11. GOVERNMENT DATABASES

  1.    Abe Mashal, No Spy No Fly (2011), 150–51.

  2.    Id. at 151.

  3.    Id. at 151–52.

  4.    Id. at 27, 32, 34, 49, 57–60.

  5.    Id. at 74–76, 79.

  6.    Id. at 114, 137–38, 146; Interview by Barry Friedman with Abe Mashal, Jan. 9, 2014 (hereinafter Mashal Interview).

  7.    Mashal, No Spy No Fly, supra note 1, at 152.

  8.    Id. at 161–62.

  9.    Mashal, No Spy No Fly, supra note 1, at 162; Mashal Interview, supra note 6.

  10.  Mashal, No Spy No Fly, supra note 1, at 10–12, 140–46, 161.

  11.  Susan Stellin, “Security Check Now Starts Long Before You Fly,” N.Y Times, Oct. 22, 2013, at A1.

  12.  Susan N. Herman, Taking Liberties: The War on Terror and the Erosion of American Democracy (2011), 66; Sara Kehaulani Goo, “Sen. Kennedy Flagged by No-Fly List,” Wash. Post, Aug. 20, 2004, www.washingtonpost.com/wp-dyn/articles/A17073-2004Aug19.html; Rick Bowmer, “Terror List Snag Nearly Grounded Ted Kennedy,” USA Today, Aug. 19, 2004 8:27 p.m., http://usatoday30.usatoday.com/news/washington/2004-08-19-kennedy-list_x.htm (quoting Senator Kennedy).

  13.  Simon Chesterman, One Nation Under Surveillance: A New Social Contract to Defend Freedom Without Sacrificing Liberty (2011), 231 (“link government databases” (citing Charles Sykes, The End of Privacy: The Attack on Personal Rights at Home, at Work, On-Line, and in Court (1999)); Stellin, “Security Check Now Starts Long Before You Fly,” supra note 11 (EPIC lawyer).

  14.  Stellin, “Security Check Now Starts Long Before You Fly,” supra note 11; Erin Murphy, “The Politics of Privacy in the Criminal Justice System: Information Disclosure, the Fourth Amendment, and Statutory Law Enforcement Exemptions,” Mich. L. Rev. 111 (2013): 504.

  15.  Integrated Automated Fingerprint Identification System, FBI, www.fbi.gov/about-us/cjis/fingerprints_biometrics/iafis/iafis; James B. Jacobs, The Eternal Criminal Record (2015), 39; Leon Neyfakh, “The Future of Getting Arrested,” The Atlantic, Dec. 28, 2014, 7:43 p.m., www.theatlantic.com/magazine/archive/2015/01/the-future-of-getting-arrested/383507. Much of this account comes from my colleague Erin Murphy’s article “Databases, Doctrine and Constitutional Criminal Procedure,” Fordham Urb. L.J. 37 (2010): 806–808.

  16. Data Mining: Federal Efforts Cover a Wide Range of Uses, GAO-04-548 (2004) (database revolution); Thomas Friedman, “Moore’s Law Turns 50,” N.Y. Times, May 13, 2015, www.nytimes.com/2015/05/13/opinion/thomas-friedman-moores-law-turns-50.html (Intel); James Bamford, “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say),” Wired, Mar. 15, 2015, 7:24 p.m., www.wired.com/2012/03/ff_nsadatacenter; Lucas Mearian, “By 2020 There Will Be 5,200 GB of Data for Every Person on Earth,” Computerworld, Dec. 11, 2012, 5:29 a.m., www.computerworld.com/article/2493701/data-center/by-2020-there-will-be-5-200-gb-of-data-for-every-person-on-earth.html; “What Is Big Data?,” IBM, www-01.ibm.com/software/data/bigdata/what-is-big-data.html; Sebastian Anthony, “Samsung Unveils 2.5-inch 16TB SSD: The World’s Largest Hard Drive,” Ars Technica, Aug. 13, 2015, 9:14 a.m., http://arstechnica.com/gadgets/2015/08/samsung-unveils-2-5-inch-16tb-ssd-the-worlds-largest-hard-drive/; “What’s a Byte?,” www.whatsabyte.com/.

