Social:Mosaic theory (US law)

From HandWiki
Short description: Legal theory about admissible evidence
A mosaic, the artistic medium after which the doctrine is named

The mosaic theory is a legal doctrine in American courts for considering issues of information collection, government transparency, and search and seizure, especially in cases involving invasive or large-scale data collection by government entities. The theory takes its name from mosaic tile art: while an entire picture can be seen from a mosaic's tiles at a distance, no clear picture emerges from viewing a single tile in isolation. The mosaic theory calls for a cumulative understanding of data collection by law enforcement and analyzes searches "as a collective sequence of steps rather than individual steps."[1]

Although the doctrine was first used in cases about national security, five justices of the US Supreme Court authored concurring opinions supporting a new Fourth Amendment framework for judging whether or not an individual has been subjected to an unlawful search, in United States v. Jones. Under this framework, the US government's actions should be considered collectively rather than independently for determining whether or not the acts constitute a search under the Fourth Amendment. It requires that police action is considered "over time as a collective 'mosaic' of surveillance,"[1] and allows that cumulative mosaic to qualify as a protected Fourth Amendment search, even if the individual steps that contribute to the full picture do not reach that constitutional threshold in isolation.[2][3][4]

Critics of the Fourth Amendment use of mosaic theory argue that it is difficult to administer and inconsistent with other Fourth Amendment jurisprudence. Proponents, on the other hand, argue that mosaic theory is a much-needed development in light of new technologies that allow law enforcement officers to collect large volumes of personal data with little effort. Human rights workers and legal scholars have been critical of how mosaic theory in national security cases undermines civil rights.[5][6] They argue that when government agencies claim that any scrap of information is part of a larger intelligence mosaic, those agencies get free rein to determine what of their work will be kept secret.[7] This method is used by American intelligence analysts.[8][5][9]

History

National security origins

Mosaic theory first emerged as justification for US government agencies' denial of Freedom of Information Act (FOIA) requests for records, as "apparently harmless pieces of information that when assembled together could reveal a damaging picture."[10]:630 Its first uses were in that national security context.[10]

In United States v. Marchetti, 466 F.2d 1309, 1318 (4th Cir. 1972), the court enjoined a former Central Intelligence Agency (CIA) employee from publishing an exposé that covered their time working at the agency.[10][11] In so doing, the court stated, "the significance of one item of information may frequently depend on the knowledge of many other items of information. What may seem trivial to the uninformed, may appear of great moment to one who has a broad view of the scene and may put the questioned item of information in its proper context."[11]

The courts went on to solidify mosaic theory in the Halkin v. Helms and Halperin v. CIA cases, in the 1970s.[10]:639 Since the Marchetti decision, mosaic theory remained an enduring concept in national security law.[12][10] Even then, judicial understanding of when it was appropriate to heed a "mosaic" argument was unspecified. Without those guidelines, courts displayed "heightened deference" to government cases employing the theory and allowed government agencies to define both whether requested information could constitute a national security risk and whether the mosaic theory applied to a case.[10]:634

Unlike other Presidents, who held that documents should be considered for release based on their content alone, not their relationship to other sources of information, mosaic theory was supported by US President Ronald Reagan. Out of fear of Russian intelligence gathering in the Cold War, he defined the use of the mosaic theory in the executive branch to obstruct the release of records under Executive Order 12,356 in 1982.[10]:641

The first Supreme Court ruling on mosaic theory occurred in CIA vs. Sims in 1985. The court denied the plaintiff's request for FOIA records, stating that the CIA was best able to judge the national security risk of releasing the requested documents.[10]:643 With that ruling, mosaic theory became an established, precedented legal doctrine that gave intelligence agencies like the CIA "carte blanche" to deny FOIA requests.[10]:643

Expanded use after 9/11

Mosaic theory, as a legal doctrine, remained mostly out public view until the September 11 attacks in 2001. In cases like Center for National Security Studies v. U.S. Department of Justice, Bush administration officials cited the mosaic theory before the D.C. Circuit court to argue for the blanket denial of FOIA requests in the interest of US national security.[10]:631 Mosaic theory, as it pertains to national defense, was further codified in "32 CFR §701.31 – Mosaic or compilation response,"[13] and President Bush expanded mosaic theory in the name of national security through an executive order.[10]:647 These changes all came alongside increased US government secrecy, as agencies took down, redacted, and hid public documentation. In this new environment, many courts, particularly the Third Circuit, either delegated or completely abdicated their responsibility for interpreting mosaic arguments.[10]:653

