [Operation SHAMROCK] under the radar, NSA deliberately refrained from formalizing the relationship in any sort of (traceable) document.").
-
-
-
-
65
-
-
78649344587
-
-
Kathryn S. Olmsted, CHALLENGING THE SECRET GOVERNMENT: THE POSTWATERGATE INVESTIGATIONS OF THE CIA AND FBI 175-76 (1996) (describing legislative efforts to curb Executive discretion in domestic and foreign intelligence domains)
-
See Kathryn S. Olmsted, CHALLENGING THE SECRET GOVERNMENT: THE POSTWATERGATE INVESTIGATIONS OF THE CIA AND FBI 175-76 (1996) (describing legislative efforts to curb Executive discretion in domestic and foreign intelligence domains)
-
-
-
-
66
-
-
78649389754
-
-
Harold Hongju Koh, Why the President (Almost) Always Wins in Foreign Affairs: Lessons of the Iran-Contra Affair, 97 YALE L.J. 1255, 1270-71 (1988) (noting post-Watergate legislative initiatives seeking to narrow presidential discretion in matters of foreign affairs and intelligence gathering)
-
Harold Hongju Koh, Why the President (Almost) Always Wins in Foreign Affairs: Lessons of the Iran-Contra Affair, 97 YALE L.J. 1255, 1270-71 (1988) (noting post-Watergate legislative initiatives seeking to narrow presidential discretion in matters of foreign affairs and intelligence gathering)
-
-
-
-
67
-
-
78649354314
-
-
William H. Jones, AT&T Hits Wider Role in Wiretaps: Ma Bell Shuns Wider Wiretap Role, WASH. POST, June 27, 1978, at E1 (indicating that after Watergate telecoms insisted on more formal legal processes instead of continuing to cooperate informally with intelligence agencies)
-
see also William H. Jones, AT&T Hits Wider Role in Wiretaps: Ma Bell Shuns Wider Wiretap Role, WASH. POST, June 27, 1978, at E1 (indicating that after Watergate telecoms insisted on more formal legal processes instead of continuing to cooperate informally with intelligence agencies)
-
-
-
-
68
-
-
78649357402
-
-
Scott Shane, Attention in NSA Debate Turns to Telecom Industry, N.Y. TIMES, Feb. 11, 2006, at A11 (noting that in the wake of the 1970s' legislative inquiries and reforms the telecommunications industry insisted on arm's-length dealings with the intelligence agencies)
-
Scott Shane, Attention in NSA Debate Turns to Telecom Industry, N.Y. TIMES, Feb. 11, 2006, at A11 (noting that in the wake of the 1970s' legislative inquiries and reforms the telecommunications industry insisted on arm's-length dealings with the intelligence agencies).
-
-
-
-
69
-
-
78649342187
-
-
generally INTELLIGENCE ACTIVITIES AND THE RIGHTS OF AMERICANS: HEARINGS BEFORE THE SELECT COMM. TO STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO INTELLIGENCE ACTIVITIES, supra note 21. Notwithstanding the apparent hostility to private-public intelligence and security collaborations, some programs, ranging from workaday neighborhood watch associations to cuttingedge telecom partnerships, were created or expanded in the post-Watergate, pre-9/11 years
-
See generally INTELLIGENCE ACTIVITIES AND THE RIGHTS OF AMERICANS: HEARINGS BEFORE THE SELECT COMM. TO STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO INTELLIGENCE ACTIVITIES, supra note 21. Notwithstanding the apparent hostility to private-public intelligence and security collaborations, some programs, ranging from workaday neighborhood watch associations to cuttingedge telecom partnerships, were created or expanded in the post-Watergate, pre-9/11 years.
-
-
-
-
70
-
-
78649369565
-
-
Communications Assistance for Law Enforcement Act (CALEA) of 1994, Pub. L.No. 103- 414, 108 Stat. 4279 (codified at 47 U.S.C. §§ 1001-1010 and in scattered sections of 18 U.S.C.) (imposing requirements on telecommunications carriers to assist in law enforcement efforts)
-
See, e.g., Communications Assistance for Law Enforcement Act (CALEA) of 1994, Pub. L.No. 103- 414, 108 Stat. 4279 (codified at 47 U.S.C. §§ 1001-1010 and in scattered sections of 18 U.S.C.) (imposing requirements on telecommunications carriers to assist in law enforcement efforts)
-
-
-
-
71
-
-
78649364500
-
-
OFFICE OF INSPECTOR GEN., supra note 4, at 2 (noting among other things that the Department of Transportation developed Highway Watch in 1998)
-
OFFICE OF INSPECTOR GEN., supra note 4, at 2 (noting among other things that the Department of Transportation developed Highway Watch in 1998)
-
-
-
-
72
-
-
78649387688
-
-
Infragard: Public Private Partnership, (describing the joint FBI-private sector collaboration that in 1996 led to the founding of Infragard)
-
Infragard: Public Private Partnership, http://www.infragard.net/faq.php (describing the joint FBI-private sector collaboration that in 1996 led to the founding of Infragard).
-
-
-
-
73
-
-
34249981302
-
-
supra note 9, (describing the social, commercial, financial, and employment-related interactions between the 9/11 hijackers and the American public)
-
See 9/11 COMMISSION REPORT, supra note 9, at 215-53 (describing the social, commercial, financial, and employment-related interactions between the 9/11 hijackers and the American public)
-
9/11 Commission Report
, pp. 215-253
-
-
-
74
-
-
78649377550
-
-
Wes Allison, The Terrorists Next Door, ST. PETERSBURG TIMES, Oct. 2, 2001, available at (reporting on the lives of those 9/11 hijackers who lived in South Florida in the lead up to 9/11)
-
see also Wes Allison, The Terrorists Next Door, ST. PETERSBURG TIMES, Oct. 2, 2001, available at http://www.sptimes.com/News/100201/Floridian/The- terrorists-next-d.shtml (reporting on the lives of those 9/11 hijackers who lived in South Florida in the lead up to 9/11)
-
-
-
-
75
-
-
78649391866
-
-
Pam Belluck, A Mundane Itinerary on the Eve of Terror, N.Y. TIMES, Oct. 5, 2001, at A1 (recounting the activities of two 9/11 hijackers who had spent the day before the attacks in suburban Maine)
-
Pam Belluck, A Mundane Itinerary on the Eve of Terror, N.Y. TIMES, Oct. 5, 2001, at A1 (recounting the activities of two 9/11 hijackers who had spent the day before the attacks in suburban Maine)
-
-
-
-
76
-
-
78649365063
-
-
John Cloud, Atta's Odyssey, TIME, Sept. 30, 2001 (describing Mohamed Atta's routine interactions with Americans)
-
John Cloud, Atta's Odyssey, TIME, Sept. 30, 2001 (describing Mohamed Atta's routine interactions with Americans)
-
-
-
-
77
-
-
78649368670
-
-
Rich Connell & Robert J. Lopez, Portrait Emerges of an Islamic Hard-Liner, L.A. TIMES, Dec. 12, 2001, at A18 (recounting Zacarias Moussaoui's life in Oklahoma)
-
Rich Connell & Robert J. Lopez, Portrait Emerges of an Islamic Hard-Liner, L.A. TIMES, Dec. 12, 2001, at A18 (recounting Zacarias Moussaoui's life in Oklahoma).
-
-
-
-
78
-
-
78649389179
-
-
Prosecution's Ex. OG00020.2: Chronology of Events for Hijackers, United States v. Moussaoui, No. 01-455-A (E.D. Va.) http://www.vaed.uscourts.gov/ notablecases/moussaoui/ exhibits/prosecution/OG00020-02.pdf (detailing the hijackers' pre-9/11 use of ATMs for cash withdrawals, use of the Internet to access online travel records, and use of commercial airline services to travel around the United States)
-
See Prosecution's Ex. OG00020.2: Chronology of Events for Hijackers, United States v. Moussaoui, No. 01-455-A (E.D. Va.) http://www.vaed.uscourts. gov/notablecases/moussaoui/ exhibits/prosecution/OG00020-02.pdf (detailing the hijackers' pre-9/11 use of ATMs for cash withdrawals, use of the Internet to access online travel records, and use of commercial airline services to travel around the United States)
-
-
-
-
79
-
-
78649361953
-
-
THOMAS R. ELDRIDGE ET AL., NAT'L COMM'N ON TERRORIST ATTACKS UPON THE U.S., 9/11 AND TERRORIST TRAVEL: STAFF REPORT OF THE NATIONAL COMMISSION ON TERRORIST ATTACKS UPON THE UNITED STATES (2004), (detailing the hijackers' activities and interactions in the United States prior to the attacks)
-
THOMAS R. ELDRIDGE ET AL., NAT'L COMM'N ON TERRORIST ATTACKS UPON THE U.S., 9/11 AND TERRORIST TRAVEL: STAFF REPORT OF THE NATIONAL COMMISSION ON TERRORIST ATTACKS UPON THE UNITED STATES (2004), http://govinfo.library.unt.edu/ 911/staff-statements/911-TerrTrav-Monograph.pdf (detailing the hijackers' activities and interactions in the United States prior to the attacks).
-
-
-
-
80
-
-
78649355931
-
-
William K. Rashbaum, Police Tactic Against Terror: Let's Network, N.Y. TIMES, Aug. 14, 2004, at B1 (quoting the New York City Deputy Commissioner for Intelligence as saying that "[t]he next Mohamed Atta is far more likely to intersect with someone from the private sector than a law enforcement officer")
-
See, e.g., William K. Rashbaum, Police Tactic Against Terror: Let's Network, N.Y. TIMES, Aug. 14, 2004, at B1 (quoting the New York City Deputy Commissioner for Intelligence as saying that "[t]he next Mohamed Atta is far more likely to intersect with someone from the private sector than a law enforcement officer").
-
-
-
-
81
-
-
78649372123
-
-
SOLOVE, supra note 11, at 166 (describing how intelligence officials can compile extensive personal profiles on suspects by examining the data generated by those suspects when they use the services of banks, telecoms, and airlines)
-
See, e.g., SOLOVE, supra note 11, at 166 (describing how intelligence officials can compile extensive personal profiles on suspects by examining the data generated by those suspects when they use the services of banks, telecoms, and airlines)
-
-
-
-
82
-
-
10844244653
-
-
James X. Dempsey & Lara M. Flint, Commercial Data and National Security, 72 GEO. WASH. L. REV. 1459, 1459 (2004) (noting the "depth and breadth of personally identifiable information available from private [commercial] sources, and the capacity to analyze such data and draw from it patterns, inferences, and knowledge")
-
James X. Dempsey & Lara M. Flint, Commercial Data and National Security, 72 GEO. WASH. L. REV. 1459, 1459 (2004) (noting the "depth and breadth of personally identifiable information available from private [commercial] sources, and the capacity to analyze such data and draw from it patterns, inferences, and knowledge")
-
-
-
-
83
-
-
78649340882
-
-
Michaels, supra note 9, at 908-09 (describing the pivotal role the private sector can play in assisting government surveillance and intelligence-gathering efforts)
-
Michaels, supra note 9, at 908-09 (describing the pivotal role the private sector can play in assisting government surveillance and intelligence-gathering efforts).
-
-
-
-
84
-
-
78649341757
-
-
Lane et al., supra note 8 (discussing the passenger-led revolt against hijackers on United 93)
-
See Lane et al., supra note 8 (discussing the passenger-led revolt against hijackers on United 93).
-
-
-
-
85
-
-
78649364810
-
-
Brooks, supra note 8 (remarking on the initiative taken by passengers on commercial airlines in attempting to thwart terrorist attacks)
-
See Brooks, supra note 8 (remarking on the initiative taken by passengers on commercial airlines in attempting to thwart terrorist attacks)
-
-
-
-
86
-
-
78649375226
-
-
Blake Morrison, Airlines Push Passengers To Police Cabins, USA TODAY, Oct. 17, 2001, at 1A (quoting one pilot as instructing the passengers: "Throw your shoes at them. A couple of you get up and tackle him. Beat the snot out of him. I don't care.")
-
see also Blake Morrison, Airlines Push Passengers To Police Cabins, USA TODAY, Oct. 17, 2001, at 1A (quoting one pilot as instructing the passengers: "Throw your shoes at them. A couple of you get up and tackle him. Beat the snot out of him. I don't care.").
-
-
-
-
87
-
-
78649384206
-
-
President George W. Bush, Address to Joint Session of Congress (Sept. 20, 2001), in H.R. DOC. NO. 107-122 (2003) (honoring a victim of United Flight 93 who risked his life endeavoring to stop the 9/11 hijackers from using the airplane as a weapon)
-
See President George W. Bush, Address to Joint Session of Congress (Sept. 20, 2001), in H.R. DOC. NO. 107-122 (2003) (honoring a victim of United Flight 93 who risked his life endeavoring to stop the 9/11 hijackers from using the airplane as a weapon)
-
-
-
-
88
-
-
78649380027
-
-
Joe Sharkey, There's a New Deputy in the Sky, N.Y. TIMES, Mar. 25, 2003, at C8 (noting that post-9/11 passengers are "much more vigilant now than ever")
-
Joe Sharkey, There's a New Deputy in the Sky, N.Y. TIMES, Mar. 25, 2003, at C8 (noting that post-9/11 passengers are "much more vigilant now than ever").
-
-
-
-
89
-
-
78649335978
-
-
Karen Brandon & Dahleen Glanton, Americans on Alert for Terror: Agencies Swamped by Calls Reporting Suspicious Activity, CHI. TRIB., Nov. 25, 2001, at C7 ("President Bush has asked citizens to help avert further terrorist attacks by looking out for suspicious activity, and Americans have responded with vigor.")
-
See Karen Brandon & Dahleen Glanton, Americans on Alert for Terror: Agencies Swamped by Calls Reporting Suspicious Activity, CHI. TRIB., Nov. 25, 2001, at C7 ("President Bush has asked citizens to help avert further terrorist attacks by looking out for suspicious activity, and Americans have responded with vigor.")
-
-
-
-
90
-
-
78649346552
-
-
Ariana Eunjung Cha, Watchdogs Seek Out the Web's Bad Side, WASH. POST, Apr. 25, 2005, at A1 (profiling a leading Internet vigilante who gravitated to online surveillance of Jihadist Web sites and chat rooms after being unable, for health reasons, to enlist in the military after 9/11)
-
Ariana Eunjung Cha, Watchdogs Seek Out the Web's Bad Side, WASH. POST, Apr. 25, 2005, at A1 (profiling a leading Internet vigilante who gravitated to online surveillance of Jihadist Web sites and chat rooms after being unable, for health reasons, to enlist in the military after 9/11)
-
-
-
-
91
-
-
78649361626
-
-
Ann Davis et al., The Tattlers: A Nation of Tipsters Answers FBI's Call in War on Terrorism-It's Neighbor vs. Neighbor, as Agents are Swamped by 435,000 Citizen Leads, WALL ST. J., Nov. 21, 2001, at A1 (describing an influx of calls to the authorities by members of the public reporting on what they perceive to be suspicious activities in their neighborhoods)
-
Ann Davis et al., The Tattlers: A Nation of Tipsters Answers FBI's Call in War on Terrorism-It's Neighbor vs. Neighbor, as Agents are Swamped by 435,000 Citizen Leads, WALL ST. J., Nov. 21, 2001, at A1 (describing an influx of calls to the authorities by members of the public reporting on what they perceive to be suspicious activities in their neighborhoods)
-
-
-
-
92
-
-
78649360164
-
-
Sam Howe Verhovek, Air Passengers Vow To Resist Any Hijackers, N.Y. TIMES, Oct. 11, 2001, at A1 (describing post-9/11 airline passengers' apparent willingness to counter efforts by hijackers to take control of the plane)
-
Sam Howe Verhovek, Air Passengers Vow To Resist Any Hijackers, N.Y. TIMES, Oct. 11, 2001, at A1 (describing post-9/11 airline passengers' apparent willingness to counter efforts by hijackers to take control of the plane)
-
-
-
-
93
-
-
78649350585
-
-
Ripley, supra note 4, at 39 (noting the enthusiasm among truckers for Highway Watch and characterizing it as a "morale booster for drivers")
-
Ripley, supra note 4, at 39 (noting the enthusiasm among truckers for Highway Watch and characterizing it as a "morale booster for drivers").
-
-
-
-
94
-
-
78649350328
-
-
Several of the examples discussed in section B of this Part were examined in greater detail in Michaels, supra note 9, at 910-16
-
Several of the examples discussed in section B of this Part were examined in greater detail in Michaels, supra note 9, at 910-16.
-
-
-
-
95
-
-
78649363456
-
-
To be sure, it would not be a stretch to call those individuals "deputies." But the entreaties to the public are of a character quite different from the more direct and targeted appeals made by the government to specific industries, firms, and employee cohorts. Moreover, those members of the general public who heed the government's call typically occupy the force-multiplying space. For reasons explained below, this Article is particularly interested in deputies who serve the complementary purpose of providing the government with strategic advantages distinct from mere manpower support
-
To be sure, it would not be a stretch to call those individuals "deputies." But the entreaties to the public are of a character quite different from the more direct and targeted appeals made by the government to specific industries, firms, and employee cohorts. Moreover, those members of the general public who heed the government's call typically occupy the force-multiplying space. For reasons explained below, this Article is particularly interested in deputies who serve the complementary purpose of providing the government with strategic advantages distinct from mere manpower support.
