-
1
-
-
70450226417
-
Electronic communications privacy act of 1986, pub. l. no. 99-508
-
Electronic Communications Privacy Act of 1986, Pub. L. No. 99-508, 100 Stat. 1848 (1986)
-
(1986)
Stat.
, vol.100
, pp. 1848
-
-
-
2
-
-
84893429759
-
-
codified as amended in scattered sections of 18 U.S.C..
-
U.S.C
, vol.18
-
-
-
4
-
-
84893398177
-
Panel approves a bill to safeguard email
-
Nov. 30
-
See Charlie Savage, Panel Approves a Bill to Safeguard Email, N.Y. TIMES, Nov. 30, 2012, at B7 (noting that ECPA "is widely seen as outdated");
-
(2012)
N.Y. Times
-
-
Savage, C.1
-
5
-
-
84893349977
-
Consensus builds for requiring warrant for email searches
-
Mar. 19
-
see also Brendan Sasso, Consensus Builds for Requiring Warrant for Email Searches, HILL'S HILLICON VALLEY (Mar. 19, 2013), http://thehill.com/blogs/ hillicon-valley/technology/289035-consensus-builds-for-requiringwarrant- for-email-searches (quoting Representative Jim Sensenbrenner as saying that ECPA's requirement of only a subpoena for access to email records is "outdated and probably unconstitutional").
-
(2013)
Hill's Hillicon Valley
-
-
Sasso, B.1
-
6
-
-
84893382817
-
OVERNIGHT tech: House to consider email privacy bill
-
Feb. 27
-
Brendan Sasso & Jennifer Martinez, OVERNIGHT TECH: House to Consider Email Privacy Bill, THE HILL'S HILLICON VALLEY (Feb. 27, 2013), http://thehill.com/blogs/hilliconvalley/ technology/285397-overnight-tech-house- to-consider-email-privacy-bill;
-
(2013)
The Hill's Hillicon Valley
-
-
Sasso, B.1
Martinez, J.2
-
7
-
-
84893425718
-
-
Jan. 16
-
see also Sen. Patrick Leahy, Chairman, S. Judiciary Comm., The Agenda of the Senate Judiciary Committee for the 113th Congress (J an. 16, 2013), available at http://www.leahy.senate.gov/press/113-sjcagenda- speech ("[A]s Chairman of the Judiciary Committee, I will keep pushing to update our privacy laws to address emerging technology and the Internet, including the Electronic Communications Privacy Act and cybersecurity laws.").
-
(2013)
Sen. Patrick Leahy, Chairman, S. Judiciary Comm., the Agenda of the Senate Judiciary Committee for the 113th Congress
-
-
-
8
-
-
78649844925
-
Who invented the telephone? Lawyers, patents, and the judgments of history
-
855-67
-
See Christopher Beauchamp, Who Invented the Telephone? Lawyers, Patents, and the Judgments of History, 51 TECH. & CULTURE 854, 855-67 (2010) (noting that patent litigation surrounding the telephone's origins clouds the question of who invented the telephone).
-
(2010)
Tech. & Culture
, vol.51
, pp. 854
-
-
Beauchamp, C.1
-
9
-
-
85023480559
-
-
See SAMUEL DASH ET AL., THE EAVESDROPPERS 25-34 (1959) (tracing phone wiretapping back to the 1890s and highlighting its growth as a practice into the 1950s);
-
(1959)
The Eavesdroppers
, pp. 25-34
-
-
Dash, S.1
-
10
-
-
18344368345
-
Heutsche v. United States
-
899, (Douglas, J., dissenting)
-
see also Heutsche v. United States, 414 U.S. 898, 899 (1973) (Douglas, J., dissenting) ("[W]e live in a regime where the 'dirty business' of wiretapping runs rampant.").
-
(1973)
U.S.
, vol.414
, pp. 898
-
-
-
11
-
-
33947354725
-
Berger v. New York
-
46
-
See Berger v. New York, 388 U.S. 41, 46 (1967) (highlighting an 1895 Illinois law outlawing wiretapping and similar legislation enacted ten years later in California).
-
(1967)
U.S.
, vol.388
, pp. 41
-
-
-
12
-
-
84876223036
-
Pub. l. no. 73-416
-
Pub. L. No. 73-416, 48 Stat. 1064
-
Stat.
, vol.48
, pp. 1064
-
-
-
13
-
-
84893374387
-
-
codified as amended at 47 U.S.C. §§ 151-609 (1934).
-
(1934)
U.S.C. §§ 151-609
, vol.47
-
-
-
14
-
-
84883246875
-
Pub. l. no. 73-416, § 605
-
1104
-
For example, the relevant provision of the Communications Act of 1934 stated that "[n]o person not being authorized by the sender shall intercept any communication and divulge or publish the existence, contents, substance, purport, effect, or meaning of such intercepted communication to any person." Pub. L. No. 73-416, § 605, 48 Stat. 1064, 1104
-
Stat.
, vol.48
, pp. 1064
-
-
-
15
-
-
84893351007
-
-
codified at 47 U.S.C. § 605 (1934).
-
(1934)
U.S.C. § 605
, vol.47
-
-
-
16
-
-
82455198277
-
Pub. l. no. 90-351
-
The Wiretap Act is sometimes referred to as "Title III" because it was passed as the third title of the Omnibus Crime Control and Safe Streets Act of 1968. Pub. L. No. 90-351, 82 Stat. 197 (1968).
-
(1968)
Stat.
, vol.82
, pp. 197
-
-
-
17
-
-
84893343779
-
-
& Supp. V
-
The Wiretap Act is codified as amended at 18 U.S.C. §§ 2510-22 (2006 & Supp. V 2012).
