메뉴 건너뛰기




Volumn 62, Issue 6, 2011, Pages 1441-1494

Network accountability for the domestic intelligence apparatus

Author keywords

[No Author keywords available]

Indexed keywords


EID: 80052770883     PISSN: 00178322     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (41)

References (302)
  • 1
    • 84873645221 scopus 로고    scopus 로고
    • Homeland Security Act of 2002, Pub L. No. 107-296, §§ 111-113, 2142-45
    • Homeland Security Act of 2002, Pub L. No. 107-296, §§ 111-113, 116 Stat. 2135, 2142-45
    • Stat , vol.116 , pp. 2135
  • 2
    • 80052771406 scopus 로고    scopus 로고
    • (codified at 6 U. S. C. §§ 111-113 (2006)) (establishing the DHS);
    • (2006) U. S. C. , vol.6 , pp. 111-113
  • 3
    • 77950669443 scopus 로고    scopus 로고
    • Share and share alike: Intelligence agencies and information sharing
    • Nathan Sales, Share and Share Alike: Intelligence Agencies and Information Sharing, 78 GEO. WASH. L. REV. 279, 280 (2009) ("[T]he consensus in favor of more information sharing has proven surprisingly broad and durable."). Although hard to say at the time of printing, the Wikileaks scandal that broke in late 2010 could have had an impact on the information-sharing imperative.
    • (2009) Geo. Wash. L. Rev. , vol.78 , pp. 279
    • Sales, N.1
  • 4
    • 80052772868 scopus 로고    scopus 로고
    • Police and national security: American local law enforcement and counterterrorism after 9/11
    • Matthew C. Waxman, Police and National Security: American Local Law Enforcement and Counterterrorism After 9/11, 3 J. NAT'L SECURITY L. & POL'Y 377, 405-07 (2009) (describing the lack of a "dedicated domestic intelligence service" in the U. S.).
    • (2009) J. Nat'L Security L. & Pol'Y , vol.3 , pp. 377
    • Waxman, M.C.1
  • 5
    • 33645810310 scopus 로고    scopus 로고
    • Many nations have domestic intelligence agencies, including France, Israel, Germany, Japan, Australia, New Zealand, India, South Africa, and Canada. RICHARD A. POSNER, REMAKING DOMESTIC INTELLIGENCE 3 (2005) (noting that "the weakest link in the U. S. intelligence system" is domestic intelligence, as compared to countries outside the U. S. that have such agencies).
    • (2005) Remaking Domestic Intelligence , pp. 3
    • Posner, R.A.1
  • 6
    • 80052766545 scopus 로고    scopus 로고
    • Intelligence fusion centers: A de-centralized national intelligence agency
    • Thomas Cincotta, Intelligence Fusion Centers: A De-Centralized National Intelligence Agency, PUBLIC EYE (Winter 2009/Spring 2010), http://www.publiceye. org/magazine/v24n4/intelligence-fusioncenters.html ("This network constitutes a nascent de facto national intelligence agency, whose decentralized structure diminishes transparency and accountability. Without effective oversight, a narrowly defined mission, and new legal structures, the capacity of fusion centers to undermine fundamental freedoms could grow unchecked.").
    • (2009) Public Eye
    • Cincotta, T.1
  • 7
    • 84942800122 scopus 로고    scopus 로고
    • Implementing Recommendations of the 9/11 Commission Act of 2007, Pub. L. No. 110-53, § 511, 322
    • Implementing Recommendations of the 9/11 Commission Act of 2007, Pub. L. No. 110-53, § 511, 121 Stat. 266, 322 (2007);
    • (2007) Stat , vol.121 , pp. 266
  • 8
    • 84855321578 scopus 로고    scopus 로고
    • Intelligence Reform & Terrorism Prevention Act of 2004, Pub. L. No. 108-458, § 1016, 3665
    • Intelligence Reform & Terrorism Prevention Act of 2004, Pub. L. No. 108-458, § 1016, 118 Stat. 3638, 3665 (2004).
    • (2004) Stat , vol.118 , pp. 3638
  • 10
    • 80052705961 scopus 로고    scopus 로고
    • Assessing RNC police tactics: Missteps, poor judgments, and inappropriate detentions
    • G. W. Schulz, Assessing RNC Police Tactics: Missteps, Poor Judgments, and Inappropriate Detentions, MINNPOST. COM (Sept. 1, 2009), http://www.minnpost. com/stories/2009/09/01/11198/assessing-rnc-police-tactics-missteps- poorjudgments-and-inappropriate-detentions.
    • (2009) Minnpost. Com.
    • Schulz, G.W.1
  • 11
    • 80052752171 scopus 로고    scopus 로고
    • Looking back at GOP convention: Police kicked into 'Disruption Mode'
    • Sept. 2
    • G. W. Schulz, Looking Back at GOP Convention: Police Kicked into 'Disruption Mode', MINNPOST. COM (Sept. 2, 2009), http://www.minnpost.com/ stories/2009/09/02/11256/looking-back-at-gop-convention-police-kicked-into- disruption-mode.
    • (2009) Minnpost. Com.
    • Schulz, G.W.1
  • 12
    • 77955331545 scopus 로고    scopus 로고
    • Spying uncovered
    • July 18
    • Nick Madigan, Spying Uncovered, BALT. SUN, July 18, 2008, at 1A, available at http://www.baltimoresun.com/news/maryland/bal-te.md.spy18jul18,o, 5659230.story.
    • (2008) Balt. Sun.
    • Madigan, N.1
  • 13
    • 80052702083 scopus 로고    scopus 로고
    • Police spied on activists in Maryland
    • July 18
    • Lisa Rein, Police Spied on Activists in Maryland, WASH. POST, July 18, 2008, at A1;
    • (2008) Wash. Post.
    • Rein, L.1
  • 14
    • 80052753684 scopus 로고    scopus 로고
    • Maryland state police spied on nonviolent activists and labeled them terrorists
    • Oct. 8
    • Matthew Harwood, Maryland State Police Spied on Nonviolent Activists and Labeled Them Terrorists, SECURITY MOMT. (Oct. 8, 2008), http://www. securitymanagement.com/news/maryland-state-policespied-nonviolent-activists-and- labeled-them-terrorists-004742.
    • (2008) Security Momt
    • Harwood, M.1
  • 15
    • 80052744125 scopus 로고    scopus 로고
    • The future of fusion centers: Potential promise and dangers: Hearing before subcomm. on intelligence, info. sharing, and terrorism risk assessment of the H. Comm. on homeland sec
    • The Future of Fusion Centers: Potential Promise and Dangers: Hearing Before Subcomm. on Intelligence, Info. Sharing, and Terrorism Risk Assessment of the H. Comm. on Homeland Sec, 111th Cong. 42 (2009) [hereinafter Future of Fusion Centers Hearing] (statement of Bruce Fein, Principal, The Litchfield Grp.).
    • (2009) 111Th Cong , vol.42
  • 16
    • 34247250414 scopus 로고    scopus 로고
    • Spies among us
    • Apr. 30
    • David E. Kaplan, Spies Among Us, U. S. NEWS & WORLD REP. (Apr. 30, 2006), http://www.usnews.com/usnews/news/articles/060508/8homeland.htm (alteration in original) (emphasis added) (quoting Mike Van Winkle) (internal quotation marks omitted).
    • (2006) U. S. News & World Rep.
    • Kaplan, D.E.1
  • 17
    • 80052744126 scopus 로고    scopus 로고
    • Administrative Procedure Act, §§ 701-703
    • Administrative Procedure Act, 5 U. S. C. §§ 701-703 (2006);
    • (2006) U. S. C. , vol.5
  • 18
    • 84914161436 scopus 로고
    • Exec. Order No. 12, 866, 735 Oct. 4
    • Exec. Order No. 12, 866, 58 Fed. Reg. 51, 735 (Oct. 4, 1993).
    • (1993) Fed. Reg. , vol.58 , pp. 51
  • 21
    • 79955765073 scopus 로고    scopus 로고
    • Network-based metaphors help clarify forms of association enabled by new communication and data storage technologies. We discuss fusion centers as both network organizations and hubs of associative clusters. For a definition of these terms, see MILTON MUELLER, NETWORKS AND STATES: GLOBAL POLITICS OF INTERNET GOVERNANCE 41 (2010) (defining a network organization as "a loose but bounded and consciously constructed organization based mainly on leveraging the benefits of reciprocity", and an associative cluster as "an unbounded and decentered cluster of actors around repeated patterns of exchange or contact").
    • (2010) Networks and States: Global Politics of Internet Governance , pp. 41
    • Mueller, M.1
  • 22
    • 34548749807 scopus 로고    scopus 로고
    • The bureaucratic due process of government watch lists
    • For an insightful analysis of the general problem of watch lists, see Peter M. Shane, The Bureaucratic Due Process of Government Watch Lists, 75 GEO. WASH. L. REV. 804 (2007).
    • (2007) Geo. Wash. L. Rev. , vol.75 , pp. 804
    • Shane, P.M.1
  • 27
    • 84942800122 scopus 로고    scopus 로고
    • Implementing Recommendations of the 9/11 Commission Act of 2007, Pub. L. No. 110-53, § 511, 322
    • Implementing Recommendations of the 9/11 Commission Act of 2007, Pub. L. No. 110-53, § 511, 121 Stat. 266, 322 (2007);
    • (2007) Stat , vol.121 , pp. 266
  • 28
    • 84855321578 scopus 로고    scopus 로고
    • Intelligence Reform & Terrorism Prevention Act of 2004, Pub. L. No. 108-458, § 1016, 3665
    • Intelligence Reform & Terrorism Prevention Act of 2004, Pub. L. No. 108-458, § 1016, 118 Stat. 3638, 3665.
    • Stat , vol.118 , pp. 3638
  • 29
  • 30
    • 77950633260 scopus 로고    scopus 로고
    • Privacy and information sharing in the war on terrorism
    • 954
    • see Peter P. Swire, Privacy and Information Sharing in the War on Terrorism, 51 VILL. L. REV. 951, 954 (2006).
    • (2006) Vill. L. Rev. , vol.51 , pp. 951
    • Swire, P.P.1
  • 32
    • 80052759017 scopus 로고    scopus 로고
    • Fusion centers key to efforts to combat drug violence, officials say
    • June 5
    • Trip Jennings, Fusion Centers Key to Efforts to Combat Drug Violence, Officials Say, N. M. INDEP. (June 5, 2009), http://newmexicoindependent.com/ 28966/fusion-centers-key-to-fed-efforts-atcombating-drug-violence;
    • (2009) N. M. Indep
    • Jennings, T.1
  • 35
    • 80052704501 scopus 로고    scopus 로고
    • Safeguarding America's playground
    • July/Aug
    • Tom Monahan, Safeguarding America's Playground, UNLV INST, FOR SEC. STUDIES (July/Aug. 2010), http://iss.unlv.edu/Guest%20Columns/guestcolumn- julyaugust%202010.html.
    • (2010) Unlv Inst, for Sec. Studies
    • Monahan, T.1
  • 36
    • 80052770460 scopus 로고    scopus 로고
    • MCAC partners
    • See, e.g., MCAC Partners, MD. COORDINATION & ANALYSIS CTR., http://www.mcac-md.gov/MCACPartners.php (on file with Hastings Law Journal).
    • Md. Coordination & Analysis Ctr.
  • 38
    • 80052749435 scopus 로고    scopus 로고
    • While the county fiddles, johnson Gets paid, and paid, and paid
    • July 15
    • Private firms also help run fusion centers. For instance, a consulting firm manages and provides analysis for the North Central Texas Fusion System. Bill Baumbach, While the County Fiddles, Johnson Gets Paid, and Paid, and Paid, COLLIN CNTV. OBSERVER (July 15, 2009), http://www.baumbach.org/b2evolutior1/ blogs/index.php/2009/07/15/whUe-the-county-fiddlesJohnson-gets-pa.
    • (2009) Collin Cntv. Observer
    • Baumbach, B.1
  • 39
    • 80052692728 scopus 로고    scopus 로고
    • Boeing to staff FBI fusion center
    • June 1
    • Alice Lipowicz, Boeing to Staff FBI Fusion Center, WASH. TECH. (June 1, 2007), http://washingtontechnology.com/articles/2007/o6/o1/boeing-to-staff-fbi- fusion-enter.aspx.
    • (2007) Wash. Tech.