-
-
-
-
96
-
-
78649382419
-
-
BART ELIAS, CONG. RESEARCH SERV., SECURING GENERAL AVIATION 21 (2009), available at, (discussing the Airport Watch program)
-
See, e.g., BART ELIAS, CONG. RESEARCH SERV., SECURING GENERAL AVIATION 21 (2009), available at http://www.fas.org/sgp/crs/homesec/RL33194.pdf (discussing the Airport Watch program)
-
-
-
-
97
-
-
78649383297
-
-
Sara Kehaulani Goo, Private Pilots Enlisted for Security, WASH. POST, Oct. 10, 2002, at A14 (describing Airport Watch and Operation TIPS)
-
Sara Kehaulani Goo, Private Pilots Enlisted for Security, WASH. POST, Oct. 10, 2002, at A14 (describing Airport Watch and Operation TIPS)
-
-
-
-
98
-
-
78649357857
-
-
Swanson, supra note 2 (reporting on Highway Watch)
-
Swanson, supra note 2 (reporting on Highway Watch).
-
-
-
-
99
-
-
78649374395
-
-
President George W. Bush, State of the Union Address, WASH. POST, Jan. 30, 2002, at A16 (announcing the establishment of USA Freedom Corps, which included Operation TIPS)
-
See President George W. Bush, State of the Union Address, WASH. POST, Jan. 30, 2002, at A16 (announcing the establishment of USA Freedom Corps, which included Operation TIPS)
-
-
-
-
100
-
-
78649336287
-
-
STANLEY, supra note 1, at 3-4 (distinguishing the surveillance-oriented TIPS program from the other Freedom Corps initiatives promoting citizen preparation and training in the event of civil emergencies)
-
see also STANLEY, supra note 1, at 3-4 (distinguishing the surveillance-oriented TIPS program from the other Freedom Corps initiatives promoting citizen preparation and training in the event of civil emergencies).
-
-
-
-
101
-
-
78649388909
-
-
Documents relating to Operation TIPS have long been removed from Justice Department Web sites, but have been preserved elsewhere
-
Documents relating to Operation TIPS have long been removed from Justice Department Web sites, but have been preserved elsewhere.
-
-
-
-
102
-
-
78649383615
-
-
The Memory Hole: Website for Operation TIPS Quietly Changes, (reproducing the text of the official Operation TIPS Web site, dated July 16, 2002)
-
See, e.g., The Memory Hole: Website for Operation TIPS Quietly Changes, http://www.thememoryhole.org/policestate/tips-changes.htm (reproducing the text of the official Operation TIPS Web site, dated July 16, 2002).
-
-
-
-
103
-
-
78649351462
-
-
Id
-
Id.
-
-
-
-
104
-
-
78649365963
-
-
Editorial, Ashcroft v. Americans, BOS. GLOBE, July 17, 2002, at A22
-
See Editorial, Ashcroft v. Americans, BOS. GLOBE, July 17, 2002, at A22 (stating that Operation TIPS targets "letter carriers, meter readers, cable technicians, and other workers with access to private homes as informants to report to the Justice Department any activities they think suspicious")
-
Stating that Operation TIPS targets "Letter Carriers, Meter Readers, Cable Technicians, and Other Workers with Access to Private Homes as Informants to Report to the Justice Department any activities they think suspicious"
-
-
-
105
-
-
78649355343
-
-
STANLEY, supra note 1, at 3 ("Many of those targeted for inclusion in the scheme were workers with access to Americans' homes-utility workers, letter carriers and cable technicians-who were to report to the government anything that they considered an 'unusual or suspicious activity.'"). Compare Katz v. United States, 389 U.S. 347, 351 (1967) ("What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection."), with United States v. Kyllo, 533 U.S. 27, 37 (2001) ("There is certainly no exception to the warrant requirement for the officer who barely cracks open the front door ⋯ . In the home ⋯ all details are intimate details, because the entire area is held safe from prying government eyes.")
-
STANLEY, supra note 1, at 3 ("Many of those targeted for inclusion in the scheme were workers with access to Americans' homes-utility workers, letter carriers and cable technicians-who were to report to the government anything that they considered an 'unusual or suspicious activity.'"). Compare Katz v. United States, 389 U.S. 347, 351 (1967) ("What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection."), with United States v. Kyllo, 533 U.S. 27, 37 (2001) ("There is certainly no exception to the warrant requirement for the officer who barely cracks open the front door ⋯ . In the home ⋯ all details are intimate details, because the entire area is held safe from prying government eyes.")
-
-
-
-
106
-
-
78649370958
-
-
Silverman v. United States, 365 U. S. 505, 511 (1961) ("At the very core [of the Fourth Amendment] stands the right of a man to retreat into his own home and there be free from unreasonable governmental intrusion.")
-
Silverman v. United States, 365 U. S. 505, 511 (1961) ("At the very core [of the Fourth Amendment] stands the right of a man to retreat into his own home and there be free from unreasonable governmental intrusion.").
-
-
-
-
107
-
-
78649357134
-
-
The Memory Hole, supra note 35
-
The Memory Hole, supra note 35.
-
-
-
-
108
-
-
78649342186
-
-
MARTIN ALAN GREENBERG, CITIZENS DEFENDING AMERICA: FROM COLONIAL TIMES TO THE AGE OF TERRORISM 72-74 (2005) (quoting Senator Orrin Hatch as stating with respect to Operation TIPS that "[w]e don't want to see a 1984 Orwellian-type situation here")
-
See, e.g., MARTIN ALAN GREENBERG, CITIZENS DEFENDING AMERICA: FROM COLONIAL TIMES TO THE AGE OF TERRORISM 72-74 (2005) (quoting Senator Orrin Hatch as stating with respect to Operation TIPS that "[w]e don't want to see a 1984 Orwellian-type situation here")
-
-
-
-
109
-
-
78649373835
-
-
STANLEY, supra note 1, at 3 (noting that "the TIPS proposal was ⋯ met by a storm of outrage" that led the government to narrow its scope)
-
STANLEY, supra note 1, at 3 (noting that "the TIPS proposal was ⋯ met by a storm of outrage" that led the government to narrow its scope).
-
-
-
-
110
-
-
78649372669
-
-
Homeland Security Act of 2002, Pub. L. No. 107-296, § 880, 116 Stat. 2135, 2245 (codified at 6 U.S.C. § 460 (2006))
-
Homeland Security Act of 2002, Pub. L. No. 107-296, § 880, 116 Stat. 2135, 2245 (codified at 6 U.S.C. § 460 (2006))
-
-
-
-
111
-
-
78649391830
-
-
cf. Department of Defense Appropriations Act, 2004, Pub. L. No. 108-87, § 8131, 117 Stat. 1054, 1102 (2003) (defunding the Terrorism Information Awareness data-mining project)
-
cf. Department of Defense Appropriations Act, 2004, Pub. L. No. 108-87, § 8131, 117 Stat. 1054, 1102 (2003) (defunding the Terrorism Information Awareness data-mining project).
-
-
-
-
112
-
-
78649347131
-
-
Donohue, supra note 21, at 1133, For instance, Florida reproduced key features of the disbanded TIPS program within its boundaries
-
See Donohue, supra note 21, at 1133 (noting that "a plethora of programs" emerged in the wake of Operation TIPS's demise). For instance, Florida reproduced key features of the disbanded TIPS program within its boundaries.
-
Noting that "A Plethora of Programs" Emerged in the Wake of Operation TIPS's Demise
-
-
-
113
-
-
78649391587
-
-
Brian Baskin, Workers Recruited in War on Terror, ORLANDO SENTINEL, July 8, 2004, at A1 (noting that Florida's programs are similar to the disbanded federal program)
-
See, e.g., Brian Baskin, Workers Recruited in War on Terror, ORLANDO SENTINEL, July 8, 2004, at A1 (noting that Florida's programs are similar to the disbanded federal program)
-
-
-
-
114
-
-
78649363903
-
-
STANLEY, supra note 1, at 5 (noting that key aspects of Operation TIPS have been replicated at the state level by Florida)
-
STANLEY, supra note 1, at 5 (noting that key aspects of Operation TIPS have been replicated at the state level by Florida).
-
-
-
-
115
-
-
78649388908
-
-
STANLEY, supra note 1, at 5 n.10. Stanley notes that whereas Operation TIPS would have created a centralized maritime program, subsequent efforts by the Coast Guard have aimed for far more decentralized operations. Id
-
See STANLEY, supra note 1, at 5 n.10. Stanley notes that whereas Operation TIPS would have created a centralized maritime program, subsequent efforts by the Coast Guard have aimed for far more decentralized operations. Id.
-
-
-
-
116
-
-
78649336873
-
-
Id. at 4. Acknowledging the program's lineage, President Bush called Coastal Beacon "one of the most innovative TIP[S] programs in the country." Press Release, White House, President Promotes Citizen Corps for Safer Communities (Apr. 8, 2002)
-
Id. at 4. Acknowledging the program's lineage, President Bush called Coastal Beacon "one of the most innovative TIP[S] programs in the country." Press Release, White House, President Promotes Citizen Corps for Safer Communities (Apr. 8, 2002), http://georgewbushwhitehouse.archives.gov/ news/releases/2002/04/20020408-4.html.
-
-
-
-
117
-
-
78649368693
-
-
STANLEY, supra note 1, at 5
-
STANLEY, supra note 1, at 5.
-
-
-
-
118
-
-
78649356534
-
-
Id.; Michigan State Police: Homeland Security River Watch Program
-
Id.; Michigan State Police: Homeland Security River Watch Program, http://www.michigan.gov/msp/0,1607,7-123-1589-3492-73050-,00.html.
-
-
-
-
119
-
-
78649388885
-
-
GREENBERG, supra note 39, at 224-25; OFFICE OF INSPECTOR GEN., supra note 4, at 1-2. Highway Watch, a private-public partnership, actually predates what is commonly called the Global War on Terror. In 1998, the Trucking Association started the program, with funding from the Department of Transportation, to report generally on transportation emergencies, such as hazardous road conditions and vehicle crashes. After 9/11, its scope was expanded in recognition of the threats of terrorist attacks on U.S. soil, and its governmental responsibilities were transferred to the new Department of Homeland Security
-
GREENBERG, supra note 39, at 224-25; OFFICE OF INSPECTOR GEN., supra note 4, at 1-2. Highway Watch, a private-public partnership, actually predates what is commonly called the Global War on Terror. In 1998, the Trucking Association started the program, with funding from the Department of Transportation, to report generally on transportation emergencies, such as hazardous road conditions and vehicle crashes. After 9/11, its scope was expanded in recognition of the threats of terrorist attacks on U.S. soil, and its governmental responsibilities were transferred to the new Department of Homeland Security.
-
-
-
-
120
-
-
78649343142
-
-
OFFICE OF INSPECTOR GEN., supra note 4, at 2 (noting the post-9/11 expansion and re-orientation of Highway Watch)
-
See OFFICE OF INSPECTOR GEN., supra note 4, at 2 (noting the post-9/11 expansion and re-orientation of Highway Watch).
-
-
-
-
121
-
-
78649369266
-
-
STANLEY, supra note 1, at 5
-
STANLEY, supra note 1, at 5.
-
-
-
-
122
-
-
78649385606
-
-
OFFICE OF INSPECTOR GEN., supra note 4, at 4. The program has been temporarily suspended while DHS shifts resources away from the Trucking Association and to a government contractor that will help administer the program. Samuel Lowenberg, Truckers Lose DHS Contract, POLITICO, May 16, 2008
-
OFFICE OF INSPECTOR GEN., supra note 4, at 4. The program has been temporarily suspended while DHS shifts resources away from the Trucking Association and to a government contractor that will help administer the program. Samuel Lowenberg, Truckers Lose DHS Contract, POLITICO, May 16, 2008, http://www.politico.com/news/stories/0508/10412.html.
-
-
-
-
123
-
-
78649343429
-
-
ELIAS, supra note 33, at 35; Alonso-Zaldivar, supra note 3; Goo, supra note 33
-
ELIAS, supra note 33, at 35; Alonso-Zaldivar, supra note 3; Goo, supra note 33.
-
-
-
-
124
-
-
34249981302
-
-
supra note 9, at 221-27 (describing suspicious behavior exhibited by some of the 9/11 hijackers during their flight-training programs)
-
See 9/11 COMMISSION REPORT, supra note 9, at 221-27 (describing suspicious behavior exhibited by some of the 9/11 hijackers during their flight-training programs)
-
9/11 COMMISSION REPORT
-
-
-
125
-
-
78649337170
-
-
Transcript of Record at 747-62, United States v. Moussaoui, No. 1:01cr455 (E.D. Va. Mar. 9, 2006), available at http://cryptome.org/usa-v-zm-030906-01. htm (statement of Moussaoui's flight school instructor) (recounting suspicious behavior of Zacarias Moussaoui in flight school)
-
see also Transcript of Record at 747-62, United States v. Moussaoui, No. 1:01cr455 (E.D. Va. Mar. 9, 2006), available at http://cryptome.org/usa-v-zm- 030906-01.htm (statement of Moussaoui's flight school instructor) (recounting suspicious behavior of Zacarias Moussaoui in flight school)
-
-
-
-
126
-
-
78649353179
-
-
ELIAS, supra note 33, at 1, 12-17 (noting that the 9/11 hijackers were trained on general aviation planes and made suspicious inquiries regarding the purchase of small aircraft)
-
ELIAS, supra note 33, at 1, 12-17 (noting that the 9/11 hijackers were trained on general aviation planes and made suspicious inquiries regarding the purchase of small aircraft).
-
-
-
-
128
-
-
78649339940
-
-
AOPA's Airport Watch, (describing the general aviation community's partnership with the Transportation Security Administration that involves more than 600,000 private pilots and airport workers acting as the government's "eyes and ears for observing and reporting suspicious activity")
-
see also AOPA's Airport Watch, http://aopa.org/airportwatch/ (describing the general aviation community's partnership with the Transportation Security Administration that involves more than 600,000 private pilots and airport workers acting as the government's "eyes and ears for observing and reporting suspicious activity").
-
-
-
-
129
-
-
78649374099
-
-
Goldman, supra note 8 (describing surveillance training and reporting responsibilities for doormen and other residential-building workers)
-
See Goldman, supra note 8 (describing surveillance training and reporting responsibilities for doormen and other residential-building workers)
-
-
-
-
130
-
-
78649337154
-
-
Swanson, supra note 2 (noting the incorporation of doormen and other residential-building workers into the homeland security fold)
-
Swanson, supra note 2 (noting the incorporation of doormen and other residential-building workers into the homeland security fold).
-
-
-
-
131
-
-
78649358986
-
-
Goldman, supra note 8
-
Goldman, supra note 8.
-
-
-
-
132
-
-
78649374378
-
-
Id
-
Id.
-
-
-
-
133
-
-
78649358143
-
-
Id. (quoting New York City Police Commissioner Raymond Kelly)
-
Id. (quoting New York City Police Commissioner Raymond Kelly).
-
-
-
-
134
-
-
78649353478
-
-
id. (reporting that "doormen are advised to be on the lookout for cars and trucks that seem out of place or are parked too long near buildings" and "[s]uperintendents are told to be vigilant in monitoring people with little or no furniture or newly opened bank accounts who move into apartments."). As the 9/11 Commission reported, some of the 9/11 terrorists revealed telltale signs of being suspicious tenants, including attempting to pay deposits for apartment rentals with cash and owning little furniture
-
See id. (reporting that "doormen are advised to be on the lookout for cars and trucks that seem out of place or are parked too long near buildings" and "[s]uperintendents are told to be vigilant in monitoring people with little or no furniture or newly opened bank accounts who move into apartments."). As the 9/11 Commission reported, some of the 9/11 terrorists revealed telltale signs of being suspicious tenants, including attempting to pay deposits for apartment rentals with cash and owning little furniture.
-
-
-
-
135
-
-
34249981302
-
-
supra note 9, at 219 reporting that a real-estate agent rejected an attempt by two of the hijackers to pay cash for a deposit on an apartment rental and noting that two hijackers moved into an apartment with no furniture and no possessions). Whether those practices provide significantly sensitive guidance in exposing terrorists is, of course, a debatable proposition; but having workers focus on such tenant practices speaks to the enthusiasm and, perhaps, hubris of being able to discern terrorist patterns from atypical behavioral cues
-
See 9/11 COMMISSION REPORT, supra note 9, at 219 (reporting that a real-estate agent rejected an attempt by two of the hijackers to pay cash for a deposit on an apartment rental and noting that two hijackers moved into an apartment with no furniture and no possessions). Whether those practices provide significantly sensitive guidance in exposing terrorists is, of course, a debatable proposition; but having workers focus on such tenant practices speaks to the enthusiasm and, perhaps, hubris of being able to discern terrorist patterns from atypical behavioral cues.
-
9/11 Commission Report
-
-
-
136
-
-
78649366829
-
-
SUSKIND, supra note 21, at 209-11 (describing how then-CIA Director George Tenet appealed to the patriotism of Western Union executives to secure their cooperation)
-
See, e.g., SUSKIND, supra note 21, at 209-11 (describing how then-CIA Director George Tenet appealed to the patriotism of Western Union executives to secure their cooperation).
-
-
-
-
137
-
-
78649380923
-
-
Particular, there have been allegations that the government has canceled or withheld contracts in retaliation against firms that refused to cooperate in intelligence operations
-
In particular, there have been allegations that the government has canceled or withheld contracts in retaliation against firms that refused to cooperate in intelligence operations.
-
-
-
-
138
-
-
78649365964
-
-
Leslie Cauley, NSA Has Massive Database of Americans' Phone Calls, USA TODAY, May 11, 2006, at A1 ("In one meeting, an NSA representative suggested that ⋯ . Qwest's footdragging might affect its ability to get future classified work with the government. Like other big telecommunications companies, Qwest already had classified contracts and hoped to get more.")
-
See Leslie Cauley, NSA Has Massive Database of Americans' Phone Calls, USA TODAY, May 11, 2006, at A1 ("In one meeting, an NSA representative suggested that ⋯ . Qwest's footdragging might affect its ability to get future classified work with the government. Like other big telecommunications companies, Qwest already had classified contracts and hoped to get more.")
