{"id":10068,"date":"2013-12-24T12:04:08","date_gmt":"2013-12-24T11:59:50","guid":{"rendered":""},"modified":"-0001-11-30T00:00:00","modified_gmt":"2013-12-24T11:59:50","slug":"en-US","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=10068","title":{"rendered":"eff.org: Landmark Decision Important Beyond NSA Phone Records Collection"},"content":{"rendered":"<p>eff.org: <a href=\"https:\/\/www.eff.org\/deeplinks\/2013\/12\/landmark-decision-important-beyond-nsa-phone-records-collection\">Landmark Decision Important Beyond NSA Phone Records Collection<\/a> by Hanni Fakhoury: <\/p>\n<p><!--more--><\/p>\n<blockquote><p>The historic decision handed down by D.C. federal judge Richard Leon last week that found the NSA&#8217;s bulk collection of phone records likely violated the Fourth Amendment is a crucial first step towards protecting digital privacy from suspicionless government searches. But the importance of the decision extends beyond the NSA&#8217;s surveillance programs. Judge Leon made two important findings on how the Fourth Amendment right to be free from unreasonable searches should apply at a time when technology can make invasive surveillance &#8212; once considered the stuff of science fiction &#8212; a part of every day life. <\/p>\n<p><em>The Increasing Irrelevancy of Smith v. Maryland<\/em><\/p>\n<p>Critically, Judge Leon&#8217;s opinion recognized that relying on the Supreme Court&#8217;s 1979 decision in Smith v. Maryland to look at new forms of electronic surveillance was foolish. Smith ruled that a person did not have a Fourth Amendment expectation of privacy in the phone numbers he dialed since he had turned that information over to the phone company in order to make the call. Since Smith was decided, courts have extended it to defeat Fourth Amendment challenges to many forms of warrantless surveillance such as acquiring historical cell site records, information turned over to Internet companies like Twitter, and even customer records held by a utility. So when defending the NSA&#8217;s surveillance, the government naturally argued that Smith controlled and no warrant was needed to access the phone records.<\/p><\/blockquote>\n<p>See <a href=\"https:\/\/www.lexis.com\/research\/retrieve?_m=14eb334a3fb2271cfa0249a684ce1bf2&amp;csvc=lt&amp;cform=byCitation&amp;_fmtstr=FULL&amp;docnum=1&amp;_startdoc=1&amp;wchp=dGLzVzt-zSkAl&amp;_md5=2833044b4ba4b91f8cd2fb0f7c999241\">Treatise \u00a7 5.01<\/a>: \u201cTechnology and mass information gathering has made the third-party doctrine suspect both in the legal literature and in the courts.\u201d<\/p>\n<blockquote><p>The third-party doctrine simply has outlived its usefulness, assuming that it had any, with the overwhelming wealth of information out there, information held by many, many companies that we never voluntarily shared. They took it because computers and software made it all possible and infinitely searchable, categorizable, reproducible at minimal or virtually no cost for their own benefit or the benefit of others who compel its production or even buy it from them.<\/p>\n<p>We have a concept of privacy in our minds that doesn&#8217;t square with modern reality. Or, our concept of privacy dates from before Big Data, and we just don&#8217;t fathom what has happened behind our backs. Stated in terms of the reasonable expectation of privacy, what are our &#8220;understandings [of privacy] that are recognized and permitted by society&#8221; compared to Big Data? What can we expect? After our privacy has been stolen or usurped by commerce, can we reclaim it, or is it gone forever?<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>b2evALnk.b2WPAutP <a class=\"more-link\" href=\"http:\/\/fourthamendment.com\/?p=10068\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"","ping_status":"pingsdone","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-10068","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/10068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10068"}],"version-history":[{"count":0,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/10068\/revisions"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10068"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}