    • Lipowicz, A.1
  • 41
    • 80052721946 scopus 로고    scopus 로고
    • Novel fusion center to boost anti-fraud efforts in California
    • Coal. Against Ins. Fraud, Wash., D. C., Summer
    • See Novel Fusion Center to Boost Anti-Fraud Efforts in California, FRAUD FOCUS (Coal. Against Ins. Fraud, Wash., D. C.), Summer 2008, at 1.
    • (2008) Fraud Focus , pp. 1
  • 42
    • 80052780641 scopus 로고    scopus 로고
    • Lipowicz, supra note 41. Boeing's decision to co-locate at the WJAC may be due, in part, to the Critical Infrastructure Protection Act of 2001, Pub. L. No. 107-56, 115 Stat. 400, which exempts information that a private firm has provided to the federal government concerning critical infrastructure from FOIA's disclosure requirements. Lipowicz, supra note 41. This suggests that Boeing is not only providing intelligence analysis, but also raw information to the WJAC.
    • Stat , vol.115 , pp. 400
  • 44
    • 80052751641 scopus 로고    scopus 로고
    • Smashing information stovepipes
    • last visited July 4, 2011
    • Joseph Straw, Smashing Information Stovepipes, SECURITY MGMT., http://www.securitymanagement.com/article/smashing-intelligencestovepipes?page= o%2Co (last visited July 4, 2011).
    • Security Mgmt.
    • Straw, J.1
  • 45
    • 80052784514 scopus 로고    scopus 로고
    • Critical issues in civil rights for law enforcement intelligence and counterterrorism
    • See, e.g., David L. Carter, Critical Issues in Civil Rights for Law Enforcement Intelligence and Counterterrorism, 46 CRIM. L. BULL. 587, 591 (2010) (discussing this approach);
    • (2010) Crim. L. Bull , vol.46 , pp. 587
    • Carter, D.L.1
  • 46
    • 80052706459 scopus 로고    scopus 로고
    • Network of centers pools data on terror
    • Dec. 31
    • Mary Beth Sheridan & Spencer S. Hsu, Network of Centers Pools Data on Terror, WASH. POST, - Dec. 31, 2006, at A3.
    • (2006) Wash. Post
    • Sheridan, M.B.1    Hsu, S.S.2
  • 48
    • 80052709263 scopus 로고    scopus 로고
    • Delaware moves to forefront with security technology
    • Kerry Kester, Delaware Moves to Forefront with Security Technology, CAPE GAZETTE, Apr. 17, 2007, at 4 (on file with Hastings Law Journal). The Fusion Center Guidelines suggest numerous modes of intelligence output, such as investigative and tactical responśe, alerts, geospatial imaging, criminal backgrounds and profiles, crime-pattern analysis, terrorism calendars, and threat assessments.
    • (2007) Cape Gazette , pp. 4
    • Kester, K.1
  • 50
    • 80052730532 scopus 로고    scopus 로고
    • Narrowing the focus
    • Sept. 12, Monahan
    • Jim McKay, Narrowing the Focus, GOV'T TECH. (Sept. 12, 2007), http://www.govtech.com/public-safety/Narrowing-the-Focus.html; Monahan, supra note 37;
    • (2007) Gov'T Tech.
    • Mckay, J.1
  • 51
    • 80052776236 scopus 로고    scopus 로고
    • Microsoft to aid in war on terror, builds software for DHS
    • Nov. 21, 19 AM
    • Ryan Paul, Microsoft to Aid in War on Terror, Builds Software for DHS, ARS TECHNICA (Nov. 21, 2008, 9:19 AM), http://arstechnica.com/security/news/ 2008/ii/microsoft-to-aid-in-war-on-terror-builds-software-for-dhs.ars.
    • (2008) Ars Technica , pp. 9
    • Paul, R.1
  • 52
    • 80052694848 scopus 로고    scopus 로고
    • Metro Operations Support & Analytical Intelligence Ctr., Presentation to the Public Safety Committee: Dallas Police Department Fusion Center Update 11 (June 15, 2009), available at http://www.dallascityhall.com/committee- briefmgs/briefingso609/PS-Fusion-Center-061509.pdf. The Southern Nevada fusion center's director echoed this sentiment: "Intelligence analysts collect information from other Fusion Centers from classified and unclassified sources, as well as from the public, with an eye towards identifying those behaviors and activities that suggest the pre-operational phases of an impending terror attack." Monahan, supra note 37.
  • 54
    • 80052719110 scopus 로고    scopus 로고
    • Beyond ISE implementation: Exploring the way forward for information sharing: Hearing before intelligence, info. sharing, and terrorism risk assessment subcomm. of the H. Comm. on homeland sec
    • As a New Jersey fusion center official explained, we have a "customer philosophy of 'give us a quarter's worth of information and we'll provide you with a dollar's worth of analysis and lead value intelligence information-'" Beyond ISE Implementation: Exploring the Way Forward for Information Sharing: Hearing Before Intelligence, Info. Sharing, and Terrorism Risk Assessment Subcomm. of the H. Comm. on Homeland Sec, 111th Cong. 18 (2009) [hereinafter Beyond ISE Implementation] (statement of Colonel Rick Fuentes, Superintendent, N. J. State Police).
    • (2009) 111Th Cong , pp. 18
  • 55
    • 71949127148 scopus 로고    scopus 로고
    • Centers tap into personal databases
    • Robert O'Harrow, Jr., Centers Tap into Personal Databases, WASH. POST, Apr. 2, 2008, at A1 (quoting Steven G. O'Donnell, Deputy Superintendent of R. I. State Police) (internal quotation marks omitted).
    • (2008) Wash. Post.
    • O'Harrow Jr., R.1
  • 56
    • 80052779330 scopus 로고    scopus 로고
    • Fusion centers analyzing reams of Americans' personal information
    • Apr. 2, 16 AM
    • Ryan Singel, Fusion Centers Analyzing Reams of Americans' Personal Information, WIRED BLOG (Apr. 2, 2008 10:16 AM), http://blog.wired.com/ 27bstroke6/2008/04/fusion-centers.html.
    • (2008) Wired Blog , pp. 10
    • Singel, R.1
  • 57
    • 80052715153 scopus 로고    scopus 로고
    • The power of fusion
    • Mar. 1
    • Michael Fickes, The Power of Fusion, GOV'T SEC. (Mar. 1, 2008), http://govtsecurity.com/federal-homeland-security/power-fusion-nsa/.
    • (2008) Gov'T Sec
    • Fickes, M.1
  • 58
    • 80052748946 scopus 로고    scopus 로고
    • Norm Beasley, Counter-Terrorism Coordinator, Maricopa Cnty, Ariz. Sheriffs Office, Presentation at the COPS 2007 Technology Program Kickoff Conference: Fusion Centers & Their Role in Information Sharing 28-29 (Dec. 5, 2007) (on file with Hastings Law Journal);
    • (2007) Counter-terrorism Coordinator, Maricopa Cnty, Ariz
    • Beasley, N.1
  • 59
    • 80052755165 scopus 로고    scopus 로고
    • Port of long beach fusion center opens
    • Feb. 9
    • Matthew Harwood, Port of Long Beach Fusion Center Opens, SEC. MGMT. (Feb. 9, 2009), http://www.securitymanagement.com/news/port-long-beach-fusion-center- opens-005197/.
    • (2009) Sec. MGMT
    • Harwood, M.1
  • 60
    • 78449263223 scopus 로고    scopus 로고
    • Surveillance effort draws civil liberties concerns
    • Apr. 28, 2009
    • Eric Schmitt, Surveillance Effort Draws Civil Liberties Concerns, N. Y. TIMES, Apr. 28, 2009, at A12. Until late 2009, law enforcement were directed to submit suspicious activity reports about unusual activity, such as a person's taking pictures, sweating, mumbling, and participation in extremist groups.
    • (2009) N. Y. Times
    • Schmitt, E.1
  • 61
    • 80052776237 scopus 로고    scopus 로고
    • MIKE GERMAN & JAY STANLEY, ACLU, FUSION CENTER UPDATE 2 (2008). Privacy advocates opposed this practice, arguing that this approach risked the reporting of individuals' constitutionally protected activities.
    • (2008) Aclu, Fusion Center Update , vol.2
    • German, M.1    Stanley, J.2
  • 62
    • 80052730051 scopus 로고    scopus 로고
    • Id. In response, the DOJ released a nationwide SAR initiative, which provided strict guidelines for the collection of SARS. U. S. DEP'T OF JUSTICE, ISE-FS-200, INFORMATION SHARING EXCHANGE FUNCTIONAL STANDARD SUSPICIOUS ACNVRRY REPORTING VERSION 1.5 6-7 (2009) [hereinafter ISE FUNCTIONAL STANDARD], available at http://www.niem.gov/pdf/ISE-FS-200-ISE-SAR-Functional-Standard-Vi- 5-Issued.pdf (permitting the production of SARs only on "observed behavior reasonably indicative of pre-operational planning related to terrorism or other criminal activity" and banning a person's race, ethnicity, national origin, or religious affiliation as factors creating suspicion).
    • (2009) Sars. U. S. Dep'T of Justice, ISE-FS-200, Information Sharing Exchange Functional Standard Suspicious Acnvrry Reporting Version , vol.15 , pp. 6-7
  • 63
    • 80052709264 scopus 로고    scopus 로고
    • Reporting suspicious activity questions and answers
    • last visited July 4, 2011
    • Reporting Suspicious Activity Questions and Answers, COLO. INFO. ANALYSIS CTR., https://www.ciac.co.gov/index.cfm (last visited July 4, 2011).
    • Colo. Info. Analysis Ctr.
  • 64
    • 80052736345 scopus 로고    scopus 로고
    • Suspicious activity form
    • Aug
    • Suspicious Activity Form, CONN. INTELLIGENCE CTR. (Aug. 2006), http://www.ct.gov/demhs/lib/demhs/emergmgmt/tipsform.pdf (providing a blank form for making reports and asking officers to identify the suspect's name, date of birth, Social Security number, sex, and race).
    • (2006) Conn. Intelligence Ctr.
  • 65
    • 80052756172 scopus 로고    scopus 로고
    • Focus on fusion centers: A progress report, hearing before the ad hoc subcomm. on state, local, and private sector preparedness and integration of the S. Comm. on homeland Sec. & governmental affairs
    • Focus on Fusion Centers: A Progress Report, Hearing Before the Ad Hoc Subcomm. on State, Local, and Private Sector Preparedness and Integration of the S. Comm. on Homeland Sec. & Governmental Affairs, 110th Cong. 35 (2008) [hereinafter Focus on Fusion Centers] (statement of Matthew Bettenhausen, Dir., Calif. Office of Homeland Sec);
    • (2008) 110Th Cong , pp. 35
  • 66
    • 80052767518 scopus 로고    scopus 로고
    • May 14
    • Wash. State Fusion Ctr., Operation De-Fuse Briefing at the Washington State Fusion Center (May 14, 2010), available at http://www.operationdefuse.com/ 2010/05/14/washington-state-fusion-center-powerpoint/ (explaining that it "distributes information, intelligence, and products" to law enforcement agencies and private sector partners).
    • (2010) Wash. State Fusion Ctr., Operation De-Fuse Briefing at the Washington State Fusion Center
  • 68
    • 80052770459 scopus 로고    scopus 로고
    • Dr. Bob's terror shop: The strange and scary story of the north central texas fusion system
    • Apr. 2
    • Forrest Wilder, Dr. Bob's Terror Shop: The Strange and Scary Story of the North Central Texas Fusion System, TEX. OBSERVER (Apr. 2, 2009), http://www.texasobserver.org/archives/item/15614-3003-dr-bobs-terror-shop.
    • (2009) Tex. Observer
    • Wilder, F.1
  • 69
    • 80052740303 scopus 로고    scopus 로고
    • Definitions
    • last visited July 4, 2011
    • Definitions, ARIZ. COUNTER TERRORISM INFO. CTR., http://www.azactic.gov/ About/Definitions/ (last visited July 4, 2011).
    • Ariz. Counter Terrorism Info. Ctr.
  • 70
    • 80052783529 scopus 로고    scopus 로고
    • Post-9/11 intelligence goes local
    • Aug. 12
    • Trip Jennings, Post-9/11 Intelligence Goes Local, N. M. INDEP. BLOG (Aug. 12, 2008, 3:00 AM), http://newmexicoindependent.com/48i/post-9ii-intelligence- goes-local (quoting Norm Beasley) (internal quotation marks omitted).
