1932

Abstract

This article anchors the phenomenon of bureaucratized cybersurveillance around the concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of Yale Law School and Professor Sanford Levinson of the University of Texas School of Law. Pursuant to the theory of the National Surveillance State, because of the routinized and administrative nature of government-led surveillance, normalized mass surveillance is viewed as justified under crime and counterterrorism policy rationales. This article contends that the Cybersurveillance State is the successor to the National Surveillance State. The Cybersurveillance State harnesses technologies that fuse biometric and biographic data for risk assessment, embedding bureaucratized biometric cybersurveillance within the Administrative State. In ways that are largely invisible, the Cybersurveillance State constructs digital avatars for administrative governance objectives and targets digital data deemed suspicious. Consequently, constitutional violations stemming from cybersurveillance systems will be increasingly difficult to identify and challenge.

Loading

Article metrics loading...

/content/journals/10.1146/annurev-lawsocsci-110316-113701
2017-10-13
2024-05-10
Loading full text...

Full text loading...

/deliver/fulltext/lawsocsci/13/1/annurev-lawsocsci-110316-113701.html?itemId=/content/journals/10.1146/annurev-lawsocsci-110316-113701&mimeType=html&fmt=ahah

Literature Cited

  1. Ahmed N. 2014. Pentagon preparing for mass civil breakdown. Guardian June 12. https://www.theguardian.com/environment/earth-insight/2014/jun/12/pentagon-mass-civil-breakdown
  2. Andrejevic M. 2014. Surveillance in the big data era. Emerging Pervasive Information and Communication Technologies (PICT): Ethical Challenges, Opportunities, and Safeguards K Pimple 55–69. Law Gov. Technol. Ser. Dordrecht, Neth.: Springer [Google Scholar]
  3. Apple Inc. 2016. Use Touch ID on iPhone and iPad Cupertino, CA: Apple Inc https://support.apple.com/en-us/HT201371
  4. Assoc. Press. 2017. Companies start implanting microchips into workers' bodies. Los Angeles Times Apr. 3. http://www.latimes.com/business/technology/la-fi-tn-microchip-employees-20170403-story.html
  5. Balkin J. 2008. The constitution in the National Surveillance State. Minn. Law Rev. 93:1–25 [Google Scholar]
  6. Balkin J, Levinson S. 2006. The processes of constitutional change: from partisan entrenchment to the National Surveillance State. Fordham Law Rev 75:489–535 [Google Scholar]
  7. BBC News. 2012. Black Hat: Iris scanners “can be tricked” by hackers. BBC News July 26. http://www.bbc.com/news/technology-18997580
  8. Bennett C, Lyon D. 2008. Playing the Identity Card: Surveillance, Security and Identification in Global Perspective Abingdon, UK: Routledge
  9. boyd d, Crawford K. 2012. Critical questions for big data: provocations for a cultural, technological, and scholarly phenomenon. Inf. Commun. Soc. 15:662–79 [Google Scholar]
  10. Cao K, Jain A. 2016. Hacking mobile phones using 2D printed fingerprints Tech. Rep. MSU-CSE-16-2 Mich. State Univ. East Lansing, MI: http://biometrics.cse.msu.edu/Publications/Fingerprint/CaoJain_HackingMobilePhonesUsing2DPrintedFingerprint_MSU-CSE-16-2.pdf
  11. Citron D, Pasquale F. 2014. The scored society: due process for automated predictions. Wash. Law Rev. 89:1–33 [Google Scholar]
  12. Clarke R. 1988. Information technology and dataveillance. Commun. ACM 31:5498–512 [Google Scholar]
  13. Cohen J. 2015. The biopolitical public domain: the legal construction of the surveillance economy. Philos. Technol In press. doi:10.1007/s13347-017-0258-2
