B. Organisation for Economic Cooperation and Development's (OECD) Guidelines on the Protection of Privacy and Transborder Flows of Personal Data
§ Summary: The Organisation for Economic Cooperation and Development is an international body whose mission is to coordinate and develop international economic, social, and environmental policies. The Guidelines were formulated to harmonize privacy legislation while ensuring the uninterrupted flow of data.
§ Sources:
· 1979 Parliament Resolution, O.J. C 140/34 (1979).
· Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, OECD Doc. 58 (Sept. 23, 1980), available at
· Explanatory Memorandum to Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data, PP7-14, OECD Doc. C(80)58(Final) (1980), reprinted in 20 I.L.M. 422.
· OECD, POLICY ISSUES IN DATA PROTECTION AND PRIVACY : CONCEPTS AND PERSPECTIVES : PROCEEDINGS OF THE OECD SEMINAR 24TH TO 26TH JUNE 1974 (OECD Publications Center 1974).
· COLIN BENNETT, REGULATING PRIVACY: DATA PROTECTION AND PUBLIC POLICY IN EUROPE AND THE UNITED STATEs (Cornell University Press 1992) (discussing the difficulty in negotiating and agreeing upon the OECD Guidelines).
· G. B. F. NIBLETT, DIGITAL INFORMATION AND THE PRIVACY PROBLEM (Organisation for Economic Cooperation and Development, 1971).
· Robert G. Boehmer & Todd S. Palmer, The 1992 EC Data Protection Proposal: an Examination of its Implications for U.S. Business and U.S. Privacy Law, 31 AM. BUS. L.J. 265 (1993) (comparing and contrasting Convention with OECD guidelines).
· Hon. Justice Michael Kirby, Legal Aspects of Transborder Data Flows, 11 COMPUTER/L.J. 233 (1991) (discussing motivation and debate leading to creation of OECD guideline).
· P. Howard Patrick, Privacy Restrictions on Transnational Data Flows: A Comparison of the Council of Europe Draft Convention and the OECD Guidelines, 21 JURIMETRICS J. 405 (1981).
C. Council of Europe's 1981 Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data
§ Summary: The objective of the Convention is to strengthen legal protections of individuals with regard to their personal data.
§ Sources:
· Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data, January, 1981, art. 1, Europ. T. S. No. 108.
· , opened for signature Jan. 28, 1981, Europ. T.S. No. 108 § 18
· Draft Explanatory Report on the Draft Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data, Council of Europe, CJ-CD (80) 1, Addendum (Jan. 1980), reprinted in 19 I.L.M. 299, 300.
· Resolution on the Protection of the Privacy of Individuals vis-à-vis Electronic Data Banks in the Private Sector, Res. (73)22, Council of Europe, Comm. of Ministers, 224th mtg. (1973); Resolution on the Protection of the Privacy of Individuals vis-à-vis Electronic Data Banks in the Public Sector, Res. (74)29, Council of Europe, Comm. of Ministers, 224th mtg. (1974) (precursors to the Convention for the Protections of Individuals).
· Robert G. Boehmer & Todd S. Palmer, The 1992 EC Data Protection Proposal: an Examination of its Implications for U.S. Business and U.S. Privacy Law, 31 AM. BUS. L.J. 265 (1993) (comparing and contrasting Convention with OECD guidelines).
· Frank Cali, Europol's Data Protection Mechanisms: What do They Know and Whom are They Telling?, 10 TOURO INT'L L. REV. 189 (2000) (describing the Convention as the basis for current European data protection).
· Rosario Imperiali d'Afflitto, European Union Directive on Personal Privacy Rights and Computerized Information, 41 VILL. L. REV. 305 (1996) (noting that the Convention propagated data protection laws throughout Europe).
· Mike Ewing, Comment, The Perfect Storm: The Safe Harbor and the Directive on Data Protection, 24 HOUS. J. INT'L L. 315 (2002) (describing the Convention and the OECD Guidelines as some of the "first European attempts to consolidate and harmonize national data protection legislation").
D. Directive 95/46/EC
§ Summary: The EU Data Protection Directive became effective in 1998. Directives enact EU policy objectives. "They require member states to enact or change relevant national law to achieve those objectives while allowing enough flexibility to retain national legal traditions. Therefore, directives are the most prevalent form of EU law." Nancy J. King & Brian J. King, Creating Incentives for Sustainable Buildings: A Comparative Law Approach Featuring the United States and the European Union, 23 VA. ENVTL. L.J. 397 (2005).
§ Sources:
· Council Directive 95/45/EC of the European Parliament and of the Council of the European Union of Oct. 24, 1995 - ; .
· , Eur. Parl. Doc. (COD/1990/0288)
· Council Directive on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, COM (92) 422 final-SYN 287 (Brussels, Oct. 15, 1992).
· Proposal for a Council Directive Concerning the Protection of Individuals in Relation to the Processing of Personal Data, 1990 O.J. (C 277) 3.
