메뉴 건너뛰기




Volumn 94, Issue 5, 2010, Pages 1514-1560

Probably probable cause: The diminishing importance of justification standards

Author keywords

[No Author keywords available]

Indexed keywords


EID: 79251610554     PISSN: 00265535     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (15)

References (281)
  • 2
    • 79251622242 scopus 로고    scopus 로고
    • U. S. Const. amend. IV provides: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized
    • U. S. Const. amend. IV provides: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
  • 3
    • 79251625977 scopus 로고    scopus 로고
    • See infra Part I. A
    • See infra Part I. A.
  • 4
    • 79251613812 scopus 로고    scopus 로고
    • See SLOBOGIN, supra note 1, at 30-45 arguing for a "proportionality principle" that adds justification standards to new situations
    • See SLOBOGIN, supra note 1, at 30-45 (arguing for a "proportionality principle" that adds justification standards to new situations).
  • 5
    • 33746202890 scopus 로고
    • See Terry v. Ohio, 30, creating the reasonable suspicion standard for sidewalk stop-and-frisk encounters
    • See Terry v. Ohio, 392 U. S. 1, 30 (1968) (creating the reasonable suspicion standard for sidewalk stop-and-frisk encounters).
    • (1968) U. S. , vol.392 , pp. 1
  • 6
    • 70450226417 scopus 로고    scopus 로고
    • Pub. L. No. 99-508, codified as amended in scattered sections of 18 U. S. C.
    • Pub. L. No. 99-508, 100 Stat. 1848 (1986) (codified as amended in scattered sections of 18 U. S. C.).
    • (1986) Stat. , vol.100 , pp. 1848
  • 7
    • 79251631013 scopus 로고    scopus 로고
    • See, at, "There is 'no ready test for determining reasonableness other than by balancing the need to search or seize against the invasion which the search or seizure entails.'"
    • See Terry, 392 U. S. at 21 ("[T]here is 'no ready test for determining reasonableness other than by balancing the need to search [or seize] against the invasion which the search [or seizure] entails.'"
    • U. S. , vol.392 , pp. 21
    • Terry1
  • 8
    • 84873913953 scopus 로고
    • quoting Camara v. Mun. Court, 536-37
    • (quoting Camara v. Mun. Court, 387 U. S. 523, 536-37 (1967)));
    • (1967) U. S. , vol.387 , pp. 523
  • 9
    • 79251634478 scopus 로고    scopus 로고
    • SLOBOGIN, supra note 1, at 21 "A search or seizure is reasonable if the strength of its justification is roughly proportionate to the level of intrusion associated with the police action. "
    • SLOBOGIN, supra note 1, at 21 ("[A] search or seizure is reasonable if the strength of its justification is roughly proportionate to the level of intrusion associated with the police action. ").
  • 10
    • 77954985422 scopus 로고
    • See New Jersey v. T. L. O., 346, "The requirement of reasonable suspicion is not a requirement of absolute certainty: 'sufficient probability, not certainty, is the touchstone of reasonableness under the Fourth Amendment....'"
    • See New Jersey v. T. L. O., 469 U. S. 325, 346 (1985) ("[T]he requirement of reasonable suspicion is not a requirement of absolute certainty: 'sufficient probability, not certainty, is the touchstone of reasonableness under the Fourth Amendment....'"
    • (1985) U. S. , vol.469 , pp. 325
  • 11
    • 84875148652 scopus 로고
    • quoting Hill v. California, 804
    • (quoting Hill v. California, 401 U. S. 797, 804 (1971))).
    • (1971) U. S. , vol.401 , pp. 797
  • 12
    • 79251626120 scopus 로고    scopus 로고
    • See U. S. Const. amend. IV "No Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."
    • See U. S. Const. amend. IV ("[N]o Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.").
  • 13
    • 79251649909 scopus 로고    scopus 로고
    • Id. "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated...."
    • Id. ("The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated....").
  • 14
    • 79251605024 scopus 로고    scopus 로고
    • at, approving "carefully limited searches" for weapons "where a police officer observes unusual conduct which leads him reasonably to conclude in light of his experience that criminal activity may be afoot and that the persons with whom he is dealing may be armed and presently dangerous"
    • 392 U. S. at 30 (approving "carefully limited search[es]" for weapons "where a police officer observes unusual conduct which leads him reasonably to conclude in light of his experience that criminal activity may be afoot and that the persons with whom he is dealing may be armed and presently dangerous").
    • U. S. , vol.392 , pp. 30
  • 15
    • 79251647174 scopus 로고    scopus 로고
    • See id. at 27 "There must be a narrowly drawn authority to permit a reasonable search for weapons for the protection of the police officer, where he has reason to believe that he is dealing with an armed and dangerous individual, regardless of whether he has probable cause to arrest the individual...."
    • See id. at 27 ("[T]here must be a narrowly drawn authority to permit a reasonable search for weapons for the protection of the police officer, where he has reason to believe that he is dealing with an armed and dangerous individual, regardless of whether he has probable cause to arrest the individual....").
  • 16
    • 79251649908 scopus 로고    scopus 로고
    • Id
    • Id.
  • 17
    • 77954985422 scopus 로고
    • See, e.g., New Jersey v. T. L. O., 341, "The accommodation of the privacy interests of schoolchildren with the substantial need of teachers and administrators for freedom to maintain order in the schools does not require strict adherence to the requirement that searches be based on probable cause...."
    • See, e.g., New Jersey v. T. L. O., 469 U. S. 325, 341 (1985) ("[T]he accommodation of the privacy interests of schoolchildren with the substantial need of teachers and administrators for freedom to maintain order in the schools does not require strict adherence to the requirement that searches be based on probable cause....").
    • (1985) U. S. , vol.469 , pp. 325
  • 18
    • 84873919103 scopus 로고
    • See, e.g., O'Connor v. Ortega, 724, "In our view... a probable cause requirement for searches of the type at issue here would impose intolerable burdens on public employers."
    • See, e.g., O'Connor v. Ortega, 480 U. S. 709, 724 (1987) ("In our view... a probable cause requirement for searches of the type at issue here would impose intolerable burdens on public employers.").
    • (1987) U. S. , vol.480 , pp. 709
  • 19
    • 84884991357 scopus 로고
    • See, e.g., Griffin v. Wisconsin, 875-76, "We think it clear that the special needs of Wisconsin's probation system... justify replacement of the standard of probable cause by 'reasonable grounds'...."
    • See, e.g., Griffin v. Wisconsin, 483 U. S. 868, 875-76 (1987) ("We think it clear that the special needs of Wisconsin's probation system... justify replacement of the standard of probable cause by 'reasonable grounds'....").
    • (1987) U. S. , vol.483 , pp. 868
  • 20
    • 84873909801 scopus 로고
    • See, e.g., Nat'l Treasury Employees Union v. Von Raab, 666, "The Government's substantial interests in drug testing Customs agents... present a special need that may justify departure from the ordinary warrant and probable-cause requirements."
    • See, e.g., Nat'l Treasury Employees Union v. Von Raab, 489 U. S. 656, 666 (1989) ("[The Government's] substantial interests [in drug testing Customs agents]... present a special need that may justify departure from the ordinary warrant and probable-cause requirements.");
    • (1989) U. S. , vol.489 , pp. 656
  • 21
    • 84873935145 scopus 로고
    • Skinner v. Ry. Labor Executives' Ass'n, 620, "The Government's interest in regulating the conduct of railroad employees to ensure safety... 'likewise presents special needs beyond normal law enforcement that may justify departures from the usual warrant and probable-cause requirements.'"
    • Skinner v. Ry. Labor Executives' Ass'n, 489 U. S. 602, 620 (1989) ("The Government's interest in regulating the conduct of railroad employees to ensure safety... 'likewise presents special needs beyond normal law enforcement that may justify departures from the usual warrant and probable-cause requirements.'"
    • (1989) U. S. , vol.489 , pp. 602
  • 22
    • 79251643207 scopus 로고    scopus 로고
    • quoting, at
    • (quoting Griffin, 483 U. S. at 873-74)).
    • U. S. , vol.483 , pp. 873-874
    • Griffin1
  • 23
    • 33750242127 scopus 로고
    • See United States v. R. Enters., Inc., 301, "Where... a subpoena is challenged on relevancy grounds, the motion to quash must be denied unless the district court determines that there is no reasonable possibility that the category of materials the Government seeks will produce information relevant to the general subject of the grand jury's investigation. "
    • See United States v. R. Enters., Inc., 498 U. S. 292, 301 (1991) ("[W]here... a subpoena is challenged on relevancy grounds, the motion to quash must be denied unless the district court determines that there is no reasonable possibility that the category of materials the Government seeks will produce information relevant to the general subject of the grand jury's investigation. ").
    • (1991) U. S. , vol.498 , pp. 292
  • 24
    • 84866706378 scopus 로고
    • Oliver v. United States, 183-84, "In the case of open fields, the general rights of property protected by the common law of trespass have little or no relevance to the applicability of the Fourth Amendment."
    • Oliver v. United States, 466 U. S. 170, 183-84 (1984) ("[I]n the case of open fields, the general rights of property protected by the common law of trespass have little or no relevance to the applicability of the Fourth Amendment.").
    • (1984) U. S. , vol.466 , pp. 170
  • 25
    • 84978408683 scopus 로고
    • See, e.g., Florida v. Riley, 450, "The police were... free to inspect the yard from the vantage point of an aircraft flying in the navigable airspace as this plane was."
    • See, e.g., Florida v. Riley, 488 U. S. 445, 450 (1989) ("[The police] were... free to inspect the yard from the vantage point of an aircraft flying in the navigable airspace as this plane was.");
    • (1989) U. S. , vol.488 , pp. 445
  • 26
    • 84873156660 scopus 로고
    • California v. Ciraolo, 215, "In an age where private and commercial flight in the public airways is routine, it is unreasonable for respondent to expect that his marijuana plants were constitutionally protected from being observed with the naked eye from an altitude of 1, 000 feet."
    • California v. Ciraolo, 476 U. S. 207, 215 (1986) ("In an age where private and commercial flight in the public airways is routine, it is unreasonable for respondent to expect that his marijuana plants were constitutionally protected from being observed with the naked eye from an altitude of 1, 000 feet.");
    • (1986) U. S. , vol.476 , pp. 207
  • 27
    • 84873119031 scopus 로고
    • Dow Chem. Co. v. United States, 239, "We hold that the taking of aerial photographs of an industrial plant complex from navigable airspace is not a search prohibited by the Fourth Amendment."
    • Dow Chem. Co. v. United States, 476 U. S. 227, 239 (1986) ("We hold that the taking of aerial photographs of an industrial plant complex from navigable airspace is not a search prohibited by the Fourth Amendment.").
    • (1986) U. S. , vol.476 , pp. 227
  • 28
    • 84880377569 scopus 로고
    • See, e.g., California v. Greenwood, 40, "We conclude that respondents exposed their garbage to the public sufficiently to defeat their claim to Fourth Amendment protection. "
    • See, e.g., California v. Greenwood, 486 U. S. 35, 40 (1988) ("[W]e conclude that respondents exposed their garbage to the public sufficiently to defeat their claim to Fourth Amendment protection. ").
    • (1988) U. S. , vol.486 , pp. 35
  • 29
    • 78751647463 scopus 로고
    • See, e.g., Smith v. Maryland, 745, "We... conclude that petitioner in all probability entertained no actual expectation of privacy in the phone numbers he dialed, and that, even if he did, his expectation was not 'legitimate.'". Phone number tracking is now regulated by statute
    • See, e.g., Smith v. Maryland, 442 U. S. 735, 745 (1979) ("We... conclude that petitioner in all probability entertained no actual expectation of privacy in the phone numbers he dialed, and that, even if he did, his expectation was not 'legitimate.'"). Phone number tracking is now regulated by statute.
