-
2
-
-
79251622242
-
-
U. S. Const. amend. IV provides: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized
-
U. S. Const. amend. IV provides: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
-
-
-
-
3
-
-
79251625977
-
-
See infra Part I. A
-
See infra Part I. A.
-
-
-
-
4
-
-
79251613812
-
-
See SLOBOGIN, supra note 1, at 30-45 arguing for a "proportionality principle" that adds justification standards to new situations
-
See SLOBOGIN, supra note 1, at 30-45 (arguing for a "proportionality principle" that adds justification standards to new situations).
-
-
-
-
5
-
-
33746202890
-
-
See Terry v. Ohio, 30, creating the reasonable suspicion standard for sidewalk stop-and-frisk encounters
-
See Terry v. Ohio, 392 U. S. 1, 30 (1968) (creating the reasonable suspicion standard for sidewalk stop-and-frisk encounters).
-
(1968)
U. S.
, vol.392
, pp. 1
-
-
-
6
-
-
70450226417
-
-
Pub. L. No. 99-508, codified as amended in scattered sections of 18 U. S. C.
-
Pub. L. No. 99-508, 100 Stat. 1848 (1986) (codified as amended in scattered sections of 18 U. S. C.).
-
(1986)
Stat.
, vol.100
, pp. 1848
-
-
-
7
-
-
79251631013
-
-
See, at, "There is 'no ready test for determining reasonableness other than by balancing the need to search or seize against the invasion which the search or seizure entails.'"
-
See Terry, 392 U. S. at 21 ("[T]here is 'no ready test for determining reasonableness other than by balancing the need to search [or seize] against the invasion which the search [or seizure] entails.'"
-
U. S.
, vol.392
, pp. 21
-
-
Terry1
-
8
-
-
84873913953
-
-
quoting Camara v. Mun. Court, 536-37
-
(quoting Camara v. Mun. Court, 387 U. S. 523, 536-37 (1967)));
-
(1967)
U. S.
, vol.387
, pp. 523
-
-
-
9
-
-
79251634478
-
-
SLOBOGIN, supra note 1, at 21 "A search or seizure is reasonable if the strength of its justification is roughly proportionate to the level of intrusion associated with the police action. "
-
SLOBOGIN, supra note 1, at 21 ("[A] search or seizure is reasonable if the strength of its justification is roughly proportionate to the level of intrusion associated with the police action. ").
-
-
-
-
10
-
-
77954985422
-
-
See New Jersey v. T. L. O., 346, "The requirement of reasonable suspicion is not a requirement of absolute certainty: 'sufficient probability, not certainty, is the touchstone of reasonableness under the Fourth Amendment....'"
-
See New Jersey v. T. L. O., 469 U. S. 325, 346 (1985) ("[T]he requirement of reasonable suspicion is not a requirement of absolute certainty: 'sufficient probability, not certainty, is the touchstone of reasonableness under the Fourth Amendment....'"
-
(1985)
U. S.
, vol.469
, pp. 325
-
-
-
11
-
-
84875148652
-
-
quoting Hill v. California, 804
-
(quoting Hill v. California, 401 U. S. 797, 804 (1971))).
-
(1971)
U. S.
, vol.401
, pp. 797
-
-
-
12
-
-
79251626120
-
-
See U. S. Const. amend. IV "No Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."
-
See U. S. Const. amend. IV ("[N]o Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.").
-
-
-
-
13
-
-
79251649909
-
-
Id. "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated...."
-
Id. ("The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated....").
-
-
-
-
14
-
-
79251605024
-
-
at, approving "carefully limited searches" for weapons "where a police officer observes unusual conduct which leads him reasonably to conclude in light of his experience that criminal activity may be afoot and that the persons with whom he is dealing may be armed and presently dangerous"
-
392 U. S. at 30 (approving "carefully limited search[es]" for weapons "where a police officer observes unusual conduct which leads him reasonably to conclude in light of his experience that criminal activity may be afoot and that the persons with whom he is dealing may be armed and presently dangerous").
-
U. S.
, vol.392
, pp. 30
-
-
-
15
-
-
79251647174
-
-
See id. at 27 "There must be a narrowly drawn authority to permit a reasonable search for weapons for the protection of the police officer, where he has reason to believe that he is dealing with an armed and dangerous individual, regardless of whether he has probable cause to arrest the individual...."
-
See id. at 27 ("[T]here must be a narrowly drawn authority to permit a reasonable search for weapons for the protection of the police officer, where he has reason to believe that he is dealing with an armed and dangerous individual, regardless of whether he has probable cause to arrest the individual....").
-
-
-
-
16
-
-
79251649908
-
-
Id
-
Id.
-
-
-
-
17
-
-
77954985422
-
-
See, e.g., New Jersey v. T. L. O., 341, "The accommodation of the privacy interests of schoolchildren with the substantial need of teachers and administrators for freedom to maintain order in the schools does not require strict adherence to the requirement that searches be based on probable cause...."
-
See, e.g., New Jersey v. T. L. O., 469 U. S. 325, 341 (1985) ("[T]he accommodation of the privacy interests of schoolchildren with the substantial need of teachers and administrators for freedom to maintain order in the schools does not require strict adherence to the requirement that searches be based on probable cause....").
-
(1985)
U. S.
, vol.469
, pp. 325
-
-
-
18
-
-
84873919103
-
-
See, e.g., O'Connor v. Ortega, 724, "In our view... a probable cause requirement for searches of the type at issue here would impose intolerable burdens on public employers."
-
See, e.g., O'Connor v. Ortega, 480 U. S. 709, 724 (1987) ("In our view... a probable cause requirement for searches of the type at issue here would impose intolerable burdens on public employers.").
-
(1987)
U. S.
, vol.480
, pp. 709
-
-
-
19
-
-
84884991357
-
-
See, e.g., Griffin v. Wisconsin, 875-76, "We think it clear that the special needs of Wisconsin's probation system... justify replacement of the standard of probable cause by 'reasonable grounds'...."
-
See, e.g., Griffin v. Wisconsin, 483 U. S. 868, 875-76 (1987) ("We think it clear that the special needs of Wisconsin's probation system... justify replacement of the standard of probable cause by 'reasonable grounds'....").
-
(1987)
U. S.
, vol.483
, pp. 868
-
-
-
20
-
-
84873909801
-
-
See, e.g., Nat'l Treasury Employees Union v. Von Raab, 666, "The Government's substantial interests in drug testing Customs agents... present a special need that may justify departure from the ordinary warrant and probable-cause requirements."
-
See, e.g., Nat'l Treasury Employees Union v. Von Raab, 489 U. S. 656, 666 (1989) ("[The Government's] substantial interests [in drug testing Customs agents]... present a special need that may justify departure from the ordinary warrant and probable-cause requirements.");
-
(1989)
U. S.
, vol.489
, pp. 656
-
-
-
21
-
-
84873935145
-
-
Skinner v. Ry. Labor Executives' Ass'n, 620, "The Government's interest in regulating the conduct of railroad employees to ensure safety... 'likewise presents special needs beyond normal law enforcement that may justify departures from the usual warrant and probable-cause requirements.'"
-
Skinner v. Ry. Labor Executives' Ass'n, 489 U. S. 602, 620 (1989) ("The Government's interest in regulating the conduct of railroad employees to ensure safety... 'likewise presents special needs beyond normal law enforcement that may justify departures from the usual warrant and probable-cause requirements.'"
-
(1989)
U. S.
, vol.489
, pp. 602
-
-
-
22
-
-
79251643207
-
-
quoting, at
-
(quoting Griffin, 483 U. S. at 873-74)).
-
U. S.
, vol.483
, pp. 873-874
-
-
Griffin1
-
23
-
-
33750242127
-
-
See United States v. R. Enters., Inc., 301, "Where... a subpoena is challenged on relevancy grounds, the motion to quash must be denied unless the district court determines that there is no reasonable possibility that the category of materials the Government seeks will produce information relevant to the general subject of the grand jury's investigation. "
-
See United States v. R. Enters., Inc., 498 U. S. 292, 301 (1991) ("[W]here... a subpoena is challenged on relevancy grounds, the motion to quash must be denied unless the district court determines that there is no reasonable possibility that the category of materials the Government seeks will produce information relevant to the general subject of the grand jury's investigation. ").
-
(1991)
U. S.
, vol.498
, pp. 292
-
-
-
24
-
-
84866706378
-
-
Oliver v. United States, 183-84, "In the case of open fields, the general rights of property protected by the common law of trespass have little or no relevance to the applicability of the Fourth Amendment."
-
Oliver v. United States, 466 U. S. 170, 183-84 (1984) ("[I]n the case of open fields, the general rights of property protected by the common law of trespass have little or no relevance to the applicability of the Fourth Amendment.").
-
(1984)
U. S.
, vol.466
, pp. 170
-
-
-
25
-
-
84978408683
-
-
See, e.g., Florida v. Riley, 450, "The police were... free to inspect the yard from the vantage point of an aircraft flying in the navigable airspace as this plane was."
-
See, e.g., Florida v. Riley, 488 U. S. 445, 450 (1989) ("[The police] were... free to inspect the yard from the vantage point of an aircraft flying in the navigable airspace as this plane was.");
-
(1989)
U. S.
, vol.488
, pp. 445
-
-
-
26
-
-
84873156660
-
-
California v. Ciraolo, 215, "In an age where private and commercial flight in the public airways is routine, it is unreasonable for respondent to expect that his marijuana plants were constitutionally protected from being observed with the naked eye from an altitude of 1, 000 feet."
-
California v. Ciraolo, 476 U. S. 207, 215 (1986) ("In an age where private and commercial flight in the public airways is routine, it is unreasonable for respondent to expect that his marijuana plants were constitutionally protected from being observed with the naked eye from an altitude of 1, 000 feet.");
-
(1986)
U. S.
, vol.476
, pp. 207
-
-
-
27
-
-
84873119031
-
-
Dow Chem. Co. v. United States, 239, "We hold that the taking of aerial photographs of an industrial plant complex from navigable airspace is not a search prohibited by the Fourth Amendment."
-
Dow Chem. Co. v. United States, 476 U. S. 227, 239 (1986) ("We hold that the taking of aerial photographs of an industrial plant complex from navigable airspace is not a search prohibited by the Fourth Amendment.").
-
(1986)
U. S.
, vol.476
, pp. 227
-
-
-
28
-
-
84880377569
-
-
See, e.g., California v. Greenwood, 40, "We conclude that respondents exposed their garbage to the public sufficiently to defeat their claim to Fourth Amendment protection. "
-
See, e.g., California v. Greenwood, 486 U. S. 35, 40 (1988) ("[W]e conclude that respondents exposed their garbage to the public sufficiently to defeat their claim to Fourth Amendment protection. ").
-
(1988)
U. S.
, vol.486
, pp. 35
-
-
-
29
-
-
78751647463
-
-
See, e.g., Smith v. Maryland, 745, "We... conclude that petitioner in all probability entertained no actual expectation of privacy in the phone numbers he dialed, and that, even if he did, his expectation was not 'legitimate.'". Phone number tracking is now regulated by statute
-
See, e.g., Smith v. Maryland, 442 U. S. 735, 745 (1979) ("We... conclude that petitioner in all probability entertained no actual expectation of privacy in the phone numbers he dialed, and that, even if he did, his expectation was not 'legitimate.'"). Phone number tracking is now regulated by statute.