· Report from the Commission: First Report on the Implementation of the Data Protection Directive (95/46/EC) COM (2003) 265 final (Brussels, Oct. 15, 2003).
· CHRISTOPHER KUNER, EUROPEAN DATA PRIVACY LAW AND ONLINE BUSINESS (Oxford University Press 2003) (analyzing the effect of the data protection directive on e-commerce).
· PETER P. SWIRE & ROBERT E. LITAN, NONE OF YOUR BUSINESS: WORLD DATA FLOWS, ELECTRONIC COMMERCE, AND THE EUROPEAN PRIVACY DIRECTIVE (Brookings Institution Press 1998) (examining aspects of the data protection directive in detail).
· DATA PROTECTION DIRECTIVE AND MEDICAL RESEARCH ACROSS EUROPE (Deryck Beyleveld et al. eds., 2005) (the data protection directive's affect on medical data privacy).
· Fiona M. Carlin, The Data Protection Directive: The Introduction of Common Privacy Standards, E.L. REV. 1996, 21(1), 65-70 (1996) (introducing provisions of the data protection directive).
· Fred H. Cate, The EU Data Protection Directive, Information Privacy, and the Public Interest, 80 IOWA L. REV. 431 (1995) (examining the scope and basic protections offered by the data protection directive).
· Andrew Charlesworth, Information Privacy Law in the European Union: E Pluribus Unum or Ex Uno Plures?, 54 HASTINGS L. J. 931 (2003) (discussing the Commission of the European Union's 2002 review of the Data Privacy Directive).
· Christopher Kuner, Privacy, Security and Transparency: Challenges for Data Protection Law in a New Europe, 16 EUR. BUS. L. REV. 1 (2005).
· Jeffrey B. Ritter et al., Emerging Trends in International Privacy Law, 15 EMORY INT'L L. REV. 87 (2001) (examining several global models of data privacy).
· Spiros Simitis, From the Market to the Polis: The EU Directive on the Protection of Personal Data, 80 IOWA L. REV. 445 (1995) (outlining history of the data protection directive).
· Michael W. Heydrich, Note, A Brave New World: Complying with the European Union Directive on Personal Privacy Through the Power of Contract, 25 BROOK. J. INT'L L. 407 (1999) (evaluating contractual exceptions to the EU directive).
· Tracie B. Loring, Comment, An Analysis of the Informational Privacy Protection Afforded by the European Union and the United States, 37 TEX. INT'L L.J. 421 (2002) (discussing origins of EU and US privacy law and the possibility of the EU Data Protection Directive serving as a model for other countries).
· The 'Privacy' Game, WALL ST. J., June 21, 1999, at A26 (calling the EU data protection directive "nonsensical and probably unenforceable").
· Glenn R. Simpson, Businesses Criticize U.S.-EU Privacy Pact As Hurdle to Global E-Commerce Efforts, WALL ST. J., April 6, 2000, at A24 (claiming that the data protection directive impedes trans-Atlantic business).
Effect on International Relations
· Fred H. Cate, The Changing Face of Privacy Protection in the European Union and the United States, 33 IND. L. REV. 173 (1999) (outlining basic principles and implementation of European and U.S. privacy law).
· Andrew Charlesworth, Clash of the Data Titans? US and EU Data Privacy Regulation, 6 EUR. PUB. L. 253 (2000).
· The EC Privacy Directive and the Future of U.S. Business in Europe: A Panel Discussion, 80 IOWA L. REV. 669 (1995) (panel discussion about reaching a "convergence" in data privacy protection between Europe and the U.S.).
· Julia M. Fromholz, The European Data Privacy Directive, 15 BERKELEY TECH. L.J. 461 (2000) (exploring background of EU directive and comparing EU privacy laws with US privacy laws).
· Reconciliation of the EU Privacy Directive and U.S. Objections To It, 6 INT'L CONT. ADVISER 27 (2000).
· Priscilla M. Regan, The Globalization of Privacy: Implications of Recent Changes in Europe, 52 AM. J. OF ECON. & SOCIOLOGY 257 (1993) (predicting unavoidable strengthening of US privacy law in response to EU directive).
· Steven R. Salbu, The European Union Data Privacy Directive and International Relations, 35 VAND. J. TRANSNAT'L L. 655 (2002) (examining the history leading up to the data protection directive and the effects of the directive within Europe and internationally).
· Gregory Shaffer, The Power of EU Collective Action: the Impact of EU Data Privacy Regulation on US Business Practice, European Law Journal 5 (4) (analyzing dispute between EU and US over adequacy of US data privacy protection).
· Alexander Zinser, International Data Transfer Out of the European Union: The Adequate Level of Data Protection According to Article 25 of the European Data Protection Directive, 21 J. MARSHALL J. COMPUTER & INFO. L. 547 (2003) (discussing the principles for transfer of data to third countries).
· Amy Monahan, Note, Deconstructing Information Walls: The Impact of the European Data Directive on U.S. Businesses, 29 LAW & POL'Y INT'L BUS. 275 (1998) (examining US and European approaches to data privacy, considers impact of EU directive, and calls for legislative data protection reform in the US).
