-
1
-
-
84873645221
-
-
Homeland Security Act of 2002, Pub L. No. 107-296, §§ 111-113, 2142-45
-
Homeland Security Act of 2002, Pub L. No. 107-296, §§ 111-113, 116 Stat. 2135, 2142-45
-
Stat
, vol.116
, pp. 2135
-
-
-
2
-
-
80052771406
-
-
(codified at 6 U. S. C. §§ 111-113 (2006)) (establishing the DHS);
-
(2006)
U. S. C.
, vol.6
, pp. 111-113
-
-
-
3
-
-
77950669443
-
Share and share alike: Intelligence agencies and information sharing
-
Nathan Sales, Share and Share Alike: Intelligence Agencies and Information Sharing, 78 GEO. WASH. L. REV. 279, 280 (2009) ("[T]he consensus in favor of more information sharing has proven surprisingly broad and durable."). Although hard to say at the time of printing, the Wikileaks scandal that broke in late 2010 could have had an impact on the information-sharing imperative.
-
(2009)
Geo. Wash. L. Rev.
, vol.78
, pp. 279
-
-
Sales, N.1
-
4
-
-
80052772868
-
Police and national security: American local law enforcement and counterterrorism after 9/11
-
Matthew C. Waxman, Police and National Security: American Local Law Enforcement and Counterterrorism After 9/11, 3 J. NAT'L SECURITY L. & POL'Y 377, 405-07 (2009) (describing the lack of a "dedicated domestic intelligence service" in the U. S.).
-
(2009)
J. Nat'L Security L. & Pol'Y
, vol.3
, pp. 377
-
-
Waxman, M.C.1
-
5
-
-
33645810310
-
-
Many nations have domestic intelligence agencies, including France, Israel, Germany, Japan, Australia, New Zealand, India, South Africa, and Canada. RICHARD A. POSNER, REMAKING DOMESTIC INTELLIGENCE 3 (2005) (noting that "the weakest link in the U. S. intelligence system" is domestic intelligence, as compared to countries outside the U. S. that have such agencies).
-
(2005)
Remaking Domestic Intelligence
, pp. 3
-
-
Posner, R.A.1
-
6
-
-
80052766545
-
Intelligence fusion centers: A de-centralized national intelligence agency
-
Thomas Cincotta, Intelligence Fusion Centers: A De-Centralized National Intelligence Agency, PUBLIC EYE (Winter 2009/Spring 2010), http://www.publiceye. org/magazine/v24n4/intelligence-fusioncenters.html ("This network constitutes a nascent de facto national intelligence agency, whose decentralized structure diminishes transparency and accountability. Without effective oversight, a narrowly defined mission, and new legal structures, the capacity of fusion centers to undermine fundamental freedoms could grow unchecked.").
-
(2009)
Public Eye
-
-
Cincotta, T.1
-
7
-
-
84942800122
-
-
Implementing Recommendations of the 9/11 Commission Act of 2007, Pub. L. No. 110-53, § 511, 322
-
Implementing Recommendations of the 9/11 Commission Act of 2007, Pub. L. No. 110-53, § 511, 121 Stat. 266, 322 (2007);
-
(2007)
Stat
, vol.121
, pp. 266
-
-
-
8
-
-
84855321578
-
-
Intelligence Reform & Terrorism Prevention Act of 2004, Pub. L. No. 108-458, § 1016, 3665
-
Intelligence Reform & Terrorism Prevention Act of 2004, Pub. L. No. 108-458, § 1016, 118 Stat. 3638, 3665 (2004).
-
(2004)
Stat
, vol.118
, pp. 3638
-
-
-
10
-
-
80052705961
-
Assessing RNC police tactics: Missteps, poor judgments, and inappropriate detentions
-
G. W. Schulz, Assessing RNC Police Tactics: Missteps, Poor Judgments, and Inappropriate Detentions, MINNPOST. COM (Sept. 1, 2009), http://www.minnpost. com/stories/2009/09/01/11198/assessing-rnc-police-tactics-missteps- poorjudgments-and-inappropriate-detentions.
-
(2009)
Minnpost. Com.
-
-
Schulz, G.W.1
-
11
-
-
80052752171
-
Looking back at GOP convention: Police kicked into 'Disruption Mode'
-
Sept. 2
-
G. W. Schulz, Looking Back at GOP Convention: Police Kicked into 'Disruption Mode', MINNPOST. COM (Sept. 2, 2009), http://www.minnpost.com/ stories/2009/09/02/11256/looking-back-at-gop-convention-police-kicked-into- disruption-mode.
-
(2009)
Minnpost. Com.
-
-
Schulz, G.W.1
-
12
-
-
77955331545
-
Spying uncovered
-
July 18
-
Nick Madigan, Spying Uncovered, BALT. SUN, July 18, 2008, at 1A, available at http://www.baltimoresun.com/news/maryland/bal-te.md.spy18jul18,o, 5659230.story.
-
(2008)
Balt. Sun.
-
-
Madigan, N.1
-
13
-
-
80052702083
-
Police spied on activists in Maryland
-
July 18
-
Lisa Rein, Police Spied on Activists in Maryland, WASH. POST, July 18, 2008, at A1;
-
(2008)
Wash. Post.
-
-
Rein, L.1
-
14
-
-
80052753684
-
Maryland state police spied on nonviolent activists and labeled them terrorists
-
Oct. 8
-
Matthew Harwood, Maryland State Police Spied on Nonviolent Activists and Labeled Them Terrorists, SECURITY MOMT. (Oct. 8, 2008), http://www. securitymanagement.com/news/maryland-state-policespied-nonviolent-activists-and- labeled-them-terrorists-004742.
-
(2008)
Security Momt
-
-
Harwood, M.1
-
15
-
-
80052744125
-
The future of fusion centers: Potential promise and dangers: Hearing before subcomm. on intelligence, info. sharing, and terrorism risk assessment of the H. Comm. on homeland sec
-
The Future of Fusion Centers: Potential Promise and Dangers: Hearing Before Subcomm. on Intelligence, Info. Sharing, and Terrorism Risk Assessment of the H. Comm. on Homeland Sec, 111th Cong. 42 (2009) [hereinafter Future of Fusion Centers Hearing] (statement of Bruce Fein, Principal, The Litchfield Grp.).
-
(2009)
111Th Cong
, vol.42
-
-
-
16
-
-
34247250414
-
Spies among us
-
Apr. 30
-
David E. Kaplan, Spies Among Us, U. S. NEWS & WORLD REP. (Apr. 30, 2006), http://www.usnews.com/usnews/news/articles/060508/8homeland.htm (alteration in original) (emphasis added) (quoting Mike Van Winkle) (internal quotation marks omitted).
-
(2006)
U. S. News & World Rep.
-
-
Kaplan, D.E.1
-
17
-
-
80052744126
-
-
Administrative Procedure Act, §§ 701-703
-
Administrative Procedure Act, 5 U. S. C. §§ 701-703 (2006);
-
(2006)
U. S. C.
, vol.5
-
-
-
18
-
-
84914161436
-
-
Exec. Order No. 12, 866, 735 Oct. 4
-
Exec. Order No. 12, 866, 58 Fed. Reg. 51, 735 (Oct. 4, 1993).
-
(1993)
Fed. Reg.
, vol.58
, pp. 51
-
-
-
21
-
-
79955765073
-
-
Network-based metaphors help clarify forms of association enabled by new communication and data storage technologies. We discuss fusion centers as both network organizations and hubs of associative clusters. For a definition of these terms, see MILTON MUELLER, NETWORKS AND STATES: GLOBAL POLITICS OF INTERNET GOVERNANCE 41 (2010) (defining a network organization as "a loose but bounded and consciously constructed organization based mainly on leveraging the benefits of reciprocity", and an associative cluster as "an unbounded and decentered cluster of actors around repeated patterns of exchange or contact").
-
(2010)
Networks and States: Global Politics of Internet Governance
, pp. 41
-
-
Mueller, M.1
-
22
-
-
34548749807
-
The bureaucratic due process of government watch lists
-
For an insightful analysis of the general problem of watch lists, see Peter M. Shane, The Bureaucratic Due Process of Government Watch Lists, 75 GEO. WASH. L. REV. 804 (2007).
-
(2007)
Geo. Wash. L. Rev.
, vol.75
, pp. 804
-
-
Shane, P.M.1
-
27
-
-
84942800122
-
-
Implementing Recommendations of the 9/11 Commission Act of 2007, Pub. L. No. 110-53, § 511, 322
-
Implementing Recommendations of the 9/11 Commission Act of 2007, Pub. L. No. 110-53, § 511, 121 Stat. 266, 322 (2007);
-
(2007)
Stat
, vol.121
, pp. 266
-
-
-
28
-
-
84855321578
-
-
Intelligence Reform & Terrorism Prevention Act of 2004, Pub. L. No. 108-458, § 1016, 3665
-
Intelligence Reform & Terrorism Prevention Act of 2004, Pub. L. No. 108-458, § 1016, 118 Stat. 3638, 3665.
-
Stat
, vol.118
, pp. 3638
-
-
-
29
-
-
80052721944
-
-
See generally TODD MASSE ET AL., EDS., INFORMATION AND INTELLIGENCE (INCLUDING TERRORISM) FUSION CENTERS 5 (2008) (describing the importance of fusion, including non-traditional intelligence). For a thoughtful exploration of this shift to an "Information Sharing Paradigm"
-
(2008)
Information and Intelligence (Including Terrorism) Fusion Centers
, pp. 5
-
-
Masse, T.1
-
30
-
-
77950633260
-
Privacy and information sharing in the war on terrorism
-
954
-
see Peter P. Swire, Privacy and Information Sharing in the War on Terrorism, 51 VILL. L. REV. 951, 954 (2006).
-
(2006)
Vill. L. Rev.
, vol.51
, pp. 951
-
-
Swire, P.P.1
-
32
-
-
80052759017
-
Fusion centers key to efforts to combat drug violence, officials say
-
June 5
-
Trip Jennings, Fusion Centers Key to Efforts to Combat Drug Violence, Officials Say, N. M. INDEP. (June 5, 2009), http://newmexicoindependent.com/ 28966/fusion-centers-key-to-fed-efforts-atcombating-drug-violence;
-
(2009)
N. M. Indep
-
-
Jennings, T.1
-
35
-
-
80052704501
-
Safeguarding America's playground
-
July/Aug
-
Tom Monahan, Safeguarding America's Playground, UNLV INST, FOR SEC. STUDIES (July/Aug. 2010), http://iss.unlv.edu/Guest%20Columns/guestcolumn- julyaugust%202010.html.
-
(2010)
Unlv Inst, for Sec. Studies
-
-
Monahan, T.1
-
36
-
-
80052770460
-
MCAC partners
-
See, e.g., MCAC Partners, MD. COORDINATION & ANALYSIS CTR., http://www.mcac-md.gov/MCACPartners.php (on file with Hastings Law Journal).
-
Md. Coordination & Analysis Ctr.
-
-
-
38
-
-
80052749435
-
While the county fiddles, johnson Gets paid, and paid, and paid
-
July 15
-
Private firms also help run fusion centers. For instance, a consulting firm manages and provides analysis for the North Central Texas Fusion System. Bill Baumbach, While the County Fiddles, Johnson Gets Paid, and Paid, and Paid, COLLIN CNTV. OBSERVER (July 15, 2009), http://www.baumbach.org/b2evolutior1/ blogs/index.php/2009/07/15/whUe-the-county-fiddlesJohnson-gets-pa.
-
(2009)
Collin Cntv. Observer
-
-
Baumbach, B.1
-
39
-
-
80052692728
-
Boeing to staff FBI fusion center
-
June 1
-
Alice Lipowicz, Boeing to Staff FBI Fusion Center, WASH. TECH. (June 1, 2007), http://washingtontechnology.com/articles/2007/o6/o1/boeing-to-staff-fbi- fusion-enter.aspx.
-
(2007)
Wash. Tech.
-
-
Lipowicz, A.1
-
41
-
-
80052721946
-
Novel fusion center to boost anti-fraud efforts in California
-
Coal. Against Ins. Fraud, Wash., D. C., Summer
-
See Novel Fusion Center to Boost Anti-Fraud Efforts in California, FRAUD FOCUS (Coal. Against Ins. Fraud, Wash., D. C.), Summer 2008, at 1.
