Chapter 20 ThirdParty Records and Data Mining Part

  • Slides: 32
Download presentation
Chapter 20 - Third-Party Records and Data Mining Part I

Chapter 20 - Third-Party Records and Data Mining Part I

Whalen v. Roe, 429 U. S. 589 (1977) n "We are not unaware of

Whalen v. Roe, 429 U. S. 589 (1977) n "We are not unaware of the threat to privacy implicit in the accumulation of vast amounts of personal information in computerized data banks or other massive government files. . The right to collect and use such data for public purposes is typically accompanied by a concomitant statutory or regulatory duty to avoid unwarranted disclosures. Recognizing that in some circumstances that duty arguably has its roots in the Constitution, nevertheless New York’s statutory scheme, and its implementing administrative procedures, evidence a proper concern with, and protection 2 of, the individual’s interest in privacy. "

Smith v. Maryland - The Pen Register n n Looking back at this case,

Smith v. Maryland - The Pen Register n n Looking back at this case, what is the court really saying about a reasonable expectation of privacy? What does the court see within the ambit of a reasonable expectation of privacy? Is it really an original intent approach, i. e. , is the court looking to what the founders through of as personally private? Has the Court always recognized a right 3

United States Dept. of Justice v. Reporters Comm. for Freedom of the Press, 489

United States Dept. of Justice v. Reporters Comm. for Freedom of the Press, 489 U. S. 749 (1989) n n What is theory of expectation of privacy through obscurity? Is this really an administrative cost argument for expectation of privacy? How has the world changed since this opinion? Is this still a useful theory, or have we given up expectations of privacy based on administrative costs? 4

What would Jefferson have seen within the scope of privacy? n n n Letters?

What would Jefferson have seen within the scope of privacy? n n n Letters? His personal dwelling? His dealings with his bank? 5

Does the Public's Expectation of Privacy Match the Court's? n n n If your

Does the Public's Expectation of Privacy Match the Court's? n n n If your employer can read it, can the government? Banking records? Transactions in general? Do you think the general public thinks their banking records are private? n Their email? n Their tweets? Why are transactions so valuable for intelligence? Should the use of encryption be seen as probable cause for the government to go after 6

Data Mining n n n What is data mining? n What about encryption -

Data Mining n n n What is data mining? n What about encryption - how do transactions escape this? Why is it so important commercially? n What is the business model for Gmail? n What about companies that buy your credit card and grocery store data? Are there restrictions on private data mining? n Why does this make limits on governmental data mining ineffective? 7

National Security Letters n n Are these issued by a judge? n Are these

National Security Letters n n Are these issued by a judge? n Are these just administrative subpoenas with benefits? National Security Letter on page 560 n What does paragraph 3 (readable paragraphs) provide? n Does this apply to the entity's lawyer? n Does that raise constitutional issue? 8

Library records n n Why is access to library check out records so controversial?

Library records n n Why is access to library check out records so controversial? How about video store rentals? Netflix? Online porn? 9

The Patriot Act n n Patriot Act Improvement limited access to library records, but

The Patriot Act n n Patriot Act Improvement limited access to library records, but did not end access: n It left libraries subject to § 215 orders, however, although it also limited the number of FBI officials who could approve § 215 applications for library records, It also limited access to: ‘‘book sales records, book customer lists, firearms sales records, tax return records, educational records, or medical records containing information that would identify a person. ’’ 10

Doe v. Ashcroft (Doe I), 334 F. Supp. 2 d 471 (2004) n Doe

Doe v. Ashcroft (Doe I), 334 F. Supp. 2 d 471 (2004) n Doe was ‘‘directed’’ to provide certain information to the Government. As required by the terms of § 2709, in the NSL the FBI ‘‘certif[ied] that the information sought [was] relevant to an authorized investigation to protect against international terrorism or clandestine intelligence activities. ’’ Doe was ‘‘further advised’’ that § 2709(c) prohibited him, or his officers, agents, or employees, ‘‘from disclosing to any person that the FBI has sought or obtained access to information or records under these provisions. ’’ Doe was ‘‘requested to provide records responsive to [the] request personally’’ to a designated individual, and to not transmit the records by mail or even mention the NSL 11 in any telephone conversation. .