In CIA black sites and the US military's interrogation centers at Guantanamo, Bagram Theater Internment Facility, and Kandahar detention facility, captives not suspected of involvement with terrorism were held and interrogated, and their imprisonment was justified with a mosaic argument.[5][6][7] US analysts believed that interrogation of these individuals, en masse, would allow them to fill in the intelligence "mosaic" and learn about actual terrorists. In one case where the mosaic theory was used against intelligence agents, US officials called for recently returned Canadian Abdullah Khadr's extradition to the US to face charges related to terrorism in December 2005.[14] Canada's Attorney General successfully advanced claims that details of Khadr's capture and imprisonment could not be made public without endangering US national security.

Fourth Amendment interpretation

A GPS logger: its measurements can constitute a Fourth Amendment search according to the mosaic theory.

Mosaic theory further developed in response to the drastic expansion of police surveillance in public spaces, enabled by new technologies.[2][4] This version of the theory asserts that the comprehensive collection of discrete data over time, if analyzed in the aggregate, exposes information about the lives, habits, and relationships of those surveilled that would have previously been impossible to gather and evaluate.[2][15][16][17] As the US Supreme Court later articulated in Carpenter v. United States, the judiciary is "obligated, as subtler and more far-reaching means of invading privacy have become available to the government, to ensure that the progress of science does not erode Fourth Amendment protections."[18]

The D.C. Circuit court was the first to apply mosaic theory to a Fourth Amendment issue in United States v. Maynard, a case involving GPS surveillance of a car over a period of twenty-eight days.[1][17] To answer this question, the court applied the test developed by Justice Harlan in Katz v. United States.[19] Under the Katz test, courts consider "whether the individual has an expectation of privacy that society is prepared to recognize as reasonable,"[20] with the reasonableness of the expectation of privacy dependent in large part on whether or not the information was "expose[d] to the public."[21][1]:316

The court looked to mosaic theory in national security cases, used in that context to justify the withholding of information requested under the Freedom of Information Act on the grounds that aggregated data might allow an observer to piece together secret information like the identity of an intelligence source.[22] The Maynard court assessed the four-week period of surveillance as a whole, noting that the surveillance "illustrate[d] how the sequence of a person’s movements may reveal more than the individual movements of which it is composed."[23]

The D.C. Circuit ultimately held that the warrantless use of GPS surveillance over a 28-day period was an illegal search under the Fourth Amendment, in large part because the data captured by the GPS over that period had not been exposed to the public and because the respondent in Maynard had a reasonable expectation of privacy.[24][1][17] The D.C. Circuit then reversed the conviction of one of the two respondents because the conviction rested on evidence that had been obtained through the unlawful search.[25]

The Supreme Court of the United States upheld the D.C. Circuit’s reversal in United States v. Jones, which also dealt with extended GPS location surveillance of the defendant’s vehicle.[26] While not making explicit reference to mosaic theory, Justice Alito’s concurring opinion, joined by three other justices, and Justice Sotomayor’s concurring opinion are both understood to offer strong defenses of the mosaic theory developed by the D.C. Circuit in Maynard.[27][28] Justice Alito argued that courts should consider mosaic theory when applying the Katz test, looking to the length of time of the surveillance when deciding whether it constitutes a search under the Fourth Amendment, without setting an exact, appropriate time limit for warrantless surveillance.[29] Justice Sotomayor offered a different formulation of mosaic theory, one in which courts should instead consider the quantity and quality of the data obtained through surveillance when determining whether it constitutes a search.[30] Justice Sotomayor expressed concern over the constitutionality of the generation of a comprehensive and detailed record of a defendant’s public movements, regardless of whether that record was developed in the long or short term.[1][2][15]

As a result of these cases, singular US law enforcement acts that are not "searches" in the traditional sense can be deemed a "search" when aggregated.[1][12][17]

Other cases

Riley v. California

Although mosaic theory was not identified by name in Riley v. California, some argue that the theory underpinned the majority’s holding that warrantless searches of cell phones are not permitted under the Fourth Amendment.[30] The majority cited Justice Sotomayor’s concurrence in Jones to support the idea that the information carried on a device like a cell phone is both quantitatively and qualitatively different from that which can be obtained through other searches.[30] For Chief Justice Roberts, the author of the majority opinion, access to the aggregation of personal information found on a cell phone could allow the government to gain a revealing picture of a person’s life.[30]