· Patrick J. Murray, Comment, The Adequacy Standard Under Directive 95/46/Ec: Does U.S. Data Protection Meet This Standard?, 21 FORDHAM INT'L L.J. 932 (1998) (analyzing development of data protection in Europe and the U.S. in the public and private sectors).
· Paul Rose, Comment, A Market Response to the European Union Directive on Privacy, 4 UCLA J. INT'L L. & FOREIGN AFF. 445 (1999) (arguing for the resolution of privacy concerns not by comprehensive legislation but market forces).
· Gregory Shaffer, Globalization and Social Protection: The Impact of EU and International Rules in the Ratcheting Up of U.S. Privacy Standards, 25 YALE J. INT'L L. 1 (2000) (noting that the EU standard of privacy inevitably reaches far beyond Europe).
· Gary E. Clayton, Eurocrats Try to Stop Data at the Border, WALL ST. J., Nov. 2, 1998, at A34 (claiming that some of the side-effects of the directive are absurd).
· Bob Sherwood, Over the Border, Against the Rules: DATA TRANSFER: Many Organisations Are Regularly Breaking EU Regulations on Data Protection Without Even Knowing It, FIN. TIMES, Oct. 21, 2002, at 20 (noting the difficulty in preventing illegal data transfer that occurs during day-to-day business activities).
E. Directive 2002/58/EC
§ Summary: The 2002 EU Privacy Directive seeks to protect the privacy rights of individuals with respect to personal data processing in the electronic communication sector.
§ Sources:
· , 2004 O.J. (L 201) (EC)
· CHRISTOPHER KUNER, EUROPEAN DATA PRIVACY LAW AND ONLINE BUSINESS (Oxford University Press 2003) (analyzing the effect of the Privacy Directive on e-commerce).
· PETER P. SWIRE & ROBERT E. LITAN, NONE OF YOUR BUSINESS: WORLD DATA FLOWS, ELECTRONIC COMMERCE, AND THE EUROPEAN PRIVACY DIRECTIVE (Brookings Institution Press 1998) (examining aspects of the Privacy Directive in detail).
· Frederic Debusseré, The EU E-Privacy Directive: A Monstrous Attempt to Starve the Cookie Monster?, 13 INT'L J.L. & INFO. TECH. 70 (2005) (noting that the privacy directive replaced Directive 97/66/EC and was not immediately adopted by all EU member states).
· Chuan Sun, The European Union Privacy Directive and its Impact on the U.S. Privacy Protection Policy: A Year 2003 Perspective, 2 NW. J. TECH. & INTELL. PROP. 5 (2003) (describing data privacy directive and how it differs from Safe Harbor laws).
Section II: Data Privacy in the United States
A. History and Background of Data Privacy
§ Robert M. Gellman, Fragmented, Incomplete, and Discontinuous: The Failure of Federal Privacy Regulatory Proposals and Institutions, 6 SOFTWARE L.J. 199 (1993) (outlining history of data protection within the US and noting that the US had previously been the most innovative in addressing the concept of data privacy).
§ Fred H. Cate, The Changing Face of Privacy Protection in the European Union and the United States, 33 IND. L. REV. 173 (1999) (noting that Congress has "virtually ignored" privacy issues for decades).
§ Paul M. Schwartz, Privacy and Participation: Personal Information and Public Sector Regulation in the United States, 80 IOWA L. REV. 553 (1995) (discussing the difference between the 'participatory information' protection of the EU and the 'information seclusion' protection of the US).
B. Freedom of Information Act of 1966
§ Summary: The Freedom of Information Act (FOIA) is a federal statute that provides that individuals with the right to request access to federal agency records. The FOIA was amended by the Electronic Freedom of Information Act Amendments of 1996 (E-FOIA). E-FOIA grants the public access to government documents via computer communications.
§ Sources:
· Freedom of Information Act, 5 U.S.C. §552 (1976).
· FOIA Legislative History, http://www.gwu.edu/~nsarchiv/nsa/foialeghistory/legistfoia.htm (detailing legislative history of the FOIA, including its 1974, 1976, 1986, 1996, and 2002 amendments).
· US Department of State Website, http://foia.state.gov/default.asp (provides general information about the FOIA and the E-FOIA and provides direct access to commonly requested documents pursuant to the act).
· HERBERT N. FOERSTEL, FREEDOM OF INFORMATION AND THE RIGHT TO KNOW : THE ORIGINS AND APPLICATIONS OF THE FREEDOM OF INFORMATION ACT (Greenwood Press 1999) (examining the development and usability of the FOIA).
· Christopher M. Mason, Comment, Developments Under the Freedom of Information Act-1981, 1982 DUKE L.J. 423 (1982) (general overview of the FOIA).
· Kristen Elizabeth Uhl, Comment, The Freedom of Information Act Post-9/11: Balancing the Public's Right to Know, Critical Infrastructure Protection, and Homeland Security, 53 AM. U. L. REV. 261 (2003) (describing the FOIA and its evolution from 1966, and the "erosion" of the public's access to government information under the Bush administration).
