Joint Appendix TOC Vol 2 Edited

Total Page:16

File Type:pdf, Size:1020Kb

Joint Appendix TOC Vol 2 Edited USCA Case #16-1135 Document #1651335 Filed: 12/15/2016 Page 1 of 370 ORAL ARGUMENT NOT YET SCHEDULED No. 16-1135, consolidated with No. 16-1139 IN THE UNITED STATES COURT OF APPEALS DISTRICT OF COLUMBIA CIRCUIT COMPETITIVE ENTERPRISE INSTITUTE, et al., Petitioners, v. UNITED STATES DEPARTMENT OF HOMELAND SECURITY, et al., Respondents. ON PETITION FOR REVIEW OF FINAL RULE OF TRANSPORTATION SECURITY ADMINISTRATION JOINT APPENDIX VOLUME II OF II (JA 416 – JA 773) BENJAMIN C. MIZNER MARC ROTENBERG Principal Deputy Assistant Counsel of Record Attoney General ALAN BUTLER CHANNING D. PHILLIPS JERAMIE SCOTT United States Attorney Electronic Privacy Information Center MARK B. STERN 1718 Connecticut Ave. NW, Suite 200 SHARON SWINGLE Washington, DC 20009 (202) 353-2689 (202) 483-1140 Attorneys, Appellate Staff Counsel for Petitioner Civil Division, Room 7250 Electronic Privacy Information Center U.S. Department of Justice 950 Pennsylvania Ave., N.W. SAM KAZMAN Washington, D.C. 20530 HANS BADER COMPETITIVE ENTERPRISE INSTITUTE 1310 L Street NW, 7th Floor Washington, DC 20005 (202) 331-2278 Counsel for Petitioner December 15, 2016 Competitive Enterprise Institute USCA Case #16-1135 Document #1651335 Filed: 12/15/2016 Page 2 of 370 TABLE OF CONTENTS Page VOLUME I Passenger Screening Using Advanced Imaging Technology, Final Rule (Mar. 3, 2016) (81 Fed. Reg. 11364) ............................................................................................ JA 000001 Passenger Screening Using Advanced Imaging Technology; Regulatory Impact Analysis and Final Regulatory Flexibility Analysis (Feb. 18, 2016) ............................ JA 000044 Privacy Impact Assessment for TSA Whole Body Imaging (Jan. 2, 2008) ................................................................... JA 000203 TSA Blog, Pilot Program Tests Millimeter Wave for Primary Passenger Screening (Feb. 20, 2009) .............................. JA 000212 Memorandum from TSA Acting Administrator Gale D. Rossides to DHS Secretary Janet Napolitano (Feb. 27, 2009) ............................................................................................... JA 000215 Letter from EPIC et al. to Secretary Janet Napolitano (May 31, 2009) ................................................................................ JA 000217 Letter from Acting TSA Administrator Gale Rossides to EPIC (Jun. 19, 2009) ....................................................................... JA 000220 TSA, Imaging Technology Airport Brief, slide 6 (Jul. 2009), .............................................................................................. JA 000222 Intelligence Reform: The Lessons and Implications of the Christmas Day Attack: Hearing Before the Senate Committee on Homeland Security and Government Affairs, 111th Congress (Post-hearing questions submitted to the Honorable Janet A. Napolitano from Senator Daniel K. Akaka) (Jan. 20, 2010) ................................................... JA 000223 i USCA Case #16-1135 Document #1651335 Filed: 12/15/2016 Page 3 of 370 Intelligence Reform: The Lessons and Implications of the Christmas Day Attack: Hearing Before the Senate Committee on Homeland Security and Government Affairs, 111th Congress (Post-hearing questions submitted to the Honorable Janet A. Napolitano from Senator Tom Coburn) (Jan. 20, 2010) .................................................................. JA 000227 Letter from Representative Bennie G. Thompson to Gail Rossides, TSA Acting Administrator (Jan. 21, 2010) .................... JA 000234 Letter from EPIC et al. to Secretary Janet Napolitano and Chief Privacy Officer Mary Ellen Callahan (Apr. 21, 2010) ............................................................................................... JA 000236 Letter from Secretary Janet Napolitano to Senator Susan Collins (Apr. 27, 2010) ................................................................... JA 000245 Letter from Francine Francine J. Kerner, TSA Chief Counsel to EPIC et al. (May 28, 2010) ........................................... JA 000246 TSA Blog, Opt Out Turns Into Opt In (Nov. 24, 2010) ................. JA 000257 TSA Recent Scanner Trouble: Rea Strategy or Wasteful Smokescreen: Hearing Before the Subcommittee on Tansportation Security the Comm. Of the Homeland Security, 114th Cong. (statement of Rep. Danny Davis on behalf of Ranking Member Sheila Jackson Lee) (Nov. 15, 2012) ......................................................................................... JA 000264 TSA, Passenger Screening Using AIT: Initial Regulatory Impact Analysis (Mar. 19, 2013) ..................................................... JA 000265 VOLUME II Passenger Screening Using Advanced Imaging Technology, 78 Fed. Reg. 