Carpenter v. United States

Some also argue that mosaic theory also underpinned the Court’s reasoning in Carpenter v. United States.[31] In Carpenter, the Court held that the acquisition of cell site location information (CSLI), information that could be used to determine the approximate location of a cell phone at a given time,[32] from a wireless carrier was a search under the Fourth Amendment.[33][34]

Ordinarily, the third-party doctrine would allow the government to obtain information that a person voluntarily turns over to an entity like a bank or telephone company.[35] Such information, for example the deposit slips a customer provides to a bank, can be obtained directly from the third-party without constituting a search under the Fourth Amendment.[35] Unlike other information obtained from third parties, in Carpenter v. United States, the CSLI was protected by the Fourth Amendment because it could be used to create a "detailed chronicle of a person’s physical presence" that "implicate[d] privacy concerns far beyond those considered" by the Court in other third-party cases.[36] The Court’s focus on the depth, breadth, and comprehensive scope of the CSLI is seen as an endorsement of the mosaic theory.[31]

Lower court cases

In the wake of Jones and Carpenter, lower courts have engaged with arguments rooted in mosaic theory. For example:

  • In United States v. Kubasiak, the U.S. District Court for the Eastern District of Wisconsin denied a defendant’s motion to suppress video footage from a surveillance camera that had been installed on an adjacent property by the Wisconsin Department of Justice for the purpose of monitoring the defendant’s home.[37] The defendant invoked mosaic theory to argue that the surveillance was a search because it "allowed law enforcement . . . to monitor every single event that took place in his back yard for a long time."[38] But the court rejected this argument in part because the camera, fixed in place to monitor the defendant’s backyard, "did not present the kind of aggregate view of intimate details of the defendant’s every movement that concerned the concurrence in Jones, or the majority in Carpenter."[39]
  • In United States v. Moore-Bush, the U.S. District Court for the District of Massachusetts granted a defendant’s motion to suppress footage of the defendant’s home captured by a surveillance camera installed by law enforcement officers on a nearby utility pole.[40] Determining that mosaic theory had effectively been adopted by the Supreme Court when it cited to Justice Alito and Justice Sotomayor’s concurring opinions in Carpenter,[41] the court found that the government’s use of a surveillance camera constituted a search.[42] For the court, the government’s ability to surveil the defendant’s home for an extended period of time, ability to manipulate the camera to zoom in on details such as the license plates of cars parked near the home, ability to capture footage of the defendant’s driveway and the front of her home, and the ability to compile the footage in a searchable log allowed the government to "piece together intimate details of [the defendant’s life]."[42]
  • In United States v. Shipton, the U.S. District Court for the District of Minnesota denied the defendant’s motion to suppress evidence that had been obtained from his computer through police monitoring of peer-to-peer (P2P) file-sharing networks.[43] The defendant cited Justice Alito and Justice Sotomayor’s concurrences in Jones to support his argument that the "sweeping scope" of the surveillance at issue gave "rise to a reasonable expectation of privacy."[44] The court rejected this argument noting that while the police surveillance did implicate a vast quantity of information from a broad set of P2P network users, only a small portion of that information pertained to the defendant.[45][46] Additionally, the information obtained through the surveillance, limited to "identifying information about files," was nowhere near as revealing as the CSLI at issue in Carpenter or the GPS tracking at issue in Jones.[47]

Criticism

National security

Legal scholar David Pozen, writing in 2005, argued that the lenient interpretation that courts have given to government mosaic arguments is an abdication of judicial judgment. As a result, "In over thirty years of the theory's existence, only one FOIA court on record has rejected a government agency's mosaic defense. In theory, highly speculative mosaic claims are unfalsifiable; in practice, they have proven unimpeachable."[10]:679

Monica Eppinger noted, in intelligence gathering, mosaic theory arguments could allow an to individual be held and interrogated indefinitely, even if they were not a suspect:

With this "mosaic theory" of intelligence, where the goal of those conducting the inquiry and investigation is to amass enough small bits of information to piece together a broader picture of the threats ahead or the perpetrators behind, a detainee might not even be aware that he or she knows something useful, or know what to divulge were he or she inclined to facilitate the process. This departs from both the "grand criminal" (or war criminal) model and the high-value detainee model. Under the logic of this process, a "useful" detainee, i.e., one with information within the scope of relevance, may be held for questioning, even if not a criminal suspect, and, under a standard of a wide scope of relevance, the greater the number of detainees, the more sources of mosaic bits, and the more full the picture composed.[48]

