Law in the Internet Society

I. Introduction

As acknowledged in United States v. Jones, Fourth Amendment jurisprudence must evolve with advances in technology. However, the Supreme Court has yet to accept a case involving Fourth Amendment protections for email (only one circuit has held that citizens have a reasonable expectation of privacy in their email). Without clear guidance on how Fourth Amendment jurisprudence is applied to these advances in technology, the legislative branch is likely to provide too little protection. Perhaps this reticence to accept cases is due to a belief that a legislative body is better situated to “gauge changing public attitudes, to draw detailed lines, and to balance privacy and public safety in a comprehensive way.” Jones v. United States, 132 S.Ct 945, 964 (2012) (Alito, Concurring in the Judgment). However, I would argue that courts must provide guidance on how Fourth Amendment jurisprudence applies to the net in order to instruct legislatures on the proper balance in this area. Just as in Jones where the application of Fourth Amendment jurisprudence to a Global-Positioning System (GPS) tracking device attached to an automobile remained unclear, the complexity of advances in the net requires court attention

II. Institutional Competence of Courts

In Jones, Justice Alito, concurring in the judgment, argued legislative bodies may possess the institutional competence to best balance privacy and public safety in light of changes in technology. Deferring judgment to the wisdom of Congress is the wrong approach for at least three reasons. First, Congress is susceptible to capture by interest groups keen on weakening privacy protections. Smaller, well-organized groups with a more particularized interest are more likely to capture institutional power to achieve their goals. In this case, law enforcement is likely to extensively lobby for reduced Fourth Amendment protections in the net. As we have seen with the recent defeat of the Stop Online Piracy Act (SOPA), grass-roots movements to defeat particularized interest groups are possible. However, it is likely to be a much more difficult fight when the threat of reduced security argues for limited Fourth Amendment protections in cyberspace. Second, Congressional action in the near-term on privacy protections in cyberspace is unlikely. Very few bills introduced in Congress are ever passed. Further, with likely republican control in the house and democratic control in the senate and presidency in the near-term, Fourth Amendment protections in cyberspace are unlikely to be addressed. Thus, courts remain the only realistic forum for addressing overreach by law enforcement. Privacy expectations in the net are still being shaped. The longer the question of Fourth Amendment protections in the net is put on hold, the more likely privacy protections will be reduced. Abuses of privacy expectations by law enforcement and privacy policies of internet sites may set the new norm and entrench expectations of privacy in the net, having drastic and negative consequences for Fourth Amendment protections citizens would currently expect. Further, Congress has already expressed a willingness to sacrifice Fourth Amendment protections in the name of security. Consider the recent extension of the Foreign Intelligence Surveillance Amendments Act (FISAA).

III. Criticisms

It has been argued that judges lack the technical knowledge to make well informed decisions concerning trade-offs between privacy and security. However, can it be said that the members of Congress are more knowledgeable than judges? Congress may benefit from information provided by lobbyists and hearings on the matter, however these benefits are likely to skew in favor of too little protection. As previously mentioned, groups interested in restrictive standards for privacy in the net are likely to coopt the process in favor of security rather than Fourth Amendment protections. Further, if we trust judges to acquire complex knowledge of technology in the intellectual property space, why could they not acquire the rudimentary knowledge necessary to make decisions about how technology and society’s expectation of privacy interact? However, determination of Fourth Amendment rights in cyberspace by courts is likely to produce mixed results. First, the third-party doctrine which holds that a warrant is not required to obtain information released to a third-party must be re-examined in light of the way data is shared and stored in the net. In the context of the net, user-data is often freely given to third parties and hosted on third party servers. Further, in order to create accounts on various sites on the net, users are required to agree to privacy policies. These policies often state that the third-party has access to user data for to the auditing or monitoring purposes. Courts should be willing to acknowledge that these advances in technology may become “so pervasive that some persons may consider it to be an essential means or necessary instrument for self-expression, even self-identification.” United States v. Warshak, 631 F.3d 266, (6th Cir. 2010). However, just because users may be willing to give up limited privacy for one purposes, this does not mean that they are willing to give it up for all purposes. Thus, as acknowledged in Jones, the third-party doctrine should be re-examined and adjusted for the way information is shared on the net. Courts have been reluctant to adapt exceptions for warrantless searches to advances in technology. For example, many courts have permitted cellphones to be considered as “containers” for purposes of the search-incident-to-arrest exception for warrantless searches. Such an interpretation enables law enforcement access to an unprecedented volume of private data which has nothing to do with the traditional concerns of law enforcement safety. However, cramped reasoning by analogy have led courts astray in determining the appropriate level of Fourth Amendment protections.

IV. Conclusion

Although neither solution is perfect, courts rather than legislative bodies are the best option for creating privacy protections matching societal expectations. Congress has already bought into the false dichotomy between privacy and security, and would be susceptible to influence from well-organized law enforcement groups which do not share societal expectations of privacy. Further, such challenges to law enforcement action must be heard sooner rather than later before societal expectations are shaped.

Navigation

Webs Webs

r4 - 23 Aug 2014 - 19:33:51 - EbenMoglen
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM