TY - JOUR
T1 - Crimmigration-counterterrorism
AU - Hu, Margaret
N1 - Copyright:
Copyright 2017 Elsevier B.V., All rights reserved.
PY - 2017
Y1 - 2017
N2 - The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically-driven screening technologies can be better understood through the analytical prism of "crimmigrationcounterterrorism": the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of "extreme vetting" to better understand modern crimmigration-counterterrorism rationales and technologies. Like the implementation of the Chinese Exclusion Act, extreme vetting, or enhanced vetting, relies upon biometric data as an anchor point for identity databasing and security screening. Thus, emerging vetting systems provide a timely example of the conflation of crime, immigration, and counterterrorism policy. It concludes that Critical Theory and theories of discrimination that stem from litigation surrounding crimmigration-counterterrorism policies may suggest legal avenues to guard against the risk of cyber-registries and algorithmic screening systems dependent upon biometric databases that may promote discriminatory vetting.
AB - The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically-driven screening technologies can be better understood through the analytical prism of "crimmigrationcounterterrorism": the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of "extreme vetting" to better understand modern crimmigration-counterterrorism rationales and technologies. Like the implementation of the Chinese Exclusion Act, extreme vetting, or enhanced vetting, relies upon biometric data as an anchor point for identity databasing and security screening. Thus, emerging vetting systems provide a timely example of the conflation of crime, immigration, and counterterrorism policy. It concludes that Critical Theory and theories of discrimination that stem from litigation surrounding crimmigration-counterterrorism policies may suggest legal avenues to guard against the risk of cyber-registries and algorithmic screening systems dependent upon biometric databases that may promote discriminatory vetting.
UR - http://www.scopus.com/inward/record.url?scp=85037035075&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85037035075&partnerID=8YFLogxK
M3 - Review article
AN - SCOPUS:85037035075
SN - 0043-650X
VL - 2017
SP - 955
EP - 1003
JO - Wisconsin Law Review
JF - Wisconsin Law Review
IS - 5
ER -