Digital Search and Seizure

From Wikipedia, the free encyclopedia

Digital Search and Seizure refers to the ability of the United States Government to obtain and read an individual's private digital correspondence and material under The Fourth Amendment of the United States Constitution.

Reasonable Expectation of Privacy[edit]

The Fourth Amendment of the United States Constitution protects against unreasonable search and seizure. Originally, remote surveillance of a person's communications, such as a telephone call, was not considered search and seizure without an "actual physical invasion" of a defendant's property.[1] However, that standard was changed by the Supreme Court in 1967 in Katz v. United States when The Court considered a case where police bugged a phone booth and listened to defendant's phone call.[2] Instead of the Fourth Amendment protecting private spaces defined by physical boundaries, The Court defined private spaces as where there is a "reasonable expectation of privacy."[2] Since Katz, additional case law has defined the scope of "reasonable expectation of privacy" to include cellphones[3] and location data gathered by cellphones.[4]

Reasonable Expectation of Privacy on the Internet[edit]

To keep up with the application of the Fourth Amendment to the internet, law enforcement is taught to consider a computer or cellphone as a closed container like a file cabinet, which are protected under the Fourth Amendment.[5] If someone gives away their computer they lose Fourth Amendment protection; unless they retain control over the computer, such as temporarily leaving it with a friend for safekeeping.[5]

While caselaw can establish specific examples of when there is a reasonable expectation of privacy, the nature of the internet makes the application of the Fourth Amendment complicated.[6] First, when there is a reasonable expectation of privacy is difficult to determine because internet users constantly disclose information to third parties, such as Internet Service Providers, as part of the regular functioning of the internet.[6] Second, ISPs are required to turn over records by a court order such as a subpoena.[6] Subpoenas do not have the same threshold of probable cause as required by search warrants under the Fourth Amendment.[6] Lastly, ISPs are generally private entities, therefore they can voluntarily search their users records and voluntarily turn them over to the government without violating the Fourth Amendment.[6]

Legal Protections[edit]

However, there are federal laws that apply Fourth Amendment principles to the internet age. One such law is the Stored Communications Act which protects against search and seizure of digital information stored in memory.[7] A search warrant is required to obtain the contents of an unread electronic communication that has been in storage for 180 days or less.[7] A search warrant, a subpoena with notice, or court order meeting certain specifications is required to obtain the contents of an unread electronic communication in storage for more than 180 days, or a read electronic communication.[7]

Additionally, a network provider may not voluntarily disclose the content of an electronic communication except when: (1) disclosure is to the intended recipient or (2) someone who needs the information to send the data to the intended recipient, (3) the originator gives consent, (4) the provider needs to protect its interests (i.e. in case of a data breach), (5) the content contains child pornography, (6) the provider accidentally discovers evidence to a crime, (7) there is a serious emergency, or (8) otherwise provided by law.[7] There are no federal regulations governing electronic search and seizure, but the FCC requires international common carriers to make their communications with parties in the United States in a form that subjects them to the Stored Communications Act, the Wiretap Act, and the Pen Register and Trap and Trace Statute.[8]

References[edit]

  1. ^ Olmstead v. United States, 277 U.S. 438, 466 (1928)
  2. ^ a b Katz v. United States, 389 U.S. 347 (1967)
  3. ^ Riley v. California, 134 S. Ct. 2473 (2014)
  4. ^ Carpenter v. United States, No. 16-402, — U.S. — (June 22, 2018)
  5. ^ a b Office of Legal Education Executive Office for United States Attorneys, Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, The United States Department of Justice (2010), available at https://www.justice.gov/criminal-ccips/ccips-documents-and-reports .
  6. ^ a b c d e Orin S. Kerr, A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It, 72 GEO. Wash. L. REV. 1208, 1212 (2004).[1]
  7. ^ a b c d 18 U.S.C § 2701 - Unlawful Access to Stored Communications, The Stored Communications Act
  8. ^ 47 C.F.R. § 63.18 - Contents of Applications for International Common Carriers. [2]