    • (1979) U. S. , vol.442 , pp. 735
  • 30
    • 79251615850 scopus 로고    scopus 로고
    • See Pen Register and Trap and Trace Act, §§ 3121-3127
    • See Pen Register and Trap and Trace Act, 18 U. S. C. §§ 3121-3127 (2006).
    • (2006) U. S. C. , vol.18
  • 31
    • 77249131620 scopus 로고
    • United States v. Miller, 445-46, holding that documents produced pursuant to subpoenas duces tecum directed against banks were not in violation of the Fourth Amendment
    • United States v. Miller, 425 U. S. 435, 445-46 (1976) (holding that documents produced pursuant to subpoenas duces tecum directed against banks were not in violation of the Fourth Amendment).
    • (1976) U. S. , vol.425 , pp. 435
  • 32
    • 79251647588 scopus 로고    scopus 로고
    • See, e.g., Smith, at, 745 concluding that the installation of a pen register-"a mechanical device that records the numbers dialed on a telephone"-does not constitute a "search" within the meaning of the Fourth Amendment
    • See, e.g., Smith, 442 U. S. at 736 n. 1, 745 (concluding that the installation of a pen register-"a mechanical device that records the numbers dialed on a telephone"-does not constitute a "search" within the meaning of the Fourth Amendment).
    • U. S. , vol.442 , Issue.1 , pp. 736
  • 33
    • 70450226417 scopus 로고    scopus 로고
    • See, e.g., Electronic Communications Privacy Act of 1986, Pub. L. No. 99-508, codified as amended in scattered sections of 18 U. S. C.. governing government access to information transiting or stored on computer networks
    • See, e.g., Electronic Communications Privacy Act of 1986, Pub. L. No. 99-508, 100 Stat. 1848 (codified as amended in scattered sections of 18 U. S. C.). (governing government access to information transiting or stored on computer networks).
    • Stat. , vol.100 , pp. 1848
  • 34
    • 79251626864 scopus 로고    scopus 로고
    • § 2518 3, The Wiretap Act requires the police to meet a series of other obligations before conducting a court-ordered wiretap
    • 18 U. S. C. § 2518 (3) (2006). The Wiretap Act requires the police to meet a series of other obligations before conducting a court-ordered wiretap.
    • (2006) U. S. C. , vol.18
  • 35
    • 79251601902 scopus 로고    scopus 로고
    • See id. § 2518 1
    • See id. § 2518 (1).
  • 36
    • 79251613431 scopus 로고    scopus 로고
    • § 1805 a 3
    • 50 U. S. C. § 1805 (a) (3) (2006).
    • (2006) U. S. C. , vol.50
  • 37
    • 79251629502 scopus 로고    scopus 로고
    • §§ 2701-2711
    • 18 U. S. C. §§ 2701-2711.
    • U. S. C. , vol.18
  • 38
    • 79251621982 scopus 로고    scopus 로고
    • Id. §§ 3121-3127
    • Id. §§ 3121-3127.
  • 39
    • 79251608747 scopus 로고    scopus 로고
    • See id. § 2703 describing the procedures a governmental entity must abide by to require the disclosure of a wire or electronic communication
    • See id. § 2703 (describing the procedures a governmental entity must abide by to require the disclosure of a wire or electronic communication).
  • 40
    • 79251612924 scopus 로고    scopus 로고
    • See id. § 2703 a
    • See id. § 2703 (a).
  • 41
    • 79251643444 scopus 로고    scopus 로고
    • See id. § 2703 b
    • See id. § 2703 (b).
  • 42
    • 79251629211 scopus 로고    scopus 로고
    • See id. § 2703 a. The text is arguably ambiguous about which e-mail messages receive this protected treatment, and the question is under debate in the courts
    • See id. § 2703 (a). The text is arguably ambiguous about which e-mail messages receive this protected treatment, and the question is under debate in the courts.
  • 43
    • 79251617997 scopus 로고    scopus 로고
    • See infra Part II. B.2
    • See infra Part II. B.2.
  • 44
    • 79251623359 scopus 로고    scopus 로고
    • See, § 2703 b 1 B
    • See 18 U. S. C. § 2703 (b) (1) (B);
    • U. S. C. , vol.18
  • 45
    • 79251640889 scopus 로고    scopus 로고
    • see also In re Gimbel, 598 2d Cir
    • see also In re Gimbel, 77 F.3d 593, 598 (2d Cir. 1996)
    • (1996) F.3d , vol.77 , pp. 593
  • 46
    • 84873110268 scopus 로고
    • extending the Supreme Court's holding in United States v. Morton Salt Co., 652, that administrative subpoenas for corporate records need only be "reasonably relevant" to individual financial records
    • (extending the Supreme Court's holding in United States v. Morton Salt Co., 338 U. S. 632, 652 (1950), that administrative subpoenas for corporate records need only be "reasonably relevant" to individual financial records).
    • (1950) U. S. , vol.338 , pp. 632
  • 47
    • 10844281812 scopus 로고    scopus 로고
    • A user's guide to the stored communications act, and a legislator's guide to amending it
    • See, e.g., 1219, discussing the "d-order" under § 2703 d
    • See, e.g., Orin S. Kerr, A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It, 72 GEO. WASH. L. REV. 1208, 1219 (2004) (discussing the "d-order" under § 2703 (d)).
    • (2004) Geo. Wash. L. Rev. , vol.72 , pp. 1208
    • Kerr, O.S.1
  • 48
    • 79251642494 scopus 로고    scopus 로고
    • § 2703 d
    • 18 U. S. C. § 2703 (d).
    • U. S. C. , vol.18
  • 49
    • 33746202890 scopus 로고
    • Terry v. Ohio, 21
    • Terry v. Ohio, 392 U. S. 1, 21 (1968).
    • (1968) U. S. , vol.392 , pp. 1
  • 51
    • 79251602430 scopus 로고    scopus 로고
    • See Kerr, supra note 35, at 1233-35 arguing the subpoena requirements should be dropped as "surprisingly low" in favor of a d-order requirement
    • See Kerr, supra note 35, at 1233-35 (arguing the subpoena requirements should be dropped as "surprisingly low" in favor of a d-order requirement).
  • 52
    • 70449836735 scopus 로고    scopus 로고
    • Transaction surveillance by the government
    • But see, 161-62, arguing that the d-order requires only relevance and materiality, both low standards under evidence law
    • But see Christopher Slobogin, Transaction Surveillance by the Government, 75 MISS. L. J. 139, 161-62 (2005) (arguing that the d-order requires only relevance and materiality, both low standards under evidence law).
    • (2005) Miss. L. J. , vol.75 , pp. 139
    • Slobogin, C.1
  • 53
    • 79251631972 scopus 로고    scopus 로고
    • §§ 3121-3127
    • 18 U. S. C. §§ 3121-3127;
    • U. S. C. , vol.18
  • 54
    • 79251607992 scopus 로고    scopus 로고
    • see also id. § 3127 defining "pen register" and "trap and trace device"
    • see also id. § 3127 (defining "pen register" and "trap and trace device").
  • 55
    • 79251612653 scopus 로고    scopus 로고
    • See id. § 3127 3
    • See id. § 3127 (3).
  • 56
    • 79251604481 scopus 로고    scopus 로고
    • Id. § 3123 a 1
    • Id. § 3123 (a) (1).
  • 57
    • 79251638321 scopus 로고    scopus 로고
    • Id. § 3122 b 2
    • Id. § 3122 (b) (2).
  • 58
    • 79251649652 scopus 로고
    • See, e.g., United States v. Fregoso, 1320 8th Cir, "The judicial role in approving use of trap and trace devices is ministerial in nature."
    • See, e.g., United States v. Fregoso, 60 F.3d 1314, 1320 (8th Cir. 1995) ("The judicial role in approving use of trap and trace devices is ministerial in nature.").
    • (1995) F.3d , vol.60 , pp. 1314
  • 59
    • 79251623617 scopus 로고    scopus 로고
    • H. R. Rep. No. 103-827, at 31 1994
    • H. R. Rep. No. 103-827, at 31 (1994)
  • 60
    • 0347328534 scopus 로고
    • reprinted in, 3511
    • reprinted in 1994 U. S. C. C. A. N. 3489, 3511.
    • (1994) U. S. C. C. A. N. , pp. 3489
  • 61
    • 79251634223 scopus 로고    scopus 로고
    • See infra Part II. C.1
    • See infra Part II. C.1.
  • 62
    • 10844289565 scopus 로고    scopus 로고
    • Surveillance law through cyberlaw's lens
    • See, e.g., 1436
    • See, e.g., Patricia L. Bellia, Surveillance Law Through Cyberlaw's Lens, 72 GEO. WASH. L. REV. 1375, 1436 (2004);
    • (2004) Geo. Wash. L. Rev. , vol.72 , pp. 1375
    • Bellia, P.L.1
  • 63
    • 10844224409 scopus 로고    scopus 로고
    • Reconstructing electronic surveillance law
    • 1299
    • Daniel J. Solove, Reconstructing Electronic Surveillance Law, 72 GEO. WASH. L. REV. 1264, 1299 (2004).
    • (2004) Geo. Wash. L. Rev. , vol.72 , pp. 1264
    • Solove, D.J.1
  • 64
    • 79251648607 scopus 로고    scopus 로고
    • Solove, supra note 47
    • Solove, supra note 47.
  • 65
    • 79251612652 scopus 로고    scopus 로고
    • Bellia, supra note 47
    • Bellia, supra note 47.
  • 66
    • 10844255649 scopus 로고    scopus 로고
    • Reasonable expectations in electronic communications: A critical perspective on the electronic communications privacy act
    • 1592
    • Deirdre K. Mulligan, Reasonable Expectations in Electronic Communications: A Critical Perspective on the Electronic Communications Privacy Act, 72 GEO. WASH. L. REV. 1557, 1592 (2004).
    • (2004) Geo. Wash. L. Rev. , vol.72 , pp. 1557
    • Mulligan, D.K.1
  • 67
    • 79251644247 scopus 로고    scopus 로고
    • See Kerr, supra note 35, at 1242 "I would give the current SCA a 'B.'"
    • See Kerr, supra note 35, at 1242 ("I would give the current SCA a 'B.'").
  • 68
    • 79251616949 scopus 로고    scopus 로고
    • Id. at 1233
    • Id. at 1233.
  • 69
    • 79251615589 scopus 로고    scopus 로고
    • Id. at 1234-35
    • Id. at 1234-35.
  • 70
    • 79251636225 scopus 로고    scopus 로고
    • Solove, supra note 47, at 1266
    • Solove, supra note 47, at 1266.
  • 71
    • 79251646391 scopus 로고    scopus 로고
    • Id. at 1299
    • Id. at 1299.
  • 72
    • 79251612138 scopus 로고    scopus 로고
    • See id
    • See id.
  • 74
    • 79251605794 scopus 로고    scopus 로고
    • See id. at 184
    • See id. at 184.
  • 75
    • 33646709688 scopus 로고    scopus 로고
    • See United and Strengthening America Act of 2001, S. 1510, § 214
    • See United and Strengthening America Act of 2001, S. 1510, 107th Cong. § 214 (2001);
    • (2001) 107Th Cong
  • 76
    • 10844280941 scopus 로고    scopus 로고
    • Seven weeks: The making of the USA PATRIOT act
    • 1199, commenting on Senator Leahy's proposal to modify the Pen Register Act
    • Beryl A. Howell, Seven Weeks: The Making of the USA PATRIOT Act, 72 GEO. WASH. L. REV. 1145, 1199 (2004) (commenting on Senator Leahy's proposal to modify the Pen Register Act).