-
(1979)
U. S.
, vol.442
, pp. 735
-
-
-
30
-
-
79251615850
-
-
See Pen Register and Trap and Trace Act, §§ 3121-3127
-
See Pen Register and Trap and Trace Act, 18 U. S. C. §§ 3121-3127 (2006).
-
(2006)
U. S. C.
, vol.18
-
-
-
31
-
-
77249131620
-
-
United States v. Miller, 445-46, holding that documents produced pursuant to subpoenas duces tecum directed against banks were not in violation of the Fourth Amendment
-
United States v. Miller, 425 U. S. 435, 445-46 (1976) (holding that documents produced pursuant to subpoenas duces tecum directed against banks were not in violation of the Fourth Amendment).
-
(1976)
U. S.
, vol.425
, pp. 435
-
-
-
32
-
-
79251647588
-
-
See, e.g., Smith, at, 745 concluding that the installation of a pen register-"a mechanical device that records the numbers dialed on a telephone"-does not constitute a "search" within the meaning of the Fourth Amendment
-
See, e.g., Smith, 442 U. S. at 736 n. 1, 745 (concluding that the installation of a pen register-"a mechanical device that records the numbers dialed on a telephone"-does not constitute a "search" within the meaning of the Fourth Amendment).
-
U. S.
, vol.442
, Issue.1
, pp. 736
-
-
-
33
-
-
70450226417
-
-
See, e.g., Electronic Communications Privacy Act of 1986, Pub. L. No. 99-508, codified as amended in scattered sections of 18 U. S. C.. governing government access to information transiting or stored on computer networks
-
See, e.g., Electronic Communications Privacy Act of 1986, Pub. L. No. 99-508, 100 Stat. 1848 (codified as amended in scattered sections of 18 U. S. C.). (governing government access to information transiting or stored on computer networks).
-
Stat.
, vol.100
, pp. 1848
-
-
-
34
-
-
79251626864
-
-
§ 2518 3, The Wiretap Act requires the police to meet a series of other obligations before conducting a court-ordered wiretap
-
18 U. S. C. § 2518 (3) (2006). The Wiretap Act requires the police to meet a series of other obligations before conducting a court-ordered wiretap.
-
(2006)
U. S. C.
, vol.18
-
-
-
35
-
-
79251601902
-
-
See id. § 2518 1
-
See id. § 2518 (1).
-
-
-
-
36
-
-
79251613431
-
-
§ 1805 a 3
-
50 U. S. C. § 1805 (a) (3) (2006).
-
(2006)
U. S. C.
, vol.50
-
-
-
37
-
-
79251629502
-
-
§§ 2701-2711
-
18 U. S. C. §§ 2701-2711.
-
U. S. C.
, vol.18
-
-
-
38
-
-
79251621982
-
-
Id. §§ 3121-3127
-
Id. §§ 3121-3127.
-
-
-
-
39
-
-
79251608747
-
-
See id. § 2703 describing the procedures a governmental entity must abide by to require the disclosure of a wire or electronic communication
-
See id. § 2703 (describing the procedures a governmental entity must abide by to require the disclosure of a wire or electronic communication).
-
-
-
-
40
-
-
79251612924
-
-
See id. § 2703 a
-
See id. § 2703 (a).
-
-
-
-
41
-
-
79251643444
-
-
See id. § 2703 b
-
See id. § 2703 (b).
-
-
-
-
42
-
-
79251629211
-
-
See id. § 2703 a. The text is arguably ambiguous about which e-mail messages receive this protected treatment, and the question is under debate in the courts
-
See id. § 2703 (a). The text is arguably ambiguous about which e-mail messages receive this protected treatment, and the question is under debate in the courts.
-
-
-
-
43
-
-
79251617997
-
-
See infra Part II. B.2
-
See infra Part II. B.2.
-
-
-
-
44
-
-
79251623359
-
-
See, § 2703 b 1 B
-
See 18 U. S. C. § 2703 (b) (1) (B);
-
U. S. C.
, vol.18
-
-
-
45
-
-
79251640889
-
-
see also In re Gimbel, 598 2d Cir
-
see also In re Gimbel, 77 F.3d 593, 598 (2d Cir. 1996)
-
(1996)
F.3d
, vol.77
, pp. 593
-
-
-
46
-
-
84873110268
-
-
extending the Supreme Court's holding in United States v. Morton Salt Co., 652, that administrative subpoenas for corporate records need only be "reasonably relevant" to individual financial records
-
(extending the Supreme Court's holding in United States v. Morton Salt Co., 338 U. S. 632, 652 (1950), that administrative subpoenas for corporate records need only be "reasonably relevant" to individual financial records).
-
(1950)
U. S.
, vol.338
, pp. 632
-
-
-
47
-
-
10844281812
-
A user's guide to the stored communications act, and a legislator's guide to amending it
-
See, e.g., 1219, discussing the "d-order" under § 2703 d
-
See, e.g., Orin S. Kerr, A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It, 72 GEO. WASH. L. REV. 1208, 1219 (2004) (discussing the "d-order" under § 2703 (d)).
-
(2004)
Geo. Wash. L. Rev.
, vol.72
, pp. 1208
-
-
Kerr, O.S.1
-
48
-
-
79251642494
-
-
§ 2703 d
-
18 U. S. C. § 2703 (d).
-
U. S. C.
, vol.18
-
-
-
49
-
-
33746202890
-
-
Terry v. Ohio, 21
-
Terry v. Ohio, 392 U. S. 1, 21 (1968).
-
(1968)
U. S.
, vol.392
, pp. 1
-
-
-
51
-
-
79251602430
-
-
See Kerr, supra note 35, at 1233-35 arguing the subpoena requirements should be dropped as "surprisingly low" in favor of a d-order requirement
-
See Kerr, supra note 35, at 1233-35 (arguing the subpoena requirements should be dropped as "surprisingly low" in favor of a d-order requirement).
-
-
-
-
52
-
-
70449836735
-
Transaction surveillance by the government
-
But see, 161-62, arguing that the d-order requires only relevance and materiality, both low standards under evidence law
-
But see Christopher Slobogin, Transaction Surveillance by the Government, 75 MISS. L. J. 139, 161-62 (2005) (arguing that the d-order requires only relevance and materiality, both low standards under evidence law).
-
(2005)
Miss. L. J.
, vol.75
, pp. 139
-
-
Slobogin, C.1
-
53
-
-
79251631972
-
-
§§ 3121-3127
-
18 U. S. C. §§ 3121-3127;
-
U. S. C.
, vol.18
-
-
-
54
-
-
79251607992
-
-
see also id. § 3127 defining "pen register" and "trap and trace device"
-
see also id. § 3127 (defining "pen register" and "trap and trace device").
-
-
-
-
55
-
-
79251612653
-
-
See id. § 3127 3
-
See id. § 3127 (3).
-
-
-
-
56
-
-
79251604481
-
-
Id. § 3123 a 1
-
Id. § 3123 (a) (1).
-
-
-
-
57
-
-
79251638321
-
-
Id. § 3122 b 2
-
Id. § 3122 (b) (2).
-
-
-
-
58
-
-
79251649652
-
-
See, e.g., United States v. Fregoso, 1320 8th Cir, "The judicial role in approving use of trap and trace devices is ministerial in nature."
-
See, e.g., United States v. Fregoso, 60 F.3d 1314, 1320 (8th Cir. 1995) ("The judicial role in approving use of trap and trace devices is ministerial in nature.").
-
(1995)
F.3d
, vol.60
, pp. 1314
-
-
-
59
-
-
79251623617
-
-
H. R. Rep. No. 103-827, at 31 1994
-
H. R. Rep. No. 103-827, at 31 (1994)
-
-
-
-
60
-
-
0347328534
-
-
reprinted in, 3511
-
reprinted in 1994 U. S. C. C. A. N. 3489, 3511.
-
(1994)
U. S. C. C. A. N.
, pp. 3489
-
-
-
61
-
-
79251634223
-
-
See infra Part II. C.1
-
See infra Part II. C.1.
-
-
-
-
62
-
-
10844289565
-
Surveillance law through cyberlaw's lens
-
See, e.g., 1436
-
See, e.g., Patricia L. Bellia, Surveillance Law Through Cyberlaw's Lens, 72 GEO. WASH. L. REV. 1375, 1436 (2004);
-
(2004)
Geo. Wash. L. Rev.
, vol.72
, pp. 1375
-
-
Bellia, P.L.1
-
63
-
-
10844224409
-
Reconstructing electronic surveillance law
-
1299
-
Daniel J. Solove, Reconstructing Electronic Surveillance Law, 72 GEO. WASH. L. REV. 1264, 1299 (2004).
-
(2004)
Geo. Wash. L. Rev.
, vol.72
, pp. 1264
-
-
Solove, D.J.1
-
64
-
-
79251648607
-
-
Solove, supra note 47
-
Solove, supra note 47.
-
-
-
-
65
-
-
79251612652
-
-
Bellia, supra note 47
-
Bellia, supra note 47.
-
-
-
-
66
-
-
10844255649
-
Reasonable expectations in electronic communications: A critical perspective on the electronic communications privacy act
-
1592
-
Deirdre K. Mulligan, Reasonable Expectations in Electronic Communications: A Critical Perspective on the Electronic Communications Privacy Act, 72 GEO. WASH. L. REV. 1557, 1592 (2004).
-
(2004)
Geo. Wash. L. Rev.
, vol.72
, pp. 1557
-
-
Mulligan, D.K.1
-
67
-
-
79251644247
-
-
See Kerr, supra note 35, at 1242 "I would give the current SCA a 'B.'"
-
See Kerr, supra note 35, at 1242 ("I would give the current SCA a 'B.'").
-
-
-
-
68
-
-
79251616949
-
-
Id. at 1233
-
Id. at 1233.
-
-
-
-
69
-
-
79251615589
-
-
Id. at 1234-35
-
Id. at 1234-35.
-
-
-
-
70
-
-
79251636225
-
-
Solove, supra note 47, at 1266
-
Solove, supra note 47, at 1266.
-
-
-
-
71
-
-
79251646391
-
-
Id. at 1299
-
Id. at 1299.
-
-
-
-
72
-
-
79251612138
-
-
See id
-
See id.
-
-
-
-
74
-
-
79251605794
-
-
See id. at 184
-
See id. at 184.
-
-
-
-
75
-
-
33646709688
-
-
See United and Strengthening America Act of 2001, S. 1510, § 214
-
See United and Strengthening America Act of 2001, S. 1510, 107th Cong. § 214 (2001);
-
(2001)
107Th Cong
-
-
-
76
-
-
10844280941
-
Seven weeks: The making of the USA PATRIOT act
-
1199, commenting on Senator Leahy's proposal to modify the Pen Register Act
-
Beryl A. Howell, Seven Weeks: The Making of the USA PATRIOT Act, 72 GEO. WASH. L. REV. 1145, 1199 (2004) (commenting on Senator Leahy's proposal to modify the Pen Register Act).
