This article anchors the phenomenon of bureaucratized cybersurveillance around the concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of Yale Law School and Professor Sanford Levinson of the University of Texas School of Law. Pursuant to the theory of the National Surveillance State, because of the routinized and administrative nature of government-led surveillance, normalized mass surveillance is viewed as justified under crime and counterterrorism policy rationales. This article contends that the Cybersurveillance State is the successor to the National Surveillance State. The Cybersurveillance State harnesses technologies that fuse biometric and biographic data for risk assessment, embedding bureaucratized biometric cybersurveillance within the Administrative State. In ways that are largely invisible, the Cybersurveillance State constructs digital avatars for administrative governance objectives and targets digital data deemed suspicious. Consequently, constitutional violations stemming from cybersurveillance systems will be increasingly difficult to identify and challenge.


Article metrics loading...

Loading full text...

Full text loading...


Literature Cited

  1. Ahmed N. 2014. Pentagon preparing for mass civil breakdown. Guardian June 12. https://www.theguardian.com/environment/earth-insight/2014/jun/12/pentagon-mass-civil-breakdown [Google Scholar]
  2. Andrejevic M. 2014. Surveillance in the big data era. Emerging Pervasive Information and Communication Technologies (PICT): Ethical Challenges, Opportunities, and Safeguards K Pimple 55–69. Law Gov. Technol. Ser. Dordrecht, Neth.: Springer [Google Scholar]
  3. Apple Inc. 2016. Use Touch ID on iPhone and iPad Cupertino, CA: Apple Inc https://support.apple.com/en-us/HT201371 [Google Scholar]
  4. Assoc. Press. 2017. Companies start implanting microchips into workers' bodies. Los Angeles Times Apr. 3. http://www.latimes.com/business/technology/la-fi-tn-microchip-employees-20170403-story.html [Google Scholar]
  5. Balkin J. 2008. The constitution in the National Surveillance State. Minn. Law Rev. 93:1–25 [Google Scholar]
  6. Balkin J, Levinson S. 2006. The processes of constitutional change: from partisan entrenchment to the National Surveillance State. Fordham Law Rev 75:489–535 [Google Scholar]
  7. BBC News. 2012. Black Hat: Iris scanners “can be tricked” by hackers. BBC News July 26. http://www.bbc.com/news/technology-18997580 [Google Scholar]
  8. Bennett C, Lyon D. 2008. Playing the Identity Card: Surveillance, Security and Identification in Global Perspective Abingdon, UK: Routledge [Google Scholar]
  9. boyd d, Crawford K. 2012. Critical questions for big data: provocations for a cultural, technological, and scholarly phenomenon. Inf. Commun. Soc. 15:662–79 [Google Scholar]
  10. Cao K, Jain A. 2016. Hacking mobile phones using 2D printed fingerprints Tech. Rep. MSU-CSE-16-2 Mich. State Univ. East Lansing, MI: http://biometrics.cse.msu.edu/Publications/Fingerprint/CaoJain_HackingMobilePhonesUsing2DPrintedFingerprint_MSU-CSE-16-2.pdf [Google Scholar]
  11. Citron D, Pasquale F. 2014. The scored society: due process for automated predictions. Wash. Law Rev. 89:1–33 [Google Scholar]
  12. Clarke R. 1988. Information technology and dataveillance. Commun. ACM 31:5498–512 [Google Scholar]
  13. Cohen J. 2015. The biopolitical public domain: the legal construction of the surveillance economy. Philos. Technol In press. doi:10.1007/s13347-017-0258-2 [Google Scholar]
  14. Cyber Sec. Res. Dev. 2016. Identity Management and Data Privacy Technologies Project Dep. Homel. Secur (on file with author) [Google Scholar]
  15. Dep. Homel. Secur. 2008. Privacy Impact Assessment for the Future Attribute Screening Technology (FAST) Project Washington, DC: Dep. Homel. Secur http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_st_fast.pdf [Google Scholar]