    • (2004) Geo. Wash. L. Rev. , vol.72 , pp. 1145
    • Howell, B.A.1
  • 77
    • 79251623093 scopus 로고    scopus 로고
    • Howell, supra note 59, at 1199
    • Howell, supra note 59, at 1199.
  • 78
    • 79251616102 scopus 로고    scopus 로고
    • Id
    • Id.
  • 79
    • 79251604747 scopus 로고    scopus 로고
    • See id
    • See id.
  • 80
    • 79251645162 scopus 로고    scopus 로고
    • See United States v. Perez, 741-42 5th Cir, holding that an IP address attached to an e-mail address is sufficient to establish probable cause
    • See United States v. Perez, 484 F.3d 735, 741-42 (5th Cir. 2007) (holding that an IP address attached to an e-mail address is sufficient to establish probable cause).
    • (2007) F.3d , vol.484 , pp. 735
  • 81
    • 0345444657 scopus 로고
    • Warner Bros
    • THE FUGITIVE (Warner Bros. 1993).
    • (1993) The Fugitive
  • 82
    • 79251606568 scopus 로고    scopus 로고
    • In Hollywood's imagination, hackers can always process screens full of text usually green-on-black scrolling by at a speed no human can process; government agency video specialists can turn the grainiest images into perfectly sharp video with a few clicks of the keyboard and they never use mice; and every network can be accessed through an elegant, three-dimensional, virtual reality interface
    • In Hollywood's imagination, hackers can always process screens full of text (usually green-on-black) scrolling by at a speed no human can process; government agency video specialists can turn the grainiest images into perfectly sharp video with a few clicks of the keyboard (and they never use mice); and every network can be accessed through an elegant, three-dimensional, virtual reality interface.
  • 83
    • 79251620404 scopus 로고    scopus 로고
    • What code DOESN'T do in real life (that it does in the movies)
    • See, June 12
    • See Matthew Inman, What Code DOESN'T Do in Real Life (That it Does in the Movies), DRIVL, June 12, 2006, http://web.archive.org/web/20070202190507/www. drivl.com/posts/view/494;
    • (2006) Drivl
    • Inman, M.1
  • 84
    • 79251611150 scopus 로고    scopus 로고
    • Things hollywood thinks computers can do
    • CRACKED Staff, 5, Sept. 13, "#2: A Computer Might Become Self-Aware at any Moment."
    • CRACKED Staff, 5 Things Hollywood Thinks Computers Can Do, CRACKED, Sept. 13, 2007, http://www.cracked.com/article-15229-5-things-hollywood-thinks- computers-can-do.html ("#2: A Computer Might Become Self-Aware at any Moment.").
    • (2007) Cracked
  • 85
    • 79251612650 scopus 로고    scopus 로고
    • The third party doctrine redux: Internet search records and the case for a "crazy quilt" of fourth amendment protection
    • Cf, discussing the changing procedures and practices of criminal investigations with the advancement of the Internet
    • Cf. Matthew D. Lawless, The Third Party Doctrine Redux: Internet Search Records and the Case for a "Crazy Quilt" of Fourth Amendment Protection, 2007 UCLA J. L. & TECH. 1 (discussing the changing procedures and practices of criminal investigations with the advancement of the Internet).
    • (2007) UCLA J. L. & Tech. , pp. 1
    • Lawless, M.D.1
  • 86
    • 79251608227 scopus 로고    scopus 로고
    • There are, of course, exceptions. Sometimes, the hacker is a disgruntled ex-employee, and death threats online often come from people who also know the victim in the real world. But local knowledge like this is much more likely to be irrelevant
    • There are, of course, exceptions. Sometimes, the hacker is a disgruntled ex-employee, and death threats online often come from people who also know the victim in the real world. But local knowledge like this is much more likely to be irrelevant.
  • 87
    • 33746202890 scopus 로고
    • Terry v. Ohio, 5, testifying that "he had been assigned to patrol this vicinity of downtown Cleveland for shoplifters and pickpockets for thirty years"
    • Terry v. Ohio, 392 U. S. 1, 5 (1967) (testifying that "he had been assigned to patrol this vicinity of downtown Cleveland for shoplifters and pickpockets for [thirty] years").
    • (1967) U. S. , vol.392 , pp. 1
  • 88
    • 59349086361 scopus 로고    scopus 로고
    • The case for the third-party doctrine
    • See, 575, "Third-party internet services act as remote agents that permit wrongdoers to commit crimes entirely in private."
    • See Orin S. Kerr, The Case for the Third-Party Doctrine, 107 MICH. L. REV. 561, 575 (2009) ("[Third-party internet services] act as remote agents that permit wrongdoers to commit crimes entirely in private.").
    • (2009) Mich. L. Rev. , vol.107 , pp. 561
    • Kerr, O.S.1
  • 89
    • 79251606567 scopus 로고    scopus 로고
    • See, e.g., id. at 562 explaining that wrongdoers sometimes expose evidence through e-mail, "creating an important opportunity for criminal investigators"
    • See, e.g., id. at 562 (explaining that wrongdoers sometimes expose evidence through e-mail, "creat[ing] an important opportunity for criminal investigators").
  • 90
    • 84966528404 scopus 로고    scopus 로고
    • supra note 64
    • THE FUGITIVE, supra note 64.
    • The Fugitive
  • 91
    • 79251605793 scopus 로고    scopus 로고
    • Id
    • Id.
  • 92
    • 79251640888 scopus 로고    scopus 로고
    • Cf. Solove, supra note 47, at 1265 discussing the ease with which email messages and other electronic communications can be discovered
    • Cf. Solove, supra note 47, at 1265 (discussing the ease with which email messages and other electronic communications can be discovered).
  • 93
    • 79251625481 scopus 로고    scopus 로고
    • Investigators followed digital trail in pregnant woman's killing
    • For an example of this investigative process, see, Dec. 21
    • For an example of this investigative process, see Matthew Sedensky, Investigators Followed Digital Trail in Pregnant Woman's Killing, SEATTLE TIMES, Dec. 21, 2004, http://seattletimes.nwsource.com/html/nationworld/2002 125795-baby21.html.
    • (2004) Seattle Times
    • Sedensky, M.1
  • 94
    • 79251604450 scopus 로고    scopus 로고
    • Federal agent raps ISPs over cybercrime
    • See, Jan. 25, recounting FBI official's complaint about how American ISPs respond slowly to requests from UK law enforcement
    • See Will Sturgeon, Federal Agent Raps ISPs Over Cybercrime, CNET NEWS. COM, Jan. 25, 2005, http://news.cnet.com/Federal-agent-raps-ISPs-over- cybercrime/2100-7348-3-5549723.html (recounting FBI official's complaint about how American ISPs respond slowly to requests from UK law enforcement).
    • (2005) Cnet News. Com.
    • Sturgeon, W.1
  • 95
    • 42349108508 scopus 로고    scopus 로고
    • Data mining and internet profiling: Emerging regulatory and technological approaches
    • See, 274-76, discussing how technologies that conceal user identities can "hinder law enforcement"
    • See Ira S. Rubinstein et al., Data Mining and Internet Profiling: Emerging Regulatory and Technological Approaches, 75 U. CHI. L. REV. 261, 274-76 (2008) (discussing how technologies that conceal user identities can "hinder law enforcement").
    • (2008) U. Chi. L. Rev. , vol.75 , pp. 261
    • Rubinstein, I.S.1
  • 96
    • 79251610526 scopus 로고    scopus 로고
    • See id. at 274-75 explaining various techniques criminals can use to evade tracking of their Internet use
    • See id. at 274-75 (explaining various techniques criminals can use to evade tracking of their Internet use).
  • 97
    • 79251612651 scopus 로고    scopus 로고
    • To get a bit more technical about things, at the transport layer, Internet Service Providers use routing protocols that adapt to outages and congestion by pushing data along better routes. E.g., TCP/IP 115 4th ed, Perhaps the most important routing protocol is the Border Gateway Protocol, or BGP
    • To get a bit more technical about things, at the transport layer, Internet Service Providers use routing protocols that adapt to outages and congestion by pushing data along better routes. E.g., 1 DOUGLAS E. COMER, INTERNETWORKING WITH TCP/IP 115 (4th ed. 2000). Perhaps the most important routing protocol is the Border Gateway Protocol, or BGP.
    • (2000) Douglas E. Comer, Internetworking With , vol.1
  • 98
    • 33745634736 scopus 로고    scopus 로고
    • See generally, BGP-4, providing an in-depth discussion of the purpose and uses of BGP-4
    • See generally THE INTERNET SOCIETY, A BORDER GATEWAY PROTOCOL 4 (BGP-4) (2006), http://www.tools.ietf.org/pdf/rfc4271 (providing an in-depth discussion of the purpose and uses of BGP-4).
    • (2006) The Internet Society, A Border Gateway Protocol , pp. 4
  • 99
    • 0346449708 scopus 로고    scopus 로고
    • Criminal law in cyberspace
    • In an early and influential article on computer crime, Neal Katyal placed far too much emphasis on how packets and shifting Internet routes hinder law enforcement, 1072, "Unlike a criminal who needs to escape down a particular road, a criminal in cyberspace could be on any road, and these roads are not linked together in any meaningful fashion. ". Katyal errs because he focuses too much on the shifting nature at the packet layer, even though almost all criminal investigation online occurs at higher layers
    • In an early and influential article on computer crime, Neal Katyal placed far too much emphasis on how packets and shifting Internet routes hinder law enforcement. Neal Kumar Katyal, Criminal Law in Cyberspace, 149 U. PA. L. REV. 1003, 1072 (2001) ("Unlike a criminal who needs to escape down a particular road, a criminal in cyberspace could be on any road, and these roads are not linked together in any meaningful fashion. "). Katyal errs because he focuses too much on the shifting nature at the packet layer, even though almost all criminal investigation online occurs at higher layers.
    • (2001) U. Pa. L. Rev. , vol.149 , pp. 1003
    • Katyal, N.K.1
  • 100
    • 79251647176 scopus 로고    scopus 로고
    • See id
    • See id.
  • 101
    • 79251644916 scopus 로고    scopus 로고
    • While Point A's importance stems from clues it provides about the wrongdoer, electronic routes can bear on criminal cases in other ways, such as satisfying jurisdictional requirements
    • While Point A's importance stems from clues it provides about the wrongdoer, electronic routes can bear on criminal cases in other ways, such as satisfying jurisdictional requirements.
  • 102
    • 0348004157 scopus 로고    scopus 로고
    • See United States v. Kammersell, 1139 10th Cir, holding that an electronic bomb threat sent and received in Utah nevertheless satisfied an interstate commerce requirement because the message passed through a server in Virginia
    • See United States v. Kammersell, 196 F.3d 1137, 1139 (10th Cir. 1999) (holding that an electronic bomb threat sent and received in Utah nevertheless satisfied an interstate commerce requirement because the message passed through a server in Virginia).
    • (1999) F.3d , vol.196 , pp. 1137
  • 103
    • 79251610270 scopus 로고    scopus 로고
    • E.g., Freedman v. Am. Online, Inc., 179-80 D. Conn, describing how police requested user information from an Internet service provider following an electronic threat, but did not inquire as to the route it traveled
    • E.g., Freedman v. Am. Online, Inc., 412 F. Supp. 2d 174, 179-80 (D. Conn. 2005) (describing how police requested user information from an Internet service provider following an electronic threat, but did not inquire as to the route it traveled).