-
(2004)
Geo. Wash. L. Rev.
, vol.72
, pp. 1145
-
-
Howell, B.A.1
-
77
-
-
79251623093
-
-
Howell, supra note 59, at 1199
-
Howell, supra note 59, at 1199.
-
-
-
-
78
-
-
79251616102
-
-
Id
-
Id.
-
-
-
-
79
-
-
79251604747
-
-
See id
-
See id.
-
-
-
-
80
-
-
79251645162
-
-
See United States v. Perez, 741-42 5th Cir, holding that an IP address attached to an e-mail address is sufficient to establish probable cause
-
See United States v. Perez, 484 F.3d 735, 741-42 (5th Cir. 2007) (holding that an IP address attached to an e-mail address is sufficient to establish probable cause).
-
(2007)
F.3d
, vol.484
, pp. 735
-
-
-
81
-
-
0345444657
-
-
Warner Bros
-
THE FUGITIVE (Warner Bros. 1993).
-
(1993)
The Fugitive
-
-
-
82
-
-
79251606568
-
-
In Hollywood's imagination, hackers can always process screens full of text usually green-on-black scrolling by at a speed no human can process; government agency video specialists can turn the grainiest images into perfectly sharp video with a few clicks of the keyboard and they never use mice; and every network can be accessed through an elegant, three-dimensional, virtual reality interface
-
In Hollywood's imagination, hackers can always process screens full of text (usually green-on-black) scrolling by at a speed no human can process; government agency video specialists can turn the grainiest images into perfectly sharp video with a few clicks of the keyboard (and they never use mice); and every network can be accessed through an elegant, three-dimensional, virtual reality interface.
-
-
-
-
83
-
-
79251620404
-
What code DOESN'T do in real life (that it does in the movies)
-
See, June 12
-
See Matthew Inman, What Code DOESN'T Do in Real Life (That it Does in the Movies), DRIVL, June 12, 2006, http://web.archive.org/web/20070202190507/www. drivl.com/posts/view/494;
-
(2006)
Drivl
-
-
Inman, M.1
-
84
-
-
79251611150
-
Things hollywood thinks computers can do
-
CRACKED Staff, 5, Sept. 13, "#2: A Computer Might Become Self-Aware at any Moment."
-
CRACKED Staff, 5 Things Hollywood Thinks Computers Can Do, CRACKED, Sept. 13, 2007, http://www.cracked.com/article-15229-5-things-hollywood-thinks- computers-can-do.html ("#2: A Computer Might Become Self-Aware at any Moment.").
-
(2007)
Cracked
-
-
-
85
-
-
79251612650
-
The third party doctrine redux: Internet search records and the case for a "crazy quilt" of fourth amendment protection
-
Cf, discussing the changing procedures and practices of criminal investigations with the advancement of the Internet
-
Cf. Matthew D. Lawless, The Third Party Doctrine Redux: Internet Search Records and the Case for a "Crazy Quilt" of Fourth Amendment Protection, 2007 UCLA J. L. & TECH. 1 (discussing the changing procedures and practices of criminal investigations with the advancement of the Internet).
-
(2007)
UCLA J. L. & Tech.
, pp. 1
-
-
Lawless, M.D.1
-
86
-
-
79251608227
-
-
There are, of course, exceptions. Sometimes, the hacker is a disgruntled ex-employee, and death threats online often come from people who also know the victim in the real world. But local knowledge like this is much more likely to be irrelevant
-
There are, of course, exceptions. Sometimes, the hacker is a disgruntled ex-employee, and death threats online often come from people who also know the victim in the real world. But local knowledge like this is much more likely to be irrelevant.
-
-
-
-
87
-
-
33746202890
-
-
Terry v. Ohio, 5, testifying that "he had been assigned to patrol this vicinity of downtown Cleveland for shoplifters and pickpockets for thirty years"
-
Terry v. Ohio, 392 U. S. 1, 5 (1967) (testifying that "he had been assigned to patrol this vicinity of downtown Cleveland for shoplifters and pickpockets for [thirty] years").
-
(1967)
U. S.
, vol.392
, pp. 1
-
-
-
88
-
-
59349086361
-
The case for the third-party doctrine
-
See, 575, "Third-party internet services act as remote agents that permit wrongdoers to commit crimes entirely in private."
-
See Orin S. Kerr, The Case for the Third-Party Doctrine, 107 MICH. L. REV. 561, 575 (2009) ("[Third-party internet services] act as remote agents that permit wrongdoers to commit crimes entirely in private.").
-
(2009)
Mich. L. Rev.
, vol.107
, pp. 561
-
-
Kerr, O.S.1
-
89
-
-
79251606567
-
-
See, e.g., id. at 562 explaining that wrongdoers sometimes expose evidence through e-mail, "creating an important opportunity for criminal investigators"
-
See, e.g., id. at 562 (explaining that wrongdoers sometimes expose evidence through e-mail, "creat[ing] an important opportunity for criminal investigators").
-
-
-
-
90
-
-
84966528404
-
-
supra note 64
-
THE FUGITIVE, supra note 64.
-
The Fugitive
-
-
-
91
-
-
79251605793
-
-
Id
-
Id.
-
-
-
-
92
-
-
79251640888
-
-
Cf. Solove, supra note 47, at 1265 discussing the ease with which email messages and other electronic communications can be discovered
-
Cf. Solove, supra note 47, at 1265 (discussing the ease with which email messages and other electronic communications can be discovered).
-
-
-
-
93
-
-
79251625481
-
Investigators followed digital trail in pregnant woman's killing
-
For an example of this investigative process, see, Dec. 21
-
For an example of this investigative process, see Matthew Sedensky, Investigators Followed Digital Trail in Pregnant Woman's Killing, SEATTLE TIMES, Dec. 21, 2004, http://seattletimes.nwsource.com/html/nationworld/2002 125795-baby21.html.
-
(2004)
Seattle Times
-
-
Sedensky, M.1
-
94
-
-
79251604450
-
Federal agent raps ISPs over cybercrime
-
See, Jan. 25, recounting FBI official's complaint about how American ISPs respond slowly to requests from UK law enforcement
-
See Will Sturgeon, Federal Agent Raps ISPs Over Cybercrime, CNET NEWS. COM, Jan. 25, 2005, http://news.cnet.com/Federal-agent-raps-ISPs-over- cybercrime/2100-7348-3-5549723.html (recounting FBI official's complaint about how American ISPs respond slowly to requests from UK law enforcement).
-
(2005)
Cnet News. Com.
-
-
Sturgeon, W.1
-
95
-
-
42349108508
-
Data mining and internet profiling: Emerging regulatory and technological approaches
-
See, 274-76, discussing how technologies that conceal user identities can "hinder law enforcement"
-
See Ira S. Rubinstein et al., Data Mining and Internet Profiling: Emerging Regulatory and Technological Approaches, 75 U. CHI. L. REV. 261, 274-76 (2008) (discussing how technologies that conceal user identities can "hinder law enforcement").
-
(2008)
U. Chi. L. Rev.
, vol.75
, pp. 261
-
-
Rubinstein, I.S.1
-
96
-
-
79251610526
-
-
See id. at 274-75 explaining various techniques criminals can use to evade tracking of their Internet use
-
See id. at 274-75 (explaining various techniques criminals can use to evade tracking of their Internet use).
-
-
-
-
97
-
-
79251612651
-
-
To get a bit more technical about things, at the transport layer, Internet Service Providers use routing protocols that adapt to outages and congestion by pushing data along better routes. E.g., TCP/IP 115 4th ed, Perhaps the most important routing protocol is the Border Gateway Protocol, or BGP
-
To get a bit more technical about things, at the transport layer, Internet Service Providers use routing protocols that adapt to outages and congestion by pushing data along better routes. E.g., 1 DOUGLAS E. COMER, INTERNETWORKING WITH TCP/IP 115 (4th ed. 2000). Perhaps the most important routing protocol is the Border Gateway Protocol, or BGP.
-
(2000)
Douglas E. Comer, Internetworking With
, vol.1
-
-
-
98
-
-
33745634736
-
-
See generally, BGP-4, providing an in-depth discussion of the purpose and uses of BGP-4
-
See generally THE INTERNET SOCIETY, A BORDER GATEWAY PROTOCOL 4 (BGP-4) (2006), http://www.tools.ietf.org/pdf/rfc4271 (providing an in-depth discussion of the purpose and uses of BGP-4).
-
(2006)
The Internet Society, A Border Gateway Protocol
, pp. 4
-
-
-
99
-
-
0346449708
-
Criminal law in cyberspace
-
In an early and influential article on computer crime, Neal Katyal placed far too much emphasis on how packets and shifting Internet routes hinder law enforcement, 1072, "Unlike a criminal who needs to escape down a particular road, a criminal in cyberspace could be on any road, and these roads are not linked together in any meaningful fashion. ". Katyal errs because he focuses too much on the shifting nature at the packet layer, even though almost all criminal investigation online occurs at higher layers
-
In an early and influential article on computer crime, Neal Katyal placed far too much emphasis on how packets and shifting Internet routes hinder law enforcement. Neal Kumar Katyal, Criminal Law in Cyberspace, 149 U. PA. L. REV. 1003, 1072 (2001) ("Unlike a criminal who needs to escape down a particular road, a criminal in cyberspace could be on any road, and these roads are not linked together in any meaningful fashion. "). Katyal errs because he focuses too much on the shifting nature at the packet layer, even though almost all criminal investigation online occurs at higher layers.
-
(2001)
U. Pa. L. Rev.
, vol.149
, pp. 1003
-
-
Katyal, N.K.1
-
100
-
-
79251647176
-
-
See id
-
See id.
-
-
-
-
101
-
-
79251644916
-
-
While Point A's importance stems from clues it provides about the wrongdoer, electronic routes can bear on criminal cases in other ways, such as satisfying jurisdictional requirements
-
While Point A's importance stems from clues it provides about the wrongdoer, electronic routes can bear on criminal cases in other ways, such as satisfying jurisdictional requirements.
-
-
-
-
102
-
-
0348004157
-
-
See United States v. Kammersell, 1139 10th Cir, holding that an electronic bomb threat sent and received in Utah nevertheless satisfied an interstate commerce requirement because the message passed through a server in Virginia
-
See United States v. Kammersell, 196 F.3d 1137, 1139 (10th Cir. 1999) (holding that an electronic bomb threat sent and received in Utah nevertheless satisfied an interstate commerce requirement because the message passed through a server in Virginia).
-
(1999)
F.3d
, vol.196
, pp. 1137
-
-
-
103
-
-
79251610270
-
-
E.g., Freedman v. Am. Online, Inc., 179-80 D. Conn, describing how police requested user information from an Internet service provider following an electronic threat, but did not inquire as to the route it traveled
-
E.g., Freedman v. Am. Online, Inc., 412 F. Supp. 2d 174, 179-80 (D. Conn. 2005) (describing how police requested user information from an Internet service provider following an electronic threat, but did not inquire as to the route it traveled).