    • (2008) N. M. Indep. Blog
    • Jennings, T.1
  • 71
    • 80052774802 scopus 로고    scopus 로고
    • FUSION CENTER GUIDEUNES, supra note 47, at C-1. The Fusion Center Guidelines recommend partnerships with private owners of critical infrastructure, including hospitals, banking, chemical industry, education, energy, hotels, telecommunications, shipping, and private security, among others. Id.
    • Fusion Center Guideunes
  • 72
    • 80052784036 scopus 로고    scopus 로고
    • Private sector information sharing: What is it, who does it, and what's working at DHS?: Hearing before the subcomm. on intelligence, info. Sharing & terrorism risk assessment of the H. Comm. of homeland sec
    • Private Sector Information Sharing: What Is It, Who Does It, and What's Working at DHS?: Hearing Before the Subcomm. on Intelligence, Info. Sharing & Terrorism Risk Assessment of the H. Comm. of Homeland Sec, 110th Cong. 5-6 (2007) (statement of James M. Chaparro, Deputy Assistant Sec'y, Dep't of Homeland Sec. Office of Intelligence and Analysis);
    • (2007) 110Th Cong , pp. 5-6
    • Chaparro, J.M.1
  • 73
    • 71949099546 scopus 로고    scopus 로고
    • The murky world of 'Fusion Centres'
    • Mar, 20-21
    • Torin Monahan, The Murky World of'Fusion Centres', CRIM. JUST. MATTERS, Mar. 2009, at 20, 20-21.
    • (2009) Crim. Just. Matters , pp. 20
    • Monahan, T.1
  • 74
    • 80052768877 scopus 로고    scopus 로고
    • CSX to share data with kentucky fusion center
    • Aug. 2
    • Alice Lipowicz, CSX to Share Data with Kentucky Fusion Center, WASH. TECH. (Aug. 2, 2007), http://washingtontechnology.com/articles/2007/08/02/csx- to-share-data-with-kentucky-fusion-center.aspx?sc-lang=en.
    • (2007) Wash. Tech.
    • Lipowicz, A.1
  • 75
    • 80052699886 scopus 로고    scopus 로고
    • State perspective-arizona
    • Jan. 1
    • Joseph Straw, State Perspective-Arizona, SECURITY MGMT. (Jan. 1, 2007), http://www.securitymanagement.com/article/state-perspective-arizona.
    • (2007) Security Mgmt
    • Straw, J.1
  • 77
    • 80052777209 scopus 로고    scopus 로고
    • Future of Fusion Centers Hearing, supra note 23, at 51 (statement of David D. Gersten, Acting Deputy Officer for Programs and Compliance, U. S. Dep't of Homeland Sec.)
    • Future of Fusion Centers Hearing , pp. 51
  • 78
    • 34548337141 scopus 로고    scopus 로고
    • Sending the bureaucracy to war
    • For a general critique of improvisation in the war on terror, see David Zaring & Elena Baylis, Sending the Bureaucracy to War, 92 IOWA L. REV. 1359 (2007).
    • (2007) Iowa L. Rev. , vol.92 , pp. 1359
    • Zaring, D.1    Baylis, E.2
  • 79
    • 84937343002 scopus 로고    scopus 로고
    • Virtual visibility
    • Anne-Marie Slaughter, Virtual Visibility, FOREIGN POL'Y, Nov. 2000, at 84, 84 ("Networks are the organizational charts of choice for the information age. Corporations have been transforming themselves from vertical hierarchies into horizontal networks for a decade-[Njational governments are networking as well, linking with their regulatory counterparts across the globe to tackle thorny transnational issues such as money laundering, securities fraud, and drug trafficking. Unfortunately, they are doing so in ways that raise serious concerns about accountability.").
    • (2000) Foreign Pol'Y , pp. 84
    • Slaughter, A.1
  • 82
    • 80052709717 scopus 로고    scopus 로고
    • PRIVACY IMPACT ASSESSMENT, supra note 7, at 26-27. Virginia recently passed legislation exempting its fusion centers from the requirements of state privacy law.
    • Privacy Impact Assessment , pp. 26-27
  • 83
    • 80052735905 scopus 로고    scopus 로고
    • See 2008 Va. Acts ch. 792
    • (2008) Va. Acts , pp. 792
  • 84
    • 80052766542 scopus 로고    scopus 로고
    • (codified as amended at VA. CODE ANN. §§ 52-48, 52-49 (West 2010));
    • Va. Code Ann. , vol.48-52 , pp. 52-49
  • 85
    • 30144439568 scopus 로고    scopus 로고
    • 5 U. S. C. § 552a (m) (2006).
    • (2006) U. S. C. , vol.5
  • 87
    • 80052732873 scopus 로고    scopus 로고
    • Future of Fusion Center Hearing, supra note 23, at 54 (statement of David D. Gersten, Acting Deputy Officer for Programs and Compliance, U. S. Dep't of Homeland Sec).
    • Future of Fusion Center Hearing , pp. 54
  • 89
    • 80052755660 scopus 로고    scopus 로고
    • This includes the Indiana, Michigan, Minnesota, and Mississippi fusion centers. IND. INTELLIGENCE FUSION CTR., PRIVACY POLICY VERSION 2.0 (2010), available at http://www.in.gov/iifc/files/IIFC-Privacy-Policy.pdf; Mich. Intelligence Operations Ctr.
    • (2010) Ind. Intelligence Fusion Ctr., Privacy Policy Version 2.0
  • 90
    • 80052713706 scopus 로고    scopus 로고
    • PRIVACY POLICY (2011), available at http://www.michigan.gov/documents/ msp/MIOCprivacypolicy-355596-7.pdf;
    • (2011) Privacy Policy
  • 91
    • 80052780639 scopus 로고    scopus 로고
    • MINN. JOINT ANALYSIS CTR., PRIVACY POLICY (2011), available at http://www.nfcausa.org/(S(xipxro45420unzyc3amnqtei))/documentdownload.aspx? documentid=34&getdocnum=i&AspxAutoDetectCookieSupport=i; Miss. Analysis - Info. Ctr.
    • (2011) Minn. Joint Analysis Ctr., Privacy Policy
  • 92
    • 80052733326 scopus 로고    scopus 로고
    • PRIVACY POLICY (2007), available at http://www.homelandsecurity.ms.gov/ docs/msaic-privacy-policy.pdf.
    • (2007) Privacy Policy
  • 93
    • 80052703510 scopus 로고    scopus 로고
    • For instance, the Washington State fusion center summarized its "key privacy policy elements" in a public briefing as including " 28 C. F. R. Part 23, audit mechanism (being developed by Executive Board), and the prohibition against the collection, retention, and dissemination of information based solely on race, gender, age, sexual orientation, disability, or First Amendment activities." Wash. State Fusion Ctr., supra note 63;
    • C. F. R. , vol.28 , pp. 23
  • 94
    • 80052692727 scopus 로고    scopus 로고
    • see also 28 C. F. R. pt. 23 (2010).
    • (2010) C. F. R. , vol.28 , pp. 23
  • 96
    • 80052736855 scopus 로고    scopus 로고
    • (noting that fusion centers must adhere to 28 C. F. R. pt. 23 because they receive federal funding).
    • C. F. R. , vol.28 , pp. 23
  • 98
    • 80052749433 scopus 로고    scopus 로고
    • Id. Fusion centers have assisted local, state, and federal agencies in other ways. They help locate individuals with outstanding warrants. Mo. Info. Analysis Or., Missouri Information Analysis Center (MIAC), http://www.scribd. corn/doc/17782446/MIAC-Power-Point-What-is-MIAC (last visited July 4, 2011).
    • Missouri Information Analysis Center (Miac)
  • 99
    • 47049107175 scopus 로고    scopus 로고
    • Government data mining: The need for a legal framework
    • Data-mining applications are successful in predicting consumer behavior for credit card companies, because they can compare a consumer's credit history with the credit histories of millions of other consumers to predict the likelihood of delinquency. Fred H. Cate, Government Data Mining: The Need for a Legal Framework, 43 HARV. C. R.-C. L. L. REV. 435, 473 (2008).
    • (2008) Harv. C. R.-C. L. L. Rev. , vol.43 , pp. 435
    • Cate, F.H.1
  • 100
    • 85050328322 scopus 로고    scopus 로고
    • Empirical social inquiry and models of causal inference
    • For a description of the "small-N" problem, see David Dahua Yang, Empirical Social Inquiry and Models of Causal Inference, NEW ENG. J. POL. SCI., Fall 2006, oat 51, 63. Nevertheless, an academic paper from the Naval Postgraduate School claims to "establish a chronological pattern to" the radicalization of "our nation's three most prolific domestic lone wolf terrorists", including Timothy McVeigh, Ted Kaczynski, and Eric Rudolph, and thus identifying a "pattern [that] can identify future lone wolf terrorist radicalization activity upstream."
    • (2006) New Eng. J. Pol. Sci., Fall , pp. 51
    • Yang, D.D.1
  • 101
    • 80052741254 scopus 로고    scopus 로고
    • Nathan R. Springer, Patterns of Radicalization: Identifying the Markers and Warning Signs of Domestic Lone Wolf Terrorists in Our Midst 79 (Dec. 2009) (unpublished Master's thesis, Naval Postgraduate School), available at http://www.opensourcesinfo.org/journal/2010/11/23/patterns-of-radicalization- identifying-the-markersand-warni.html ("The next lone wolf domestic terrorist lurks in our midst, and could be following the same chronological pattern that we saw with McVeigh, Kaczynski, and Rudolph. Apply the chronological pattern of radicalization [discussed in this thesis]... to future radicalization and we could catch it upstream, before it happens.").
    • (2009) Patterns of Radicalization: Identifying the Markers and Warning Signs of Domestic Lone Wolf Terrorists in Our Midst 79
    • Springer, N.R.1
  • 104
    • 80052763508 scopus 로고    scopus 로고
    • Spy agency data after Sept. u led FBI to dead ends
    • Jan. 17, at A1
    • Lowell Bergman et al., Spy Agency Data After Sept. u Led FBI to Dead Ends, N. Y. TIMES, Jan. 17, 2006, at A1.
    • (2006) N. Y. Times
    • Bergman, L.1
  • 107
    • 45849148052 scopus 로고    scopus 로고
    • Effective counterterrorism and the limited role of predictive data mining
    • 8
    • Swire, supra note 32, at 964-65; Jeff Jonas & Jim Harper, Effective Counterterrorism and the Limited Role of Predictive Data Mining, CATO INST. POL'Y ANALYSIS, Dec. 11, 2006, at 1, 8.
    • (2006) Cato Inst. Pol'Y Analysis , pp. 1
    • Jonas, J.1    Harper, J.2
  • 108
    • 80052741739 scopus 로고    scopus 로고
    • Correcting false positives: Redress and the watch list conundrum
    • Heritage Found., Wash., D. C., June 17
    • Paul Rosenzweig & Jeff Jonas, Correcting False Positives: Redress and the Watch List Conundrum, LEGAL MEMORANDUM (Heritage Found., Wash., D. C.), June 17, 2005, at 2-3.
    • (2005) Legal Memorandum , pp. 2-3
    • Rosenzweig, P.1    Jonas, J.2
  • 109
    • 80052724900 scopus 로고    scopus 로고
    • Jonas & Harper, supra note 104, at 8. To be sure, some national security efforts, like airport screening, may make us safer, because they provide an appearance of greater scrutiny. BRUCE SCHNEIER, BEYOND FEAR: THINKING SENSIBLY ABOUT SECURITY IN AN UNCERTAIN WORLD 38 (2003). Fusion centers cannot provide such "security theater", because they operate in secret.
    • (2003) Beyond Fear: Thinking Sensibly About Security in an Uncertain World , vol.38
    • Schneier, B.1
  • 116
    • 77955332677 scopus 로고    scopus 로고
    • Agency apologizes for militia report on candidates
    • see Chad Livengood, Agency Apologizes for Militia Report on Candidates, SPRINGFIELD NEWS-LEADER, Mar. 25, 2009, at 1A. The fusion center intended the report only for the eyes of police officers-it was made public after being leaked on the Internet. Livengood, supra. The fusion center subsequently apologized to former presidential candidates Ron Paul, Bob Barr, and Chuck Baldwin for the report. Id.
    • (2009) Springfield News-leader
    • Livengood, C.1
  • 117
    • 80052772420 scopus 로고    scopus 로고
    • 'Fusion Center' data draws fire over assertions
    • Mar. 14
    • T. J. Greaney, 'Fusion Center' Data Draws Fire over Assertions, COLUMBIA DAILY TRIB., Mar. 14, 2009, at A1, available at http://www.columbiatribune.com/ news/2009/mar/14/fusion-center-datadraws-fire-over-assertions/.