  14. Cyber Sec. Res. Dev. 2016. Identity Management and Data Privacy Technologies Project Dep. Homel. Secur (on file with author)
  15. Dep. Homel. Secur. 2008. Privacy Impact Assessment for the Future Attribute Screening Technology (FAST) Project Washington, DC: Dep. Homel. Secur http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_st_fast.pdf
  16. Donohue L. 2012. Technological leap, statutory gap, and constitutional abyss: Remote biometric identification comes of age. Minn. Law Rev. 97:407–559 [Google Scholar]
  17. Duster T. 2003. Backdoor to Eugenics Abingdon, UK: Routledge, 2nd ed..
  18. Faraone C, Lipp K, Riley J. 2014. Boston trolling (part I). digboston Oct. 9. https://digboston.com/boston-trolling-part-i/
  19. Ferguson A. 2015. Big data and reasonable suspicion. Univ. Pa. Law Rev. 163:327–410 [Google Scholar]
  20. Ferguson A. 2016. The Internet of Things and the Fourth Amendment of effects. Calif. Law Rev. 104:805–80 [Google Scholar]
  21. Fox-Brewster T. 2015. Hacking Putin's eyes: how to bypass biometrics the cheap and dirty way with Google Images. Forbes March 5. http://www.forbes.com/sites/thomasbrewster/2015/03/05/clone-putins-eyes-using-google-images/#61c5deb54f85
  22. Friedland S. 2015. I spy: the new self-cybersurveillance and the “Internet of Things.”. Wash. Lee Law Rev. 72:1459–501 [Google Scholar]
  23. Furnas A. 2012. Homeland Security's “pre-crime” screening will never work. Atlantic April 17. http://www.theatlantic.com/technology/archive/2012/04/homeland-securitys-pre-crime-screening-will-never-work/255971/
  24. Garfinkel S. 2000. Database Nation: The Death of Privacy in the 21st Century Sebastopol, CA: O'Reilly Media
  25. Garvie C, Bedoya A, Frankle J. 2016. The Perpetual Line-Up: Unregulated Police Face Recognition in America Washington, DC: Georgetown Law Cent. Priv. Technol http://www.perpetuallineup.org
  26. Gates KA. 2011. Our Biometric Future: Facial Recognition Technology and the Culture of Surveillance New York: N.Y. Univ. Press
  27. Gellman B, Soltani A. 2013. NSA tracking cellphone locations worldwide, Snowden documents show. Washington Post Dec. 4. https://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html?utm_term=.ad43a46a2530
  28. Gomez A. 2013. Immigrant tracking may impede bill: Partisan split developing over biometric data on foreigners leaving U.S.. USA Today May 9 A5
  29. Granick JS. 2017. American Spies: Modern Surveillance, Why You Should Care, and What to Do About It Cambridge, UK: Cambridge Univ. Press
  30. Greenwald G. 2014a. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. New York: Metropolitan Books
  31. Greenwald G. 2014b. Documents from No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State GlennGreenwald.net http://glenngreenwald.net/pdf/NoPlaceToHide-Documents-Compressed.pdf
  32. Harper J. 2006. Identity Crisis: How Identification Is Overused and Misunderstood Washington, DC: Cato Inst.
  33. Harris S. 2012. Giving in to the surveillance state. New York Times Aug. 22. http://www.nytimes.com/2012/08/23/opinion/whos-watching-the-nsa-watchers.html
  34. Hern A. 2014. Hacker fakes German Minister's fingerprints using photos of her hands. Guardian Dec. 30. https://www.theguardian.com/technology/2014/dec/30/hacker-fakes-german-ministers-fingerprints-using-photos-of-her-hands
  35. Horgan J. 2013. U.S. never really ended creepy “Total Information Awareness” program. Scientific American Blog June 7. http://blogs.scientificamerican.com/cross-check/2013/06/07/u-s-never-really-ended-creepy-total-information-awareness-program/
  36. Hu M. 2013. Biometric ID cybersurveillance. Ind. Law J. 88:1475–558 [Google Scholar]
