Page 236 - Privacy in a Cyber Age Policy and Practice
P. 236

224  NOTES

             99.  See, for example, Illinois v. Lidster, 540 U.S. 419, 427 (2004) (quoting Brown v.
               Texas, 443 U.S. 47, 51 (1979)).
           100.  United States v. Hartwell, 436 F.3d 174, 180 (3d Cir. Pa. 2006).
           101. Ibid.
           102.  United States v. Davis, 482 F.2d 893, 908.
           103.  United States v. Pulido-Baquerizo 800 F.2d 899, 901.
           104.  Jeffrey Rosen, “The Naked Crowd: Balancing Privacy and Security in an Age
               of Terror,” Arizona Law Review 46 (2004): 613.
           105.  United States Foreign Intelligence Surveillance Court, “In Re Application of
               the Federal Bureau of Investigation for an Order Requiring the Production
               of Tangible Things from [Redacted],” American Civil Liberties Union (2013):
               13–14, https://www.aclu.org/files/assets/br13-09-primary-order.pdf.
           106. Ibid., 15.
           107. Ibid.
           108.  Robert Litt, “Privacy, Technology, and National Security: An Overview of
               Intelligence Collection,” Brookings Institution, July 19, 2013, http://www.dni.
               gov/index.php/newsroom/speeches-and-interviews/195-speeches-interviews-
               2013/896-privacy,-technology-and-national-security-an-overview-of-intelli-
               gence-collection.
           109.  Charlie Savage, “Senate Panel Presses N.S.A on Phone Logs,” The New York
               Times, July 31, 2013, http://www.nytimes.com/2013/08/01/us/nsa-surveillance.
               html?pagewanted=all; and “Section 215 White Paper,” U.S.  Department of
               Justice, p. 3, http://www.nytimes.com/interactive/2013/08/10/us/ politics/
               10obama-surveillance-documents.html?_r=0.
           110.  United States Foreign Intelligence Surveillance Court, “In Re Application of
               the Federal Bureau of Investigation for an Order Requiring the Production of
               Tangible Things From [Redacted],” 7.
           111.  Section 215 White Paper, 4.
           112.  Christopher Harress, “NSA Surveillance to Continue: Senate Votes Against
               USA Freedom Act,” International Business Times, November 18, 2014.
           113.  Charlie Savage, “N.S.A. Phone Data Collection Could Go On, Even If a Law
               Expires,” New York Times, November 19, 2014.
           114.  Barton Gellman et al., “In NSA-intercepted Data, Those Not Targeted Far
               Outnumber the Foreigners Who Are,” Washington Post, July 5, 2014.
           115.  See, for example, Mark Udall and Ron Wyden, “The White House Should
               End the Bulk Collection of Americans’ Phone Records,”  The Washington
               Post, July 26, 2013, http://articles.washingtonpost.com/2013-07-26/opinions/
               40864658_1_phone-records-collection-program-americans.
           116. See 83.
           117.  Marc Rotenberg and Chris Jay Hoofnagle, open letter to Reps. Adam Put-
               nam and William Clay, Electronic Privacy Information Center (2003),
               http://epic.org/privacy/profiling/datamining3.25.03.html; Arshad Moham-
               med and Sara Kehaulani Goo, “Government Increasingly Turning to Data
               Mining,” The Washington Post, June 15, 2006, http://www.washingtonpost.
               com/wp-dyn/content/article/2006/06/14/AR2006061402063.html; and
   231   232   233   234   235   236   237   238   239   240   241