    • (2009) Columbia Daily Trib.
    • Greaney, T.J.1
  • 118
    • 80052778122 scopus 로고    scopus 로고
    • ACLU: Spying on activists needs to end
    • July 27
    • Josh Richman, ACLU: Spying on Activists Needs to End, OAKLAND TRIB., July 27, 2006, at 1.
    • (2006) Oakland Trib. , pp. 1
    • Richman, J.1
  • 119
    • 80052692726 scopus 로고    scopus 로고
    • 2009
    • VA. FUSION CTR., 2009 VIRGINIA TERRORISM THREAT ASSESSMENT 9 (2009). In 2009, the North Central Texas Fusion System distributed its Prevention Awareness Bulletin to over 1500 state officials, urging law enforcement to report on organizations that lobby Islamic-based issues or support radical goals such as Shariah law.
    • (2009) Virginia Terrorism Threat Assessment , pp. 9
  • 120
    • 80052744619 scopus 로고    scopus 로고
    • Fusion centers under fire in texas and new Mexico
    • Mar. 9
    • Matthew Harwood, Fusion Centers Under Fire in Texas and New Mexico, SECURITY MGMT. (Mar. 9, 2009), http://www.securitymanagement.com/news/fusion- centers-under-firetexas-and-new-mexico-005314.
    • (2009) Security Mgmt
    • Harwood, M.1
  • 122
    • 79951797825 scopus 로고    scopus 로고
    • First amendment investigations and the inescapable pragmatism of the common law of free speech
    • Id. at 3. COINTELPRO was not an isolated abuse. Lawrence Rosenthal, First Amendment Investigations and the Inescapable Pragmatism of the Common Law of Free Speech, 86 IND. LJ. I, 37 (2011) ("[H]istory reflects a serious risk of abuse in investigations based on the protected speech of the targets.").
    • (2011) Ind. Lj. I , vol.86 , pp. 37
    • Rosenthal, L.1
  • 123
    • 70449815865 scopus 로고    scopus 로고
    • Freedom of association in a networked world: First amendment regulation of relational surveillance
    • Fusion centers might analyze individuals' digital footprints to identify "suspicious" political, ethnic, and religious groups. Katherine J. Strandburg, Freedom of Association in a Networked World: First Amendment Regulation of Relational Surveillance, 49 B. C. L. REV. 741, 760 (2008). As Katherine Strandburg warns, such data-mining programs seek to find "malevolent associations in a haystack of more numerous legitimate relationships."
    • (2008) B. C. L. Rev. , vol.49 , pp. 741
    • Strandburg, K.J.1
  • 124
    • 42349088345 scopus 로고    scopus 로고
    • Data mining and the security-liberty debate
    • Daniel J. Solove, Data Mining and the Security-Liberty Debate, 75 U. CHI. L. REV. 343, 358 (2008) (explaining that bias can be embedded in human-created profiles encoded in computer algorithms, as well as in the human-compiled datasets of terrorists that predictive data-mining tools would search).
    • (2008) U. Chi. L. Rev. , vol.75 , pp. 343
    • Solove, D.J.1
  • 125
    • 34247545822 scopus 로고    scopus 로고
    • The first amendment as criminal procedure
    • 143-44
    • Daniel J. Solove, The First Amendment as Criminal Procedure, 82 N. Y. U. L. REV. 112, 143-44 (2007).
    • (2007) N. Y. U. L. Rev. , vol.82 , pp. 112
    • Solove, D.J.1
  • 126
    • 77955341233 scopus 로고    scopus 로고
    • Fulfilling government 2.0's promise with robust privacy protections
    • See Danielle Keats Citron, Fulfilling Government 2.0's Promise with Robust Privacy Protections, 78 GEO. WASH. L. REV. 822, 861 (2010) (exploring the potential chilling caused by government's use of social media to interact with the public on policy issues). This Article does not suggest that the surveillance of political and religious groups is necessarily justiciable, although it may be so in circumstances where the chilling of expressive association is accompanied by objective harm, such as reputational damage.
    • (2010) Geo. Wash. L. Rev. , vol.78 , pp. 822
    • Citron, D.K.1
  • 127
    • 70449836959 scopus 로고    scopus 로고
    • Guilt by expressive association: Political profiling, surveillance and the privacy of groups
    • See Linda E. Fisher, Guilt by Expressive Association: Political Profiling, Surveillance and the Privacy of Groups, 46 ARIZ. L. REV. 621, 656-57 (2004). Instead, it seeks to underscore the various ways fusion centers impact basic liberties, including free expression and association.
    • (2004) Ariz. L. Rev. , vol.46 , pp. 621
    • Fisher, L.E.1
  • 128
  • 129
    • 80052710402 scopus 로고    scopus 로고
    • MIAC isn't making 'strategic' reports but won't rule them out
    • Dec. 23
    • MIAC Isn't Making 'Strategic' Reports but Won't Rule Them Out, OPERATION DEFUSE (Dec. 23, 2009), http://www.operationdefuse.com/2009/12/23/miac-isnt- making-strategic-reports-but-wontrule-them-out-ky3-news-weather-sports- springfield-mo-local-news/.
    • (2009) Operation Defuse
  • 131
    • 73149108947 scopus 로고    scopus 로고
    • ROLUNS, supra note 26, at 58. One-third of fusion center officials reported that they lacked guidance on civil liberties practices. U. S. GOV'T ACCOUNTABILITY OFFICE, supra note 103, at 11 (explaining that officials in nineteen fusion centers said that they lacked guidance on informationsharing policies and procedures, such as privacy and civil liberties issues).
    • U. S. Gov'T Accountability Office , pp. 11
  • 133
    • 77955324276 scopus 로고    scopus 로고
    • Visionary pragmatism and the value of privacy in the twenty-first century
    • See generally Danielle Keats Citron & Leslie Meltzer Henry, Visionary Pragmatism and the Value of Privacy in the Twenty-First Century, 108 MICH. L. REV. 1107 (2010) (reviewing SOLOVE, supra).
    • (2010) Mich. L. Rev. , vol.108 , pp. 1107
    • Citron, D.K.1    Henry, L.M.2
  • 134
    • 80052759485 scopus 로고    scopus 로고
    • Id. In revising the SARs protocols, the DHS may have helped prevent other privacy concerns. Before the newly revised SARs protocols, law enforcement was instructed to submit SARs based on a person's use of binoculars, drawing diagrams, inappropriate attire, ownership of heavy vehicles, or espousal of extremist views. See, e.g., GERMAN & STANLEY, supra note 58, at 2.
    • German & Stanley , pp. 2
  • 135
    • 80052756171 scopus 로고    scopus 로고
    • Such aggressive information collection risked violating 28 C. F. R. pt. 23
    • C. F. R. , vol.28 , pp. 23
  • 136
    • 80052692727 scopus 로고    scopus 로고
    • which requires a reasonable suspicion that a person committed a crime before collecting information. 28 C. F. R. pt. 23 (2010).
    • (2010) C. F. R. , vol.28 , pp. 23
  • 137
    • 80052754673 scopus 로고    scopus 로고
    • Indeed, that approach recalled the COINTELPRO surveillance that motivated Congress to require the issuance of 28 C. F. R. pt. 23 in the first place.
    • C. F. R. , vol.28 , pp. 23
  • 138
    • 80052759484 scopus 로고    scopus 로고
    • Reputation regulation: Disclosure and the challenge of clandestinely commensurating computing
    • See Frank Pasquale, Reputation Regulation: Disclosure and the Challenge of Clandestinely Commensurating Computing, in THE OFFENSIVE INTERNET: SPEECH, PRIVACY, AND REPUTATION 107, no (Martha Nussbaum & Saul Levmore eds., 2010) (discussing systems that "unfairly induce the use of informal, digital methods that increase the chance of mis-recognition and reductionism").
    • (2010) The Offensive Internet: Speech, Privacy, and Reputation , pp. 107
    • Pasquale, F.1
  • 139
    • 80052769968 scopus 로고    scopus 로고
    • Reporter arrested for political activism
    • Jan. 5, 11:01 AM
    • Christine Stuart, Reporter Arrested for Political Activism, CONN. NEWS JUNKIE BLOG (Jan. 5, 2007 11:01 AM), http://www.ctnewsjunkie.com/ctnj.php/ archives/entry/reporter-arrested-for-political-activism-updated-with-police- report/.
    • (2007) Conn. News Junkie Blog
    • Stuart, C.1
  • 140
    • 77955317944 scopus 로고    scopus 로고
    • Arrest exposes state's threats list
    • Jan. 9
    • Gregory B. Hladky, Arrest Exposes State's Threats List, NEW HAVEN REG., Jan. 9, 2007, at A1.
    • (2007) New Haven Reg.
    • Hladky, G.B.1
  • 141
    • 77955338709 scopus 로고    scopus 로고
    • Are you on the list?
    • Sept. 30
    • Gerri Willis, Are You on the List?, CNN (Sept. 30, 2009), http://www.cnn.com/video/video/crime/2009/09/30/willis.fusion.centers.cnn.
    • (2009) Cnn
    • Willis, G.1
  • 142
    • 77955340439 scopus 로고    scopus 로고
    • Arrest of activist troubles hartford officials
    • Jan. 9
    • Jennifer Medina, Arrest of Activist Troubles Hartford Officials, N. Y. TIMES, Jan. 9, 2007, at B6.
    • (2007) N. Y. Times
    • Medina, J.1
  • 143
    • 77954749027 scopus 로고    scopus 로고
    • Technological due process
    • Cf. Danielle Keats Citron, Technological Due Process, 85 WASH. U. L. REV. 1249, 1309 (2008) (exploring the due process implications of automated system determinations including the "No Fly" list).
    • (2008) Wash. U. L. Rev. , vol.85 , pp. 1249
    • Citron, D.K.1
  • 144
    • 0347315050 scopus 로고    scopus 로고
    • Examined lives: Informational privacy and the subject as object
    • See generally, e.g., Julie E. Cohen, Examined Lives: Informational Privacy and the Subject as Object, 52 STAN. L. REV. 1373 (2000) (arguing that the debate surrounding data privacy protection needs to be grounded in an appreciation for autonomy that requires a degree of freedom from monitoring, scrutiny, and categorization by others). As the Supreme Court has made clear, individuals have no expectation of privacy in information provided to third parties.
    • (2000) Stan. L. Rev. , vol.52 , pp. 1373
    • Cohen, J.E.1
  • 145
    • 77249131620 scopus 로고
    • United States v. Miller, 440
    • United States v. Miller, 425 U. S. 435, 440 (1976);
    • (1976) U. S. , vol.425 , pp. 435
  • 146
    • 42349114774 scopus 로고    scopus 로고
    • Government data mining and the fourth amendment
    • Christopher Slobogin, Government Data Mining and the Fourth Amendment, 75 U. CHI. L. REV. 317, 330 (2008). Fusion centers can freely mine customers' financial records, data brokers' digital dossiers, and cell phone location data.
    • (2008) U. Chi. L. Rev. , vol.75 , pp. 317
    • Slobogin, C.1
  • 147
    • 80052709262 scopus 로고    scopus 로고
    • The privacy challenges of U. S. fusion centers
    • Rebecca Andino, The Privacy Challenges of U. S. Fusion Centers, THE PRIVACY ADVISOR (Int'l Ass'n of Privacy Profls, Portsmouth, N. H.), May 2008, at 7, available at http://www.privacyassociation.org/publications/the-privacy- challenges-of-U.S.-fusion-centers/.
    • (2008) The Privacy Advisor , pp. 7
    • Andino, R.1
  • 148
    • 80052712326 scopus 로고    scopus 로고
    • 'Track' man is sacked
    • Aug. 31
    • Id. This is not a fanciful notion. In August 2007, New York City Public Schools fired an employee, because the location information produced by his employer-provided cell phone showed that he was not working when he claimed to be. David Seifman, 'Track' Man Is Sacked, N. Y. POST, Aug. 31, 2007, at 27.
    • (2007) N. Y. Post. , pp. 27
    • Seifman, D.1
  • 150
    • 53149088880 scopus 로고    scopus 로고
    • All the president's spies: Public-private intelligence partnerships in the war on terror
    • Cf. Jon D. Michaels, All the President's Spies: Public-Private Intelligence Partnerships in the War on Terror, 96 CALIF. L. REV. 901, 914-16 (2008).
