Taking Liberties: The War on Terror and the Erosion of American Democracy (45 page)

Read Taking Liberties: The War on Terror and the Erosion of American Democracy Online

Authors: Susan N. Herman

Tags: #History, #United States, #21st Century, #Law, #Civil Rights, #Intellectual Property, #General, #Political Science, #Terrorism

BOOK: Taking Liberties: The War on Terror and the Erosion of American Democracy
13.18Mb size Format: txt, pdf, ePub

44
.  John Markoff,
Chief Takes over at Agency to Thwart Attacks on U.S.,
N.Y. TIMES,
Feb. 13, 2002,
http://select.nytimes.com/gst/abstract.html?res=F20A11F734580C708DDDAB0894DA404482
.

45
.  Jay Stanley,
Is the Threat from “Total Information Awareness” Overblown?
ACLU (Dec. 18, 2002),
http://www.aclu.org/technology-and-liberty/threat-total-information-awareness-overblown
.

46
.  Speech by Ted Senator, spokesperson for DARPA at DARPATech 2002 Conference in Anaheim, Cal. (2002),
http://www.darpa.mil/DARPATech2002/presentations/iao_pdf/speeches/SENATOR.pdf;
see also
Speech by John Poindexter,
Overview of the Information Awareness Office,
at DAPRATech 2002 Conference in Anaheim, Cal. (2002),
http://www.fas.org/irp/agency/dod/poindexter.html
.

47
.  William Safire,
You Are a Suspect,
N.Y. TIMES,
Nov. 14, 2002,
http://www.nytimes.com/2002/11/14/opinion/14SAFI.html
.

48
.  Department of Defense Appropriations Act, 2004, Pub. L. No. 108-187 § 8131, 117 Stat. 1054, 1102 (2003);
see also
149
CONG. REC.
H8755_H8771 (Sept. 24, 2003).
See generally
GINA MARIE STEVENS, CONG. RESEARCH SERV., RL
31730,
PRIVACY: TOTAL INFORMATION AWARENESS PROGRAMS AND RELATED INFORMATION ACCESS, COLLECTION, AND PROTECTION LAWS
(2003).

49
.  
NATIONAL RESEARCH COUNCIL OF THE NATIONAL ACADEMY OF SCIENCES, PROTECTING INDIVIDUAL PRIVACY IN THE STRUGGLE AGAINST TERRORISM
243 (Washington, DC: National Academies Press 2008),
http://books.nap.edu/openbook. php?record_id=12452&;page=7
[hereinafter
NATIONAL RESEARCH COUNCIL].

50
.  
ERIC LICHTBLAU, BUSH’S LAW
114 (New York: Pantheon 2008).

51
.  
See
JAMES BAMFORD, THE PUZZLE PALACE
236-50 (Boston: Houghton Mifflin 1982).

52
.  John Schwartz & Micheline Maynard,
Airlines Gave F.B.I. Millions of Records on Travelers After 9/11,
N.Y. TIMES,
May 1, 2004,
http://www.nytimes.com/2004/05/01/politics/01AIRL.html
.

53
.  Eric Lichtblau & James Risen,
Bank Data Sifted in Secret by U.S. to Block Terror,
N.Y. TIMES,
June 23, 2006,
http://select.nytimes.com/gst/abstract.html?res=F40F1FFE3D540C708EDDAF0894DE404482
.

54
.  Kim Zetter,
Feds “Pinged” Sprint GPS Data 8 Million Times over a Year,
WIRED
(Dec. 1, 2009),
http://www.wired.com/threatlevel/2009/12/gps-data/
; Sandra Fulton,
You Are Being Tracked,
ACLU
(June 28, 2010, 3:02
P.M.),
http://www.aclu.org/blog/technology-and-liberty/you-are-being-tracked
.

55
.  Joshua L. Simmons,
Buying You: The Government’s Use of Fourth-Parties to Launder Data about “the People,”
2009
COLUM. BUS. L. REV.
950, 990–97 (2009).

56
.  
Id
. at 991 n.151;
SOLOVE,
supra
note 5, at 22.

57
.  Glenn R. Simpson,
Big Brother-in-Law: If the FBI Hopes to Get the Goods on You, It May Ask ChoicePoint,
WALL ST. J.,
Apr. 13, 2001, at A1. According to the Electronic Privacy Information Center, which tracks such information, “One group of documents obtained from the Immigration and Naturalization Service (INS) shows that ChoicePoint offered a contract for unlimited direct access to international databases for a $1 million fee. Other documents obtained from the Department of Justice Management Division show that the agency entered into an $11 million contract with ChoicePoint for fiscal year 2002.”
ChoicePoint,
ELECTRONIC PRIVACY INFORMATION CENTER,
http://epic.org/privacy/choicepoint/#news
.

58
.  Robert O’Harrow, Jr.,
In Age of Security, Firm Mines Wealth of Personal Data,
WASH. POST,
Jan. 20, 2005,
http://www.washingtonpost.com/wp-dyn/articles/A22269-2005Jan19.html
.