  16. Donohue L. 2012. Technological leap, statutory gap, and constitutional abyss: Remote biometric identification comes of age. Minn. Law Rev. 97:407–559 [Google Scholar]
  17. Duster T. 2003. Backdoor to Eugenics Abingdon, UK: Routledge, 2nd ed.. [Google Scholar]
  18. Faraone C, Lipp K, Riley J. 2014. Boston trolling (part I). digboston Oct. 9. https://digboston.com/boston-trolling-part-i/ [Google Scholar]
  19. Ferguson A. 2015. Big data and reasonable suspicion. Univ. Pa. Law Rev. 163:327–410 [Google Scholar]
  20. Ferguson A. 2016. The Internet of Things and the Fourth Amendment of effects. Calif. Law Rev. 104:805–80 [Google Scholar]
  21. Fox-Brewster T. 2015. Hacking Putin's eyes: how to bypass biometrics the cheap and dirty way with Google Images. Forbes March 5. http://www.forbes.com/sites/thomasbrewster/2015/03/05/clone-putins-eyes-using-google-images/#61c5deb54f85 [Google Scholar]
  22. Friedland S. 2015. I spy: the new self-cybersurveillance and the “Internet of Things.”. Wash. Lee Law Rev. 72:1459–501 [Google Scholar]
  23. Furnas A. 2012. Homeland Security's “pre-crime” screening will never work. Atlantic April 17. http://www.theatlantic.com/technology/archive/2012/04/homeland-securitys-pre-crime-screening-will-never-work/255971/ [Google Scholar]
  24. Garfinkel S. 2000. Database Nation: The Death of Privacy in the 21st Century Sebastopol, CA: O'Reilly Media [Google Scholar]
  25. Garvie C, Bedoya A, Frankle J. 2016. The Perpetual Line-Up: Unregulated Police Face Recognition in America Washington, DC: Georgetown Law Cent. Priv. Technol http://www.perpetuallineup.org [Google Scholar]
  26. Gates KA. 2011. Our Biometric Future: Facial Recognition Technology and the Culture of Surveillance New York: N.Y. Univ. Press [Google Scholar]
  27. Gellman B, Soltani A. 2013. NSA tracking cellphone locations worldwide, Snowden documents show. Washington Post Dec. 4. https://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html?utm_term=.ad43a46a2530 [Google Scholar]
  28. Gomez A. 2013. Immigrant tracking may impede bill: Partisan split developing over biometric data on foreigners leaving U.S.. USA Today May 9 A5 [Google Scholar]
  29. Granick JS. 2017. American Spies: Modern Surveillance, Why You Should Care, and What to Do About It Cambridge, UK: Cambridge Univ. Press [Google Scholar]
  30. Greenwald G. 2014a. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. New York: Metropolitan Books [Google Scholar]
  31. Greenwald G. 2014b. Documents from No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State GlennGreenwald.net http://glenngreenwald.net/pdf/NoPlaceToHide-Documents-Compressed.pdf [Google Scholar]
  32. Harper J. 2006. Identity Crisis: How Identification Is Overused and Misunderstood Washington, DC: Cato Inst. [Google Scholar]
  33. Harris S. 2012. Giving in to the surveillance state. New York Times Aug. 22. http://www.nytimes.com/2012/08/23/opinion/whos-watching-the-nsa-watchers.html [Google Scholar]
  34. Hern A. 2014. Hacker fakes German Minister's fingerprints using photos of her hands. Guardian Dec. 30. https://www.theguardian.com/technology/2014/dec/30/hacker-fakes-german-ministers-fingerprints-using-photos-of-her-hands [Google Scholar]
  35. Horgan J. 2013. U.S. never really ended creepy “Total Information Awareness” program. Scientific American Blog June 7. http://blogs.scientificamerican.com/cross-check/2013/06/07/u-s-never-really-ended-creepy-total-information-awareness-program/ [Google Scholar]
  36. Hu M. 2013. Biometric ID cybersurveillance. Ind. Law J. 88:1475–558 [Google Scholar]
  37. Hu M. 2015a. Big data blacklisting. Fla. Law Rev. 67:1735–809 [Google Scholar]
  38. Hu M. 2015b. Taxonomy of the Snowden disclosures. Wash. Lee Law Rev. 72:1679–767 [Google Scholar]