  37. Hu M. 2015a. Big data blacklisting. Fla. Law Rev. 67:1735–809 [Google Scholar]
  38. Hu M. 2015b. Taxonomy of the Snowden disclosures. Wash. Lee Law Rev. 72:1679–767 [Google Scholar]
  39. Hu M. 2015c. Small data surveillance v. big data cybersurveillance. Pepperdine Law Rev 42:773–844 [Google Scholar]
  40. Hu M. 2017a. Biometric surveillance and big data governance. The Cambridge Handbook of Surveillance Law D Gray, S Henderson Cambridge, UK: Cambridge Univ. Press In press [Google Scholar]
  41. Hu M. 2017b. Biometric cyberintelligence and the Posse Comitatus Act. Emory Law J 66:697–763 [Google Scholar]
  42. Ingram M. 2013. Even the CIA is struggling to deal with the volume of real-time social data. Gigaom March 20. https://gigaom.com/2013/03/20/even-the-cia-is-struggling-to-deal-with-the-volume-of-real-time-social-data/2/
  43. Jesse D. 2016. MSU professor helps police crack smartphone fingerprint lock. Detroit Free Press July 31. http://www.freep.com/story/news/local/michigan/2016/07/31/michigan-state-university-fingerprint-smartphone/87719418/
  44. Kahn J. 2013. Mrs. Shipley's Ghost: The Right to Travel and Terrorist Watchlists. Ann Arbor: Univ. Mich. Press
  45. Kalhan A. 2014. Immigration surveillance. Md. Law Rev. 74:1–78 [Google Scholar]
  46. Kaye D. 2013. A Fourth Amendment theory for arrestee DNA and other biometric databases. Univ. Pa. J. Const. Law 15:1095–160 [Google Scholar]
  47. Koerner B. 2015. Your relative's DNA could turn you into a suspect. Wired Oct. 13. https://www.wired.com/2015/10/familial-dna-evidence-turns-innocent-people-into-crime-suspects /
  48. Lessig L. 2006. Code Version 2.0 New York: Basic Books
  49. Li SZ, Jain AK. 2009. Encyclopedia of Biometrics New York: Springer
  50. Lynch J. 2012. From fingerprints to DNA: biometric data collection in U.S. immigrant communities and beyond. Spec. Rep., Immigr. Policy Cent. Washington, DC:
  51. Lyon D. 2007. Surveillance Studies Cambridge, UK: Polity
  52. Lyon D. 2009. Identifying Citizens: ID Cards as Surveillance Hoboken, NJ: Wiley
  53. Magnet S. 2011. When Biometrics Fail: Gender, Race, and the Technology of Identity Durham, NC: Duke Univ. Press
  54. Mayer-Schönberger V, Cukier K. 2013. Big Data: A Revolution that Will Transform How We Live, Work, and Think London: John Murray
  55. Miller G. 2012. Plan for hunting terrorists signals U.S. intends to keep adding names to kill lists. Washington Post Oct. 23. https://www.washingtonpost.com/world/national-security/plan-for-hunting-terrorists-signals-us-intends-to-keep-adding-names-to-kill-lists/2012/10/23/4789b2ae-18b3-11e2-a55c-39408fbe6a4b_story.html?utm_term=.a9e6e574ee44
  56. Miller G, Tate J, Gellman B. 2013. Documents reveal NSA's extensive involvement in targeted killing program. Washington Post Oct. 16. https://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story.html?utm_term=.68110073e8e6
  57. Mnookin J. 2010. The courts, the NAS, and the future of forensic science. Brooklyn Law Rev 75:1209–75 [Google Scholar]
  58. Modus Operandi 2012. Modus Operandi awarded $1 million U.S. Army contract for enemy and criminal behavioral recognition system. Press Release, Dec. 12. http://www.modusoperandi.com/modus-operandi-awarded-1-million-u-s-army-contract-for-enemy-and-criminal-behavioral-recognition-system/
  59. Murgia M. 2016. Biometrics will replace passwords, but it's a bad idea. Telegraph May 27. http://www.telegraph.co.uk/technology/2016/05/26/biometrics-will-replace-passwords-but-its-a-bad-idea/
  60. Murphy E. 2013. License, registration, cheek swab: DNA testing and the divided court. Harvard Law Rev 127:161–96 [Google Scholar]
