{"id":211819,"date":"2017-08-15T11:53:50","date_gmt":"2017-08-15T15:53:50","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/how-private-is-your-cellphone-the-next-fourth-amendment-challenge-crime-report-subscription\/"},"modified":"2017-08-15T11:53:50","modified_gmt":"2017-08-15T15:53:50","slug":"how-private-is-your-cellphone-the-next-fourth-amendment-challenge-crime-report-subscription","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/fourth-amendment\/how-private-is-your-cellphone-the-next-fourth-amendment-challenge-crime-report-subscription\/","title":{"rendered":"How Private is Your Cellphone? The Next Fourth Amendment Challenge &#8211; Crime Report (subscription)"},"content":{"rendered":"<p><p>    Most people know that very little they do on the web is    private. The terabytes of data held online contain personal    information accessible not only to friends, relatives and    would-be employers, but to private businesses, which frequently    collect user information in order to deliver better services to    customers.  <\/p>\n<p>    Can the government see it too?  <\/p>\n<p>    In 1979, the Supreme Court ruled in Smith v.    Marylandthat Fourth Amendment protections    against warrantless searches do not cover such third party    access to online data. In what has since been developed as the    Third Party Doctrine, the court ruled that an individual has    no legitimate expectation of privacy for information    voluntarily given to athird partybe it a person, bank,    or phone carrierinformation that is also then similarly    available to government agencies.  <\/p>\n<p>    But what are government agencies, such as law enforcement,    constitutionally permitted to do with the data they    collect? A case before the Court next month may help    answer the question.  <\/p>\n<p>        Carpenter v. United States has the potential to    affect application of the Fourth Amendments Third Party    Doctrine in the digital age.  <\/p>\n<p>    The case involves a string of robberies, allegedly organized by    the defendant, Timothy Carpenter, which occurred over a    two-year period. Police acquired cell site location information    (CSLI) associated with the phone he used. Although no search    warrant was ever obtained, a judge did sign a court order under    the Stored    Communications Act, a statute that requires reasonable    suspicion, not probable cause.  <\/p>\n<p>    The CSLI records revealed Carpenters location and movements    over 127 days and showed that during the five-month period his    phone was in communication with cell towers near the crime    scenes.  <\/p>\n<p>    Although there is a tendency to read Smith v. Maryland    as a blanket rule, where anything given to or accessed by a    third party has no Fourth Amendment interest, it doesnt make    sense to apply a doctrine created over 30 years ago to types of    communications and data that were neither used at the time nor    contemplated by the Court.  <\/p>\n<p>      Deanna Paul    <\/p>\n<p>    Given how much [of] our data goes through third parties, if    you take a strong reading of the Doctrine, it essentially wipes    out Fourth Amendment protections for most modern    communications, Michael Price, Senior Counsel for the Liberty    and National Security Program at New York Universitys Brennan Center for Justice,    told me.  <\/p>\n<p>    There is also nothing about location information in    Smith. To rely on it, and say that location    information should be accessible without a warrant, is reading    the case far too broadly.  <\/p>\n<p>    Prices point is an important one.  <\/p>\n<p>    To analogize cases is to suggest they should be treated the    same under the law and receive the same level of protection.    Although the facts may specifically involve cell-site    information, Carpenter is about more than just    location privacy. Here, as is increasingly the case with    Internet-of-Things-based prosecutions, a third-party server    already had access to the sought after location data.  <\/p>\n<p>    Carpenter presents the first chance for the Court to    reconsider Fourth Amendment protections against warrantless    searches and seizures of information generated and collected by    the many modern technologies we use every day.  <\/p>\n<p>    This is an opportunity at least one Supreme Court Justice has    recognized.  <\/p>\n<p>    In 2012, the Court resolved the issue of location privacy in    United    States v. Jones, holding that installation of a Global    Positioning System (GPS) tracking device on a vehicle and using    it to monitor the vehicles movements constitutes a search    under the Fourth Amendment. In her concurrence, Justice Sonia    Sotomayor wrote that the current approach to these cases is    ill-suited to the digital age, in which people reveal a great    deal of information about themselves to third parties in the    course of carrying out mundane tasks  <\/p>\n<p>    She suggested it may need to be rethought in the future.  <\/p>\n<p>    There are signs from recent cases, like    Jones, that the Justices are aware of the    importance of technology in contemporary life. They appear to    recognize that technology is significantly different today than    it was ten years ago, let alone when the Court was deciding    cases like Smith.  <\/p>\n<p>        Riley v. California was the first time the Supreme    Court identified the central role that cellphones have in    todays society, holding that police need a warrant to search a    smart phone belonging to a person who has been arrested.    