-
(2008)
Fraud Focus
, pp. 1
-
-
-
42
-
-
80052780641
-
-
Lipowicz, supra note 41. Boeing's decision to co-locate at the WJAC may be due, in part, to the Critical Infrastructure Protection Act of 2001, Pub. L. No. 107-56, 115 Stat. 400, which exempts information that a private firm has provided to the federal government concerning critical infrastructure from FOIA's disclosure requirements. Lipowicz, supra note 41. This suggests that Boeing is not only providing intelligence analysis, but also raw information to the WJAC.
-
Stat
, vol.115
, pp. 400
-
-
-
44
-
-
80052751641
-
Smashing information stovepipes
-
last visited July 4, 2011
-
Joseph Straw, Smashing Information Stovepipes, SECURITY MGMT., http://www.securitymanagement.com/article/smashing-intelligencestovepipes?page= o%2Co (last visited July 4, 2011).
-
Security Mgmt.
-
-
Straw, J.1
-
45
-
-
80052784514
-
Critical issues in civil rights for law enforcement intelligence and counterterrorism
-
See, e.g., David L. Carter, Critical Issues in Civil Rights for Law Enforcement Intelligence and Counterterrorism, 46 CRIM. L. BULL. 587, 591 (2010) (discussing this approach);
-
(2010)
Crim. L. Bull
, vol.46
, pp. 587
-
-
Carter, D.L.1
-
46
-
-
80052706459
-
Network of centers pools data on terror
-
Dec. 31
-
Mary Beth Sheridan & Spencer S. Hsu, Network of Centers Pools Data on Terror, WASH. POST, - Dec. 31, 2006, at A3.
-
(2006)
Wash. Post
-
-
Sheridan, M.B.1
Hsu, S.S.2
-
48
-
-
80052709263
-
Delaware moves to forefront with security technology
-
Kerry Kester, Delaware Moves to Forefront with Security Technology, CAPE GAZETTE, Apr. 17, 2007, at 4 (on file with Hastings Law Journal). The Fusion Center Guidelines suggest numerous modes of intelligence output, such as investigative and tactical responśe, alerts, geospatial imaging, criminal backgrounds and profiles, crime-pattern analysis, terrorism calendars, and threat assessments.
-
(2007)
Cape Gazette
, pp. 4
-
-
Kester, K.1
-
50
-
-
80052730532
-
Narrowing the focus
-
Sept. 12, Monahan
-
Jim McKay, Narrowing the Focus, GOV'T TECH. (Sept. 12, 2007), http://www.govtech.com/public-safety/Narrowing-the-Focus.html; Monahan, supra note 37;
-
(2007)
Gov'T Tech.
-
-
Mckay, J.1
-
51
-
-
80052776236
-
Microsoft to aid in war on terror, builds software for DHS
-
Nov. 21, 19 AM
-
Ryan Paul, Microsoft to Aid in War on Terror, Builds Software for DHS, ARS TECHNICA (Nov. 21, 2008, 9:19 AM), http://arstechnica.com/security/news/ 2008/ii/microsoft-to-aid-in-war-on-terror-builds-software-for-dhs.ars.
-
(2008)
Ars Technica
, pp. 9
-
-
Paul, R.1
-
52
-
-
80052694848
-
-
Metro Operations Support & Analytical Intelligence Ctr., Presentation to the Public Safety Committee: Dallas Police Department Fusion Center Update 11 (June 15, 2009), available at http://www.dallascityhall.com/committee- briefmgs/briefingso609/PS-Fusion-Center-061509.pdf. The Southern Nevada fusion center's director echoed this sentiment: "Intelligence analysts collect information from other Fusion Centers from classified and unclassified sources, as well as from the public, with an eye towards identifying those behaviors and activities that suggest the pre-operational phases of an impending terror attack." Monahan, supra note 37.
-
-
-
-
54
-
-
80052719110
-
Beyond ISE implementation: Exploring the way forward for information sharing: Hearing before intelligence, info. sharing, and terrorism risk assessment subcomm. of the H. Comm. on homeland sec
-
As a New Jersey fusion center official explained, we have a "customer philosophy of 'give us a quarter's worth of information and we'll provide you with a dollar's worth of analysis and lead value intelligence information-'" Beyond ISE Implementation: Exploring the Way Forward for Information Sharing: Hearing Before Intelligence, Info. Sharing, and Terrorism Risk Assessment Subcomm. of the H. Comm. on Homeland Sec, 111th Cong. 18 (2009) [hereinafter Beyond ISE Implementation] (statement of Colonel Rick Fuentes, Superintendent, N. J. State Police).
-
(2009)
111Th Cong
, pp. 18
-
-
-
55
-
-
71949127148
-
Centers tap into personal databases
-
Robert O'Harrow, Jr., Centers Tap into Personal Databases, WASH. POST, Apr. 2, 2008, at A1 (quoting Steven G. O'Donnell, Deputy Superintendent of R. I. State Police) (internal quotation marks omitted).
-
(2008)
Wash. Post.
-
-
O'Harrow Jr., R.1
-
56
-
-
80052779330
-
Fusion centers analyzing reams of Americans' personal information
-
Apr. 2, 16 AM
-
Ryan Singel, Fusion Centers Analyzing Reams of Americans' Personal Information, WIRED BLOG (Apr. 2, 2008 10:16 AM), http://blog.wired.com/ 27bstroke6/2008/04/fusion-centers.html.
-
(2008)
Wired Blog
, pp. 10
-
-
Singel, R.1
-
57
-
-
80052715153
-
The power of fusion
-
Mar. 1
-
Michael Fickes, The Power of Fusion, GOV'T SEC. (Mar. 1, 2008), http://govtsecurity.com/federal-homeland-security/power-fusion-nsa/.
-
(2008)
Gov'T Sec
-
-
Fickes, M.1
-
58
-
-
80052748946
-
-
Norm Beasley, Counter-Terrorism Coordinator, Maricopa Cnty, Ariz. Sheriffs Office, Presentation at the COPS 2007 Technology Program Kickoff Conference: Fusion Centers & Their Role in Information Sharing 28-29 (Dec. 5, 2007) (on file with Hastings Law Journal);
-
(2007)
Counter-terrorism Coordinator, Maricopa Cnty, Ariz
-
-
Beasley, N.1
-
59
-
-
80052755165
-
Port of long beach fusion center opens
-
Feb. 9
-
Matthew Harwood, Port of Long Beach Fusion Center Opens, SEC. MGMT. (Feb. 9, 2009), http://www.securitymanagement.com/news/port-long-beach-fusion-center- opens-005197/.
-
(2009)
Sec. MGMT
-
-
Harwood, M.1
-
60
-
-
78449263223
-
Surveillance effort draws civil liberties concerns
-
Apr. 28, 2009
-
Eric Schmitt, Surveillance Effort Draws Civil Liberties Concerns, N. Y. TIMES, Apr. 28, 2009, at A12. Until late 2009, law enforcement were directed to submit suspicious activity reports about unusual activity, such as a person's taking pictures, sweating, mumbling, and participation in extremist groups.
-
(2009)
N. Y. Times
-
-
Schmitt, E.1
-
61
-
-
80052776237
-
-
MIKE GERMAN & JAY STANLEY, ACLU, FUSION CENTER UPDATE 2 (2008). Privacy advocates opposed this practice, arguing that this approach risked the reporting of individuals' constitutionally protected activities.
-
(2008)
Aclu, Fusion Center Update
, vol.2
-
-
German, M.1
Stanley, J.2
-
62
-
-
80052730051
-
-
Id. In response, the DOJ released a nationwide SAR initiative, which provided strict guidelines for the collection of SARS. U. S. DEP'T OF JUSTICE, ISE-FS-200, INFORMATION SHARING EXCHANGE FUNCTIONAL STANDARD SUSPICIOUS ACNVRRY REPORTING VERSION 1.5 6-7 (2009) [hereinafter ISE FUNCTIONAL STANDARD], available at http://www.niem.gov/pdf/ISE-FS-200-ISE-SAR-Functional-Standard-Vi- 5-Issued.pdf (permitting the production of SARs only on "observed behavior reasonably indicative of pre-operational planning related to terrorism or other criminal activity" and banning a person's race, ethnicity, national origin, or religious affiliation as factors creating suspicion).
-
(2009)
Sars. U. S. Dep'T of Justice, ISE-FS-200, Information Sharing Exchange Functional Standard Suspicious Acnvrry Reporting Version
, vol.15
, pp. 6-7
-
-
-
63
-
-
80052709264
-
Reporting suspicious activity questions and answers
-
last visited July 4, 2011
-
Reporting Suspicious Activity Questions and Answers, COLO. INFO. ANALYSIS CTR., https://www.ciac.co.gov/index.cfm (last visited July 4, 2011).
-
Colo. Info. Analysis Ctr.
-
-
-
64
-
-
80052736345
-
Suspicious activity form
-
Aug
-
Suspicious Activity Form, CONN. INTELLIGENCE CTR. (Aug. 2006), http://www.ct.gov/demhs/lib/demhs/emergmgmt/tipsform.pdf (providing a blank form for making reports and asking officers to identify the suspect's name, date of birth, Social Security number, sex, and race).
-
(2006)
Conn. Intelligence Ctr.
-
-
-
65
-
-
80052756172
-
Focus on fusion centers: A progress report, hearing before the ad hoc subcomm. on state, local, and private sector preparedness and integration of the S. Comm. on homeland Sec. & governmental affairs
-
Focus on Fusion Centers: A Progress Report, Hearing Before the Ad Hoc Subcomm. on State, Local, and Private Sector Preparedness and Integration of the S. Comm. on Homeland Sec. & Governmental Affairs, 110th Cong. 35 (2008) [hereinafter Focus on Fusion Centers] (statement of Matthew Bettenhausen, Dir., Calif. Office of Homeland Sec);
-
(2008)
110Th Cong
, pp. 35
-
-
-
66
-
-
80052767518
-
-
May 14
-
Wash. State Fusion Ctr., Operation De-Fuse Briefing at the Washington State Fusion Center (May 14, 2010), available at http://www.operationdefuse.com/ 2010/05/14/washington-state-fusion-center-powerpoint/ (explaining that it "distributes information, intelligence, and products" to law enforcement agencies and private sector partners).
-
(2010)
Wash. State Fusion Ctr., Operation De-Fuse Briefing at the Washington State Fusion Center
-
-
-
68
-
-
80052770459
-
Dr. Bob's terror shop: The strange and scary story of the north central texas fusion system
-
Apr. 2
-
Forrest Wilder, Dr. Bob's Terror Shop: The Strange and Scary Story of the North Central Texas Fusion System, TEX. OBSERVER (Apr. 2, 2009), http://www.texasobserver.org/archives/item/15614-3003-dr-bobs-terror-shop.
-
(2009)
Tex. Observer
-
-
Wilder, F.1
-
69
-
-
80052740303
-
Definitions
-
last visited July 4, 2011
-
Definitions, ARIZ. COUNTER TERRORISM INFO. CTR., http://www.azactic.gov/ About/Definitions/ (last visited July 4, 2011).
-
Ariz. Counter Terrorism Info. Ctr.
-
-
-
70
-
-
80052783529
-
Post-9/11 intelligence goes local
-
Aug. 12
-
Trip Jennings, Post-9/11 Intelligence Goes Local, N. M. INDEP. BLOG (Aug. 12, 2008, 3:00 AM), http://newmexicoindependent.com/48i/post-9ii-intelligence- goes-local (quoting Norm Beasley) (internal quotation marks omitted).
-
(2008)
N. M. Indep. Blog
-
-
Jennings, T.1
-
71
-
-
80052774802
-
-
FUSION CENTER GUIDEUNES, supra note 47, at C-1. The Fusion Center Guidelines recommend partnerships with private owners of critical infrastructure, including hospitals, banking, chemical industry, education, energy, hotels, telecommunications, shipping, and private security, among others. Id.
