SlideShare a Scribd company logo
1 of 33
Process in Criminal Investigations:
Supplement
Prof. David Opderbeck
Seton Hall University Law School
© 2016-2019 David W. Opderbeck
Creative Commons Attribution / Share-Alike
Tracing an Email
 View the email header
Tracing an Email
Tracing an Email
Tracing an Email
Tracing an Email
Tracing an Email
Tracing an Email
 View the email header
 Using a header tool
Tracing an Email
Tracing an Email
 View the email header
 Using a header tool
 Reverse IP Lookup
 WhoIs Lookup
Tracing an Email
Tracing an Email
Tracing an Email
Tracing an Email
Comprehensive Drug Testing Case
 Facts / Background
 BALCO baseball steroids investigation, grand
jury subpoena and search warrants for
records and samples at a testing company
 Motions to quash, eventual appeal to Ninth
Circuit en banc
Comprehensive Drug Testing Case
 “The pressing need of law enforcement for
broad authorization to examine electronic
records . . . creates a serious risk that
every warrant for electronic information will
become, in effect, a general warrant,
rendering the Fourth Amendment
irrelevant.”
 “Seizure of, for example, Google’s email servers to
look for a few incriminating messages could jeopardize
the privacy of millions.”
Comprehensive Drug Testing Case
 Kozinkski concurrence: details procedures
courts should require in warrants and
subpoenas for computer information
 Bea concurring in part: Kozinski’s
procedures are advisory
 Callahan concurring in part: Kozinski’s
procedures are not joined by a majority of
the en banc court and aren’t binding;
further they are overbroad and
unreasonably restrictive
Scale of Requests (Google)
SRC = Google Transparency Report
Scale of Requests (Google)
SRC = Google Transparency Report
Scale of Requests (Google)
SRC = Google Transparency Report
Scale of Requests (Microsoft)
IMG SRC = https://www.microsoft.com/en-us/corporate-responsibility/lerr
Scale of Requests (Microsoft)
IMG SRC = https://www.microsoft.com/en-us/corporate-responsibility/lerr
Scale of Requests (Facebook)
IMG SRC = https://transparency.facebook.com/government-data-requests
Scale of Requests (Facebook)
IMG SRC = https://transparency.facebook.com/government-data-requests
Scale of Requests (Facebook)
IMG SRC = https://transparency.facebook.com/government-data-requests
(Jan – June 2018)
Google Privacy Policy
We will share personal information with companies, organizations or
individuals outside of Google if we have a good-faith belief that access,
use, preservation or disclosure of the information is reasonably necessary
to:
meet any applicable law, regulation, legal process or enforceable
governmental request.
enforce applicable Terms of Service, including investigation of potential
violations.
detect, prevent, or otherwise address fraud, security or technical issues.
protect against harm to the rights, property or safety of Google, our
users or the public as required or permitted by law.
SCA Extraterritoriality
 U.S. v. Microsoft and the CLOUD Act
 “A [service provider] shall comply with the
obligations of this chapter to preserve,
backup, or disclose the contents of a wire or
electronic communication and any record or
other information pertaining to a customer or
subscriber within such provider’s
possession, custody, or control, regardless
of whether such communication, record, or
other information is located within or outside
of the United States.”
Updates: SCA Extraterritoriality
IMG SRC = https://www.ibm.com/developerworks/cloud/library/cl-cloudstorage/
Updates: SCA Extraterritoriality
IMG SRC = https://www.ibm.com/developerworks/cloud/library/cl-cloudstorage/
Carpenter v. U.S. (2018)
Carpenter v. U.S. (2018)
 Roberts Majority
 Third party doctrine does not apply to historic cell site
information: “seismic shifts in digital technology” make
tracking much easier
 Warrant with probable cause required
Carpenter v. U.S. (2018)
 Kennedy dissent (with Thomas and Alito)
 Third party doctrine should apply even though new
technology
 “A person’s movements are not particularly private.”
 Cell site records “disclose a person’s location only in a
generalized area.”
 Cell phones also make committing crimes easier
Carpenter v. U.S. (2018)
 Alito dissent, with Thomas
 Leave the third party doctrine intact and let Congress
address any particular issues
 Gorsuch dissent
 Fourth Amendment ties to a property interest and the third
party doctrine should be overturned entirely

More Related Content

What's hot

Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
vinyas87
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
PECB
 

What's hot (20)

The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and ExperianHow to keep out of trouble with GDPR: The case of Facebook, Google and Experian
How to keep out of trouble with GDPR: The case of Facebook, Google and Experian
 
Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10
 
Internal Investigations and Employee Privacy
Internal Investigations and Employee PrivacyInternal Investigations and Employee Privacy
Internal Investigations and Employee Privacy
 
Social Media and Employee Privacy
Social Media and Employee PrivacySocial Media and Employee Privacy
Social Media and Employee Privacy
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulation
 
How GDPR will change Personal Data Control and Affect Everyone
How GDPR will change Personal Data Control and Affect EveryoneHow GDPR will change Personal Data Control and Affect Everyone
How GDPR will change Personal Data Control and Affect Everyone
 