-
-
-
-
139
-
-
78649342503
-
-
Ellen Nakashima & Dan Eggen, Former CEO Says U.S. Punished Phone Firm, WASH. POST, Oct. 13, 2007, at A1 (citing a Qwest executive's claim that the NSA canceled contracts worth hundreds of millions of dollars as punishment for the telecom refusing to participate in the call-data program)
-
Ellen Nakashima & Dan Eggen, Former CEO Says U.S. Punished Phone Firm, WASH. POST, Oct. 13, 2007, at A1 (citing a Qwest executive's claim that the NSA canceled contracts worth hundreds of millions of dollars as punishment for the telecom refusing to participate in the call-data program).
-
-
-
-
140
-
-
78649343999
-
-
For examples of firms receiving strategically important information in exchange for their participation, see Infragard: Public-Private Partnership, supra note 22
-
For examples of firms receiving strategically important information in exchange for their participation, see Infragard: Public-Private Partnership, supra note 22
-
-
-
-
141
-
-
78649376688
-
-
Matthew Rothschild, The FBI Deputizes Business, PROGRESSIVE, Mar. 20, 2008, available at; and, Block, supra note 7. Rothschild notes that upon learning of a possible terrorist threat to some bridges in California, federal officials informed Enron and Morgan Stanley-both members of the corporate-FBI strategic partnership (called Infragard)-well before notifying state officials, including the Governor. Rothschild, supra, at 21-22
-
Matthew Rothschild, The FBI Deputizes Business, PROGRESSIVE, Mar. 20, 2008, available at https://www.progressive.org/mag-rothschild0308.html; and, Block, supra note 7. Rothschild notes that upon learning of a possible terrorist threat to some bridges in California, federal officials informed Enron and Morgan Stanley-both members of the corporate-FBI strategic partnership (called Infragard)-well before notifying state officials, including the Governor. Rothschild, supra, at 21-22.
-
-
-
-
142
-
-
78649373249
-
-
Block, supra note 7 (noting that FedEx has been named to the FBI's regional terrorism task force)
-
See Block, supra note 7 (noting that FedEx has been named to the FBI's regional terrorism task force).
-
-
-
-
143
-
-
78649353773
-
-
At other times, it appears that companies are selling access to information in ways that make them appear more like profiteers than partners, let alone coerced accomplices
-
At other times, it appears that companies are selling access to information in ways that make them appear more like profiteers than partners, let alone coerced accomplices.
-
-
-
-
144
-
-
78649336585
-
-
Kim Zetter, Yahoo Issues Takedown Notice for Spying Price List, WIRED, Dec. 4, 2009, http://www.wired.com/threatlevel/2009/12/yahoo-spy-prices (reporting on the comprehensive pricing scheme that Yahoo has established for facilitating law enforcement search requests)
-
See Kim Zetter, Yahoo Issues Takedown Notice for Spying Price List, WIRED, Dec. 4, 2009, http://www.wired.com/threatlevel/2009/12/yahoo-spy-prices (reporting on the comprehensive pricing scheme that Yahoo has established for facilitating law enforcement search requests).
-
-
-
-
145
-
-
78649344945
-
-
OFFICE OF INSPECTOR GEN., supra note 4, at 1
-
See OFFICE OF INSPECTOR GEN., supra note 4, at 1
-
-
-
-
146
-
-
78649362541
-
-
Generally James Risen & Eric Lichtblau, Bush Lets U.S. Spy on Callers Without Courts, N.Y. TIMES, Dec. 16, 2005, at A1 (describing the TSP). 63. JAMES RISEN, STATE OF WAR: THE SECRET HISTORY OF THE CIA AND THE BUSH ADMINISTRATION 48 (2006)
-
see generally James Risen & Eric Lichtblau, Bush Lets U.S. Spy on Callers Without Courts, N.Y. TIMES, Dec. 16, 2005, at A1 (describing the TSP). 63. JAMES RISEN, STATE OF WAR: THE SECRET HISTORY OF THE CIA AND THE BUSH ADMINISTRATION 48 (2006).
-
-
-
-
147
-
-
78649380922
-
-
Cauley & Diamond, supra note 1, . ACLU v. NSA, 438 F. Supp. 2d 754 (E.D. Mich. 2006). That decision was reversed by a divided panel for want of standing. ACLU v. NSA, 493 F.3d 644 (6th Cir. 2007), cert. denied, 552 U.S. 1179
-
Cauley & Diamond, supra note 1. One federal district court declared the program illegal. ACLU v. NSA, 438 F. Supp. 2d 754 (E.D. Mich. 2006). That decision was reversed by a divided panel for want of standing. ACLU v. NSA, 493 F.3d 644 (6th Cir. 2007), cert. denied, 552 U.S. 1179 (2008)
-
(2008)
One Federal District Court Declared the Program Illegal
-
-
-
148
-
-
78649385918
-
-
Al-Haramain Islamic Found. v. Obama, MDL Docket No. 06-1791, 2010 WL 1244349 (N.D. Cal. Mar. 31, 2010) (rejecting the government's state-secrets barrier to reviewing the TSP and entering summary judgment in favor of the plaintiffs in light of the Government's failure to oppose plaintiffs' merits arguments)
-
see also Al-Haramain Islamic Found. v. Obama, MDL Docket No. 06-1791, 2010 WL 1244349 (N.D. Cal. Mar. 31, 2010) (rejecting the government's state-secrets barrier to reviewing the TSP and entering summary judgment in favor of the plaintiffs in light of the Government's failure to oppose plaintiffs' merits arguments).
-
-
-
-
149
-
-
78649359552
-
-
RISEN, supra note 63, at 48
-
RISEN, supra note 63, at 48
-
-
-
-
150
-
-
78649359277
-
-
Cauley & Diamond, supra note 1
-
Cauley & Diamond, supra note 1.
-
-
-
-
151
-
-
78649371517
-
-
Foreign Intelligence Surveillance Act of 1978, Pub. L. No. 95-511, 92 Stat. 1783 (codified as amended in scattered titles of U.S.C.). In the aftermath of the TSP, FISA has been amended several times
-
Foreign Intelligence Surveillance Act of 1978, Pub. L. No. 95-511, 92 Stat. 1783 (codified as amended in scattered titles of U.S.C.). In the aftermath of the TSP, FISA has been amended several times.
-
-
-
-
152
-
-
78649336265
-
-
Protect America Act of 2007, Pub. L. No. 110-55, 121 Stat. 552 (to be codified at 50 U.S.C. §§ 1803, 1805a-1805c)
-
See Protect America Act of 2007, Pub. L. No. 110-55, 121 Stat. 552 (to be codified at 50 U.S.C. §§ 1803, 1805a-1805c)
-
-
-
-
153
-
-
78649350295
-
-
FISA Amendments Act of 2008, Pub. L. No. 110-261, 122 Stat. 2468 (to be codified in scattered sections of 50 U.S.C.)
-
FISA Amendments Act of 2008, Pub. L. No. 110-261, 122 Stat. 2468 (to be codified in scattered sections of 50 U.S.C.).
-
-
-
-
154
-
-
78649374100
-
-
RISEN, supra note 63, at 44
-
RISEN, supra note 63, at 44.
-
-
-
-
155
-
-
78649378713
-
-
Cauley, supra note 58
-
Cauley, supra note 58
-
-
-
-
156
-
-
78649380613
-
-
Saul Hansell & Eric Lichtblau, U.S. Wants Internet Companies To Keep Web-Surfing Records, N.Y. TIMES, June 2, 2006, at A15. It is worth noting that Qwest's former CEO reported first being approached by the government in early 2001, months before the attacks of September 11. Scott Shane, Former Phone Chief Says Spy Agency Sought Surveillance Help Before 9/11, N.Y. TIMES, Oct. 14, 2007, at A27
-
Saul Hansell & Eric Lichtblau, U.S. Wants Internet Companies To Keep Web-Surfing Records, N.Y. TIMES, June 2, 2006, at A15. It is worth noting that Qwest's former CEO reported first being approached by the government in early 2001, months before the attacks of September 11. Scott Shane, Former Phone Chief Says Spy Agency Sought Surveillance Help Before 9/11, N.Y. TIMES, Oct. 14, 2007, at A27.
-
-
-
-
157
-
-
78649359567
-
-
Orin S. Kerr, Internet Surveillance Law After the USA PATRIOT Act: The Big Brother That Isn't, 97 NW. U. L. REV. 607, 611 (2003)
-
See Orin S. Kerr, Internet Surveillance Law After the USA PATRIOT Act: The Big Brother That Isn't, 97 NW. U. L. REV. 607, 611 (2003).
-
-
-
-
158
-
-
42349108508
-
-
Michaels, supra note 9, at 912; Ira S. Rubinstein, Ronald D. Lee & Paul M. Schwartz, Data Mining and Internet Profiling: Emerging Regulatory and Technological Approaches, 75 U. CHI. L. REV. 261, 261 (2008)
-
See Michaels, supra note 9, at 912; Ira S. Rubinstein, Ronald D. Lee & Paul M. Schwartz, Data Mining and Internet Profiling: Emerging Regulatory and Technological Approaches, 75 U. CHI. L. REV. 261, 261 (2008)
-
-
-
-
159
-
-
78649374394
-
-
K.A. Taipale, Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data, 5 COLUM. SCI. & TECH. L. REV. 1, 33-35 (2003). Though the bulk of legal and academic attention is typically focused on the content of communications (and thus on eavesdropping)
-
K.A. Taipale, Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data, 5 COLUM. SCI. & TECH. L. REV. 1, 33-35 (2003). Though the bulk of legal and academic attention is typically focused on the content of communications (and thus on eavesdropping)
-
-
-
-
160
-
-
10844281812
-
-
A Legislator's Guide to Amending It, 72 GEO. WASH. L. REV. 1208, 1229 n. 142 (2004), scholars have also recognized the exceptional utility of compiling virtual dossiers and piecing together virtual itineraries of suspects' communications over months or even years
-
see, for example, Orin S. Kerr, A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It, 72 GEO. WASH. L. REV. 1208, 1229 n. 142 (2004), scholars have also recognized the exceptional utility of compiling virtual dossiers and piecing together virtual itineraries of suspects' communications over months or even years.
-
A User's Guide to the Stored Communications Act
-
-
Kerr, O.S.1
-
161
-
-
10844224409
-
Reconstructing electronic surveillance law, 72
-
Solove D.J.
-
See, e.g., Daniel J. Solove, Reconstructing Electronic Surveillance Law, 72 GEO.WASH. L. REV. 1264, 1287-88 (2004).
-
(2004)
Geo.Wash. L. Rev.
, vol.1264
, pp. 1287-1288
-
-
-
162
-
-
78649368692
-
-
18 U.S.C. § 2709(a) (2006), since limited by John Doe, Inc. v. Mukasey, 549 F.3d 861, 862 (2d Cir. 2008). For a more detailed discussion of NSLs
-
See, e.g., 18 U.S.C. § 2709(a) (2006), since limited by John Doe, Inc. v. Mukasey, 549 F.3d 861, 862 (2d Cir. 2008). For a more detailed discussion of NSLs
-
-
-
-
163
-
-
77951195681
-
-
OFFICE OF THE INSPECTOR GEN., U.S. DEP'T OF JUSTICE, hereinafter FBI USE OF NATIONAL SECURITY LETTERS
-
see OFFICE OF THE INSPECTOR GEN., U.S. DEP'T OF JUSTICE, A REVIEW OF THE FEDERAL BUREAU OF INVESTIGATION'S USE OF NATIONAL SECURITY LETTERS, at x?xiv (2007), http://www.usdoj.gov/oig/special/s0703b/final.pdf [hereinafter FBI USE OF NATIONAL SECURITY LETTERS].
-
(2007)
A Review of the Federal Bureau of Investigation's use of National Security Letters
, pp. 10-14
-
-
-
164
-
-
78649372125
-
-
OFFICE OF INSPECTOR GEN., U.S. DEP'T OF JUSTICE, [hereinafter FBI USE OF EXIGENT LETTERS]. For an earlier instance of reported improprieties involving the FBI's use of NSLs
-
OFFICE OF INSPECTOR GEN., U.S. DEP'T OF JUSTICE, A REVIEW OF THE FEDERAL BUREAU OF INVESTIGATION'S USE OF EXIGENT LETTERS AND OTHER INFORMAL REQUESTS FOR TELEPHONE RECORDS 12 (2010), http://www.justice.gov/oig/special/s1001r.pdf [hereinafter FBI USE OF EXIGENT LETTERS]. For an earlier instance of reported improprieties involving the FBI's use of NSLs
-
(2010)
A Review of the Federal Bureau of Investigation's use of Exigent letters and Other Informal Requests for Telephone RECORDS
, vol.12
-
-
-
166
-
-
78649357418
-
-
John Solomon & Carrie Johnson, FBI Broke Law for Years in Phone Record Searches, WASH. POST, Jan. 20, 2010, at A1
-
See John Solomon & Carrie Johnson, FBI Broke Law for Years in Phone Record Searches, WASH. POST, Jan. 20, 2010, at A1.
-
-
-
-
168
-
-
78649380336
-
-
Ryan Singel, FBI, Telecoms Teamed To Breach Wiretap Laws, WIRED, Jan. 21, 2010
-
Ryan Singel, FBI, Telecoms Teamed To Breach Wiretap Laws, WIRED, Jan. 21, 2010, http://www.wired.com/threatlevel/2010/01/fbi-attverizon-violated- wiretapping-laws/#ixzz0e3YLimPT.
-
-
-
-
170
-
-
78649371840
-
-
18 U.S.C. § 2702(c)(4) (2006) (authorizing emergency exceptions to the usual NSL requirements in cases where the government has a good-faith belief that a delay in acquiring the information could result in serious injury or the loss of life)
-
See 18 U.S.C. § 2702(c)(4) (2006) (authorizing emergency exceptions to the usual NSL requirements in cases where the government has a good-faith belief that a delay in acquiring the information could result in serious injury or the loss of life).
-
-
-
-
172
-
-
78649379049
-
-
Id. at 33
-
Id. at 33.
-
-
-
-
173
-
-
78649348017
-
-
Id. at 47-50
-
Id. at 47-50.
-
-
-
-
174
-
-
78649376707
-
-
Which were presumably not in the financial interests of the firms, in no small part because such informal facilitation may have exposed the telecoms to legal liabilities. Many of the actual terms of the contracts are censored in the Inspector General's published report. Based on the nonredacted portions of the report, the contracts do not appear to call for the fluid exchange of information that appears to have taken place
-
Which were presumably not in the financial interests of the firms, in no small part because such informal facilitation may have exposed the telecoms to legal liabilities. Many of the actual terms of the contracts are censored in the Inspector General's published report. Based on the nonredacted portions of the report, the contracts do not appear to call for the fluid exchange of information that appears to have taken place.
-
-
-
-
175
-
-
78649342185
-
-
id. at 20-24
-
See id. at 20-24.
-
-
-
-
176
-
-
78649390979
-
-
Id. at 47-49
-
Id. at 47-49.
-
-
-
-
177
-
-
78649353794
-
-
Id. at 25
-
Id. at 25.
-
-
-
-
178
-
-
78649361064
-
-
SUSKIND, supra note 21, at 211. Western Union has a long history of providing such support for the government
-
SUSKIND, supra note 21, at 211. Western Union has a long history of providing such support for the government.
-
-
-
-
179
-
-
78649345350
-
-
supra note 21 and accompanying text
-
See supra note 21 and accompanying text.
-
-
-
-
180
-
-
78649340270
-
-
SUSKIND, supra note 21, at 208-11
-
SUSKIND, supra note 21, at 208-11
-
-
-
-
181
-
-
78649340881
-
-
Michaels, supra note 9, at 914
-
Michaels, supra note 9, at 914.
-
-
-
-
182
-
-
78649356833
-
-
Block, supra note 7
-
Block, supra note 7.
-
-
-
-
183
-
-
78649383614
-
-
id. (quoting FedEx's CEO as committing his company to cooperate with the government "up to and including the line on which we would be doing a disservice to our shareholders")
-
See id. (quoting FedEx's CEO as committing his company to cooperate with the government "up to and including the line on which we would be doing a disservice to our shareholders").
-
-
-
-
184
-
-
78649342184
-
-
Id
-
Id.
-
-
-
-
185
-
-
53149142365
-
FedEx delivers-info to the feds
-
June 5, citing both UPS and the USPS as unwilling to provide customer information to the government without a warrant
-
See Corky Siemaszko, FedEx Delivers-Info to the Feds, N.Y. DAILY NEWS, June 5, 2005, at 24 (citing both UPS and the USPS as unwilling to provide customer information to the government without a warrant)
-
(2005)
N.Y. Daily News
, pp. 24
-
-
Siemaszko, C.1
-
186
-
-
78649358419
-
-
Dan Eggen, Bush Warned About Mail-Opening Authority, WASH. POST, Jan. 5, 2007, at A3
-
see also Dan Eggen, Bush Warned About Mail-Opening Authority, WASH. POST, Jan. 5, 2007, at A3
-
-
-
-
187
-
-
78649362570
-
-
Isaac Baker, Little Support for TIPS, NEWSDAY, July 21, 2002, at A25
-
Isaac Baker, Little Support for TIPS, NEWSDAY, July 21, 2002, at A25.
-
-
-
-
188
-
-
78649372148
-
-
NYPD Shield: Operation Nexus, (detailing a program designed to foster counterterrorism collaboration between the police department and the private sector)
-
See NYPD Shield: Operation Nexus, http://www.nypdshield.org/public/nexus. nypd (detailing a program designed to foster counterterrorism collaboration between the police department and the private sector).