C. Privacy Act of 1974
§ Summary: The Privacy Act attempts to "regulate the collection, maintenance, use, and dissemination of personal information by federal executive branch agencies."
§ Sources:
· Privacy Act of 1974, 5 U.S.C. §552a (1994).
· Legislative History of the Privacy Act See House Comm. on Gov't Operations and Senate Comm. on Gov't Operations, S. 3418, 94th Cong. (2d Sess., 1976) (Public Law 93-579) (the entire legislative history of the Privacy Act can be found in this source book).
· JUSTIN D. FRANKLIN & ROBERT F. BOUCHARD, GUIDEBOOK TO THE FREEDOM OF INFORMATION AND PRIVACY ACTS (Thomson West 1986).
· James Beverage, The Privacy Act of 1974: An Overview, 1976 DUKE L.J. 301 (1976).
· Todd R. Coles, Does the Privacy Act of 1974 Protect Your Right to Privacy? An Examination of the Routine Use Exemption, 40 AM. U. L. REV. 957 (1991) (examining if the routine use exemption undermines the safeguarding of individual privacy intended by the Privacy Act).
· (providing an overview of the history, objectives, and provisions of the Privacy Act).
Section III: US Anti-Terror Legislation and the Resulting PNR Debate
A. Domestic Security
HOMELAND SECURITY ACT OF 2002
§ Summary: The Homeland Security Act (HSA) of 2002 consolidated many of the federal agencies responsible for border and transportation security into a single department, the Department of Homeland Security (DHS). The principal sub-departments of DHS include: Transportation Security Agency (TSA), and Immigration, Customs Enforcement (ICE), and Bureau of Customs and Border Protection (CBP). The CPB, in turn, includes the inspections service of the former Immigration and Naturalization Services (INS), the U.S. Border Patrol, the inspections service of the U.S. Customs Service, and the border-related inspection programs of the Animal and Plant Health Inspection Service (APHIS).
§ Sources:
· Homeland Security Act of 2002, Pub. L. No. 107-296, 116 Stat. 2135.
·
·
· (Oct. 8, 2001) (Executive Order establishing the Office of Homeland Security and the Homeland Security Council)
· (providing a comprehensive, searchable collection of pertinent legislative history documents in text and .pdf formats)
· DONALD F. KETTL, DEPARTMENT OF HOMELAND SECURITY'S FIRST YEAR: A REPORT CARD (The Century Foundation 2004) (evaluating effectiveness of DHS and problems it encountered in its first year).
· Jonathan Thessin, Department of Homeland Security, 40 HARV. J. ON LEGIS. 513 (2003) (detailed analysis of the HSA).
· Darren W. Stanhouse, Comment, Ambition and Abdication: Congress, the Presidency, and the Evolution of the Department of Homeland Security, 29 N.C. J. INT'L L. & COM. REG. 691 (2004) (noting the possibility of abuse of power that arises from the HSA).
· Jackie Calmes, Senate Approves Homeland Bill With 90-9 Vote, WALL ST. J., Nov. 20, 2002, at A6 (announcing the creation of the new homeland-security department).
· Newt Gingrich, Congress's Tangled Purse Strings, WALL ST. J., June 10, 2002, at A16 (praising the proposal to create a DHS but pointing out that structural reform is needed to make it effective).
· Nicholas Kulish, House Panel Votes Down Parts Of Homeland-Security Plan, WALL ST. J., July 12, 2002, at A4 (describing the challenges in restructuring agencies into the new DHS).
· Washington's Mega-Merger, THE ECONOMIST, Nov. 23, 2002 (predicting challenges the DHS will face such as logistical issues, budget problems, and conflicts with civil libertarians).
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001
§ Summary: The USA Patriot Act was enacted shortly after the September 11, 2001 terrorist attacks in order to provide the federal government with increased authority to track and intercept communications, both for law enforcement and foreign intelligence gathering purposes. The Act empowers the US Secretary of Treasury to investigate and prosecute U.S. financial institutions for foreign money laundering. The Act creates new crimes, penalties, and provides for more efficient procedures to combat terrorist threats. The Act has been widely criticized by civil rights groups and has been welcomed and appreciated by law enforcement. See George Anastaplo, September Eleventh, the ABC'S of a Citizen's Responses: Explorations, 29 OKLA. CITY U. L. REV. 165, 342 (2004).
§ Sources:
· Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001, Pub. L. No. 107-56, 115 Stat. 272.
· Legislative History: The USA PATRIOT Act has a short legislative history. It was introduced shortly after the September 11, 2001 terrorist attacks and was signed into law on October 26, 2001.
o Sponsor: Rep Sensenbrenner, F. James, Jr. [R-WI] (introduced 10/23/2001).
o (providing key documents from the legislative history of the PATRIOT Act).
