Chapter 7 Quiz: Border Control and Biometric Databases

15 questions — Multiple Choice and Short Answer Estimated time: 25–35 minutes


Part A — Multiple Choice (10 questions)

Question 1

The "border search exception" to the Fourth Amendment holds that:

A) All searches at borders require a warrant issued by a federal judge B) Customs officers may search persons and property at borders without a warrant or individualized suspicion C) Border searches are permitted only when officers have probable cause to believe a crime has been committed D) Border searches of electronic devices require a warrant but searches of luggage do not

Correct answer: B Rationale: The border search exception allows warrantless searches of persons and property at the border and its functional equivalents. The Supreme Court has not required individualized suspicion for routine border searches, and lower courts have generally upheld warrantless searches of electronic devices at the border despite Riley v. California's warrant requirement for domestic arrests.


Question 2

The IDENT database, operated by the Department of Homeland Security, primarily contains:

A) Criminal records of U.S. citizens flagged as potential security threats B) Biometric and biographic records of individuals who have interacted with immigration and border systems C) Employment records submitted through E-Verify by employers nationwide D) Watchlist information provided by foreign intelligence agencies

Correct answer: B Rationale: IDENT is DHS's comprehensive biometric database, containing records for over 220 million individuals collected through immigration processing, border crossing, and related systems. It is linked to immigration enforcement, border control, and criminal justice systems.


Question 3

The modern international passport regime — requiring documentary identification to cross borders — primarily emerged as a result of:

A) The League of Nations' founding charter, which required member states to document their citizens B) Colonial administrative practices developed in the nineteenth century C) Emergency measures introduced during World War I that became permanent D) The Universal Declaration of Human Rights, which established the right to documentary identity

Correct answer: C Rationale: The modern passport system emerged from wartime emergency measures during World War I. The League of Nations standardized passport formats in 1920 and 1926, but the requirement itself was a temporary wartime measure that was never fully reversed.


Question 4

The EU's Eurodac system was established primarily to:

A) Track EU citizens traveling between member states for law enforcement purposes B) Maintain a database of convicted criminals accessible to EU border authorities C) Identify asylum seekers who had applied in multiple EU countries by storing their fingerprints D) Provide a shared biometric authentication system for EU government employees

Correct answer: C Rationale: Eurodac was established in 2003 to track asylum seekers and enforce the Dublin Regulation, which requires asylum claims to be processed in the first EU country a person enters. The system collected fingerprints from asylum applicants to identify those who had applied in multiple countries.


Question 5

The 2019 NIST study on facial recognition algorithms found that:

A) The most accurate algorithms showed no significant variation in error rates across demographic groups B) False positive rates were significantly higher for Black and Asian faces in most algorithms tested C) False negative rates were higher for white faces because they are more commonly in training datasets D) Facial recognition algorithms were sufficiently accurate for use in border control without additional safeguards

Correct answer: B Rationale: The NIST study found that false positive rates (incorrectly matching a photograph to the wrong identity) were 10–100 times higher for Black faces than white faces in the best-performing algorithms. Higher error rates were also found for Asian faces and for women.


Question 6

The concept of "hypervisibility" as applied to undocumented people in Chapter 7 means:

A) Undocumented people are more visible in documentary systems because their status is flagged B) Undocumented people are subject to extremely intensive enforcement scrutiny when detected, despite being invisible to routine documentary surveillance C) Undocumented people are more likely to be photographed and biometrically documented at border crossings D) Undocumented people intentionally draw attention to themselves to access legal rights

Correct answer: B Rationale: Hypervisibility refers to the paradox that undocumented people are largely invisible to the routine documentary and biometric systems that track authorized movement, but face extreme and intensive scrutiny — hypervisibility — when they come into contact with enforcement systems.


Question 7

E-Verify is best described as:

A) A DHS program that verifies visa overstay status for international visitors B) A CBP database used to check the employment histories of visa applicants C) An internet-based system allowing employers to verify the employment eligibility of new hires D) A system for verifying the authenticity of identity documents presented at border crossings

Correct answer: C Rationale: E-Verify is an internet-based system maintained by DHS that allows employers to verify employment eligibility by checking new hires' information against SSA and DHS databases. It is mandatory for federal contractors and in some states.


Question 8

The Automated Targeting System (ATS) used by CBP to generate risk scores for travelers is primarily criticized because:

A) The system's error rate is documented to be too high for use in security applications B) The system's criteria are classified, travelers cannot review their scores, and there is no effective mechanism to contest errors C) The system relies on biometric data that most travelers have not consented to provide D) The system is operated by private contractors rather than government officials

Correct answer: B Rationale: ATS is criticized primarily because the algorithm's criteria are classified, travelers have no access to their risk scores, and there is no effective administrative mechanism to challenge erroneous flagging — creating a system of consequential assessment with essentially no accountability.


Question 9

The "trusted traveler" programs (Global Entry, TSA PreCheck) can be analyzed as an example of:

A) The state expanding surveillance equally across all populations B) Social sorting that creates differentiated surveillance experiences based partly on socioeconomic status C) Effective risk-based screening that reduces surveillance burden for all travelers D) Privacy-enhancing technology that limits the amount of data the government collects

Correct answer: B Rationale: Trusted traveler programs create a two-tier system in which approved travelers — who must pass a background check, attend an in-person interview, and pay a fee — receive reduced surveillance. The socioeconomic barriers to entry mean the population that benefits from reduced scrutiny is systematically different from the general traveling public.