Eppinger pointed out the human rights violations this caused. If individuals being held for interrogation were actual suspects, they would receive due process—a right those held under the mosaic theory were denied.[49][50]

Fourth Amendment

One criticism of mosaic theory is that it creates a significant "line drawing" problem: it is difficult to determine just how much data needs to be gathered before actions by law enforcement officers become a search.[51] Another criticism is that mosaic theory is inconsistent with other Fourth Amendment doctrines under which data gathered through public observation or by receipt from third-parties is not the product of a search.[52] Under current law observations made through the police’s visual surveillance would not implicate the Fourth Amendment, but the same data might if gathered by a GPS device.[53] Others have argued that application of mosaic theory will "unjustifiably expand or contract the Fourth Amendment’s protections."[54]

Proponents of mosaic theory argue that current Fourth Amendment doctrine used to assess whether or not government action constitutes a search "potentially undervalue[s] privacy rights."[55] The "large-scale and long term aggregations of data" at issue in cases like Carpenter merit protection under the Fourth Amendment because they are fundamentally different from that which might be gathered in "single event" or "small-scale" acts of surveillance.[56] Supporters also argue that new technologies employed by law enforcement officers alter the "balance between the State and its citizens" making it much easier for the government to collect large amounts of data, often in ways "so pervasive that no citizen can realistically be aware of what data about him is being collected."[57]