-
(2006)
U.S.C. §§ 2510-22
, vol.18
-
-
-
18
-
-
84893376398
-
-
See 18 U.S.C. § 2511(1)(a) (2006) (stating that anyone who "[i]ntentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication" commits a crime).
-
(2006)
U.S.C. § 2511(1)(a)
, vol.18
-
-
-
19
-
-
33947354725
-
-
57-60
-
388 U.S. 41, 57-60 (1967).
-
(1967)
U.S.
, vol.388
, pp. 41
-
-
-
21
-
-
84893409772
-
Scott v. United States
-
142-43
-
See Scott v. United States, 436 U.S. 128, 142-43 (1978) (concluding that conversations between the defendant and her mother were reasonably intercepted by government agents);
-
(1978)
U.S.
, vol.436
, pp. 128
-
-
-
22
-
-
84986618699
-
United States v. Glover
-
420, D.C. Cir.
-
see also United States v. Glover, 681 F.3d 411, 420 (D.C. Cir. 2012) (noting that "determining the reasonableness of minimization efforts is a fact-specific inquiry").
-
(2012)
F.3d
, vol.681
, pp. 411
-
-
-
23
-
-
84893393222
-
-
See 18 U.S.C. § 2517 (2006).
-
(2006)
U.S.C. § 2517
, vol.18
-
-
-
24
-
-
84893386795
-
SEC v. Rajaratnam
-
175, 2d Cir.
-
See SEC v. Rajaratnam, 622 F.3d 159, 175 (2d Cir. 2010) (stating that, with respect to material gathered from wiretapped investigations, "the USAO [United States Attorney's Office] may not be authorized to provide these materials to [another] civil enforcement agency").
-
(2010)
F.3d
, vol.622
, pp. 159
-
-
-
26
-
-
84893396667
-
-
The Wiretap Act also prohibits the interception of "oral communications," which effectively prohibits the use of secret audio recording devices to record the human voice. 18 U.S.C § 2511(1)(a) (2006);
-
(2006)
U.S.c § 2511(1)(a)
, vol.18
-
-
-
27
-
-
84893407135
-
United States v. Seidlitz
-
4th Cir.
-
United States v. Seidlitz, 589 F.2d 152 (4th Cir. 1978).
-
(1978)
F.2d
, vol.589
, pp. 152
-
-
-
28
-
-
84893377954
-
United States v. Turk
-
5th Cir.
-
At the time, the leading precedent on this point was United States v. Turk, 526 F.2d 654 (5th Cir. 1976).
-
(1976)
F.2d
, vol.526
, pp. 654
-
-
-
29
-
-
70450226417
-
Electronic communications privacy act of 1986, pub. l. no. 99-508
-
Electronic Communications Privacy Act of 1986, Pub. L. No. 99-508, 100 Stat. 1848 (1986).
-
(1986)
Stat.
, vol.100
, pp. 1848
-
-
-
30
-
-
84893387201
-
-
This amendment was Title I of ECPA, and it amended 18 U.S.C. §§ 2510-22 (2006).
-
(2006)
U.S.C. §§ 2510-22
, vol.18
-
-
-
31
-
-
84893386573
-
-
This amendment was Title III of ECPA, and it was codified at 18 U.S.C. §§ 3121-27 (2006).
-
(2006)
U.S.C. §§ 3121-27
, vol.18
-
-
-
32
-
-
84893403656
-
Order authorizing installation of pen register
-
1558-61, M.D. Fla.
-
Id. For a helpful discussion of the Pen Register Statute, see In re Order Authorizing Installation of Pen Register, 846 F. Supp. 1555, 1558-61 (M.D. Fla. 1994).
-
(1994)
F. Supp.
, vol.846
, pp. 1555
-
-
-
33
-
-
84893360016
-
-
The Stored Communications Act was enacted as Title II of ECPA, and it is codified at 18 U.S.C. §§ 2701-11 (2006).
-
(2006)
U.S.C. §§ 2701-11
, vol.18
-
-
-
34
-
-
84893393207
-
-
18 U.S.C. § 2702 (2006).
-
(2006)
U.S.C. § 2702
, vol.18
-
-
-
38
-
-
84893347084
-
-
In the current version of the statute, the rules on compelled disclosure are found in 18 U.S.C. § 2703
-
U.S.C. § 2703
, vol.18
-
-
-
39
-
-
84893349025
-
-
while the rules on voluntary disclosure are found in 18 U.S.C. § 2702.
-
U.S.C. § 2702
, vol.18
-
-
-
40
-
-
84893390751
-
-
See 18 U.S.C. § 2702(c) (2006) (allowing a provider to "divulge a record or other information pertaining to a subscriber").
-
(2006)
U.S.C. § 2702(c)
, vol.18
-
-
-
41
-
-
10844224409
-
Reconstructing electronic surveillance law
-
1298
-
See Daniel J. Solove, Reconstructing Electronic Surveillance Law, 72 GEO. WASH. L. REV. 1264, 1298 (2004) (arguing that the SCA along with the Pen Register Act fell short of requiring minimization procedures among other privacy protections).
-
(2004)
Geo. Wash. L. Rev.
, vol.72
, pp. 1264
-
-
Solove, D.J.1
-
42
-
-
84893341644
-
-
See, e.g., 18 U.S.C. § 2518(6) (2006) (holding that agents may be required to give progress reports to a court).
-
(2006)
U.S.C. § 2518(6)
, vol.18
-
-
-
44
-
-
21244448737
-
Internet surveillance law after the usa patriot act: The big brother that isn't
-
611-13
-
See Orin S. Kerr, Internet Surveillance Law After the USA Patriot Act: The Big Brother That Isn't, 97 NW. U. L. REV. 607, 611-13 (2003) (discussing the distinction between content and envelope information across different technologies).
