Don’t just think vacuum cleaners, think J. Edgar Hoover. [Gene Healy, Washington Examiner] In fact there’s a long history of misuse of ostensibly secure law-enforcement files and databases [1993 GAO report; Robert F. Weir, ed., book on Stored Tissue Samples; unlawful private-investigator access to the National Crime Information Center (NCIC), the FBI’s electronic criminal-records database] Once DNA databases are open to varied queries from multiple law enforcement agencies, can we presume them immune from abuse? Even the NSA, whose level of professionalism is presumedly far higher than that of local law enforcement agencies, is no stranger to stories about gratuitous and offensive abuse of privacy. And, writes Jim Harper, the evidence is that the NSA has gathered telecom metadata on a dragnet basis (as distinct from individualized suspicion) not merely for data mining, but to assist in investigations of persons who may happen to come under suspicion in the future, quite a different rationale.
More: “Was a Telecom CEO Sent to Prison Because He Resisted NSA?” [Alexander Cohen, Atlas, on Joseph Nacchio’s prosecution on insider trading charges after QWest refused to participate in surveillance] For many other telecoms, at any rate, fear of regulatory muscle will turn them into eager cooperators [Ira Stoll on Verizon] Related: 2007.