{"id":20703,"date":"2016-02-11T05:37:41","date_gmt":"2016-02-11T10:37:41","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=20703"},"modified":"2016-02-11T05:37:41","modified_gmt":"2016-02-11T10:37:41","slug":"harv-l-rev-digital-duplications-and-the-fourth-amendment","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=20703","title":{"rendered":"Harv.L.Rev.: Digital Duplications and the Fourth Amendment"},"content":{"rendered":"<p>Harv.L.Rev.: Note, <a href=\"http:\/\/harvardlawreview.org\/2016\/02\/digital-duplications-and-the-fourth-amendment\/\">Digital Duplications and the Fourth Amendment<\/a>, 129 Harv. L. Rev. 1046 (2016):<\/p>\n<blockquote><p>The explosive growth of digital data in the twenty-first century has been both a boon and a curse for law enforcement. On one hand this growth has heralded a \u201cgolden age of surveillance\u201d owing to the massive amount of information that is available about actual and potential lawbreakers, but on the other hand the government now has that much more data to sort through. To search this ever-expanding \u201chaystack,\u201d the government has adopted various techniques, including algorithmic queries. But in order to apply these queries \u2014 to search for the needle \u2014 the government must first collect the hay. One technique that law enforcement has adopted is to take \u201cmirror images\u201d of digital data for later off-site review.<br \/>\n<!--more--><br \/>\nA persistent question, though, is how the Fourth Amendment applies to both the initial act of duplicating digital data and the continued retention of that data. It goes without saying that the drafters of the Fourth Amendment did not contemplate its application to the digital era. And Fourth Amendment jurisprudence, accordingly, has long since departed from a strict originalist understanding. Beginning with Katz v. United States, the Supreme Court adapted \u201c[t]he right of the people to be secure &#8230; against unreasonable searches and seizures\u201d to cover modern technological developments by finding such a violation when the government surreptitiously recorded a phone conversation in a public phone booth. <\/p>\n<p>Since then, the Court has considered the Fourth Amendment\u2019s application to a variety of new technologies ranging from airplane surveillance to thermal imaging. In Riley v. California, for example, the Supreme Court analyzed the application of the Fourth Amendment to searches of a cell phone seized incident to arrest. Noting that modern cell phones contain vast troves of personal information, far beyond what one historically could keep in one\u2019s pocket, the Court found that the rationale for the search-incident-to-arrest exception to the warrant requirement did not extend to a cell phone\u2019s digital contents.<\/p>\n<p>This Note attempts to address a narrow question in modern Fourth Amendment jurisprudence: should government duplication and retention of electronically stored information be characterized under the Fourth Amendment as a search, as a seizure, as both, or as neither? Although this Note does explore Fourth Amendment \u201creasonableness\u201d balancing as applied to duplication and retention in Part IV, its primary focus is on the predicate question of whether a search or seizure has even occurred.<\/p>\n<p>Duplication and retention arise in many contexts. But somewhat shockingly, it is not entirely settled that the government conducts either a search or a seizure when it makes a copy of locally stored data, and then retains that data without further reviewing it. As Justice Sotomayor worries, \u201c[t]he Government can store such records and efficiently mine them for information years into the future.\u201d\n<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Harv.L.Rev.: Note, Digital Duplications and the Fourth Amendment, 129 Harv. L. Rev. 1046 (2016): The explosive growth of digital data in the twenty-first century has been both a boon and a curse for law enforcement. On one hand this growth &hellip; <a class=\"more-link\" href=\"http:\/\/fourthamendment.com\/?p=20703\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[76],"tags":[],"class_list":["post-20703","post","type-post","status-publish","format-standard","hentry","category-surveillance-technology"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/20703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=20703"}],"version-history":[{"count":1,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/20703\/revisions"}],"predecessor-version":[{"id":20704,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/20703\/revisions\/20704"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=20703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=20703"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=20703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}