-
(2005)
F. Supp. 2d
, vol.412
, pp. 174
-
-
-
104
-
-
38949134150
-
-
See, discussing the evolution of Internet intermediaries
-
See JACK GOLDSMITH & TIM WU, WHO CONTROLS THE INTERNET? 70 (2006) (discussing the evolution of Internet intermediaries).
-
(2006)
Who Controls the Internet?
, pp. 70
-
-
Goldsmith, J.1
Wu, T.2
-
105
-
-
79251634718
-
-
See id. at 70-71 noting the pervasiveness of intermediaries
-
See id. at 70-71 (noting the pervasiveness of intermediaries).
-
-
-
-
106
-
-
79251625726
-
-
See id. at 70 calling ISPs, search engines, browsers, the physical network, and financial intermediaries the most important intermediaries
-
See id. at 70 (calling ISPs, search engines, browsers, the physical network, and financial intermediaries the most important intermediaries).
-
-
-
-
107
-
-
79251617737
-
-
E.g., Freedman, at, discussing how police relied on an ISP's records
-
E.g., Freedman, 412 F. Supp. 2d at 180 (discussing how police relied on an ISP's records).
-
F. Supp. 2d
, vol.412
, pp. 180
-
-
-
108
-
-
11344274494
-
-
Cf, 6 providing an exception to the hearsay rule for business records
-
Cf. FED. R. EVID. 803 (6) (providing an exception to the hearsay rule for business records).
-
Fed. R. Evid
, pp. 803
-
-
-
109
-
-
51849158053
-
What is web 2.0?
-
See generally, Sept. 30, recounting a brainstorming session that produced the phrase "Web 2.0"
-
See generally Tim O'Reilly, What is Web 2.0?, O'REILLY, Sept. 30, 2005, http://oreilly.com/web2/archive/what-is-web-20.html (recounting a brainstorming session that produced the phrase "Web 2.0").
-
(2005)
O'Reilly
-
-
O'Reilly, T.1
-
110
-
-
77954014042
-
The internet industry is on a cloud-whatever that may mean
-
See, Mar. 26, at, discussing the meaning of the phrase "cloud computing"
-
See Geoffrey A. Fowler & Ben Worthen, The Internet Industry Is on a Cloud-Whatever That May Mean, WALL ST. J., Mar. 26, 2009, at A1 (discussing the meaning of the phrase "cloud computing").
-
(2009)
Wall St. J.
-
-
Fowler, G.A.1
Worthen, B.2
-
111
-
-
79251603930
-
-
Google Docs, last visited Apr. 12, 2010
-
Google Docs, http://docs.google.com (last visited Apr. 12, 2010).
-
-
-
-
112
-
-
79251615847
-
-
Google Calendar, last visited Apr. 12, 2010
-
Google Calendar, http://calendar.google.com (last visited Apr. 12, 2010).
-
-
-
-
113
-
-
79251603409
-
-
Amazon EC2, last visited Apr. 12, 2010
-
Amazon EC2, http://aws.amazon. com/ec2 (last visited Apr. 12, 2010).
-
-
-
-
114
-
-
79251607994
-
-
See Slobogin, supra note 39, at 140 discussing various kinds of online surveillance
-
See Slobogin, supra note 39, at 140 (discussing various kinds of online surveillance).
-
-
-
-
115
-
-
79251631248
-
-
See id. at 145-47 "In short, even if you stay home and conduct all your business and social life via phone, e-mail and surfing the 'Net, law enforcement can construct what one commentator has called 'a complete mosaic' of your characteristics."
-
See id. at 145-47 ("In short, even if you stay home and conduct all your business and social life via phone, e-mail and surfing the 'Net, [law enforcement] can construct what one commentator has called 'a complete mosaic' of your characteristics.").
-
-
-
-
116
-
-
70450253119
-
The rise and fall of invasive ISP surveillance
-
See, 1462-66, discussing reasons why Internet providers monitor customers
-
See Paul Ohm, The Rise and Fall of Invasive ISP Surveillance, 2009 U. ILL. L. REV. 1417, 1462-66 (discussing reasons why Internet providers monitor customers).
-
U. Ill. L. Rev.
, vol.2009
, pp. 1417
-
-
Ohm, P.1
-
117
-
-
79251604748
-
-
Id. at 1433-34
-
Id. at 1433-34.
-
-
-
-
118
-
-
79251650167
-
-
See, e.g., id. at 1474-77 describing why web-host customers consent to be monitored by online service providers
-
See, e.g., id. at 1474-77 (describing why web-host customers consent to be monitored by online service providers).
-
-
-
-
119
-
-
79251618507
-
-
See Slobogin, supra note 39, at 149 "Given the potential that Internet surveillance provides the government for... linking people to crime, it could well be even more useful than visual tracking of a person's activities... and eavesdropping on or hacking into a person's communications...."
-
See Slobogin, supra note 39, at 149 ("Given the potential that [Internet] surveillance provides the government for... linking people to crime, it could well be even more useful than visual tracking of [a] person's activities... and eavesdropping on or hacking into a person's communications....").
-
-
-
-
120
-
-
59549106426
-
Whose eyes are you going to believe?
-
E.g., Scott v. Harris and the Perils of Cognitive Illiberalism, 838-40, describing the Supreme Court Justices' varied impressions upon viewing the same videotape
-
E.g., Dan M. Kahan et al., Whose Eyes Are You Going To Believe? Scott v. Harris and the Perils of Cognitive Illiberalism, 122 HARV. L. REV. 837, 838-40 (2009) (describing the Supreme Court Justices' varied impressions upon viewing the same videotape).
-
(2009)
Harv. L. Rev.
, vol.122
, pp. 837
-
-
Kahan, D.M.1
-
121
-
-
31344460918
-
-
explaining how to interpret web server logfiles
-
ERIC T. PETERSON, WEB SITE MEASUREMENT HACKS 79-83 (2005) (explaining how to interpret web server logfiles).
-
(2005)
Web Site Measurement Hacks
, pp. 79-83
-
-
Peterson, E.T.1
-
122
-
-
79251624675
-
-
See Slobogin, supra note 39, at 149 arguing that online electronic surveillance is useful because it provides more precise identifying information than physical evidence
-
See Slobogin, supra note 39, at 149 (arguing that online electronic surveillance is useful because it provides more precise identifying information than physical evidence).
-
-
-
-
123
-
-
79251639404
-
-
See Rubinstein et al., supra note 76, at 270-74 using cookies as an example of how precise personal information is collected online
-
See Rubinstein et al., supra note 76, at 270-74 (using cookies as an example of how precise personal information is collected online).
-
-
-
-
124
-
-
79251621719
-
-
E.g., id. at 272-73 explaining that the programs capture the "aggregate results of every search ever entered, every result list ever tendered, and every path taken as a result"
-
E.g., id. at 272-73 (explaining that the programs capture the "aggregate results of every search ever entered, every result list ever tendered, and every path taken as a result").
-
-
-
-
125
-
-
79251620681
-
-
See id. quoting the CEO of Google as stating that the future of Google depends on its ability to collect and use personal data
-
See id. (quoting the CEO of Google as stating that the future of Google depends on its ability to collect and use personal data).
-
-
-
-
126
-
-
79251634719
-
-
See id. "Taken together, this information represents a massive clickstream database.... that can be subpoenaed and used against litigants...."
-
See id. ("Taken together, this information represents a massive clickstream database.... [that] can be subpoenaed and used against litigants....").
-
-
-
-
127
-
-
79251610270
-
-
E.g., Freedman v. Am. Online, Inc., 181-84 D. Conn, holding that law enforcement's discovery of online information was valid not under a theory of probable cause, but because plaintiff lacked a reasonable expectation of privacy
-
E.g., Freedman v. Am. Online, Inc., 412 F. Supp. 2d 174, 181-84 (D. Conn. 2005) (holding that law enforcement's discovery of online information was valid not under a theory of probable cause, but because plaintiff lacked a reasonable expectation of privacy).
-
(2005)
F. Supp. 2d
, vol.412
, pp. 174
-
-
-
128
-
-
84873927736
-
-
Theofel v. Farey-Jones, 1073-78 9th Cir
-
Theofel v. Farey-Jones, 359 F.3d 1066, 1073-78 (9th Cir. 2004).
-
(2004)
F.3d
, vol.359
, pp. 1066
-
-
-
129
-
-
79251642982
-
-
§ 2703 b, authorizing compelled disclosure of contents originally maintained solely for purposes of "storage or computer processing" with subpoena or court order
-
18 U. S. C. § 2703 (b) (2006) (authorizing compelled disclosure of contents originally maintained solely for purposes of "storage or computer processing" with subpoena or court order).
-
(2006)
U. S. C.
, vol.18
-
-
-
130
-
-
79251607380
-
-
Id. § 2708
-
Id. § 2708.
-
-
-
-
131
-
-
73049107349
-
-
United States v. Kennedy, 1109-10 D. Kan
-
United States v. Kennedy, 81 F. Supp. 2d 1103, 1109-10 (D. Kan. 2000).
-
(2000)
F. Supp. 2d
, vol.81
, pp. 1103
-
-
-
132
-
-
79251646671
-
-
The defendant had inadvertently configured his computer to share his files with others on the Internet, and two technicians from his ISP found what they thought was child pornography in the files. Id. at 1106-09 describing the evidence obtained by police. They delivered these files to the FBI, prompting the application for the d-order
-
The defendant had inadvertently configured his computer to share his files with others on the Internet, and two technicians from his ISP found what they thought was child pornography in the files. Id. at 1106-09 (describing the evidence obtained by police). They delivered these files to the FBI, prompting the application for the d-order.
-
-
-
-
133
-
-
79251649165
-
-
Id
-
Id.
-
-
-
-
134
-
-
79251637808
-
-
Freedman v. Am. Online, Inc., 126-27 D. Conn, holding defendants liable irrespective of whether they "required" or "requested" information from the ISP
-
Freedman v. Am. Online, Inc., 303 F. Supp. 2d 121, 126-27 (D. Conn. 2004) (holding defendants liable irrespective of whether they "required" or "requested" information from the ISP).
-
(2004)
F. Supp. 2d
, vol.303
, pp. 121
-
-
-
135
-
-
79251610270
-
-
The court described the facts in greater detail in a later opinion. Freedman v. Am. Online, Inc., 179-80 D. Conn, describing an e-mail message sent under the screen name "GoMaryGoAway" stating that "The End is Near" in a case arising out of a local political race
-
The court described the facts in greater detail in a later opinion. Freedman v. Am. Online, Inc., 412 F. Supp. 2d 174, 179-80 (D. Conn. 2005) (describing an e-mail message sent under the screen name " GoMaryGoAway" stating that "The End is Near" in a case arising out of a local political race).
-
(2005)
F. Supp. 2d
, vol.412
, pp. 174
-
-
-
136
-
-
84880933161
-
-
Warshak v. United States, 6th Cir
-
Warshak v. United States, 490 F.3d 455 (6th Cir. 2007)
-
(2007)
F.3d
, vol.490
, pp. 455
-
-
-
137
-
-
84865150370
-
-
vacated en banc, 6th Cir
-
vacated en banc, 532 F.3d 521 (6th Cir. 2008).