18,287 (Mar. 26, 2013) ......................... JA 000416 Comment of Anonymous (posted Apr. 1, 2013) (TSA-2013-0004-0114) .................................................................. JA 000432 Comment of Milton John Schick (posted Apr. 2, 2013) (TSA-2013-0004-0162) .................................................................. JA 000433 ii USCA Case #16-1135 Document #1651335 Filed: 12/15/2016 Page 4 of 370 Comment of Mary Graham (posted Apr. 2, 2013) (TSA-2013-0004-0168) .................................................................. JA 000434 Comment of Jean L. Cooper (posted Apr. 2, 2013) (TSA-2013-0004-0193) ................................................................. JA 000435 Comment of Fred (posted Apr. 3, 2013) (TSA-2013-0004-0246) .................................................................. JA 000438 Comment of Barbara Sheridan (posted Apr. 3, 2013) (TSA-2013-0004-0279) .................................................................. JA 000439 Comment of Allison J. Jones (posted Apr. 4, 2013) (TSA-2013-0004-0327) .................................................................. JA 000440 Comment of Dan (posted Apr. 4, 2013) (TSA-2013-0004-0342) .................................................................. JA 000441 Comment of Anonymous (posted Apr. 4, 2013) (TSA-2013-0004-0343) .................................................................. JA 000442 Comment of Anonymous (posted Apr. 8, 2013) (TSA-2013-0004-0390) .................................................................. JA 000443 Comment of Michael Alan Muller (posted Apr. 8, 2013) (TSA-2013-0004-0401) .................................................................. JA 000444 Comment of Donna A. Harrison (posted Apr. 10, 2013) (TSA-2013-0004-0478) .................................................................. JA 000445 Comment of Donald Eugene Ryan (posted Apr. 17, 2013) (TSA-2013-0004-0596) ........................................................ JA 000446 Comment of T.A. (posted Apr. 17, 2013) (TSA-2013-0004-0597) .................................................................. JA 000447 Comment of Martin A. Dyckman (posted Apr. 17, 2013) (TSA-2013-0004-0599) .................................................................. JA 000448 Comment of James L. Bareuther (posted Apr. 17, 2013) (TSA-2013-0004-0614) .................................................................. JA 000449 iii USCA Case #16-1135 Document #1651335 Filed: 12/15/2016 Page 5 of 370 Comment of Anonymous (posted Apr. 19, 2013) (TSA-2013-0004-0644) .................................................................. JA 000450 Comment of Jeffress B. Hailand (posted Apr. 22, 2013) (TSA-2013-0004-0686) .................................................................. JA 000454 Comment of Sola Egunyomi (posted Apr. 22, 2013) (TSA-2013-0004-0740) .................................................................. JA 000455 Comment of Anonymous (posted Apr. 23, 2013) (TSA-2013-0004-0774) .................................................................. JA 000460 Comment of Todd Edward Heimann (posted Apr. 23, 2013) (TSA-2013-0004-0916) ........................................................ JA 000461 Comment of Ben Fox (posted Apr. 24, 2013) (TSA-2013-0004-1039) .................................................................. JA 000462 Comment of Gayle M. (posted May 7, 2013) (TSA-2013-0004-1439) .................................................................. JA 000463 Comment of Michael Gingrich (posted May 7, 2013) (TSA-2013-0004-1460) .................................................................. JA 000464 Comment of Anonymous (posted May 7, 2013) (TSA-2013-0004-1490) .................................................................. JA 000465 Comment of Anonymous (posted May 13, 2013) (TSA-2013-0004-1617) .................................................................. JA 000466 Comment of Kaitlin Duck Sherwood (posted May 15, 2013) (TSA-2013-0004-1641) ........................................................ JA 000467 Comment of Lloyd L. Jordan (posted May 16, 2013) (TSA-2013-0004-1643) .................................................................. JA 000468 Comment of Chris Doyle (posted May 16, 2013) (TSA-2013-0004-1737) .................................................................. JA 000469 Comment of W. Hughes (posted May 16, 2013) (TSA-2013-0004-1741) .................................................................. JA 000470 iv USCA Case #16-1135 Document #1651335 Filed: 12/15/2016 Page 6 of 370 Comment of Melissa E. Teates (posted May 20, 2013) (TSA-2013-0004-1823) .................................................................. JA 000471 Comment of Abraham Richards Burnette (posted May 21, 2013) (TSA-2013-0004-1886) .................................................
