Biometric Cyberintelligence and the Posse Comitatus Act

Margaret Hu
{"title":"Biometric Cyberintelligence and the Posse Comitatus Act","authors":"Margaret Hu","doi":"10.2139/SSRN.2886575","DOIUrl":null,"url":null,"abstract":"This Article addresses the rapid growth of what the military and intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence system is reliant upon biometric databases — for example, digitalized collections of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to describe more accurately the manner in which this new tool is dependent upon cybersurveillance and big data’s mass-integrative systems.To better understand the legal implications of biometric cyberintelligence, this Article advances three primary claims. First, it argues that the technological and programmatic architecture of biometric cyberintelligence can be embedded within the data collection and data analysis protocols of civilian governance and domestic law enforcement activities. Next, to demonstrate the potential lethality of this emerging technological and policy development, this Article illustrates how biometric data may be increasingly integrated into drone weaponry, including targeted killing and drone strike technologies. Finally, this Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, may be impotent in light of the growth of cybersurveillance.Maintaining strict separation of data between military and intelligence operations on the one hand, and civilian, homeland security, and domestic law enforcement agencies on the other hand, is increasingly difficult as cooperative data sharing increases. The Posse Comitatus Act and constitutional protections such as the Fourth Amendment’s privacy jurisprudence, therefore, must be reinforced in the digital age in order to appropriately protect citizens from militarized cyberpolicing, i.e., the blending of military/foreign intelligence tools and operations and homeland security/domestic law enforcement tools and operations. The Article concludes that, as of yet, neither statutory nor constitutional protections have evolved sufficiently to cover the unprecedented surveillance harms posed by the migration of biometric cyberintelligence from foreign to domestic use.","PeriodicalId":81162,"journal":{"name":"Emory law journal","volume":"66 1","pages":"697"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Emory law journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/SSRN.2886575","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

This Article addresses the rapid growth of what the military and intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence system is reliant upon biometric databases — for example, digitalized collections of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to describe more accurately the manner in which this new tool is dependent upon cybersurveillance and big data’s mass-integrative systems.To better understand the legal implications of biometric cyberintelligence, this Article advances three primary claims. First, it argues that the technological and programmatic architecture of biometric cyberintelligence can be embedded within the data collection and data analysis protocols of civilian governance and domestic law enforcement activities. Next, to demonstrate the potential lethality of this emerging technological and policy development, this Article illustrates how biometric data may be increasingly integrated into drone weaponry, including targeted killing and drone strike technologies. Finally, this Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, may be impotent in light of the growth of cybersurveillance.Maintaining strict separation of data between military and intelligence operations on the one hand, and civilian, homeland security, and domestic law enforcement agencies on the other hand, is increasingly difficult as cooperative data sharing increases. The Posse Comitatus Act and constitutional protections such as the Fourth Amendment’s privacy jurisprudence, therefore, must be reinforced in the digital age in order to appropriately protect citizens from militarized cyberpolicing, i.e., the blending of military/foreign intelligence tools and operations and homeland security/domestic law enforcement tools and operations. The Article concludes that, as of yet, neither statutory nor constitutional protections have evolved sufficiently to cover the unprecedented surveillance harms posed by the migration of biometric cyberintelligence from foreign to domestic use.
生物识别、网络智能和团体委员会法案
本文讨论了军事和情报界所称的“生物识别智能”的快速增长。这个新兴的情报系统依赖于生物识别数据库,例如,扫描指纹和虹膜的数字化集合,面部识别技术的数字照片,以及DNA。本文引入了术语“生物识别网络智能”,以更准确地描述这种新工具依赖于网络监控和大数据的大规模整合系统的方式。为了更好地理解生物识别网络智能的法律含义,本文提出了三个主要主张。首先,它认为生物识别网络智能的技术和程序架构可以嵌入到公民治理和国内执法活动的数据收集和数据分析协议中。接下来,为了展示这种新兴技术和政策发展的潜在杀伤力,本文说明了生物识别数据如何越来越多地集成到无人机武器中,包括定点杀伤和无人机打击技术。最后,本文认为,1878年《军务委员会法》(Posse Comitatus Act)旨在限制联邦军事资源为国内政策服务的部署,但鉴于网络监控的增长,该法案可能无能为力。随着合作数据共享的增加,一方面在军事和情报行动之间保持严格的数据分离,另一方面在民用、国土安全和国内执法机构之间保持严格的数据分离越来越困难。因此,在数字时代,必须加强《治安委员会法》(Posse Comitatus Act)和宪法保护,如第四修正案的隐私判例,以适当保护公民免受军事化网络警务的影响,即军事/外国情报工具和行动与国土安全/国内执法工具和行动的混合。文章的结论是,到目前为止,法律和宪法保护都没有发展到足以覆盖生物识别网络情报从国外转移到国内使用所带来的前所未有的监视危害。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信