    • (2005) F. Supp. 2d , vol.412 , pp. 174
  • 104
    • 38949134150 scopus 로고    scopus 로고
    • See, discussing the evolution of Internet intermediaries
    • See JACK GOLDSMITH & TIM WU, WHO CONTROLS THE INTERNET? 70 (2006) (discussing the evolution of Internet intermediaries).
    • (2006) Who Controls the Internet? , pp. 70
    • Goldsmith, J.1    Wu, T.2
  • 105
    • 79251634718 scopus 로고    scopus 로고
    • See id. at 70-71 noting the pervasiveness of intermediaries
    • See id. at 70-71 (noting the pervasiveness of intermediaries).
  • 106
    • 79251625726 scopus 로고    scopus 로고
    • See id. at 70 calling ISPs, search engines, browsers, the physical network, and financial intermediaries the most important intermediaries
    • See id. at 70 (calling ISPs, search engines, browsers, the physical network, and financial intermediaries the most important intermediaries).
  • 107
    • 79251617737 scopus 로고    scopus 로고
    • E.g., Freedman, at, discussing how police relied on an ISP's records
    • E.g., Freedman, 412 F. Supp. 2d at 180 (discussing how police relied on an ISP's records).
    • F. Supp. 2d , vol.412 , pp. 180
  • 108
    • 11344274494 scopus 로고    scopus 로고
    • Cf, 6 providing an exception to the hearsay rule for business records
    • Cf. FED. R. EVID. 803 (6) (providing an exception to the hearsay rule for business records).
    • Fed. R. Evid , pp. 803
  • 109
    • 51849158053 scopus 로고    scopus 로고
    • What is web 2.0?
    • See generally, Sept. 30, recounting a brainstorming session that produced the phrase "Web 2.0"
    • See generally Tim O'Reilly, What is Web 2.0?, O'REILLY, Sept. 30, 2005, http://oreilly.com/web2/archive/what-is-web-20.html (recounting a brainstorming session that produced the phrase "Web 2.0").
    • (2005) O'Reilly
    • O'Reilly, T.1
  • 110
    • 77954014042 scopus 로고    scopus 로고
    • The internet industry is on a cloud-whatever that may mean
    • See, Mar. 26, at, discussing the meaning of the phrase "cloud computing"
    • See Geoffrey A. Fowler & Ben Worthen, The Internet Industry Is on a Cloud-Whatever That May Mean, WALL ST. J., Mar. 26, 2009, at A1 (discussing the meaning of the phrase "cloud computing").
    • (2009) Wall St. J.
    • Fowler, G.A.1    Worthen, B.2
  • 111
    • 79251603930 scopus 로고    scopus 로고
    • Google Docs, last visited Apr. 12, 2010
    • Google Docs, http://docs.google.com (last visited Apr. 12, 2010).
  • 112
    • 79251615847 scopus 로고    scopus 로고
    • Google Calendar, last visited Apr. 12, 2010
    • Google Calendar, http://calendar.google.com (last visited Apr. 12, 2010).
  • 113
    • 79251603409 scopus 로고    scopus 로고
    • Amazon EC2, last visited Apr. 12, 2010
    • Amazon EC2, http://aws.amazon. com/ec2 (last visited Apr. 12, 2010).
  • 114
    • 79251607994 scopus 로고    scopus 로고
    • See Slobogin, supra note 39, at 140 discussing various kinds of online surveillance
    • See Slobogin, supra note 39, at 140 (discussing various kinds of online surveillance).
  • 115
    • 79251631248 scopus 로고    scopus 로고
    • See id. at 145-47 "In short, even if you stay home and conduct all your business and social life via phone, e-mail and surfing the 'Net, law enforcement can construct what one commentator has called 'a complete mosaic' of your characteristics."
    • See id. at 145-47 ("In short, even if you stay home and conduct all your business and social life via phone, e-mail and surfing the 'Net, [law enforcement] can construct what one commentator has called 'a complete mosaic' of your characteristics.").
  • 116
    • 70450253119 scopus 로고    scopus 로고
    • The rise and fall of invasive ISP surveillance
    • See, 1462-66, discussing reasons why Internet providers monitor customers
    • See Paul Ohm, The Rise and Fall of Invasive ISP Surveillance, 2009 U. ILL. L. REV. 1417, 1462-66 (discussing reasons why Internet providers monitor customers).
    • U. Ill. L. Rev. , vol.2009 , pp. 1417
    • Ohm, P.1
  • 117
    • 79251604748 scopus 로고    scopus 로고
    • Id. at 1433-34
    • Id. at 1433-34.
  • 118
    • 79251650167 scopus 로고    scopus 로고
    • See, e.g., id. at 1474-77 describing why web-host customers consent to be monitored by online service providers
    • See, e.g., id. at 1474-77 (describing why web-host customers consent to be monitored by online service providers).
  • 119
    • 79251618507 scopus 로고    scopus 로고
    • See Slobogin, supra note 39, at 149 "Given the potential that Internet surveillance provides the government for... linking people to crime, it could well be even more useful than visual tracking of a person's activities... and eavesdropping on or hacking into a person's communications...."
    • See Slobogin, supra note 39, at 149 ("Given the potential that [Internet] surveillance provides the government for... linking people to crime, it could well be even more useful than visual tracking of [a] person's activities... and eavesdropping on or hacking into a person's communications....").
  • 120
    • 59549106426 scopus 로고    scopus 로고
    • Whose eyes are you going to believe?
    • E.g., Scott v. Harris and the Perils of Cognitive Illiberalism, 838-40, describing the Supreme Court Justices' varied impressions upon viewing the same videotape
    • E.g., Dan M. Kahan et al., Whose Eyes Are You Going To Believe? Scott v. Harris and the Perils of Cognitive Illiberalism, 122 HARV. L. REV. 837, 838-40 (2009) (describing the Supreme Court Justices' varied impressions upon viewing the same videotape).
    • (2009) Harv. L. Rev. , vol.122 , pp. 837
    • Kahan, D.M.1
  • 121
    • 31344460918 scopus 로고    scopus 로고
    • explaining how to interpret web server logfiles
    • ERIC T. PETERSON, WEB SITE MEASUREMENT HACKS 79-83 (2005) (explaining how to interpret web server logfiles).
    • (2005) Web Site Measurement Hacks , pp. 79-83
    • Peterson, E.T.1
  • 122
    • 79251624675 scopus 로고    scopus 로고
    • See Slobogin, supra note 39, at 149 arguing that online electronic surveillance is useful because it provides more precise identifying information than physical evidence
    • See Slobogin, supra note 39, at 149 (arguing that online electronic surveillance is useful because it provides more precise identifying information than physical evidence).
  • 123
    • 79251639404 scopus 로고    scopus 로고
    • See Rubinstein et al., supra note 76, at 270-74 using cookies as an example of how precise personal information is collected online
    • See Rubinstein et al., supra note 76, at 270-74 (using cookies as an example of how precise personal information is collected online).
  • 124
    • 79251621719 scopus 로고    scopus 로고
    • E.g., id. at 272-73 explaining that the programs capture the "aggregate results of every search ever entered, every result list ever tendered, and every path taken as a result"
    • E.g., id. at 272-73 (explaining that the programs capture the "aggregate results of every search ever entered, every result list ever tendered, and every path taken as a result").
  • 125
    • 79251620681 scopus 로고    scopus 로고
    • See id. quoting the CEO of Google as stating that the future of Google depends on its ability to collect and use personal data
    • See id. (quoting the CEO of Google as stating that the future of Google depends on its ability to collect and use personal data).
  • 126
    • 79251634719 scopus 로고    scopus 로고
    • See id. "Taken together, this information represents a massive clickstream database.... that can be subpoenaed and used against litigants...."
    • See id. ("Taken together, this information represents a massive clickstream database.... [that] can be subpoenaed and used against litigants....").
  • 127
    • 79251610270 scopus 로고    scopus 로고
    • E.g., Freedman v. Am. Online, Inc., 181-84 D. Conn, holding that law enforcement's discovery of online information was valid not under a theory of probable cause, but because plaintiff lacked a reasonable expectation of privacy
    • E.g., Freedman v. Am. Online, Inc., 412 F. Supp. 2d 174, 181-84 (D. Conn. 2005) (holding that law enforcement's discovery of online information was valid not under a theory of probable cause, but because plaintiff lacked a reasonable expectation of privacy).
    • (2005) F. Supp. 2d , vol.412 , pp. 174
  • 128
    • 84873927736 scopus 로고    scopus 로고
    • Theofel v. Farey-Jones, 1073-78 9th Cir
    • Theofel v. Farey-Jones, 359 F.3d 1066, 1073-78 (9th Cir. 2004).
    • (2004) F.3d , vol.359 , pp. 1066
  • 129
    • 79251642982 scopus 로고    scopus 로고
    • § 2703 b, authorizing compelled disclosure of contents originally maintained solely for purposes of "storage or computer processing" with subpoena or court order
    • 18 U. S. C. § 2703 (b) (2006) (authorizing compelled disclosure of contents originally maintained solely for purposes of "storage or computer processing" with subpoena or court order).
    • (2006) U. S. C. , vol.18
  • 130
    • 79251607380 scopus 로고    scopus 로고
    • Id. § 2708
    • Id. § 2708.
  • 131
    • 73049107349 scopus 로고    scopus 로고
    • United States v. Kennedy, 1109-10 D. Kan
    • United States v. Kennedy, 81 F. Supp. 2d 1103, 1109-10 (D. Kan. 2000).
    • (2000) F. Supp. 2d , vol.81 , pp. 1103
  • 132
    • 79251646671 scopus 로고    scopus 로고
    • The defendant had inadvertently configured his computer to share his files with others on the Internet, and two technicians from his ISP found what they thought was child pornography in the files. Id. at 1106-09 describing the evidence obtained by police. They delivered these files to the FBI, prompting the application for the d-order
    • The defendant had inadvertently configured his computer to share his files with others on the Internet, and two technicians from his ISP found what they thought was child pornography in the files. Id. at 1106-09 (describing the evidence obtained by police). They delivered these files to the FBI, prompting the application for the d-order.
  • 133
    • 79251649165 scopus 로고    scopus 로고
    • Id
    • Id.
  • 134
    • 79251637808 scopus 로고    scopus 로고
    • Freedman v. Am. Online, Inc., 126-27 D. Conn, holding defendants liable irrespective of whether they "required" or "requested" information from the ISP
    • Freedman v. Am. Online, Inc., 303 F. Supp. 2d 121, 126-27 (D. Conn. 2004) (holding defendants liable irrespective of whether they "required" or "requested" information from the ISP).
    • (2004) F. Supp. 2d , vol.303 , pp. 121
  • 135
    • 79251610270 scopus 로고    scopus 로고
    • The court described the facts in greater detail in a later opinion. Freedman v. Am. Online, Inc., 179-80 D. Conn, describing an e-mail message sent under the screen name "GoMaryGoAway" stating that "The End is Near" in a case arising out of a local political race
    • The court described the facts in greater detail in a later opinion. Freedman v. Am. Online, Inc., 412 F. Supp. 2d 174, 179-80 (D. Conn. 2005) (describing an e-mail message sent under the screen name " GoMaryGoAway" stating that "The End is Near" in a case arising out of a local political race).
    • (2005) F. Supp. 2d , vol.412 , pp. 174
  • 136
    • 84880933161 scopus 로고    scopus 로고
    • Warshak v. United States, 6th Cir
    • Warshak v. United States, 490 F.3d 455 (6th Cir. 2007)
    • (2007) F.3d , vol.490 , pp. 455
  • 137
    • 84865150370 scopus 로고    scopus 로고
    • vacated en banc, 6th Cir
    • vacated en banc, 532 F.3d 521 (6th Cir. 2008).
    • (2008) F.3d , vol.532 , pp. 521
  • 138
    • 79251632648 scopus 로고    scopus 로고
    • Id. at 460
    • Id. at 460.