Recommended publications
  • Adits, Caves, Karizi-Qanats, and Tunnels in Afghanistan: an Annotated Bibliography by R
    Adits, Caves, Karizi-Qanats, and Tunnels in Afghanistan: An Annotated Bibliography by R. Lee Hadden Topographic Engineering Center November 2005 US Army Corps of Engineers 7701 Telegraph Road Alexandria, VA 22315-3864 Adits, Caves, Karizi-Qanats, and Tunnels In Afghanistan Form Approved REPORT DOCUMENTATION PAGE OMB No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE 30-11- 2. REPORT TYPE Bibliography 3. DATES COVERED 1830-2005 2005 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER “Adits, Caves, Karizi-Qanats and Tunnels 5b. GRANT NUMBER In Afghanistan: An Annotated Bibliography” 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER HADDEN, Robert Lee 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT US Army Corps of Engineers 7701 Telegraph Road Topographic Alexandria, VA 22315- Engineering Center 3864 9.ATTN SPONSORING CEERD / MONITORINGTO I AGENCY NAME(S) AND ADDRESS(ES) 10.
    [Show full text]
  • Women, Health and Imprisonment Catrin
    THE IMPRISONED BODY: WOMEN, HEALTH AND IMPRISONMENT CATRIN SMITH THESIS SUBMITTED FOR THE DEGREE OF DOCTOR OF PHILOSOPHY (SEPTEMBER 1996) DbEFNYDDIO TN er LLYFRGELL, Th U.= TO tE CqNSULTED 11BRARY UNIVERSITY OF WALES, BANGOR SCHOOL OF SOCIOLOGY AND SOCIAL PO I was never allowed to forget that being a prisoner, even my body was not my own (Maybrick, 1905 :112). The idea that law has the power to right wrongs is persuasive. Just as medicine is seen as curative rather than iatrogenic, so law is seen as extending rights rather than creating wrongs (Smart, 1989: 12) Abstract Problems affecting the female prison population have become increasingly acute. In response to a spirit of 'toughness' in penal policy, the number of women prisoners has grown sharply and more women are being sent to prison despite arguments in favour of decarceration and alternative sanctions. In prison, women make greater demands on prison health services and are generally considered to carry a greater load of physical and mental ill-health than their male counterparts. However, a gender-sensitive theory based on an understanding of the relationship between women's health and women's imprisonment has not been formulated. Health is a complex phenomenon of inseparable physical, mental and social processes. Research conducted in three women's prisons in England set out to explore the relationships between these processes. Data were generated from group discussions, in-depth interviews, a questionnaire survey and observation and participation in 'the field'. The findings suggest that women's imprisonment is disadvantageous to 'good' health. Deprivations, isolation, discreditation and the deleterious effects of excessive regulation and control all cause women to suffer as they experience imprisonment.
