{"id":210438,"date":"2017-08-08T03:52:33","date_gmt":"2017-08-08T07:52:33","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/the-fourth-amendments-digital-update-the-daily-caller\/"},"modified":"2017-08-08T03:52:33","modified_gmt":"2017-08-08T07:52:33","slug":"the-fourth-amendments-digital-update-the-daily-caller","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/fourth-amendment\/the-fourth-amendments-digital-update-the-daily-caller\/","title":{"rendered":"The Fourth Amendment&#8217;s Digital Update &#8211; The Daily Caller"},"content":{"rendered":"<p><p>    The Fourth Amendment has protected our right to privacy since    its ratification in 1791. Thetextof    the amendment reads, the right of the people to be secure in    their persons, houses, papers, and effects, against    unreasonable searches and seizures, shall not be violated, but    how well do these protections hold up in the digital age?  <\/p>\n<p>    Today, most of us are typing emails on our laptops, not    scribbling a letter with a quill and inkwell. Therefore, its    important to ensure our sensitive, digital communications are    well-protected. Clearly, the Fourth Amendment transcends time    and technological change, but some sinister players are    pretending otherwise.  <\/p>\n<p>    Currently, under theElectronic    Communications Privacy Act(ECPA), the United States    federal government may seize any citizens private email    communicationswithout    a warrant, provided they are over 180 days old. By law,    these older emails are not considered privy to a reasonable    expectation of privacy under the ECPAsSection    2703(a).  <\/p>\n<p>    Even worse, the ECPA was enacted in 1986, years before email    usage was even widespread. However, the 180-day rule doesnt    just apply to emailsevery Americans texts, GroupMe chats, and    Facebook messages are fair game too.  <\/p>\n<p>    Its time to modernize the Fourth Amendment to protect our    online communications, and bipartisanThe    Email Privacy Act, re-introduced by Reps. Kevin Yoder    (R-KS) and Jared Polis (D-CO), does just that. Namely, the    Email Privacy Act would require all government agencies to    acquire a warrant before accessing any online communications    over 180 days oldjust like any other private documents.  <\/p>\n<p>    In the era of cloud technology, communications could be stored    on enormous server, conceivably forever. More and more, our    sensitive financial, relational, and personal details exist    online, making their security absolutely essential.  <\/p>\n<p>    The ECPA is problematic in other areas as well. In December of    2013, federal law enforcement sought asearch    warrantfor Microsoft customers email account as a    component of a criminal narcotics investigation. Microsoft    complied up until a point, but there was one big problemthe    actual emails were stored overseas.  <\/p>\n<p>    Microsoft refused to turn the emails over, and was held in    civil contempt by the district court. Three years later, however, the Second    Circuit Court of Appeals ruled against the federal government,    expressing that companies cannot be compelled to release    customer emails stored outside the United States.  <\/p>\n<p>    We conclude that  2703 of the Stored Communications Act does    not authorize courts to issue and enforce against USbased    service providers warrants for the seizure of customer email    content that is stored exclusively on foreign servers, the    courtruled.  <\/p>\n<p>    TheInternational    Communications Privacy Act (ICPA) is one potential solution    to this issue, creating, a legal framework that clarifies the    ability of law enforcement to obtain electronic communication    of U.S. citizens, no matter where the person or the    communications are located.  <\/p>\n<p>    Additionally, the ICPA would allow law enforcement to obtain    communications from foreign nationals, in consistency with    international law. Sponsored by Senators Orrin Hatch (R-UT),    Chris Coons (D-DE), and Dean Heller (R-NV), the bipartisan    legislation would remedy this complex problem.  <\/p>\n<p>    The International Communications Privacy Act aids law    enforcement while safeguarding consumer privacy, striking    amuch-needed balance in todays data-driven economy,    Senator Hatchstated.    Clearly, Americans can no longer be complacent about their    privacy protections. In a digital age of prying eyes, the    consequences of privacy violations can be costly, and    long-lasting.  <\/p>\n<p>    On June 23rd, the    Department of Justiceapplied    to take the Microsoft case to the Supreme Court, but Congress    shouldnt wait for the court to take action. Passing the ICPA    and other meaningful reform is too important to wait, when    innocent Americans are being caught in the crossfire.  <\/p>\n<p>    One way or another, its time to give the Fourth Amendment a    sorely needed update.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/dailycaller.com\/2017\/08\/07\/the-fourth-amendments-digital-update\/\" title=\"The Fourth Amendment's Digital Update - The Daily Caller\">The Fourth Amendment's Digital Update - The Daily Caller<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The Fourth Amendment has protected our right to privacy since its ratification in 1791. Thetextof the amendment reads, the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, but how well do these protections hold up in the digital age?  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/fourth-amendment\/the-fourth-amendments-digital-update-the-daily-caller\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94879],"tags":[],"class_list":["post-210438","post","type-post","status-publish","format-standard","hentry","category-fourth-amendment"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/210438"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=210438"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/210438\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=210438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=210438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=210438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}