  • 139
    • 84865150370 scopus 로고    scopus 로고
    • Warshak v. United States, 523 6th Cir, en banc
    • Warshak v. United States, 532 F.3d 521, 523 (6th Cir. 2008) (en banc).
    • (2008) F.3d , vol.532 , pp. 521
  • 140
    • 79251606307 scopus 로고    scopus 로고
    • See Press Release, Fed. Trade Comm'n, FTC Charges Sellers of Avlimil, Rogisen, and Other Dietary Supplements Feb. 2, 2006, available at, describing FTC action against same defendant
    • See Press Release, Fed. Trade Comm'n, FTC Charges Sellers of Avlimil, Rogisen, and Other Dietary Supplements (Feb. 2, 2006), available at http://www.ftc.gov/opa/2006/02/avlimil.shtm (describing FTC action against same defendant).
  • 141
    • 79251636495 scopus 로고    scopus 로고
    • E.g., Brief of Amici Curiae Elec. Frontier Found. et al. Supporting the Appellant and Urging Acquittal or Order for New Trial at 4-14
    • E.g., Brief of Amici Curiae Elec. Frontier Found. et al. Supporting the Appellant and Urging Acquittal or Order for New Trial at 4-14
  • 142
    • 79251648878 scopus 로고    scopus 로고
    • Warshak v. United States, No. 08-4085 6th Cir. June 10, 2009 framing arguments against the government in the context of reasonableness instead of probable cause
    • Warshak v. United States, No. 08-4085 (6th Cir. June 10, 2009) (framing arguments against the government in the context of reasonableness instead of probable cause).
  • 143
    • 79251641986 scopus 로고    scopus 로고
    • § 1030
    • 18 U. S. C. § 1030 (2006).
    • (2006) U. S. C. , vol.18
  • 144
    • 79251616638 scopus 로고    scopus 로고
    • Id. §§ 2252-2252A
    • Id. §§ 2252-2252A.
  • 145
    • 79251619540 scopus 로고    scopus 로고
    • KERR, supra note 38
    • KERR, supra note 38.
  • 146
    • 85026668949 scopus 로고    scopus 로고
    • E.g., United States v. Gourde, 1077-79 9th Cir, en banc Kleinfeld, J., dissenting arguing that the government's search of a home computer lacked probable cause because it was based only on defendant's paid membership to a child pornography website
    • E.g., United States v. Gourde, 440 F.3d 1065, 1077-79 (9th Cir. 2006) (en banc) (Kleinfeld, J., dissenting) (arguing that the government's search of a home computer lacked probable cause because it was based only on defendant's paid membership to a child pornography website);
    • (2006) F.3d , vol.440 , pp. 1065
  • 147
    • 84455165222 scopus 로고    scopus 로고
    • United States v. Adjani, 1143 9th Cir, holding that the government had probable cause to search a home computer, and reversing the district court's order to suppress
    • United States v. Adjani, 452 F.3d 1140, 1143 (9th Cir. 2006) (holding that the government had probable cause to search a home computer, and reversing the district court's order to suppress);
    • (2006) F.3d , vol.452 , pp. 1140
  • 148
    • 84964774111 scopus 로고    scopus 로고
    • cf. United States v. Riccardi, 861-63 10th Cir, finding a search of a home computer violated the Fourth Amendment's particularity requirement
    • cf. United States v. Riccardi, 405 F.3d 852, 861-63 (10th Cir. 2005) (finding a search of a home computer violated the Fourth Amendment's particularity requirement).
    • (2005) F.3d , vol.405 , pp. 852
  • 149
    • 79251608746 scopus 로고    scopus 로고
    • Both a research assistant and I reviewed the factual description of the investigation from the full court opinion for every CFAA and child pornography case described in Professor Kerr's casebook
    • Both a research assistant and I reviewed the factual description of the investigation from the full court opinion for every CFAA and child pornography case described in Professor Kerr's casebook.
  • 150
    • 79251603681 scopus 로고    scopus 로고
    • KERR, supra note 38, at 74-83, 211-49. I concluded that none seemed close to lacking in probable cause. See Research Summary Chart Prepared by Paul Ohm, Professor, Univ. of Colorado Law School on file with author
    • KERR, supra note 38, at 74-83, 211-49. I concluded that none seemed close to lacking in probable cause. See Research Summary Chart Prepared by Paul Ohm, Professor, Univ. of Colorado Law School (on file with author).
  • 151
    • 84873927736 scopus 로고    scopus 로고
    • 9th Cir
    • 359 F.3d 1066 (9th Cir. 2004).
    • (2004) F.3d , vol.359 , pp. 1066
  • 152
    • 79251611668 scopus 로고    scopus 로고
    • Specifically, under the DOJ's interpretation, when a user opened a piece of e-mail and then left it on the e-mail provider's server, it no longer qualified as in "electronic storage", an important SCA term of art. COMPUTER CRIME & INTELLECTUAL PROP. SECTION, DEP'T OF JUSTICE, SEARCHING AND SEIZING COMPUTERS AND OBTAINING ELECTRONIC EVIDENCE IN CRIMINAL INVESTIGATIONS 122-27 3d ed. 2009 hereinafter CCIPS SEARCH-AND-SEIZURE MANUAL, available at, defining "electronic storage". Importantly, e-mail stored but not in electronic storage could be accessed by a d-order or subpoena
    • Specifically, under the DOJ's interpretation, when a user opened a piece of e-mail and then left it on the e-mail provider's server, it no longer qualified as in "electronic storage", an important SCA term of art. COMPUTER CRIME & INTELLECTUAL PROP. SECTION, DEP'T OF JUSTICE, SEARCHING AND SEIZING COMPUTERS AND OBTAINING ELECTRONIC EVIDENCE IN CRIMINAL INVESTIGATIONS 122-27 (3d ed. 2009) [hereinafter CCIPS SEARCH-AND-SEIZURE MANUAL], available at http://www.cybercrime.gov/ssmanual/ssmanual2009.pdf (defining "electronic storage"). Importantly, e-mail stored but not in electronic storage could be accessed by a d-order or subpoena.
  • 153
    • 79251604480 scopus 로고    scopus 로고
    • Id. at 127-34 outlining the government's means of compelling disclosure
    • Id. at 127-34 (outlining the government's means of compelling disclosure).
  • 154
    • 79251629212 scopus 로고    scopus 로고
    • Id
    • Id.
  • 155
    • 79251601645 scopus 로고    scopus 로고
    • See, e.g., id. including specific cases in its discussion of compelling disclosure with less than probable cause
    • See, e.g., id. (including specific cases in its discussion of compelling disclosure with less than probable cause).
  • 156
    • 79251639101 scopus 로고    scopus 로고
    • The case involved a civil suit about a discovery request for e-mail in a prior litigation gone very bad, at, It was probably not until the Justice Department filed an amicus brief urging reconsideration that the panel realized that it was upsetting years of criminal law investigation practice
    • The case involved a civil suit about a discovery request for e-mail in a prior litigation gone very bad. Theofel, 359 F.3d at 1071-72. It was probably not until the Justice Department filed an amicus brief urging reconsideration that the panel realized that it was upsetting years of criminal law investigation practice.
    • F.3d , vol.359 , pp. 1071-1072
    • Theofel1
  • 157
    • 79251650164 scopus 로고    scopus 로고
    • Id. at 1076. But even faced with the import of its decision, the panel did not waver, amending its opinion to reject the government's arguments in detail and reassuring the government that it did "not lightly conclude that the government's reading is erroneous."
    • Id. at 1076. But even faced with the import of its decision, the panel did not waver, amending its opinion to reject the government's arguments in detail and reassuring the government that it did "not lightly conclude that the government's reading is erroneous."
  • 158
    • 79251618506 scopus 로고    scopus 로고
    • Id. at 1077
    • Id. at 1077.
  • 159
    • 79251613188 scopus 로고    scopus 로고
    • In response to the DOJ's argument that Theofel would read out the part of the statute which allowed d-order and subpoena requests, Judge Kozinski explained that ISPs that provide only "storage or computer processing services" would still be amenable to process under the provision
    • In response to the DOJ's argument that Theofel would read out the part of the statute which allowed d-order and subpoena requests, Judge Kozinski explained that ISPs that provide only "storage or computer processing services" would still be amenable to process under the provision.
  • 160
    • 79251619539 scopus 로고    scopus 로고
    • Id. at 1076-77
    • Id. at 1076-77.
  • 161
    • 79251625974 scopus 로고    scopus 로고
    • See CCIPS SEARCH-AND-SEIZURE MANUAL, supra note 124, at 123-25, discussing the effect of Theofel from the DOJ's perspective
    • See CCIPS SEARCH-AND-SEIZURE MANUAL, supra note 124, at 123-25 (discussing the effect of Theofel from the DOJ's perspective).
  • 162
    • 79251630521 scopus 로고    scopus 로고
    • *, D. Minn. Dec. 14, 2001
    • * 3 (D. Minn. Dec. 14, 2001)
    • (2001) WL 1690055 , pp. 3
  • 163
    • 79251607756 scopus 로고    scopus 로고
    • rev'd, 8th Cir
    • rev'd, 310 F.3d 1063 (8th Cir. 2002).
    • (2002) F.3d , vol.310 , pp. 1063
  • 164
    • 79251618505 scopus 로고    scopus 로고
    • 21st Century Department of Justice Appropriations Authorization Act, Pub. L. 107-273, § 11010, 1822
    • 21st Century Department of Justice Appropriations Authorization Act, Pub. L. 107-273, § 11010, 116 Stat. 1812, 1822 (2002)
    • (2002) Stat. , vol.116 , pp. 1812
  • 165
    • 79251645657 scopus 로고    scopus 로고
    • codified as amended at, § 2703 g
    • (codified as amended at 18 U. S. C. § 2703 (g) (2006)).
    • (2006) U. S. C. , vol.18
  • 166
    • 72449193798 scopus 로고    scopus 로고
    • Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism USA PATRIOT Act of 2001, Pub. L. 107-56, § 220, 291
    • Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, Pub. L. 107-56, § 220, 115 Stat. 272, 291
    • Stat. , vol.115 , pp. 272
  • 167
    • 79251615591 scopus 로고    scopus 로고
    • codified as amended at, § § 2703, 2711, 3127
    • (codified as amended at 18 U. S. C. § § 2703, 2711, 3127 (2006)).
    • (2006) U. S. C. , vol.18
  • 168
    • 85025621497 scopus 로고    scopus 로고
    • E.g., United States v. Smith, 1059 9th Cir, allowing suppression of voice mail under the Wiretap Act
    • E.g., United States v. Smith, 155 F.3d 1051, 1059 (9th Cir. 1998) (allowing suppression of voice mail under the Wiretap Act).
    • (1998) F.3d , vol.155 , pp. 1051
  • 169
    • 79251601900 scopus 로고    scopus 로고
    • USA PATRIOT Act § 209
    • USA PATRIOT Act § 209.
  • 170
    • 79251634985 scopus 로고    scopus 로고
    • E.g., Fighting Cyber Crime: Hearing Before the Subcomm. on Crime of the H. Comm. on the Judiciary, 107th Cong. 41-48 2001 statement of Associate Att'y Gen. Michael Chertoff mentioning problems with the Pen Register Act and the Cable Act
    • E.g., Fighting Cyber Crime: Hearing Before the Subcomm. on Crime of the H. Comm. on the Judiciary, 107th Cong. 41-48 (2001) (statement of Associate Att'y Gen. Michael Chertoff) (mentioning problems with the Pen Register Act and the Cable Act);
  • 171
    • 79251604477 scopus 로고    scopus 로고
    • Fourth Amendment and the Internet: Hearing Before the Subcomm. on the Constitution of the H. Comm. on the Judiciary, 106th Cong. 4-20 2000 statement of Deputy Assistant Att'y Gen. Kevin V. di Gregory asking for changes to ECPA
    • Fourth Amendment and the Internet: Hearing Before the Subcomm. on the Constitution of the H. Comm. on the Judiciary, 106th Cong. 4-20 (2000) (statement of Deputy Assistant Att'y Gen. Kevin V. di Gregory) (asking for changes to ECPA).
  • 172
    • 79251625976 scopus 로고    scopus 로고
    • United States Court of Appeals for the Ninth Circuit, Map of the Ninth Circuit, last visited Apr. 12, 2010
    • United States Court of Appeals for the Ninth Circuit, Map of the Ninth Circuit, http://www.ca9.uscourts.gov/content/view.php?pk-id=0000000135 (last visited Apr. 12, 2010).
  • 174
    • 79251638581 scopus 로고    scopus 로고
    • CCIPS Search-and-seizure Manual, supra note 124, at 123-25
    • CCIPS Search-and-seizure Manual, supra note 124, at 123-25.
  • 175
    • 79251636496 scopus 로고    scopus 로고
    • CCIPS PROSECUTING COMPUTER CRIMES, supra note 137, at 81. I worked for the Computer Crime and Intellectual Property Section when Theofel was decided. This discussion, however, rests only on the public record and my personal interpretations of events
    • CCIPS PROSECUTING COMPUTER CRIMES, supra note 137, at 81. I worked for the Computer Crime and Intellectual Property Section when Theofel was decided. This discussion, however, rests only on the public record and my personal interpretations of events.
  • 176
    • 79251640648 scopus 로고    scopus 로고
    • CCIPS SEARCH-AND-SEIZURE MANUAL, supra note 124, at 125 "Prosecutors within the Ninth Circuit are bound by Theofel...."
    • CCIPS SEARCH-AND-SEIZURE MANUAL, supra note 124, at 125 ("[P]rosecutors within the Ninth Circuit are bound by Theofel....").
  • 177
    • 84873927736 scopus 로고    scopus 로고
    • See, e.g., Theofel v. Farey-Jones, 1067-77 9th Cir, discussing the government's arguments aimed at maintaining lower justification standards
    • See, e.g., Theofel v. Farey-Jones, 359 F.3d 1066, 1067-77 (9th Cir. 2004) (discussing the government's arguments aimed at maintaining lower justification standards).
    • (2004) F.3d , vol.359 , pp. 1066
  • 178
    • 79251634477 scopus 로고    scopus 로고
    • Posting of Nicole Wong, Associate General Counsel, Google, Inc., to Official Google Blog, Feb. 17, 2006, 15:55 PST asserting that the government requested "untold millions of search queries" which would "do nothing to further the Government's case in the underlying action"
    • Posting of Nicole Wong, Associate General Counsel, Google, Inc., to Official Google Blog, http://googleblog.blogspot.com/2006/02/response-to-doj- motion.html (Feb. 17, 2006, 15:55 PST) (asserting that the government requested "untold millions of search queries" which would "do nothing to further the Government's case in the underlying action").
  • 179
    • 79251623360 scopus 로고    scopus 로고
    • § 231
    • 47 U. S. C. § 231 (2006).
    • (2006) U. S. C. , vol.47
  • 180
    • 79251648876 scopus 로고    scopus 로고
    • Google faces order to give up records
    • See, Mar. 15, at, discussing the government's requests of major search engine companies in an effort to defend the COPA
    • See Hiawatha Bray, Google Faces Order To Give Up Records, BOSTON GLOBE, Mar. 15, 2006, at E1 (discussing the government's requests of major search engine companies in an effort to defend the COPA).
    • (2006) Boston Globe
    • Bray, H.1
  • 181
    • 70049101679 scopus 로고    scopus 로고
    • Google resists U. S. subpoena of search data
    • See, Jan. 20, at, discussing the motion to compel
    • See Katie Hafner & Matt Richtel, Google Resists U. S. Subpoena of Search Data, N. Y. TIMES, Jan. 20, 2006, at A1 (discussing the motion to compel).
    • (2006) N. Y. Times
    • Hafner, K.1    Richtel, M.2
  • 182
    • 79251635488 scopus 로고    scopus 로고
    • See, e.g., Posting of Nicole Wong, supra note 141 responding to the government's motion to compel
    • See, e.g., Posting of Nicole Wong, supra note 141 (responding to the government's motion to compel).
  • 183
    • 79251645161 scopus 로고    scopus 로고
    • See Hafner & Richtel, supra note 144 "The government is trying to establish a profile of Internet use that will help it defend the Child Online Protection Act...."
    • See Hafner & Richtel, supra note 144 ("[The government] is trying to establish a profile of Internet use that will help it defend the Child Online Protection Act....").
  • 184
    • 84986253267 scopus 로고    scopus 로고
    • Google must divulge data
    • See, Mar. 18, at, "The 21-page opinion by Judge James Ware... puts to bed a high-profile legal battle between the most popular search engine and the Department of Justice...."
    • See Verne Kopytoff, Google Must Divulge Data, S. F. CHRON., Mar. 18, 2006, at C1 ("The 21-page opinion by Judge James Ware... puts to bed a high-profile legal battle between the most popular search engine and the Department of Justice....").
    • (2006) S. F. Chron.
    • Kopytoff, V.1
  • 185
    • 79251621464 scopus 로고    scopus 로고
    • See Electronic Frontier Foundation, From EFF's Secret Files: Anatomy of a Bogus Subpoena, last visited Apr. 12, 2010 reporting on the contents of the subpoena
    • See Electronic Frontier Foundation, From EFF's Secret Files: Anatomy of a Bogus Subpoena, http://www.eff.org/wp/anatomy-bogus-subpoena-indymedia (last visited Apr. 12, 2010) (reporting on the contents of the subpoena).
  • 186
    • 79251638320 scopus 로고    scopus 로고
    • Id
    • Id.
  • 187
    • 79251613811 scopus 로고    scopus 로고
    • E.g., United States v. Gourde, 1067-68 9th Cir, en banc describing how information found online about defendant's subscription to a child pornography website led the FBI to real evidence in his home
    • E.g., United States v. Gourde, 440 F.3d 1060, 1067-68 (9th Cir. 2004) (en banc) (describing how information found online about defendant's subscription to a child pornography website led the FBI to real evidence in his home).
    • (2004) F.3d , vol.440 , pp. 1060
  • 188
    • 79251620680 scopus 로고    scopus 로고
    • Cell phone contact lists and webmail address books are replacing the traditional "little black books." Do not be confused by the fact that the storage mechanism is electronic or online. I still put this in the category of a "real world" storage device pointing to online addresses
    • Cell phone contact lists and webmail address books are replacing the traditional "little black books." Do not be confused by the fact that the storage mechanism is electronic or online. I still put this in the category of a "real world" storage device pointing to online addresses.
  • 189
    • 79251631012 scopus 로고    scopus 로고
    • Compare with Gourde, at, where the FBI had defendant's e-mail address accompanied by evidence he maintained a membership to a child pornography website
    • Compare with Gourde, 440 F.3d at 1067-68, where the FBI had defendant's e-mail address accompanied by evidence he maintained a membership to a child pornography website.
    • F.3d , vol.440 , pp. 1067-1068
  • 190
    • 79251604478 scopus 로고    scopus 로고
    • See supra Part II. A.3.a
    • See supra Part II. A.3.a.
  • 191
    • 78650137664 scopus 로고    scopus 로고
    • Growing presence in the courtroom: Cellphone data as witness
    • See, July 6, at, discussing the role cell phone tracking now plays in law enforcement investigations
    • See Anne Barnard, Growing Presence in the Courtroom: Cellphone Data as Witness, N. Y. TIMES, July 6, 2009, at A16 (discussing the role cell phone tracking now plays in law enforcement investigations).
    • (2009) N. Y. Times
    • Barnard, A.1
  • 192
    • 79251639403 scopus 로고    scopus 로고
    • Id
    • Id.
  • 193
    • 79251627085 scopus 로고    scopus 로고
    • Id
    • Id.
  • 194
    • 79251643974 scopus 로고    scopus 로고
    • See id. reporting that "wireless carriers receive hundreds of requests a month from law enforcement just for real-time tracking", according to lawyer Albert Gidari Jr.
    • See id. (reporting that "wireless carriers receive hundreds of requests a month from law enforcement just for real-time tracking", according to lawyer Albert Gidari Jr.).
  • 195
    • 79251620950 scopus 로고    scopus 로고
    • Cell phones as tracking devices
    • See, 1416, listing cases
    • See M. Wesley Clark, Cell Phones as Tracking Devices, 41 VAL. U. L. REV. 1413, 1416 n. 17 (2007) (listing cases).
    • (2007) Val. U. L. Rev. , vol.41 , Issue.17 , pp. 1413
    • Clark, M.W.1
  • 196
    • 79251638834 scopus 로고    scopus 로고
    • See id. at 1415-17 describing the DOJ's record in cases involving EC-PA
    • See id. at 1415-17 (describing the DOJ's record in cases involving EC-PA).
  • 197
    • 79251603411 scopus 로고    scopus 로고
    • See id. at 1418-56 chronicling these issues
    • See id. at 1418-56 (chronicling these issues).
  • 198
    • 79251604479 scopus 로고    scopus 로고
    • See e.g., Barnard, supra note 154 noting the use of finding kidnappers, fugitives, and drug traffickers
    • See e.g., Barnard, supra note 154 (noting the use of finding kidnappers, fugitives, and drug traffickers);
  • 199
    • 79251624122 scopus 로고    scopus 로고
    • FBI e-mail shows rift over warrantless phone record grabs
    • Dec. 20, explaining how cell phone tracking works and is used
    • Ryan Singel, FBI E-Mail Shows Rift Over Warrantless Phone Record Grabs, WIRED, Dec. 20, 2007, http://www.wired.com/print/politics/onlinerights/news/ 2007/12/fbi-cell (explaining how cell phone tracking works and is used).
    • (2007) Wired
    • Singel, R.1
  • 200
    • 79251625727 scopus 로고    scopus 로고
    • See Solove, supra note 47, at 1287 discussing how applying electronic surveillance to IP addresses and URLs makes things "fuzzy"
    • See Solove, supra note 47, at 1287 (discussing how applying electronic surveillance to IP addresses and URLs makes things "fuzzy").
  • 201
    • 79251630259 scopus 로고    scopus 로고
    • Compare Christopher Soghoian, Slight Paranoia, 8 Million Reasons for Real Surveillance Oversight, Dec. 1, 2009, 7:00 AM, reporting eight million requests for GPS location information quoting Paul Taylor, Electronic Surveillance Manager, Sprint Nextel
    • Compare Christopher Soghoian, Slight Paranoia, 8 Million Reasons for Real Surveillance Oversight, (Dec. 1, 2009, 7:00 AM), http://paranoia.dubfire.net/ 2009/12/8-million-reasons-for-real-surveillance.html (reporting eight million requests for GPS location information) (quoting Paul Taylor, Electronic Surveillance Manager, Sprint Nextel)
  • 202
    • 79251631722 scopus 로고    scopus 로고
    • with Comment of Matt Sullivan, Sprint Nextel, to id., Dec. 1, 2009, 23:26 clarifying that the eight million requests amount to only "several thousand" instances of surveillance
    • with Comment of Matt Sullivan, Sprint Nextel, to id., (Dec. 1, 2009, 23:26) (clarifying that the eight million requests amount to only "[s]everal thousand" instances of surveillance).
