It uses only information that law enforcement can already routinely access: its own records on suspects, convicts and sexual offenders, as well as publicly available data from county courthouses, telephone directories and business filings.
CENTERFORSECURITYPOLICY: Balancing security and privacy during wartime