  17.  National Crime Information Center, FBI, www.fbi.gov/about-us/cjis/ncic; Terrorism Identities Datasmart Environment (TIDE) (2014), www.nctc.gov/docs/tidefactsheet_aug12014.pdf; Karen DeYoung, “Terror Database Has Quadrupled in Four Years,” Wash. Post, Mar. 25, 2007, www.washingtonpost.com/wp-dyn/content/article/2007/03/24/AR2007032400944.html.

  18.  Stellin, “Security Check Now Starts Long Before You Fly,” supra note 11; see also Ryan Singel, “U.S. Airport Screeners Are Watching What You Read,” Wired, Sept. 20, 2007, http://archive.wired.com/politics/onlinerights/news/2007/09/flight_tracking; Automated Targeting System, Electronic Privacy Information Center, https://epic.org/privacy/travel/ats/.

  19.  Permanent Subcomm. on Investigations of the S. Comm. on Homeland Sec. & Gov’t Aff., Federal Support for and Involvement in State and Local Fusion Centers (2012), 5, www.hsgac.senate.gov/download/?id=49139e81-1dd7-4788-a3bb-d6e7d97dde04 (hereafter Federal Support for State and Local Fusion Centers); National Commission on Terrorist Attacks upon the United States, The 9/11 Commission Report (2004), 416–19; Homeland Security Act of 2002, Pub. L. No. 107-296, §§ 111–113, 116 Stat. 2135, 2142–45 (codified at 6 U.S.C. §§111–113 (2006)) (establishing the Department of Homeland Security); John D. Negroponte, Dir. Nat’l Intelligence, “Remarks to the FBI National Academy,” Oct. 3, 2006, www.dni.gov/files/documents/Newsroom/Speeches and Interviews/20061003_speech.pdf.

  20.  Danielle Keats Citron and Frank Pasquale, “Network Accountability for the Domestic Intelligence Apparatus,” Hastings L.J. 62 (2011): 1458 (“all hazards, all crimes, all threats”); Michael Price, Brennan Ctr. for Justice, National Security and Local Police (2013), 20, www.brennancenter.org/sites/default/files/publications/NationalSecurity_LocalPolice_web.pdf (“skills would atrophy”); John W. Whitehead, A Government of Wolves: The Emerging American Police State (2013), 118; James B. Perrine, Verne H. Speirs, and Jonah J. Horwitz, Fusion Centers and the Fourth Amendment: Application of the Exclusionary Rule in the Post-9/11 Age of Information Sharing, Cap. U. L. Rev. 38 (2010): 735; Alice Lipowicz, Boeing to Staff FBI Fusion Center, Wash. Tech., June 1, 2007, https://washingtontechnology.com/articles/2007/06/01/Boeing-to-staff-FBi-Fusion-Center.aspx; Colin Wood, “New Partnership to Help Fusion Centers Streamline Intelligence Gathering, Dissemination,” Gov’t Tech., July 16, 2015, www.govtech.com/public-safety/New-Partnership-to-Help-Fusion-Centers-Streamline-Intelligence-Gathering-Dissemination.html.

  21.  Michael German and Jay Stanley, ACLU, What’s Wrong with Fusion Centers? (2007), 16, www.aclu.org/files/pdfs/privacy/fusioncenter_20071212.pdf (Bill Harris); Citron and Pasquale, “Network Accountability for the Domestic Intelligence Apparatus,” supra note 20, at 1451 (R.I. State Patrol).

  22.  Information Sharing Environment Functional Standard Suspicious Activity Reporting Version 1.5.5 42-51, 55, https://nsi.ncirc.gov/documents/SAR_FS_1.5.5_PMISE.pdf; Mike German and Jay Stanley, ACLU, Fusion Center Update (2008), 2, www.aclu.org/files/pdfs/privacy/fusion_update_20080729.pdf (LAPD).