-
(2008)
F.3d
, vol.532
, pp. 521
-
-
-
138
-
-
79251632648
-
-
Id. at 460
-
Id. at 460.
-
-
-
-
139
-
-
84865150370
-
-
Warshak v. United States, 523 6th Cir, en banc
-
Warshak v. United States, 532 F.3d 521, 523 (6th Cir. 2008) (en banc).
-
(2008)
F.3d
, vol.532
, pp. 521
-
-
-
140
-
-
79251606307
-
-
See Press Release, Fed. Trade Comm'n, FTC Charges Sellers of Avlimil, Rogisen, and Other Dietary Supplements Feb. 2, 2006, available at, describing FTC action against same defendant
-
See Press Release, Fed. Trade Comm'n, FTC Charges Sellers of Avlimil, Rogisen, and Other Dietary Supplements (Feb. 2, 2006), available at http://www.ftc.gov/opa/2006/02/avlimil.shtm (describing FTC action against same defendant).
-
-
-
-
141
-
-
79251636495
-
-
E.g., Brief of Amici Curiae Elec. Frontier Found. et al. Supporting the Appellant and Urging Acquittal or Order for New Trial at 4-14
-
E.g., Brief of Amici Curiae Elec. Frontier Found. et al. Supporting the Appellant and Urging Acquittal or Order for New Trial at 4-14
-
-
-
-
142
-
-
79251648878
-
-
Warshak v. United States, No. 08-4085 6th Cir. June 10, 2009 framing arguments against the government in the context of reasonableness instead of probable cause
-
Warshak v. United States, No. 08-4085 (6th Cir. June 10, 2009) (framing arguments against the government in the context of reasonableness instead of probable cause).
-
-
-
-
143
-
-
79251641986
-
-
§ 1030
-
18 U. S. C. § 1030 (2006).
-
(2006)
U. S. C.
, vol.18
-
-
-
144
-
-
79251616638
-
-
Id. §§ 2252-2252A
-
Id. §§ 2252-2252A.
-
-
-
-
145
-
-
79251619540
-
-
KERR, supra note 38
-
KERR, supra note 38.
-
-
-
-
146
-
-
85026668949
-
-
E.g., United States v. Gourde, 1077-79 9th Cir, en banc Kleinfeld, J., dissenting arguing that the government's search of a home computer lacked probable cause because it was based only on defendant's paid membership to a child pornography website
-
E.g., United States v. Gourde, 440 F.3d 1065, 1077-79 (9th Cir. 2006) (en banc) (Kleinfeld, J., dissenting) (arguing that the government's search of a home computer lacked probable cause because it was based only on defendant's paid membership to a child pornography website);
-
(2006)
F.3d
, vol.440
, pp. 1065
-
-
-
147
-
-
84455165222
-
-
United States v. Adjani, 1143 9th Cir, holding that the government had probable cause to search a home computer, and reversing the district court's order to suppress
-
United States v. Adjani, 452 F.3d 1140, 1143 (9th Cir. 2006) (holding that the government had probable cause to search a home computer, and reversing the district court's order to suppress);
-
(2006)
F.3d
, vol.452
, pp. 1140
-
-
-
148
-
-
84964774111
-
-
cf. United States v. Riccardi, 861-63 10th Cir, finding a search of a home computer violated the Fourth Amendment's particularity requirement
-
cf. United States v. Riccardi, 405 F.3d 852, 861-63 (10th Cir. 2005) (finding a search of a home computer violated the Fourth Amendment's particularity requirement).
-
(2005)
F.3d
, vol.405
, pp. 852
-
-
-
149
-
-
79251608746
-
-
Both a research assistant and I reviewed the factual description of the investigation from the full court opinion for every CFAA and child pornography case described in Professor Kerr's casebook
-
Both a research assistant and I reviewed the factual description of the investigation from the full court opinion for every CFAA and child pornography case described in Professor Kerr's casebook.
-
-
-
-
150
-
-
79251603681
-
-
KERR, supra note 38, at 74-83, 211-49. I concluded that none seemed close to lacking in probable cause. See Research Summary Chart Prepared by Paul Ohm, Professor, Univ. of Colorado Law School on file with author
-
KERR, supra note 38, at 74-83, 211-49. I concluded that none seemed close to lacking in probable cause. See Research Summary Chart Prepared by Paul Ohm, Professor, Univ. of Colorado Law School (on file with author).
-
-
-
-
151
-
-
84873927736
-
-
9th Cir
-
359 F.3d 1066 (9th Cir. 2004).
-
(2004)
F.3d
, vol.359
, pp. 1066
-
-
-
152
-
-
79251611668
-
-
Specifically, under the DOJ's interpretation, when a user opened a piece of e-mail and then left it on the e-mail provider's server, it no longer qualified as in "electronic storage", an important SCA term of art. COMPUTER CRIME & INTELLECTUAL PROP. SECTION, DEP'T OF JUSTICE, SEARCHING AND SEIZING COMPUTERS AND OBTAINING ELECTRONIC EVIDENCE IN CRIMINAL INVESTIGATIONS 122-27 3d ed. 2009 hereinafter CCIPS SEARCH-AND-SEIZURE MANUAL, available at, defining "electronic storage". Importantly, e-mail stored but not in electronic storage could be accessed by a d-order or subpoena
-
Specifically, under the DOJ's interpretation, when a user opened a piece of e-mail and then left it on the e-mail provider's server, it no longer qualified as in "electronic storage", an important SCA term of art. COMPUTER CRIME & INTELLECTUAL PROP. SECTION, DEP'T OF JUSTICE, SEARCHING AND SEIZING COMPUTERS AND OBTAINING ELECTRONIC EVIDENCE IN CRIMINAL INVESTIGATIONS 122-27 (3d ed. 2009) [hereinafter CCIPS SEARCH-AND-SEIZURE MANUAL], available at http://www.cybercrime.gov/ssmanual/ssmanual2009.pdf (defining "electronic storage"). Importantly, e-mail stored but not in electronic storage could be accessed by a d-order or subpoena.
-
-
-
-
153
-
-
79251604480
-
-
Id. at 127-34 outlining the government's means of compelling disclosure
-
Id. at 127-34 (outlining the government's means of compelling disclosure).
-
-
-
-
154
-
-
79251629212
-
-
Id
-
Id.
-
-
-
-
155
-
-
79251601645
-
-
See, e.g., id. including specific cases in its discussion of compelling disclosure with less than probable cause
-
See, e.g., id. (including specific cases in its discussion of compelling disclosure with less than probable cause).
-
-
-
-
156
-
-
79251639101
-
-
The case involved a civil suit about a discovery request for e-mail in a prior litigation gone very bad, at, It was probably not until the Justice Department filed an amicus brief urging reconsideration that the panel realized that it was upsetting years of criminal law investigation practice
-
The case involved a civil suit about a discovery request for e-mail in a prior litigation gone very bad. Theofel, 359 F.3d at 1071-72. It was probably not until the Justice Department filed an amicus brief urging reconsideration that the panel realized that it was upsetting years of criminal law investigation practice.
-
F.3d
, vol.359
, pp. 1071-1072
-
-
Theofel1
-
157
-
-
79251650164
-
-
Id. at 1076. But even faced with the import of its decision, the panel did not waver, amending its opinion to reject the government's arguments in detail and reassuring the government that it did "not lightly conclude that the government's reading is erroneous."
-
Id. at 1076. But even faced with the import of its decision, the panel did not waver, amending its opinion to reject the government's arguments in detail and reassuring the government that it did "not lightly conclude that the government's reading is erroneous."
-
-
-
-
158
-
-
79251618506
-
-
Id. at 1077
-
Id. at 1077.
-
-
-
-
159
-
-
79251613188
-
-
In response to the DOJ's argument that Theofel would read out the part of the statute which allowed d-order and subpoena requests, Judge Kozinski explained that ISPs that provide only "storage or computer processing services" would still be amenable to process under the provision
-
In response to the DOJ's argument that Theofel would read out the part of the statute which allowed d-order and subpoena requests, Judge Kozinski explained that ISPs that provide only "storage or computer processing services" would still be amenable to process under the provision.
-
-
-
-
160
-
-
79251619539
-
-
Id. at 1076-77
-
Id. at 1076-77.
-
-
-
-
161
-
-
79251625974
-
-
See CCIPS SEARCH-AND-SEIZURE MANUAL, supra note 124, at 123-25, discussing the effect of Theofel from the DOJ's perspective
-
See CCIPS SEARCH-AND-SEIZURE MANUAL, supra note 124, at 123-25 (discussing the effect of Theofel from the DOJ's perspective).
-
-
-
-
162
-
-
79251630521
-
-
*, D. Minn. Dec. 14, 2001
-
* 3 (D. Minn. Dec. 14, 2001)
-
(2001)
WL 1690055
, pp. 3
-
-
-
163
-
-
79251607756
-
-
rev'd, 8th Cir
-
rev'd, 310 F.3d 1063 (8th Cir. 2002).
-
(2002)
F.3d
, vol.310
, pp. 1063
-
-
-
164
-
-
79251618505
-
-
21st Century Department of Justice Appropriations Authorization Act, Pub. L. 107-273, § 11010, 1822
-
21st Century Department of Justice Appropriations Authorization Act, Pub. L. 107-273, § 11010, 116 Stat. 1812, 1822 (2002)
-
(2002)
Stat.
, vol.116
, pp. 1812
-
-
-
165
-
-
79251645657
-
-
codified as amended at, § 2703 g
-
(codified as amended at 18 U. S. C. § 2703 (g) (2006)).
-
(2006)
U. S. C.
, vol.18
-
-
-
166
-
-
72449193798
-
-
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism USA PATRIOT Act of 2001, Pub. L. 107-56, § 220, 291
-
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, Pub. L. 107-56, § 220, 115 Stat. 272, 291
-
Stat.
, vol.115
, pp. 272
-
-
-
167
-
-
79251615591
-
-
codified as amended at, § § 2703, 2711, 3127
-
(codified as amended at 18 U. S. C. § § 2703, 2711, 3127 (2006)).
-
(2006)
U. S. C.
, vol.18
-
-
-
168
-
-
85025621497
-
-
E.g., United States v. Smith, 1059 9th Cir, allowing suppression of voice mail under the Wiretap Act
-
E.g., United States v. Smith, 155 F.3d 1051, 1059 (9th Cir. 1998) (allowing suppression of voice mail under the Wiretap Act).
-
(1998)
F.3d
, vol.155
, pp. 1051
-
-
-
169
-
-
79251601900
-
-
USA PATRIOT Act § 209
-
USA PATRIOT Act § 209.