    [Show full text]
  • 1 April 12, 2012 Daniel H. Heyns Director Michigan Department Of
    April 12, 2012 Daniel H. Heyns Director Michigan Department of Corrections 206 E. Michigan Avenue Grandview Plaza P.O. Box 30003 Lansing, MI 48909 Fax: (517) 373-6883 Email: [email protected] VIA FIRST CLASS MAIL, EMAIL AND FACSIMILE Re: Ending the Routine Use of Sexually Abusive and Unnecessary Spread-Labia Vaginal Searches of Women Prisoners Dear Mr. Heyns: We represent a broad array of civil rights, human rights, health, and religious organizations united in our dedication to stopping the sexual humiliation of women prisoners. We write to demand a decisive end to a degrading type of visual body cavity search practiced at the Women’s Huron Valley Correctional Facility (WHV), the only women’s prison in the State of Michigan. While an investigation by the American Civil Liberties Union (ACLU) has caused a partial, and likely temporary, modification of the search procedure, we urge you to revise Policy Directive 04.04.110 to explicitly and permanently ban the practice. The Spread-Labia Vaginal Search and Its Effect on Women Prisoners When being subjected to the spread-labia vaginal search, women prisoners are forced to remove all of their clothing, sit on a chair, lift their legs into the air, and use their hands to spread open their vaginas as a prison guard peers into their vaginal cavities. Sometimes multiple women are forced to undergo this humiliating search in view of one another. If a woman objects to the search, she can be forced to submit through physical force or punished with solitary confinement. These searches occur routinely, including after each contact visit, even when guards have no reason to suspect that a particular woman is carrying contraband in her body.
    [Show full text]
  • CHEMICAL and BIOLOGICAL DIMENSIONS of JIHADI TERRORISM Animesh Roul
    P a g e | 0 SSPC RESEARCH PAPER February 2016 APOCALYPTIC TERROR: CHEMICAL AND BIOLOGICAL DIMENSIONS OF JIHADI TERRORISM Animesh Roul The threat of chemical and biological terrorism emanating from non-state actors, including the Islamic Jihadi organisations, which control large swathes of territories and resources, remains a major concern for nation states today. Over the years, the capability and intentions of Islamic jihadist groups have changed. They evidently prefer for more destructive and spectacular methods. This can be very well argued that if these weapons systems, materials or technologies were made available to them, they probably would use it against their enemy to maximize the impact and fear factor. Even though no terrorist group, including the Al Qaeda, so far has achieved success in employing these destructive and disruptive weapons systems or materials, in reality, various terrorist groups have been seeking to acquire WMD (Weapons of Mass Destruction/Disruption) materials and its know-how. Apocalyptic Terror: Chemical and Biological Dimensions of Jihadi Terrorism The threat of chemical and biological terrorism emanating from non-state actors, including the Islamic Jihadi organisations, which control large swathes of territories and resources, remains a major concern for nation states today. Historically, no organised terrorist groups have perpetrated violent attacks using biological or chemical agents so far. Over the years, the capability and intentions of Islamic jihadist groups have changed. They are evidently preferring for more destructive and spectacular methods. This can be very well argued that if these weapons systems, materials or technologies were made available to them, they probably would use it against their enemy to maximize the impact and fear factor.
    [Show full text]
  • Ayman Al-Zawahiri: the Ideologue of Modern Islamic Militancy
    Ayman Al-Zawahiri: The Ideologue of Modern Islamic Militancy Lieutenant Commander Youssef H. Aboul-Enein, USN US Air Force Counterproliferation Center 21 Future Warfare Series No. 21 AYMAN AL-ZAWAHIRI: THE IDEOLOGUE OF MODERN ISLAMIC MILITANCY by Youssef H. Aboul-Enein The Counterproliferation Papers Future Warfare Series No. 21 USAF Counterproliferation Center Air University Maxwell Air Force Base, Alabama Ayman Al-Zawahiri: The Ideologue of Modern Islamic Militancy Youssef H. Aboul-Enein March 2004 The Counterproliferation Papers Series was established by the USAF Counterproliferation Center to provide information and analysis to assist the understanding of the U.S. national security policy-makers and USAF officers to help them better prepare to counter the threat from weapons of mass destruction. Copies of No. 21 and previous papers in this series are available from the USAF Counterproliferation Center, 325 Chennault Circle, Maxwell AFB AL 36112-6427. The fax number is (334) 953- 7530; phone (334) 953-7538. Counterproliferation Paper No. 21 USAF Counterproliferation Center Air University Maxwell Air Force Base, Alabama 36112-6427 The Internet address for the USAF Counterproliferation Center is: http://www.au.af.mil/au/awc/awcgate/awc-cps.htm Contents Page Disclaimer.....................................................................................................i The Author.................................................................................................. ii Acknowledgments ....................................................................................