-
(2003)
NW. U. L. Rev.
, vol.97
, pp. 607
-
-
Kerr, O.S.1
-
46
-
-
84893362635
-
-
See, e.g., 18 U.S.C. § 2703(c) (1988) (highlighting lower requirements for government access to records like payment information, names, and addresses from remote computing services).
-
(1988)
U.S.C. § 2703(c)
, vol.18
-
-
-
47
-
-
30344452356
-
Communications assistance for law enforcement act, pub. l. no. 103-414
-
Communications Assistance for Law Enforcement Act, Pub. L. No. 103-414, 108 Stat. 4279 (1994).
-
(1994)
Stat.
, vol.108
, pp. 4279
-
-
-
48
-
-
84893428479
-
United States v. Perrine
-
1202, 10th Cir.
-
See United States v. Perrine, 518 F.3d 1196, 1202 (10th Cir. 2008)
-
(2008)
F.3d
, vol.518
, pp. 1196
-
-
-
49
-
-
84893384269
-
-
stating that "the 'specific and articulable facts' standard [in 18 U.S.C. § 2703(d)] derives from the Supreme Court's decision in Terry".
-
U.S.C. § 2703(d)
, vol.18
-
-
-
50
-
-
84893394083
-
-
From 1986 to 2001, a "pen register" was defined by the statute as "a device which records or decodes electronic or other impulses which identify the numbers dialed or otherwise transmitted on the telephone line to which such device is attached." 18 U.S.C. § 3127(3) (1988).
-
(1988)
U.S.C. § 3127(3)
, vol.18
-
-
-
52
-
-
84893402639
-
Who we are
-
(last visited Nov. 22, 2013)
-
The corporate members of the group include a virtual "who's who" of the Internet world. Who We Are, DIGITAL DUE PROCESS, http://digitaldueprocess.org/index.cfm?objectid= DF652CE0-2552-11DF- B455000C296BA163 (last visited Nov. 22, 2013).
-
Digital Due Process
-
-
-
53
-
-
84893411294
-
Our principles
-
(last visited Nov. 22, 2013)
-
The Coalition's website explains this proposal in detail: A governmental entity may require an entity covered by ECPA (a provider of wire or electronic communication service or a provider of remote computing service) to disclose communications that are not readily accessible to the public only with a search warrant issued based on a showing of probable cause, regardless of the age of the communications, the means or status of their storage or the provider's access to or use of the communications in its normal business operations. Our Principles, DIGITAL DUE PROCESS COALITION, http://digitaldueprocess.org/index. cfm?objectid=99629E40-2551-11DF-8E02000C296BA163 (last visited Nov. 22, 2013).
-
Digital Due Process Coalition
-
-
-
55
-
-
84893398831
-
-
This may be true for two reasons. First, the email may be in electronic storage for more than 180 days, and thus may be covered under 18 U.S.C. § 2703(b).
-
U.S.C. § 2703(b)
, vol.18
-
-
-
56
-
-
84893421308
-
Jennings v. Jennings
-
245, S.C.
-
Alternatively, some courts have held that opened email that is stored on a server is held in the provider's capacity as a remote computing service, and thus becomes covered under § 2703(b) immediately after it is opened and the copy is stored. Jennings v. Jennings, 736 S.E.2d 242, 245 (S.C. 2012).
-
(2012)
S.E.2d
, vol.736
, pp. 242
-
-
-
57
-
-
84893387910
-
About google drive
-
(last visited Nov. 22, 2013)
-
See generally About Google Drive, GOOGLE, http://www.google.com/drive/ about.html (last visited Nov. 22, 2013).
-
Google
-
-
-
58
-
-
84893410420
-
-
Supp. V
-
18 U.S.C. § 2703(c) (2006 & Supp. V 2012).
-
(2006)
U.S.C. § 2703(c)
, vol.18
-
-
-
59
-
-
84893387558
-
-
The Pen Register statute might be thought to regulate prospective access to location information, but Congress indicated a contrary intent in a section of the Communications Assistance to Law Enforcement Act. See 47 U.S.C. § 1002(a)(2)(B) (2006) ("[W]ith regard to information acquired solely pursuant to the authority for pen registers and trap and trace devices (as defined in section 3127 of title 18), such call-identifying information shall not include any information that may disclose the physical location of the subscriber.").
-
(2006)
U.S.C. § 1002(a)(2)(b)
, vol.47
-
-
-
60
-
-
84893381524
-
Application of U.S. for & order: (1) authorizing the use of a pen register & trap & trace device; (2) authorizing release of subscriber & other info.; And (3) authorizing disclosure of location-based servs
-
577-78, W.D. Tex.
-
Lower courts are not uniform on this point, but it is the majority view and, in my view, the correct one. See generally In re Application of U.S. For & Order: (1) Authorizing the Use of a Pen Register & Trap & Trace Device; (2) Authorizing Release of Subscriber & Other Info.; and (3) Authorizing Disclosure of Location-Based Servs., 727 F. Supp. 2d 571, 577-78 (W.D. Tex. 2010).
-
(2010)
F. Supp. 2d
, vol.727
, pp. 571
-
-
-
62
-
-
84893401466
-
-
Supp. V
-
18 U.S.C. § 2703(c)(2) (2006 & Supp. V 2012).
-
(2006)
U.S.C. § 2703(c)(2)
, vol.18
-
-
-
64
-
-
33947354725
-
-
59
-
388 U.S. 41, 59 (1967).
-
(1967)
U.S.