  39. Hu M. 2015c. Small data surveillance v. big data cybersurveillance. Pepperdine Law Rev 42:773–844 [Google Scholar]
  40. Hu M. 2017a. Biometric surveillance and big data governance. The Cambridge Handbook of Surveillance Law D Gray, S Henderson Cambridge, UK: Cambridge Univ. Press In press [Google Scholar]
  41. Hu M. 2017b. Biometric cyberintelligence and the Posse Comitatus Act. Emory Law J 66:697–763 [Google Scholar]
  42. Ingram M. 2013. Even the CIA is struggling to deal with the volume of real-time social data. Gigaom March 20. https://gigaom.com/2013/03/20/even-the-cia-is-struggling-to-deal-with-the-volume-of-real-time-social-data/2/ [Google Scholar]
  43. Jesse D. 2016. MSU professor helps police crack smartphone fingerprint lock. Detroit Free Press July 31. http://www.freep.com/story/news/local/michigan/2016/07/31/michigan-state-university-fingerprint-smartphone/87719418/ [Google Scholar]
  44. Kahn J. 2013. Mrs. Shipley's Ghost: The Right to Travel and Terrorist Watchlists. Ann Arbor: Univ. Mich. Press [Google Scholar]
  45. Kalhan A. 2014. Immigration surveillance. Md. Law Rev. 74:1–78 [Google Scholar]
  46. Kaye D. 2013. A Fourth Amendment theory for arrestee DNA and other biometric databases. Univ. Pa. J. Const. Law 15:1095–160 [Google Scholar]
  47. Koerner B. 2015. Your relative's DNA could turn you into a suspect. Wired Oct. 13. https://www.wired.com/2015/10/familial-dna-evidence-turns-innocent-people-into-crime-suspects / [Google Scholar]
  48. Lessig L. 2006. Code Version 2.0 New York: Basic Books [Google Scholar]
  49. Li SZ, Jain AK. 2009. Encyclopedia of Biometrics New York: Springer [Google Scholar]
  50. Lynch J. 2012. From fingerprints to DNA: biometric data collection in U.S. immigrant communities and beyond. Spec. Rep., Immigr. Policy Cent. Washington, DC: [Google Scholar]
  51. Lyon D. 2007. Surveillance Studies Cambridge, UK: Polity [Google Scholar]
  52. Lyon D. 2009. Identifying Citizens: ID Cards as Surveillance Hoboken, NJ: Wiley [Google Scholar]
  53. Magnet S. 2011. When Biometrics Fail: Gender, Race, and the Technology of Identity Durham, NC: Duke Univ. Press [Google Scholar]
  54. Mayer-Schönberger V, Cukier K. 2013. Big Data: A Revolution that Will Transform How We Live, Work, and Think London: John Murray [Google Scholar]
  55. Miller G. 2012. Plan for hunting terrorists signals U.S. intends to keep adding names to kill lists. Washington Post Oct. 23. https://www.washingtonpost.com/world/national-security/plan-for-hunting-terrorists-signals-us-intends-to-keep-adding-names-to-kill-lists/2012/10/23/4789b2ae-18b3-11e2-a55c-39408fbe6a4b_story.html?utm_term=.a9e6e574ee44 [Google Scholar]
  56. Miller G, Tate J, Gellman B. 2013. Documents reveal NSA's extensive involvement in targeted killing program. Washington Post Oct. 16. https://www.washingtonpost.com/world/national-security/documents-reveal-nsas-extensive-involvement-in-targeted-killing-program/2013/10/16/29775278-3674-11e3-8a0e-4e2cf80831fc_story.html?utm_term=.68110073e8e6 [Google Scholar]
  57. Mnookin J. 2010. The courts, the NAS, and the future of forensic science. Brooklyn Law Rev 75:1209–75 [Google Scholar]
  58. Modus Operandi 2012. Modus Operandi awarded $1 million U.S. Army contract for enemy and criminal behavioral recognition system. Press Release, Dec. 12. http://www.modusoperandi.com/modus-operandi-awarded-1-million-u-s-army-contract-for-enemy-and-criminal-behavioral-recognition-system/ [Google Scholar]
  59. Murgia M. 2016. Biometrics will replace passwords, but it's a bad idea. Telegraph May 27. http://www.telegraph.co.uk/technology/2016/05/26/biometrics-will-replace-passwords-but-its-a-bad-idea/ [Google Scholar]
  60. Murphy E. 2013. License, registration, cheek swab: DNA testing and the divided court. Harvard Law Rev 127:161–96 [Google Scholar]