-
-
-
-
170
-
-
79251634985
-
-
E.g., Fighting Cyber Crime: Hearing Before the Subcomm. on Crime of the H. Comm. on the Judiciary, 107th Cong. 41-48 2001 statement of Associate Att'y Gen. Michael Chertoff mentioning problems with the Pen Register Act and the Cable Act
-
E.g., Fighting Cyber Crime: Hearing Before the Subcomm. on Crime of the H. Comm. on the Judiciary, 107th Cong. 41-48 (2001) (statement of Associate Att'y Gen. Michael Chertoff) (mentioning problems with the Pen Register Act and the Cable Act);
-
-
-
-
171
-
-
79251604477
-
-
Fourth Amendment and the Internet: Hearing Before the Subcomm. on the Constitution of the H. Comm. on the Judiciary, 106th Cong. 4-20 2000 statement of Deputy Assistant Att'y Gen. Kevin V. di Gregory asking for changes to ECPA
-
Fourth Amendment and the Internet: Hearing Before the Subcomm. on the Constitution of the H. Comm. on the Judiciary, 106th Cong. 4-20 (2000) (statement of Deputy Assistant Att'y Gen. Kevin V. di Gregory) (asking for changes to ECPA).
-
-
-
-
172
-
-
79251625976
-
-
United States Court of Appeals for the Ninth Circuit, Map of the Ninth Circuit, last visited Apr. 12, 2010
-
United States Court of Appeals for the Ninth Circuit, Map of the Ninth Circuit, http://www.ca9.uscourts.gov/content/view.php?pk-id=0000000135 (last visited Apr. 12, 2010).
-
-
-
-
174
-
-
79251638581
-
-
CCIPS Search-and-seizure Manual, supra note 124, at 123-25
-
CCIPS Search-and-seizure Manual, supra note 124, at 123-25.
-
-
-
-
175
-
-
79251636496
-
-
CCIPS PROSECUTING COMPUTER CRIMES, supra note 137, at 81. I worked for the Computer Crime and Intellectual Property Section when Theofel was decided. This discussion, however, rests only on the public record and my personal interpretations of events
-
CCIPS PROSECUTING COMPUTER CRIMES, supra note 137, at 81. I worked for the Computer Crime and Intellectual Property Section when Theofel was decided. This discussion, however, rests only on the public record and my personal interpretations of events.
-
-
-
-
176
-
-
79251640648
-
-
CCIPS SEARCH-AND-SEIZURE MANUAL, supra note 124, at 125 "Prosecutors within the Ninth Circuit are bound by Theofel...."
-
CCIPS SEARCH-AND-SEIZURE MANUAL, supra note 124, at 125 ("[P]rosecutors within the Ninth Circuit are bound by Theofel....").
-
-
-
-
177
-
-
84873927736
-
-
See, e.g., Theofel v. Farey-Jones, 1067-77 9th Cir, discussing the government's arguments aimed at maintaining lower justification standards
-
See, e.g., Theofel v. Farey-Jones, 359 F.3d 1066, 1067-77 (9th Cir. 2004) (discussing the government's arguments aimed at maintaining lower justification standards).
-
(2004)
F.3d
, vol.359
, pp. 1066
-
-
-
178
-
-
79251634477
-
-
Posting of Nicole Wong, Associate General Counsel, Google, Inc., to Official Google Blog, Feb. 17, 2006, 15:55 PST asserting that the government requested "untold millions of search queries" which would "do nothing to further the Government's case in the underlying action"
-
Posting of Nicole Wong, Associate General Counsel, Google, Inc., to Official Google Blog, http://googleblog.blogspot.com/2006/02/response-to-doj- motion.html (Feb. 17, 2006, 15:55 PST) (asserting that the government requested "untold millions of search queries" which would "do nothing to further the Government's case in the underlying action").
-
-
-
-
179
-
-
79251623360
-
-
§ 231
-
47 U. S. C. § 231 (2006).
-
(2006)
U. S. C.
, vol.47
-
-
-
180
-
-
79251648876
-
Google faces order to give up records
-
See, Mar. 15, at, discussing the government's requests of major search engine companies in an effort to defend the COPA
-
See Hiawatha Bray, Google Faces Order To Give Up Records, BOSTON GLOBE, Mar. 15, 2006, at E1 (discussing the government's requests of major search engine companies in an effort to defend the COPA).
-
(2006)
Boston Globe
-
-
Bray, H.1
-
181
-
-
70049101679
-
Google resists U. S. subpoena of search data
-
See, Jan. 20, at, discussing the motion to compel
-
See Katie Hafner & Matt Richtel, Google Resists U. S. Subpoena of Search Data, N. Y. TIMES, Jan. 20, 2006, at A1 (discussing the motion to compel).
-
(2006)
N. Y. Times
-
-
Hafner, K.1
Richtel, M.2
-
182
-
-
79251635488
-
-
See, e.g., Posting of Nicole Wong, supra note 141 responding to the government's motion to compel
-
See, e.g., Posting of Nicole Wong, supra note 141 (responding to the government's motion to compel).
-
-
-
-
183
-
-
79251645161
-
-
See Hafner & Richtel, supra note 144 "The government is trying to establish a profile of Internet use that will help it defend the Child Online Protection Act...."
-
See Hafner & Richtel, supra note 144 ("[The government] is trying to establish a profile of Internet use that will help it defend the Child Online Protection Act....").
-
-
-
-
184
-
-
84986253267
-
Google must divulge data
-
See, Mar. 18, at, "The 21-page opinion by Judge James Ware... puts to bed a high-profile legal battle between the most popular search engine and the Department of Justice...."
-
See Verne Kopytoff, Google Must Divulge Data, S. F. CHRON., Mar. 18, 2006, at C1 ("The 21-page opinion by Judge James Ware... puts to bed a high-profile legal battle between the most popular search engine and the Department of Justice....").
-
(2006)
S. F. Chron.
-
-
Kopytoff, V.1
-
185
-
-
79251621464
-
-
See Electronic Frontier Foundation, From EFF's Secret Files: Anatomy of a Bogus Subpoena, last visited Apr. 12, 2010 reporting on the contents of the subpoena
-
See Electronic Frontier Foundation, From EFF's Secret Files: Anatomy of a Bogus Subpoena, http://www.eff.org/wp/anatomy-bogus-subpoena-indymedia (last visited Apr. 12, 2010) (reporting on the contents of the subpoena).
-
-
-
-
186
-
-
79251638320
-
-
Id
-
Id.
-
-
-
-
187
-
-
79251613811
-
-
E.g., United States v. Gourde, 1067-68 9th Cir, en banc describing how information found online about defendant's subscription to a child pornography website led the FBI to real evidence in his home
-
E.g., United States v. Gourde, 440 F.3d 1060, 1067-68 (9th Cir. 2004) (en banc) (describing how information found online about defendant's subscription to a child pornography website led the FBI to real evidence in his home).
-
(2004)
F.3d
, vol.440
, pp. 1060
-
-
-
188
-
-
79251620680
-
-
Cell phone contact lists and webmail address books are replacing the traditional "little black books." Do not be confused by the fact that the storage mechanism is electronic or online. I still put this in the category of a "real world" storage device pointing to online addresses
-
Cell phone contact lists and webmail address books are replacing the traditional "little black books." Do not be confused by the fact that the storage mechanism is electronic or online. I still put this in the category of a "real world" storage device pointing to online addresses.
-
-
-
-
189
-
-
79251631012
-
-
Compare with Gourde, at, where the FBI had defendant's e-mail address accompanied by evidence he maintained a membership to a child pornography website
-
Compare with Gourde, 440 F.3d at 1067-68, where the FBI had defendant's e-mail address accompanied by evidence he maintained a membership to a child pornography website.
-
F.3d
, vol.440
, pp. 1067-1068
-
-
-
190
-
-
79251604478
-
-
See supra Part II. A.3.a
-
See supra Part II. A.3.a.
-
-
-
-
191
-
-
78650137664
-
Growing presence in the courtroom: Cellphone data as witness
-
See, July 6, at, discussing the role cell phone tracking now plays in law enforcement investigations
-
See Anne Barnard, Growing Presence in the Courtroom: Cellphone Data as Witness, N. Y. TIMES, July 6, 2009, at A16 (discussing the role cell phone tracking now plays in law enforcement investigations).
-
(2009)
N. Y. Times
-
-
Barnard, A.1
-
192
-
-
79251639403
-
-
Id
-
Id.
-
-
-
-
193
-
-
79251627085
-
-
Id
-
Id.
-
-
-
-
194
-
-
79251643974
-
-
See id. reporting that "wireless carriers receive hundreds of requests a month from law enforcement just for real-time tracking", according to lawyer Albert Gidari Jr.
-
See id. (reporting that "wireless carriers receive hundreds of requests a month from law enforcement just for real-time tracking", according to lawyer Albert Gidari Jr.).
-
-
-
-
195
-
-
79251620950
-
Cell phones as tracking devices
-
See, 1416, listing cases
-
See M. Wesley Clark, Cell Phones as Tracking Devices, 41 VAL. U. L. REV. 1413, 1416 n. 17 (2007) (listing cases).
-
(2007)
Val. U. L. Rev.
, vol.41
, Issue.17
, pp. 1413
-
-
Clark, M.W.1
-
196
-
-
79251638834
-
-
See id. at 1415-17 describing the DOJ's record in cases involving EC-PA
-
See id. at 1415-17 (describing the DOJ's record in cases involving EC-PA).
-
-
-
-
197
-
-
79251603411
-
-
See id. at 1418-56 chronicling these issues
-
See id. at 1418-56 (chronicling these issues).
-
-
-
-
198
-
-
79251604479
-
-
See e.g., Barnard, supra note 154 noting the use of finding kidnappers, fugitives, and drug traffickers
-
See e.g., Barnard, supra note 154 (noting the use of finding kidnappers, fugitives, and drug traffickers);
-
-
-
-
199
-
-
79251624122
-
FBI e-mail shows rift over warrantless phone record grabs
-
Dec. 20, explaining how cell phone tracking works and is used
-
Ryan Singel, FBI E-Mail Shows Rift Over Warrantless Phone Record Grabs, WIRED, Dec. 20, 2007, http://www.wired.com/print/politics/onlinerights/news/ 2007/12/fbi-cell (explaining how cell phone tracking works and is used).
-
(2007)
Wired
-
-
Singel, R.1
-
200
-
-
79251625727
-
-
See Solove, supra note 47, at 1287 discussing how applying electronic surveillance to IP addresses and URLs makes things "fuzzy"
-
See Solove, supra note 47, at 1287 (discussing how applying electronic surveillance to IP addresses and URLs makes things "fuzzy").
-
-
-
-
201
-
-
79251630259
-
-
Compare Christopher Soghoian, Slight Paranoia, 8 Million Reasons for Real Surveillance Oversight, Dec. 1, 2009, 7:00 AM, reporting eight million requests for GPS location information quoting Paul Taylor, Electronic Surveillance Manager, Sprint Nextel
-
Compare Christopher Soghoian, Slight Paranoia, 8 Million Reasons for Real Surveillance Oversight, (Dec. 1, 2009, 7:00 AM), http://paranoia.dubfire.net/ 2009/12/8-million-reasons-for-real-surveillance.html (reporting eight million requests for GPS location information) (quoting Paul Taylor, Electronic Surveillance Manager, Sprint Nextel)
-
-
-
-
202
-
-
79251631722
-
-
with Comment of Matt Sullivan, Sprint Nextel, to id., Dec. 1, 2009, 23:26 clarifying that the eight million requests amount to only "several thousand" instances of surveillance
-
with Comment of Matt Sullivan, Sprint Nextel, to id., (Dec. 1, 2009, 23:26) (clarifying that the eight million requests amount to only "[s]everal thousand" instances of surveillance).