, vol.388
, pp. 41
-
-
-
65
-
-
0041698044
-
The evolution of storage systems
-
205-06
-
See R.J.T. Morris & B.J. Truskowsi, The Evolution of Storage Systems, 42 IBM SYS. J. 205, 205-06 (2003) (examining the evolution of data storage systems and their costs).
-
(2003)
Ibm Sys. J.
, vol.42
, pp. 205
-
-
Morris, R.J.T.1
Truskowsi, B.J.2
-
66
-
-
84893397609
-
-
See 18 U.S.C. §§ 2510-22 (2006) (extending the minimization requirements of the Wiretap Act from telephone to data transmissions).
-
(2006)
U.S.C. §§ 2510-22
, vol.18
-
-
-
67
-
-
84908457861
-
Recording everything: Digital storage as an enabler of authoritarian governments
-
Dec. 14
-
John Villasenor, Recording Everything: Digital Storage as an Enabler of Authoritarian Governments, BROOKINGS INST. 3 (Dec. 14, 2011), http://www.brookings.edu/~/media/research/files/papers/2011/12/ 14%20digital%20storage%20villasenor/1214-digital-storage- villasenor.pdf.
-
(2011)
Brookings Inst.
, pp. 3
-
-
Villasenor, J.1
-
68
-
-
84893349303
-
Google to offer gigabyte of free email
-
Apr. 1
-
See Paul Festa, Google to Offer Gigabyte of Free Email, CNET NEWS (Apr. 1, 2004), http://news.cnet.com/2100-1032-5182805.html (highlighting how Gmail's jump to one gigabyte of storage dwarfed previous storage limits of email providers).
-
(2004)
Cnet News
-
-
Festa, P.1
-
69
-
-
84893383477
-
Google unifies gmail, drive, and photo storage: All users now get 15gb of shared space
-
May 13
-
Nathan Ingraham, Google Unifies Gmail, Drive, and Photo Storage: All Users Now Get 15GB of Shared Space, VERGE (May 13, 2013), http://www.theverge. com/ 2013/5/13/4326994/google-unifies-gmail-photo-and-drive-storage.
-
(2013)
Verge
-
-
Ingraham, N.1
-
70
-
-
84893400029
-
Gmail bumps free storage to 10gb
-
Apr. 24
-
Indeed, the amount of space provided to Gmail users rose from 10GB to 15GB in between drafts of this Article. See Chris Ziegler, Gmail Bumps Free Storage to 10GB, VERGE (Apr. 24, 2012), http://www.theverge.com/2012/4/24/ 2971885/gmail-bumps-free-storage-to-10gb (reporting on the increase to 10GB and predicting that, "as always," the amount of free storage will continue to "creep up over time").
-
(2012)
Verge
-
-
Ziegler, C.1
-
71
-
-
84893361011
-
How much is your gmail account worth?
-
July 25
-
Mike Barton, How Much Is Your Gmail Account Worth?, WIRED (J uly 25, 2012), http://www.wired.com/insights/2012/07/gmail-account-worth.
-
(2012)
Wired
-
-
Barton, M.1
-
72
-
-
84893424128
-
When the cops subpoena your facebook information, here's what facebook sends the cops
-
Apr. 6
-
See Carly Carioli, When the Cops Subpoena Your Facebook Information, Here's What Facebook Sends the Cops, PHOENIX (Apr. 6, 2012), http://blog.thephoenix.com/ blogs/phlog/archive/2012/04/06/when-police-subpoena- your-facebook-information-heres-whatfacebook- sends-cops.aspx (noting, among other things, how Facebook reveals little of its involvement in subpoenas from investigators or how many the site serves).
-
(2012)
Phoenix
-
-
Carioli, C.1
-
73
-
-
84893352314
-
Subpoena: Philip markoff's facebook account
-
(last visited Nov. 22, 2013)
-
See Subpoena: Philip Markoff's Facebook Account, SCRIBD, http://www.scribd.com/ fullscreen/88465177?access-key=key-247mvzrfrh1m1azdsoai (last visited Nov. 22, 2013).
-
Scribd
-
-
-
74
-
-
85067875327
-
This is how facebook is tracking your internet activity
-
Sept. 9
-
See Samantha Felix, This Is How Facebook Is Tracking Your Internet Activity, BUS. INSIDER (Sept. 9, 2012), http://www.businessinsider.com/this-is- how-facebook-is-tracking-your-Internetactivity- 2012-9?op=1 (noting how Facebook uses cookies to both track users and store their information).
-
(2012)
Bus. Insider
-
-
Felix, S.1
-
76
-
-
84893385449
-
Report of the director of the administrative office of the United States courts on applications for orders authorizing or approving the interception of wire, oral, or electronic communication
-
June
-
Report of the Director of the Administrative Office of the United States Courts on Applications for Orders Authorizing or Approving the Interception of Wire, Oral, or Electronic Communication, ADMIN. OFFICE OF THE U.S. COURTS, at tbl.6 (June 2013), http://www.uscourts.gov/uscourts/Statistics/WiretapReports/ 2012/Table6.pdf.
-
(2013)
Admin. Office of the U.S. Courts
, pp. 6
-
-
-
77
-
-
84893341931
-
Transparency report: United States
-
(last visited Nov. 22, 2013)
-
Transparency Report: United States, GOOGLE, http://www.google.com/ transparencyreport/userdatarequests/US (last visited Nov. 22, 2013).
-
Google
-
-
-
78
-
-
84893348146
-
-
Ctr. for Interdisciplinary Law & Policy Studies at the Moritz College of Law, Working Paper No. 175
-
See Peter Swire, From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud 7 (Ctr. for Interdisciplinary Law & Policy Studies at the Moritz College of Law, Working Paper No. 175, 2012), available at http://papers.ssrn.com/id=2038871 (noting that logistical and technical issues are driving the emphasis on stored communication).
