{"id":234493,"date":"2017-08-13T21:09:45","date_gmt":"2017-08-14T01:09:45","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/to-apply-the-fourth-amendment-in-the-digital-age-go-back-to-its-text-cato-institute-blog.php"},"modified":"2017-08-13T21:09:45","modified_gmt":"2017-08-14T01:09:45","slug":"to-apply-the-fourth-amendment-in-the-digital-age-go-back-to-its-text-cato-institute-blog","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/fourth-amendment-2\/to-apply-the-fourth-amendment-in-the-digital-age-go-back-to-its-text-cato-institute-blog.php","title":{"rendered":"To Apply the Fourth Amendment in the Digital Age, Go Back to Its Text &#8211; Cato Institute (blog)"},"content":{"rendered":"<p><p>    Timothy Carpenter and Timothy Sanders were    convicted in federal court on charges stemming from a string of    armed robberies in and around the Detroit area. They appealed    on the ground that the government had acquired detailed records    of their movements through cell site location information    (CSLI) from their wireless carriers in violation of the    Fourth Amendment. The U.S. Court of Appeals for the Sixth    Circuit turned their appeal aside, finding that [t]he    governments collection of business records containing these    data  is not a search.  <\/p>\n<p>    The Fourth Amendment states that [t]he    right of the people to be secure in their persons, houses,    papers, and effects, against unreasonable searches and    seizures, shall not be violated. Presumably, when called on to    determine whether a Fourth Amendment violation has occurred,    courts would analyze the elements of this language as follows:    Was there a search? Was there a seizure? Was any such search or    seizure of their persons, houses, papers, [or] effects? Was    any such search or seizure reasonable?  <\/p>\n<p>    In cases involving familiar physical    objects, they usually do. In harder cases dealing with    unfamiliar items such as communications and data, however,    courts retreat to the Supreme Courts reasonable expectation    of privacy doctrine that emerged from Katz v. United    States (1967). The Court has decided to review the    important criminal-procedure and digital-privacy issues    here.  <\/p>\n<p>    Cato and the Competitive Enterprise    Institute, joined by Reason Foundation and the Committee for    Justice, filed anamicus    brief urging the Court to return to the text of the Fourth    Amendment. The reasonable expectation of privacy test is    outdated because it lacks a strong connection to the text and    asks courts to conduct a sociological exercise rather than a    judicial one. This is especially true in the context of new    technology, where societal expectations have not been fully    formed yet and will change based on the Courts judgment,    leading to circular reasoning.  <\/p>\n<p>    Courts have also used the reasonable    expectation of privacy test to undermine the very things the    Fourth Amendment was designed to protect. For instance, dog    sniffs looking for drugs have been said to not compromise any    legitimate interest in privacy because they are only looking    for contraband. But just because a search is designed to look    for illegal activity doesnt mean that the Fourth Amendment is    inapplicable.  <\/p>\n<p>    Likewise with the third-party doctrine,    which holds that constitutional protections stop when protected    information is shared.  <\/p>\n<p>    The Carpenter case deals with information    about a persons location for more than 100 days, and yet the    government claims that no privacy is violated when it seizes    and searches that data. The Court should return to the text of    the Fourth Amendment and recognize that data and digital    communication are property that are protected by the papers and    effects part of the Fourth Amendment, as it did in Riley v.    Californiathe 2014 case where the justices unanimously    required a warrant for searching a phone seized during an    arrest.  <\/p>\n<p>    Here, the government ordered the information    on Mr. Carpenters location turned over (a seizure) and then    processed that data for the location of the defendants (a    search). The defendants had a contract with the phone company    prohibiting the distribution of the data and the Court should    recognize the property interest that the defendants had based    on that contract.  <\/p>\n<p>    In sum, the Fourth Amendment presumes that a    warrant is required but for exceptional circumstances. There    was no exigency that threatens the destruction of the data    here, threat to officer safety, or any other reason that law    enforcement officers could not get a warrant if they had    probable cause. Focusing on the actual text of the Fourth    Amendment demonstrates that the governments actions here    violated the Fourth Amendment.  <\/p>\n<p>    The Supreme Court will    hearCarpenter v. United States this fall.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.cato.org\/blog\/apply-fourth-amendment-digital-age-go-back-its-text\" title=\"To Apply the Fourth Amendment in the Digital Age, Go Back to Its Text - Cato Institute (blog)\">To Apply the Fourth Amendment in the Digital Age, Go Back to Its Text - Cato Institute (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Timothy Carpenter and Timothy Sanders were convicted in federal court on charges stemming from a string of armed robberies in and around the Detroit area.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/fourth-amendment-2\/to-apply-the-fourth-amendment-in-the-digital-age-go-back-to-its-text-cato-institute-blog.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261461],"tags":[],"class_list":["post-234493","post","type-post","status-publish","format-standard","hentry","category-fourth-amendment-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/234493"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=234493"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/234493\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=234493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=234493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=234493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}