-
-
-
-
189
-
-
78649386209
-
-
William Finnegan, The Terrorism Beat: How is the N.Y.P.D. Defending the City?, NEW YORKER, July 25, 2005, at 58
-
See William Finnegan, The Terrorism Beat: How is the N.Y.P.D. Defending the City?, NEW YORKER, July 25, 2005, at 58
-
-
-
-
190
-
-
78649368987
-
-
Judith Miller, on the Front Line in the War on Terrorism, CITY J., Summer 2007, available at, Rashbaum, supra note 25
-
Judith Miller, on the Front Line in the War on Terrorism, CITY J., Summer 2007, available at http://www.city-journal.org/html/17-3-preventing-terrorism. html; Rashbaum, supra note 25.
-
-
-
-
191
-
-
78649368133
-
-
Miller, supra note 90
-
See Miller, supra note 90.
-
-
-
-
192
-
-
78649379743
-
-
Because there is no shortage of discussions regarding privacy, either in this Symposium or in the scholarly literature in general, I do not focus on the privacy encroachments even though they are broadly implicated and likely exacerbated by the legal uncertainty undergirding most of the deputization arrangements under examination
-
Because there is no shortage of discussions regarding privacy, either in this Symposium or in the scholarly literature in general, I do not focus on the privacy encroachments even though they are broadly implicated and likely exacerbated by the legal uncertainty undergirding most of the deputization arrangements under examination.
-
-
-
-
193
-
-
78649377834
-
-
note
-
A few notes before proceeding. First, although identitarian limbo and the uncertain legal status of deputies lie at the heart of the concerns to be discussed in this section, it does not follow that the converse-a deputization regime grounded in legal certainty-is a necessary or sufficient antidote. This issue will be addressed in greater detail in Part III. Second, although I recognize that what I term a "challenge" incident to deputization is subject to some normative contestation, the scope of this Symposium contribution limits the depth with which I can thoroughly defend the challenges as normatively charged phenomena. Third, deputization, even as narrowly addressed in this inquiry, operates along a spectrum between some regulatory foundation and no regulatory foundation. Some programs are, at the very least, publicly announced and funded, with congressional appropriations going to conduct outreach and training and to pay for the dedicated hotlines and other support measures that facilitate deputization.
-
A Few Notes Before Proceeding
-
-
-
194
-
-
78649345348
-
-
supra notes 46-48 and accompanying text (discussing Highway Watch)
-
See, e.g., supra notes 46-48 and accompanying text (discussing Highway Watch)
-
-
-
-
195
-
-
78649363737
-
-
supra notes 49-51 and accompanying text (discussing Airport Watch). These programs may be audited regularly (as a practical reality, if not a statutory imperative) and not only in response to a front-page scandal
-
supra notes 49-51 and accompanying text (discussing Airport Watch). These programs may be audited regularly (as a practical reality, if not a statutory imperative) and not only in response to a front-page scandal.
-
-
-
-
196
-
-
78649364473
-
-
OFFICE OF INSPECTOR GEN., supra note 4. Others are largely (and intentionally) under the radar, and within that category we have some programs-such as the TSP-that seem to violate existing laws, and also programs that simply avail themselves of the opportunity to operate in unregulated space
-
See, e.g., OFFICE OF INSPECTOR GEN., supra note 4. Others are largely (and intentionally) under the radar, and within that category we have some programs-such as the TSP-that seem to violate existing laws, and also programs that simply avail themselves of the opportunity to operate in unregulated space.
-
-
-
-
197
-
-
78649355625
-
-
supra subpart I(B)
-
See, e.g., supra subpart I(B)
-
-
-
-
198
-
-
61849136231
-
-
cf. Adrian Vermeule, Our Schmittian Administrative Law, 122 HARV. L. REV. 1095, 1103-31 (2009) (describing "black" and "grey" holes in the administrative state). Thus, my analysis sometimes encompasses all deputization programs, and sometimes just a particular subset. Fourth, the distinctions drawn in Part I between employee and corporate-oriented deputization programs are relevant here, too. By and large, many of the corporate-oriented arrangements are likely to implicate all four sets of challenges described in this section. Employee programs, on the other hand, are more likely to implicate only the latter two
-
cf. Adrian Vermeule, Our Schmittian Administrative Law, 122 HARV. L. REV. 1095, 1103-31 (2009) (describing "black" and "grey" holes in the administrative state). Thus, my analysis sometimes encompasses all deputization programs, and sometimes just a particular subset. Fourth, the distinctions drawn in Part I between employee and corporate-oriented deputization programs are relevant here, too. By and large, many of the corporate-oriented arrangements are likely to implicate all four sets of challenges described in this section. Employee programs, on the other hand, are more likely to implicate only the latter two.
-
-
-
-
199
-
-
78649381204
-
-
supra note 57 and accompanying text
-
See supra note 57 and accompanying text.
-
-
-
-
200
-
-
78649388551
-
-
supra notes 58-60 and accompanying text
-
See supra notes 58-60 and accompanying text.
-
-
-
-
201
-
-
78649366527
-
-
For a canvassing of some such legal authorities to compel assistance
-
For a canvassing of some such legal authorities to compel assistance
-
-
-
-
202
-
-
42349110194
-
-
Paul M. Schwartz, Reviving Telecommunications Surveillance Law, 75 U. CHI. L. REV. 287, 289-305 (2008)
-
see Paul M. Schwartz, Reviving Telecommunications Surveillance Law, 75 U. CHI. L. REV. 287, 289-305 (2008).
-
-
-
-
203
-
-
78649391863
-
-
Critical Infrastructure Information Act (CIIA) of 2002, 6 U.S.C. §§ 131-134 (2006). The CIIA includes a blueprint for private-public cooperation and for private-public quid pro quos. Among other things, the Act immunizes corporations from civil liability for weaknesses in their infrastructure, provided those weaknesses are first disclosed to the government. Id. § 133(a)(1). The government encourages and rewards such disclosures as a way of increasing the likelihood of its knowing what corporate vulnerabilities exist and how they might endanger national, economic, or homeland security
-
See, e.g., Critical Infrastructure Information Act (CIIA) of 2002, 6 U.S.C. §§ 131-134 (2006). The CIIA includes a blueprint for private-public cooperation and for private-public quid pro quos. Among other things, the Act immunizes corporations from civil liability for weaknesses in their infrastructure, provided those weaknesses are first disclosed to the government. Id. § 133(a)(1). The government encourages and rewards such disclosures as a way of increasing the likelihood of its knowing what corporate vulnerabilities exist and how they might endanger national, economic, or homeland security.
-
-
-
-
204
-
-
78649391292
-
-
For discussions of data brokering, see Michaels, supra note 9, at 917-19
-
For discussions of data brokering, see Michaels, supra note 9, at 917-19
-
-
-
-
205
-
-
78649339381
-
-
Joshua L. Simmons, Note, Buying You: The Government's Use of Fourth-Parties to Launder Data About "the People," 2009 COLUM. BUS. L. REV. 950
-
Joshua L. Simmons, Note, Buying You: The Government's Use of Fourth-Parties to Launder Data About "the People," 2009 COLUM. BUS. L. REV. 950.
-
-
-
-
206
-
-
84893272200
-
-
Pub. L. No. 103-414, 108 Stat. 4279 (codified at 47 U.S.C. §§ 1001-1010 and in scattered sections of 18 U.S.C.) (requiring telecommunications providers to ensure that their technologies are compatible with those the government uses to engage in lawful surveillance and monitoring efforts)
-
See, e.g., Communications Assistance for Law Enforcement Act (CALEA) of 1994, Pub. L. No. 103-414, 108 Stat. 4279 (codified at 47 U.S.C. §§ 1001-1010 and in scattered sections of 18 U.S.C.) (requiring telecommunications providers to ensure that their technologies are compatible with those the government uses to engage in lawful surveillance and monitoring efforts)
-
Communications Assistance for Law Enforcement Act (CALEA) of 1994
-
-
-
207
-
-
78649336872
-
-
Davis- Bacon Act, ch. 411, 46 Stat. 1494 (1931) (requiring government contractors to pay prevailing wages for public-works projects)
-
Davis- Bacon Act, ch. 411, 46 Stat. 1494 (1931) (requiring government contractors to pay prevailing wages for public-works projects).
-
-
-
-
208
-
-
78649383934
-
-
Perhaps a firm such as UPS might experience such pressure. As noted above, FedEx, UPS's chief rival, has received a range of national security perks, which might be viewed as compensation for the courier company's steadfast and public support of government intelligence operations. See supra Michaels, supra note 9, at 914-16 notes 60, 85-88 and accompanying text. Among other things, FedEx was the first private company to be named to a seat on the FBI's regional terrorism task force. It was also awarded an exceptional license to establish its own police force with investigatory and arrest powers
-
Perhaps a firm such as UPS might experience such pressure. As noted above, FedEx, UPS's chief rival, has received a range of national security perks, which might be viewed as compensation for the courier company's steadfast and public support of government intelligence operations. See supra Michaels, supra note 9, at 914-16 notes 60, 85-88 and accompanying text. Among other things, FedEx was the first private company to be named to a seat on the FBI's regional terrorism task force. It was also awarded an exceptional license to establish its own police force with investigatory and arrest powers.
-
-
-
-
209
-
-
78649380630
-
-
supra Michaels, supra note 9, at 914-15, Block, supra note 7. As a dutiful deputy, FedEx receives information early
-
See supra Michaels, supra note 9, at 914-15, Block, supra note 7. As a dutiful deputy, FedEx receives information early.
-
-
-
-
210
-
-
78649361043
-
-
Gary Fields, FedEx Takes Direct Approach to Terrorism, WALL ST. J., Oct. 9, 2003, at A4 (noting that members of the regional task forces are given "more-sensitive and specific data regarding terrorist threats than businesses usually receive"). Might UPS, which reportedly rejected at least some of the government's requests for counterterrorism assistance, be left out in the cold? If so, it likely incurs greater risk by not having the same access FedEx does to counterterrorism intelligence. For instance, if UPS facilities aren't as carefully safeguarded (or if UPS has to expend more of its own resources on private security initiatives because it isn't receiving courtesy tips from the government), might that be a reason for customers and shareholders to switch to FedEx?
-
See Gary Fields, FedEx Takes Direct Approach to Terrorism, WALL ST. J., Oct. 9, 2003, at A4 (noting that members of the regional task forces are given "more-sensitive and specific data regarding terrorist threats than businesses usually receive"). Might UPS, which reportedly rejected at least some of the government's requests for counterterrorism assistance, be left out in the cold? If so, it likely incurs greater risk by not having the same access FedEx does to counterterrorism intelligence. For instance, if UPS facilities aren't as carefully safeguarded (or if UPS has to expend more of its own resources on private security initiatives because it isn't receiving courtesy tips from the government), might that be a reason for customers and shareholders to switch to FedEx?
-
-
-
-
211
-
-
78649351999
-
-
id. ("[T]he FedEx representative [receiving the more sensitive and specific information] can signal the company to take preventative actions. If the task force learns certain kinds of explosives are being used by terrorists in Asia, for instance, the representative can alert the company to install specialized explosives detectors there.")
-
See id. ("[T]he FedEx representative [receiving the more sensitive and specific information] can signal the company to take preventative actions. If the task force learns certain kinds of explosives are being used by terrorists in Asia, for instance, the representative can alert the company to install specialized explosives detectors there.").
-
-
-
-
212
-
-
78649363431
-
-
supra note 57 and accompanying text
-
See supra note 57 and accompanying text.
-
-
-
-
213
-
-
78649365639
-
-
For seminal discussions of principal-agent concerns
-
For seminal discussions of principal-agent concerns
-
-
-
-
214
-
-
44649197264
-
-
3 J. FIN. ECON., 333-43 (1976)
-
see Michael C. Jensen & William H. Meckling, Theory of the Firm: Managerial Behavior, Agency Costs, and Ownership Structure, 3 J. FIN. ECON. 305, 312-30, 333-43 (1976)
-
Theory of the Firm: Managerial Behavior, Agency Costs, and Ownership Structure
, vol.305
, pp. 312-330
-
-
Jensen, M.C.1
Meckling, W.H.2
-
215
-
-
78649348282
-
-
Armen A. Alchian & Harold Demsetz, Production, Information Costs, and Economic Organization, 62 AM. ECON. REV. 777, 785-90 (1972)
-
Armen A. Alchian & Harold Demsetz, Production, Information Costs, and Economic Organization, 62 AM. ECON. REV. 777, 785-90 (1972).
-
-
-
-
216
-
-
78649342160
-
-
Competition In Contracting Act (CICA) of 1984, Pub. L. No. 98-369, 98 Stat. 1175 (codified at 40 U.S.C. § 471 et seq.; 41 U.S.C. § 251 et seq.). Some exceptions to the general rule that winners are chosen based entirely on the strength of their bid proposals exist; by and large, however, those bases for discriminating among firms on non-market terms have been authorized by statute or regulation
-
See, e.g., Competition In Contracting Act (CICA) of 1984, Pub. L. No. 98-369, 98 Stat. 1175 (codified at 40 U.S.C. § 471 et seq.; 41 U.S.C. § 251 et seq.). Some exceptions to the general rule that winners are chosen based entirely on the strength of their bid proposals exist; by and large, however, those bases for discriminating among firms on non-market terms have been authorized by statute or regulation.
-
-
-
-
217
-
-
78649379742
-
-
Veterans Benefit Act of 2003, Pub. L. No. 108-183, 117 Stat. 2662 (codified at 15 U.S.C. § 657f (2003)) (authorizing preferences for contract bids from small businesses owned by service-disabled veterans). It is also true that, for better or worse, the government could-and sometimes might need to-tailor its contracting specifications such that certain firms are likely to be the only ones qualified to handle delegated responsibilities
-
See, e.g., Veterans Benefit Act of 2003, Pub. L. No. 108-183, 117 Stat. 2662 (codified at 15 U.S.C. § 657f (2003)) (authorizing preferences for contract bids from small businesses owned by service-disabled veterans). It is also true that, for better or worse, the government could-and sometimes might need to-tailor its contracting specifications such that certain firms are likely to be the only ones qualified to handle delegated responsibilities.
-
-
-
-
218
-
-
78649383933
-
-
Dan Baum, Nation Builders for Hire, N.Y. TIMES, June 22, 2003, § 6 (Magazine), at 32 ("KBR got the Iraqi oil-field contract without having to compete for it because, according to the Army's classified contingency plan for repairing Iraq's infrastructure, KBR was the only company with the skills, resources, and security clearances to do the job on short notice."). Moreover, it is of course the case that the government could impose legal conditions on firms selectively, serving some with onerous subpoenas and court orders, while simply asking other firms to comply. Thus, my point is not that the government is otherwise-outside of deputization, that is-entirely evenhanded
-
See, e.g., Dan Baum, Nation Builders for Hire, N.Y. TIMES, June 22, 2003, § 6 (Magazine), at 32 ("KBR got the Iraqi oil-field contract without having to compete for it because, according to the Army's classified contingency plan for repairing Iraq's infrastructure, KBR was the only company with the skills, resources, and security clearances to do the job on short notice."). Moreover, it is of course the case that the government could impose legal conditions on firms selectively, serving some with onerous subpoenas and court orders, while simply asking other firms to comply. Thus, my point is not that the government is otherwise-outside of deputization, that is-entirely evenhanded
-
-
-
-
219
-
-
78649392122
-
-
rather, simply that deputization may exacerbate the potential for unequal treatment across firms
-
rather, simply that deputization may exacerbate the potential for unequal treatment across firms.
-
-
-
-
220
-
-
78649342501
-
-
Assuming the firms aren't themselves security risks, there is little justification for not sharing this nonscarce information with other American businesses (other than to hold it out as a reward or in-kind payment)
-
Assuming the firms aren't themselves security risks, there is little justification for not sharing this nonscarce information with other American businesses (other than to hold it out as a reward or in-kind payment).
-
-
-
-
221
-
-
78649390978
-
-
supra notes 59, 100 and accompanying text
-
See supra notes 59, 100 and accompanying text.
-
-
-
-
222
-
-
78649375541
-
-
E.g., Critical Infrastructure Information Act (CIIA) of 2002, Pub. L. No. 107-296, §§ 211-215, 116 Stat. 2135, 2150 (2002) (codified at 6 U.S.C. §§ 131-134 (2002))
-
E.g., Critical Infrastructure Information Act (CIIA) of 2002, Pub. L. No. 107-296, §§ 211-215, 116 Stat. 2135, 2150 (2002) (codified at 6 U.S.C. §§ 131-134 (2002)).
-
-
-
-
223
-
-
78649362854
-
-
Cf. HBO v. FCC, 567 F.2d 9, 53-54 (D.C. Cir. 1977) (criticizing ex parte contacts in the course of agency rulemaking and noting that "[e]ven the possibility that there is here one administrative record for the public and this court and another for the Commission and those 'in the know' is intolerable")
-
Cf. HBO v. FCC, 567 F.2d 9, 53-54 (D.C. Cir. 1977) (criticizing ex parte contacts in the course of agency rulemaking and noting that "[e]ven the possibility that there is here one administrative record for the public and this court and another for the Commission and those 'in the know' is intolerable").
-
-
-
-
224
-
-
78649383612
-
-
Heckler v. Chaney, 470 U.S. 821, 834-35 (1985) (declaring agency decisions as against whom to bring enforcement actions generally unreviewable)
-
See, e.g., Heckler v. Chaney, 470 U.S. 821, 834-35 (1985) (declaring agency decisions as against whom to bring enforcement actions generally unreviewable)
-
-
-
-
225
-
-
78649340269
-
-
FTC v. Standard Oil Co. of Cal., 449 U.S. 232, 238-46 (1980) (finding FTC issuance of a complaint was not judicially reviewable before the conclusion of the administrative adjudication, notwithstanding the complaint's immediate disruptive effects on business)
-
FTC v. Standard Oil Co. of Cal., 449 U.S. 232, 238-46 (1980) (finding FTC issuance of a complaint was not judicially reviewable before the conclusion of the administrative adjudication, notwithstanding the complaint's immediate disruptive effects on business).