    • (2008) Calif. L. Rev. , vol.96 , pp. 901
    • Michaels, J.D.1
  • 152
    • 80052743705 scopus 로고    scopus 로고
    • Maryland state police surveillance practices & policies: Hearing before the S. Judicial proceedings comm
    • Maryland State Police Surveillance Practices & Policies: Hearing Before the S. Judicial Proceedings Comm., 2008 Leg., 425th Scss. 2-3 (Md. 2008), available at http://www.aclu-md.org/Indcx%20contcnt/NoSpying/Gcrman-Tcstimony. pdf (statement of Michael German, ACLU Policy Counsel for Nat'l Sec. Issues) (citing Sachs, supra note 110).
    • (2008) Leg., 425Th Scss , pp. 2-3
  • 153
    • 80052759015 scopus 로고    scopus 로고
    • Fusion center guidelines reflected this sentiment
    • Hylton, supra note 34. Indeed, the Fusion Center Guidelines reflected this sentiment. FUSION CENTER GUIDELINES, supra note 47.
    • Fusion Center Guidelines
  • 155
    • 71949113530 scopus 로고    scopus 로고
    • The emerging politics of DHS fusion centers
    • 626
    • Torin Monahan & Neal A. Palmer, The Emerging Politics of DHS Fusion Centers, 40 SECURITY DIALOGUE 617, 626 (2009).
    • (2009) Security Dialogue , vol.40 , pp. 617
    • Monahan, T.1    Palmer, N.A.2
  • 157
    • 58149292014 scopus 로고    scopus 로고
    • The constitution in the national surveillance state
    • Jack M. Balkin, The Constitution in the National Surveillance State, 93 MINN. L. REV. i, 18 (2008).
    • (2008) Minn. L. Rev. I , vol.93 , pp. 18
    • Balkin, J.M.1
  • 158
    • 79955794229 scopus 로고    scopus 로고
    • The inverse relationship between secrecy and privacy
    • 885
    • Julie E. Cohen, The Inverse Relationship Between Secrecy and Privacy, 77 SOC. RES. 883, 885 (2010).
    • (2010) Soc. Res , vol.77 , pp. 883
    • Cohen, J.E.1
  • 159
    • 30144439568 scopus 로고    scopus 로고
    • 5 U. S. C. § 552 (2006).
    • (2006) U. S. C. , vol.5 , pp. 552
  • 160
    • 80052717606 scopus 로고    scopus 로고
    • 2008 Va. Acts ch. 792
    • 2008 Va. Acts ch. 792 (codified as amended at VA. CODE ANN. §§ 52-48, 52-49 (West 2010)).
    • (2010) Code Ann. , vol.48-52 , pp. 52-49
  • 161
    • 79955864483 scopus 로고    scopus 로고
    • Introduction: Points of control
    • 938-39
    • Trcbor Scholz, Introduction: Points of Control, 77 Soc. Res. 931, 938-39 (2010).
    • (2010) Soc. Res , vol.77 , pp. 931
    • Scholz, T.1
  • 162
    • 80052778855 scopus 로고    scopus 로고
    • Distinguished lecture: Surveillance and the constitution
    • For a discussion of the potential uses of data mining, see Christopher Slobogin, Distinguished Lecture: Surveillance and the Constitution, 55 WAYNE L. REV. 1105, 1118 (2009) ("Event-driven data mining is the most insidious form of data mining because it is conducted in the absence of a particular suspect; rather it is designed to discover the perpetrator of a past or future event using profiles or algorithms that purport to describe general characteristics of such a perpetrator.").
    • (2009) Wayne L. Rev. , vol.55 , pp. 1105
    • Slobogin, C.1
  • 163
    • 79959220655 scopus 로고    scopus 로고
    • STEWART A. BAKER, SKATING ON STILTS: WHY WE AREN'T STOPPING TOMORROW'S TERRORISM 313 (2010). ("[T]he spread of cheap information about all of us will change our relationship to the world. We will have fewer secrets. Crippling government by preventing it from using information that everyone else can get will not give us back our secrets."). Baker is a former Assistant Secretary for Policy at the Department of Homeland Security.
    • (2010) Skating on Stilts: Why We Aren'T Stopping Tomorrow'S Terrorism , pp. 313
    • Baker, S.A.1
  • 164
    • 57349110717 scopus 로고    scopus 로고
    • "I've Got Nothing to Hide" and other misunderstandings of privacy
    • For important insights on the concerns expressed in the "I've got nothing to hide" argument against privacy, see generally Daniel J. Solove, "I've Got Nothing to Hide" and Other Misunderstandings of Privacy, 44 SAN DIEGO L. REV. 745 (2007).
    • (2007) San Diego L. Rev. , vol.44 , pp. 745
    • Solove, D.J.1
  • 167
    • 80052746594 scopus 로고    scopus 로고
    • FUSION CENTER POLICY TEMPLATE, supra note 33, at 5-6, 41 (listing eight Fair Information Principles-collection limitation, data quality, purpose specification, use limitation, security safeguards, openness, individual participation, and accountability-though noting that some "may not apply in all instances of an integrated justice system").
    • Fusion Center Policy Template , pp. 5-6
  • 168
    • 80052709717 scopus 로고    scopus 로고
    • PRIVACY IMPACT ASSESSMENT, supra note 7, at 27-28 (raising concerns about military and private firm participation in fusion centers);
    • Privacy Impact Assessment , pp. 27-28
  • 171
    • 80052712325 scopus 로고    scopus 로고
    • ISE FUNCTIONAL STANDARD, supra note 58, at 2. For a prescient call for limits of this type
    • Ise Functional Standard , pp. 2
  • 173
    • 80052783070 scopus 로고    scopus 로고
    • Community engagement
    • last visited July 4
    • Community Engagement, DEPARTMENT OF HOMELAND SECURITY, http://www.dhs.gov/xabout/structure/gc-i2738730587o6.shtm7 (last visited July 4, 2011).
    • (2011) Department of Homeland Security
  • 174
    • 79952955571 scopus 로고    scopus 로고
    • The ancient roots of modern financial innovation: The early history of regulatory arbitrage
    • We borrow the term "regulatory arbitrage" from the private sector context in which it developed. See, e.g., Michael S. Knoll, The Ancient Roots of Modern Financial Innovation: The Early History of Regulatory Arbitrage, 87 OR. L. REV. 93, 94 (2008) ("The exploitation of regulatory inconsistencies is a major impetus for financial innovation. Indeed, it might be the primary impetus. There is a strong incentive to innovate around prohibited or disadvantaged transactions. These innovations are commonly referred to as regulatory arbitrage."). We discuss solutions to the regulatory arbitrage problem in Part V. B infra.
    • (2008) Or. L. Rev. , vol.87 , pp. 93
    • Knoll, M.S.1
  • 175
    • 30144439568 scopus 로고    scopus 로고
    • Because state-run fusion centers are not federal agencies, such fusion centers may share records with federal agencies, bypassing the goal of the Privacy Act. One could argue that existing federal privacy law gives fusion centers little reason to engage in such arbitrage, given its exemption of law enforcement and national security intelligence from many of its obligations. See Freedom of Information Act, 5 U. S. C. § 552a (j), (k) (2) (2006). Nonetheless, for information falling outside these exemptions, which is surely a great deal, given the collection of "all hazards" information, the Privacy Act bars federal agencies from sharing information records without the permission of individuals whose records would be transferred.
    • (2006) U. S. C. , vol.5
  • 176
    • 80052781599 scopus 로고    scopus 로고
    • Id. Information directly gathered by the DHS would implicate "fair information practices as set out in the Privacy Act of 1974." 6 U. S. C. § 142 (a) (2) (2006) (describing the duties of the agency's Privacy Officer).
    • (2006) U. S. C. , vol.6 , pp. 142
  • 177
    • 80052735905 scopus 로고    scopus 로고
    • See 2008 Va. Acts ch. 792
    • (2008) Va. Acts , pp. 792
  • 178
    • 80052766542 scopus 로고    scopus 로고
    • (codified as amended at VA. CODE ANN. §§ 52-48, 52-49 (West 2010)).
    • (2010) Va. Code Ann. , vol.48-52 , pp. 52-49
  • 179
    • 80052703030 scopus 로고    scopus 로고
    • GERMAN & STANLEY, supra note 27, at 10-11. Federal regulation 28 C. F. R. pt. 23, if applied and enforced, might assuage these concerns, if fusion centers interpret access to data as collection covered by federal regulation.
    • C. F. R. , vol.28 , pp. 23
  • 180
    • 80052692727 scopus 로고    scopus 로고
    • See 28 C. F. R. pt. 23 (2010).
    • (2010) C. F. R. , vol.28 , pp. 23
  • 181
    • 80052729580 scopus 로고    scopus 로고
    • But since FOIA does not apply to the work of state personnel, the public may have no way of knowing whether fusion centers are complying with 28 C. F. R. pt. 23. Moreover, however detailed the aspirations in documents like the ISE Functional Standard and the Privacy Impact Assessment may be, the DHS has been slow to institutionalize enforcement.
    • C. F. R. , vol.28 , pp. 23
  • 182
    • 80052719107 scopus 로고    scopus 로고
    • Open government and the net: Bringing social media into the light
    • Alan J. Bojorquez & Damien Shores, Open Government and the Net: Bringing Social Media into the Light, 11 TEX. TECH. ADMIN. L. J. 45, 50 (2009). For emails, the retention period depends on the information and content within the email.
    • (2009) Tex. Tech. Admin. L. J. , vol.11 , pp. 45
    • Bojorquez, A.J.1    Shores, D.2
  • 183
    • 80052773373 scopus 로고    scopus 로고
    • For example, even though the Indiana Intelligence Fusion Center ("IIFC") has a model privacy policy in many respects, it explicitly reserves the right to withhold the "the existence, content, and source of the information" from the requestor in many cases, which makes it difficult to populate the entire ISE with redress efforts. IND. INTELLIGENCE FUSION CTR., supra note 88, at 13. Greg Nojeim, Senior Counsel at the Center for Democracy & Technology, has affirmed our fear that this remains a widespread problem. Email from Greg Nojeim, Senior Counsel, Ctr. for Democracy & Tech., to Authors, supra note 178 ("If you go to e.g. the Texas fusion center and ask them to correct errant data in their data base about you, but their information came from the Louisiana fusion center, Texas is forbidden from telling you about the source of that information and can't correct it, and there's no process for triggering a correction by Louisiana.").
    • Ind. Intelligence Fusion Ctr. , pp. 13
  • 184
    • 80052773373 scopus 로고    scopus 로고
    • The one center with a redress mechanism is in Indiana. See IND. INTELLIGENCE FUSION CTR., supra note 88, at 13 ("Upon satisfactory verification (fingerprints, driver's license, or other specified identifying documentation) of his or her identity and subject to the conditions specified in K.i (2), below, an individual is entitled to know the existence of and to review the information about him or her that has been gathered and retained by the IIFC").
    • Ind. Intelligence Fusion Ctr. , pp. 13
  • 185
    • 0242679743 scopus 로고    scopus 로고
    • Privatization as delegation
    • Gillian E. Metzger, Privatization as Delegation, 103 COLUM. L. REV. 1367, 1378 (2003).
    • (2003) Colum. L. Rev. , vol.103 , pp. 1367
    • Metzger, G.E.1
  • 186
    • 33745804808 scopus 로고    scopus 로고
    • The invisible handshake: The reemergence of the state in the digital environment
    • 27
    • Michael D. Birnhack & Niva Elkin-Koren, The Invisible Handshake: The Reemergence of the State in the Digital Environment, 8 VA. J. L. & TECH 6, 27 (2003).
    • (2003) Va. J. L. & Tech. , vol.8 , pp. 6
    • Birnhack, M.D.1    Elkin-Koren, N.2
  • 187
    • 80052772869 scopus 로고    scopus 로고
    • Top secret America
    • For an exposé of concerns raised by our foreign and domestic intelligence apparatus, see Washington Post reporters Dana Priest and William M. Arkin's series, blog, and multimedia database on the growing U. S. intelligence community. Top Secret America, WASH. POST, http://projects.washingtonpost.com/ top-secret-america (last visited July 4, 2011).
    • Wash. Post.
    • Priest, D.1    William, M.2
  • 189
    • 84924180713 scopus 로고    scopus 로고
    • ALASDAIR ROBERTS, BLACKED OUT: GOVERNMENT SECRECY IN THE INFORMATION AGE 138 (2006). A Canadian tortured in Syria found it difficult to obtain redress based on repeated deflections of his queries by Canadian, Syrian, and U. S. intelligence and law enforcement agencies, each based on the asserted needs of the other entities for secrecy.