    [Show full text]
  • 1. (SINF) Personal Information
    SECRET 20310421 DEPARTMENTOF DEFENSE JOINTTASKFORCEGUANTANAMO GUANTANAMOBAY, CUBA APO AE 09360 JTF GTMO - CC 21 April MEMORANDUM FOR Commander, United States Southern Command, 3511 NW Avenue, Miami, FL 33172. SUBJECT: Recommendationfor ContinuedDetention Control(CD) for GuantanamoDetainee, ISN: 000121DP(S) JTF GTMO DetaineeAssessment 1. ( SINF) Personal Information : JDIMS/NDRC Reference Name: Salman S Mohammed Aliases and Current/ True Name: Sulayman Muhammad Awshan Al-Khalidi, Hussam Akida Place of Birth: Riyadh, SaudiArabia (SA) Dateof Birth: 14 January 1982 Citizenship: SaudiArabia InternmentSerial Number(ISN) : - 000121DP 2. (FOUO) Health: Detaineeis in good health. He sustained a gunshot wound to his right thigh prior to detainment. He has a history of myopia and astigmatism . He went on a hunger strike once in July 2005. He has a history of intermittent abdominalpain. 3. (SI/ NF) JTF GTMOAssessment: a . (S ) Recommendation: JTF GTMO recommendsthis detainee for Continued DetentionUnder Control (CD) . JTF GTMO previously assessed detainee as Retain in Control ( ) on 15 August 2005. b . ( SI Executive Summary: Detaineeis assessed to be a member ofAl-Qaida who traveled to Afghanistan to participate injihad. Detainee is on the Saudi MinistryofInterior General DirectorateofInvestigations (Mabahith) list ofhigh prioritydetainees. Detainee probablyparticipatedin hostilities against US and coalition forces as a member ofthe 55th CLASSIFIEDBY: MULTIPLESOURCES REASON: E.O. 12958SECTION1.5(C ) DECLASSIFYON: 20310421 SECRETI 20310421 SECRET // 20310421 JTF GTMO -CC SUBJECT : Recommendation for Continued Detention Under Control ( CD) for Guantanamo Detainee , ISN: 000121DP ( S ) Arab Brigade. He has strong familial ties to Al-Qaida . A variation of detainee’s alias appears on an Al-Qaida associated document Detainee was identified by known and assessed Al-Qaida members and admitted to residing in Taliban guesthouses.
    [Show full text]
  • Constitutional Privacy and the Fight Over Access to Sex-Segregated Spaces
    NOTES CONSTITUTIONAL PRIVACY AND THE FIGHT OVER ACCESS TO SEX-SEGREGATED SPACES The battle over transgender rights is raging on many fronts. Despite some local1 and national2 victories for transgender activists in the past few years, the battle is far from over. States like North Carolina have tried to bar transgender people from using bathrooms and locker rooms not matching their birth-assigned sexes.3 At the federal level, President Donald Trump’s Department of Justice and Department of Education have revoked Obama-era guidance protecting transgender students in schools.4 President Trump also rolled back protection for transgender servicemembers: on July 26th, 2017, he tweeted that transgender people should be barred from serving in the U.S. military,5 and a version of his ban went into effect in 2019.6 This Term, the Supreme Court will de- termine whether Title VII of the Civil Rights Act of 1964’s7 prohibition ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– 1 For example, at least 225 cities and counties now protect employees from discrimination on the basis of gender identity. See Cities and Counties with Non-discrimination Ordinances that Include Gender Identity, HUM. RTS. CAMPAIGN, https://www.hrc.org/resources/cities-and-counties- with-non-discrimination-ordinances-that-include-gender [https://perma.cc/PB5D-PV4H]. 2 Under President Barack Obama, federal agencies instructed schools to “treat a student’s gender identity as the student’s sex for purposes of Title IX.” See Dear Colleague Letter on Transgender Students from Catherine E. Lhamon, Assistant Sec’y for Civil Rights, U.S. Dep’t of Educ., & Vanita Gupta, Principal Deputy Assistant Att’y Gen.