·
· PATRIOT DEBATES: EXPERTS DEBATE THE USA PATRIOT ACT (Stewart A. Baker et al. eds., 2005) (examining both sides of controversial aspects of the Patriot Act).
SUPPORT FOR THE PATRIOT ACT:
o Press Release, U.S. Department of Justice, (Mar. 6, 2006) (announcing the reauthorization of the Patriot Act-H.R. 3199-with several amendments).
o Press Release, Department of Homeland Security, (Dec. 14, 2005) (citing specific examples of where the Patriot Act has been successful).
o Tracey T. Gonzalez, Individual Rights Versus Collective Security: Assessing the Constitutionality of the USA Patriot Act, 11 U. MIAMI INT'L & COMP. L. REV. 75 (2003) (concluding that the Patriot Act adequately balances national security with protecting individual privacy).
o John Ashcroft, Attorney General, The Patriot Act: Wise Beyond Its Years, WALL ST. J., Oct. 26, 2004, at A24 (stating that the Patriot Act is a "phenomenal success").
o Eric Posner & John Yoo, The Patriot Act Under Fire, Wall St. J., Dec. 9, 2003, at A26 (arguing that the Patriot Act's "changes are modest and are worth the small, if any, reduction in civil liberties").
CRITIQUES OF THE PATRIOT ACT:
O DAVID COLE & JAMES X. DEMPSEY, TERRORISM AND THE CONSTITUTION: SACRIFICING CIVIL LIBERTIES IN THE NAME OF NATIONAL SECURITY (The New Press 2006) (alleging that the Patriot Act repeats many of the mistakes of past governments).
o STEPHEN J. SCHULHOFER, RETHINKING THE PATRIOT ACT: KEEPING AMERICA SAFE AND FREE (Century Foundation Press 2005) (arguing that "although some Patriot Act provisions are essential and do provide protections for civil liberties, some of the powers conferred are too broad and insufficiently attentive to interests of transparency and accountability").
o Kevin Bankston & Megan E. Gray, Government Surveillance and Data Privacy Issues: Foundations and Developments, 3 NO. 8 PRIVACY & INFO. L. REP. 1 (2003) (arguing that the Patriot Act passed with "practically no debate over its potentially disastrous impact on civil liberties").
o Erwin Chemerinsky, Civil Liberties and the War on Terrorism, 45 WASHBURN L.J. 1 (2005) (criticizing executive and legislative responses to the September 11th terrorist attacks).
o Christopher P. Raab, Fighting Terrorism in an Electronic Age: Does the Patriot Act Unduly Compromise our Civil Liberties?, 2006 DUKE L. & TECH. REV. 3 (2006) (concluding that the multiple provisions of the Patriot Act are overbroad and in need of revision).
o Stephen J. Schulhofer, The New World of Foreign Intelligence Surveillance, 17 STAN. L. & POL'Y REV. 531 (2006) (pointing out lack of accountability within the Patriot Act).
o John W. Whitehead & Steven H. Aden, Forfeiting "Enduring Freedom" for "Homeland Security": A Constitutional Analysis of the USA PATRIOT Act and the Justice Department's Anti-Terrorism Initiatives, 51 AM. U. L. REV. 1081 (2002) (asserting that aspects of the Patriot Act is unconstitutional).
o Edward Alden, Ashcroft Takes to Road to Defend Security Law: The Patriot Act, Aimed at Pursuing Terror Suspects in the US, has Become a Victim of its Own Success, FIN. TIMES, Aug. 20, 2003 (noting that two years after the 9/11 attacks, the Patriot Act if facing more criticism and pressure).
o Susan N. Herman, The USA Patriot Act and the Submajoritarian Fourth Amendment, 41 HARV. C.R.-C.L. L. REV. 67 (2006) (arguing that "the Patriot Act destroys essential checks and balances" (citing Susan N. Herman, , JURIST, Dec. 3, 2001)).
o Ann Beeson & Jameel Jaffer, ACLU, (2003)
o Nancy Chang, Ctr. for Constitutional Rights, (2001)
Enhanced Border Security and Visa Entry Reform Act of 2002
§ Summary: The Act was passed to improve the federal government's ability to screen aliens seeking to enter the U.S., facilitate the sharing of border-related information among U.S. agencies, and improve efforts to keep track of foreign students and foreign exchange visitors in the United States.
§ Sources:
· Enhanced Border Security and Visa Entry Reform Act of 2002, Pub. L. No. 107-173, 116 Stat. 543 (2002).
· 147 Cong. Rec. H10465, H10466 (daily ed. Dec. 18, 2001) (statement of Rep. Sensenbrenner stressing the need to revamp immigration law in order to better track terrorists).
· Role of Technology in Preventing the Entry of Terrorists into U.S: Hearing Before the Subcomm. on Technology, Terrorism, and Government Information, Committee on the Judiciary, 107th Cong. (2001) (examining role of information technology in preventing terrorism and illegal immigration).