    • (2006) Blacked Out: Government Secrecy in the Information Age , pp. 138
    • Roberts, A.1
  • 190
    • 84876653915 scopus 로고    scopus 로고
    • Privacy and secrecy after September 11
    • Marc Rotenberg, Privacy and Secrecy after September 11, in BOMBS AND BANDWIDTH: THE EMERGING RELATIONSHIP BETWEEN INFORMATION TECHNOLOGY AND SECURITY 132, 138-39 (Robert Latham ed., 2003) (explaining that "the American tradition of seeking to protect privacy while limiting government secrecy" reflect our complementary values of privacy and openness).
    • (2003) Bombs and Bandwidth: The Emerging Relationship Between Information Technology and Security , pp. 132
    • Rotenberg, M.1
  • 191
    • 33745810301 scopus 로고
    • Olmstead v. United States, 471-85
    • See Olmstead v. United States, 277 U. S. 438, 471-85 (1928) (Brandeis, J., dissenting).
    • (1928) U. S. , vol.277 , pp. 438
  • 192
    • 77955321939 scopus 로고    scopus 로고
    • Mainstreaming privacy torts
    • See generally Danielle Keats Citron, Mainstreaming Privacy Torts, 98 CALIF. L. REV. 1805 (2010) (exploring Brandeis's conception of privacy in The Right to Privacy).
    • (2010) Calif. L. Rev. , vol.98 , pp. 1805
    • Citron, D.K.1
  • 193
    • 79952841865 scopus 로고    scopus 로고
    • The puzzle of brandeis, privacy, and speech
    • For a fascinating historical analysis of Louis Brandeis's views on privacy and transparency, see generally Neil M. Richards, The Puzzle of
    • (2010) Vand. L. Rev. , vol.63 , pp. 1295
    • Richards, N.M.1
  • 195
    • 80052735903 scopus 로고    scopus 로고
    • Criminal intelligence systems operating policies
    • 23
    • Criminal Intelligence Systems Operating Policies, 28 C. F. R. 20. 23 (2010).
    • (2010) C. F. R. , vol.28 , pp. 20
  • 197
    • 80051493909 scopus 로고    scopus 로고
    • It is interesting to note that even John Poindexter, proponent of the controversial data-mining proposal called "Total Information Awareness", embraced the use of immutable audit logs. SHANE HARRIS, THE WATCHERS 190 (2010) ("[John Poindexter] proposed an 'immutable audit trail', a master record of every analyst who had used the TIA [Total Information Awareness] system, what data they'd touched, and what they'd done with it... to spot suspicious patterns of use-Poindexter wanted to use TIA to watch the watchers.").
    • (2010) The Watchers , pp. 190
    • Harris, S.1
  • 198
    • 80052718577 scopus 로고    scopus 로고
    • MARKLE TASK FORCE, supra note 212, at 3 ("Access to the audit logs can be granted to trusted parties, such as an agency's Inspector General or the Government Accountability Office, which can assess compliance with information sharing and privacy guidelines as well as with a system's stated policies. Even for classified systems, unclassified versions of reports can be made public that describe the extent of compliance with stated policies.").
    • Markle Task Force , pp. 3
  • 201
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as contextual integrity
    • Helen Nissenbaum, Privacy as Contextual Integrity, 79 WASH. L. REV. 119, 155 (2004) ("[W]hether a particular action is determined a violation of privacy is a function of several variables, including the nature of the situation, or context; the nature of the information in relation to that context; the roles of agents receiving information; their relationships to information subjects; on what terms the information is shared by the subject; and the terras of further dissemination. ").
    • (2004) Wash. L. Rev. , vol.79 , pp. 119
    • Nissenbaum, H.1
  • 205
    • 42949151398 scopus 로고    scopus 로고
    • Washington's $8 billion shadow
    • Donald L. Barlett & James B. Steele, Washington's $8 Billion Shadow, VANITY FAIR, Mar. 2007, at 342.
    • (2007) Vanity Fair , pp. 342
    • Barlett, D.L.1    Steele, J.B.2
  • 206
    • 80052757057 scopus 로고    scopus 로고
    • Crisis sharpens scrutiny of security spending
    • William Maclean, Crisis Sharpens Scrutiny of Security Spending, REUTERS, Feb. 25, 2009, available at http://www.reuters.com/article/idUSTRE5iO2SM20090225 ("[B]udget pressures will force policymakers increasingly to identify waste and question big-ticket purchases of technology, a trend underpinned by worries in the West that intrusive monitoring poses a risk to civil liberties, analysts say.").
    • (2009) Reuters
    • Maclean, W.1
  • 207
    • 79957540114 scopus 로고    scopus 로고
    • MATTHEW AID, THE SECRET SENTRY: THE UNTOLD HISTORY OF THE NATIONAL SECURITY AGENCY 304-05 (2009) (sharing that former senior State Department official Herbert Levin noted that while NSA can point to instances where it has been helpful, "whether they're worth the billions that are spent, is a genuine question in my mind").
    • (2009) The Secret Sentry: The Untold History of the National Security Agency , pp. 304-305
    • Aid, M.1
  • 210
    • 80052760955 scopus 로고    scopus 로고
    • Op-ed, the great consolidation
    • May 17
    • Ross Douthat, Op-Ed, The Great Consolidation, N. Y. TIMES, May 17, 2010, at A23;
    • (2010) N. Y. Times
    • Douthat, R.1
  • 211
    • 33748587957 scopus 로고    scopus 로고
    • What does homeland security spending buy?
    • see also generally Veronique de Rugy, What Does Homeland Security Spending Buy? (Am. Enter. Inst., Working Paper No. 107, 2004), available at http://www.aei.org/paper/21483 (questioning the effectiveness of DHS spending and concluding that a large portion of homeland security-spending decisions are "made on a political basis rather than on a sound cost benefit analysis", leading to the traditional public choice failures that plague government spending).
    • (2004) Am. Enter. Inst., Working Paper No. 107
    • De Rugy, V.1
  • 212
    • 33846176561 scopus 로고    scopus 로고
    • Terrorism and the constitutional order, keynote address at the fordham law review symposium: A new constitutional order?
    • Bruce Ackerman, Terrorism and the Constitutional Order, Keynote Address at the Fordham Law Review Symposium: A New Constitutional Order? (Mar. 24, 2006), in 75 FORDHAM L. REV. 475, 475 (2006) ("A downward cycle threatens: After each successful attack, politicians will come up with a new raft of repressive laws that ease our anxiety by promising greater security-only to find that a different terrorist band manages to strike a few years later.... Even if the next half-century sees only three or four attacks on a scale that dwarfs September 11, the pathological political cycle will prove devastating to civil liberties by 2050.").
    • (2006) Fordham L. Rev. , vol.75 , pp. 475
    • Ackerman, B.1
  • 214
    • 45949098739 scopus 로고    scopus 로고
    • See generally DAN ARIELY, PREDICTABLY IRRATIONAL: THE HIDDEN FORCES THAT SHAPE OUR DECISIONS (2008) (describing behavioral economics research on skewed threat assessments). As a recent profile of Cass Sunstein mentioned, there is great "difficulty in estimating the possibility of catastrophe-studies of insurance markets have found that we tend to ignore small risks until their probability passes a certain threshold, at which point we overspend wildly to prevent them."
    • (2008) Predictably Irrational: The Hidden Forces that Shape Our Decisions
    • Ariely, D.1
  • 215
    • 84863900492 scopus 로고    scopus 로고
    • Cass sunstein wants to nudge us
    • May 16, Magazine
    • Benjamin Wallace-Wells, Cass Sunstein Wants to Nudge Us, N. Y. TIMES, May 16, 2010, (Magazine), at 42.
    • (2010) N. Y. Times , pp. 42
    • Wallace-Wells, B.1
  • 217
    • 46349083095 scopus 로고    scopus 로고
    • Come one, come all, join the terror target list
    • July 12
    • Eric Lipton, Come One, Come All, Join the Terror Target List, N. Y. TIMES, July 12, 2006, at Al.
    • (2006) N. Y. Times
    • Lipton, E.1
  • 219
    • 77955369927 scopus 로고    scopus 로고
    • Domesticating intelligence
    • see also Samuel J. Rascoff, Domesticating Intelligence, 83 S. CAL. L. REV. 575, 619 (2010) ("[I]ntelligence has thus far remained impervious to rationality review, including in the narrow sense of comparing monetized costs and benefits.... Employing rationality review as a standard tool for proposed intelligence programs would represent an important development in the governance of intelligence in a number of respects.").
    • (2010) S. Cal. L. Rev. , vol.83 , pp. 575
    • Rascoff, S.J.1
  • 220
    • 77950667031 scopus 로고    scopus 로고
    • Just how much does that cost, anyway? An analysis of the financial costs and benefits of the "no-fly" list
    • POSNER, supra note 243, at 2; see also Marcus Holmes, Just How Much Does That Cost, Anyway? An Analysis of the Financial Costs and Benefits of the "No-Fly" List, HOMELAND SECURITY AFF. (Jan. 2009), http://www.hsaj.org/?article=5.i.6.
    • (2009) Homeland Security Aff.
    • Holmes, M.1
  • 222
    • 33748325241 scopus 로고    scopus 로고
    • Very bad news
    • Mar. 24
    • Clifford Geertz, Very Bad News, N. Y. REV. BOOKS, Mar. 24, 2005, at 4
    • (2005) N. Y. Rev. Books , pp. 4
    • Geertz, C.1
  • 223
    • 27944458260 scopus 로고    scopus 로고
    • (reviewing RICHARD A. POSNER, CATASTROPHE: RISK AND RESPONSE (2004) and concluding that Posner's method is too susceptible to manipulation to be reliable).
    • (2004) Catastrophe: Risk and Response
    • Posner, R.A.1
  • 226
    • 80052716643 scopus 로고    scopus 로고
    • Balkin, supra note 156, at 15 (describing the emergence of a "National Surveillance State", which could easily lead government to "create a parallel track of preventative law enforcement" that avoids the "traditional guarantees of the Bill of Rights"). For an especially insightful analysis of the rule of law problems raised by the transparency of personal information posted online, see Joel R. Reidenberg, Transparent Citizens and the Rule of Law (Feb. I, 2010), http://cyber.law.harvard.edu/events/2010/ 02/reidenberg.
    • (2010) Transparent Citizens and the Rule of Law
    • Reidenberg, J.R.1
  • 228
    • 80052708313 scopus 로고    scopus 로고
    • Wartime executive power and the national security agency's surveillance authority: Hearing before the S. Comm. on the judiciary
    • Wartime Executive Power and the National Security Agency's Surveillance Authority: Hearing Before the S. Comm. on the Judiciary, 109th Cong. 11 (2006) (statement of Alberto R. Gonzales, U. S. Att'y Gen.) ("[S]peed, agility and secrecy are essential to... [the terrorist surveillance program's] success.").
    • (2006) 109Th Cong , pp. 11
  • 229
    • 0242671795 scopus 로고    scopus 로고
    • Chaos and rules: Should responses to violent crises always be constitutional?
    • Until 9/11, the concept of "emergency" or "exception" had been a neglected topic in American constitutional law. Oren Gross, Chaos and Rules: Should Responses to Violent Crises Always Be Constitutional?, 112 YALE L. J. ZOII, 1015 n. 8 (2003);
    • (2003) Yale L. J. Zoii , vol.112 , Issue.8 , pp. 1015
    • Gross, O.1
  • 231
    • 61849136231 scopus 로고    scopus 로고
    • Our schmittian administrative law
    • 1101
    • Adrian Vermeule, Our Schmittian Administrative Law, 122 HARV. L. REV. 1095, 1101 (2009).
    • (2009) Harv. L. Rev. , vol.122 , pp. 1095
    • Vermeule, A.1
  • 232
    • 20644460331 scopus 로고
    • Korematsu v. United States, 221
    • Korematsu v. United States, 323 U. S. 214, 221 (1944);
    • (1944) U. S. , vol.323 , pp. 214
  • 233
    • 33746039740 scopus 로고
    • 4 Wall., 4
    • Ex parte Milligan, 71 U. S. (4 Wall.) 2, 4 (1866).