-
Fusion Center Guideunes
-
-
-
72
-
-
80052784036
-
Private sector information sharing: What is it, who does it, and what's working at DHS?: Hearing before the subcomm. on intelligence, info. Sharing & terrorism risk assessment of the H. Comm. of homeland sec
-
Private Sector Information Sharing: What Is It, Who Does It, and What's Working at DHS?: Hearing Before the Subcomm. on Intelligence, Info. Sharing & Terrorism Risk Assessment of the H. Comm. of Homeland Sec, 110th Cong. 5-6 (2007) (statement of James M. Chaparro, Deputy Assistant Sec'y, Dep't of Homeland Sec. Office of Intelligence and Analysis);
-
(2007)
110Th Cong
, pp. 5-6
-
-
Chaparro, J.M.1
-
73
-
-
71949099546
-
The murky world of 'Fusion Centres'
-
Mar, 20-21
-
Torin Monahan, The Murky World of'Fusion Centres', CRIM. JUST. MATTERS, Mar. 2009, at 20, 20-21.
-
(2009)
Crim. Just. Matters
, pp. 20
-
-
Monahan, T.1
-
74
-
-
80052768877
-
CSX to share data with kentucky fusion center
-
Aug. 2
-
Alice Lipowicz, CSX to Share Data with Kentucky Fusion Center, WASH. TECH. (Aug. 2, 2007), http://washingtontechnology.com/articles/2007/08/02/csx- to-share-data-with-kentucky-fusion-center.aspx?sc-lang=en.
-
(2007)
Wash. Tech.
-
-
Lipowicz, A.1
-
75
-
-
80052699886
-
State perspective-arizona
-
Jan. 1
-
Joseph Straw, State Perspective-Arizona, SECURITY MGMT. (Jan. 1, 2007), http://www.securitymanagement.com/article/state-perspective-arizona.
-
(2007)
Security Mgmt
-
-
Straw, J.1
-
77
-
-
80052777209
-
-
Future of Fusion Centers Hearing, supra note 23, at 51 (statement of David D. Gersten, Acting Deputy Officer for Programs and Compliance, U. S. Dep't of Homeland Sec.)
-
Future of Fusion Centers Hearing
, pp. 51
-
-
-
78
-
-
34548337141
-
Sending the bureaucracy to war
-
For a general critique of improvisation in the war on terror, see David Zaring & Elena Baylis, Sending the Bureaucracy to War, 92 IOWA L. REV. 1359 (2007).
-
(2007)
Iowa L. Rev.
, vol.92
, pp. 1359
-
-
Zaring, D.1
Baylis, E.2
-
79
-
-
84937343002
-
Virtual visibility
-
Anne-Marie Slaughter, Virtual Visibility, FOREIGN POL'Y, Nov. 2000, at 84, 84 ("Networks are the organizational charts of choice for the information age. Corporations have been transforming themselves from vertical hierarchies into horizontal networks for a decade-[Njational governments are networking as well, linking with their regulatory counterparts across the globe to tackle thorny transnational issues such as money laundering, securities fraud, and drug trafficking. Unfortunately, they are doing so in ways that raise serious concerns about accountability.").
-
(2000)
Foreign Pol'Y
, pp. 84
-
-
Slaughter, A.1
-
82
-
-
80052709717
-
-
PRIVACY IMPACT ASSESSMENT, supra note 7, at 26-27. Virginia recently passed legislation exempting its fusion centers from the requirements of state privacy law.
-
Privacy Impact Assessment
, pp. 26-27
-
-
-
83
-
-
80052735905
-
-
See 2008 Va. Acts ch. 792
-
(2008)
Va. Acts
, pp. 792
-
-
-
84
-
-
80052766542
-
-
(codified as amended at VA. CODE ANN. §§ 52-48, 52-49 (West 2010));
-
Va. Code Ann.
, vol.48-52
, pp. 52-49
-
-
-
85
-
-
30144439568
-
-
5 U. S. C. § 552a (m) (2006).
-
(2006)
U. S. C.
, vol.5
-
-
-
87
-
-
80052732873
-
-
Future of Fusion Center Hearing, supra note 23, at 54 (statement of David D. Gersten, Acting Deputy Officer for Programs and Compliance, U. S. Dep't of Homeland Sec).
-
Future of Fusion Center Hearing
, pp. 54
-
-
-
88
-
-
80052777641
-
-
See, e.g., BUREAU OF JUSTICE SYS. & GLOBAL JUSTICE INFO. SHARING INITIATIVE, U. S. DEP'T OF JUSTICE & U. S. DEP'T OF HOMELAND SEC, GUIDE TO CONDUCTING PRIVACY IMPACT ASSESSMENTS FOR STATE, LOCAL, AND TRIBAL INFORMATION SHARING INITIATIVES (2009).
-
(2009)
Sharing Initiative, U. S. Dep'T of Justice & U. S. Dep'T of Homeland Sec, Guide to Conducting Privacy Impact Assessments for State, Local, and Tribal Information Sharing Initiatives
-
-
-
89
-
-
80052755660
-
-
This includes the Indiana, Michigan, Minnesota, and Mississippi fusion centers. IND. INTELLIGENCE FUSION CTR., PRIVACY POLICY VERSION 2.0 (2010), available at http://www.in.gov/iifc/files/IIFC-Privacy-Policy.pdf; Mich. Intelligence Operations Ctr.
-
(2010)
Ind. Intelligence Fusion Ctr., Privacy Policy Version 2.0
-
-
-
90
-
-
80052713706
-
-
PRIVACY POLICY (2011), available at http://www.michigan.gov/documents/ msp/MIOCprivacypolicy-355596-7.pdf;
-
(2011)
Privacy Policy
-
-
-
91
-
-
80052780639
-
-
MINN. JOINT ANALYSIS CTR., PRIVACY POLICY (2011), available at http://www.nfcausa.org/(S(xipxro45420unzyc3amnqtei))/documentdownload.aspx? documentid=34&getdocnum=i&AspxAutoDetectCookieSupport=i; Miss. Analysis - Info. Ctr.
-
(2011)
Minn. Joint Analysis Ctr., Privacy Policy
-
-
-
92
-
-
80052733326
-
-
PRIVACY POLICY (2007), available at http://www.homelandsecurity.ms.gov/ docs/msaic-privacy-policy.pdf.
-
(2007)
Privacy Policy
-
-
-
93
-
-
80052703510
-
-
For instance, the Washington State fusion center summarized its "key privacy policy elements" in a public briefing as including " 28 C. F. R. Part 23, audit mechanism (being developed by Executive Board), and the prohibition against the collection, retention, and dissemination of information based solely on race, gender, age, sexual orientation, disability, or First Amendment activities." Wash. State Fusion Ctr., supra note 63;
-
C. F. R.
, vol.28
, pp. 23
-
-
-
94
-
-
80052692727
-
-
see also 28 C. F. R. pt. 23 (2010).
-
(2010)
C. F. R.
, vol.28
, pp. 23
-
-
-
96
-
-
80052736855
-
-
(noting that fusion centers must adhere to 28 C. F. R. pt. 23 because they receive federal funding).
-
C. F. R.
, vol.28
, pp. 23
-
-
-
98
-
-
80052749433
-
-
Id. Fusion centers have assisted local, state, and federal agencies in other ways. They help locate individuals with outstanding warrants. Mo. Info. Analysis Or., Missouri Information Analysis Center (MIAC), http://www.scribd. corn/doc/17782446/MIAC-Power-Point-What-is-MIAC (last visited July 4, 2011).
-
Missouri Information Analysis Center (Miac)
-
-
-
99
-
-
47049107175
-
Government data mining: The need for a legal framework
-
Data-mining applications are successful in predicting consumer behavior for credit card companies, because they can compare a consumer's credit history with the credit histories of millions of other consumers to predict the likelihood of delinquency. Fred H. Cate, Government Data Mining: The Need for a Legal Framework, 43 HARV. C. R.-C. L. L. REV. 435, 473 (2008).
-
(2008)
Harv. C. R.-C. L. L. Rev.
, vol.43
, pp. 435
-
-
Cate, F.H.1
-
100
-
-
85050328322
-
Empirical social inquiry and models of causal inference
-
For a description of the "small-N" problem, see David Dahua Yang, Empirical Social Inquiry and Models of Causal Inference, NEW ENG. J. POL. SCI., Fall 2006, oat 51, 63. Nevertheless, an academic paper from the Naval Postgraduate School claims to "establish a chronological pattern to" the radicalization of "our nation's three most prolific domestic lone wolf terrorists", including Timothy McVeigh, Ted Kaczynski, and Eric Rudolph, and thus identifying a "pattern [that] can identify future lone wolf terrorist radicalization activity upstream."
-
(2006)
New Eng. J. Pol. Sci., Fall
, pp. 51
-
-
Yang, D.D.1
-
101
-
-
80052741254
-
-
Nathan R. Springer, Patterns of Radicalization: Identifying the Markers and Warning Signs of Domestic Lone Wolf Terrorists in Our Midst 79 (Dec. 2009) (unpublished Master's thesis, Naval Postgraduate School), available at http://www.opensourcesinfo.org/journal/2010/11/23/patterns-of-radicalization- identifying-the-markersand-warni.html ("The next lone wolf domestic terrorist lurks in our midst, and could be following the same chronological pattern that we saw with McVeigh, Kaczynski, and Rudolph. Apply the chronological pattern of radicalization [discussed in this thesis]... to future radicalization and we could catch it upstream, before it happens.").
-
(2009)
Patterns of Radicalization: Identifying the Markers and Warning Signs of Domestic Lone Wolf Terrorists in Our Midst 79
-
-
Springer, N.R.1
-
104
-
-
80052763508
-
Spy agency data after Sept. u led FBI to dead ends
-
Jan. 17, at A1
-
Lowell Bergman et al., Spy Agency Data After Sept. u Led FBI to Dead Ends, N. Y. TIMES, Jan. 17, 2006, at A1.
-
(2006)
N. Y. Times
-
-
Bergman, L.1
-
107
-
-
45849148052
-
Effective counterterrorism and the limited role of predictive data mining
-
8
-
Swire, supra note 32, at 964-65; Jeff Jonas & Jim Harper, Effective Counterterrorism and the Limited Role of Predictive Data Mining, CATO INST. POL'Y ANALYSIS, Dec. 11, 2006, at 1, 8.
-
(2006)
Cato Inst. Pol'Y Analysis
, pp. 1
-
-
Jonas, J.1
Harper, J.2
-
108
-
-
80052741739
-
Correcting false positives: Redress and the watch list conundrum
-
Heritage Found., Wash., D. C., June 17
-
Paul Rosenzweig & Jeff Jonas, Correcting False Positives: Redress and the Watch List Conundrum, LEGAL MEMORANDUM (Heritage Found., Wash., D. C.), June 17, 2005, at 2-3.
-
(2005)
Legal Memorandum
, pp. 2-3
-
-
Rosenzweig, P.1
Jonas, J.2
-
109
-
-
80052724900
-
-
Jonas & Harper, supra note 104, at 8. To be sure, some national security efforts, like airport screening, may make us safer, because they provide an appearance of greater scrutiny. BRUCE SCHNEIER, BEYOND FEAR: THINKING SENSIBLY ABOUT SECURITY IN AN UNCERTAIN WORLD 38 (2003). Fusion centers cannot provide such "security theater", because they operate in secret.
-
(2003)
Beyond Fear: Thinking Sensibly About Security in an Uncertain World
, vol.38
-
-
Schneier, B.1
-
116
-
-
77955332677
-
Agency apologizes for militia report on candidates
-
see Chad Livengood, Agency Apologizes for Militia Report on Candidates, SPRINGFIELD NEWS-LEADER, Mar. 25, 2009, at 1A. The fusion center intended the report only for the eyes of police officers-it was made public after being leaked on the Internet. Livengood, supra. The fusion center subsequently apologized to former presidential candidates Ron Paul, Bob Barr, and Chuck Baldwin for the report. Id.
-
(2009)
Springfield News-leader
-
-
Livengood, C.1
-
117
-
-
80052772420
-
'Fusion Center' data draws fire over assertions
-
Mar. 14
-
T. J. Greaney, 'Fusion Center' Data Draws Fire over Assertions, COLUMBIA DAILY TRIB., Mar. 14, 2009, at A1, available at http://www.columbiatribune.com/ news/2009/mar/14/fusion-center-datadraws-fire-over-assertions/.