Writing for the majority in 2014, Chief Justice John    Roberts said that cell phones have such a pervasive and    insistent part of daily life that the proverbial visitor from    Mars might conclude they were an important feature of human    anatomy.  <\/p>\n<p>    The Riley Court went on to say that cellular phones    have become essential to freedom of speech and First Amendment    rights and, due to the volume and personal nature of the    information that can be stored on a cellphone, the data should    be presumptively protected by the First Amendment. The decision    notes that a cell phone can double as a diary, camera,    calendar, or newspaper, which makes the search of one    fundamentally different from a physical search or even a search    of business records.  <\/p>\n<p>    This is an important decision, in terms of First Amendment    protections, showcasing the Supreme Courts comfort with new    technology and that it is cognizant of the impact of digital    information, said Andrew Ferguson of the David A. Clarke    School of Law at the University of District Columbia, and a    national expert on predictive policing and the Fourth    Amendment,  <\/p>\n<p>    See also:Digital    Privacy Rights of Probationers  <\/p>\n<p>    Similarly, earlier this year, the Court decided     Packingham v. North Carolina, which addressed the    prevalence and necessity of the internet and social media in a    digitized society.  <\/p>\n<p>    Riley embodies the idea that new technologies and the    digital space are different, yet fails to view these devices    for what they are rather than what theyre most similar to. A    cell phone is not a diary, calendar or any of the technologies    cited by by the Court, and to draw a series of    slightly-off-the-mark analogies and suggesting they should be    treated the same, is not a solution.  <\/p>\n<p>    In reviewing Carpenter, there are only a few scenarios    for the Courteach of which will have lasting implications.  <\/p>\n<p>    The Court might opt to temporarily put tape over the problem,    hiding behind the Third Party Doctrine and wait for the next    case to make its way up.  <\/p>\n<p>    Or it could limit the Doctrines application to CSLI and    recognize that carrying a cellular phone does not, in and of    itself, amount to consenting to location tracking.  <\/p>\n<p>    One of the difficulties the Court is confronted with is that    the Doctrine, as its been created, doesnt offer a nice neat    answer, said Ferguson. The Court may have to rethink their    traditional approach to the Fourth Amendment in order to    address this new technological threat to privacy and security.  <\/p>\n<p>    The other difficulty is: If Carpenter is really about    the future of the Third Party Doctrine, it is about far more    than just cell site recordsit is about the future of a    data-driven third party mediated age.  <\/p>\n<p>    That is a huge question to answer. And, due to the far-reaching    consequences any of the scenarios the Court may chose, the    Court may also just decide to punt it to a future case.  <\/p>\n<p>    There are few things we do online that arent connected, in    some way, to a third party. As smartphone technology continues    to advance, more and more aspects of our lives will be recorded    and stored on third-party servers. Lower courts across the    country are only just beginning to consider how the Internet of    Things will affect our expectations of privacy.  <\/p>\n<p>    Carpenter is an opportunity for the Supreme Court to    reconceive how privacy and security values can be protected in    an era of increasingly sophisticated surveillance technologies    that allow us to remotely control the lights and heat in our    homes or monitor intruders.  <\/p>\n<p>    Lets hope the Justices take it.  <\/p>\n<p>    Deanna Paul (@thedeannapaul) is    a former New York City prosecutor and adjunct professor of    trial advocacy at Fordham University School of Law. This fall    she will begin attending Columbia Universitys graduate school    of journalism. Her nonfiction work has been published by    The Marshall Project, Rolling Stone, and    WIRED.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/thecrimereport.org\/2017\/08\/15\/cyber-privacy-and-police-the-next-fourth-amendment-challenge\/\" title=\"How Private is Your Cellphone? The Next Fourth Amendment Challenge - Crime Report (subscription)\">How Private is Your Cellphone? The Next Fourth Amendment Challenge - Crime Report (subscription)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Most people know that very little they do on the web is private. The terabytes of data held online contain personal information accessible not only to friends, relatives and would-be employers, but to private businesses, which frequently collect user information in order to deliver better services to customers.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/fourth-amendment\/how-private-is-your-cellphone-the-next-fourth-amendment-challenge-crime-report-subscription\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94879],"tags":[],"class_list":["post-211819","post","type-post","status-publish","format-standard","hentry","category-fourth-amendment"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/211819"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=211819"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/211819\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=211819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=211819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=211819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}