    • (1866) U. S. , vol.71 , pp. 2
    • Milligan1
  • 234
    • 33645136625 scopus 로고    scopus 로고
    • Law in a time of emergency: States of exception and the temptations of 9/11
    • Kim Lane Scheppele, Law in a Time of Emergency: States of Exception and the Temptations of 9/11, 6 U. PA. J. CONST. L. 1001 (2004).
    • (2004) U. Pa. J. Const. L , vol.6 , pp. 1001
    • Scheppele, K.L.1
  • 237
    • 84870614722 scopus 로고    scopus 로고
    • In re City of N. Y., 607 F.3d 923, 928 (2d Cir. 2010). The federal Freedom of Information Act, or FOIA, exempts "records or information compiled for law enforcement purposes" if disclosure may harm law enforcement activities or the public interest generally.
    • (2010) F.3d , vol.607 , pp. 923
  • 238
    • 30144439568 scopus 로고    scopus 로고
    • See 5 U. S. C. § 552 (b) (7) (2006).
    • (2006) U. S. C. , vol.5 , pp. 552
  • 239
    • 80052778854 scopus 로고    scopus 로고
    • City of NY
    • In re City of N. Y., 607 F.3d at 944. 273.
    • F.3d , vol.607 , pp. 944
  • 240
    • 29044437483 scopus 로고    scopus 로고
    • The mosaic theory, national security, and the freedom of information act
    • 631
    • David E. Pozen, The Mosaic Theory, National Security, and the Freedom of Information Act, 115 YALE LJ. 628, 631 (2005).
    • (2005) Yale Lj , vol.115 , pp. 628
    • Pozen, D.E.1
  • 241
    • 80052703508 scopus 로고    scopus 로고
    • 32 C. F. R. § 701. 31 (2010). Pozen has argued that [w]hen courts permit the government to withhold even the most innocuous-seeming (and politically controversial) items of information without specifying how each item might contribute to a dangerous mosaic, they enable spurious claims and disable counterargument. Understanding this, agencies gravitate to the mosaic theory when they know their case for secrecy is weak.
    • (2010) C. F. R. , vol.32 , pp. 701
  • 242
    • 80052699881 scopus 로고    scopus 로고
    • The mosaic theory
    • Feb. 28
    • David Pozen, The Mosaic Theory, HARTFORD COURANT (Feb. 28, 2006), http://articles.courant.com/20o6-02-28/news/o6o228oi43-i-patriot-act-national- security-agency-information-security-oversightoffice.
    • (2006) Hartford Courant
    • Pozen, D.1
  • 243
    • 84896173227 scopus 로고    scopus 로고
    • N. J. Media Grp., Inc. v. Ashcroft, 219 3d Cir
    • N. J. Media Grp., Inc. v. Ashcroft, 308 F.3d 198, 219 (3d Cir. 2002).
    • (2002) F.3d , vol.308 , pp. 198
  • 244
    • 84909395949 scopus 로고    scopus 로고
    • See HANNA FENICHEL PITKIN, THE ATTACK OF THE BLOB: HANNAH ARENDT AND THE CONCEPT OF THE SOCIAL 6-7 (1998) ("The real-world problem that Arendt intended her concept of the social to address... concerns the gap between our enormous, still-increasing powers and our apparent helplessness to avert the various disasters-national, regional, and global-looming on our horizon. ").
    • (1998) The Attack of the Blob: Hannah Arendt and the Concept of the Social , pp. 6-7
    • Pitkin, H.F.1
  • 245
    • 80052778854 scopus 로고    scopus 로고
    • In re City of N. Y., 607 F.3d at 944.
    • F.3d , vol.607 , pp. 944
  • 246
    • 33645110017 scopus 로고
    • See, e.g., N. Y. Times Co. v. United States, 403 U. S. 713, 714 (1971) (permitting newspapers to publish then-classified material, popularly known as the "Pentagon Papers.").
    • (1971) U. S. , vol.403 , pp. 713
  • 247
    • 75649124508 scopus 로고    scopus 로고
    • Deep secrecy
    • Courts are particularly cautious about unearthing the "deep secrets" that may be at the core of a nation's national security strategy. See, e.g., David E. Pozen, Deep Secrecy, 62 STAN. L. REV. 257, 260 (2010) ("Sometimes, outside parties are aware that a secret exists even though they are ignorant of its content-[This is] a shallow secret. Other times, outside parties are unaware of a secret's existence; they are in the dark about the fact that they are being kept in the dark-[This is] a deep secret.").
    • (2010) Stan. L. Rev. , vol.62 , pp. 257
    • Pozen, D.E.1
  • 248
    • 80052765536 scopus 로고    scopus 로고
    • Courts, congress shun addressing legality of warrantless eavesdropping
    • See, e.g., David Kravets, Courts, Congress Shun Addressing Legality of Warrantless Eavesdropping, WIRED (Jan. 29, 2010), http://vvww.wired.com/ threatlevel/2010/01/legality-of-warrantlesseavesdropping/.
    • (2010) Wired
    • Kravets, D.1
  • 249
    • 80052731867 scopus 로고    scopus 로고
    • The existing Civil Liberties Assessment for the State, Local, and Regional Fusion Center Initiative performed by the DHS offers vague promises of compliance with little detail about execution. See CIVIL LIBERTIES IMPACT ASSESSMENT, supra note 35.
    • Civil Liberties Impact Assessment
  • 250
    • 0347735633 scopus 로고    scopus 로고
    • Financial derivatives and the costs of regulatory arbitrage
    • Frank Partnoy, Financial Derivatives and the Costs of Regulatory Arbitrage, 22 J. CORP. L. 211, 227 (1997) (defining regulatory arbitrage in the financial sector as "transactions designed specifically to reduce costs or capture profit opportunities created by differential regulations or laws").
    • (1997) J. Corp. L , vol.22 , pp. 211
    • Partnoy, F.1
  • 251
    • 72649089002 scopus 로고    scopus 로고
    • The AIG bailout
    • William K. Sjostrom, Jr., The AIG Bailout, 66 WASH. & LEE L. REV. 943, 987-88 (2009) ("The basic definition of insurance is '[a] contract by which one party (the insurer) undertakes to indemnify another party (the insured) against risk of loss, damage, or liability arising from the occurrence of some specified contingency.' A CDS [credit default swap] certainly appears to fall within this definition given that the protection seller contractually agrees to compensate the protection buyer following the occurrence of a credit event. Notwithstanding their insurance-like characteristics, CDSs generally have not been considered insurance for purposes of state insurance regulations and, therefore, have not been subject to these regulations." (first alteration in original) (footnotes omitted)
    • (2009) Wash. & Lee L. Rev. , vol.66 , pp. 943
    • Sjostrom Jr., W.K.1
  • 253
    • 77952282132 scopus 로고    scopus 로고
    • The future of the securities and exchange commission as a market regulator
    • Roberta S. Karmel, The Future of the Securities and Exchange Commission as a Market Regulator, 78 U. CIN. L. REV. 501, 524 (2010) ("Credit derivatives operate functionally as short sales of bonds with virtually unlimited risks. This is because the buyer of a credit default swap does not have to own the bond or any other debt instrument upon which such a contract is based. So buyers can purchase a 'naked short' on the debt of companies without any restrictions.... The head of the New York State Insurance Department called credit derivatives 'legalized gambling.'"
    • (2010) U. Cin. L. Rev. , vol.78 , pp. 501
    • Karmel, R.S.1
  • 254
    • 80052759483 scopus 로고    scopus 로고
    • DTCC may raise credit-default swap disclosure amid criticism
    • (footnotes omitted) (quoting Shannon D. Harrington, DTCC May Raise Credit-Default Swap Disclosure Amid Criticism, BLOOMBERG (Oct. 31, 2008), http://www.bloomberg.com/apps/news?pid=newsarchive&sid=ailF5ibQBk9w& refer=home)).
    • (2008) Bloomberg
    • Harrington, S.D.1
  • 255
    • 80052776234 scopus 로고    scopus 로고
    • see also Frank Pasquale, Deregulatory Fundamentalism at OCC, OTS, AND SCOTUS, CONCURRING OPINIONS (Oct. 15, 2008, 9:13 PM), http://www. concurrtagopiriions.com/archives/20o8/io/deregulatory-fu.html (describing the financial institutions' ability to choose the least restrictive regulator of risky activities).
    • (2008) Occ, Ots, and Scotus, Concurring Opinions
    • Pasquale, F.1
  • 256
    • 80052733325 scopus 로고    scopus 로고
    • The gentle art of corporate seduction: Tax incentives in the united states and the European Union
    • See, e.g., Tracy A. Kaye, The Gentle Art of Corporate Seduction: Tax Incentives in the United States and the European Union, 57 U. KAN. L. REV. 93, 117 (2008) ("By fostering a 'race to the bottom' in which states must continually increase tax incentives in order to lure businesses, tax competition undermines the ability of state and local government to finance the investments in public education and infrastructure that provide the foundation for future economic growth.").
    • (2008) U. Kan. L. Rev. , vol.57 , pp. 93
    • Kaye, T.A.1
  • 257
    • 80052778123 scopus 로고
    • Installation of Slot Mach. on U. S. Naval Base Guantanamo Bay, 6 OP. O. L. C. 236, 238 (1982) (finding that the station at Guantanamo is not a "possession" of the United States);
    • (1982) Op. O. L. C. , vol.6 , pp. 236
  • 258
    • 80052779812 scopus 로고
    • Customs Duties-Goods Brought into U. S. Naval Station at Guantanamo Bay, Cuba, 35 Op. Att'y Gen. 536, 537 (1929) (analyzing Guantanamo's status in the context of a review of other military bases);
    • (1929) Op. Att'Y Gen. , vol.35 , pp. 536
  • 260
    • 0346308435 scopus 로고    scopus 로고
    • Anomalous zones
    • Gerald L. Neuman, Anomalous Zones, 48 STAN. L. REV. 1197, 1197 (1996); (Pubitemid 126406376)
    • (1996) Stanford Law Review , vol.48 , Issue.5 , pp. 1197
    • Neuman, G.L.1
  • 261
    • 27744555602 scopus 로고    scopus 로고
    • Guantanamo bay: The legal black hole
    • 1
    • Johan Steyn, Guantanamo Bay: The Legal Black Hole, 53 INT'L & COMP. L. Q. 1, 1 (2004).
    • (2004) Int'L & Comp. L. Q. , vol.53 , pp. 1
    • Steyn, J.1
  • 262
    • 80052709717 scopus 로고    scopus 로고
    • The DHS has dismissed concerns about regulatory arbitrage, noting that fusion centers would adopt written privacy policies that "should be consistent with the guidance issued by the PM-ISE, and to the extent possible clearly delineate authorities for each fusion center participant to eliminate the potential for 'policy shopping' raised by one critic." PRIVACY IMPACT ASSESSMENT, supra note 7, at 27.
    • Privacy Impact Assessment , pp. 27
  • 263
    • 53849103055 scopus 로고    scopus 로고
    • PAUL R. VERKUIL, OUTSOURCING SOVEREIGNTY 5 (2007) ("Political officials, who are appointed for short periods and enter service through the famous revolving door, sometimes utilize outsourcing both as a means of getting results and as a way of preserving later career opportunities. Homeland Security seems to be the paradigm case.... More than two-thirds of the Department's most senior executives... have moved to private positions, some with companies who receive lucrative contracts from the agency.").
    • (2007) Outsourcing Sovereignty , pp. 5
    • Verkuil, P.R.1
  • 265
    • 80052716158 scopus 로고    scopus 로고
    • Id. ("[PIAB] is an entity that exists in order to provide the president with essential information regarding intelligence and national security matters."). The board was known as the President's Foreign Intelligence Advisory Board (PFIAB) from May 4, 1961 to February 29, 2008, when President George W. Bush renamed it the President's Intelligence Advisory Board. Exec. Order No. 13462, 73 Fed. Reg. 11, 805 (Mar. 4, 2008) ("References in Executive Orders other than this order, or in any other presidential guidance, to the 'President's Foreign Intelligence Advisory Board' shall be deemed to be references to the President's Intelligence Advisory Board established by this order."). The name change reflects the expanding focus of intelligence agencies to gather not only foreign, but also domestic intelligence.