  • 203
    • 79251619789 scopus 로고    scopus 로고
    • Solove, supra note 47, at 1301
    • Solove, supra note 47, at 1301.
  • 204
    • 72549092198 scopus 로고    scopus 로고
    • Spying program snared U. S. calls
    • See, Dec. 21, at
    • See James Risen & Eric Lichtblau, Spying Program Snared U. S. Calls, N. Y. Times, Dec. 21, 2005, at A1.
    • (2005) N. Y. Times
    • Risen, J.1    Lichtblau, E.2
  • 205
    • 53149102325 scopus 로고    scopus 로고
    • U. S. secretly tracks global bank data
    • June 23, at
    • Josh Meyer & Greg Miller, U. S. Secretly Tracks Global Bank Data, L. A. TIMES, June 23, 2006, at A1.
    • (2006) L. A. Times
    • Meyer, J.1    Miller, G.2
  • 206
    • 33750969026 scopus 로고    scopus 로고
    • NSA has massive database of Americans' phone calls
    • May 11, at
    • Leslie Cauley, NSA Has Massive Database of Americans' Phone Calls, USA TODAY, May 11, 2006, at 1A.
    • (2006) Usa Today
    • Cauley, L.1
  • 207
    • 79251621205 scopus 로고    scopus 로고
    • See id. explaining that most of the information comes from people not suspected of crimes
    • See id. (explaining that most of the information comes from people not suspected of crimes).
  • 208
    • 38049048075 scopus 로고    scopus 로고
    • See, arguing that data mining does not implicate privacy at all unless a human looks at the results
    • See RICHARD A. POSNER, NOT A SUICIDE PACT: THE CONSTITUTION IN A TIME OF NATIONAL EMERGENCY 96-97 (2006) (arguing that data mining does not implicate privacy at all unless a human looks at the results);
    • (2006) Not A Suicide Pact: The Constitution in A Time of National Emergency , pp. 96-97
    • Posner, R.A.1
  • 209
    • 47049107175 scopus 로고    scopus 로고
    • Government data mining: The need for a legal framework
    • 487-88, endorsing a nine-pronged framework for regulating data mining with no mention of judicial standards
    • Fred H. Cate, Government Data Mining: The Need for a Legal Framework, 43 HARV. C. R.-C. L. L. REV. 435, 487-88 (2008) (endorsing a nine-pronged framework for regulating data mining with no mention of judicial standards);
    • (2008) Harv. C. R.-C. L. L. Rev. , vol.43 , pp. 435
    • Cate, F.H.1
  • 210
    • 42349114774 scopus 로고    scopus 로고
    • Government data mining and the fourth amendment
    • 337-38, arguing for a non-probable cause standard for some types of data mining
    • Christopher Slobogin, Government Data Mining and the Fourth Amendment, 75 U. CHI. L. REV. 317, 337-38 (2008) (arguing for a non-probable cause standard for some types of data mining).
    • (2008) U. Chi. L. Rev. , vol.75 , pp. 317
    • Slobogin, C.1
  • 211
    • 79251604449 scopus 로고    scopus 로고
    • E.g., Posting of Jim Harper to Cato@Liberty, Data Mining of the Fourth Amendment?, Aug. 22, 2006, 12:36 PM
    • E.g., Posting of Jim Harper to Cato@Liberty, Data Mining of the Fourth Amendment?, http://www.cato-at-liberty.org/2006/08/22/data-mining-or-the-fourth- amendment/ (Aug. 22, 2006, 12:36 PM).
  • 212
    • 79251646910 scopus 로고    scopus 로고
    • See, e.g., Slobogin, supra note 169, at 330 "Since virtually all information obtained through data mining comes from third-party record holders-either the government itself, commercial data brokers, or a commercial entity like a bank-its acquisition does not implicate the Fourth Amendment."
    • See, e.g., Slobogin, supra note 169, at 330 ("Since virtually all information obtained through data mining comes from third-party record holders-either the government itself, commercial data brokers, or a commercial entity like a bank-its acquisition does not implicate the Fourth Amendment.").
  • 213
    • 79251647175 scopus 로고    scopus 로고
    • See Kerr, supra note 35, at 1218-22 discussing the disclosure requirements under the SCA
    • See Kerr, supra note 35, at 1218-22 (discussing the disclosure requirements under the SCA).
  • 214
    • 79251625975 scopus 로고    scopus 로고
    • The only federal law that specifically regulates data mining is the Computer Matching and Privacy Act of 1988, Pub. L. No. 100-503, codified as amended at 5 U. S. C. § 552a o - r 2006. The law is mostly inapposite to this discussion because it imposes no justification standards and it expressly exempts data mining for law enforcement and intelligence purposes
    • The only federal law that specifically regulates data mining is the Computer Matching and Privacy Act of 1988, Pub. L. No. 100-503, 102 Stat. 2507 (codified as amended at 5 U. S. C. § 552a (o) - (r) (2006)). The law is mostly inapposite to this discussion because it imposes no justification standards and it expressly exempts data mining for law enforcement and intelligence purposes.
    • Stat. , vol.102 , pp. 2507
  • 215
    • 79251605271 scopus 로고    scopus 로고
    • § 552a a 8 B iii, v - vi
    • U. S. C. § 552a (a) (8) (B) (iii), (v) - (vi).
    • U. S. C. , vol.5
  • 216
    • 79251631011 scopus 로고    scopus 로고
    • See supra Part II. C.1
    • See supra Part II. C.1.
  • 217
    • 77951948917 scopus 로고    scopus 로고
    • Subpoenas and privacy
    • 809
    • Christopher Slobogin, Subpoenas and Privacy, 54 DEPAUL L. REV. 805, 809 (2005).
    • (2005) Depaul L. Rev. , vol.54 , pp. 805
    • Slobogin, C.1
  • 218
    • 23044522923 scopus 로고    scopus 로고
    • Bill Clinton, and the transsubstantive fourth amendment
    • 864
    • William J. Stuntz, O. J. Simpson, Bill Clinton, and the Transsubstantive Fourth Amendment, 114 HARV. L. REV. 842, 864 (2001).
    • (2001) Harv. L. Rev. , vol.114 , pp. 842
    • Stuntz, W.J.1    Simpson, O.J.2
  • 219
    • 79251645401 scopus 로고    scopus 로고
    • See Bray, supra note 143
    • See Bray, supra note 143.
  • 220
    • 77952760538 scopus 로고    scopus 로고
    • The SCA permits access to some records with a subpoena, § 2703 b 1 B i, c 2
    • The SCA permits access to some records with a subpoena. 18 U. S. C. § 2703 (b) (1) (B) (i), (c) (2) (2006).
    • (2006) U. S. C. , vol.18
  • 221
    • 79251608481 scopus 로고    scopus 로고
    • Id. § 3123 a 1 - 2
    • Id. § 3123 (a) (1) - (2).
  • 222
    • 84873927736 scopus 로고    scopus 로고
    • See Theofel v. Farey-Jones, 1076-77 9th Cir
    • See Theofel v. Farey-Jones, 359 F.3d 1066, 1076-77 (9th Cir. 2004).
    • (2004) F.3d , vol.359 , pp. 1066
  • 223
    • 79251603680 scopus 로고    scopus 로고
    • See Slobogin, supra note 175, at 840 stating that information obtained through subpoenas is usually secondary information
    • See Slobogin, supra note 175, at 840 (stating that information obtained through subpoenas is usually secondary information).
  • 224
    • 79251638319 scopus 로고    scopus 로고
    • Symposium, the future of internet surveillance law: A symposium to discuss internet surveillance, privacy, and the USA patriot act
    • See, Every author who expressed an opinion about ECPA recommended changing it in fairly significant ways
    • See Symposium, The Future of Internet Surveillance Law: A Symposium To Discuss Internet Surveillance, Privacy, and the USA Patriot Act, 72 GEO. WASH.
    • (2004) Geo. Wash. L. Rev. , vol.72 , pp. 1139
  • 225
    • 79251615590 scopus 로고    scopus 로고
    • See Posting of Paul Ohm to Concurring Opinions, Which is More Confusing: ECPA or the Tax Code?, Aug. 21, 2008, 12:42 PM
    • See Posting of Paul Ohm to Concurring Opinions, Which is More Confusing: ECPA or the Tax Code?, http://www.concurringopinions.com/archives/2008/08/which- is-more-c-1.html (Aug. 21, 2008, 12:42 PM).
  • 226
    • 84866175791 scopus 로고    scopus 로고
    • See, e.g., United States v. Councilman, 85 1st Cir, en banc interpreting the Wiretap Act
    • See, e.g., United States v. Councilman, 418 F.3d 67, 85 (1st Cir. 2005) (en banc) (interpreting the Wiretap Act);
    • (2005) F.3d , vol.418 , pp. 67
  • 227
    • 84873883867 scopus 로고    scopus 로고
    • Konop v. Hawaiian Airlines, Inc., 886 9th Cir, affirming the dismissal of a Wiretap Act claim, but reversing the dismissal of a Stored Communications Act claim
    • Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 886 (9th Cir. 2002) (affirming the dismissal of a Wiretap Act claim, but reversing the dismissal of a Stored Communications Act claim).
    • (2002) F.3d , vol.302 , pp. 868
  • 228
    • 79251607757 scopus 로고    scopus 로고
    • See Kerr, supra note 35, at 1235-38 urging Congress to simplify EC-PA
    • See Kerr, supra note 35, at 1235-38 (urging Congress to simplify EC-PA).
  • 229
    • 84887285498 scopus 로고
    • McDonald v. United States, 455
    • McDonald v. United States, 335 U. S. 451, 455 (1948).
    • (1948) U. S. , vol.335 , pp. 451
  • 230
    • 79251611416 scopus 로고    scopus 로고
    • See, § 3121, defining the relevance-and-certification standard
    • See 18 U. S. C. § 3121 (2006) (defining the relevance-and- certification standard).
    • (2006) U. S. C. , vol.18
  • 231
    • 79251648877 scopus 로고    scopus 로고
    • See Solove, supra note 47, at 1288-89
    • See Solove, supra note 47, at 1288-89.
  • 232
    • 79251630522 scopus 로고    scopus 로고
    • Id. at 1288
    • Id. at 1288.
  • 233
    • 79251649652 scopus 로고
    • United States v. Fregoso, 1320 8th Cir, calling the judge's role in reviewing Pen Register Act applications "ministerial in nature"
    • United States v. Fregoso, 60 F.3d 1314, 1320 (8th Cir. 1995) (calling the judge's role in reviewing Pen Register Act applications "ministerial in nature").
    • (1995) F.3d , vol.60 , pp. 1314
  • 234
    • 79251644658 scopus 로고    scopus 로고
    • § 2703 d
    • 18 U. S. C. § 2703 (d) (2006).
    • (2006) U. S. C. , vol.18
  • 235
    • 21244448737 scopus 로고    scopus 로고
    • Internet surveillance law after the USA PATRIOT act: The big brother that isn't
    • See, 639, explaining that the higher standard would add privacy protection
    • See Orin S. Kerr, Internet Surveillance Law After the USA PATRIOT Act: The Big Brother That Isn't, 97 NW. U. L. REV. 607, 639 (2003) (explaining that the higher standard would add privacy protection).
    • (2003) Nw. U. L. Rev. , vol.97 , pp. 607
    • Kerr, O.S.1
  • 236
    • 84880933161 scopus 로고    scopus 로고
    • See Warshak v. United States, 467 6th Cir, upholding an injunction for lack of a warrant or notice
    • See Warshak v. United States, 490 F.3d 455, 467 (6th Cir. 2007) (upholding an injunction for lack of a warrant or notice)
    • (2007) F.3d , vol.490 , pp. 455
  • 237
    • 84865150370 scopus 로고    scopus 로고
    • rev'd as not ripe by, 522 6th Cir, en banc
    • rev'd as not ripe by 532 F.3d 521, 522 (6th Cir. 2008) (en banc).