-
-
-
-
203
-
-
79251619789
-
-
Solove, supra note 47, at 1301
-
Solove, supra note 47, at 1301.
-
-
-
-
204
-
-
72549092198
-
Spying program snared U. S. calls
-
See, Dec. 21, at
-
See James Risen & Eric Lichtblau, Spying Program Snared U. S. Calls, N. Y. Times, Dec. 21, 2005, at A1.
-
(2005)
N. Y. Times
-
-
Risen, J.1
Lichtblau, E.2
-
205
-
-
53149102325
-
U. S. secretly tracks global bank data
-
June 23, at
-
Josh Meyer & Greg Miller, U. S. Secretly Tracks Global Bank Data, L. A. TIMES, June 23, 2006, at A1.
-
(2006)
L. A. Times
-
-
Meyer, J.1
Miller, G.2
-
206
-
-
33750969026
-
NSA has massive database of Americans' phone calls
-
May 11, at
-
Leslie Cauley, NSA Has Massive Database of Americans' Phone Calls, USA TODAY, May 11, 2006, at 1A.
-
(2006)
Usa Today
-
-
Cauley, L.1
-
207
-
-
79251621205
-
-
See id. explaining that most of the information comes from people not suspected of crimes
-
See id. (explaining that most of the information comes from people not suspected of crimes).
-
-
-
-
208
-
-
38049048075
-
-
See, arguing that data mining does not implicate privacy at all unless a human looks at the results
-
See RICHARD A. POSNER, NOT A SUICIDE PACT: THE CONSTITUTION IN A TIME OF NATIONAL EMERGENCY 96-97 (2006) (arguing that data mining does not implicate privacy at all unless a human looks at the results);
-
(2006)
Not A Suicide Pact: The Constitution in A Time of National Emergency
, pp. 96-97
-
-
Posner, R.A.1
-
209
-
-
47049107175
-
Government data mining: The need for a legal framework
-
487-88, endorsing a nine-pronged framework for regulating data mining with no mention of judicial standards
-
Fred H. Cate, Government Data Mining: The Need for a Legal Framework, 43 HARV. C. R.-C. L. L. REV. 435, 487-88 (2008) (endorsing a nine-pronged framework for regulating data mining with no mention of judicial standards);
-
(2008)
Harv. C. R.-C. L. L. Rev.
, vol.43
, pp. 435
-
-
Cate, F.H.1
-
210
-
-
42349114774
-
Government data mining and the fourth amendment
-
337-38, arguing for a non-probable cause standard for some types of data mining
-
Christopher Slobogin, Government Data Mining and the Fourth Amendment, 75 U. CHI. L. REV. 317, 337-38 (2008) (arguing for a non-probable cause standard for some types of data mining).
-
(2008)
U. Chi. L. Rev.
, vol.75
, pp. 317
-
-
Slobogin, C.1
-
211
-
-
79251604449
-
-
E.g., Posting of Jim Harper to Cato@Liberty, Data Mining of the Fourth Amendment?, Aug. 22, 2006, 12:36 PM
-
E.g., Posting of Jim Harper to Cato@Liberty, Data Mining of the Fourth Amendment?, http://www.cato-at-liberty.org/2006/08/22/data-mining-or-the-fourth- amendment/ (Aug. 22, 2006, 12:36 PM).
-
-
-
-
212
-
-
79251646910
-
-
See, e.g., Slobogin, supra note 169, at 330 "Since virtually all information obtained through data mining comes from third-party record holders-either the government itself, commercial data brokers, or a commercial entity like a bank-its acquisition does not implicate the Fourth Amendment."
-
See, e.g., Slobogin, supra note 169, at 330 ("Since virtually all information obtained through data mining comes from third-party record holders-either the government itself, commercial data brokers, or a commercial entity like a bank-its acquisition does not implicate the Fourth Amendment.").
-
-
-
-
213
-
-
79251647175
-
-
See Kerr, supra note 35, at 1218-22 discussing the disclosure requirements under the SCA
-
See Kerr, supra note 35, at 1218-22 (discussing the disclosure requirements under the SCA).
-
-
-
-
214
-
-
79251625975
-
-
The only federal law that specifically regulates data mining is the Computer Matching and Privacy Act of 1988, Pub. L. No. 100-503, codified as amended at 5 U. S. C. § 552a o - r 2006. The law is mostly inapposite to this discussion because it imposes no justification standards and it expressly exempts data mining for law enforcement and intelligence purposes
-
The only federal law that specifically regulates data mining is the Computer Matching and Privacy Act of 1988, Pub. L. No. 100-503, 102 Stat. 2507 (codified as amended at 5 U. S. C. § 552a (o) - (r) (2006)). The law is mostly inapposite to this discussion because it imposes no justification standards and it expressly exempts data mining for law enforcement and intelligence purposes.
-
Stat.
, vol.102
, pp. 2507
-
-
-
215
-
-
79251605271
-
-
§ 552a a 8 B iii, v - vi
-
U. S. C. § 552a (a) (8) (B) (iii), (v) - (vi).
-
U. S. C.
, vol.5
-
-
-
216
-
-
79251631011
-
-
See supra Part II. C.1
-
See supra Part II. C.1.
-
-
-
-
217
-
-
77951948917
-
Subpoenas and privacy
-
809
-
Christopher Slobogin, Subpoenas and Privacy, 54 DEPAUL L. REV. 805, 809 (2005).
-
(2005)
Depaul L. Rev.
, vol.54
, pp. 805
-
-
Slobogin, C.1
-
218
-
-
23044522923
-
Bill Clinton, and the transsubstantive fourth amendment
-
864
-
William J. Stuntz, O. J. Simpson, Bill Clinton, and the Transsubstantive Fourth Amendment, 114 HARV. L. REV. 842, 864 (2001).
-
(2001)
Harv. L. Rev.
, vol.114
, pp. 842
-
-
Stuntz, W.J.1
Simpson, O.J.2
-
219
-
-
79251645401
-
-
See Bray, supra note 143
-
See Bray, supra note 143.
-
-
-
-
220
-
-
77952760538
-
-
The SCA permits access to some records with a subpoena, § 2703 b 1 B i, c 2
-
The SCA permits access to some records with a subpoena. 18 U. S. C. § 2703 (b) (1) (B) (i), (c) (2) (2006).
-
(2006)
U. S. C.
, vol.18
-
-
-
221
-
-
79251608481
-
-
Id. § 3123 a 1 - 2
-
Id. § 3123 (a) (1) - (2).
-
-
-
-
222
-
-
84873927736
-
-
See Theofel v. Farey-Jones, 1076-77 9th Cir
-
See Theofel v. Farey-Jones, 359 F.3d 1066, 1076-77 (9th Cir. 2004).
-
(2004)
F.3d
, vol.359
, pp. 1066
-
-
-
223
-
-
79251603680
-
-
See Slobogin, supra note 175, at 840 stating that information obtained through subpoenas is usually secondary information
-
See Slobogin, supra note 175, at 840 (stating that information obtained through subpoenas is usually secondary information).
-
-
-
-
224
-
-
79251638319
-
Symposium, the future of internet surveillance law: A symposium to discuss internet surveillance, privacy, and the USA patriot act
-
See, Every author who expressed an opinion about ECPA recommended changing it in fairly significant ways
-
See Symposium, The Future of Internet Surveillance Law: A Symposium To Discuss Internet Surveillance, Privacy, and the USA Patriot Act, 72 GEO. WASH.
-
(2004)
Geo. Wash. L. Rev.
, vol.72
, pp. 1139
-
-
-
225
-
-
79251615590
-
-
See Posting of Paul Ohm to Concurring Opinions, Which is More Confusing: ECPA or the Tax Code?, Aug. 21, 2008, 12:42 PM
-
See Posting of Paul Ohm to Concurring Opinions, Which is More Confusing: ECPA or the Tax Code?, http://www.concurringopinions.com/archives/2008/08/which- is-more-c-1.html (Aug. 21, 2008, 12:42 PM).
-
-
-
-
226
-
-
84866175791
-
-
See, e.g., United States v. Councilman, 85 1st Cir, en banc interpreting the Wiretap Act
-
See, e.g., United States v. Councilman, 418 F.3d 67, 85 (1st Cir. 2005) (en banc) (interpreting the Wiretap Act);
-
(2005)
F.3d
, vol.418
, pp. 67
-
-
-
227
-
-
84873883867
-
-
Konop v. Hawaiian Airlines, Inc., 886 9th Cir, affirming the dismissal of a Wiretap Act claim, but reversing the dismissal of a Stored Communications Act claim
-
Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 886 (9th Cir. 2002) (affirming the dismissal of a Wiretap Act claim, but reversing the dismissal of a Stored Communications Act claim).
-
(2002)
F.3d
, vol.302
, pp. 868
-
-
-
228
-
-
79251607757
-
-
See Kerr, supra note 35, at 1235-38 urging Congress to simplify EC-PA
-
See Kerr, supra note 35, at 1235-38 (urging Congress to simplify EC-PA).
-
-
-
-
229
-
-
84887285498
-
-
McDonald v. United States, 455
-
McDonald v. United States, 335 U. S. 451, 455 (1948).
-
(1948)
U. S.
, vol.335
, pp. 451
-
-
-
230
-
-
79251611416
-
-
See, § 3121, defining the relevance-and-certification standard
-
See 18 U. S. C. § 3121 (2006) (defining the relevance-and- certification standard).
-
(2006)
U. S. C.
, vol.18
-
-
-
231
-
-
79251648877
-
-
See Solove, supra note 47, at 1288-89
-
See Solove, supra note 47, at 1288-89.
-
-
-
-
232
-
-
79251630522
-
-
Id. at 1288
-
Id. at 1288.
-
-
-
-
233
-
-
79251649652
-
-
United States v. Fregoso, 1320 8th Cir, calling the judge's role in reviewing Pen Register Act applications "ministerial in nature"
-
United States v. Fregoso, 60 F.3d 1314, 1320 (8th Cir. 1995) (calling the judge's role in reviewing Pen Register Act applications "ministerial in nature").
-
(1995)
F.3d
, vol.60
, pp. 1314
-
-
-
234
-
-
79251644658
-
-
§ 2703 d
-
18 U. S. C. § 2703 (d) (2006).
-
(2006)
U. S. C.
, vol.18
-
-
-
235
-
-
21244448737
-
Internet surveillance law after the USA PATRIOT act: The big brother that isn't
-
See, 639, explaining that the higher standard would add privacy protection
-
See Orin S. Kerr, Internet Surveillance Law After the USA PATRIOT Act: The Big Brother That Isn't, 97 NW. U. L. REV. 607, 639 (2003) (explaining that the higher standard would add privacy protection).
-
(2003)
Nw. U. L. Rev.
, vol.97
, pp. 607
-
-
Kerr, O.S.1
-
236
-
-
84880933161
-
-
See Warshak v. United States, 467 6th Cir, upholding an injunction for lack of a warrant or notice
-
See Warshak v. United States, 490 F.3d 455, 467 (6th Cir. 2007) (upholding an injunction for lack of a warrant or notice)
-
(2007)
F.3d
, vol.490
, pp. 455
-
-
-
237
-
-
84865150370
-
-
rev'd as not ripe by, 522 6th Cir, en banc
-
rev'd as not ripe by 532 F.3d 521, 522 (6th Cir. 2008) (en banc).