-
(2012)
From Real-time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud
, pp. 7
-
-
Swire, P.1
-
79
-
-
10844281812
-
A user's guide to the stored communications act, and a legislator's guide to amending it
-
1214
-
See Orin S. Kerr, A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It, 72 GEO. WASH. L. REV. 1208, 1214 (2004) (outlining areas of coverage limitation for the SCA).
-
(2004)
Geo. Wash. L. Rev.
, vol.72
, pp. 1208
-
-
Kerr, O.S.1
-
82
-
-
84893416643
-
ComScore releases march 2012 U.S. search engine rankings
-
Apr. 11
-
See, e.g., ComScore Releases March 2012 U.S. Search Engine Rankings, COMSCORE (Apr. 11, 2012), http://www.comscore.com/Insights/Press-Releases/2012/ 4/comScore-Releases-March-2012-U.S.-Search-Engine-Rankings (displaying the total searches in February and March of 2012).
-
(2012)
Comscore
-
-
-
83
-
-
84893362751
-
Google to cut back on how long it keeps search history
-
June 12
-
Thomas Crampton, Google to Cut Back on How Long It Keeps Search History, N.Y. TIMES (June 12, 2007), http://www.nytimes.com/2007/06/12/business/ worldbusiness/12iht-google.4.6113031.html?-r=0.
-
(2007)
N.Y. Times
-
-
Crampton, T.1
-
84
-
-
84893410661
-
-
18 U.S.C. § 2510(15) (2006) defines an ECS as "any service which provides to users thereof the ability to send or receive wire or electronic communications." This limits ECS providers to providers of connectivity or messaging of covered wire or electronic communications.
-
(2006)
U.S.C. § 2510(15)
, vol.18
-
-
-
85
-
-
77954079008
-
-
The Senate Report accompanying the passage of ECPA offered the following explanation of the concept of a "remote computing service": In the age of rapid computerization, a basic choice has faced the users of computer technology. That is, whether to process data in-house on the user's own computer or on someone else's equipment. Over the years, remote computer service companies have developed to provide sophisticated and convenient computing services to subscribers and customers from remote facilities. Today businesses of all sizes- hospitals, banks and many others-use remote computing services for computer processing. This processing can be done with the customer or subscriber using the facilities of the remote computing service in essentially a time-sharing arrangement, or it can be accomplished by the service provider on the basis of information supplied by the subscriber or customer. S. REP. NO. 99-541, 10-11 (1986).
-
(1986)
S. Rep. No. 99-541
, pp. 10-11
-
-
-
86
-
-
84893396379
-
Google's opp'n to the gov't's motion to compel at 12, gonzales v. Google
-
N.D. Cal., (No. 06-80006)
-
At least one major search engine, Google, claims to be covered by the SCA on the ground that it provides RCS. In litigation over the disclosure of Google search queries, Google argued that its services are protected by the SCA: Google processes search requests as directed by, and for, its users who in turn retrieve the search results of their choosing from Google's index, or Google sends the results by email or text messages to individuals, to wireless phones or other designated mobile devices. Said in plain language, users rely on the remote computer facilities of Google to process and store their search requests and to retrieve by elecelectronic transmission their search results. Google's Opp'n to the Gov't's Motion to Compel at 12, Gonzales v. Google, 234 F.R.D. 674 (N.D. Cal. 2006) (No. 06-80006)
-
(2006)
F.R.D.
, vol.234
, pp. 674
-
-
-
87
-
-
84893347924
-
-
12 (citation omitted)
-
2006 WL 543697, at 12 (citation omitted).
-
Wl
, vol.2006
, pp. 543697
-
-
-
88
-
-
84873892874
-
The fourth amendment in a world without privacy
-
1314
-
See Paul Ohm, The Fourth Amendment in a World Without Privacy, 81 MISS. L.J. 1309, 1314 (2012) (describing the "always on" nature of modern communications devices).
-
(2012)
Miss. L.J.
, vol.81
, pp. 1309
-
-
Ohm, P.1
-
89
-
-
84886287589
-
-
See FACEBOOK, http://facebook.com. As if any cite were necessary.
-
Facebook
-
-
-
90
-
-
77952532093
-
Applying the fourth amendment to the internet: A general approach
-
1019-22, 1034-35
-
See Orin S. Kerr, Applying the Fourth Amendment to the Internet: A General Approach, 62 STAN. L. REV. 1005, 1019-22, 1034-35 (2010) ("To apply the Fourth Amendment to the Internet in a technologically neutral way, access to the contents of communications should be treated like access to evidence located inside. . . . [and] access to noncontent information should be treated like access to evidence found outside.").
-
(2010)
Stan. L. Rev.
, vol.62
, pp. 1005
-
-
Kerr, O.S.1
-
91
-
-
84880928675
-
-
6th Cir.
-
631 F.3d 266 (6th Cir. 2010).
-
(2010)
F.3d
, vol.631
, pp. 266
-
-
-
92
-
-
84893411447
-
Applications for search warrants for info. associated with target email address
-
5, D. Kan. Sept. 21
-
In re Applications for Search Warrants for Info. Associated with Target Email Address, 2012 WL 4383917, at 5 (D. Kan. Sept. 21, 2012) ("The Court finds the rationale set forth in Warshak persuasive and therefore holds that an individual has a reasonable expectation of privacy in emails or faxes stored with, sent to, or received through an electronic communications service provider.").
-
(2012)
Wl
, vol.2012
, pp. 4383917
-
-
-
93
-
-
84893416084
-
United States v. Ali
-
39, D.D.C.
-
United States v. Ali, 870 F. Supp. 2d 10, 39 n.39 (D.D.C. 2012) (recognizing a reasonable expectation of privacy in the content of emails).