See also

References

  1. 1.0 1.1 1.2 1.3 1.4 1.5 1.6 Kerr, Orin (2012). "The Mosaic Theory of the Fourth Amendment". Michigan Law Review 111: 311–354. https://repository.law.umich.edu/mlr/vol111/iss3/1/. 
  2. 2.0 2.1 2.2 2.3 Bellovin, Hutchins, Jebara, Zimmeck (2014). "When Enough is Enough: Location Tracking, Mosaic Theory, and Machine Learning". New York University Journal of Law & Liberty 8: 555–628. http://static.squarespace.com/static/514e1ca0e4b04c6ad1834313/t/536c75d9e4b0ffdd30e5a5ab/1399616985724/Hutchins.pdf/. 
  3. Bennardo, Christian (2017). "The Fourth Amendment, CSLI Tracking, and the Mosaic Theory". Fordham Law Review 85: 2385–2416. https://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=5368&context=flr. 
  4. 4.0 4.1 "Commonwealth v. McCarthy". 2020. https://law.justia.com/cases/massachusetts/supreme-court/2020/sjc-12750.html. 
  5. 5.0 5.1 5.2 Michael P. Goodwin (Winter 2010). "A National Security Puzzle: Mosaic Theory and the First Amendment Right of Access in the Federal Courts". Hastings Communications and Entertainment Law Journal. Archived from the original on 2012-07-03. https://web.archive.org/web/20120703114616/http://www.law.georgetown.edu/cnsl/ssa/resourcedocuments/GoodwinArticle_155.pdf. Retrieved 2012-04-07. 
  6. 6.0 6.1 "Guantánamo: An Oral History". Vanity Fair magazine. January 2012. Archived from the original on 2012-01-12. https://web.archive.org/web/20120112175042/http://www.vanityfair.com/politics/2012/01/guantanamo-bay-oral-history-201201. Retrieved 2012-04-07. 
  7. 7.0 7.1 Andy Worthington (2009-03-14). "Judge Gladys Kessler Releases Yemeni Detainee, Slams "Mosaic" Of Guantanamo Intelligence And Unreliable Witnesses". Huffington Post. Archived from the original on 2016-03-04. https://web.archive.org/web/20160304140503/http://www.huffingtonpost.com/andy-worthington/judge-condemns-mosaic-of_b_203382.html. Retrieved 2012-04-07. 
  8. Tom Lasseter; Carol Rosenberg (2011-04-25). "Guantanamo prisoner threat assessments shaped by a few, often-questionable informants: Analysis". Cleveland Plain Dealer. http://www.cleveland.com/world/index.ssf/2011/04/guantanamo_threat_assessments.html. 
  9. Benjamin Wittes (May 2011). "The Emerging Law of Detention 2.0: The Guantánamo Habeas Cases as Lawmaking -- Chapter 8 – Mosaic Theory, Conditional Probability, and the Totality of the Evidence". Brookings Institution. Archived from the original on 2016-07-17. https://web.archive.org/web/20160717224949/http://www.brookings.edu/~/media/Research/Files/Reports/2011/5/guantanamo-wittes/05_guantanamo_wittes_chapter_8.pdf. Retrieved 2012-04-07. 
  10. 10.00 10.01 10.02 10.03 10.04 10.05 10.06 10.07 10.08 10.09 10.10 10.11 10.12 Pozen, David (2005). "The Mosaic Theory, National Security, and the Freedom of Information Act". The Yale Law Journal 115: 628–679. https://www.yalelawjournal.org/pdf/358_fto38tb4.pdf. 
  11. 11.0 11.1 "United States v. Marchetti". Sep 11, 1972. https://casetext.com/case/united-states-v-marchetti. 
  12. 12.0 12.1 Ostrander, Benjamin (2011). "The "Mosaic Theory" and Fourth Amendment Law". Notre Dame Law Review 86: 1733–1766. http://ndlawreview.org/wp-content/uploads/2013/06/Ostrander.pdf. 
  13. "32 CFR 701.31 - Mosaic or compilation response.". July 1, 2005. https://www.govinfo.gov/app/details/CFR-2005-title32-vol5/CFR-2005-title32-vol5-sec701-31. 
  14. Gus Van Harten (2009). "Weaknesses of Adjudication in the Face of Secret Evidence". International Journal of Evidence and Proof 13 (1): pp. 23–24. https://digitalcommons.osgoode.yorku.ca/cgi/viewcontent.cgi?referer=https://www.google.com/&httpsredir=1&article=2563&context=scholarly_works. Retrieved 2021-02-28. 
  15. 15.0 15.1 Schlabach, Gabriel (2015). "Privacy in the Cloud: The Mosaic Theory and the Stored Communications Act". Stanford Law Review 67: 678–716. http://www.stanfordlawreview.org/wp-content/uploads/sites/3/2015/03/67_Stan_L_Rev_677_Schlabach.pdf. 
  16. Bedi, Monu (2014). "Social Networks, Government Surveillance, and the Fourth Amendment Mosaic Theory". Boston University Law Review 94: 1809–1880. http://www.bu.edu/bulawreview/files/2014/12/BEDI.pdf. 
  17. 17.0 17.1 17.2 17.3 "U.S. v. Maynard". 2009. https://casetext.com/case/united-states-v-maynard-5. 
  18. "Carpenter v. United States". 2018. https://casetext.com/case/carpenter-v-united-states-67. 
  19. Maynard, 615 F.3d at 555 (citing Katz v. United States, 389 U.S. 347, 360-61 (1967) (Harlan, J., concurring)).
