{"id":23818,"date":"2016-09-22T00:00:25","date_gmt":"2016-09-22T05:00:25","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=23818"},"modified":"2016-09-21T19:54:58","modified_gmt":"2016-09-22T00:54:58","slug":"eff-the-playpen-story-some-fourth-amendment-basics-and-law-enforcement-hacking","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=23818","title":{"rendered":"EFF: The Playpen Story: Some Fourth Amendment Basics and Law Enforcement Hacking"},"content":{"rendered":"<p>EFF: <a href=\"https:\/\/www.eff.org\/deeplinks\/2016\/09\/playpen-story-some-fourth-amendment-basics-and-law-enforcement-hacking\">The Playpen Story: Some Fourth Amendment Basics and Law Enforcement Hacking<\/a> by Mark Rumold:<\/p>\n<p>(This is part of a series of blog posts about the Playpen cases. For more background, see our earlier blog post and our FAQ.)<br \/>\n<!--more--><\/p>\n<blockquote><p>It\u2019s an old legal adage: bad facts make bad law. And the bad facts present in the Playpen prosecutions\u2014the alleged possession and distribution of child porn, coupled with technology unfamiliar to many judges\u2014have resulted in a number of troubling decisions concerning the Fourth Amendment\u2019s protections in the digital age.<\/p>\n<p>As we discussed in our previous post, courts have struggled to apply traditional rules limiting government searches\u2014specifically, the Fourth Amendment, the Constitution&#8217;s primary protection against governmental invasions of privacy\u2014to the technology at issue in this case, in some cases finding that the Fourth Amendment offers no protection from government hacking at all. That&#8217;s a serious problem.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>EFF: The Playpen Story: Some Fourth Amendment Basics and Law Enforcement Hacking by Mark Rumold: (This is part of a series of blog posts about the Playpen cases. For more background, see our earlier blog post and our FAQ.)<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[76],"tags":[],"class_list":["post-23818","post","type-post","status-publish","format-standard","hentry","category-surveillance-technology"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/23818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=23818"}],"version-history":[{"count":1,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/23818\/revisions"}],"predecessor-version":[{"id":23819,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/23818\/revisions\/23819"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=23818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=23818"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=23818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}