    • (2008) Fed. Reg. , vol.73 , pp. 11
  • 266
    • 80052736853 scopus 로고
    • Exec. Order No. 12, 863
    • Exec. Order No. 12, 863, 3 C. F. R. 632 (1993);
    • (1993) C. F. R. , vol.3 , pp. 632
  • 267
    • 77955377112 scopus 로고
    • Exec. Order No. 12, 334, 955
    • Exec. Order No. 12, 334, 46 Fed. Reg. 59, 955 (1981);
    • (1981) Fed. Reg. , vol.46 , pp. 59
  • 268
    • 84928839045 scopus 로고    scopus 로고
    • Comment, speaking truth to power: Intelligence oversight in an imperfect world
    • David Everett Colton, Comment, Speaking Truth to Power: Intelligence Oversight in an Imperfect World, 137 U. PA. L. REV. 571, 611, n. 177. ("The PFIAB is composed of prominent citizens who serve at the pleasure of the President. The PFIAB is charged with monitoring the performance, organizations, personnel, collection, or evaluation of intelligence within the intelligence community."). Colton complained that, during the 1980s, "The PFIAB is sadly lacking in power and prestige."
    • U. Pa. L. Rev. , vol.137 , Issue.177 , pp. 571
    • Colton, D.E.1
  • 269
    • 80052770948 scopus 로고    scopus 로고
    • Getting on board: How an obscure panel could fix the U. S. intelligence community
    • Id. However, a more recent assessment has been more positive. Kenneth Michael Absher et al., Getting on Board: How an Obscure Panel Could Fix the U. S. Intelligence Community, FOREIGN AFF. (Sept. 17, 2009), http://www. foreignaffairs.com/print/65415 ("The PIAB is a unique presidential asset that, if properly employed, could help identify and meet the intelligence challenges that future presidents will face.").
    • (2009) Foreign Aff.
    • Absher, K.M.1
  • 270
    • 77954361490 scopus 로고    scopus 로고
    • European versus American liberty: A comparative privacy analysis of antiterrorism data mining
    • HEYMANN & KAYYEM, supra note 296, at 113. Some commentators go further, arguing that the data mining issue demands an "independent privacy agency." Francesca Bignami, European Versus American Liberty: A Comparative Privacy Analysis of Antiterrorism Data Mining, 48 B. C. L. REV. 609, 696-97 (2007).
    • (2007) B. C. L. Rev. , vol.48 , pp. 609
    • Bignami, F.1
  • 271
    • 80052709716 scopus 로고    scopus 로고
    • The Foreign Intelligence Surveillance Court is a secret court that consists of eleven district court judges, at least three of whom must live within twenty miles of the District of Columbia. See 50 U. S. C. § 1803 (a) (Supp. 111 2009).
    • (2009) U. S. C. , vol.50 , Issue.111 SUPPL.
  • 272
    • 84876247494 scopus 로고    scopus 로고
    • Pub L. No. 95-511, 92 Stat 1783
    • Stat , vol.92 , pp. 1783
  • 273
    • 80052710858 scopus 로고    scopus 로고
    • (codified in scattered sections of 50 U. S. C. (2006)).
    • (2006) U. S. C. , vol.50
  • 274
    • 0346308014 scopus 로고    scopus 로고
    • Physical searches under fisa: A constitutional analysis
    • Daniel J. Malooly, Physical Searches Under FISA: A Constitutional Analysis, 35 AM. CRIM. L. REV. 411, 413-14 (1998). (Pubitemid 128421762)
    • (1998) American Criminal Law Review , vol.35 , Issue.2 , pp. 411
    • Malooly, D.J.1
  • 275
    • 79251610223 scopus 로고    scopus 로고
    • A hidden world, growing beyond control
    • This would not be an insurmountable barrier to participation since an "estimated 854, 000 people... hold top-secret security clearances." Dana Priest & William M. Arkin, A Hidden World, Growing Beyond Control, WASH. POST, July 19, 2010, at A1.
    • (2010) Wash. Post.
    • Priest, D.1    Arkin, W.M.2
  • 276
    • 80052707310 scopus 로고    scopus 로고
    • The overgrowth of intelligence programs since Sept. II
    • Editorial, The Overgrowth of Intelligence Programs Since Sept. II, WASH. POST, July 22, 2010, at A18 (reporting Clapper's response to questions at his Senate confirmation hearing).
    • (2010) Wash. Post.
  • 277
    • 79952475486 scopus 로고    scopus 로고
    • Domestic federal interagency planning: Meeting a homeland security need
    • Homeland security managers have recognized the importance of improving interagency relationships. See, e.g., Kenneth E. Christopher et al., Domestic Federal Interagency Planning: Meeting a Homeland Security Need, 7 (1) J. HOMELAND SECURITY & EMERGENCY MGMT. 20 (Apr. 2010) at 11 (recommending "enhanced interagency planning capability").
    • (2010) J. Homeland Security & Emergency Mgmt , vol.7 , Issue.1 , pp. 20
    • Christopher, K.E.1
  • 278
    • 33749182513 scopus 로고    scopus 로고
    • Internal separation of powers: Checking today's most dangerous branch from within
    • The Administrative Procedure Act does not attempt to formalize interagency cooperation, which is mainly accomplished via ad hoc Memoranda of Understanding and other informal modes of cooperation. Neal Kumar Katyal, Internal Separation of Powers: Checking Today's Most Dangerous Branch from Within, 115 YALE L. J. 2314, 2327 (2006) (discussing overlapping agency authority).
    • (2006) Yale L. J. , vol.115 , pp. 2314
    • Katyal, N.K.1
  • 279
    • 70349244268 scopus 로고    scopus 로고
    • Can interagency dialogue serve as the new separation of powers?
    • See, e.g., Christopher S. Yoo, Can Interagency Dialogue Serve as the New Separation of Powers?, 116 YALE L. J. POCKET PART 131, 132 (2006) (discussing extant "multi-agency consultations").
    • (2006) Yale L. J. Pocket Part , vol.116 , pp. 131
    • Yoo, C.S.1
  • 280
    • 80052698487 scopus 로고    scopus 로고
    • 12 C. F. R. pt. 34, app. A to subpt. D (2010);
    • (2010) C. F. R. , vol.12 , pp. 34
  • 281
    • 80052698001 scopus 로고    scopus 로고
    • C. F. R. pt. 208, app. C (2010);
    • (2010) C. F. R. , vol.12 , pp. 208
  • 282
    • 80052760460 scopus 로고    scopus 로고
    • C. F. R. pt. 365 (2010).
    • (2010) C. F. R. , vol.12 , pp. 365
  • 283
    • 80052712324 scopus 로고
    • Real estate lending standards
    • Real Estate Lending Standards, 57 Fed. Reg. 62, 890, 62, 890 (Dec. 31, 1992).
    • (1992) Fed. Reg. , vol.57 , pp. 62
  • 284
    • 79959235553 scopus 로고    scopus 로고
    • BETHANY MCLEAN & JOE NOCERA, ALL THE DEVILS ARE HERE: THE HIDDEN HISTORY OF THE FINANCIAL CRISIS 94 (2010) ("'[G]uidance' was only guidance, which lenders could adopt or ignore as they saw fit, depending on how zealously the regulators enforced it. No antipredatory lending bill was ever passed; no strictures against most of the practices were ever enforced; no serious effort was ever made to make financial institutions pay more attention to the loans they were buying and securitizing.").
    • (2010) All the Devils are Here: The Hidden History of the Financial Crisis , pp. 94
    • Mclean, B.1    Nocera, J.2
  • 285
    • 79551571924 scopus 로고    scopus 로고
    • The OCC's preemption rules exceed the agency's authority and present a serious threat to the dual banking system and consumer protection
    • 226
    • Arthur E. Wilmarth, Jr., The OCC's Preemption Rules Exceed the Agency's Authority and Present a Serious Threat to the Dual Banking System and Consumer Protection, 23 ANN. REV. BANKING & FIN. L. 225, 226 (2004).
    • (2004) Ann. Rev. Banking & Fin. L , vol.23 , pp. 225
    • Wilmarth Jr., A.E.1
  • 286
    • 42149179461 scopus 로고    scopus 로고
    • The growing threat to middle class families
    • Elizabeth Warren, The Growing Threat to Middle Class Families, 69 BROOK. L. REV.; 401, 402 (2004) [hereinafter Warren, Growing Threat];
    • (2004) Brook. L. Rev. , vol.69 , pp. 401
    • Warren, E.1
  • 287
    • 83655208710 scopus 로고    scopus 로고
    • Unsafe at any rate
    • Elizabeth Warren, Unsafe at Any Rate, 5 DEMOCRACY: J. IDEAS 8, 8-9 (2007) [hereinafter Warren, Unsafe].
    • (2007) Democracy: J. Ideas , vol.5 , pp. 8
    • Warren, E.1
  • 290
    • 80052726669 scopus 로고    scopus 로고
    • Robert gnaizda: My crime was not curbing the guilty
    • see also Robert Gnaizda, Robert Gnaizda: My Crime Was Not Curbing the Guilty, OPPOSING VIEWPOINTS (Jan. 6, 2011), http://www.opposingviews.com/i/ robert-gnaizda-my-crime-was-not-curbing-the-guilty ("In 1999 and in 2000, we met with Fed Chairman Alan Greenspan to criticize the Federal Reserve's laissez-faire attitude toward the major subprime lenders, such as Ameriquest. We asked that Greenspan urge all major financial institutions to set a fiduciary 'gold standard' that could effectively compete with and possibly eliminate the unregulated subprime industry. The chairman refused. Stymied by both the Clinton and Bush administrations' refusal to act, we failed to continue to protest publicly. A big mistake. In 2004, we convened a meeting with the 15 largest financial institutions engaged in adjustable-rate mortgages, including Countrywide, to urge that they substantially revise and raise their standards due to the dangers of adjustable-rate mortgages, including option ARMs. Getting no support, we met with Greenspan in July 2004 to specifically complain about these practices and used Countrywide as a prime example. Greenspan stated that he had reviewed our documents and that, even with a doctorate in math, you could not understand these mortgages. But he refused to do anything.").
    • (2011) Opposing Viewpoints
    • Gnaizda, R.1
  • 292
    • 80052709715 scopus 로고    scopus 로고
    • see also NICOLE GEUNAS, AFTER THE FALL: SAVING CAPITALISM FROM WALL STREET-AND WASHINGTON 150 (2009) (reporting that Federal Reserve chairman Ben Bernanke warned during the third week of September 2008 that "there will be no economy on Monday" if bailouts of key institutions were not arranged).
    • (2009) After the Fall: Saving Capitalism from Wall Street-and Washington , pp. 150
    • Geunas, N.1
  • 293
    • 79955560629 scopus 로고    scopus 로고
    • Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010, Pub. L. No. 111-203, 124 Stat. 1376 (2010).
    • (2010) Stat , vol.124 , pp. 1376
  • 294
    • 79958170315 scopus 로고    scopus 로고
    • 12 U. S. C. § 5481.
    • U. S. C. , vol.12 , pp. 5481
  • 296
    • 84883099020 scopus 로고    scopus 로고
    • Dodd-Frank Act, § 112, 124 Stat, at 1398-98.
    • Stat , vol.124 , pp. 1398-1398
  • 298
    • 80052696297 scopus 로고    scopus 로고
    • Interagency statement on subprime mortgage lending
    • F. J. Ornstein et al., Interagency Statement on Subprime Mortgage Lending, 61 CONSUMER FIN. L. Q. REP. 176, 178 (2007) (discussing state of the law prior to enactment of the Dodd-Frank Act).
    • (2007) Consumer Fin. L. Q. Rep. , vol.61 , pp. 176
    • Ornstein, F.J.1
  • 299
    • 80052694846 scopus 로고    scopus 로고
    • SKADDEN LLP, supra note 326, at 4.
    • Skadden Llp , pp. 4
  • 300
    • 80052759014 scopus 로고    scopus 로고
    • 12 U. S. C § 5311 (2010) (describing the FSOC, also frequently referred to as the "Systemic Risk Council").
    • (2010) U. S. C. , vol.12 , pp. 5311
  • 301
    • 80052772868 scopus 로고    scopus 로고
    • Police and national security: American local law enforcement and counterterrorism after 9/11
    • 396
    • Matthew C. Waxman, Police and National Security: American Local Law Enforcement and Counterterrorism After 9/11, 3 J. NAT'L SECURITY L. & POL'Y 377, 396 (2009).
    • (2009) J. Nat'L Security L. & Pol'Y , vol.3 , pp. 377
    • Waxman, M.C.1
  • 302
    • 80052760954 scopus 로고    scopus 로고
    • George W. Bush, President of the U. S., Remarks at the National Day of Prayer and Remembrance at Episcopal National Cathedral (Sept. 14, 2001), transcript available at http://georgewbush-whitehouse.archives.gov/news/ releases/2001/09/200xo914-2.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.