·
· Lawrence M. Lebowitz & Ira L. Podheiser, A Summary of the Changes in Immigration Policies and Practices After the Terrorist Attacks of September 11, 2001: The USA Patriot Act and Other Measures, 63 U. PITT. L. REV. 873 (2002) (discussing impending security reform, especially with respect to scrutiny of foreign nationals).
· Catherine Etheridge Otto, Comment, Tracking Immigrants in the United States: Proposed and Perceived Needs to Protect the Borders of the United States, 28 N.C. J. INT'L L. & COM. REG. 477 (2002) (describing efforts of Border Security Act to curb illegal immigration to help combat terrorism).
Maritime Transportation Security Act of 2002
§ Summary:
· "Requires vessels and port facilities to conduct vulnerability assessments and develop security plans that may include passenger, vehicle and baggage screening procedures; security patrols; establishing restricted areas; personnel identification procedures; access control measures; and/or installation of surveillance equipment. By creating a consistent security program for all our nation's ports, we are better able to identify and deter threats."
· "Also required the establishment committees in all the nation's ports to coordinate the activities of all port stakeholders, including other federal, local and state agencies, industry and the boating public. These groups, called Area Maritime Security Committees, are tasked with collaborating on plans to secure their ports so that the resources of an area can be best used to deter, prevent and respond to terror threats."
§ Sources:
· Maritime Transportation Security Act of 2002, Pub. L. No. 107- 295, 116 Stat. 2064, 2068 (2002).
· Robert G. Clyne, Terrorism and Port/Cargo Security: Developments and Implications for Marine Cargo Recoveries, 77 TUL. L. REV. 1183 (2003) (discussing effect of 9/11 on transport of goods by sea).
Information Awareness Office
§ Summary: The Information Awareness Office was established by the Defense Advanced Research Projects Agency (DARPA) in January 2002, and began funding the development of the now defunct Total Information Awareness program, subsequently renamed the Terrorism Information Awareness program .The TIA program researched tracking and storing personal information of millions of Americans to identify potential terrorists. The prospect of mass "dataveillance" brought about criticisms and concerns that the TIA violated civil liberties and the right to privacy.
§ Sources:
· ELECTRONIC PRIVACY INFORMATION CENTER, (TIA), (introducing TIA program with links to the TIA Report to Congress, then-director Pointdexter's 2002 speech about TIA, and description of the TIA system).
· Seth F. Kreimer, Watching the Watchers: Surveillance, Transparency, and Political Freedom in the War on Terror, 7 U. PA. J. CONST. L. 133 (2004) (describing history of domestic data surveillance).
B. US Aviation Legislation
Air Commerce Act
§ Summary: The Air Commerce Act of 1926 was some of the earliest federal legislation designed to ensure aviation safety.
§ Sources:
· Air Commerce Act, ch. 344, §§2(c), 4, 44 Stat. 569, 570 (1926)
· Paul S. Dempsey, Transportation: A Legal History, 30 TRANSP. L.J. 235 (2003) (discussing purpose of Air Commerce Act).
· Ryan S. Holtan-Murphy, Flying the Unfriendly Skies: Federal Aviation Regulations as Regulatory Takings, 2003 WIS. L. REV. 699 (2003) (examining the disparity between stated goals of aviation legislation and their actual effectiveness).
Federal Aviation Act
§ Summary: The Federal Aviation Act was created in 1958 and established the Federal Aviation Administration to centralize governance of air transport.
§ Sources:
· 49 U.S.C. § 40101 (2002).
· Richard H. Fallon, Jr., Enforcing Aviation Safety Regulations: The Case for a Split-Enforcement Model of Agency Adjudication, 4 ADMIN. L.J. 389 (1991) (discussing the general structure of aviation regulation).
· Gregg D. Martin, Enforcement of Federal Aviation Regulations by the Federal Aviation Administration, 53 J. AIR L. & COM. 543 (1987) (discussing policies and procedures followed by the Federal Aviation Administration in enforcing aviation regulations).
Aviation and Transportation Security Act
§ Summary: "Establishes the Transportation Security Administration (TSA) and allows for enhanced security screening at U.S. airports, as well as the authority to place federal air marshals on U.S. flights." See
§ Sources:
· Aviation and Transportation Security Act, Pub. L. No. 107-71, 115 Stat. 597 (2001).
· Paul J. Keating et al., Recent Developments in Aviation and Space Law, 38 TORT TRIAL & INS. PRAC. L.J. 205 (2003) (discussing aviation changes post-9/11, for example, the ATSA, security screening, and other issues).
· Kent C. Krause, Putting the Transportation Security Administration in Historical Context, 68 J. AIR L. & COM. 233 (2003) (noting increased post-9/11 security surrounding the already heavily regulated airline industry).
· Gregory Robert Schroer, Doomed to Repeat the Past: How the TSA is Picking Up Where the FAA Left Off, 32 TRANSP. L.J. 73 (2004) (discussing the history of the FAA and continued problems of the ATSA).