Question 10

The chapter identifies the Chinese Exclusion Act's fingerprinting requirement as historically significant because it:

A) Established the legal precedent that biometric collection could not be race-specific B) Demonstrated that biometric border surveillance has roots in racially targeted application to specific national-origin groups C) Was the first use of fingerprinting technology in the United States D) Was immediately struck down by the Supreme Court as a violation of equal protection

Correct answer: B Rationale: The Chinese Exclusion Act's biometric requirements — applied specifically to Chinese immigrants and not to others — demonstrate that biometric border surveillance in the U.S. has historically been applied in racially targeted ways. This history is relevant context for analyzing contemporary systems.


Part B — Short Answer (5 questions)

Each response should be 150–250 words.

Question 11

Explain why a biometric database breach is considered uniquely serious compared to other data breaches (such as a breach of credit card numbers or passwords).

Model response elements: - Passwords and credit card numbers can be changed after a breach; fingerprints, iris patterns, and facial geometry cannot - A biometric database breach means affected individuals cannot be given "new" biometrics — the compromised identifier persists - Subsequent systems that rely on the compromised biometric can no longer trust it for verification - Biometric data can be used to fabricate identities, create false matches, or defeat biometric authentication systems - The scale of databases like IDENT (220+ million records) means a single breach could affect a significant fraction of the global population - Unlike financial fraud, there is no mechanism for victims to recover — the biometric data is permanently compromised


Question 12

The chapter describes the border as a site where "legal suspension operates." What does this mean, and what specific legal rights are suspended or diminished at the border?

Model response elements: - The border search exception removes the Fourth Amendment warrant requirement for searches of persons, luggage, and electronic devices - Non-citizens have limited due process rights at the border — they can be denied entry without the hearing protections that apply to removal proceedings for those already in the country - Asylum seekers must demonstrate a "credible fear" to receive even a preliminary hearing; they have no right to appointed counsel - Information gathered at the border can be used in civil immigration proceedings without the exclusionary rule that applies in criminal cases - The "enforcement zone" that extends 100 miles from any border gives CBP expanded authority that applies to a significant portion of the U.S. population - The legal suspension is not total — constitutional rights apply to some extent — but they are substantially diminished compared to the domestic context


Question 13

What is the Dublin Regulation, and how does Eurodac enforce it? What criticisms have been made of the Dublin system and its biometric enforcement?

Model response elements: - The Dublin Regulation provides that asylum claims must be processed in the first EU country a person enters — establishing primary responsibility among EU member states - Eurodac enforces Dublin by storing fingerprints from asylum applicants, allowing member states to check whether a person has previously applied elsewhere and "return" them to the first country of entry - Criticisms: the system places disproportionate burden on border countries (Italy, Greece) that are first countries of entry; it does not account for family connections or existing ties in other countries; "returning" people often means returning them to countries with overwhelmed systems and poor conditions; the system was expanded to allow law enforcement access (function creep) - The system treats asylum seekers as subjects of enforcement rather than rights-bearing individuals seeking protection - Fingerprinting people who have fled violence and persecution frames them as potential security threats rather than refugees


Question 14

Explain what the chapter means by the claim that historical enforcement patterns can be "encoded" into a risk assessment algorithm, producing discriminatory outcomes even without any discriminatory intent in the algorithm's design.

Model response elements: - Algorithms are trained on historical data — past enforcement decisions, past flagging patterns, past secondary inspection outcomes - If historical enforcement has been more intensive toward travelers from certain countries or of certain apparent ethnicities, the historical data reflects this pattern - Training an algorithm on this data teaches it to identify patterns that were partly shaped by discriminatory enforcement - The algorithm then replicates and potentially amplifies these patterns in its predictions - "No discriminatory intent" in the algorithm's design does not prevent discriminatory outcomes if the training data encodes past discrimination - This is distinct from intentional discrimination but produces similar distributional effects - This dynamic is sometimes called "laundering discrimination through algorithms" — the algorithmic form lends a false air of objectivity to what is fundamentally a historically shaped pattern


Question 15

The chapter discusses both the U.S. system and the EU system of biometric border management. Identify one significant difference between these systems in terms of legal protection for individuals whose data is collected, and explain why this difference matters.

Model response elements: - EU data protection law (GDPR and specific border database regulations) provides data subjects with rights including the right to access their data, the right to contest inaccuracies, and limits on data retention periods - U.S. law provides fewer general rights for individuals whose biometric data is held in government databases — there is no equivalent of GDPR; the Privacy Act of 1974 provides some rights but has significant national security and law enforcement exceptions - Eurodac and SIS II operate under regulations that specify retention periods and access limitations; IDENT's retention policies are less publicly specified - The difference matters because data that cannot be inspected or contested cannot be corrected; errors in border biometric systems can result in wrongful exclusion, detention, or flagging without any mechanism for remedy - Note: the EU's legal protections do not apply equally to all subjects — Eurodac's original subjects (asylum seekers) had fewer protections than EU citizens; the 2013 expansion of law enforcement access to Eurodac reduced effective protections further


Chapter 7 Quiz | Part 2: State Surveillance | The Architecture of Surveillance