-
(2009)
Columbia Daily Trib.
-
-
Greaney, T.J.1
-
118
-
-
80052778122
-
ACLU: Spying on activists needs to end
-
July 27
-
Josh Richman, ACLU: Spying on Activists Needs to End, OAKLAND TRIB., July 27, 2006, at 1.
-
(2006)
Oakland Trib.
, pp. 1
-
-
Richman, J.1
-
119
-
-
80052692726
-
-
2009
-
VA. FUSION CTR., 2009 VIRGINIA TERRORISM THREAT ASSESSMENT 9 (2009). In 2009, the North Central Texas Fusion System distributed its Prevention Awareness Bulletin to over 1500 state officials, urging law enforcement to report on organizations that lobby Islamic-based issues or support radical goals such as Shariah law.
-
(2009)
Virginia Terrorism Threat Assessment
, pp. 9
-
-
-
120
-
-
80052744619
-
Fusion centers under fire in texas and new Mexico
-
Mar. 9
-
Matthew Harwood, Fusion Centers Under Fire in Texas and New Mexico, SECURITY MGMT. (Mar. 9, 2009), http://www.securitymanagement.com/news/fusion- centers-under-firetexas-and-new-mexico-005314.
-
(2009)
Security Mgmt
-
-
Harwood, M.1
-
122
-
-
79951797825
-
First amendment investigations and the inescapable pragmatism of the common law of free speech
-
Id. at 3. COINTELPRO was not an isolated abuse. Lawrence Rosenthal, First Amendment Investigations and the Inescapable Pragmatism of the Common Law of Free Speech, 86 IND. LJ. I, 37 (2011) ("[H]istory reflects a serious risk of abuse in investigations based on the protected speech of the targets.").
-
(2011)
Ind. Lj. I
, vol.86
, pp. 37
-
-
Rosenthal, L.1
-
123
-
-
70449815865
-
Freedom of association in a networked world: First amendment regulation of relational surveillance
-
Fusion centers might analyze individuals' digital footprints to identify "suspicious" political, ethnic, and religious groups. Katherine J. Strandburg, Freedom of Association in a Networked World: First Amendment Regulation of Relational Surveillance, 49 B. C. L. REV. 741, 760 (2008). As Katherine Strandburg warns, such data-mining programs seek to find "malevolent associations in a haystack of more numerous legitimate relationships."
-
(2008)
B. C. L. Rev.
, vol.49
, pp. 741
-
-
Strandburg, K.J.1
-
124
-
-
42349088345
-
Data mining and the security-liberty debate
-
Daniel J. Solove, Data Mining and the Security-Liberty Debate, 75 U. CHI. L. REV. 343, 358 (2008) (explaining that bias can be embedded in human-created profiles encoded in computer algorithms, as well as in the human-compiled datasets of terrorists that predictive data-mining tools would search).
-
(2008)
U. Chi. L. Rev.
, vol.75
, pp. 343
-
-
Solove, D.J.1
-
125
-
-
34247545822
-
The first amendment as criminal procedure
-
143-44
-
Daniel J. Solove, The First Amendment as Criminal Procedure, 82 N. Y. U. L. REV. 112, 143-44 (2007).
-
(2007)
N. Y. U. L. Rev.
, vol.82
, pp. 112
-
-
Solove, D.J.1
-
126
-
-
77955341233
-
Fulfilling government 2.0's promise with robust privacy protections
-
See Danielle Keats Citron, Fulfilling Government 2.0's Promise with Robust Privacy Protections, 78 GEO. WASH. L. REV. 822, 861 (2010) (exploring the potential chilling caused by government's use of social media to interact with the public on policy issues). This Article does not suggest that the surveillance of political and religious groups is necessarily justiciable, although it may be so in circumstances where the chilling of expressive association is accompanied by objective harm, such as reputational damage.
-
(2010)
Geo. Wash. L. Rev.
, vol.78
, pp. 822
-
-
Citron, D.K.1
-
127
-
-
70449836959
-
Guilt by expressive association: Political profiling, surveillance and the privacy of groups
-
See Linda E. Fisher, Guilt by Expressive Association: Political Profiling, Surveillance and the Privacy of Groups, 46 ARIZ. L. REV. 621, 656-57 (2004). Instead, it seeks to underscore the various ways fusion centers impact basic liberties, including free expression and association.
-
(2004)
Ariz. L. Rev.
, vol.46
, pp. 621
-
-
Fisher, L.E.1
-
128
-
-
0004227508
-
-
Swire, supra note 32. See generally FREDERICK M. LAWRENCE, PUNISHING HATE: BIAS CRIMES UNDER AMERICAN LAW (1999) (arguing hate crimes are uniquely destructive and divisive and calling for tougher sentences for these crimes).
-
(1999)
Punishing Hate: Bias Crimes Under American Law
-
-
Lawrence, F.M.1
-
129
-
-
80052710402
-
MIAC isn't making 'strategic' reports but won't rule them out
-
Dec. 23
-
MIAC Isn't Making 'Strategic' Reports but Won't Rule Them Out, OPERATION DEFUSE (Dec. 23, 2009), http://www.operationdefuse.com/2009/12/23/miac-isnt- making-strategic-reports-but-wontrule-them-out-ky3-news-weather-sports- springfield-mo-local-news/.
-
(2009)
Operation Defuse
-
-
-
131
-
-
73149108947
-
-
ROLUNS, supra note 26, at 58. One-third of fusion center officials reported that they lacked guidance on civil liberties practices. U. S. GOV'T ACCOUNTABILITY OFFICE, supra note 103, at 11 (explaining that officials in nineteen fusion centers said that they lacked guidance on informationsharing policies and procedures, such as privacy and civil liberties issues).
-
U. S. Gov'T Accountability Office
, pp. 11
-
-
-
133
-
-
77955324276
-
Visionary pragmatism and the value of privacy in the twenty-first century
-
See generally Danielle Keats Citron & Leslie Meltzer Henry, Visionary Pragmatism and the Value of Privacy in the Twenty-First Century, 108 MICH. L. REV. 1107 (2010) (reviewing SOLOVE, supra).
-
(2010)
Mich. L. Rev.
, vol.108
, pp. 1107
-
-
Citron, D.K.1
Henry, L.M.2
-
134
-
-
80052759485
-
-
Id. In revising the SARs protocols, the DHS may have helped prevent other privacy concerns. Before the newly revised SARs protocols, law enforcement was instructed to submit SARs based on a person's use of binoculars, drawing diagrams, inappropriate attire, ownership of heavy vehicles, or espousal of extremist views. See, e.g., GERMAN & STANLEY, supra note 58, at 2.
-
German & Stanley
, pp. 2
-
-
-
135
-
-
80052756171
-
-
Such aggressive information collection risked violating 28 C. F. R. pt. 23
-
C. F. R.
, vol.28
, pp. 23
-
-
-
136
-
-
80052692727
-
-
which requires a reasonable suspicion that a person committed a crime before collecting information. 28 C. F. R. pt. 23 (2010).
-
(2010)
C. F. R.
, vol.28
, pp. 23
-
-
-
137
-
-
80052754673
-
-
Indeed, that approach recalled the COINTELPRO surveillance that motivated Congress to require the issuance of 28 C. F. R. pt. 23 in the first place.
-
C. F. R.
, vol.28
, pp. 23
-
-
-
138
-
-
80052759484
-
Reputation regulation: Disclosure and the challenge of clandestinely commensurating computing
-
See Frank Pasquale, Reputation Regulation: Disclosure and the Challenge of Clandestinely Commensurating Computing, in THE OFFENSIVE INTERNET: SPEECH, PRIVACY, AND REPUTATION 107, no (Martha Nussbaum & Saul Levmore eds., 2010) (discussing systems that "unfairly induce the use of informal, digital methods that increase the chance of mis-recognition and reductionism").
-
(2010)
The Offensive Internet: Speech, Privacy, and Reputation
, pp. 107
-
-
Pasquale, F.1
-
139
-
-
80052769968
-
Reporter arrested for political activism
-
Jan. 5, 11:01 AM
-
Christine Stuart, Reporter Arrested for Political Activism, CONN. NEWS JUNKIE BLOG (Jan. 5, 2007 11:01 AM), http://www.ctnewsjunkie.com/ctnj.php/ archives/entry/reporter-arrested-for-political-activism-updated-with-police- report/.
-
(2007)
Conn. News Junkie Blog
-
-
Stuart, C.1
-
140
-
-
77955317944
-
Arrest exposes state's threats list
-
Jan. 9
-
Gregory B. Hladky, Arrest Exposes State's Threats List, NEW HAVEN REG., Jan. 9, 2007, at A1.
-
(2007)
New Haven Reg.
-
-
Hladky, G.B.1
-
141
-
-
77955338709
-
Are you on the list?
-
Sept. 30
-
Gerri Willis, Are You on the List?, CNN (Sept. 30, 2009), http://www.cnn.com/video/video/crime/2009/09/30/willis.fusion.centers.cnn.
-
(2009)
Cnn
-
-
Willis, G.1
-
142
-
-
77955340439
-
Arrest of activist troubles hartford officials
-
Jan. 9
-
Jennifer Medina, Arrest of Activist Troubles Hartford Officials, N. Y. TIMES, Jan. 9, 2007, at B6.
-
(2007)
N. Y. Times
-
-
Medina, J.1
-
143
-
-
77954749027
-
Technological due process
-
Cf. Danielle Keats Citron, Technological Due Process, 85 WASH. U. L. REV. 1249, 1309 (2008) (exploring the due process implications of automated system determinations including the "No Fly" list).
-
(2008)
Wash. U. L. Rev.
, vol.85
, pp. 1249
-
-
Citron, D.K.1
-
144
-
-
0347315050
-
Examined lives: Informational privacy and the subject as object
-
See generally, e.g., Julie E. Cohen, Examined Lives: Informational Privacy and the Subject as Object, 52 STAN. L. REV. 1373 (2000) (arguing that the debate surrounding data privacy protection needs to be grounded in an appreciation for autonomy that requires a degree of freedom from monitoring, scrutiny, and categorization by others). As the Supreme Court has made clear, individuals have no expectation of privacy in information provided to third parties.
-
(2000)
Stan. L. Rev.
, vol.52
, pp. 1373
-
-
Cohen, J.E.1
-
145
-
-
77249131620
-
-
United States v. Miller, 440
-
United States v. Miller, 425 U. S. 435, 440 (1976);
-
(1976)
U. S.
, vol.425
, pp. 435
-
-
-
146
-
-
42349114774
-
Government data mining and the fourth amendment
-
Christopher Slobogin, Government Data Mining and the Fourth Amendment, 75 U. CHI. L. REV. 317, 330 (2008). Fusion centers can freely mine customers' financial records, data brokers' digital dossiers, and cell phone location data.
-
(2008)
U. Chi. L. Rev.
, vol.75
, pp. 317
-
-
Slobogin, C.1
-
147
-
-
80052709262
-
The privacy challenges of U. S. fusion centers
-
Rebecca Andino, The Privacy Challenges of U. S. Fusion Centers, THE PRIVACY ADVISOR (Int'l Ass'n of Privacy Profls, Portsmouth, N. H.), May 2008, at 7, available at http://www.privacyassociation.org/publications/the-privacy- challenges-of-U.S.-fusion-centers/.
-
(2008)
The Privacy Advisor
, pp. 7
-
-
Andino, R.1
-
148
-
-
80052712326
-
'Track' man is sacked
-
Aug. 31
-
Id. This is not a fanciful notion. In August 2007, New York City Public Schools fired an employee, because the location information produced by his employer-provided cell phone showed that he was not working when he claimed to be. David Seifman, 'Track' Man Is Sacked, N. Y. POST, Aug. 31, 2007, at 27.
-
(2007)
N. Y. Post.
, pp. 27
-
-
Seifman, D.1
-
150
-
-
53149088880
-
All the president's spies: Public-private intelligence partnerships in the war on terror
-
Cf. Jon D. Michaels, All the President's Spies: Public-Private Intelligence Partnerships in the War on Terror, 96 CALIF. L. REV. 901, 914-16 (2008).