    [Show full text]
  • Estimated Age
    The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. Since 2003, we have published the calendar in a daily planner format that provides our consumers with a variety of information related to international terrorism, including wanted terrorists; terrorist group fact sheets; technical issue related to terrorist tactics, techniques, and procedures; and potential dates of importance that terrorists might consider when planning attacks. The cover of this year’s CT Calendar highlights terrorists’ growing use of social media and other emerging online technologies to recruit, radicalize, and encourage adherents to carry out attacks. This year will be the last hardcopy publication of the calendar, as growing production costs necessitate our transition to more cost- effective dissemination methods. In the coming years, NCTC will use a variety of online and other media platforms to continue to share the valuable information found in the CT Calendar with a broad customer set, including our Federal, State, Local, and Tribal law enforcement partners; agencies across the Intelligence Community; private sector partners; and the US public. On behalf of NCTC, I want to thank all the consumers of the CT Calendar during the past 12 years. We hope you continue to find the CT Calendar beneficial to your daily efforts. Sincerely, Nicholas J. Rasmussen Director The US National Counterterrorism Center is pleased to present the 2016 edition of the Counterterrorism (CT) Calendar. This edition, like others since the Calendar was first published in daily planner format in 2003, contains many features across the full range of issues pertaining to international terrorism: terrorist groups, wanted terrorists, and technical pages on various threat-related topics.
    [Show full text]
  • Assessing Al-Qaeda's Chemical Threat
    ISSN 1988-5237 AthenaIntelligence.org Assessing al-Qaeda’s Chemical T hreat René Pita Athena Paper, Vol. 2, No 2 Article 3/5 April 17, 2007 www.athenaintelligence.org 27 ISSN 1988-5237 AthenaIntelligence.org Introduction After the 11 September 2001 (9/11) terrorist attacks in the United States, there is a high perception of risk of possible attacks with chemical weapons (CW ), especially by groups affiliated or associated with the al-Qaeda terrorist network. Earlier, in 1994 and 1995, Aum Shinrikyo, a religious organization in Japan, used sarin, a nerve chemical warfare agent, in attacks in Matsumoto City and on the Tokyo subway, causing a large number of casualties. These terrorist attacks had a big impact on the chemical defence and intelligence communities but not on other circles, perhaps because a chemical attack by a religious organization in Japan seemed something far removed from the reality of the rest of the world. But this changed after 9/11 when the mailing of letters containing anthrax spores, accompanied by images of the attacks on the W orld Trade Center towers, increased the concern about weapons of mass destruction (W MD) attacks, including by CW . As a religious terrorist group, al-Qaeda does not fit the assumption made by Brian Jenkins in 1975 that “terrorists want a lot of people watching and a lot of people listening, and not a lot of people dead.”1 This statement fits better with secular terrorist groups. But for religious terrorist groups like al-Qaeda, “divine duty” results in disappearance of moral restraints that would justify “a lot of people dead” in their terrorist attacks,2 such as the 9/11 ones.
    [Show full text]
  • Strip Searching in the Age of Colorblind Racism: the Disparate Impact of Florence V
    Michigan Journal of Race and Law Volume 21 2015 Strip Searching in the Age of Colorblind Racism: The Disparate Impact of Florence v. Board of Chosen Freeholders of the County of Burlington André Keeton LaGuardia Community College-City University of New York, [email protected] Follow this and additional works at: https://repository.law.umich.edu/mjrl Part of the Civil Rights and Discrimination Commons, Law and Race Commons, and the Law Enforcement and Corrections Commons Recommended Citation André Keeton, Strip Searching in the Age of Colorblind Racism: The Disparate Impact of Florence v. Board of Chosen Freeholders of the County of Burlington, 21 MICH. J. RACE & L. 55 (2015). Available at: https://repository.law.umich.edu/mjrl/vol21/iss1/3 This Article is brought to you for free and open access by the Journals at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Journal of Race and Law by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. STRIP SEARCHING IN THE AGE OF COLORBLIND RACISM: THE DISPARATE IMPACT OF FLORENCE V. BOARD OF CHOSEN FREEHOLDERS OF THE COUNTY OF BURLINGTON Andr´e Keeton* In 2012, the Supreme Court of the United States decided Florence v. Board of Chosen Freeholders of the County of Burlington.1 The Court held that full strip searches, including cavity searches, are permissible regardless of the existence of basic reasonable suspicion that the arrestee is in possession of con- traband.2 Further, the Court held that law enforcement may conduct full strip searches after arresting an individual for a minor offense and irrespective of the circumstances surrounding the arrest.3 These holdings upended typical search juris- prudence.