59
.  Simmons,
supra
note 55.

60
.  
SURVEILLANCE-INDUSTRIAL COMPLEX,
supra
note 7, at 33; Robert M. Gell-man,
Can Privacy Be Regulated Effectively on a National Level? Thoughts on the Possible Need for International Privacy Rules,
41
VILL. L. REV.
129, 130 (1996) (arguing that the United States is now significantly behind much of the Western industrialized world in addressing private sector privacy issues).

61
.  
See, e.g.,
U.S. DEP’T OF JUSTICE, OFFICE OF THE INSPECTOR GEN., UNCLASSIFIED REPORT ON THE PRESIDENT’S SURVEILLANCE PROGRAM
31-32, 77 (2009).

62
.  
NATIONAL RESEARCH COUNCIL,
supra
note 49, at 4.

63
.  
Id
. at 2, 77-78, 213 (App. H.11).

64
.  
See
Dana Priest & William M. Arkin,
Top Secret America,
WASH. POST,
July 18-21, 2010,
http://projects.washingtonpost.com/top-secret-america/
.

65
.  
NATIONAL RESEARCH COUNCIL,
supra
note 49, at 71.

66
.  
ALAN WESTIN, PRIVACY AND FREEDOM
57 (New York: Atheneum 1967).

67
.  
ROSEN,
supra
note 3, at 19–21.

68
.  One blogger, Joelle Pearson, wrote of Facebook: “For starters, you didn’t know the first thing about respecting my privacy. You told everyone everything. You sold my secrets to every fatcat company—the music I liked, the places I shopped—you even showed my chats and pictures to anyone who asked … I don’t care how much you apologize. To me, or anyone else. We’re through.”
See Blogs Poke Face-book,
PEW RESEARCH CENTER
(June 3, 2010),
http://pewresearch.org/pubs/1613/facebook-and-privacy-blogs-twitter-apple
.

69
.  
MICHEL FOUCAULT, DISCIPLINE AND PUNISH
200-09 (New York: Vintage 1979).

70
.  
RULE,
supra
note 3, at 12.

71
.  
Id
. at 61.

72
.  
NATIONAL RESEARCH COUNCIL,
supra
note 49, at 167.

73
.  
RULE,
supra
note 3, at 6;
NATIONAL RESEARCH COUNCIL,
supra
note 49, at 167.

74
.  
WHITFIELD DIFFIE
&
SUSAN E. LANDAU, PRIVACY ON THE LINE
143, 170 (2d ed. Cambridge, MA: MIT Press 2007); Kathleen Sullivan,
Under a Watchful Eye: Incursions on Personal Privacy, in
THE WAR ON OUR FREEDOMS
128 (Richard C. Leone & Greg Anrig, Jr. eds., New York: Public Affairs 2003).

75
.  
See
Albert M. Bendich,
Privacy, Poverty, and the Constitution,
54
CALIF. L. REV.
407, 408-13 (1966).

76
.  
See
PHILIPPA STRUM, PRIVACY: THE DEBATE IN THE UNITED STATES SINCE
1945, at 4–7 (Fort Worth, TX: Harcourt Brace 1998).

77
.  
HANNAH ARENDT, THE HUMAN CONDITION
70-71 (2d ed. Chicago: Univ. of Chicago Press 1998).

78
.  Daniel J. Solove,
Privacy and Power: Computer Databases and Metaphors for Information Privacy,
53
STAN. L. REV.
1393, 1396–98 (2001).

79
.  
See generally
MARY MADDEN
&
AARON SMITH, PEW RESEARCH CENTER, REPUTATION MANAGEMENT AND SOCIAL MEDIA
(2010),
http://pewinternet.org/~/media//Files/Reports/2010/PIP_Reputation_Management_with_topline.pdf (poll results)
.

80
.  
NATIONAL RESEARCH COUNCIL,
supra
note 49, at 69.

81
.  
RULE,
supra
note 3, at 19, 63-64.

82
.  
See generally
James X. Dempsey & Lara M. Flint,
Commercial Data and National Security,
72
GEO. WASH. L. REV.
1459 (2004).

83
.  
See
GARRETT HATCH, CONG. RESEARCH SERV., PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD: NEW INDEPENDENT AGENCY STATUS
(2009),
http://www.fas.org/sgp/crs/misc/RL34385.pdf
(analyzing the patchwork of laws that govern access to private information).

84
.  Balkin,
supra
note 2, at 3–4.

Chapter 6

1
.  
JANE MAYER, THE DARK SIDE
46 (New York: Anchor Books 2009) (citing Sept. 21, 2001, Office of Legal Counsel memo);
see
Tim Golden,
A Secret Rewriting of Military Law,
N.Y. TIMES,
Oct. 24, 2004,
http://www.nytimes.com/2004/10/24/inter-national/worldspecial2/24gitmo.html?__r=3&pagewanted=print&position=&oref=s login&oref=slogin
.