-
(2012)
F. Supp. 2d
, vol.870
, Issue.39
, pp. 10
-
-
-
94
-
-
84897904963
-
State v. Hinton
-
483, Wash. Ct. App.
-
See State v. Hinton, 280 P.3d 476, 483 (Wash. Ct. App. 2012) ("While Warshak does not aid Hinton, its comparison of emails with traditional forms of communication is helpful and we adopt it to hold that text messages deserve privacy protection similar to that provided for letters.").
-
(2012)
P.3d
, vol.280
, pp. 476
-
-
-
95
-
-
84893374200
-
R.S. ex rel. S.S. v. Minnewaska area sch. dist. no. 2149
-
1142, D. Minn.
-
R.S. ex rel. S.S. v. Minnewaska Area Sch. Dist. No. 2149, 894 F. Supp. 2d 1128, 1142 (D. Minn. 2012) ("The Court agrees that one cannot distinguish a password-protected private Facebook message from other forms of private electronic correspondence.").
-
(2012)
F. Supp. 2d
, vol.894
, pp. 1128
-
-
-
96
-
-
84893404036
-
Hinton
-
See Hinton, 280 P.3d at 483.email
-
P.3d
, vol.280
, pp. 483
-
-
-
97
-
-
84893353151
-
In re applications for search warrants
-
5
-
In re Applications for Search Warrants, 2012 WL 4383917, at 5.
-
Wl
, vol.2012
, pp. 4383917
-
-
-
98
-
-
84893372046
-
United States v. D'andrea
-
121-22, D. Mass.
-
United States v. D'Andrea, 497 F. Supp. 2d 117, 121-22 (D. Mass. 2007).
-
(2007)
F. Supp. 2d
, vol.497
, pp. 117
-
-
-
99
-
-
84893388894
-
United States v. Bowen
-
682, S.D.N.Y.
-
See, e.g., United States v. Bowen, 689 F. Supp. 2d 675, 682 (S.D.N.Y. 2010);
-
(2010)
F. Supp. 2d
, vol.689
, pp. 675
-
-
-
100
-
-
84893358838
-
United States v. Cioffi
-
396, E.D.N.Y.
-
United States v. Cioffi, 668 F.Supp.2d 385, 396 (E.D.N.Y. 2009);
-
(2009)
F.supp.2d
, vol.668
, pp. 385
-
-
-
101
-
-
84893351933
-
United States v. Mcdarrah
-
9-10, S.D.N.Y. July 17
-
United States v. McDarrah, 2006 WL 1997638, at 9-10 (S.D.N.Y. July 17, 2006)
-
(2006)
Wl
, vol.2006
, pp. 1997638
-
-
-
102
-
-
84893393373
-
-
2d Cir.
-
aff'd, 351 F. App'x 558 (2d Cir. 2009).
-
(2009)
F. App'x
, vol.351
, pp. 558
-
-
-
103
-
-
84893353151
-
In re applications for search warrants
-
3-5
-
But see In re Applications for Search Warrants, 2012 WL 4383917, at 3-5 (discussing the Fourth Amendment question).
-
Wl
, vol.2012
, pp. 4383917
-
-
-
104
-
-
53149122755
-
United States v. Jacobsen
-
113
-
See United States v. Jacobsen, 466 U.S. 109, 113 (1984) (noting that the Fourth Amendment does not regulate private searches).
-
(1984)
U.S.
, vol.466
, pp. 109
-
-
-
105
-
-
84880942859
-
United States v. Forrester
-
510-11, 9th Cir.
-
See United States v. Forrester, 512 F.3d 500, 510-11 (9th Cir. 2008) (holding that noncontent information such as IP addresses and the to-from information of email addresses is not protected by the Fourth Amendment).
-
(2008)
F.3d
, vol.512
, pp. 500
-
-
-
106
-
-
8744289773
-
The fourth amendment and new technologies: Constitutional myths and the case for caution
-
805, 857-87
-
See generally Orin S. Kerr, The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102 MICH. L. REV. 801, 805, 857-87 (2004) (discussing the "institutional limitations of judicial rulemaking" and the "significant institutional advantage" of legislatures with respect to the regulation of "criminal investigations involving new technologies").
-
(2004)
Mich. L. Rev.
, vol.102
, pp. 801
-
-
Kerr, O.S.1
-
107
-
-
84866672699
-
-
342
-
480 U.S. 340, 342 (1987).
-
(1987)
U.S.
, vol.480
, pp. 340
-
-
-
108
-
-
84893352560
-
Fourth amendment remedies and development of the law: A comment on camreta v. Greene and davis v. United States
-
257
-
I discussed how the Krull good-faith exception has delayed the case law on the Fourth Amendment implications of government access to email in Orin S. Kerr, Fourth Amendment Remedies and Development of the Law: A Comment on Camreta v. Greene and Davis v. United States, 2011 CATO SUP. CT. REV. 237, 257 (2011).
-
(2011)
Cato Sup. Ct. Rev.
, vol.2011
, pp. 237
-
-
Kerr, O.S.1
-
109
-
-
84882338181
-
Maryland v. Garrison
-
84-85
-
See, e.g., Maryland v. Garrison, 480 U.S. 79, 84-85 (1987) (stating that the particularity requirement allows only warrants that offer particular and specific descriptions of places that are to be searched).
-
(1987)
U.S.
, vol.480
, pp. 79
-
-
-
111
-
-
84893388731
-
-
The report is available at http://www.scribd.com/fullscreen/88465177? access-key=key-247mvzrfrh1m1azdsoai.