    [Show full text]
  • Salim Abd Al
    SECRET // 20330220 DEPARTMENT OF DEFENSE STATES COMMAND HEADQUARTERS , JOINT TASK FORCE GUANTANAMO U.S. NAVAL STATION , GUANTANAMO BAY , CUBA APOAE09360 CUBA JTF- GTMO- CDR 20 February 2008 MEMORANDUMFORCommander, UnitedStates SouthernCommand, 3511NW 91st Avenue, Miami, FL 33172 SUBJECT : Recommendation for Continued Detention Under Control (CD) for Guantanamo Detainee, ISN 000189DP (S) JTF - GTMO Detainee Assessment 1. ( S) Personal Information : JDIMS/ NDRC ReferenceName: RafdatMuhammad Faqi Current/ True Name and Aliases: Salim Abd al- Salam Umran al-Ghuraybi, Luqman al- Libi, Luqman al- Zalaytani Hakim Luqman, Abu Abd al-Rouf Place of Birth: Zletan, Libya (LY) Date ofBirth: 1 March 1961 Citizenship: Libya Internment Serial Number (ISN) : 000189DP 2. (U//FOUO) Health: Detainee is in good health. 3. (U ) JTF-GTMOAssessment: a. (S ) Recommendation : JTF-GTMO recommends this detainee for Continued Detention Under DoD Control (CD) . JTF-GTMO previously recommended detainee for Continued Detention Under Control on 13 July 2007 . b . ( ) Executive Summary Detainee is assessed to be a Libyan Islamic Fighting Group ( LIFG) guesthouse operator and was identified as a former explosives trainer and a veteran jihad fighter . is assessed to have participated inhostilities against US and 1 Analyst Note: The LIFG is a National IntelligencePrioritiesFramework (NIPF) Counterterrorism( CT) Priority 1 Target. Priority 1 targets are defined as Issues, opportunities, or threats that rise to , or are expected to rise to, the level of interest of the President, Vice President, DNI, and NSC/ HSC Principalsand Deputies. This includes CLASSIFIED BY : MULTIPLE SOURCES REASON : E.O. 12958, AS AMENDED , SECTION 1.4 ( C DECLASSIFY ON : 20330220 SECRET NOFORN 20330220 SECRET NOFORN 20330220 JTF - GTMO -CDR SUBJECT : Recommendation for Continued Detention Under DoD Control (CD) for Guantanamo Detainee , ISN 000189DP (S) Coalition forces in UBL’s Tora Bora Mountaincomplex.
    [Show full text]
  • Naked in Front of the Machine: Does Airport Scanning Violate Privacy?
    Naked in Front of the Machine: Does Airport Scanning Violate Privacy? YOFI TIRoSH* & MICHAEL BIRNHACKt TABLE OF CONTENTS 1. INTRODUCTION .......................................... 1263 II. THE TECHNOLOGY AND ITS LEGAL ENVIRONMENT ...... ....... 1269 A. The Technology and Its Design .............. ...... 1271 B. Timeline and Legal Authority ........................ 1275 C. Experiencing the Scanners. ....................... 1276 D. The (Hidden)Judicial Conception of Privacy.... ...... 1278 1. Legal Challenges ..................... ...... 1278 2. Administrative Search and Balancing ............. 1280 3. Deciphering the Court's Privacy Conception.... .... 1283 4. Balancing with a Missing Variable ............... 1285 III. Two DISSONANCES ............................ ....... 1286 A. The Dress/UndressDissonance ............... ..... 1287 B. The Normal/Abnormal Dissonance ................. 1293 C. Privacy and Shame ...................................1299 1. Privacy? ................................. 1299 2. Shame? ....................................... 1302 IV. CONCLUSION........................ .................... 1305 I. INTRODUCTION There is a fierce battle going on over the social and legal construction of new surveillance technologies that are rapidly becoming part of our daily lives. One such surveillance technology is full-body scanners, officially known as Advanced Imaging Technology (AIT).' Body scanners were deployed in airports across the United States in 2007.2 By June 2013, the Transportation * Senior lecturer, Faculty of Law,
    [Show full text]