-
(2008)
Calif. L. Rev.
, vol.96
, pp. 901
-
-
Michaels, J.D.1
-
152
-
-
80052743705
-
Maryland state police surveillance practices & policies: Hearing before the S. Judicial proceedings comm
-
Maryland State Police Surveillance Practices & Policies: Hearing Before the S. Judicial Proceedings Comm., 2008 Leg., 425th Scss. 2-3 (Md. 2008), available at http://www.aclu-md.org/Indcx%20contcnt/NoSpying/Gcrman-Tcstimony. pdf (statement of Michael German, ACLU Policy Counsel for Nat'l Sec. Issues) (citing Sachs, supra note 110).
-
(2008)
Leg., 425Th Scss
, pp. 2-3
-
-
-
153
-
-
80052759015
-
Fusion center guidelines reflected this sentiment
-
Hylton, supra note 34. Indeed, the Fusion Center Guidelines reflected this sentiment. FUSION CENTER GUIDELINES, supra note 47.
-
Fusion Center Guidelines
-
-
-
155
-
-
71949113530
-
The emerging politics of DHS fusion centers
-
626
-
Torin Monahan & Neal A. Palmer, The Emerging Politics of DHS Fusion Centers, 40 SECURITY DIALOGUE 617, 626 (2009).
-
(2009)
Security Dialogue
, vol.40
, pp. 617
-
-
Monahan, T.1
Palmer, N.A.2
-
157
-
-
58149292014
-
The constitution in the national surveillance state
-
Jack M. Balkin, The Constitution in the National Surveillance State, 93 MINN. L. REV. i, 18 (2008).
-
(2008)
Minn. L. Rev. I
, vol.93
, pp. 18
-
-
Balkin, J.M.1
-
158
-
-
79955794229
-
The inverse relationship between secrecy and privacy
-
885
-
Julie E. Cohen, The Inverse Relationship Between Secrecy and Privacy, 77 SOC. RES. 883, 885 (2010).
-
(2010)
Soc. Res
, vol.77
, pp. 883
-
-
Cohen, J.E.1
-
159
-
-
30144439568
-
-
5 U. S. C. § 552 (2006).
-
(2006)
U. S. C.
, vol.5
, pp. 552
-
-
-
160
-
-
80052717606
-
-
2008 Va. Acts ch. 792
-
2008 Va. Acts ch. 792 (codified as amended at VA. CODE ANN. §§ 52-48, 52-49 (West 2010)).
-
(2010)
Code Ann.
, vol.48-52
, pp. 52-49
-
-
-
161
-
-
79955864483
-
Introduction: Points of control
-
938-39
-
Trcbor Scholz, Introduction: Points of Control, 77 Soc. Res. 931, 938-39 (2010).
-
(2010)
Soc. Res
, vol.77
, pp. 931
-
-
Scholz, T.1
-
162
-
-
80052778855
-
Distinguished lecture: Surveillance and the constitution
-
For a discussion of the potential uses of data mining, see Christopher Slobogin, Distinguished Lecture: Surveillance and the Constitution, 55 WAYNE L. REV. 1105, 1118 (2009) ("Event-driven data mining is the most insidious form of data mining because it is conducted in the absence of a particular suspect; rather it is designed to discover the perpetrator of a past or future event using profiles or algorithms that purport to describe general characteristics of such a perpetrator.").
-
(2009)
Wayne L. Rev.
, vol.55
, pp. 1105
-
-
Slobogin, C.1
-
163
-
-
79959220655
-
-
STEWART A. BAKER, SKATING ON STILTS: WHY WE AREN'T STOPPING TOMORROW'S TERRORISM 313 (2010). ("[T]he spread of cheap information about all of us will change our relationship to the world. We will have fewer secrets. Crippling government by preventing it from using information that everyone else can get will not give us back our secrets."). Baker is a former Assistant Secretary for Policy at the Department of Homeland Security.
-
(2010)
Skating on Stilts: Why We Aren'T Stopping Tomorrow'S Terrorism
, pp. 313
-
-
Baker, S.A.1
-
164
-
-
57349110717
-
"I've Got Nothing to Hide" and other misunderstandings of privacy
-
For important insights on the concerns expressed in the "I've got nothing to hide" argument against privacy, see generally Daniel J. Solove, "I've Got Nothing to Hide" and Other Misunderstandings of Privacy, 44 SAN DIEGO L. REV. 745 (2007).
-
(2007)
San Diego L. Rev.
, vol.44
, pp. 745
-
-
Solove, D.J.1
-
166
-
-
80052779328
-
-
BUREAU OF JUSTICE SYS. & GLOBAL JUSTICE INFO. SHARING INITIATIVE, U. S. DEP'T OF JUSTICE & U. S. DEP'T OF HOMELAND SLC, FACT SHEET ENHANCING THE PRIVACY, CIVIL RIGHTS, AND CIVIL LIBERTIES FRAMEWORK FOR STATE AND MAJOR URBAN AREA FUSION CENTERS 2 (2010). Although DHS officials emphasize that state and local officers "own" fusion centers, grant funding provides significant leverage to ensure compliance with the ISE Privacy Guidelines.
-
(2010)
Bureau of Justice Sys. & Global Justice Info. Sharing Initiative, U. S. Dep'T of Justice & U. S. Dep'T of Homeland Slc, Fact Sheet Enhancing the Privacy, Civil Rights, and Civil Liberties Framework for State and Major Urban Area Fusion Centers
, pp. 2
-
-
-
167
-
-
80052746594
-
-
FUSION CENTER POLICY TEMPLATE, supra note 33, at 5-6, 41 (listing eight Fair Information Principles-collection limitation, data quality, purpose specification, use limitation, security safeguards, openness, individual participation, and accountability-though noting that some "may not apply in all instances of an integrated justice system").
-
Fusion Center Policy Template
, pp. 5-6
-
-
-
168
-
-
80052709717
-
-
PRIVACY IMPACT ASSESSMENT, supra note 7, at 27-28 (raising concerns about military and private firm participation in fusion centers);
-
Privacy Impact Assessment
, pp. 27-28
-
-
-
171
-
-
80052712325
-
-
ISE FUNCTIONAL STANDARD, supra note 58, at 2. For a prescient call for limits of this type
-
Ise Functional Standard
, pp. 2
-
-
-
173
-
-
80052783070
-
Community engagement
-
last visited July 4
-
Community Engagement, DEPARTMENT OF HOMELAND SECURITY, http://www.dhs.gov/xabout/structure/gc-i2738730587o6.shtm7 (last visited July 4, 2011).
-
(2011)
Department of Homeland Security
-
-
-
174
-
-
79952955571
-
The ancient roots of modern financial innovation: The early history of regulatory arbitrage
-
We borrow the term "regulatory arbitrage" from the private sector context in which it developed. See, e.g., Michael S. Knoll, The Ancient Roots of Modern Financial Innovation: The Early History of Regulatory Arbitrage, 87 OR. L. REV. 93, 94 (2008) ("The exploitation of regulatory inconsistencies is a major impetus for financial innovation. Indeed, it might be the primary impetus. There is a strong incentive to innovate around prohibited or disadvantaged transactions. These innovations are commonly referred to as regulatory arbitrage."). We discuss solutions to the regulatory arbitrage problem in Part V. B infra.
-
(2008)
Or. L. Rev.
, vol.87
, pp. 93
-
-
Knoll, M.S.1
-
175
-
-
30144439568
-
-
Because state-run fusion centers are not federal agencies, such fusion centers may share records with federal agencies, bypassing the goal of the Privacy Act. One could argue that existing federal privacy law gives fusion centers little reason to engage in such arbitrage, given its exemption of law enforcement and national security intelligence from many of its obligations. See Freedom of Information Act, 5 U. S. C. § 552a (j), (k) (2) (2006). Nonetheless, for information falling outside these exemptions, which is surely a great deal, given the collection of "all hazards" information, the Privacy Act bars federal agencies from sharing information records without the permission of individuals whose records would be transferred.
-
(2006)
U. S. C.
, vol.5
-
-
-
176
-
-
80052781599
-
-
Id. Information directly gathered by the DHS would implicate "fair information practices as set out in the Privacy Act of 1974." 6 U. S. C. § 142 (a) (2) (2006) (describing the duties of the agency's Privacy Officer).
-
(2006)
U. S. C.
, vol.6
, pp. 142
-
-
-
177
-
-
80052735905
-
-
See 2008 Va. Acts ch. 792
-
(2008)
Va. Acts
, pp. 792
-
-
-
178
-
-
80052766542
-
-
(codified as amended at VA. CODE ANN. §§ 52-48, 52-49 (West 2010)).
-
(2010)
Va. Code Ann.
, vol.48-52
, pp. 52-49
-
-
-
179
-
-
80052703030
-
-
GERMAN & STANLEY, supra note 27, at 10-11. Federal regulation 28 C. F. R. pt. 23, if applied and enforced, might assuage these concerns, if fusion centers interpret access to data as collection covered by federal regulation.
-
C. F. R.
, vol.28
, pp. 23
-
-
-
180
-
-
80052692727
-
-
See 28 C. F. R. pt. 23 (2010).
-
(2010)
C. F. R.
, vol.28
, pp. 23
-
-
-
181
-
-
80052729580
-
-
But since FOIA does not apply to the work of state personnel, the public may have no way of knowing whether fusion centers are complying with 28 C. F. R. pt. 23. Moreover, however detailed the aspirations in documents like the ISE Functional Standard and the Privacy Impact Assessment may be, the DHS has been slow to institutionalize enforcement.
-
C. F. R.
, vol.28
, pp. 23
-
-
-
182
-
-
80052719107
-
Open government and the net: Bringing social media into the light
-
Alan J. Bojorquez & Damien Shores, Open Government and the Net: Bringing Social Media into the Light, 11 TEX. TECH. ADMIN. L. J. 45, 50 (2009). For emails, the retention period depends on the information and content within the email.
-
(2009)
Tex. Tech. Admin. L. J.
, vol.11
, pp. 45
-
-
Bojorquez, A.J.1
Shores, D.2
-
183
-
-
80052773373
-
-
For example, even though the Indiana Intelligence Fusion Center ("IIFC") has a model privacy policy in many respects, it explicitly reserves the right to withhold the "the existence, content, and source of the information" from the requestor in many cases, which makes it difficult to populate the entire ISE with redress efforts. IND. INTELLIGENCE FUSION CTR., supra note 88, at 13. Greg Nojeim, Senior Counsel at the Center for Democracy & Technology, has affirmed our fear that this remains a widespread problem. Email from Greg Nojeim, Senior Counsel, Ctr. for Democracy & Tech., to Authors, supra note 178 ("If you go to e.g. the Texas fusion center and ask them to correct errant data in their data base about you, but their information came from the Louisiana fusion center, Texas is forbidden from telling you about the source of that information and can't correct it, and there's no process for triggering a correction by Louisiana.").
-
Ind. Intelligence Fusion Ctr.
, pp. 13
-
-
-
184
-
-
80052773373
-
-
The one center with a redress mechanism is in Indiana. See IND. INTELLIGENCE FUSION CTR., supra note 88, at 13 ("Upon satisfactory verification (fingerprints, driver's license, or other specified identifying documentation) of his or her identity and subject to the conditions specified in K.i (2), below, an individual is entitled to know the existence of and to review the information about him or her that has been gathered and retained by the IIFC").
-
Ind. Intelligence Fusion Ctr.
, pp. 13
-
-
-
185
-
-
0242679743
-
Privatization as delegation
-
Gillian E. Metzger, Privatization as Delegation, 103 COLUM. L. REV. 1367, 1378 (2003).
-
(2003)
Colum. L. Rev.
, vol.103
, pp. 1367
-
-
Metzger, G.E.1
-
186
-
-
33745804808
-
The invisible handshake: The reemergence of the state in the digital environment
-
27
-
Michael D. Birnhack & Niva Elkin-Koren, The Invisible Handshake: The Reemergence of the State in the Digital Environment, 8 VA. J. L. & TECH 6, 27 (2003).
-
(2003)
Va. J. L. & Tech.
, vol.8
, pp. 6
-
-
Birnhack, M.D.1
Elkin-Koren, N.2
-
187
-
-
80052772869
-
Top secret America
-
For an exposé of concerns raised by our foreign and domestic intelligence apparatus, see Washington Post reporters Dana Priest and William M. Arkin's series, blog, and multimedia database on the growing U. S. intelligence community. Top Secret America, WASH. POST, http://projects.washingtonpost.com/ top-secret-america (last visited July 4, 2011).
-
Wash. Post.
-
-
Priest, D.1
William, M.2
-
189
-
-
84924180713
-
-
ALASDAIR ROBERTS, BLACKED OUT: GOVERNMENT SECRECY IN THE INFORMATION AGE 138 (2006). A Canadian tortured in Syria found it difficult to obtain redress based on repeated deflections of his queries by Canadian, Syrian, and U. S. intelligence and law enforcement agencies, each based on the asserted needs of the other entities for secrecy.
-
(2006)
Blacked Out: Government Secrecy in the Information Age
, pp. 138
-
-
Roberts, A.1
-
190
-
-
84876653915
-
Privacy and secrecy after September 11
-
Marc Rotenberg, Privacy and Secrecy after September 11, in BOMBS AND BANDWIDTH: THE EMERGING RELATIONSHIP BETWEEN INFORMATION TECHNOLOGY AND SECURITY 132, 138-39 (Robert Latham ed., 2003) (explaining that "the American tradition of seeking to protect privacy while limiting government secrecy" reflect our complementary values of privacy and openness).
-
(2003)
Bombs and Bandwidth: The Emerging Relationship Between Information Technology and Security
, pp. 132
-
-
Rotenberg, M.1
-
191
-
-
33745810301
-
-
Olmstead v. United States, 471-85
-
See Olmstead v. United States, 277 U. S. 438, 471-85 (1928) (Brandeis, J., dissenting).
-
(1928)
U. S.
, vol.277
, pp. 438
-
-
-
192
-
-
77955321939
-
Mainstreaming privacy torts
-
See generally Danielle Keats Citron, Mainstreaming Privacy Torts, 98 CALIF. L. REV. 1805 (2010) (exploring Brandeis's conception of privacy in The Right to Privacy).
-
(2010)
Calif. L. Rev.
, vol.98
, pp. 1805
-
-
Citron, D.K.1
-
193
-
-
79952841865
-
The puzzle of brandeis, privacy, and speech
-
For a fascinating historical analysis of Louis Brandeis's views on privacy and transparency, see generally Neil M. Richards, The Puzzle of
-
(2010)
Vand. L. Rev.
, vol.63
, pp. 1295
-
-
Richards, N.M.1
-
195
-
-
80052735903
-
Criminal intelligence systems operating policies
-
23
-
Criminal Intelligence Systems Operating Policies, 28 C. F. R. 20. 23 (2010).
-
(2010)
C. F. R.
, vol.28
, pp. 20
-
-
-
197
-
-
80051493909
-
-
It is interesting to note that even John Poindexter, proponent of the controversial data-mining proposal called "Total Information Awareness", embraced the use of immutable audit logs. SHANE HARRIS, THE WATCHERS 190 (2010) ("[John Poindexter] proposed an 'immutable audit trail', a master record of every analyst who had used the TIA [Total Information Awareness] system, what data they'd touched, and what they'd done with it... to spot suspicious patterns of use-Poindexter wanted to use TIA to watch the watchers.").
-
(2010)
The Watchers
, pp. 190
-
-
Harris, S.1
-
198
-
-
80052718577
-
-
MARKLE TASK FORCE, supra note 212, at 3 ("Access to the audit logs can be granted to trusted parties, such as an agency's Inspector General or the Government Accountability Office, which can assess compliance with information sharing and privacy guidelines as well as with a system's stated policies. Even for classified systems, unclassified versions of reports can be made public that describe the extent of compliance with stated policies.").
-
Markle Task Force
, pp. 3
-
-
-
201
-
-
1842538795
-
Privacy as contextual integrity
-
Helen Nissenbaum, Privacy as Contextual Integrity, 79 WASH. L. REV. 119, 155 (2004) ("[W]hether a particular action is determined a violation of privacy is a function of several variables, including the nature of the situation, or context; the nature of the information in relation to that context; the roles of agents receiving information; their relationships to information subjects; on what terms the information is shared by the subject; and the terras of further dissemination. ").
-
(2004)
Wash. L. Rev.
, vol.79
, pp. 119
-
-
Nissenbaum, H.1
-
205
-
-
42949151398
-
Washington's $8 billion shadow
-
Donald L. Barlett & James B. Steele, Washington's $8 Billion Shadow, VANITY FAIR, Mar. 2007, at 342.
-
(2007)
Vanity Fair
, pp. 342
-
-
Barlett, D.L.1
Steele, J.B.2
-
206
-
-
80052757057
-
Crisis sharpens scrutiny of security spending
-
William Maclean, Crisis Sharpens Scrutiny of Security Spending, REUTERS, Feb. 25, 2009, available at http://www.reuters.com/article/idUSTRE5iO2SM20090225 ("[B]udget pressures will force policymakers increasingly to identify waste and question big-ticket purchases of technology, a trend underpinned by worries in the West that intrusive monitoring poses a risk to civil liberties, analysts say.").
-
(2009)
Reuters
-
-
Maclean, W.1
-
207
-
-
79957540114
-
-
MATTHEW AID, THE SECRET SENTRY: THE UNTOLD HISTORY OF THE NATIONAL SECURITY AGENCY 304-05 (2009) (sharing that former senior State Department official Herbert Levin noted that while NSA can point to instances where it has been helpful, "whether they're worth the billions that are spent, is a genuine question in my mind").
-
(2009)
The Secret Sentry: The Untold History of the National Security Agency
, pp. 304-305
-
-
Aid, M.1
-
210
-
-
80052760955
-
Op-ed, the great consolidation
-
May 17
-
Ross Douthat, Op-Ed, The Great Consolidation, N. Y. TIMES, May 17, 2010, at A23;
-
(2010)
N. Y. Times
-
-
Douthat, R.1
-
211
-
-
33748587957
-
What does homeland security spending buy?
-
see also generally Veronique de Rugy, What Does Homeland Security Spending Buy? (Am. Enter. Inst., Working Paper No. 107, 2004), available at http://www.aei.org/paper/21483 (questioning the effectiveness of DHS spending and concluding that a large portion of homeland security-spending decisions are "made on a political basis rather than on a sound cost benefit analysis", leading to the traditional public choice failures that plague government spending).
-
(2004)
Am. Enter. Inst., Working Paper No. 107
-
-
De Rugy, V.1
-
212
-
-
33846176561
-
Terrorism and the constitutional order, keynote address at the fordham law review symposium: A new constitutional order?
-
Bruce Ackerman, Terrorism and the Constitutional Order, Keynote Address at the Fordham Law Review Symposium: A New Constitutional Order? (Mar. 24, 2006), in 75 FORDHAM L. REV. 475, 475 (2006) ("A downward cycle threatens: After each successful attack, politicians will come up with a new raft of repressive laws that ease our anxiety by promising greater security-only to find that a different terrorist band manages to strike a few years later.... Even if the next half-century sees only three or four attacks on a scale that dwarfs September 11, the pathological political cycle will prove devastating to civil liberties by 2050.").
-
(2006)
Fordham L. Rev.
, vol.75
, pp. 475
-
-
Ackerman, B.1
-
214
-
-
45949098739
-
-
See generally DAN ARIELY, PREDICTABLY IRRATIONAL: THE HIDDEN FORCES THAT SHAPE OUR DECISIONS (2008) (describing behavioral economics research on skewed threat assessments). As a recent profile of Cass Sunstein mentioned, there is great "difficulty in estimating the possibility of catastrophe-studies of insurance markets have found that we tend to ignore small risks until their probability passes a certain threshold, at which point we overspend wildly to prevent them."
-
(2008)
Predictably Irrational: The Hidden Forces that Shape Our Decisions
-
-
Ariely, D.1
-
215
-
-
84863900492
-
Cass sunstein wants to nudge us
-
May 16, Magazine
-
Benjamin Wallace-Wells, Cass Sunstein Wants to Nudge Us, N. Y. TIMES, May 16, 2010, (Magazine), at 42.
-
(2010)
N. Y. Times
, pp. 42
-
-
Wallace-Wells, B.1
-
217
-
-
46349083095
-
Come one, come all, join the terror target list
-
July 12
-
Eric Lipton, Come One, Come All, Join the Terror Target List, N. Y. TIMES, July 12, 2006, at Al.
-
(2006)
N. Y. Times
-
-
Lipton, E.1
-
219
-
-
77955369927
-
Domesticating intelligence
-
see also Samuel J. Rascoff, Domesticating Intelligence, 83 S. CAL. L. REV. 575, 619 (2010) ("[I]ntelligence has thus far remained impervious to rationality review, including in the narrow sense of comparing monetized costs and benefits.... Employing rationality review as a standard tool for proposed intelligence programs would represent an important development in the governance of intelligence in a number of respects.").
-
(2010)
S. Cal. L. Rev.
, vol.83
, pp. 575
-
-
Rascoff, S.J.1
-
220
-
-
77950667031
-
Just how much does that cost, anyway? An analysis of the financial costs and benefits of the "no-fly" list
-
POSNER, supra note 243, at 2; see also Marcus Holmes, Just How Much Does That Cost, Anyway? An Analysis of the Financial Costs and Benefits of the "No-Fly" List, HOMELAND SECURITY AFF. (Jan. 2009), http://www.hsaj.org/?article=5.i.6.
-
(2009)
Homeland Security Aff.
-
-
Holmes, M.1
-
222
-
-
33748325241
-
Very bad news
-
Mar. 24
-
Clifford Geertz, Very Bad News, N. Y. REV. BOOKS, Mar. 24, 2005, at 4
-
(2005)
N. Y. Rev. Books
, pp. 4
-
-
Geertz, C.1
-
223
-
-
27944458260
-
-
(reviewing RICHARD A. POSNER, CATASTROPHE: RISK AND RESPONSE (2004) and concluding that Posner's method is too susceptible to manipulation to be reliable).
-
(2004)
Catastrophe: Risk and Response
-
-
Posner, R.A.1
-
226
-
-
80052716643
-
-
Balkin, supra note 156, at 15 (describing the emergence of a "National Surveillance State", which could easily lead government to "create a parallel track of preventative law enforcement" that avoids the "traditional guarantees of the Bill of Rights"). For an especially insightful analysis of the rule of law problems raised by the transparency of personal information posted online, see Joel R. Reidenberg, Transparent Citizens and the Rule of Law (Feb. I, 2010), http://cyber.law.harvard.edu/events/2010/ 02/reidenberg.
-
(2010)
Transparent Citizens and the Rule of Law
-
-
Reidenberg, J.R.1
-
228
-
-
80052708313
-
Wartime executive power and the national security agency's surveillance authority: Hearing before the S. Comm. on the judiciary
-
Wartime Executive Power and the National Security Agency's Surveillance Authority: Hearing Before the S. Comm. on the Judiciary, 109th Cong. 11 (2006) (statement of Alberto R. Gonzales, U. S. Att'y Gen.) ("[S]peed, agility and secrecy are essential to... [the terrorist surveillance program's] success.").
-
(2006)
109Th Cong
, pp. 11
-
-
-
229
-
-
0242671795
-
Chaos and rules: Should responses to violent crises always be constitutional?
-
Until 9/11, the concept of "emergency" or "exception" had been a neglected topic in American constitutional law. Oren Gross, Chaos and Rules: Should Responses to Violent Crises Always Be Constitutional?, 112 YALE L. J. ZOII, 1015 n. 8 (2003);
-
(2003)
Yale L. J. Zoii
, vol.112
, Issue.8
, pp. 1015
-
-
Gross, O.1
-
231
-
-
61849136231
-
Our schmittian administrative law
-
1101
-
Adrian Vermeule, Our Schmittian Administrative Law, 122 HARV. L. REV. 1095, 1101 (2009).
-
(2009)
Harv. L. Rev.
, vol.122
, pp. 1095
-
-
Vermeule, A.1
-
232
-
-
20644460331
-
-
Korematsu v. United States, 221
-
Korematsu v. United States, 323 U. S. 214, 221 (1944);
-
(1944)
U. S.
, vol.323
, pp. 214
-
-
-
233
-
-
33746039740
-
-
4 Wall., 4
-
Ex parte Milligan, 71 U. S. (4 Wall.) 2, 4 (1866).
-
(1866)
U. S.
, vol.71
, pp. 2
-
-
Milligan1
-
234
-
-
33645136625
-
Law in a time of emergency: States of exception and the temptations of 9/11
-
Kim Lane Scheppele, Law in a Time of Emergency: States of Exception and the Temptations of 9/11, 6 U. PA. J. CONST. L. 1001 (2004).
-
(2004)
U. Pa. J. Const. L
, vol.6
, pp. 1001
-
-
Scheppele, K.L.1
-
237
-
-
84870614722
-
-
In re City of N. Y., 607 F.3d 923, 928 (2d Cir. 2010). The federal Freedom of Information Act, or FOIA, exempts "records or information compiled for law enforcement purposes" if disclosure may harm law enforcement activities or the public interest generally.
-
(2010)
F.3d
, vol.607
, pp. 923
-
-
-
238
-
-
30144439568
-
-
See 5 U. S. C. § 552 (b) (7) (2006).
-
(2006)
U. S. C.
, vol.5
, pp. 552
-
-
-
239
-
-
80052778854
-
City of NY
-
In re City of N. Y., 607 F.3d at 944. 273.
-
F.3d
, vol.607
, pp. 944
-
-
-
240
-
-
29044437483
-
The mosaic theory, national security, and the freedom of information act
-
631
-
David E. Pozen, The Mosaic Theory, National Security, and the Freedom of Information Act, 115 YALE LJ. 628, 631 (2005).
-
(2005)
Yale Lj
, vol.115
, pp. 628
-
-
Pozen, D.E.1
-
241
-
-
80052703508
-
-
32 C. F. R. § 701. 31 (2010). Pozen has argued that [w]hen courts permit the government to withhold even the most innocuous-seeming (and politically controversial) items of information without specifying how each item might contribute to a dangerous mosaic, they enable spurious claims and disable counterargument. Understanding this, agencies gravitate to the mosaic theory when they know their case for secrecy is weak.
-
(2010)
C. F. R.
, vol.32
, pp. 701
-
-
-
242
-
-
80052699881
-
The mosaic theory
-
Feb. 28
-
David Pozen, The Mosaic Theory, HARTFORD COURANT (Feb. 28, 2006), http://articles.courant.com/20o6-02-28/news/o6o228oi43-i-patriot-act-national- security-agency-information-security-oversightoffice.
-
(2006)
Hartford Courant
-
-
Pozen, D.1
-
243
-
-
84896173227
-
-
N. J. Media Grp., Inc. v. Ashcroft, 219 3d Cir
-
N. J. Media Grp., Inc. v. Ashcroft, 308 F.3d 198, 219 (3d Cir. 2002).
-
(2002)
F.3d
, vol.308
, pp. 198
-
-
-
244
-
-
84909395949
-
-
See HANNA FENICHEL PITKIN, THE ATTACK OF THE BLOB: HANNAH ARENDT AND THE CONCEPT OF THE SOCIAL 6-7 (1998) ("The real-world problem that Arendt intended her concept of the social to address... concerns the gap between our enormous, still-increasing powers and our apparent helplessness to avert the various disasters-national, regional, and global-looming on our horizon. ").
-
(1998)
The Attack of the Blob: Hannah Arendt and the Concept of the Social
, pp. 6-7
-
-
Pitkin, H.F.1
-
245
-
-
80052778854
-
-
In re City of N. Y., 607 F.3d at 944.
-
F.3d
, vol.607
, pp. 944
-
-
-
246
-
-
33645110017
-
-
See, e.g., N. Y. Times Co. v. United States, 403 U. S. 713, 714 (1971) (permitting newspapers to publish then-classified material, popularly known as the "Pentagon Papers.").
-
(1971)
U. S.
, vol.403
, pp. 713
-
-
-
247
-
-
75649124508
-
Deep secrecy
-
Courts are particularly cautious about unearthing the "deep secrets" that may be at the core of a nation's national security strategy. See, e.g., David E. Pozen, Deep Secrecy, 62 STAN. L. REV. 257, 260 (2010) ("Sometimes, outside parties are aware that a secret exists even though they are ignorant of its content-[This is] a shallow secret. Other times, outside parties are unaware of a secret's existence; they are in the dark about the fact that they are being kept in the dark-[This is] a deep secret.").
-
(2010)
Stan. L. Rev.
, vol.62
, pp. 257
-
-
Pozen, D.E.1
-
248
-
-
80052765536
-
Courts, congress shun addressing legality of warrantless eavesdropping
-
See, e.g., David Kravets, Courts, Congress Shun Addressing Legality of Warrantless Eavesdropping, WIRED (Jan. 29, 2010), http://vvww.wired.com/ threatlevel/2010/01/legality-of-warrantlesseavesdropping/.
-
(2010)
Wired
-
-
Kravets, D.1
-
249
-
-
80052731867
-
-
The existing Civil Liberties Assessment for the State, Local, and Regional Fusion Center Initiative performed by the DHS offers vague promises of compliance with little detail about execution. See CIVIL LIBERTIES IMPACT ASSESSMENT, supra note 35.
-
Civil Liberties Impact Assessment
-
-
-
250
-
-
0347735633
-
Financial derivatives and the costs of regulatory arbitrage
-
Frank Partnoy, Financial Derivatives and the Costs of Regulatory Arbitrage, 22 J. CORP. L. 211, 227 (1997) (defining regulatory arbitrage in the financial sector as "transactions designed specifically to reduce costs or capture profit opportunities created by differential regulations or laws").
-
(1997)
J. Corp. L
, vol.22
, pp. 211
-
-
Partnoy, F.1
-
251
-
-
72649089002
-
The AIG bailout
-
William K. Sjostrom, Jr., The AIG Bailout, 66 WASH. & LEE L. REV. 943, 987-88 (2009) ("The basic definition of insurance is '[a] contract by which one party (the insurer) undertakes to indemnify another party (the insured) against risk of loss, damage, or liability arising from the occurrence of some specified contingency.' A CDS [credit default swap] certainly appears to fall within this definition given that the protection seller contractually agrees to compensate the protection buyer following the occurrence of a credit event. Notwithstanding their insurance-like characteristics, CDSs generally have not been considered insurance for purposes of state insurance regulations and, therefore, have not been subject to these regulations." (first alteration in original) (footnotes omitted)
-
(2009)
Wash. & Lee L. Rev.
, vol.66
, pp. 943
-
-
Sjostrom Jr., W.K.1
-
253
-
-
77952282132
-
The future of the securities and exchange commission as a market regulator
-
Roberta S. Karmel, The Future of the Securities and Exchange Commission as a Market Regulator, 78 U. CIN. L. REV. 501, 524 (2010) ("Credit derivatives operate functionally as short sales of bonds with virtually unlimited risks. This is because the buyer of a credit default swap does not have to own the bond or any other debt instrument upon which such a contract is based. So buyers can purchase a 'naked short' on the debt of companies without any restrictions.... The head of the New York State Insurance Department called credit derivatives 'legalized gambling.'"
-
(2010)
U. Cin. L. Rev.
, vol.78
, pp. 501
-
-
Karmel, R.S.1
-
254
-
-
80052759483
-
DTCC may raise credit-default swap disclosure amid criticism
-
(footnotes omitted) (quoting Shannon D. Harrington, DTCC May Raise Credit-Default Swap Disclosure Amid Criticism, BLOOMBERG (Oct. 31, 2008), http://www.bloomberg.com/apps/news?pid=newsarchive&sid=ailF5ibQBk9w& refer=home)).
-
(2008)
Bloomberg
-
-
Harrington, S.D.1
-
255
-
-
80052776234
-
-
see also Frank Pasquale, Deregulatory Fundamentalism at OCC, OTS, AND SCOTUS, CONCURRING OPINIONS (Oct. 15, 2008, 9:13 PM), http://www. concurrtagopiriions.com/archives/20o8/io/deregulatory-fu.html (describing the financial institutions' ability to choose the least restrictive regulator of risky activities).
-
(2008)
Occ, Ots, and Scotus, Concurring Opinions
-
-
Pasquale, F.1
-
256
-
-
80052733325
-
The gentle art of corporate seduction: Tax incentives in the united states and the European Union
-
See, e.g., Tracy A. Kaye, The Gentle Art of Corporate Seduction: Tax Incentives in the United States and the European Union, 57 U. KAN. L. REV. 93, 117 (2008) ("By fostering a 'race to the bottom' in which states must continually increase tax incentives in order to lure businesses, tax competition undermines the ability of state and local government to finance the investments in public education and infrastructure that provide the foundation for future economic growth.").
-
(2008)
U. Kan. L. Rev.
, vol.57
, pp. 93
-
-
Kaye, T.A.1
-
257
-
-
80052778123
-
-
Installation of Slot Mach. on U. S. Naval Base Guantanamo Bay, 6 OP. O. L. C. 236, 238 (1982) (finding that the station at Guantanamo is not a "possession" of the United States);
-
(1982)
Op. O. L. C.
, vol.6
, pp. 236
-
-
-
258
-
-
80052779812
-
-
Customs Duties-Goods Brought into U. S. Naval Station at Guantanamo Bay, Cuba, 35 Op. Att'y Gen. 536, 537 (1929) (analyzing Guantanamo's status in the context of a review of other military bases);
-
(1929)
Op. Att'Y Gen.
, vol.35
, pp. 536
-
-
-
260
-
-
0346308435
-
Anomalous zones
-
Gerald L. Neuman, Anomalous Zones, 48 STAN. L. REV. 1197, 1197 (1996); (Pubitemid 126406376)
-
(1996)
Stanford Law Review
, vol.48
, Issue.5
, pp. 1197
-
-
Neuman, G.L.1
-
261
-
-
27744555602
-
Guantanamo bay: The legal black hole
-
1
-
Johan Steyn, Guantanamo Bay: The Legal Black Hole, 53 INT'L & COMP. L. Q. 1, 1 (2004).
-
(2004)
Int'L & Comp. L. Q.
, vol.53
, pp. 1
-
-
Steyn, J.1
-
262
-
-
80052709717
-
-
The DHS has dismissed concerns about regulatory arbitrage, noting that fusion centers would adopt written privacy policies that "should be consistent with the guidance issued by the PM-ISE, and to the extent possible clearly delineate authorities for each fusion center participant to eliminate the potential for 'policy shopping' raised by one critic." PRIVACY IMPACT ASSESSMENT, supra note 7, at 27.
-
Privacy Impact Assessment
, pp. 27
-
-
-
263
-
-
53849103055
-
-
PAUL R. VERKUIL, OUTSOURCING SOVEREIGNTY 5 (2007) ("Political officials, who are appointed for short periods and enter service through the famous revolving door, sometimes utilize outsourcing both as a means of getting results and as a way of preserving later career opportunities. Homeland Security seems to be the paradigm case.... More than two-thirds of the Department's most senior executives... have moved to private positions, some with companies who receive lucrative contracts from the agency.").
-
(2007)
Outsourcing Sovereignty
, pp. 5
-
-
Verkuil, P.R.1
-
265
-
-
80052716158
-
-
Id. ("[PIAB] is an entity that exists in order to provide the president with essential information regarding intelligence and national security matters."). The board was known as the President's Foreign Intelligence Advisory Board (PFIAB) from May 4, 1961 to February 29, 2008, when President George W. Bush renamed it the President's Intelligence Advisory Board. Exec. Order No. 13462, 73 Fed. Reg. 11, 805 (Mar. 4, 2008) ("References in Executive Orders other than this order, or in any other presidential guidance, to the 'President's Foreign Intelligence Advisory Board' shall be deemed to be references to the President's Intelligence Advisory Board established by this order."). The name change reflects the expanding focus of intelligence agencies to gather not only foreign, but also domestic intelligence.
-
(2008)
Fed. Reg.