  61. Murray N. 2010. Profiling in the age of total information awareness. Race Class 52:23–24 [Google Scholar]
  62. Newman L. 2016. Hackers trick facial-recognition logins with photos from Facebook (what else?). Wired Aug. 19. https://www.wired.com/2016/08/hackers-trick-facial-recognition-logins-photos-facebook-thanks-zuck/ [Google Scholar]
  63. Niinuma K, Unsang P, Jain A. 2010. Soft biometric traits for continuous use authentication. IEEE Trans. Inf. Forensics Secur. 5:4771–80 [Google Scholar]
  64. O'Harrow R. 2005. No Place to Hide New York: Free [Google Scholar]
  65. O'Neill C. 2016. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy New York: Crown [Google Scholar]
  66. Pasquale F. 2016. The Black Box Society: The Secret Algorithms that Control Money and Information Cambridge, MA: Harvard Univ. Press [Google Scholar]
  67. Pato J, Millett L. 2010. Biometric Recognition: Challenges and Opportunities Washington, DC: Natl. Acad. Press [Google Scholar]
  68. Poindexter J. 2002. Overview of the Information Awareness Office Presented at DARPATech 2002 Conf. Anaheim, CA: Aug. 2. http://fas.org/irp/agency/dod/poindexter.html [Google Scholar]
  69. Poitras L, Rosenbach M, Sontheimer M, Stark H. 2014. How the NSA helped Turkey kill Kurdish rebels. Intercept Aug. 31. https://theintercept.com/2014/08/31/nsaturkeyspiegel/ [Google Scholar]
  70. Pres. Counc. Advis. Sci. Technol., Exec. Off. Pres. (PCAST). 2014. Big data and privacy: a technological perspective Rep. Pres. Washington, DC: [Google Scholar]
  71. Public Intelligence 2014. Identity dominance: the U.S. military's biometric war in Afghanistan. Public Intelligence Apr. 21. https://publicintelligence.net/identity-dominance/ [Google Scholar]
  72. Ramos N. 2014. City used high-tech tracking software at ‘13 Boston Calling. Boston Globe Sept. 8. https://www.bostonglobe.com/metro/2014/09/07/boston-watching-city-acknowledges-surveillance-tests-during-festivals/Sz9QVurQ5VnA4a6Btds8xH/story.html [Google Scholar]
  73. Richards N. 2013. The dangers of surveillance. Harvard Law Rev 126:1935–65 [Google Scholar]
  74. Richards N, King J. 2013. Three paradoxes of big data. Stanf. Law Rev. 66:41–46 [Google Scholar]
  75. Ries L. 2010. B-Verify: transforming E-Verify into a biometric employment verification system. Albany Gov. Law Rev. 3:271–321 [Google Scholar]
  76. Risen J, Poitras L. 2014. N.S.A. collecting millions of faces from web images. New York Times May 31. http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-web-images.html [Google Scholar]
  77. Rosen J. 2005. The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age New York: Random House [Google Scholar]
  78. Roth A. 2010. Safety in numbers: deciding when DNA alone is enough to convict. NYU Law Rev 85:1130–85 [Google Scholar]
  79. Scahill J, Devereaux R. 2014. Blacklisted: the secret government rulebook for labeling you a terrorist. Intercept July 23. https://theintercept.com/2014/07/23/blacklisted/ [Google Scholar]
  80. Scahill J, Greenwald G. 2014. The NSA's secret role in the U.S. assassination program. Intercept Feb. 9. https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/ [Google Scholar]
  81. Schneier B. 2015. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. New York: W.W. Norton [Google Scholar]
  82. Schneier B. 2016. Apple patents collecting biometric information based on unauthorized device use. Schneier on Security Blog Aug. 29. https://www.schneier.com/blog/archives/2016/08/apple_patents_c.html [Google Scholar]
  83. Schumer C, Graham L. 2010. The right way to mend immigration. Washington Post March 19. http://www.washingtonpost.com/wp-dyn/content/article/2010/03/17/AR2010031703115.html?utm_term=.8f9a895a857b [Google Scholar]
  84. Shachtman N. 2011. Army tracking plan: drones that never forget a face. Wired Sept. 28. http://www.wired.com/dangerroom/2011/09/drones-never-forget-a-face/ [Google Scholar]