    • (2008) F.3d , vol.532 , pp. 521
  • 238
    • 79251613685 scopus 로고    scopus 로고
    • See, § 2705 a 1 - 2 listing five factors justifying delay including physical safety, possible flight, evidence tampering, and witness intimidation
    • See 18 U. S. C. § 2705 (a) (1) - (2) (listing five factors justifying delay including physical safety, possible flight, evidence tampering, and witness intimidation).
    • U. S. C. , vol.18
  • 239
    • 79251606050 scopus 로고    scopus 로고
    • Notice to the subscriber is not required in parts of the SCA
    • Notice to the subscriber is not required in parts of the SCA
  • 240
    • 79251616101 scopus 로고    scopus 로고
    • id. § 2703 b 1 A, c 1, or in the Pen Register Act, id. § 3123 d
    • id. § 2703 (b) (1) (A), (c) (1), or in the Pen Register Act, id. § 3123 (d).
  • 241
    • 79251601644 scopus 로고    scopus 로고
    • Id. § 2519 3
    • Id. § 2519 (3).
  • 242
    • 79251615061 scopus 로고    scopus 로고
    • See id. §§ 2702 d, 3126
    • See id. §§ 2702 (d), 3126.
  • 243
    • 79251632917 scopus 로고    scopus 로고
    • See id. § 2519 describing the reporting requirements for wiretaps
    • See id. § 2519 (describing the reporting requirements for wiretaps).
  • 244
    • 0043159103 scopus 로고    scopus 로고
    • Lifting the "fog" of internet surveillance: How a suppression remedy would change computer crime law
    • See, 837-40
    • See Orin S. Kerr, Lifting the "Fog" of Internet Surveillance: How A Suppression Remedy Would Change Computer Crime Law, 54 HASTINGS L. J. 805, 837-40 (2003).
    • (2003) Hastings L. J. , vol.54 , pp. 805
    • Kerr, O.S.1
  • 245
    • 79251629501 scopus 로고    scopus 로고
    • § 2518 1 c
    • 18 U. S. C. § 2518 (1) (c).
    • U. S. C. , vol.18
  • 246
    • 79251650166 scopus 로고    scopus 로고
    • FBI's secret spyware tracks down teen who made bomb threats
    • See, July 18, describing the FBI's use of spyware in its law enforcement efforts
    • See Kevin Poulsen, FBI's Secret Spyware Tracks Down Teen Who Made Bomb Threats, WIRED, July 18, 2007, http://www.wired.com/politics/law/news/2007/07/ fbi-spyware (describing the FBI's use of spyware in its law enforcement efforts).
    • (2007) Wired
    • Poulsen, K.1
  • 247
    • 79251633735 scopus 로고    scopus 로고
    • See Kerr, supra note 69, at 574
    • See Kerr, supra note 69, at 574.
  • 248
    • 33744908764 scopus 로고    scopus 로고
    • Pervasive computing: Embedding the public sphere
    • See, e.g., 93, describing the ideas of pervasive computing and ubiquitous access
    • See, e.g., Jerry Kang & Dana Cuff, Pervasive Computing: Embedding the Public Sphere, 65 WASH. & LEE L. REV. 93, 93 (2005) (describing the ideas of pervasive computing and ubiquitous access).
    • (2005) Wash. & Lee L. Rev. , vol.65 , pp. 93
    • Kang, J.1    Cuff, D.2
  • 249
    • 79251643718 scopus 로고    scopus 로고
    • See U. S. Const. amend IV
    • See U. S. Const. amend IV.
  • 250
    • 79251638036 scopus 로고    scopus 로고
    • This last point is another example of the well-worn "I have nothing to hide" argument, which Daniel Solove refutes
    • This last point is another example of the well-worn "I have nothing to hide" argument, which Daniel Solove refutes.
  • 251
    • 57349110717 scopus 로고    scopus 로고
    • "I've got nothing to hide" and other misunderstandings of privacy
    • See, 764-72
    • See Daniel J. Solove, "I've Got Nothing To Hide" and Other Misunderstandings of Privacy, 44 SAN DIEGO L. REV. 745, 764-72 (2007).
    • (2007) San Diego L. Rev. , vol.44 , pp. 745
    • Solove, D.J.1
  • 252
    • 33644925852 scopus 로고    scopus 로고
    • A taxonomy of privacy
    • See, 528, stating that Fourth Amendment law fails to protect against some breaches
    • See Daniel J. Solove, A Taxonomy of Privacy, 154 U. Pa. L. Rev. 477, 528 (2006) (stating that Fourth Amendment law fails to protect against some breaches).
    • (2006) U. Pa. L. Rev. , vol.154 , pp. 477
    • Solove, D.J.1
  • 253
    • 79251642762 scopus 로고    scopus 로고
    • See Kerr, supra, note 69, at 587-600
    • See Kerr, supra, note 69, at 587-600.
  • 254
    • 77249131620 scopus 로고
    • See United States v. Miller, 443
    • See United States v. Miller, 425 U. S. 435, 443 (1976).
    • (1976) U. S. , vol.425 , pp. 435
  • 255
    • 78751647463 scopus 로고
    • See Smith v. Maryland, 745-46
    • See Smith v. Maryland, 442 U. S. 735, 745-46 (1976).
    • (1976) U. S. , vol.442 , pp. 735
  • 256
    • 79251643208 scopus 로고    scopus 로고
    • Kerr, supra note 69, at 564
    • Kerr, supra note 69, at 564.
  • 257
    • 79251610271 scopus 로고    scopus 로고
    • See id. at 575
    • See id. at 575.
  • 258
    • 79251641156 scopus 로고    scopus 로고
    • Id. at 576
    • Id. at 576.
  • 259
    • 79251629759 scopus 로고    scopus 로고
    • I have other problems with Professor Kerr's argument. Most significantly, I find the approach impossible for courts to apply, because it is positively actuarial: it asks courts to construct a balance sheet measuring how changes in technology upend the constitutionally proper balance between privacy and security. When the balance sheet tips too much in favor of privacy at the cost of security, it allows courts to construct rules to restore balance. This bean-counting approach is too indeterminate to serve the purpose Professor Kerr intends, because it requires courts to quantify changes in technology and crime in ways that courts are ill-equipped to do
    • I have other problems with Professor Kerr's argument. Most significantly, I find the approach impossible for courts to apply, because it is positively actuarial: it asks courts to construct a balance sheet measuring how changes in technology upend the constitutionally proper balance between privacy and security. When the balance sheet tips too much in favor of privacy at the cost of security, it allows courts to construct rules to restore balance. This bean-counting approach is too indeterminate to serve the purpose Professor Kerr intends, because it requires courts to quantify changes in technology and crime in ways that courts are ill-equipped to do.
  • 260
    • 79251624403 scopus 로고    scopus 로고
    • See id. at 575-76 discussing the effects of intermediaries on criminal conduct
    • See id. at 575-76 (discussing the effects of intermediaries on criminal conduct).
  • 261
    • 33947354725 scopus 로고
    • See Berger v. New York, 43-44, striking down a New York surveillance law as too general
    • See Berger v. New York, 388 U. S. 41, 43-44 (1967) (striking down a New York surveillance law as too general).
    • (1967) U. S. , vol.388 , pp. 41
  • 262
    • 33947416337 scopus 로고
    • See Katz v. United States, 350, refusing to recognize the Fourth Amendment as granting a general privacy right
    • See Katz v. United States, 389 U. S. 347, 350 (1967) (refusing to recognize the Fourth Amendment as granting a general privacy right).
    • (1967) U. S. , vol.389 , pp. 347
  • 263
    • 79251601901 scopus 로고    scopus 로고
    • See, e.g., Slobogin, supra note 39, at 153 analogizing the assumption of risk that the phone company will disclose information to information gained by ISPs
    • See, e.g., Slobogin, supra note 39, at 153 (analogizing the assumption of risk that the phone company will disclose information to information gained by ISPs);
  • 264
    • 79251620403 scopus 로고    scopus 로고
    • Solove, supra note 47, at 1287 discussing the expansion of information obtainable by the government resulting from the USA PATRIOT Act
    • Solove, supra note 47, at 1287 (discussing the expansion of information obtainable by the government resulting from the USA PATRIOT Act);
  • 265
    • 79251646152 scopus 로고    scopus 로고
    • The content/envelope distinction in internet law
    • 2114-15, discussing the right to privacy in Internet communications
    • Matthew J. Tokson, The Content/Envelope Distinction in Internet Law, 50 WM. & MARY L. REV. 2105, 2114-15 (2009) (discussing the right to privacy in Internet communications).
    • (2009) Wm. & Mary L. Rev. , vol.50 , pp. 2105
    • Tokson, M.J.1
  • 266
    • 79251639638 scopus 로고    scopus 로고
    • See Berger, at
    • See Berger, 388 U. S. at 64.
    • U. S. , vol.388 , pp. 64
  • 267
    • 79251642761 scopus 로고    scopus 로고
    • Id. at 54-55
    • Id. at 54-55.
  • 268
    • 79251645400 scopus 로고    scopus 로고
    • Id. at 56
    • Id. at 56
  • 269
    • 77955009625 scopus 로고
    • citing Osborn v. United States, 329
    • (citing Osborn v. United States, 385 U. S. 323, 329 n. 2 (1966)).
    • (1966) U. S. , vol.385 , Issue.2 , pp. 323
  • 270
    • 79251646390 scopus 로고    scopus 로고
    • Id
    • Id.
  • 271
    • 79251637555 scopus 로고    scopus 로고
    • Id. at 58 citations omitted
    • Id. at 58 (citations omitted).
  • 272
    • 79251624673 scopus 로고    scopus 로고
    • See id. at 58-59
    • See id. at 58-59.
  • 273
    • 79955411615 scopus 로고    scopus 로고
    • First principles of communications privacy
    • ¶ 12
    • Susan Freiwald, First Principles of Communications Privacy, 2007 STAN. TECH. L. REV. 3, ¶ 12, http://stlr.stanford.edu/pdf/freiwald-first- principles.pdf
    • (2007) Stan. Tech. L. Rev. , pp. 3
    • Freiwald, S.1
  • 274
    • 79251640394 scopus 로고    scopus 로고
    • See id. ¶ 9
    • See id. ¶ 9.
  • 275
    • 79251621465 scopus 로고    scopus 로고
    • See id. ¶¶ 51-56. Friewald cites seven silent video opinions from the Courts of Appeals
    • See id. ¶¶ 51-56. Friewald cites seven silent video opinions from the Courts of Appeals.
  • 276
    • 79251623616 scopus 로고    scopus 로고
    • Id. ¶ 10 n. 20
    • Id. ¶ 10 n. 20.
  • 277
    • 79251647587 scopus 로고    scopus 로고
    • Id. ¶ 10
    • Id. ¶ 10.
  • 278
    • 79251644915 scopus 로고    scopus 로고
    • See id
    • See id.
  • 279
    • 79251639900 scopus 로고    scopus 로고
    • See id. ¶ 72
    • See id. ¶ 72.
  • 280
    • 79251650165 scopus 로고    scopus 로고
    • See id. ¶ 54. She also would apply these requirements to real-time interception of e-mail and instant messaging and, perhaps, to surveillance of noncontent information as well
    • See id. ¶ 54. She also would apply these requirements to real-time interception of e-mail and instant messaging and, perhaps, to surveillance of noncontent information as well.
  • 281
    • 79251631482 scopus 로고    scopus 로고
    • See id. ¶ 73
    • See id. ¶ 73.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.