-
-
-
-
112
-
-
84893357537
-
In re U.S. ex rel. order pursuant to 18 U.S.C. § 2703(d), nos. 12-670, 12-671, 12- 672, 12-673
-
1, S.D. Tex. Sept. 26
-
See, e.g., In re U.S. ex rel. Order Pursuant to 18 U.S.C. § 2703(d), Nos. 12-670, 12-671, 12- 672, 12-673, 2012 WL 4717778, at 1 (S.D. Tex. Sept. 26, 2012) (noting how the lack of government protocol on collecting information from cell tower dumps raises privacy issues).
-
(2012)
Wl
, vol.2012
, pp. 4717778
-
-
-
114
-
-
84893362656
-
In re U.S. ex rel. order pursuant to 18 U.S.C. § 2703(d)
-
4
-
See In re U.S. ex rel. Order Pursuant to 18 U.S.C. § 2703(d), 2012 WL 4717778, at 4.
-
Wl
, vol.2012
, pp. 4717778
-
-
-
115
-
-
84893411447
-
In re applications for search warrants for info. associated with target email address
-
10-11, D. Kan. Sept. 21
-
In re Applications for Search Warrants for Info. Associated with Target Email Address, 2012 WL 4383917, at 10-11 (D. Kan. Sept. 21, 2012).
-
(2012)
Wl
, vol.2012
, pp. 4383917
-
-
-
116
-
-
84880942859
-
United States v. Forrester
-
510-11, 9th Cir.
-
See United States v. Forrester, 512 F.3d 500, 510-11 (9th Cir. 2008) (holding that the Fourth Amendment does not protect noncontent information such as IP addresses and the to- from information of email addresses).
-
(2008)
F.3d
, vol.512
, pp. 500
-
-
-
117
-
-
84863572580
-
Reno v. Aclu
-
849-50
-
See Reno v. ACLU, 521 U.S. 844, 849-50 (1997).
-
(1997)
U.S.
, vol.521
, pp. 844
-
-
-
118
-
-
84893418716
-
United States v. Peterson
-
492, 9th Cir.
-
See United States v. Peterson, 812 F.2d 486, 492 (9th Cir. 1987) (holding that the Wiretap Act "has no extraterritorial force");
-
(1987)
F.2d
, vol.812
, pp. 486
-
-
-
119
-
-
33748107535
-
U.S. v. Toscanino
-
279-80, 2d Cir.
-
U.S. v. Toscanino, 500 F.2d 267, 279-80 (2d Cir. 1974) (finding that the "federal statute governing wiretapping and eavesdropping has no application outside the United States" (citation omitted)).
-
(1974)
F.2d
, vol.500
, pp. 267
-
-
-
120
-
-
84893396972
-
United States v. Cotroni
-
711, 2d Cir.
-
United States v. Cotroni, 527 F.2d 708, 711 (2d Cir. 1975).
-
(1975)
F.2d
, vol.527
, pp. 708
-
-
-
121
-
-
33847392782
-
-
1369, N.D. Ga.
-
F. Supp. 2d 1363, 1369 (N.D. Ga. 2001).
-
(2001)
F. Supp. 2d
, pp. 1363
-
-
-
122
-
-
84893424459
-
No. 08-1068
-
N.D. Cal. Dec. 2
-
No. 08-1068, 2009 WL 4430297 (N.D. Cal. Dec. 2, 2009).
-
(2009)
Wl
, vol.2009
, pp. 4430297
-
-
-
123
-
-
84893418716
-
United States v. Peterson
-
492, 9th Cir.
-
citing United States v. Peterson, 812 F.2d 486, 492 (9th Cir. 1987);
-
(1987)
F.2d
, vol.812
, pp. 486
-
-
-
124
-
-
84883216054
-
Stowe v. Devoy
-
341, 2nd Cir.
-
Stowe v. Devoy, 588 F.2d 336, 341 (2nd Cir. 1978);
-
(1978)
F.2d
, vol.588
, pp. 336
-
-
-
125
-
-
33748107535
-
United States v. Toscanino
-
279, 2d Cir.
-
United States v. Toscanino, 500 F.2d 267, 279 (2d Cir. 1974).
-
(1974)
F.2d
, vol.500
, pp. 267
-
-
-
126
-
-
84893400678
-
Zhang
-
3
-
See Zhang, 2009 WL 4430297, at 3 ("ECPA did not amend the portion of the Wiretap Act that made no provision for obtaining authorization for wiretaps in a foreign country, nor did ECPA, in amending the Wiretap Act and creating the SCA, reference in any manner activities occurring outside the United States.").
-
Wl
, vol.2009
, pp. 4430297
-
-
-
127
-
-
84893342091
-
'60 minutes' report: How online gamblers unmasked cheaters
-
Nov. 30
-
See '60 Minutes' Report: How Online Gamblers Unmasked Cheaters, CNET.COM (Nov. 30, 2008), http://news.cnet.com/60-minutes-report-how-online-gamblers- unmasked-cheaters (reporting that members of the Mohawk Kahnawake nation register and service "more than 60% of the world's Internet gaming activity").
-
(2008)
Cnet.com
-
-
-
128
-
-
84893394955
-
Gmail usage per country
-
(last visited Nov. 22, 2013)
-
Gmail Usage Per Country, APPAPPEAL.COM, http://www.appappeal.com/maps/ gmail (last visited Nov. 22, 2013).
-
Appappeal.com
-
-
-
129
-
-
84893356154
-
Facebook loses 1.4 million active users in U.S.
-
Jan. 15
-
Quentin Fottrell, Facebook Loses 1.4 Million Active Users in U.S., MARKETWATCH (Jan. 15, 2013), http://articles.marketwatch.com/2013-01-15/finance/ 36346107-1-active-users-facebooksocial- media.