  85. Shachtman N. 2012. Air Force's top brain wants a “social radar” to “see into hearts and minds.”. Wired.com Jan. 19. http://www.wired.com/2012/01/social-radar-sees-minds/ [Google Scholar]
  86. Shane P. 2007. The bureaucratic due process of government watch lists. George Wash. Law Rev. 75:804–55 [Google Scholar]
  87. Shockley B. 2014. Vigilant solutions unveils mobile companion app at IACP. Vigilant Solutions Oct. 23. https://vigilantsolutions.com/stories-from-the-street/vigilant-mobile-companion-app-iacp [Google Scholar]
  88. Slobogin C. 2008. Government data mining and the Fourth Amendment. Univ. Chic. Law Rev 75:317–41 [Google Scholar]
  89. Slobogin C. 2014. Panvasive surveillance, political process theory, and the nondelegation doctrine. Georgetown Law J 102:1721–76 [Google Scholar]
  90. Sobel R. 2002. The demeaning of identity and personhood in national identification systems. Harvard J. Law Technol. 15:319–87 [Google Scholar]
  91. Solove D. 2002. Digital dossiers and the dissipation of Fourth Amendment privacy. South. Calif. Law Rev. 75:1083–168 [Google Scholar]
  92. Spiro P. 2014. Expatriating terrorists. Fordham Law Rev 82:2169–87 [Google Scholar]
  93. Steinbock D. 2006. Designating the dangerous: from blacklists to watch lists. Seattle Univ. Law Rev. 30:65–118 [Google Scholar]
  94. Strahilevitz L. 2012. Signaling exhaustion and perfect exclusion. J. Telecommun. High Technol. Law 10:321–30 [Google Scholar]
  95. Strandburg KJ, Raicu DS. 2006. Privacy and Technologies of Identity: A Cross-Disciplinary Conversation New York: Springer [Google Scholar]
  96. Tau B. 2015. No-fly list is only one of many U.S. watchlists. The Wall Street Journal Dec. 8. http://www.wsj.com/articles/no-fly-list-is-only-one-of-many-u-s-watchlists-1449570602 [Google Scholar]
  97. Thomson L. 2007. Critical issues in identity management—challenges for homeland security. Jurimetr. J. 47:335–56 [Google Scholar]
  98. TruthMove. 2016. Total Information Awareness (TIA) System TruthMove http://www.truthmove.org/workspace/photos-content/tia_screenshot.gif [Google Scholar]
  99. US Dep. Def. 2011. Terms & definitions of interest for DoD counterintelligence professionals Glossary (unclassified), Off. Counterintell., Def. CI & HUMINT Cent. Def. Intell. Agency May 2. http://fas.org/irp/eprint/ci-glossary.pdf [Google Scholar]
  100. US Gen. Account. Off. 2002. Technology assessment: using biometrics for border security Rep. GAO-03–174 US Gen. Account. Off. Washington, DC: http://www.gao.gov/assets/160/157313.pdf [Google Scholar]
  101. US Gov. Account. Off. 2010. Employment verification: Federal agencies have taken steps to E-Verify, but significant challenges remain GAO-11–146 US Gen. Account. Off. Washington, DC: http://www.gao.gov/assets/320/314278.pdf [Google Scholar]
  102. USA Today 2003. Pentagon's “Terror Information Awareness” program will end. USA Today Sept. 25. http://usatoday30.usatoday.com/news/washington/2003-09-25-pentagon-office_x.htm [Google Scholar]
  103. Vacca J. 2007. Biometric Technologies and Verification Systems Burlington, MA: Butterworth-Heinemann [Google Scholar]
  104. Wittes B, Blum G. 2015. The Future of Violence: Robots and Germs, Hackers and Drones New York: Basic Books [Google Scholar]
  105. Yakowicz W. 2016. How collecting biometric information from employees and customers could get you sued. Inc May 12. http://www.inc.com/will-yakowicz/legal-risks-of-biometrics-at-the-office.html [Google Scholar]
  106. Zuboff S. 2015. Big other: surveillance capitalism and the prospects of an information civilization. J. Inf. Technol. 30:75–89 [Google Scholar]

Data & Media loading...

  • Article Type: Review Article
This is a required field
Please enter a valid email address
Approval was a Success
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error