, vol.73
, pp. 11
-
-
-
266
-
-
80052736853
-
-
Exec. Order No. 12, 863
-
Exec. Order No. 12, 863, 3 C. F. R. 632 (1993);
-
(1993)
C. F. R.
, vol.3
, pp. 632
-
-
-
267
-
-
77955377112
-
-
Exec. Order No. 12, 334, 955
-
Exec. Order No. 12, 334, 46 Fed. Reg. 59, 955 (1981);
-
(1981)
Fed. Reg.
, vol.46
, pp. 59
-
-
-
268
-
-
84928839045
-
Comment, speaking truth to power: Intelligence oversight in an imperfect world
-
David Everett Colton, Comment, Speaking Truth to Power: Intelligence Oversight in an Imperfect World, 137 U. PA. L. REV. 571, 611, n. 177. ("The PFIAB is composed of prominent citizens who serve at the pleasure of the President. The PFIAB is charged with monitoring the performance, organizations, personnel, collection, or evaluation of intelligence within the intelligence community."). Colton complained that, during the 1980s, "The PFIAB is sadly lacking in power and prestige."
-
U. Pa. L. Rev.
, vol.137
, Issue.177
, pp. 571
-
-
Colton, D.E.1
-
269
-
-
80052770948
-
Getting on board: How an obscure panel could fix the U. S. intelligence community
-
Id. However, a more recent assessment has been more positive. Kenneth Michael Absher et al., Getting on Board: How an Obscure Panel Could Fix the U. S. Intelligence Community, FOREIGN AFF. (Sept. 17, 2009), http://www. foreignaffairs.com/print/65415 ("The PIAB is a unique presidential asset that, if properly employed, could help identify and meet the intelligence challenges that future presidents will face.").
-
(2009)
Foreign Aff.
-
-
Absher, K.M.1
-
270
-
-
77954361490
-
European versus American liberty: A comparative privacy analysis of antiterrorism data mining
-
HEYMANN & KAYYEM, supra note 296, at 113. Some commentators go further, arguing that the data mining issue demands an "independent privacy agency." Francesca Bignami, European Versus American Liberty: A Comparative Privacy Analysis of Antiterrorism Data Mining, 48 B. C. L. REV. 609, 696-97 (2007).
-
(2007)
B. C. L. Rev.
, vol.48
, pp. 609
-
-
Bignami, F.1
-
271
-
-
80052709716
-
-
The Foreign Intelligence Surveillance Court is a secret court that consists of eleven district court judges, at least three of whom must live within twenty miles of the District of Columbia. See 50 U. S. C. § 1803 (a) (Supp. 111 2009).
-
(2009)
U. S. C.
, vol.50
, Issue.111 SUPPL.
-
-
-
272
-
-
84876247494
-
-
Pub L. No. 95-511, 92 Stat 1783
-
Stat
, vol.92
, pp. 1783
-
-
-
273
-
-
80052710858
-
-
(codified in scattered sections of 50 U. S. C. (2006)).
-
(2006)
U. S. C.
, vol.50
-
-
-
274
-
-
0346308014
-
Physical searches under fisa: A constitutional analysis
-
Daniel J. Malooly, Physical Searches Under FISA: A Constitutional Analysis, 35 AM. CRIM. L. REV. 411, 413-14 (1998). (Pubitemid 128421762)
-
(1998)
American Criminal Law Review
, vol.35
, Issue.2
, pp. 411
-
-
Malooly, D.J.1
-
275
-
-
79251610223
-
A hidden world, growing beyond control
-
This would not be an insurmountable barrier to participation since an "estimated 854, 000 people... hold top-secret security clearances." Dana Priest & William M. Arkin, A Hidden World, Growing Beyond Control, WASH. POST, July 19, 2010, at A1.
-
(2010)
Wash. Post.
-
-
Priest, D.1
Arkin, W.M.2
-
276
-
-
80052707310
-
The overgrowth of intelligence programs since Sept. II
-
Editorial, The Overgrowth of Intelligence Programs Since Sept. II, WASH. POST, July 22, 2010, at A18 (reporting Clapper's response to questions at his Senate confirmation hearing).
-
(2010)
Wash. Post.
-
-
-
277
-
-
79952475486
-
Domestic federal interagency planning: Meeting a homeland security need
-
Homeland security managers have recognized the importance of improving interagency relationships. See, e.g., Kenneth E. Christopher et al., Domestic Federal Interagency Planning: Meeting a Homeland Security Need, 7 (1) J. HOMELAND SECURITY & EMERGENCY MGMT. 20 (Apr. 2010) at 11 (recommending "enhanced interagency planning capability").
-
(2010)
J. Homeland Security & Emergency Mgmt
, vol.7
, Issue.1
, pp. 20
-
-
Christopher, K.E.1
-
278
-
-
33749182513
-
Internal separation of powers: Checking today's most dangerous branch from within
-
The Administrative Procedure Act does not attempt to formalize interagency cooperation, which is mainly accomplished via ad hoc Memoranda of Understanding and other informal modes of cooperation. Neal Kumar Katyal, Internal Separation of Powers: Checking Today's Most Dangerous Branch from Within, 115 YALE L. J. 2314, 2327 (2006) (discussing overlapping agency authority).
-
(2006)
Yale L. J.
, vol.115
, pp. 2314
-
-
Katyal, N.K.1
-
279
-
-
70349244268
-
Can interagency dialogue serve as the new separation of powers?
-
See, e.g., Christopher S. Yoo, Can Interagency Dialogue Serve as the New Separation of Powers?, 116 YALE L. J. POCKET PART 131, 132 (2006) (discussing extant "multi-agency consultations").
-
(2006)
Yale L. J. Pocket Part
, vol.116
, pp. 131
-
-
Yoo, C.S.1
-
280
-
-
80052698487
-
-
12 C. F. R. pt. 34, app. A to subpt. D (2010);
-
(2010)
C. F. R.
, vol.12
, pp. 34
-
-
-
281
-
-
80052698001
-
-
C. F. R. pt. 208, app. C (2010);
-
(2010)
C. F. R.
, vol.12
, pp. 208
-
-
-
282
-
-
80052760460
-
-
C. F. R. pt. 365 (2010).
-
(2010)
C. F. R.
, vol.12
, pp. 365
-
-
-
283
-
-
80052712324
-
Real estate lending standards
-
Real Estate Lending Standards, 57 Fed. Reg. 62, 890, 62, 890 (Dec. 31, 1992).
-
(1992)
Fed. Reg.
, vol.57
, pp. 62
-
-
-
284
-
-
79959235553
-
-
BETHANY MCLEAN & JOE NOCERA, ALL THE DEVILS ARE HERE: THE HIDDEN HISTORY OF THE FINANCIAL CRISIS 94 (2010) ("'[G]uidance' was only guidance, which lenders could adopt or ignore as they saw fit, depending on how zealously the regulators enforced it. No antipredatory lending bill was ever passed; no strictures against most of the practices were ever enforced; no serious effort was ever made to make financial institutions pay more attention to the loans they were buying and securitizing.").
-
(2010)
All the Devils are Here: The Hidden History of the Financial Crisis
, pp. 94
-
-
Mclean, B.1
Nocera, J.2
-
285
-
-
79551571924
-
The OCC's preemption rules exceed the agency's authority and present a serious threat to the dual banking system and consumer protection
-
226
-
Arthur E. Wilmarth, Jr., The OCC's Preemption Rules Exceed the Agency's Authority and Present a Serious Threat to the Dual Banking System and Consumer Protection, 23 ANN. REV. BANKING & FIN. L. 225, 226 (2004).
-
(2004)
Ann. Rev. Banking & Fin. L
, vol.23
, pp. 225
-
-
Wilmarth Jr., A.E.1
-
286
-
-
42149179461
-
The growing threat to middle class families
-
Elizabeth Warren, The Growing Threat to Middle Class Families, 69 BROOK. L. REV.; 401, 402 (2004) [hereinafter Warren, Growing Threat];
-
(2004)
Brook. L. Rev.
, vol.69
, pp. 401
-
-
Warren, E.1
-
287
-
-
83655208710
-
Unsafe at any rate
-
Elizabeth Warren, Unsafe at Any Rate, 5 DEMOCRACY: J. IDEAS 8, 8-9 (2007) [hereinafter Warren, Unsafe].
-
(2007)
Democracy: J. Ideas
, vol.5
, pp. 8
-
-
Warren, E.1
-
290
-
-
80052726669
-
Robert gnaizda: My crime was not curbing the guilty
-
see also Robert Gnaizda, Robert Gnaizda: My Crime Was Not Curbing the Guilty, OPPOSING VIEWPOINTS (Jan. 6, 2011), http://www.opposingviews.com/i/ robert-gnaizda-my-crime-was-not-curbing-the-guilty ("In 1999 and in 2000, we met with Fed Chairman Alan Greenspan to criticize the Federal Reserve's laissez-faire attitude toward the major subprime lenders, such as Ameriquest. We asked that Greenspan urge all major financial institutions to set a fiduciary 'gold standard' that could effectively compete with and possibly eliminate the unregulated subprime industry. The chairman refused. Stymied by both the Clinton and Bush administrations' refusal to act, we failed to continue to protest publicly. A big mistake. In 2004, we convened a meeting with the 15 largest financial institutions engaged in adjustable-rate mortgages, including Countrywide, to urge that they substantially revise and raise their standards due to the dangers of adjustable-rate mortgages, including option ARMs. Getting no support, we met with Greenspan in July 2004 to specifically complain about these practices and used Countrywide as a prime example. Greenspan stated that he had reviewed our documents and that, even with a doctorate in math, you could not understand these mortgages. But he refused to do anything.").
-
(2011)
Opposing Viewpoints
-
-
Gnaizda, R.1
-
292
-
-
80052709715
-
-
see also NICOLE GEUNAS, AFTER THE FALL: SAVING CAPITALISM FROM WALL STREET-AND WASHINGTON 150 (2009) (reporting that Federal Reserve chairman Ben Bernanke warned during the third week of September 2008 that "there will be no economy on Monday" if bailouts of key institutions were not arranged).
-
(2009)
After the Fall: Saving Capitalism from Wall Street-and Washington
, pp. 150
-
-
Geunas, N.1
-
293
-
-
79955560629
-
-
Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010, Pub. L. No. 111-203, 124 Stat. 1376 (2010).
-
(2010)
Stat
, vol.124
, pp. 1376
-
-
-
294
-
-
79958170315
-
-
12 U. S. C. § 5481.
-
U. S. C.
, vol.12
, pp. 5481
-
-
-
296
-
-
84883099020
-
-
Dodd-Frank Act, § 112, 124 Stat, at 1398-98.
-
Stat
, vol.124
, pp. 1398-1398
-
-
-
298
-
-
80052696297
-
Interagency statement on subprime mortgage lending
-
F. J. Ornstein et al., Interagency Statement on Subprime Mortgage Lending, 61 CONSUMER FIN. L. Q. REP. 176, 178 (2007) (discussing state of the law prior to enactment of the Dodd-Frank Act).
-
(2007)
Consumer Fin. L. Q. Rep.
, vol.61
, pp. 176
-
-
Ornstein, F.J.1
-
299
-
-
80052694846
-
-
SKADDEN LLP, supra note 326, at 4.
-
Skadden Llp
, pp. 4
-
-
-
300
-
-
80052759014
-
-
12 U. S. C § 5311 (2010) (describing the FSOC, also frequently referred to as the "Systemic Risk Council").
-
(2010)
U. S. C.
, vol.12
, pp. 5311
-
-
-
301
-
-
80052772868
-
Police and national security: American local law enforcement and counterterrorism after 9/11
-
396
-
Matthew C. Waxman, Police and National Security: American Local Law Enforcement and Counterterrorism After 9/11, 3 J. NAT'L SECURITY L. & POL'Y 377, 396 (2009).
-
(2009)
J. Nat'L Security L. & Pol'Y
, vol.3
, pp. 377
-
-
Waxman, M.C.1
-
302
-
-
80052760954
-
-
George W. Bush, President of the U. S., Remarks at the National Day of Prayer and Remembrance at Episcopal National Cathedral (Sept. 14, 2001), transcript available at http://georgewbush-whitehouse.archives.gov/news/ releases/2001/09/200xo914-2.html.
-
-
-
|