Who is Doe? n n n What type of records are requested? Who should

Who is Doe? n n n What type of records are requested? Who should be worried about this NSL? n What is Doe's concern? Does this include email content? Is this information protected by law or is there a constitutional expectation of privacy? How was Doe to provide the requested records? 12

Getting the Content of Email n If the Government gives prior notice to the

Getting the Content of Email n If the Government gives prior notice to the subscriber, or otherwise complies with certain delayed notice procedures, the Government may also subpoena the contents of electronic communications which are either (1) retained on a system for storage purposes (e. g. , opened email which remains on an ISP’s server), or (2) retained, for more than 180 days, in intermediate or temporary storage (e. g. , unopened email on an ISP’s server). For the Government to obtain the contents of electronic communications kept for 180 days or less in intermediate or temporary storage (e. g. , unopened email on an ISP’s server), it must obtain a search warrant under Federal Rule of Criminal Procedure 41, 13 or the state equivalent.

Alternative to NSL: Administrative Subpoenas n Courts will enforce the subpoena as long as:

Alternative to NSL: Administrative Subpoenas n Courts will enforce the subpoena as long as: n (1) the agency’s investigation is being conducted pursuant to a legitimate purpose, n (2) the inquiry is relevant to that purpose, n (3) the information is not already within 14 the agency’s possession, and

Alternative to NSL: Criminal Subpoenas n n Does a judge have to make probable

Alternative to NSL: Criminal Subpoenas n n Does a judge have to make probable cause determinations before a criminal subpoena is issued? n How do you get judicial review? Why are the standards different from search warrants? n How is the execution of the orders different? n Why does this allow a different path for 15 judicial review?

FISA Warrants n n n Can you get this info with a FISA warrant?

FISA Warrants n n n Can you get this info with a FISA warrant? Can you get the content of email? n Letters? n Phone calls? Why not use a FISA warrant? 16

National Security Letter Procedure n n Why not just use administrative warrants or criminal

National Security Letter Procedure n n Why not just use administrative warrants or criminal warrants? n Why have a secrecy provision? n Who might Doe tell that would upset the feds? n How is this handled with criminal warrants? Does the FBI count on people being less 17 likely to contest an NSL?

Contesting an NSL n n Does the statute forbid judicial review? n Would that

Contesting an NSL n n Does the statute forbid judicial review? n Would that be constitutional? How does the agency intimidate recipients to avoid review? n How was Doe contacted? n How was he told to deliver the records? n What about talking to others? n What would a reasonable non-lawyer 18

Is Intimidation a Legal Issue? n n Roughly how many NSLs had been issued

Is Intimidation a Legal Issue? n n Roughly how many NSLs had been issued by the time of this case? How many had been contested in court? What did the judge conclude from this? What did he rule about using § 2709 in this manner? 19

Does § 2709 Violate Subscriber's Rights? n n n What are the 1 st

Does § 2709 Violate Subscriber's Rights? n n n What are the 1 st Amendment issues with getting email addresses? n How is this different from access to bank records and other transaction records? What are potential examples? What about header information, such as subject? n What about info on reading blogs, postings to lists, web sites visited, tweets read, etc? n What issues do these raise? n How is this different from pen registers? 20

Anonymous Internet Speech and Associational Activity n n n Should this be a constitutional

Anonymous Internet Speech and Associational Activity n n n Should this be a constitutional right? What if you attack others? What did the judge think? Are the protections of § 2709 adequate? Does the judge say that it could never meet the standard? 21

Is the Non-Disclosure Provision Unconstitutional? n n Section 2709(c) states: n ‘No wire or

Is the Non-Disclosure Provision Unconstitutional? n n Section 2709(c) states: n ‘No wire or electronic communication service provider, or officer, employee, or agent thereof, shall disclose to any person that the Federal Bureau of Investigation has sought or obtained access to information or records under this section. ’ Is this a prior restraint or content 22