-
(2013)
Marketwatch
-
-
Fottrell, Q.1
-
130
-
-
84893396408
-
United States v. Ramirez
-
852, 7th Cir.
-
Courts have encountered similar questions while identifying the location of an intercept under the Wiretap Act for purposes of obtaining a wiretap order in a particular district. See United States v. Ramirez, 112 F.3d 849, 852 (7th Cir. 1997) (holding that a judge in Wisconsin was statutorily authorized to order a wiretap on a cellular phone regardless of whether the phone or listening post was located in Wisconsin).
-
(1997)
F.3d
, vol.112
, pp. 849
-
-
-
131
-
-
85028909088
-
Decrypting the fifth amendment: The limits of self- incrimination in the digital era
-
20-21
-
Vivek Mohan & John Villasenor, Decrypting the Fifth Amendment: The Limits of Self- Incrimination in the Digital Era, 15 U. PA. J. CON. L. HEIGHT. SCRUTINY 11, 20-21 (2012) ("Google Docs or Amazon's cloud-based simple storage service . . . might sometimes choose to store multiple copies of a document, or to partition a single copy of the document into separately stored fragments.").
-
(2012)
U. Pa. J. Con. L. Height. Scrutiny
, vol.15
, pp. 11
-
-
Mohan, V.1
Villasenor, J.2
-
132
-
-
84893345200
-
-
729, 9th Cir.
-
671 F.3d 726, 729 (9th Cir. 2011) ("[T]he plain language of ECPA extends its protections to noncitizens. The Court is therefore obligated to enforce the statute as written.").
-
(2011)
F.3d
, vol.671
, pp. 726
-
-
-
133
-
-
84893411292
-
Belgium-yahoo! saga continues: Yahoo! must not hand over personal data to the public prosecutor
-
Jan. 30, (last visited Nov. 22, 2013).
-
Tanguy Van Overstraeten & Ronan Tigner, Belgium-Yahoo! Saga Continues: Yahoo! Must Not Hand Over Personal Data to the Public Prosecutor, LINKLATERS (J an. 30, 2012), http://www.linklaters.com/Publications/ Publication1403Newsletter/TMT-Newsletter-January- 2012/Pages/9-Belgium-Yahoo!- saga-continues-Yahoo-personal-data-public-prosecutor.aspx (last visited Nov. 22, 2013).
-
(2012)
Linklaters
-
-
Overstraeten, T.V.1
Tigner, R.2
-
135
-
-
77952372238
-
-
3d ed.
-
See generally ORIN S. KERR, COMPUTER CRIME LAW 752-59 (3d ed. 2013) (discussing the legal regime for letters rogatory and mutual legal assistance in computer crime cases).
-
(2013)
Computer Crime Law
, pp. 752-759
-
-
Kerr, O.S.1
-
136
-
-
84893375689
-
Field guidance on new authorities that relate to computer crime and electronic evidence enacted in the usa patriot act of 2001
-
Computer Crime and Intellectual Property Section (CCIPS), Nov. 5
-
Notably, U.S. criminal laws have been expanded extraterritorially to enable U.S. assistance to foreign governments. By making a foreign crime also a crime inside the United States, investigators in the United States can open a domestic investigation and assist foreign governments when evidence happens to be located inside the United States. See Computer Crime and Intellectual Property Section (CCIPS), Field Guidance on New Authorities that Relate to Computer Crime and Electronic Evidence Enacted in the USA Patriot Act of 2001, CYBERCRIME.GOV (Nov. 5, 2001), http://web.archive.org/web/20011204213823/ (discussing the extraterritorial expansion of the Computer Fraud and Abuse Act as a way to assist foreign computer crime investigations).
-
(2001)
Cybercrime.gov
-
-
-
137
-
-
79960822184
-
Online surveillance: Remembering the lessons of the wiretap act
-
80-84
-
See Susan Freiwald, Online Surveillance: Remembering the Lessons of the Wiretap Act, 56 ALA. L. REV. 9, 80-84 (2004) (arguing that Internet surveillance should adopt the highly protective standards of the Wiretap Act).
-
(2004)
Ala. L. Rev.
, vol.56
, pp. 9
-
-
Freiwald, S.1
-
138
-
-
84893411447
-
In re applications for search warrants for info. associated with target email address, nos. 12-8119, 12-8191
-
4-5, D. Kan. Sept. 21
-
See, e.g., In re Applications for Search Warrants for Info. Associated with Target Email Address, Nos. 12-8119, 12-8191, 2012 WL 4383917, at 4-5 (D. Kan. Sept. 21, 2012) (applying Fourth Amendment protections to emails and faxes). Of course, Congress could enforce a particularity limit that is more restrictive than the constitutional limit.
-
(2012)
Wl
, vol.2012
, pp. 4383917
-
-
-
141
-
-
84893408128
-
United States v. Mcguire
-
1202, 9th Cir.
-
See United States v. McGuire, 307 F.3d 1192, 1202 (9th Cir. 2002) ("We interpret Congress's 'common sense' idea of electronic minimization to mean that law enforcement in some circumstances may look at every communication. Congress intended that the pool of investigative material be filtered.").
-
(2002)
F.3d
, vol.307
, pp. 1192
-
-
-
142
-
-
84881131018
-
The future of cybertravel: Legal implications of the evasion of geolocation
-
586-99
-
See, e.g., Marketa Trimble, The Future of Cybertravel: Legal Implications of the Evasion of Geolocation, 22 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. 567, 586-99 (2012) (discussing how geolocation tools, which currently use IP addresses, can be used to determine an Internet user's physical location).
-
(2012)
Fordham Intell. Prop. Media & Ent. L.J.
, vol.22
, pp. 567
-
-
Trimble, M.1
|