-
-
-
-
226
-
-
78649382997
-
-
note
-
See Heckler, 470 U.S. at 848 (Marshall, J., concurring). Justice Marshall states: [T]he sine qua non of the APA [Administrative Procedure Act] was to alter inherited judicial reluctance to constrain the exercise of discretionary administrative power-to rationalize and make fairer the exercise of such discretion. Since passage of the APA, the sustained effort of administrative law has been to "continuously narro[w] the category of actions considered to be so discretionary as to be exempted from review." Discretion may well be necessary to carry out a variety of important administrative functions, but discretion can be a veil for laziness, corruption, incompetency, lack of will, or other motives, and for that reason, "the presence of discretion should not bar a court from considering a claim of illegal or arbitrary use of discretion." Judicial review is available under the APA in the absence of a clear and convincing demonstration that Congress intended to preclude it precisely so that agencies, whether in rulemaking, adjudicating, acting or failing to act, do not become stagnant backwaters of caprice and lawlessness. Id. (internal citations omitted).
-
-
-
-
227
-
-
78649363736
-
-
Ethyl Corp. v. EPA, 541 F.2d 1, 68 (D.C. Cir. 1976) (Leventhal, J. concurring) ("Congress has been willing to delegate ⋯ broadly and courts have upheld such delegation because there is court review to assure that the agency exercises its delegated power within statutory limits, and that it fleshes out objectives within those limits by an administration that is not irrational or discriminatory.")
-
See Ethyl Corp. v. EPA, 541 F.2d 1, 68 (D.C. Cir. 1976) (Leventhal, J. concurring) ("Congress has been willing to delegate ⋯ broadly and courts have upheld such delegation because there is court review to assure that the agency exercises its delegated power within statutory limits, and that it fleshes out objectives within those limits by an administration that is not irrational or discriminatory.")
-
-
-
-
228
-
-
78649350012
-
-
Massachusetts v. EPA, 549 U.S. 497, 533-34 (2007) (requiring agency to provide reasoned justification for refusing to render a scientific judgment relevant to whether greenhouse gases should be regulated)
-
see also Massachusetts v. EPA, 549 U.S. 497, 533-34 (2007) (requiring agency to provide reasoned justification for refusing to render a scientific judgment relevant to whether greenhouse gases should be regulated)
-
-
-
-
229
-
-
78649371518
-
-
Motor Vehicle Mfrs. Ass'n v. State Farm Mut. Auto. Ins. Co., 463 U.S. 29, 56-57 (1983) (invalidating agency recission of rule where the agency fails to articulate a reasoned explanation for the recission)
-
Motor Vehicle Mfrs. Ass'n v. State Farm Mut. Auto. Ins. Co., 463 U.S. 29, 56-57 (1983) (invalidating agency recission of rule where the agency fails to articulate a reasoned explanation for the recission)
-
-
-
-
230
-
-
78649339091
-
-
Citizens To Preserve Overton Park, Inc. v. Volpe, 401 U.S. 402, 417-20 (1971) (rejecting agency decision where Secretary failed to make findings in support of agency decision)
-
Citizens To Preserve Overton Park, Inc. v. Volpe, 401 U.S. 402, 417-20 (1971) (rejecting agency decision where Secretary failed to make findings in support of agency decision)
-
-
-
-
231
-
-
47049115280
-
-
Jody Freeman & Adrian Vermeule, Massachusetts v. EPA: From Politics to Expertise, 2007 SUP. CT. REV. 51, 87-92, 97 (highlighting an expertiseforcing approach by courts reviewing agency decisions and non-decisions)
-
Jody Freeman & Adrian Vermeule, Massachusetts v. EPA: From Politics to Expertise, 2007 SUP. CT. REV. 51, 87-92, 97 (highlighting an expertiseforcing approach by courts reviewing agency decisions and non-decisions).
-
-
-
-
232
-
-
41849134319
-
Intelligence oversight, 45
-
See James A. Baker, Intelligence Oversight, 45 HARV. J. ON LEGIS. 199, 205 (2008)
-
(2008)
Harv. J. on Legis.
, vol.199
, pp. 205
-
-
Baker, J.A.1
-
233
-
-
33749182513
-
-
Neal Kumar Katyal, Internal Separation of Powers: Checking Today's Most Dangerous Branch from Within, 115 YALE L.J. 2314, 2318-22 (2006) (emphasizing that foreign affairs and national security are domains where legislative and judicial scrutiny is often lacking)
-
Neal Kumar Katyal, Internal Separation of Powers: Checking Today's Most Dangerous Branch from Within, 115 YALE L.J. 2314, 2318-22 (2006) (emphasizing that foreign affairs and national security are domains where legislative and judicial scrutiny is often lacking)
-
-
-
-
234
-
-
78649340858
-
Memorandum from alfred cummings
-
Senator Dianne Feinstein (Dec. 14, 2005), available at, (noting Congress's comparative inability, because of the limited information the Executive provides, to independently assess the quality of intelligence and the operations)
-
Memorandum from Alfred Cummings, Specialist in Intelligence and Nat'l Sec., Cong. Research Serv., to Senator Dianne Feinstein (Dec. 14, 2005), available at http://feinstein.senate.gov/crs-intel.htm (noting Congress's comparative inability, because of the limited information the Executive provides, to independently assess the quality of intelligence and the operations).
-
Specialist in Intelligence and Nat'l Sec., Cong. Research Serv.
-
-
-
235
-
-
78649358712
-
-
The decision to mix the government search request with the business bottom line is an almost unavoidable outcome when deputies are asked to occupy hybridized space and must, at the end of the day, prioritize their private (business) responsibilities over their public charges
-
The decision to mix the government search request with the business bottom line is an almost unavoidable outcome when deputies are asked to occupy hybridized space and must, at the end of the day, prioritize their private (business) responsibilities over their public charges.
-
-
-
-
236
-
-
78649377260
-
-
Dodge v. Ford Motor Co., 170 N.W. 668, 684 (Mich. 1919) (emphasizing the primary duty of corporate managers to maximize shareholder profits)
-
See Dodge v. Ford Motor Co., 170 N.W. 668, 684 (Mich. 1919) (emphasizing the primary duty of corporate managers to maximize shareholder profits)
-
-
-
-
237
-
-
78649352878
-
-
available at, describing a particularly coldblooded business decision by a telecom working very closely with the FBI on counterterrorism operations that resulted in a temporary disabling of the government's access to electronic surveillance and lost evidence
-
see also AUDIT DIV., U.S. DEP'T OF JUSTICE, AUDIT REPORT 08-03, SUMMARY OF FINDINGS: THE FEDERAL BUREAU OF INVESTIGATION'S MANAGEMENT OF CONFIDENTIAL CASE FUNDS AND TELECOMMUNICATION COSTS 4 (2008), available at http://www.usdoj.gov/oig/reports/FBI/a0803/final.pdf (describing a particularly coldblooded business decision by a telecom working very closely with the FBI on counterterrorism operations that resulted in a temporary disabling of the government's access to electronic surveillance and lost evidence)
-
(2008)
Audit Div., U.S. Dep't of Justice, Audit Report 08-03, Summary of Findings: The Federal Bureau of Investigation's Management of Confidential Case Funds and Telecommunication Costs
, vol.4
-
-
-
238
-
-
78649348830
-
-
cf. Daniel I. Gordon, Organizational Conflicts of Interest: A Growing Integrity Challenge, 35 PUB. CONT. L.J. 25 (2005). of course, an argument could be made that prioritizing the government requests in the context of homeland security would be in the longterm financial interests of the corporations. Cf. Shlensky v. Wrigley, 237 N.E.2d 776, 777-78 (Ill. App. 2d 1968)
-
cf. Daniel I. Gordon, Organizational Conflicts of Interest: A Growing Integrity Challenge, 35 PUB. CONT. L.J. 25 (2005). of course, an argument could be made that prioritizing the government requests in the context of homeland security would be in the longterm financial interests of the corporations. Cf. Shlensky v. Wrigley, 237 N.E.2d 776, 777-78 (Ill. App. 2d 1968)
-
-
-
-
239
-
-
78649360191
-
-
A.P. Smith Mfg. Co. v. Barlow, 98 A.2d 581, 583-86 (N.J. 1953)
-
A.P. Smith Mfg. Co. v. Barlow, 98 A.2d 581, 583-86 (N.J. 1953).
-
-
-
-
241
-
-
78649352880
-
-
Eric Lichtblau, F.B.I. Data Mining Reached Beyond Initial Targets, N.Y. TIMES, Sept. 9, 2007, at A1 ("The scope of the demands for information could be seen in an August 2005 letter seeking the call records for particular phone numbers under suspicion. The letter closed by saying: 'Additionally, please provide a community of interest for the telephone numbers in the attached list.")
-
See Eric Lichtblau, F.B.I. Data Mining Reached Beyond Initial Targets, N.Y. TIMES, Sept. 9, 2007, at A1 ("The scope of the demands for information could be seen in an August 2005 letter seeking the call records for particular phone numbers under suspicion. The letter closed by saying: 'Additionally, please provide a community of interest for the telephone numbers in the attached list.'")
-
-
-
-
242
-
-
78649384827
-
-
supra note 72, detailing corporate involvement in developing a list of names associated with a particular target
-
see also FBI USE OF EXIGENT LETTERS, supra note 72, at 47-49 (detailing corporate involvement in developing a list of names associated with a particular target).
-
FBI use of Exigent Letters
, pp. 47-49
-
-
-
243
-
-
78649380901
-
-
FREDERICK A.O. SCHWARZ, JR. & AZIZ Z. HUQ, UNCHECKED AND UNBALANCED: PRESIDENTIAL POWER IN A TIME OF TERROR 132 (2007) (describing efforts by the intelligence agencies to proceed informally on the basis of "thinner evidence")
-
See FREDERICK A.O. SCHWARZ, JR. & AZIZ Z. HUQ, UNCHECKED AND UNBALANCED: PRESIDENTIAL POWER IN A TIME OF TERROR 132 (2007) (describing efforts by the intelligence agencies to proceed informally on the basis of "thinner evidence")
-
-
-
-
244
-
-
78649391585
-
-
Carol D. Leonning & Dafna Lanzer, Judges on Surveillance Court To Be Briefed on Spy Program, WASH. POST, Dec. 22, 2005, at A1 (noting the Bush Administration's contentions that the statutory and regulatory evidentiary hurdles were often too great for the intelligence agencies to secure the desired authorization they needed to conduct electronic surveillance). 115. See 49 U.S.C. § 114(h) (Supp. I 2001) (providing authority for the imposition of No-Fly lists on commercial airlines)
-
Carol D. Leonning & Dafna Lanzer, Judges on Surveillance Court To Be Briefed on Spy Program, WASH. POST, Dec. 22, 2005, at A1 (noting the Bush Administration's contentions that the statutory and regulatory evidentiary hurdles were often too great for the intelligence agencies to secure the desired authorization they needed to conduct electronic surveillance). 115. See 49 U.S.C. § 114(h) (Supp. I 2001) (providing authority for the imposition of No-Fly lists on commercial airlines)
-
-
-
-
245
-
-
58149348712
-
International travel and the constitution, 56
-
see also Jeffrey Kahn, International Travel and the Constitution, 56 UCLA L. REV. 271, 321-23 (2008)
-
(2008)
Ucla L. Rev.
, vol.271
, pp. 321-323
-
-
Kahn, J.1
-
246
-
-
78649349103
-
-
Justin Florence, Note, Making the No Fly List Fly, 115 YALE L.J. 2148, 2155-59 (2006)
-
Justin Florence, Note, Making the No Fly List Fly, 115 YALE L.J. 2148, 2155-59 (2006).
-
-
-
-
247
-
-
78649368674
-
-
generally Danielle Keats Citron, Technological Due Process, 85 WASH. U. L. REV. 1249, 1274 (2008) (noting the No-Fly list's high incidence of false positives)
-
See generally Danielle Keats Citron, Technological Due Process, 85 WASH. U. L. REV. 1249, 1274 (2008) (noting the No-Fly list's high incidence of false positives).
-
-
-
-
248
-
-
78649340260
-
-
Exec. Order 13,224, 66 Fed. Reg. 49,079 (Sept. 23, 2001)
-
Exec. Order 13,224, 66 Fed. Reg. 49,079 (Sept. 23, 2001)
-
-
-
-
249
-
-
78649370362
-
-
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, Pub. L. No. 107-56, § 314, 115 Stat. 272, 307-08 (codified at 31 U.S.C. § 5311 (2006))
-
see also Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, Pub. L. No. 107-56, § 314, 115 Stat. 272, 307-08 (codified at 31 U.S.C. § 5311 (2006)).
-
-
-
-
250
-
-
78649353495
-
-
Sara B. Miller, Blacklisted by the Bank, CHRISTIAN SCI. MONITOR, Aug. 25, 2003, Kim Zetter, Big Business Becoming Big Brother, WIRED, Aug. 9, 2004, http://wired.com/news/conflict/0,2100,64492,00.html?tw=wn-tophead-1 (describing the possibility that firms are cross-checking government surveillance lists to deny services and offers of employment to individuals named to those lists)
-
See Sara B. Miller, Blacklisted by the Bank, CHRISTIAN SCI. MONITOR, Aug. 25, 2003, http://www.csmonitor.com/2003/0825/p15s01-wmcn.html; Kim Zetter, Big Business Becoming Big Brother, WIRED, Aug. 9, 2004, http://wired.com/news/ conflict/0,2100,64492,00.html?tw=wn-tophead-1 (describing the possibility that firms are cross-checking government surveillance lists to deny services and offers of employment to individuals named to those lists).
-
-
-
-
251
-
-
78649368973
-
-
Indeed, firms might find themselves in a Catch-22: assuming a company does not appropriate the information, subsequent revelations that government security agencies gave the company the names of the individuals who later perpetrated an attack will lead to questions why the firm continued to do business with those individuals
-
Indeed, firms might find themselves in a Catch-22: assuming a company does not appropriate the information, subsequent revelations that government security agencies gave the company the names of the individuals who later perpetrated an attack will lead to questions why the firm continued to do business with those individuals.
-
-
-
-
252
-
-
78649378407
-
-
These decisions will no doubt disproportionately affect certain, already vulnerable communities
-
These decisions will no doubt disproportionately affect certain, already vulnerable communities.
-
-
-
-
253
-
-
78649370669
-
-
Historically, common carriers under the common law and regulated industries under the Interstate Commerce Act have been sanctioned for engaging in discriminatory practices or arbitrary denials of service
-
Historically, common carriers under the common law and regulated industries under the Interstate Commerce Act have been sanctioned for engaging in discriminatory practices or arbitrary denials of service.
-
-
-
-
254
-
-
0348098988
-
-
Joseph Kearney & Thomas Merrill, The Great Transformation of Regulated Industries, 98 COLUM. L. REV. 1323, 1325, 1331-32 (1998) (noting that the 1887 Interstate Commerce Act imposed a nondiscrimination obligation on firms in industries covered by the Act)
-
See Joseph Kearney & Thomas Merrill, The Great Transformation of Regulated Industries, 98 COLUM. L. REV. 1323, 1325, 1331-32 (1998) (noting that the 1887 Interstate Commerce Act imposed a nondiscrimination obligation on firms in industries covered by the Act)
-
-
-
-
255
-
-
0004575044
-
-
Joseph William Singer, No Right To Exclude: Public Accommodations and Private Property, 90 NW. U. L. REV. 1283, 1439 (1996) (describing common law obligations imposed on common carriers). In addition to there likely being little meaningful process prior to the businesses' decisions to, say, terminate services, the issue of private appropriation of government information-and the effect of that appropriation-also touches upon long-contested questions about what remedies individuals have when the government furthers, but does not carry out or compel, a private injury or deprivation of rights. Cf., e.g., Paul v. Davis, 424 U.S. 693 (1976)
-
Joseph William Singer, No Right To Exclude: Public Accommodations and Private Property, 90 NW. U. L. REV. 1283, 1439 (1996) (describing common law obligations imposed on common carriers). In addition to there likely being little meaningful process prior to the businesses' decisions to, say, terminate services, the issue of private appropriation of government information-and the effect of that appropriation-also touches upon long-contested questions about what remedies individuals have when the government furthers, but does not carry out or compel, a private injury or deprivation of rights. Cf., e.g., Paul v. Davis, 424 U.S. 693 (1976).
-
-
-
-
256
-
-
78649351438
-
-
Miller, supra note 117 (noting businesses' continued reliance on outdated government lists of suspected terrorists that the government itself has since updated, revised, or withdrawn)
-
See Miller, supra note 117 (noting businesses' continued reliance on outdated government lists of suspected terrorists that the government itself has since updated, revised, or withdrawn).
-
-
-
-
257
-
-
78649390958
-
-
This concern has been voiced with respect to Internet vigilantes, concerned citizens typically working on their own (i.e., without government support or knowledge) to disable Jihadist Web sites and chat rooms. The Internet vigilantes' efforts have drawn the ire of government officials, who lose access to valuable information when the vigilantes take matters into their own hands and shut down sites that are, oftentimes, already carefully being monitored by the intelligence agencies. For a more extensive discussion, see infra notes 124-25
-
This concern has been voiced with respect to Internet vigilantes, concerned citizens typically working on their own (i.e., without government support or knowledge) to disable Jihadist Web sites and chat rooms. The Internet vigilantes' efforts have drawn the ire of government officials, who lose access to valuable information when the vigilantes take matters into their own hands and shut down sites that are, oftentimes, already carefully being monitored by the intelligence agencies. For a more extensive discussion, see infra notes 124-25.