Is § 2709(c) a Prior Restraint? n First, axiomatically the categorical nondisclosure mandate embodied

Is § 2709(c) a Prior Restraint? n First, axiomatically the categorical nondisclosure mandate embodied in § 2709(c) functions as prior restraint because of the straightforward observation that it prohibits speech before the speech occurs. As the Supreme Court articulated the threshold inquiry: ‘‘The relevant question is whether the challenged regulation 23

Can § 2709(c) be Fixed by the Agency? n n Does § 2709(c) give

Can § 2709(c) be Fixed by the Agency? n n Does § 2709(c) give the agency discretion to adopt a balancing test for governmental needs versus 1 st Amendment rights? Are there allowable restrictions on 1 st Amendment activities? 24

Warshak v. U. S. , 490 F. 3 d 455 (6 th Cir. (Ohio)

Warshak v. U. S. , 490 F. 3 d 455 (6 th Cir. (Ohio) Jun 18, 2007) n n Plaintiff seeks a declaratory judgment (facial challenge) that the provisions of the Stored Communications Act (SCA) allowing administrative subpoenas to his ISP for his emails is unconstitutional. Plaintiff learned that emails had been released to the government and sought declaratory judgment and an injunction on behalf of himself and all other email users. 25

The Statute n Therefore the standard necessary to obtain an order under the [Stored

The Statute n Therefore the standard necessary to obtain an order under the [Stored Communications Act (SCA), 18 U. S. C. §§ 2701 - 2712] – that the government introduce “specific and articulable facts showing that there are reasonable grounds to believe that the contents” of the e-mail to be seized “are relevant and material to an ongoing criminal investigation” [18 U. S. C. § 2705(d)] – is permissible as the functional equivalent of a subpoena given the subject’s ability to contest the order in court. Because this standard is lower than the probable cause standard necessary to obtain a search warrant, it is sufficient to justify a warrantless search only in instances where notice is provided to the 26 account holder.

The Expectation of Privacy in Email n n Why are analogies between ISPs and

The Expectation of Privacy in Email n n Why are analogies between ISPs and the post office misguided? Why is there no expectation of privacy in bank records? How does this court see email as different from bank records? What about email in the hands of a recipient? 27

The Nature of the Expectation n n How much of this expectation of privacy

The Nature of the Expectation n n How much of this expectation of privacy is due to statutes? n What if those changed? n What if the court said they did not apply for national security investigations? Do you have an expectation of privacy if there any exceptions? 28

The Court's Assumption n n Like telephone conversations, simply because the phone company or

The Court's Assumption n n Like telephone conversations, simply because the phone company or the ISP could access the content of e-mails and phone calls, the privacy expectation in the content of either is not diminished, because there is a societal expectation that the ISP or the phone company will not do so as a matter of course. What is the most common 29

The Contract with the ISP n n Why does the contract with the ISP

The Contract with the ISP n n Why does the contract with the ISP matter? What about email on the employer's computer? What about email on the University system? Does it matter whether the ISP really looks at the email, or only has the right to? 30

Warshak v. U. S. , 532 F. 3 d 521 (6 th Cir. (Ohio)

Warshak v. U. S. , 532 F. 3 d 521 (6 th Cir. (Ohio) Jul 11, 2008) n n n The appeals court vacated the previous opinion It applied an Abbott Labs analysis and rejected the facial challenge to the SCA n It found that the plaintiff had not made a proper showing under Abbott of imminent harm It found that he had two ways of attacking the subpoenas 31 n Motion to exclude evidence

Breaking News: U. S. v. Warshak, 631 F. 3 d 266 (6 th Cir.

Breaking News: U. S. v. Warshak, 631 F. 3 d 266 (6 th Cir. (Ohio) n n Warshak was convicted based on the evidence in his emails. He appealed and the court found that his case was now ripe. n The court found he did have an expectation of privacy in his emails under the Stored Communications Act. n However, since the government was acting in good faith when it got his email, the evidence was not excluded. 32