  23.  Reed Elsevier to Acquire Choicepoint for 3.6 billion, N.Y. Times, Feb. 21, 2008, www.nytimes.com/2008/02/21/technology/21iht-reed.4.10279549.html; RELX Group, Annual Reports and Financial Statements (2014), 5, www.relx.com/investorcentre/reports%202007/Documents/2014/relxgroup_ar_2014.pdf; Steve Kroft, “The Data Brokers: Selling Your Personal Information,” CBS News, Mar. 9, 2014, www.cbsnews.com/news/the-data-brokers-selling-your-personal-information/; Ryan Gallagher, “Defense Giant Builds ‘Google for Spies’ to Track Social Networking Users,” The Guardian, Feb. 11, 2013, at p.1; Brian Urch, “How Raytheon Software Tracks You Online—Video,” The Guardian, Feb. 10, 2013, www.theguardian.com/world/video/2013/feb/10/raytheon-software-tracks-online-video.

  24.  Jacob Goodwin, “Intrado Accesses Personal Data Quickly to Assist Law Enforcement,” Gov’t Sec. News, Oct. 15, 2012, 10:46 a.m., http://gsnmagazine.com/article/27594/intrado_accesses_personal_data_quickly_assist_law_; Daniel J. Steinbock, “Data Matching, Data Mining, and Due Process,” Ga. L. Rev. 40 (2005): 13–16 (citing Data Mining, supra note 16); Walter L. Perry et al., Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations (2013), 36–41, www.rand.org/content/dam/rand/pubs/research_reports/RR200/RR233/RAND_RR233.pdf; Brent Skorup, “Cops Scan Social Media to Help Assess Your ‘Threat Rating,’” Reuters, Dec. 12, 2014, http://blogs.reuters.com/great-debate/2014/12/12/police-data-mining-looks-through-social-media-assigns-you-a-threat-level/.

  25.  Matt Stroud, “The Minority Report: Chicago’s New Police Computer Predicts Crimes, but Is It Racist?,” The Verge, Feb. 19, 2014, 9:31 a.m., www.theverge.com/2014/2/19/5419854/the-minority-report-this-computer-predicts-crime-but-is-it-racist; David Smiley, “Not Science Fiction: Miami Wants to Predict When and Where Crime Will Occur,” Miami Herald, Apr. 23, 2015, 8:21 a.m., www.miamiherald.com/news/local/community/miami-dade/article19256145.html.

  26.  Urch, “How Raytheon Software Tracks You Online—Video,” supra note 23.

  27.  Goodwin, “Intrado Accesses Personal Data Quickly to Assist Law Enforcement,” supra note 24.

  28.  DeYoung, “Terror Database Has Quadrupled in Four Years,” supra note 17.

  29.  Jacobs, The Eternal Criminal Record, supra note 15, at 25 (“baggy pants and tight shirts”); Doreen Carvajal, “O.C. Girl Challenges Police Photo Policy: Lawsuit: Attorneys Contend Youths’ Attire, Race Made Them Targets of Mug Shots for Gang File,” L.A. Times, May 20, 1994, http://articles.latimes.com/1994-05-20/news/mn-60111_1_police-department (“If you have a problem with this, then don’t come to my city.”); Emily Thode, “San Diegans Say Police Wrongly Documented Them as Gang Members Because of Neighborhood,” ABC10 News, May 3, 2015, www.10news.com/news/san-diegans-say-police-wrongly-documented-them-as-as-gang-members-because-of-neighborhood.

  30.  Citron and Pasquale, “Network Accountability for the Domestic Intelligence Apparatus,” supra note 20, at 1444–45, 1458–59 (Bob Barr and Ron Paul); Brandon Ellington Patterson, “Black Lives Matter Organizers Labeled as Threat Actors,” Mother Jones, Aug. 3, 2015, www.motherjones.com/politics/2015/07/zerofox-report-baltimore-black-lives-matter; George Joseph, “Feds Regularly Monitored Black Lives Matter,” The Intercept, July 24, 2015, https://theintercept.com/2015/07/24/documents-show-department-homeland-security-monitoring-black-lives-matter-since-ferguson/.