-
-
-
-
258
-
-
85005305538
-
-
note
-
George A. Akerlof, The Market for "Lemons": Quality Uncertainty and the Market Mechanism, 84 Q.J. ECON. 488, 493-94 (1970). 124. Perhaps an extreme version of the risk-seeking deputy is the vigilante. We have seen private individuals and groups decide, on their own initiative, to insert themselves into the world of deputization and into this hybridized space. Among them are the civilian border patrols that have begun organizing, monitoring and, at times, capturing and detaining those trying to enter the country illegally. These groups, which include the Minutemen, are often motivated largely by antiimmigrant sentiments having mostly to do with economics and culture, by worries that terrorists are sneaking into the country through porous borders, and by their belief that the U.S. Border Patrol is ill-equipped or ill-disposed to stop them. Accordingly, various militia groups have staged public demonstrations and set up armed outposts in Arizona and California, as well as along the nation's northern border with Canada.
-
-
-
-
259
-
-
78649360166
-
-
David A. Fahrenthold, on Patrol in Vt., Minutemen Are the Outsiders, WASH. POST, Oct. 31, 2005, at A2 (reporting on the New England branch of the Minutemen)
-
See David A. Fahrenthold, on Patrol in Vt., Minutemen Are the Outsiders, WASH. POST, Oct. 31, 2005, at A2 (reporting on the New England branch of the Minutemen)
-
-
-
-
260
-
-
78649362544
-
-
Anna Gorman, Volunteers To Patrol Border Near San Diego, L.A. TIMES, May 5, 2005, at B1 [hereinafter Gorman, Volunteers] (attributing the upswing in volunteer border patrol membership in part to the members' perception that the Bush Administration was failing to secure the nation's borders)
-
Anna Gorman, Volunteers To Patrol Border Near San Diego, L.A. TIMES, May 5, 2005, at B1 [hereinafter Gorman, Volunteers] (attributing the upswing in volunteer border patrol membership in part to the members' perception that the Bush Administration was failing to secure the nation's borders)
-
-
-
-
261
-
-
78649366976
-
-
Michael Leahy, Crossing the Line, WASH. POST, Mar. 19, 2006, (Magazine), at 14 (chronicling efforts by private anti-immigration groups to mount border patrols and monitor labor sites suspected of employing undocumented aliens). Such groups have been criticized and labeled "vigilantes" by the likes of then-President George W. Bush for their excessive use of violence and their interference with the official Border Patrol operations. Leslie Berestein, Legal Groups to Watch County "Minutemen," S.D. UNION-TRIB., July 1, 2005, at B4
-
Michael Leahy, Crossing the Line, WASH. POST, Mar. 19, 2006, (Magazine), at 14 (chronicling efforts by private anti-immigration groups to mount border patrols and monitor labor sites suspected of employing undocumented aliens). Such groups have been criticized and labeled "vigilantes" by the likes of then-President George W. Bush for their excessive use of violence and their interference with the official Border Patrol operations. Leslie Berestein, Legal Groups to Watch County "Minutemen," S.D. UNION-TRIB., July 1, 2005, at B4
-
-
-
-
262
-
-
78649380322
-
-
Anna Gorman, Patrol Delays Launch, L.A. TIMES, June 9, 2005, at B6. But, Governor Schwarzenegger of California and even Bush's own chief immigration enforcement official have expressed greater enthusiasm for their efforts
-
Anna Gorman, Patrol Delays Launch, L.A. TIMES, June 9, 2005, at B6. But, Governor Schwarzenegger of California and even Bush's own chief immigration enforcement official have expressed greater enthusiasm for their efforts.
-
-
-
-
263
-
-
78649363432
-
-
Gorman, Volunteers, supra (noting Governor Schwarzenegger's support for the Minutemen group, which he said had "done a terrific job" in contrast to the federal government that was "not doing [its] job")
-
See Gorman, Volunteers, supra (noting Governor Schwarzenegger's support for the Minutemen group, which he said had "done a terrific job" in contrast to the federal government that was "not doing [its] job")
-
-
-
-
264
-
-
78649350299
-
-
Solomon Moore, Immigration Official Praises Citizen Patrols, L.A. TIMES, July 21, 2005, at B6 (reporting on then-Customs and Border Protection Commissioner Robert Bonner's praise of citizen patrols on the U.S.-Mexico border). A second group is the so-called Internet vigilantes, who were briefly mentioned above
-
Solomon Moore, Immigration Official Praises Citizen Patrols, L.A. TIMES, July 21, 2005, at B6 (reporting on then-Customs and Border Protection Commissioner Robert Bonner's praise of citizen patrols on the U.S.-Mexico border). A second group is the so-called Internet vigilantes, who were briefly mentioned above.
-
-
-
-
265
-
-
78649343404
-
-
supra notes 15, 122. Some Internet watchdogs go no further than alerting the government to the existence (and substantive content) of extremist Web sites
-
See supra notes 15, 122. Some Internet watchdogs go no further than alerting the government to the existence (and substantive content) of extremist Web sites.
-
-
-
-
266
-
-
78649341443
-
-
Erika Hayasaki, Tracking Terrorists from Her Home Computer, L.A. TIMES, Jan. 11, 2009, at A17
-
See, e.g., Erika Hayasaki, Tracking Terrorists from Her Home Computer, L.A. TIMES, Jan. 11, 2009, at A17
-
-
-
-
267
-
-
78649352606
-
-
Nadya Labi, Jihad 2.0, ATLANTIC MONTHLY, July-Aug. 2006, at 102
-
Nadya Labi, Jihad 2.0, ATLANTIC MONTHLY, July-Aug. 2006, at 102
-
-
-
-
268
-
-
78649391563
-
-
Benjamin Wallace-Wells, Private Jihad, NEW YORKER, May 29, 2006, at 28. Others take it a step or two further. Among this cohort is Internet Haganah, an organization with a moniker that harkens back to the Jewish paramilitary group operating under the British mandate in Palestine prior to Israeli independence. Haganah takes a more activist approach, committing itself to monitoring and disabling Jihadist Web sites. Typically, Haganah is able to disable a Web site by overloading the servers or by pressuring the Web sites' Internet service providers to take down the site. Howard Altman, Web Warriors Track Down, Close Jihadist Internet Sites, TAMPA TRIB., Nov. 17, 2005, at 12
-
Benjamin Wallace-Wells, Private Jihad, NEW YORKER, May 29, 2006, at 28. Others take it a step or two further. Among this cohort is Internet Haganah, an organization with a moniker that harkens back to the Jewish paramilitary group operating under the British mandate in Palestine prior to Israeli independence. Haganah takes a more activist approach, committing itself to monitoring and disabling Jihadist Web sites. Typically, Haganah is able to disable a Web site by overloading the servers or by pressuring the Web sites' Internet service providers to take down the site. Howard Altman, Web Warriors Track Down, Close Jihadist Internet Sites, TAMPA TRIB., Nov. 17, 2005, at 12
-
-
-
-
269
-
-
78649340861
-
-
Michael Snider, on Osama's Trail, MACLEAN'S, Nov. 15, 2004, at 94. 125. As one terrorism expert, expressing concerns with the counterproductive role being played by Internet vigilantes, notes: From a law enforcement perspective, it is better to keep those sites online. If you really want to shut them down, don't go after some pimply faced Web master, who is a low-level member. Do what you do in a mafia case. Pull in the small guy to reel in bigger fish. Altman, supra note 124, at 12
-
Michael Snider, on Osama's Trail, MACLEAN'S, Nov. 15, 2004, at 94. 125. As one terrorism expert, expressing concerns with the counterproductive role being played by Internet vigilantes, notes: From a law enforcement perspective, it is better to keep those sites online. If you really want to shut them down, don't go after some pimply faced Web master, who is a low-level member. Do what you do in a mafia case. Pull in the small guy to reel in bigger fish. Altman, supra note 124, at 12
-
-
-
-
270
-
-
78649338025
-
-
Cha, supra note 30 (quoting a federal official who called Haganah "a grave threat to national security")
-
see also Cha, supra note 30 (quoting a federal official who called Haganah "a grave threat to national security")
-
-
-
-
271
-
-
78649366989
-
-
Snider, supra note 124, at 94 (characterizing the work of Haganah and others as "hacktivism" and counterproductive)
-
Snider, supra note 124, at 94 (characterizing the work of Haganah and others as "hacktivism" and counterproductive)
-
-
-
-
272
-
-
78649364474
-
-
Carmen Gentile, Cyber Vigilantes Track Extremist Web Sites, Intelligence Experts Balk at Effort, FOXNEWS.COM, Mar. 22, 2008, http://www.foxnews.com/ story/0,2933,340613,00.html (citing experts' frustration with Internet vigilantes for interfering with government investigations)
-
Carmen Gentile, Cyber Vigilantes Track Extremist Web Sites, Intelligence Experts Balk at Effort, FOXNEWS.COM, Mar. 22, 2008, http://www.foxnews.com/ story/0,2933,340613,00.html (citing experts' frustration with Internet vigilantes for interfering with government investigations)
-
-
-
-
273
-
-
78649386790
-
-
Brad Stone, Heroes or Nettlesome Hacks?, NEWSWEEK.COM, July 2005, (noting the Intelligence Community's annoyance over vigilantes' efforts that "scuttle ongoing surveillance ⋯ and eventually force terrorists to find less observable ways of spreading their message"). Likewise, concerns have been raised regarding the counterproductive and abusive role played by private border patrols
-
Brad Stone, Heroes or Nettlesome Hacks?, NEWSWEEK.COM, July 2005, http://www.newsweek.com/id/50330 (noting the Intelligence Community's annoyance over vigilantes' efforts that "scuttle ongoing surveillance ⋯ and eventually force terrorists to find less observable ways of spreading their message"). Likewise, concerns have been raised regarding the counterproductive and abusive role played by private border patrols.
-
-
-
-
274
-
-
78649384503
-
-
Randal C. Archibold, A Border Watcher Finds Himself Under Scrutiny, N.Y. TIMES, Nov. 24, 2006, at A1 (reporting on allegations that a self-appointed border patrolman in Arizona falsely imprisoned, threatened, and physically abused undocumented aliens as well as lawful U.S. residents who he assumed entered the country illegally)
-
See, e.g., Randal C. Archibold, A Border Watcher Finds Himself Under Scrutiny, N.Y. TIMES, Nov. 24, 2006, at A1 (reporting on allegations that a self-appointed border patrolman in Arizona falsely imprisoned, threatened, and physically abused undocumented aliens as well as lawful U.S. residents who he assumed entered the country illegally)
-
-
-
-
275
-
-
78649361340
-
-
Tim Gaynor, Border Vigilantism Alleged in Ariz. Case: Rancher Accused of Holding Mexican American Family at Gunpoint, WASH. POST, Nov. 15, 2006, at A3 (highlighting the increase in "vigilante violence" along the U.S.-Mexico border)
-
Tim Gaynor, Border Vigilantism Alleged in Ariz. Case: Rancher Accused of Holding Mexican American Family at Gunpoint, WASH. POST, Nov. 15, 2006, at A3 (highlighting the increase in "vigilante violence" along the U.S.-Mexico border)
-
-
-
-
276
-
-
78649379720
-
-
Jesse McKinley & Malia Wollan, New Border Fear: Violence by a Rogue Militia, N.Y. TIMES, June 27, 2009, at A9 (discussing border violence believed to be perpetrated by members of the Minutemen militia)
-
Jesse McKinley & Malia Wollan, New Border Fear: Violence by a Rogue Militia, N.Y. TIMES, June 27, 2009, at A9 (discussing border violence believed to be perpetrated by members of the Minutemen militia)
-
-
-
-
277
-
-
78649341424
-
-
Nick Madigan, Police Investigate Killings of Illegal Immigrants in Arizona Desert, N.Y. TIMES, Oct. 23, 2002, at A15 (discussing the accusation that a militia group funds its border-patrol activities by robbing drug dealers)
-
see also Nick Madigan, Police Investigate Killings of Illegal Immigrants in Arizona Desert, N.Y. TIMES, Oct. 23, 2002, at A15 (discussing the accusation that a militia group funds its border-patrol activities by robbing drug dealers).
-
-
-
-
278
-
-
78649335994
-
-
It is probably more accurate to say the artifact of a preprivatized landscape
-
It is probably more accurate to say the artifact of a preprivatized landscape.
-
-
-
-
279
-
-
78649383296
-
-
Michaels, supra note 20
-
See, e.g., Michaels, supra note 20.
-
-
-
-
280
-
-
78649343120
-
-
NCAA v. Tarkanian, 488 U.S. 179, 191 (1988) ("Embedded in our Fourteenth Amendment jurisprudence is a dichotomy between state action, which is subject to strict scrutiny ⋯ and private conduct, against which the Amendment affords no shield, no matter how unfair that conduct may be.")
-
See, e.g., NCAA v. Tarkanian, 488 U.S. 179, 191 (1988) ("Embedded in our Fourteenth Amendment jurisprudence is a dichotomy between state action, which is subject to strict scrutiny ⋯ and private conduct, against which the Amendment affords no shield, no matter how unfair that conduct may be.").
-
-
-
-
281
-
-
0037310460
-
-
James P. Nehf, Recognizing the Societal Value in Information Privacy, 78 WASH. L. REV. 1, 13 (2003) (noting that businesses that collect information are "looking for better and more efficient ways" to operate)
-
See James P. Nehf, Recognizing the Societal Value in Information Privacy, 78 WASH. L. REV. 1, 13 (2003) (noting that businesses that collect information are "looking for better and more efficient ways" to operate)
-
-
-
-
282
-
-
78649350298
-
-
Anita Ramasastry, Data Mining, National Security and the "Adverse Inference" Problem, 22 SANTA CLARA COMPUTER & HIGH TECH. L.J. 757, 758 (2006) (stating that the collection of personal data by businesses helps "to maximize profit and to improve consumer experience")
-
Anita Ramasastry, Data Mining, National Security and the "Adverse Inference" Problem, 22 SANTA CLARA COMPUTER & HIGH TECH. L.J. 757, 758 (2006) (stating that the collection of personal data by businesses helps
-
-
-
-
283
-
-
78649370345
-
-
Stan Karas, Privacy, Identity, Databases, 52 AM. U. L. REV. 393, 415 (2002) (noting the public's willingness to disclose personal information to businesses to facilitate commercial endeavors)
-
see also Stan Karas, Privacy, Identity, Databases, 52 AM. U. L. REV. 393, 415 (2002) (noting the public's willingness to disclose personal information to businesses to facilitate commercial endeavors)
-
-
-
-
284
-
-
78649381792
-
-
Declan McCullagh, It's Been 10 Years: Why Won't People Pay for Privacy?, CNET NEWS, Jan. 28, 2010, (describing studies indicating that people readily disclose personal information, including passwords, in exchange for nominal commercial benefits)
-
Declan McCullagh, It's Been 10 Years: Why Won't People Pay for Privacy?, CNET NEWS, Jan. 28, 2010, http://news.cnet.com/8301-13578-3-10443575-38.html (describing studies indicating that people readily disclose personal information, including passwords, in exchange for nominal commercial benefits).
-
-
-
-
285
-
-
78649351173
-
-
Needless to say, deputization is hardly the only phenomenon that creates problems for the durability of private-public distinction. For example, some instances of government contracting do as well
-
Needless to say, deputization is hardly the only phenomenon that creates problems for the durability of private-public distinction. For example, some instances of government contracting do as well.
-
-
-
-
286
-
-
0037349369
-
-
Jody Freeman, Extending Public Law Norms Through Privatization, 116 HARV. L. REV. 1285, 1289-90 (2003)
-
See, e.g., Jody Freeman, Extending Public Law Norms Through Privatization, 116 HARV. L. REV. 1285, 1289-90 (2003)
-
-
-
-
287
-
-
78649352882
-
-
Minow, supra note 10, at 994-95
-
Minow, supra note 10, at 994-95.
-
-
-
-
288
-
-
78649362855
-
-
Deputization is not novel here. Far from it. Landmark cases have long allowed third-party transfers of information to the government in the absence of the target's express consent. Smith v. Maryland, 442 U.S. 735, 743-45 (1979)
-
Deputization is not novel here. Far from it. Landmark cases have long allowed third-party transfers of information to the government in the absence of the target's express consent. Smith v. Maryland, 442 U.S. 735, 743-45 (1979)
-
-
-
-
289
-
-
78649365339
-
-
United States v. Miller, 425 U.S. 435, 440-41 (1976)
-
United States v. Miller, 425 U.S. 435, 440-41 (1976)
-
-
-
-
290
-
-
78649340546
-
-
United States v. Matlock, 415 U.S. 164, 171 (1974) ("[C]onsent of one who possesses common authority over premises or effects is valid as against the absent, nonconsenting person with whom that authority is shared.")
-
see also United States v. Matlock, 415 U.S. 164, 171 (1974) ("[C]onsent of one who possesses common authority over premises or effects is valid as against the absent, nonconsenting person with whom that authority is shared.")
-
-
-
-
291
-
-
78649380028
-
-
Coolidge v. New Hampshire, 403 U.S. 443, 484-90 (1971) holding that a wife could search and seize her husband's property and voluntarily turn it over to the police absent a warrant). What is important with respect to the homeland security deputies is the greater potential for institutionalizing these relationships-that is, not just the occasional call by the authorities to the bank for third-party records or the sporadic request made to spouses or other household residents by police and prosecutors to obtain information absent warrants or express consent, but instead the systematic harnessing of private resources in service of long-term relationships
-
Coolidge v. New Hampshire, 403 U.S. 443, 484-90 (1971) (holding that a wife could search and seize her husband's property and voluntarily turn it over to the police absent a warrant). What is important with respect to the homeland security deputies is the greater potential for institutionalizing these relationships-that is, not just the occasional call by the authorities to the bank for third-party records or the sporadic request made to spouses or other household residents by police and prosecutors to obtain information absent warrants or express consent, but instead the systematic harnessing of private resources in service of long-term relationships.