Air Transportation Safety and System Stabilization Act
§ Summary
· Provides airlines up to $10 billion in loans and $5 billion in grants to compensate for losses due to the attacks on September 11, 2001
· Establishes an Air Transportation Stabilization Board to administer loans
· Establishes compensation program for individuals who were killed or injured from the attacks on September 11, 2001, and their survivors
§ Sources:
· Air Transportation Safety and System Stabilization Act, Pub. L. No. 107-42, 115 Stat. 230 (2001).
· Tamara A. Marshall, The Warsaw Convention: A Cat With Nine Lives Walks the Plank One More Time, 22 N. ILL. U. L. REV. 337 (2002) (discussing the ATSSSA's effects, including victim compensation and airline insurance coverage).
· David T. Norton, Recent Developments in Aviation Law, 67 J. AIR L. & COM. 1107 (2002) (detailed summary of the ATSSSA).
Computer Assisted Passenger Screening (CAPS)
§ CAPS, a now defunct security system, was an automated procedure that analyzed information contained in airline passenger records to determine whether passengers posed a security threat. The system assessed data contained in passenger records based on criteria developed by the FAA Office of Civil Aviation Security Intelligence. CAPS separated airline passengers into two groups, high risk and low risk. Most of the profile criteria were never disclosed. However, many of the criteria the system used were determined through analysis of public records. "It is likely that CAPS profiles take at least some of the following factors into account: passenger's address; method of ticket purchase; when the ticket was purchased; travel companions; rental car status; departure date; flight destination and origin; passenger destination; and the round trip or one-way nature of the ticket. The carry-on and checked bags of high-risk passengers (called selectees in airline security parlance) are subjected to additional security measures. Northwest Airlines began the development of the CAPS system in 1994. Development efforts intensified after a TWA flight mysteriously crashed; investigators' initial (erroneous) belief that a bomb was involved spurred a renewed focus on developing the CAPS system. Armed with a grant from the FAA, Northwest Airlines completed the initial development of CAPS in 1996. The FAA then modified CAPS into CAPPS and, in 1997, CAPPS technology was offered to airlines by the FAA for voluntary adoption." (NAT'L MATERIALS ADVISORY BD., COMM'N ON ENG'G & TECHNICAL SYS., & NAT'L RESEARCH COUNCIL, (National Academy Press 1999)
§ CAPS/CAPPS was met with significant criticism and ultimately was not widely employed. CAPPS was subsequently replaced by CAPPS II which in turn was supplanted by Secure Flight.
· The Federal Aviation Reauthorization Act of 1996 required the FAA to help airlines to develop CAPS as part of its overall security effort. Pub. L. No. 104-264, § 307, 110 Stat. 3213, 3253 (1996).
· (discussing origin of CAPS system).
· Stephen W. Dummer, Comment, Secure Flight and Data Veillance, a New Type of Civil Liberties Erosion: Stripping Your Rights When You Don't Even Know It, 75 MISS. L.J. 583 (2006) (history of CAPS, CAPPS II and Secure Flight).
§ Numerous critics have voiced their concern regarding CAPS/CAPPS' effectiveness and potential for abuse:
· , Feb. 27, 2002 (arguing that profiling is ineffective as a security measure, may result in illegal discrimination, and violates individual's privacy rights).
· NAT'L MATERIALS ADVISORY BD., COMM'N ON ENG'G & TECHNICAL SYS., & NAT'L RESEARCH COUNCIL, (National Academy Press 1999) (noting high-risk passengers face additional security measures).
· Samidh Chakrabarti & Aaron Strauss, (contesting CAPS' efficacy as a security mechanism through statistical analysis and computer simulation).
· Charu A. Chandrasekhar, Note, Flying While Brown: Federal Civil Rights Remedies to Post-9/11 Airline Racial Profiling of South Asians, 10 ASIAN L.J. 215 (2003) (arguing against racial profiling).
§ The details of how CAPS operates are necessarily guarded by the FAA so a comprehensive analysis of its success or failure at accomplishing its objectives has been unavailable. Several commentators, however, have noted that the system appeared to be effective:
· NAT'L MATERIALS ADVISORY BD., COMM'N ON ENG'G & TECHNICAL SYS., & NAT'L RESEARCH COUNCIL, (National Academy Press 1999) (noting that CAPS appears to accomplish its goals but the FAA should develop quantitative measures of its success).
Computer-Assisted Passenger Prescreening System (CAPPS II)
§ After the September 11, 2001 terrorist attacks the national focus on aviation security dramatically increased. As such, congress passed the Aviation and Transportation Security Act and the Air Transportation Safety and System Stabilization Act both of which brought airport screening services under federal control. In early 2003, under the authority of §136 of the ATSA, the TSA mandated the creation and implementation of CAPPS II. CAPS II was designed to replace the then current, limited CAPS system which was not widely used; in the cases it was being used it was limited to checked luggage screening instead of a grounds upon which aviation security officials could subject travelers to questioning and personal searches. See Paul Rosenzweig, Civil Liberty and the Response to Terrorism, 42 Duq. L. Rev. 663 (2004).