  20. Maynard, 615 F.3d at 558 (quoting Kyllo v. United States, 533 U.S. 27, 34 (2001)).
  21. Maynard, 615 F.3d at 558 (quoting Katz, 389 U.S. at 351 (majority opinion)).
  22. Maynard, 615 F.3d at 562 (citing CIA v. Sims, 471 U.S. 159, 178 (1985)).
  23. Maynard, 615 F.3d at 562 n.*.
  24. Maynard, 615 F.3d at 558-64.
  25. Maynard, 615 F.3d at 566-68.
  26. United States v. Jones, 565 U.S. 400, 404-05 (2012).
  27. Gray, David; Citron, Danielle Keats (2013). "A Shattered Looking Glass: The Pitfalls and Potential of the Mosaic Theory of Fourth Amendment Privacy". North Carolina Journal of Law & Technology 14: 395–97. https://scholarship.law.unc.edu/cgi/viewcontent.cgi?article=1224&context=ncjolt. 
  28. Schlabach, Gabriel R. (2015). "Privacy in the Cloud: The Mosaic Theory and the Stored Communications Act". Stanford Law Review 67: 682–86. http://www.stanfordlawreview.org/wp-content/uploads/sites/3/2015/03/67_Stan_L_Rev_677_Schlabach.pdf. 
  29. Schlabach, supra note 13, at 684.
  30. 30.0 30.1 30.2 30.3 Schlabach, supra note 13, at 685.
  31. 31.0 31.1 Ohm, Paul S. (2019). "The Many Revolutions of Carpenter". Harvard Journal of Law & Technology 32: 372–73. https://jolt.law.harvard.edu/assets/articlePDFs/v32/32HarvJLTech357.pdf. 
  32. Carpenter v. United States, 138 S. Ct. 2206, 2208 (2018).
  33. Carpenter, 138 S. Ct. at 2223.
  34. Liptak, Adam (22 June 2018). "In Ruling on Cellphone Location Data, Supreme Court Makes Statement on Digital Privacy". The New York Times. https://www.nytimes.com/2018/06/22/us/politics/supreme-court-warrants-cell-phone-privacy.html. 
  35. 35.0 35.1 Carpenter, 138 S. Ct. at 2216.
  36. Carpenter, 138 S. Ct. at 2220.
  37. United States v. Kubasiak, No. 18-cr-120-pp, 2018 WL 4846761, at *1 (E.D. Wis. Oct. 5, 2018)
  38. Kubasiak, No. 18-cr-120-pp, 2018 WL 4846761, at *5.
  39. Kubasiak, No. 18-cr-120-pp, 2018 WL 4846761, at *7.
  40. United States v. Moore-Bush, 381 F. Supp. 3d 139, 141 (D. Mass. 2019).
  41. Moore-Bush, 381 F. Supp. 3d at 147.
  42. 42.0 42.1 Moore-Bush, 381 F. Supp. 3d at 150.
  43. United States v. Shipton, No. 18-CR-0202, 2019 WL 5305573, at *1 (D. Minn. Oct. 21, 2019).
  44. United States v. Shipton, No. 18-CR-0202, 2019 WL 5330928, at *15 (D. Minn. Sept. 11, 2019).
  45. Shipton, No. 18-CR-0202, 2019 WL 5330928, at *15.
  46. Shipton, No. 18-CR-0202, 2019 WL 5305573, at *1(agreeing with the magistrate judge’s analysis and adopting her magistrate’s report and recommendations).
  47. Shipton No. 18-CR-0202, 2019 WL 5330928, at *16.
  48. Monica Eppinger (2013). "Reality Check: Detention in the War on Terror". Catholic University Law Review 62 (2): pp. 358, 360, 367, 368. Archived from the original on 2021-02-28. https://web.archive.org/web/20210228170327/https://core.ac.uk/download/pdf/232604164.pdf. Retrieved 2021-02-28. 
  49. D. A. Jeremy Telman (2012). "Intolerable Abuses: Rendition for Torture and the State Secrets Privilege". Alabama Law Review 63 (3). https://scholar.valpo.edu/cgi/viewcontent.cgi?article=1136&context=law_fac_pubs. Retrieved 2021-02-28. 
  50. Seth F. Kreimer (2007-12-05). "Rays of Sunlight in a Shadow "War": FOIA, the Abuses of AntiTerrorism, and the Strategy of Transparency". Faculty Scholarship at Penn Law: p. 1155. Archived from the original on 2020-01-08. https://web.archive.org/web/20200108151631/http://scholarship.law.upenn.edu/cgi/viewcontent.cgi?article=1186&context=faculty_scholarship. Retrieved 2021-02-28. 
  51. Gray, David; Citron, Danielle (2013). "The Right to Quantitative Privacy". Minnesota Law Review 98: 71. https://scholarship.law.umn.edu/cgi/viewcontent.cgi?article=1284&context=mlr. 
  52. Gray & Keats, supra note 12, at 402.
  53. Gray & Keats, supra note 12, at 403-04.
  54. Slobogin, Christopher (2015). "A Defense of Privacy as the Central Value Protected by the Fourth Amendment's Prohibition on Unreasonable Searches". Texas Tech Law Review 48: 160. http://texastechlawreview.org/wp-content/uploads/Slobogin.PUBLISHED.pdf. 
  55. Bellovin, Steven M.; Hutchins, Renée M.; Jebara, Tony; Zimmeck, Sebastian (2014). "When Enough is Enough: Location Tracking, Mosaic Theory, and Machine Learning". New York University Journal of Law & Liberty 8: 556. http://lawandlibertyblog.com/s/Bellovin.pdf. 
  56. Rosenzweig, Paul (2017-11-29). "In Defense of the Mosaic Theory" (in en). https://www.lawfareblog.com/defense-mosaic-theory. 
  57. Rosenzweig, supra note 42.

Further reading