-
-
-
-
292
-
-
78649342161
-
-
Correctional Servs. Corp. v. Malesko, 534 U.S. 61, 63 (2001) (declining to recognize a Bivens claim against a private prison facility operating pursuant to a federal contract); Rendell-Baker v. Kohn, 457 U.S. 830, 843 (1982) (refusing to allow a § 1983 suit to lie against a private school funded almost entirely by government to educate "maladjusted" students)
-
See, e.g., Correctional Servs. Corp. v. Malesko, 534 U.S. 61, 63 (2001) (declining to recognize a Bivens claim against a private prison facility operating pursuant to a federal contract); Rendell-Baker v. Kohn, 457 U.S. 830, 843 (1982) (refusing to allow a § 1983 suit to lie against a private school funded almost entirely by government to educate "maladjusted" students)
-
-
-
-
293
-
-
78649355324
-
-
But see Lugar v. Edmondson Oil Co., 457 U. S. 922, 936-37 (1982) (authorizing a § 1983 suit against a private firm acting jointly with the Commonwealth of Virginia in exercising "state action")
-
But see Lugar v. Edmondson Oil Co., 457 U. S. 922, 936-37 (1982) (authorizing a § 1983 suit against a private firm acting jointly with the Commonwealth of Virginia in exercising "state action").
-
-
-
-
294
-
-
78649339655
-
-
United States v. Jacobsen, 466 U.S. 109, 113 (1984) ("This Court has ⋯ consistently construed [Fourth Amendment] protection as proscribing only governmental action; it is wholly inapplicable to a search or seizure, even an unreasonable one, effected by a private individual not acting as an agent of the Government or with the participation or knowledge of any governmental official." (internal citations omitted))
-
See United States v. Jacobsen, 466 U.S. 109, 113 (1984) ("This Court has ⋯ consistently construed [Fourth Amendment] protection as proscribing only governmental action; it is wholly inapplicable to a search or seizure, even an unreasonable one, effected by a private individual not acting as an agent of the Government or with the participation or knowledge of any governmental official." (internal citations omitted))
-
-
-
-
295
-
-
78649373250
-
-
United States v. Momoh, 427 F.3d 137, 141 (1st Cir. 2005) (considering for purposes of determining constitutional liability the government's role in instigating or directing the private search, the government's control over the private actor's search, and whether the private actor is primarily aiding the government or furthering its own objectives)
-
see also United States v. Momoh, 427 F.3d 137, 141 (1st Cir. 2005) (considering for purposes of determining constitutional liability the government's role in instigating or directing the private search, the government's control over the private actor's search, and whether the private actor is primarily aiding the government or furthering its own objectives)
-
-
-
-
296
-
-
78649383912
-
-
United States v. Robinson, 390 F.3d 853, 872 (6th Cir. 2004) ("[T]o trigger Fourth Amendment protection under an agency theory, 'the police must have instigated, encouraged, or participated in the search,' and 'the individual must have engaged in the search with the intent of assisting the police in their investigative efforts.'" (quoting United States v. Lambert, 771 F.2d 83, 89 (6th Cir. 1985))
-
United States v. Robinson, 390 F.3d 853, 872 (6th Cir. 2004) ("[T]o trigger Fourth Amendment protection under an agency theory, 'the police must have instigated, encouraged, or participated in the search,' and 'the individual must have engaged in the search with the intent of assisting the police in their investigative efforts.'" (quoting United States v. Lambert, 771 F.2d 83, 89 (6th Cir. 1985))
-
-
-
-
297
-
-
78649348832
-
-
United States v. Smith, 383 F.3d 700, 705 (8th Cir. 2004) (listing among the factors to be considered in determining whether a private citizen was acting as an agent of the government "whether the government had knowledge of and acquiesced in the intrusive conduct; whether the citizen intended to assist law enforcement agents or instead acted to further his own purposes; and whether the citizen acted at the government's request")
-
United States v. Smith, 383 F.3d 700, 705 (8th Cir. 2004) (listing among the factors to be considered in determining whether a private citizen was acting as an agent of the government "whether the government had knowledge of and acquiesced in the intrusive conduct; whether the citizen intended to assist law enforcement agents or instead acted to further his own purposes; and whether the citizen acted at the government's request").
-
-
-
-
298
-
-
78649372952
-
-
Block, supra note 7
-
See Block, supra note 7
-
-
-
-
299
-
-
78649350013
-
-
Fields, supra note 100; Siemaszko, supra note 88, at 24. As mentioned above, both UPS and the Postal Service have refused entreaties to provide law enforcement and intelligence agencies with similar assistance
-
Fields, supra note 100; Siemaszko, supra note 88, at 24. As mentioned above, both UPS and the Postal Service have refused entreaties to provide law enforcement and intelligence agencies with similar assistance.
-
-
-
-
300
-
-
78649373532
-
-
supra note 88 and accompanying text. Coincidentally, Jacobsen involved FedEx employees opening a package, finding contraband, and reporting their discovery to law enforcement officials-all without triggering a Fourth Amendment violation. 466 U.S. at 111, 114-17
-
See supra note 88 and accompanying text. Coincidentally, Jacobsen involved FedEx employees opening a package, finding contraband, and reporting their discovery to law enforcement officials-all without triggering a Fourth Amendment violation. 466 U.S. at 111, 114-17.
-
-
-
-
301
-
-
78649391268
-
-
United States v. Hall, 142 F.3d 988, 995 (7th Cir. 1988) (holding that an independent search by a computer repair firm that led the firm to contact authorities did not implicate the Fourth Amendment)
-
See, e.g., United States v. Hall, 142 F.3d 988, 995 (7th Cir. 1988) (holding that an independent search by a computer repair firm that led the firm to contact authorities did not implicate the Fourth Amendment)
-
-
-
-
302
-
-
78649383593
-
-
Simmons, supra note 98, at 986-87 (describing informal private-public cooperation on searches that led to criminal prosecution)
-
see also Simmons, supra note 98, at 986-87 (describing informal private-public cooperation on searches that led to criminal prosecution).
-
-
-
-
303
-
-
78649356513
-
-
But see United States v. Walther, 652 F.2d 788, 793 (9th Cir. 1981) (finding state action in an airline-carrier search where the government "had knowledge of a particular pattern of search activity ⋯ and had acquiesced in such activity")
-
But see United States v. Walther, 652 F.2d 788, 793 (9th Cir. 1981) (finding state action in an airline-carrier search where the government "had knowledge of a particular pattern of search activity ⋯ and had acquiesced in such activity").
-
-
-
-
304
-
-
78649365943
-
-
Privacy Act of 1974, 5 U.S.C. § 552a (2006)
-
See, e.g., Privacy Act of 1974, 5 U.S.C. § 552a (2006).
-
-
-
-
305
-
-
33947681687
-
-
Danielle Keats Citron, The Evolution of Public and Private Law at the Dawn of the Information Age, 80 S. CAL. L. REV. 241, 255 (2007). Citron notes that "the private sector's collection of sensitive personal information remains largely unregulated by federal law. While federal legislation governs the security of personal data stored by federal agencies, similar federal restrictions apply only to a narrow set of private entities, such as financial institutions, credit agencies, and health care providers." Id
-
See Danielle Keats Citron, The Evolution of Public and Private Law at the Dawn of the Information Age, 80 S. CAL. L. REV. 241, 255 (2007). Citron notes that "the private sector's collection of sensitive personal information remains largely unregulated by federal law. While federal legislation governs the security of personal data stored by federal agencies, similar federal restrictions apply only to a narrow set of private entities, such as financial institutions, credit agencies, and health care providers." Id.
-
-
-
-
306
-
-
78649360493
-
-
Michaels, supra note 20, at 721-23
-
see Michaels, supra note 20, at 721-23
-
-
-
-
307
-
-
78649375523
-
-
Michaels, supra note 9, at 908-09 & n.23 (2008)
-
Michaels, supra note 9, at 908-09 & n.23 (2008)
-
-
-
-
308
-
-
33645556143
-
-
Daniel J. Solove & Chris Jay Hoofnagle, A Model Regime of Privacy Protection, 2006 U. ILL. L. REV. 357, 365-67 (describing how statutory restrictions imposed on the government when collecting data covered under the Privacy Act of 1974 and the Fair Credit Reporting Act of 1970 can be bypassed if information is first privately gathered)
-
see also Daniel J. Solove & Chris Jay Hoofnagle, A Model Regime of Privacy Protection, 2006 U. ILL. L. REV. 357, 365-67 (describing how statutory restrictions imposed on the government when collecting data covered under the Privacy Act of 1974 and the Fair Credit Reporting Act of 1970 can be bypassed if information is first privately gathered).
-
-
-
-
309
-
-
78649374949
-
-
Michaels, supra note 20, at 741-42
-
See Michaels, supra note 20, at 741-42.
-
-
-
-
310
-
-
78649350889
-
-
The observation of what might be considered suspicious materials is likely to prompt, if anything, additional surveillance or investigatory work, rather than an actual, immediate seizure
-
The observation of what might be considered suspicious materials is likely to prompt, if anything, additional surveillance or investigatory work, rather than an actual, immediate seizure.
-
-
-
-
311
-
-
78649338285
-
-
supra note 18 and accompanying text
-
See supra note 18 and accompanying text.
-
-
-
-
312
-
-
78649357108
-
-
supra note 92
-
See supra note 92.
-
-
-
-
313
-
-
66249149032
-
-
An obvious set of private actors potentially affected by such line-blurring is government contractors. Contracting out for government services is so pervasive today that the annual expenditures for contractors at the federal, state, and local levels combined is now in excess of $1 trillion. Jeffrey L. Dunoff, Linking International Markets and Global Justice, 107 MICH. L. REV. 1039, 1041, nn.5-6 (2009)
-
An obvious set of private actors potentially affected by such line-blurring is government contractors. Contracting out for government services is so pervasive today that the annual expenditures for contractors at the federal, state, and local levels combined is now in excess of $1 trillion. Jeffrey L. Dunoff, Linking International Markets and Global Justice, 107 MICH. L. REV. 1039, 1041, nn.5-6 (2009).
-
-
-
-
314
-
-
78649375521
-
-
We see similar efforts outside of the intelligence-gathering context as well
-
We see similar efforts outside of the intelligence-gathering context as well.
-
-
-
-
315
-
-
78649340859
-
-
Michaels, supra note 10
-
See Michaels, supra note 10
-
-
-
-
316
-
-
78649391833
-
-
Matthew Diller, The Revolution in Welfare Administration: Rules, Discretion, and Entrepreneurial Government, 75 N.Y.U. L. REV. 1121, 1182-83 (2000)
-
see also Matthew Diller, The Revolution in Welfare Administration: Rules, Discretion, and Entrepreneurial Government, 75 N.Y.U. L. REV. 1121, 1182-83 (2000).
-
-
-
-
317
-
-
78649358420
-
-
VERKUIL, supra note 10, at 102-14
-
See VERKUIL, supra note 10, at 102-14
-
-
-
-
318
-
-
0242679743
-
-
Gillian E. Metzger, Privatization as Delegation, 103 COLUM. L. REV. 1367, 1400-06 (2003)
-
Gillian E. Metzger, Privatization as Delegation, 103 COLUM. L. REV. 1367, 1400-06 (2003).
-
-
-
-
319
-
-
78649390341
-
-
Cf. Michaels, supra note 20 passim (addressing this claim in the context of government contractors)
-
Cf. Michaels, supra note 20 passim (addressing this claim in the context of government contractors).
-
-
-
-
320
-
-
78649371519
-
-
supra notes 21-22 and accompanying text
-
See supra notes 21-22 and accompanying text.
-
-
-
-
321
-
-
78649388243
-
-
George C. Harris, Testimony for Sale: The Law and Ethics of Snitches and Experts, 28 PEPP. L. REV. 1, 57 (2000)
-
See, e.g., George C. Harris, Testimony for Sale: The Law and Ethics of Snitches and Experts, 28 PEPP. L. REV. 1, 57 (2000)
-
-
-
-
322
-
-
18944392068
-
-
Alexandra Natapoff, Snitching: The Institutional and Communal Consequences, 73 U. CIN. L. REV. 645 (2004)
-
Alexandra Natapoff, Snitching: The Institutional and Communal Consequences, 73 U. CIN. L. REV. 645 (2004)
-
-
-
-
323
-
-
78649387344
-
-
Daniel Richman, Cooperating Defendants: The Costs and Benefits of Purchasing Information from Scoundrels, 8 FED. SENT'G REP. 292 (1996)
-
Daniel Richman, Cooperating Defendants: The Costs and Benefits of Purchasing Information from Scoundrels, 8 FED. SENT'G REP. 292 (1996)
-
-
-
-
324
-
-
0039744813
-
-
Ian Weinstein, Regulating the Market for Snitches, 47 BUFF. L. REV. 563, 564-65 (1999)
-
Ian Weinstein, Regulating the Market for Snitches, 47 BUFF. L. REV. 563, 564-65 (1999)
-
-
-
-
325
-
-
78649357105
-
-
Mark Curriden, The Informant Trap: Secret Threat to Justice, NAT. L.J., Feb. 20, 1995, at A1
-
Mark Curriden, The Informant Trap: Secret Threat to Justice, NAT. L.J., Feb. 20, 1995, at A1.
-
-
-
-
326
-
-
78649352000
-
-
Natapoff, supra note 146, at 675 n. 140 (emphasizing that in the majority of cases surveyed "courts find that informant activities take place at arms length from government handlers and therefore do not qualify as state action")
-
See Natapoff, supra note 146, at 675 n. 140 (emphasizing that in the majority of cases surveyed "courts find that informant activities take place at arms length from government handlers and therefore do not qualify as state action").
-
-
-
-
327
-
-
78649338286
-
-
But see Arizona v. Fulminante, 499 U.S. 279, 287-88 (1991) (finding a jailhouse informant working with FBI to have engineered a coerced confession)
-
But see Arizona v. Fulminante, 499 U.S. 279, 287-88 (1991) (finding a jailhouse informant working with FBI to have engineered a coerced confession).
-
-
-
-
328
-
-
78649360726
-
-
Curriden, supra note 146
-
Curriden, supra note 146.
-
-
-
-
329
-
-
78649367260
-
-
Natapoff, supra note 146, at 653
-
See Natapoff, supra note 146, at 653.
-
-
-
-
330
-
-
57049158137
-
-
Adrian Vermeule, Emergency Lawmaking After 9/11 and 7/7, 75 U. CHI. L. REV. 1155, 1164, 1175-76 (2008) (emphasizing that lawmakers faced with the uncertainties associated with still-evolving emergencies cannot foresee how events will unfold and thus tend to give the Executive broad, open-ended discretion and flexibility to confront both likely and unexpected challenges)
-
See Adrian Vermeule, Emergency Lawmaking After 9/11 and 7/7, 75 U. CHI. L. REV. 1155, 1164, 1175-76 (2008) (emphasizing that lawmakers faced with the uncertainties associated with still-evolving emergencies cannot foresee how events will unfold and thus tend to give the Executive broad, open-ended discretion and flexibility to confront both likely and unexpected challenges).
-
-
-
-
331
-
-
78649336853
-
-
CIA v. Sims, 471 U.S. 154, 167 (1985) (describing "sources and methods" as the "heart of all intelligence operations")
-
See CIA v. Sims, 471 U.S. 154, 167 (1985) (describing "'sources and methods'" as the "heart of all intelligence operations")
-
-
-
-
332
-
-
78649358118
-
-
Webster v. Doe, 486 U.S. 592, 604 (1988) (noting the extraordinary need in the intelligence context "for confidentiality and the protection of ⋯ methods, sources, and mission")
-
Webster v. Doe, 486 U.S. 592, 604 (1988) (noting the extraordinary need in the intelligence context "for confidentiality and the protection of ⋯ methods, sources, and mission").
-
-
-
-
333
-
-
78651443678
-
-
NEW YORKER, Sept. 21, 2009, at 59, 67-68 (describing pressure the SEC and Treasury placed on Lehman Brothers regarding the timing of its bankruptcy filing)
-
See James B. Stewart, Eight Days: The Battle To Save the American Financial System, NEW YORKER, Sept. 21, 2009, at 59, 67-68 (describing pressure the SEC and Treasury placed on Lehman Brothers regarding the timing of its bankruptcy filing)
-
Eight Days: The Battle To Save the American Financial System
-
-
Stewart, J.B.1
-
334
-
-
78649368972
-
-
Ben Hallman, A Moment's Notice for Lehman, AM. LAW., Dec. 1, 2008, at 87, 88 (reporting that government officials urged Lehman Brothers to file for bankruptcy protection at a specific time because it was a "critical part of a program [the government] wanted to roll out")
-
see also Ben Hallman, A Moment's Notice for Lehman, AM. LAW., Dec. 1, 2008, at 87, 88 (reporting that government officials urged Lehman Brothers to file for bankruptcy protection at a specific time because it was a "critical part of a program [the government] wanted to roll out").
-
-
-
-
335
-
-
77950467763
-
-
Steven Davidoff & David Zaring, Regulation by Deal, 61 ADMIN. L. REV. 463, 466-68, 493-512 (2009)
-
See Steven Davidoff & David Zaring, Regulation by Deal, 61 ADMIN. L. REV. 463, 466-68, 493-512 (2009).