-
(2008)
F.3d
, vol.532
, pp. 521
-
-
-
238
-
-
79251613685
-
-
See, § 2705 a 1 - 2 listing five factors justifying delay including physical safety, possible flight, evidence tampering, and witness intimidation
-
See 18 U. S. C. § 2705 (a) (1) - (2) (listing five factors justifying delay including physical safety, possible flight, evidence tampering, and witness intimidation).
-
U. S. C.
, vol.18
-
-
-
239
-
-
79251606050
-
-
Notice to the subscriber is not required in parts of the SCA
-
Notice to the subscriber is not required in parts of the SCA
-
-
-
-
240
-
-
79251616101
-
-
id. § 2703 b 1 A, c 1, or in the Pen Register Act, id. § 3123 d
-
id. § 2703 (b) (1) (A), (c) (1), or in the Pen Register Act, id. § 3123 (d).
-
-
-
-
241
-
-
79251601644
-
-
Id. § 2519 3
-
Id. § 2519 (3).
-
-
-
-
242
-
-
79251615061
-
-
See id. §§ 2702 d, 3126
-
See id. §§ 2702 (d), 3126.
-
-
-
-
243
-
-
79251632917
-
-
See id. § 2519 describing the reporting requirements for wiretaps
-
See id. § 2519 (describing the reporting requirements for wiretaps).
-
-
-
-
244
-
-
0043159103
-
Lifting the "fog" of internet surveillance: How a suppression remedy would change computer crime law
-
See, 837-40
-
See Orin S. Kerr, Lifting the "Fog" of Internet Surveillance: How A Suppression Remedy Would Change Computer Crime Law, 54 HASTINGS L. J. 805, 837-40 (2003).
-
(2003)
Hastings L. J.
, vol.54
, pp. 805
-
-
Kerr, O.S.1
-
245
-
-
79251629501
-
-
§ 2518 1 c
-
18 U. S. C. § 2518 (1) (c).
-
U. S. C.
, vol.18
-
-
-
246
-
-
79251650166
-
FBI's secret spyware tracks down teen who made bomb threats
-
See, July 18, describing the FBI's use of spyware in its law enforcement efforts
-
See Kevin Poulsen, FBI's Secret Spyware Tracks Down Teen Who Made Bomb Threats, WIRED, July 18, 2007, http://www.wired.com/politics/law/news/2007/07/ fbi-spyware (describing the FBI's use of spyware in its law enforcement efforts).
-
(2007)
Wired
-
-
Poulsen, K.1
-
247
-
-
79251633735
-
-
See Kerr, supra note 69, at 574
-
See Kerr, supra note 69, at 574.
-
-
-
-
248
-
-
33744908764
-
Pervasive computing: Embedding the public sphere
-
See, e.g., 93, describing the ideas of pervasive computing and ubiquitous access
-
See, e.g., Jerry Kang & Dana Cuff, Pervasive Computing: Embedding the Public Sphere, 65 WASH. & LEE L. REV. 93, 93 (2005) (describing the ideas of pervasive computing and ubiquitous access).
-
(2005)
Wash. & Lee L. Rev.
, vol.65
, pp. 93
-
-
Kang, J.1
Cuff, D.2
-
249
-
-
79251643718
-
-
See U. S. Const. amend IV
-
See U. S. Const. amend IV.
-
-
-
-
250
-
-
79251638036
-
-
This last point is another example of the well-worn "I have nothing to hide" argument, which Daniel Solove refutes
-
This last point is another example of the well-worn "I have nothing to hide" argument, which Daniel Solove refutes.
-
-
-
-
251
-
-
57349110717
-
"I've got nothing to hide" and other misunderstandings of privacy
-
See, 764-72
-
See Daniel J. Solove, "I've Got Nothing To Hide" and Other Misunderstandings of Privacy, 44 SAN DIEGO L. REV. 745, 764-72 (2007).
-
(2007)
San Diego L. Rev.
, vol.44
, pp. 745
-
-
Solove, D.J.1
-
252
-
-
33644925852
-
A taxonomy of privacy
-
See, 528, stating that Fourth Amendment law fails to protect against some breaches
-
See Daniel J. Solove, A Taxonomy of Privacy, 154 U. Pa. L. Rev. 477, 528 (2006) (stating that Fourth Amendment law fails to protect against some breaches).
-
(2006)
U. Pa. L. Rev.
, vol.154
, pp. 477
-
-
Solove, D.J.1
-
253
-
-
79251642762
-
-
See Kerr, supra, note 69, at 587-600
-
See Kerr, supra, note 69, at 587-600.
-
-
-
-
254
-
-
77249131620
-
-
See United States v. Miller, 443
-
See United States v. Miller, 425 U. S. 435, 443 (1976).
-
(1976)
U. S.
, vol.425
, pp. 435
-
-
-
255
-
-
78751647463
-
-
See Smith v. Maryland, 745-46
-
See Smith v. Maryland, 442 U. S. 735, 745-46 (1976).
-
(1976)
U. S.
, vol.442
, pp. 735
-
-
-
256
-
-
79251643208
-
-
Kerr, supra note 69, at 564
-
Kerr, supra note 69, at 564.
-
-
-
-
257
-
-
79251610271
-
-
See id. at 575
-
See id. at 575.
-
-
-
-
258
-
-
79251641156
-
-
Id. at 576
-
Id. at 576.
-
-
-
-
259
-
-
79251629759
-
-
I have other problems with Professor Kerr's argument. Most significantly, I find the approach impossible for courts to apply, because it is positively actuarial: it asks courts to construct a balance sheet measuring how changes in technology upend the constitutionally proper balance between privacy and security. When the balance sheet tips too much in favor of privacy at the cost of security, it allows courts to construct rules to restore balance. This bean-counting approach is too indeterminate to serve the purpose Professor Kerr intends, because it requires courts to quantify changes in technology and crime in ways that courts are ill-equipped to do
-
I have other problems with Professor Kerr's argument. Most significantly, I find the approach impossible for courts to apply, because it is positively actuarial: it asks courts to construct a balance sheet measuring how changes in technology upend the constitutionally proper balance between privacy and security. When the balance sheet tips too much in favor of privacy at the cost of security, it allows courts to construct rules to restore balance. This bean-counting approach is too indeterminate to serve the purpose Professor Kerr intends, because it requires courts to quantify changes in technology and crime in ways that courts are ill-equipped to do.
-
-
-
-
260
-
-
79251624403
-
-
See id. at 575-76 discussing the effects of intermediaries on criminal conduct
-
See id. at 575-76 (discussing the effects of intermediaries on criminal conduct).
-
-
-
-
261
-
-
33947354725
-
-
See Berger v. New York, 43-44, striking down a New York surveillance law as too general
-
See Berger v. New York, 388 U. S. 41, 43-44 (1967) (striking down a New York surveillance law as too general).
-
(1967)
U. S.
, vol.388
, pp. 41
-
-
-
262
-
-
33947416337
-
-
See Katz v. United States, 350, refusing to recognize the Fourth Amendment as granting a general privacy right
-
See Katz v. United States, 389 U. S. 347, 350 (1967) (refusing to recognize the Fourth Amendment as granting a general privacy right).
-
(1967)
U. S.
, vol.389
, pp. 347
-
-
-
263
-
-
79251601901
-
-
See, e.g., Slobogin, supra note 39, at 153 analogizing the assumption of risk that the phone company will disclose information to information gained by ISPs
-
See, e.g., Slobogin, supra note 39, at 153 (analogizing the assumption of risk that the phone company will disclose information to information gained by ISPs);
-
-
-
-
264
-
-
79251620403
-
-
Solove, supra note 47, at 1287 discussing the expansion of information obtainable by the government resulting from the USA PATRIOT Act
-
Solove, supra note 47, at 1287 (discussing the expansion of information obtainable by the government resulting from the USA PATRIOT Act);
-
-
-
-
265
-
-
79251646152
-
The content/envelope distinction in internet law
-
2114-15, discussing the right to privacy in Internet communications
-
Matthew J. Tokson, The Content/Envelope Distinction in Internet Law, 50 WM. & MARY L. REV. 2105, 2114-15 (2009) (discussing the right to privacy in Internet communications).
-
(2009)
Wm. & Mary L. Rev.
, vol.50
, pp. 2105
-
-
Tokson, M.J.1
-
266
-
-
79251639638
-
-
See Berger, at
-
See Berger, 388 U. S. at 64.
-
U. S.
, vol.388
, pp. 64
-
-
-
267
-
-
79251642761
-
-
Id. at 54-55
-
Id. at 54-55.
-
-
-
-
268
-
-
79251645400
-
-
Id. at 56
-
Id. at 56
-
-
-
-
269
-
-
77955009625
-
-
citing Osborn v. United States, 329
-
(citing Osborn v. United States, 385 U. S. 323, 329 n. 2 (1966)).
-
(1966)
U. S.
, vol.385
, Issue.2
, pp. 323
-
-
-
270
-
-
79251646390
-
-
Id
-
Id.
-
-
-
-
271
-
-
79251637555
-
-
Id. at 58 citations omitted
-
Id. at 58 (citations omitted).
-
-
-
-
272
-
-
79251624673
-
-
See id. at 58-59
-
See id. at 58-59.
-
-
-
-
273
-
-
79955411615
-
First principles of communications privacy
-
¶ 12
-
Susan Freiwald, First Principles of Communications Privacy, 2007 STAN. TECH. L. REV. 3, ¶ 12, http://stlr.stanford.edu/pdf/freiwald-first- principles.pdf
-
(2007)
Stan. Tech. L. Rev.
, pp. 3
-
-
Freiwald, S.1
-
274
-
-
79251640394
-
-
See id. ¶ 9
-
See id. ¶ 9.
-
-
-
-
275
-
-
79251621465
-
-
See id. ¶¶ 51-56. Friewald cites seven silent video opinions from the Courts of Appeals
-
See id. ¶¶ 51-56. Friewald cites seven silent video opinions from the Courts of Appeals.
-
-
-
-
276
-
-
79251623616
-
-
Id. ¶ 10 n. 20
-
Id. ¶ 10 n. 20.
-
-
-
-
277
-
-
79251647587
-
-
Id. ¶ 10
-
Id. ¶ 10.
-
-
-
-
278
-
-
79251644915
-
-
See id
-
See id.
-
-
-
-
279
-
-
79251639900
-
-
See id. ¶ 72
-
See id. ¶ 72.
-
-
-
-
280
-
-
79251650165
-
-
See id. ¶ 54. She also would apply these requirements to real-time interception of e-mail and instant messaging and, perhaps, to surveillance of noncontent information as well
-
See id. ¶ 54. She also would apply these requirements to real-time interception of e-mail and instant messaging and, perhaps, to surveillance of noncontent information as well.
-
-
-
-
281
-
-
79251631482
-
-
See id. ¶ 73
-
See id. ¶ 73.
-
-
-
|