  61. Murray N. 2010. Profiling in the age of total information awareness. Race Class 52:23–24 [Google Scholar]
  62. Newman L. 2016. Hackers trick facial-recognition logins with photos from Facebook (what else?). Wired Aug. 19. https://www.wired.com/2016/08/hackers-trick-facial-recognition-logins-photos-facebook-thanks-zuck/
  63. Niinuma K, Unsang P, Jain A. 2010. Soft biometric traits for continuous use authentication. IEEE Trans. Inf. Forensics Secur. 5:4771–80 [Google Scholar]
  64. O'Harrow R. 2005. No Place to Hide New York: Free
  65. O'Neill C. 2016. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy New York: Crown
  66. Pasquale F. 2016. The Black Box Society: The Secret Algorithms that Control Money and Information Cambridge, MA: Harvard Univ. Press
  67. Pato J, Millett L. 2010. Biometric Recognition: Challenges and Opportunities Washington, DC: Natl. Acad. Press
  68. Poindexter J. 2002. Overview of the Information Awareness Office Presented at DARPATech 2002 Conf. Anaheim, CA: Aug. 2. http://fas.org/irp/agency/dod/poindexter.html
  69. Poitras L, Rosenbach M, Sontheimer M, Stark H. 2014. How the NSA helped Turkey kill Kurdish rebels. Intercept Aug. 31. https://theintercept.com/2014/08/31/nsaturkeyspiegel/
  70. Pres. Counc. Advis. Sci. Technol., Exec. Off. Pres. (PCAST). 2014. Big data and privacy: a technological perspective Rep. Pres. Washington, DC:
  71. Public Intelligence 2014. Identity dominance: the U.S. military's biometric war in Afghanistan. Public Intelligence Apr. 21. https://publicintelligence.net/identity-dominance/
  72. Ramos N. 2014. City used high-tech tracking software at ‘13 Boston Calling. Boston Globe Sept. 8. https://www.bostonglobe.com/metro/2014/09/07/boston-watching-city-acknowledges-surveillance-tests-during-festivals/Sz9QVurQ5VnA4a6Btds8xH/story.html
  73. Richards N. 2013. The dangers of surveillance. Harvard Law Rev 126:1935–65 [Google Scholar]
  74. Richards N, King J. 2013. Three paradoxes of big data. Stanf. Law Rev. 66:41–46 [Google Scholar]
  75. Ries L. 2010. B-Verify: transforming E-Verify into a biometric employment verification system. Albany Gov. Law Rev. 3:271–321 [Google Scholar]
  76. Risen J, Poitras L. 2014. N.S.A. collecting millions of faces from web images. New York Times May 31. http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-web-images.html
  77. Rosen J. 2005. The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age New York: Random House
  78. Roth A. 2010. Safety in numbers: deciding when DNA alone is enough to convict. NYU Law Rev 85:1130–85 [Google Scholar]
  79. Scahill J, Devereaux R. 2014. Blacklisted: the secret government rulebook for labeling you a terrorist. Intercept July 23. https://theintercept.com/2014/07/23/blacklisted/
  80. Scahill J, Greenwald G. 2014. The NSA's secret role in the U.S. assassination program. Intercept Feb. 9. https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/
  81. Schneier B. 2015. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. New York: W.W. Norton
  82. Schneier B. 2016. Apple patents collecting biometric information based on unauthorized device use. Schneier on Security Blog Aug. 29. https://www.schneier.com/blog/archives/2016/08/apple_patents_c.html
  83. Schumer C, Graham L. 2010. The right way to mend immigration. Washington Post March 19. http://www.washingtonpost.com/wp-dyn/content/article/2010/03/17/AR2010031703115.html?utm_term=.8f9a895a857b
  84. Shachtman N. 2011. Army tracking plan: drones that never forget a face. Wired Sept. 28. http://www.wired.com/dangerroom/2011/09/drones-never-forget-a-face/