2
.  My account is based on court papers and descriptions of the case, on a voluminous Inspector General Report,
OFFICE OF INSPECTOR GEN., SPECIAL REPORT, A REVIEW OF THE FBI’S HANDLING OF THE BRANDON MAYFIELD CASE
(2006),
http://www.justice.gov/oig/special/s0601/Chapter7.pdf
[hereinafter
INSPECTOR GEN. REPORT, MAYFIELD],
on press interviews with Brandon Mayfield, and on input from Brandon Mayfield himself.

3
.  
INSPECTOR GEN. REPORT, MAYFIELD,
supra
note 2, at 127–94;
see also
Stipulation for Compromise Settlement and Release at 2, Mayfield v. Gonzales, 504 F. Supp. 2d 1023,
rev’d,
599 F.3d 964 (9th Cir.),
cert. denied,
__U.S.__, 131 S. Ct. 503 (2010) (No. CV-04–1427AA),
http://www.washingtonpost.com/wp-srv/nation/documents/Mayfield__settlement.pdf
.

4
.  
INSPECTOR GEN. REPORT, MAYFIELD,
supra
note 2, at 243–52.

5
.  
Id
. at 243–52.

6
.  
Id.
at 252–53.

7
.  
See
Stipulation for Compromise Settlement and Release,
Mayfield,
504 F. Supp. 2d 1023,
supra
note 3, for the terms of the unsigned and undated settlement.

8
.  
Apology Note,
WASH. POST,
Nov. 29, 2006,
http://www.washingtonpost.com/wp-dyn/content/article/2006/11/29/AR2006112901155.html
.

9
.  
Mayfield,
504 F. Supp. 2d at 1042.

10
.  
See
NELSON B. LASSON, THE HISTORY AND DEVELOPMENT OF THE FOURTH AMENDMENT TO THE UNITED STATES CONSTITUTION
51-78 (Baltimore, MD: Johns Hopkins Univ. Press 1937).

11
.  Thomas Y. Davies,
Recovering the Original Fourth Amendment,
98
MICH. L. REV.
547, 601-11 (1999).

12
.   The Supreme Court has interpreted the Fourth Amendment as setting a default requirement of search warrants based on probable cause.
See, e.g.,
Chimel v. California, 395 U.S. 752 (1969).

13
.  Brinegar v. United States, 338 U.S. 160, 180 (1949).

14
.  50 U.S.C. § 1801(i).

15
.  
See
FREDERICK A. O. SCHWARZ, JR.,
&
AZIZ A. HUQ, UNCHECKED AND UNBALANCED
21-23 (New York: New Press 2008).

16
.  
See
50 U.S.C. § 1803(a), (b), & (d) (The Chief Justice designates eleven federal district court judges—the number under the original FISA statute was seven—to serve on the Foreign Intelligence Surveillance Court for seven-year terms, and three court of appeals judges to serve on the Court of Review).

17
.  The FISA court recently proposed revisions to its rules that could allow more frequent publication of its opinions,
see Comments on Proposed Rules of Procedure,
Oct. 4, 2010,
http://www.aclu.org/files/assets/2010-10-4_-_ACLU_FISC_Rule_Comments.pdf
.

18
.  
Transcript: Day Two of the Roberts Confirmation Hearings,
WASH. POST,
Sept. 13, 2005,
http://www.washingtonpost.com/wp-dyn/content/article/2005/09/13/AR2005091301469.html
(quoting Roberts as saying, “When I first learned about the FISA court, I was surprised. It’s not what we usually think of when we think of a court”).
See
Judith Resnik & Lane Dilg,
Responding to a Democratic Deficit: Limiting the Powers and the Term of the Chief Justice of the United States,
154
U. PA. L. REV.
1575 (2006).

19
.  Theodore W. Ruger,
Chief Justice Rehnquist’s Appointments to the FISA Court: An Empirical Perspective,
101
NW. U.L. REV.
239, 257 (2007).

20
.  
See
OFFICE OF THE ASST. ATT’Y GEN., FISA REPORTS TO CONGRESS,
http://www.fas.org/irp/agency/doj/fisa/
;
see also Foreign Intelligence Surveillance Act Court Orders 1979-2009,
ELECTRONIC PRIVACY INFORMATION CENTER
,
http://epic.org/pri-vacy/wiretap/stats/fisa__stats.html
(listing link to FISA reports and summarizing FISA requests and orders between 1979 and 2009).

21
.  50 U.S.C. §§ 1801(a)(4), (b)(2)(C) & (E), & 1801(c).

22
.  
See
Wilson v. Arkansas, 514 U.S. 927, 929 (1995); Richards v. Wisconsin, 520 U.S. 385 (1997); Groh v. Ramirez, 540 U.S. 551 (2004).

Other books

In Your Dreams by Holt, Tom, Tom Holt
Death Echo by Lowell, Elizabeth
Assumed Engagement by Louise, Kara
Give Up On Me by Tressie Lockwood
Demons Like It Hot by Ayers, Sidney
In Vino Veritas by J. M. Gregson