§ "CAPPS II was designed to match a passenger's identity with a databases record to provide a real time risk assessment. If it had been implemented as originally designed, CAPPS II would place travelers in one of three categories: (1) Green which indicated a low risk passenger; (2) Yellow, because the passenger is 'potentially untrustworthy' or they may be a risk, further investigation is required wherein, depending on the outcome of the investigation, either they would be allowed to board the aircraft or precluded from flying. (3) Red denoted the passenger is 'untrustworthy' and therefore a risk to the aircraft, wherein law enforcement would be notified and the person would be detained or arrested." Stephen W. Dummer, Comment, Secure Flight and Data Veillance, a New Type of Civil Liberties Erosion: Stripping Your Rights When You Don't Even Know It, 75 MISS. L.J. 583 (2006).
§ CAPPS II faced arguably more opposition than the original CAPS program. As a result, the White House cancelled the program and ultimately replaced it with Secure Flight.
SOURCES CRITICAL OF CAPPS II
· Charu A. Chandrasekhar, Note, Flying While Brown: Federal Civil Rights Remedies to Post-9/11 Airline Racial Profiling of South Asians, 10 ASIAN L.J. 215 (2003) (arguing against racial profiling).
· Stephen W. Dummer, Comment, Secure Flight and Data Veillance, a New Type of Civil Liberties Erosion: Stripping Your Rights When You Don't Even Know It, 75 MISS. L.J. 583 (2006) (noting intrusive nature of CAPPS II data parameters).
· Leigh A. Kite, Note, Red Flagging Civil Liberties and Due Process Rights of Airline Passengers: Will a Redesigned CAPPS II System Meet the Constitutional Challenge?, 61 WASH. & LEE L. REV. 1385 (2004) (noting CAPPS II's potential for infringing civil liberties of innocent travelers).
· David Armstrong & Joseph Pereira, Flight Risks: Nation's Airlines Adopt Aggressive Measures For Passenger Profiling-In Shift, FBI Gives Carriers Access to Its Watchlists; Database Plays New Role-A Pilot Banishes Mr. Ali, WALL ST. J., Oct. 23, 2001, at A1 (citing examples of possible profiling against Arab-Americans).
· Matthew L. Wald, Government Is 'Reshaping' Airport Screening System, N.Y. TIMES, July 16, 2004, at A21 (quoting an ACLU official as stating that they did not want the government to use the CAPPS II System to help turn the United States "into a society where everybody is treated like a suspect and everybody is investigated").
SOURCES SUPPORTING CAPPS II AND PASSENGER PROFILING
· Heather MacDonald, Hijacked by the `Privocrats', WALL ST. J., Aug. 5, 2004, at A10 (claiming that CAPPS II is an "innocuous identity verification system").
· Sam H. Verhovek, Americans Give in to Race Profiling, N.Y. TIMES, Sept. 23, 2001, at 1A (discussing a perceived increase in anti-Arab racial profiling by average Americans).
· Henry Weinstein, Racial Profiling Gains Support as Search Tactic, L.A. TIMES, Sept. 24, 2001, at A1 (discussing increased support for racial profiling post-9/11).
C. PNR (Passenger Name Record) Dispute
§ Summary: One of the areas in which the conflict between the Department of Homeland Security and the European Privacy Directive is most obvious is in the handling of PNR data. The U.S. Customs and Border Protection Bureau requires airlines to transfer passenger data in order to prevent terrorism. However, the EU does not believe that the United States has the "adequate level of protection" as outlined in Directive 95/45/EC for handling personal data.
§ Sources:
· ELECTRONIC PRIVACY INFORMATION CENTER, EU-US Airline Passenger Data Disclosure, available at http://www.epic.org/privacy/intl/passenger_data.html (detailed history of PNR data conflict).
· Caitlin Friedemann, Council Decision Regarding Agreement Between the European Community and the United States on the Use of Passenger Name Record Data, 11 COLUM. J. EUR. L. 207 (2004/2005).
· Arnulf S. Gubitz, The U.S. Aviation and Transportation Security Act of 2001 in Conflict with the E.U. Data Protection Laws: How Much Access to Airline Passenger Data Does the United States Need to Combat Terrorism?, 39 NEW ENG. L. REV. 431 (2005).
· Pablo Mendes de Leon, The Fight Against Terrorism Through Aviation: Data Protection Versus Data Protection, 31 Air & Space L. 320 (2006).
· Anthony A. Santangelo & Thomas J. Whalen, United States Regulation of Non-US Airlines Operating to the United States, 30 Air & Space L. 330 (2005).
· Megan Roos, Note, Safe on the Ground, Exposed in the Sky: The Battle Between the United States and the European Union Over Passenger Name Information, 14 TRANSNAT'L L. & CONTEMP. PROBS. 1137 (2005) (describing the PNR conflict).
· Robert Block, U.S. Reaches Tentative Deal With EU Over Passenger Data, WALL ST. J., Dec. 17, 2003, at D3 (
Research on the Chinese Outbound
Travel Market Report