  85. Shachtman N. 2012. Air Force's top brain wants a “social radar” to “see into hearts and minds.”. Wired.com Jan. 19. http://www.wired.com/2012/01/social-radar-sees-minds/
  86. Shane P. 2007. The bureaucratic due process of government watch lists. George Wash. Law Rev. 75:804–55 [Google Scholar]
  87. Shockley B. 2014. Vigilant solutions unveils mobile companion app at IACP. Vigilant Solutions Oct. 23. https://vigilantsolutions.com/stories-from-the-street/vigilant-mobile-companion-app-iacp
  88. Slobogin C. 2008. Government data mining and the Fourth Amendment. Univ. Chic. Law Rev 75:317–41 [Google Scholar]
  89. Slobogin C. 2014. Panvasive surveillance, political process theory, and the nondelegation doctrine. Georgetown Law J 102:1721–76 [Google Scholar]
  90. Sobel R. 2002. The demeaning of identity and personhood in national identification systems. Harvard J. Law Technol. 15:319–87 [Google Scholar]
  91. Solove D. 2002. Digital dossiers and the dissipation of Fourth Amendment privacy. South. Calif. Law Rev. 75:1083–168 [Google Scholar]
  92. Spiro P. 2014. Expatriating terrorists. Fordham Law Rev 82:2169–87 [Google Scholar]
  93. Steinbock D. 2006. Designating the dangerous: from blacklists to watch lists. Seattle Univ. Law Rev. 30:65–118 [Google Scholar]
  94. Strahilevitz L. 2012. Signaling exhaustion and perfect exclusion. J. Telecommun. High Technol. Law 10:321–30 [Google Scholar]
  95. Strandburg KJ, Raicu DS. 2006. Privacy and Technologies of Identity: A Cross-Disciplinary Conversation New York: Springer
  96. Tau B. 2015. No-fly list is only one of many U.S. watchlists. The Wall Street Journal Dec. 8. http://www.wsj.com/articles/no-fly-list-is-only-one-of-many-u-s-watchlists-1449570602
  97. Thomson L. 2007. Critical issues in identity management—challenges for homeland security. Jurimetr. J. 47:335–56 [Google Scholar]
  98. TruthMove. 2016. Total Information Awareness (TIA) System TruthMove http://www.truthmove.org/workspace/photos-content/tia_screenshot.gif
  99. US Dep. Def. 2011. Terms & definitions of interest for DoD counterintelligence professionals Glossary (unclassified), Off. Counterintell., Def. CI & HUMINT Cent. Def. Intell. Agency May 2. http://fas.org/irp/eprint/ci-glossary.pdf
  100. US Gen. Account. Off. 2002. Technology assessment: using biometrics for border security Rep. GAO-03–174 US Gen. Account. Off. Washington, DC: http://www.gao.gov/assets/160/157313.pdf
  101. US Gov. Account. Off. 2010. Employment verification: Federal agencies have taken steps to E-Verify, but significant challenges remain GAO-11–146 US Gen. Account. Off. Washington, DC: http://www.gao.gov/assets/320/314278.pdf
  102. USA Today 2003. Pentagon's “Terror Information Awareness” program will end. USA Today Sept. 25. http://usatoday30.usatoday.com/news/washington/2003-09-25-pentagon-office_x.htm
  103. Vacca J. 2007. Biometric Technologies and Verification Systems Burlington, MA: Butterworth-Heinemann
  104. Wittes B, Blum G. 2015. The Future of Violence: Robots and Germs, Hackers and Drones New York: Basic Books
  105. Yakowicz W. 2016. How collecting biometric information from employees and customers could get you sued. Inc May 12. http://www.inc.com/will-yakowicz/legal-risks-of-biometrics-at-the-office.html
  106. Zuboff S. 2015. Big other: surveillance capitalism and the prospects of an information civilization. J. Inf. Technol. 30:75–89 [Google Scholar]
/content/journals/10.1146/annurev-lawsocsci-110316-113701
Loading
/content/journals/10.1146/annurev-lawsocsci-110316-113701
Loading

Data & Media loading...

  • Article Type: Review Article
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error