-
-
-
-
336
-
-
78649360492
-
-
ANDREW ROSS SORKIN, TOO BIG TO FAIL 401-03 (2009) (noting the government's demand that AIG executives resign as a condition of the federal government bailing out the company)
-
See ANDREW ROSS SORKIN, TOO BIG TO FAIL 401-03 (2009) (noting the government's demand that AIG executives resign as a condition of the federal government bailing out the company)
-
-
-
-
337
-
-
77949519817
-
-
James Bandler, Hank's Last Stand, FORTUNE, Oct. 7, 2008, at 112
-
James Bandler, Hank's Last Stand, FORTUNE, Oct. 7, 2008, at 112.
-
-
-
-
338
-
-
78649389159
-
-
generally U.S. GOV'T ACCOUNTABILITY OFFICE, TROUBLED ASSET RELIEF PROGRAM: THE U.S. GOVERNMENT ROLE AS SHAREHOLDER IN AIG, CITIGROUP, CHRYSLER, AND GENERAL MOTORS AND PRELIMINARY VIEWS ON ITS INVESTMENT MANAGEMENT ACTIVITIES 10-15 (2009) (describing the government's management of its equity stakes in bailed-out corporations)
-
See generally U.S. GOV'T ACCOUNTABILITY OFFICE, TROUBLED ASSET RELIEF PROGRAM: THE U.S. GOVERNMENT ROLE AS SHAREHOLDER IN AIG, CITIGROUP, CHRYSLER, AND GENERAL MOTORS AND PRELIMINARY VIEWS ON ITS INVESTMENT MANAGEMENT ACTIVITIES 10-15 (2009) (describing the government's management of its equity stakes in bailed-out corporations).
-
-
-
-
339
-
-
78649379717
-
-
Davidoff & Zaring, supra note 153, at 468 ("[T]he government structured deals that pushed its legal authority to the very edge and beyond in pursuit of, and bound by, its own political, economic, and, perhaps, sociological interests.")
-
See Davidoff & Zaring, supra note 153, at 468 ("[T]he government structured deals that pushed its legal authority to the very edge and beyond in pursuit of, and bound by, its own political, economic, and, perhaps, sociological interests.")
-
-
-
-
340
-
-
78649357107
-
-
id. at 535-36 (noting the government's departure from traditional administrative law practices throughout the financial-crisis negotiations)
-
id. at 535-36 (noting the government's departure from traditional administrative law practices throughout the financial-crisis negotiations).
-
-
-
-
341
-
-
77950511873
-
-
id. at 468. But see Eric A. Posner & Adrian Vermeule, Crisis Governance in the Administrative State: 9/11 and the Financial Meltdown of 2008, 76 U. CHI. L. REV. 1613, 1638 (2009) (noting that the bailouts were rendered pursuant to existing statutory authority for the government to extend loans to institutions "whose failure threatens the health of the financial system")
-
See id. at 468. But see Eric A. Posner & Adrian Vermeule, Crisis Governance in the Administrative State: 9/11 and the Financial Meltdown of 2008, 76 U. CHI. L. REV. 1613, 1638 (2009) (noting that the bailouts were rendered pursuant to existing statutory authority for the government to extend loans to institutions "whose failure threatens the health of the financial system").
-
-
-
-
342
-
-
78649361628
-
-
generally Posner & Vermeule, supra note 156
-
See generally Posner & Vermeule, supra note 156.
-
-
-
-
343
-
-
78649361339
-
-
Stewart, supra note 152, at 72
-
See Stewart, supra note 152, at 72
-
-
-
-
344
-
-
78649356211
-
-
Richard W. Painter, Bailouts: An Essay on Conflicts of Interest and Ethics when Government Pays the Tab, 41 MCGEORGE L. REV. 131, 142 (2009) (characterizing "[t]he apparent arbitrariness of bailout decisions in 2008 and 2009")
-
see also Richard W. Painter, Bailouts: An Essay on Conflicts of Interest and Ethics when Government Pays the Tab, 41 MCGEORGE L. REV. 131, 142 (2009) (characterizing "[t]he apparent arbitrariness of bailout decisions in 2008 and 2009").
-
-
-
-
345
-
-
78649338287
-
-
Brady Dennis, Fed Criticized for Not Negotiating Harder with AIG, WASH. POST, Nov. 17, 2009, at A24
-
See Brady Dennis, Fed Criticized for Not Negotiating Harder with AIG, WASH. POST, Nov. 17, 2009, at A24
-
-
-
-
346
-
-
78649383274
-
-
Joe Nocera, Lehman Had To Die, It Seems, So Global Finance Could Live, N.Y. TIMES, Sept. 12, 2009, at A1 (noting the apparent dissimilar treatment Lehman Brothers received vis-à-vis other firms that the government helped prop up)
-
Joe Nocera, Lehman Had To Die, It Seems, So Global Finance Could Live, N.Y. TIMES, Sept. 12, 2009, at A1 (noting the apparent dissimilar treatment Lehman Brothers received vis-à-vis other firms that the government helped prop up).
-
-
-
-
347
-
-
78649342033
-
-
Painter, supra note 158, at 140-42 (describing widespread appearances of conflicts of interest)
-
See Painter, supra note 158, at 140-42 (describing widespread appearances of conflicts of interest)
-
-
-
-
348
-
-
78649391832
-
-
Jim Puzzanghera, Paulson Takes Heat for Role in Bailouts, L.A. TIMES, July 17, 2009, at B1 (quoting a member of Congress accusing former-Treasury Secretary Paulson of taking $700 billion and "giv[ing] it to [his] pals")
-
Jim Puzzanghera, Paulson Takes Heat for Role in Bailouts, L.A. TIMES, July 17, 2009, at B1 (quoting a member of Congress accusing former-Treasury Secretary Paulson of taking $700 billion and "giv[ing] it to [his] pals")
-
-
-
-
349
-
-
78649365942
-
-
Andrew Ross Sorkin, Paulson's Calls to Goldman May Have Tested Ethics, N.Y. TIMES.COM, Aug. 10, 2009, http://dealbook.blogs.nytimes.com/2009/08/10/ paulsons-calls-to-goldman-tested-ethics/ (noting that questions are still being raised about then- Secretary Paulson's participation in decisions "to prop up the teetering financial system with tens of billions of taxpayer dollars, including aid that directly benefited his former firm")
-
Andrew Ross Sorkin, Paulson's Calls to Goldman May Have Tested Ethics, N.Y. TIMES.COM, Aug. 10, 2009, http://dealbook.blogs.nytimes.com/2009/08/10/ paulsons-calls-to-goldman-tested-ethics/ (noting that questions are still being raised about then- Secretary Paulson's participation in decisions "to prop up the teetering financial system with tens of billions of taxpayer dollars, including aid that directly benefited his former firm").
-
-
-
-
350
-
-
78649368116
-
-
Cf. supra subpart I(B) (describing long-term, institutionalized deputization relationships between the telecoms and the government)
-
Cf. supra subpart I(B) (describing long-term, institutionalized deputization relationships between the telecoms and the government).
-
-
-
-
351
-
-
0005264157
-
-
Cf. Jody Freeman, Collaborative Governance in the Administrative State, 45 UCLA L. REV. 1, 54 (1997) (describing the advantages of labor agreements reached through consensus, asopposed to judicial or agency decree)
-
Cf. Jody Freeman, Collaborative Governance in the Administrative State, 45 UCLA L. REV. 1, 54 (1997) (describing the advantages of labor agreements reached through consensus, asopposed to judicial or agency decree)
-
-
-
-
352
-
-
78649364784
-
-
Philip J. Harter, Negotiating Regulations: A Cure for the Malaise, 71 GEO. L.J. 1, 31 (1981) (advocating the use of negotiation in rulemaking because, among other reasons, it adds legitimacy and interest-group "buy in")
-
Philip J. Harter, Negotiating Regulations: A Cure for the Malaise, 71 GEO. L.J. 1, 31 (1981) (advocating the use of negotiation in rulemaking because, among other reasons, it adds legitimacy and interest-group "buy in")
-
-
-
-
353
-
-
11244303709
-
-
Orly Lobel, The Renew Deal: The Fall of Regulation and the Rise of Governance in Contemporary Legal Thought, 89 MINN. L. REV. 342, 371-404 (2004) (describing a shift in regulatory governance toward a more participatory, collaborative, and flexible decisionmaking model)
-
Orly Lobel, The Renew Deal: The Fall of Regulation and the Rise of Governance in Contemporary Legal Thought, 89 MINN. L. REV. 342, 371-404 (2004) (describing a shift in regulatory governance toward a more participatory, collaborative, and flexible decisionmaking model).
-
-
-
-
354
-
-
84902756752
-
-
BRUCE ACKERMAN, BEFORE THE NEXT ATTACK: PRESERVING CIVIL LIBERTIES IN AN AGE OF TERRORISM 2-3 (2006) (noting that emergency measures enacted during a crisis are often not repealed after the crisis abates and indicating that those measures are further supplemented by an additional wave of emergency authorizations when a new crisis arises)
-
See BRUCE ACKERMAN, BEFORE THE NEXT ATTACK: PRESERVING CIVIL LIBERTIES IN AN AGE OF TERRORISM 2-3 (2006) (noting that emergency measures enacted during a crisis are often not repealed after the crisis abates and indicating that those measures are further supplemented by an additional wave of emergency authorizations when a new crisis arises)
-
-
-
-
355
-
-
0242671795
-
-
Oren Gross, Chaos and Rules: Should Responses to Violent Crises Always Be Constitutional?, 112 YALE L.J. 1011, 1090 (2003) ("It is commonplace to find on statute books legislative acts that had originally been enacted as temporary emergency or counterterrorism measures, but that were subsequently transformed into permanent legislation.")
-
Oren Gross, Chaos and Rules: Should Responses to Violent Crises Always Be Constitutional?, 112 YALE L.J. 1011, 1090 (2003) ("It is commonplace to find on statute books legislative acts that had originally been enacted as temporary emergency or counterterrorism measures, but that were subsequently transformed into permanent legislation.")
-
-
-
-
356
-
-
78649365338
-
-
id. at 1095-96 (describing the ratcheting up of emergency powers as new crises arise)
-
id. at 1095-96 (describing the ratcheting up of emergency powers as new crises arise)
-
-
-
-
357
-
-
78649352576
-
-
Jules Lobel, Emergency Power and the Decline of Liberalism, 98 YALE L.J. 1385, 1397-1421 (1989)
-
Jules Lobel, Emergency Power and the Decline of Liberalism, 98 YALE L.J. 1385, 1397-1421 (1989).
-
-
-
-
358
-
-
1042291360
-
-
But see Eric A. Posner & Adrian Vermeule, Accommodating Emergencies, 56 STAN. L. REV. 605, 610-26 (2003) (questioning the ratchet theory)
-
But see Eric A. Posner & Adrian Vermeule, Accommodating Emergencies, 56 STAN. L. REV. 605, 610-26 (2003) (questioning the ratchet theory).
-
-
-
-
359
-
-
78649355044
-
-
Indeed, even if government officials are not inclined to decrease the scope or intensity of operations when the circumstances seem objectively to warrant such downscaling, the private partners might serve as an independent check-refusing to cooperate, or limiting their cooperation, in light of the changed (and seemingly less dire) circumstances. Needless to note, this check is hardly perfect. Among other things, the private partners are not in the best position to make assessments regarding the relevant threats facing the United States
-
Indeed, even if government officials are not inclined to decrease the scope or intensity of operations when the circumstances seem objectively to warrant such downscaling, the private partners might serve as an independent check-refusing to cooperate, or limiting their cooperation, in light of the changed (and seemingly less dire) circumstances. Needless to note, this check is hardly perfect. Among other things, the private partners are not in the best position to make assessments regarding the relevant threats facing the United States.
-
-
-
-
360
-
-
78649349401
-
-
I address similar questions with respect to privatization and the contracting out of government responsibilities in Michaels, supra note 20
-
I address similar questions with respect to privatization and the contracting out of government responsibilities in Michaels, supra note 20.
-
-
-
-
361
-
-
78649361044
-
-
Bank Secrecy Act of 1970, 31 U.S.C. §§
-
See, e.g., Bank Secrecy Act of 1970, 31 U.S.C. §§ 5311-5330 (2006) (requiring banks to maintain specific records for use in criminal, tax, and regulatory investigations and proceedings and to file Suspicious Activity Reports, or SARs).
-
(2006)
Requiring Banks to Maintain Specific Records for use in Criminal, Tax, and Regulatory Investigations and Proceedings and to file Suspicious Activity Reports, or SARs
, pp. 5311-5330
-
-
-
362
-
-
1542606350
-
-
Lois A. Weithorn, Protecting Children from Exposure to Domestic Violence: The Use and Abuse of Child Maltreatment Statutes, 53 HASTINGS L.J. 1, 28 (2001) (referencing various reporting requirements for medical personnel)
-
See, e.g., Lois A. Weithorn, Protecting Children from Exposure to Domestic Violence: The Use and Abuse of Child Maltreatment Statutes, 53 HASTINGS L.J. 1, 28 (2001) (referencing various reporting requirements for medical personnel).
-
-
-
-
363
-
-
78649358987
-
-
Tarasoff v. Regents of Univ. of Cal., 551 P.2d 334, 348 (Cal. 1976) (acknowledging affirmative duties for mental-health practitioners to recognize patients' violent inclinations and to take steps to prevent the patients from acting on those inclinations)
-
See Tarasoff v. Regents of Univ. of Cal., 551 P.2d 334, 348 (Cal. 1976) (acknowledging affirmative duties for mental-health practitioners to recognize patients' violent inclinations and to take steps to prevent the patients from acting on those inclinations)
-
-
-
-
364
-
-
78649347438
-
-
MODEL CODE OF PROF'L RESPONSIBILITY DR 4-101(C) (1980) (permitting attorney disclosure of confidential communications with a client in order to help prevent crime)
-
MODEL CODE OF PROF'L RESPONSIBILITY DR 4-101(C) (1980) (permitting attorney disclosure of confidential communications with a client in order to help prevent crime)
-
-
-
-
365
-
-
78649355601
-
-
Stephen Gillers, A Duty To Warn, N.Y. TIMES, July 26, 2001, at A25
-
see also Stephen Gillers, A Duty To Warn, N.Y. TIMES, July 26, 2001, at A25.
-
-
-
-
366
-
-
78649390957
-
-
supra note 18 and accompanying text
-
See supra note 18 and accompanying text.
-
-
-
-
367
-
-
78649344589
-
-
AT&T Revises Privacy Policy for Customer Data, N.Y. TIMES, June 22, 2006, at C7
-
See, e.g., AT&T Revises Privacy Policy for Customer Data, N.Y. TIMES, June 22, 2006, at C7
-
-
-
-
368
-
-
78649350296
-
-
Barbara Ortutay, Associated Press, Facebook Backtracks on Terms of Use After Protests, LAW.COM, Feb. 18, 2009, http://www.law.com/jsp/article.jsp?id= 1202428366838 (describing strong opposition mounted by Facebook users after the social networking site sought to make unilateral and retroactively applicable changes to its user privacy policies)
-
Barbara Ortutay, Associated Press, Facebook Backtracks on Terms of Use After Protests, LAW.COM, Feb. 18, 2009, http://www.law.com/jsp/article.jsp?id= 1202428366838 (describing strong opposition mounted by Facebook users after the social networking site sought to make unilateral and retroactively applicable changes to its user privacy policies).
-
-
-
-
369
-
-
78649370074
-
-
Most balancing tests are susceptible to such claims-levied perhaps most forcefully by Justice Scalia-that they are unprincipled and results oriented
-
Most balancing tests are susceptible to such claims-levied perhaps most forcefully by Justice Scalia-that they are unprincipled and results oriented.
-
-
-
-
370
-
-
78649372670
-
-
Morrison v. Olson, 487 U.S. 654, 734 (1988) (Scalia, J., dissenting) (arguing that the "'totality of the circumstances' mode of analysis ⋯ is ⋯ guaranteed to produce a result, in every case, that will make a majority of the Court happy with the law. The law is, by definition, precisely what the majority thinks, taking all things into account, it ought to be")
-
See, e.g., Morrison v. Olson, 487 U.S. 654, 734 (1988) (Scalia, J., dissenting) (arguing that the "'totality of the circumstances' mode of analysis ⋯ is ⋯ guaranteed to produce a result, in every case, that will make a majority of the Court happy with the law. The law is, by definition, precisely what the majority thinks, taking all things into account, it ought to be")
-
-
-
-
371
-
-
78649340860
-
-
note
-
United States v. Mead, 533 U.S. 218, 241 (2001) (Scalia, J., dissenting) (describing "th'ol' 'totality of the circumstances' test" as the "test most beloved by a court unwilling to be held to rules (and most feared by litigants who want to know what to expect)"). While not unpersuasive, the fact of the matter is that the landscape for deputization is quite varied and whatever benefits accompany bright-line rules are more than overshadowed by the costs such an inflexible approach would impose on policymakers or judges. Indeed, the rejoinder to Justice Scalia's broadside in Mead is instructive. In noting the diversity of authorized agency activity (ranging from formal adjudication to informal opinion letters), the Court rejected Justice Scalia's either-or approach whether to defer to agency interpretations of statutory authority. Id. at 235-37. Instead it accepted the patchwork of regulatory actors and activities involved in statutory interpretation and acknowledged that a broad array of factors must be considered in developing a coherent understanding of where-and to what degree-deference ought to be accorded.
-
-
-
-
372
-
-
78649346532
-
-
id. Unless one takes a categorical approach in support of or entirely against a similarly diverse range of deputization arrangements operating in the interstices of the law, then a more nuanced, albeit at times unwieldy, totality-like metric appears warranted here
-
See id. Unless one takes a categorical approach in support of or entirely against a similarly diverse range of deputization arrangements operating in the interstices of the law, then a more nuanced, albeit at times unwieldy, totality-like metric appears warranted here.
-
-
-
|