Cloud primer
Cloud primerCloud primer
Cloud primer
 
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security EventIsrael Privacy Protection Regulations - Duty To Report A Severe Security Event
Israel Privacy Protection Regulations - Duty To Report A Severe Security Event
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
General Data Protection Regulation - Compliance
General Data Protection Regulation - ComplianceGeneral Data Protection Regulation - Compliance
General Data Protection Regulation - Compliance
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Should European Businesses Really Fear The Usa Patriot Act
Should European Businesses Really Fear The Usa Patriot ActShould European Businesses Really Fear The Usa Patriot Act
Should European Businesses Really Fear The Usa Patriot Act
 
Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)Email and cloud ethics (continuing legal education course)
Email and cloud ethics (continuing legal education course)
 

Similar to Cybersecurity Skills: Email Tracing and Legal Process

2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
Raj Goel
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
healdkathaleen
 
Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016
Anthony Rapa
 

Similar to Cybersecurity Skills: Email Tracing and Legal Process (20)

Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
 
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
2013-06-26-Is_your_company_Googling_its_privacy_away_brightalk_format_1c
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspace
 
Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media Evidence
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?Who's Afraid of eDiscovery?
Who's Afraid of eDiscovery?
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
The Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-DiscoveryThe Sedona Canada Panel on Privacy and E-Discovery
The Sedona Canada Panel on Privacy and E-Discovery
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Be aware of the ICT laws that apply to your organisation
Be aware of the ICT laws that apply to your organisationBe aware of the ICT laws that apply to your organisation
Be aware of the ICT laws that apply to your organisation
 
Cloud
CloudCloud
Cloud
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016Cyber Claims Brief Summer 2016
Cyber Claims Brief Summer 2016
 
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSSStop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
 
ScifoBYODSample
ScifoBYODSampleScifoBYODSample
ScifoBYODSample
 
Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
 

More from David Opderbeck (7)

AI and Privacy
AI and PrivacyAI and Privacy
AI and Privacy
 
IXPs and Competition Policy
IXPs and Competition PolicyIXPs and Competition Policy
IXPs and Competition Policy
 
Contact Tracing Apps and Privacy: The German Experience
Contact Tracing Apps and Privacy: The German ExperienceContact Tracing Apps and Privacy: The German Experience
Contact Tracing Apps and Privacy: The German Experience
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit Meeting
 
Artificial Rights and Virtue
Artificial Rights and VirtueArtificial Rights and Virtue
Artificial Rights and Virtue
 
Google v. Oracle
Google v. OracleGoogle v. Oracle
Google v. Oracle
 
Skillsclass2a
Skillsclass2aSkillsclass2a
Skillsclass2a
 

Recently uploaded

Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptx
Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptxJudgement__Mode_and_other_provisions_BY_Anshika[1][1].pptx
Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptx
SuneelSONU1
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
Airst S
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
ss
 
一比一原版(Columbia毕业证书)哥伦比亚大学毕业证原件一模一样
一比一原版(Columbia毕业证书)哥伦比亚大学毕业证原件一模一样一比一原版(Columbia毕业证书)哥伦比亚大学毕业证原件一模一样
一比一原版(Columbia毕业证书)哥伦比亚大学毕业证原件一模一样
doypbe
 
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证原件一模一样
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证原件一模一样一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证原件一模一样
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证原件一模一样
doypbe
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
e9733fc35af6
 
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
trryfxkn
 
Types of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM ITypes of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM I
yogita9398
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
Airst S
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
Airst S
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
F La
 

Recently uploaded (20)

Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptx
Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptxJudgement__Mode_and_other_provisions_BY_Anshika[1][1].pptx
Judgement__Mode_and_other_provisions_BY_Anshika[1][1].pptx
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
 
Jim Eiberger Rental Agreement Redacted Former Lease.docx
Jim Eiberger Rental Agreement Redacted Former Lease.docxJim Eiberger Rental Agreement Redacted Former Lease.docx
Jim Eiberger Rental Agreement Redacted Former Lease.docx
 
Mischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutesMischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutes
 
一比一原版(Columbia毕业证书)哥伦比亚大学毕业证原件一模一样
一比一原版(Columbia毕业证书)哥伦比亚大学毕业证原件一模一样一比一原版(Columbia毕业证书)哥伦比亚大学毕业证原件一模一样
一比一原版(Columbia毕业证书)哥伦比亚大学毕业证原件一模一样
 
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证原件一模一样
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证原件一模一样一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证原件一模一样
一比一原版(UC Davis毕业证书)加州大学戴维斯分校毕业证原件一模一样
 
Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 
OVERVIEW OF LABOUR LAWS with Case Studies- ppt.ppt
OVERVIEW OF LABOUR LAWS with Case Studies- ppt.pptOVERVIEW OF LABOUR LAWS with Case Studies- ppt.ppt
OVERVIEW OF LABOUR LAWS with Case Studies- ppt.ppt
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
一比一原版(McMaster毕业证书)麦克马斯特大学毕业证学历认证可查认证
 
Types of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM ITypes of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM I
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
ORane M Cornish affidavit statement for New Britain court proving Wentworth'...
ORane M Cornish affidavit statement  for New Britain court proving Wentworth'...ORane M Cornish affidavit statement  for New Britain court proving Wentworth'...
ORane M Cornish affidavit statement for New Britain court proving Wentworth'...
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...
From Scratch to Strong: Introduction to Drafting of Criminal Cases and Applic...
 

Cybersecurity Skills: Email Tracing and Legal Process

  • 1. Process in Criminal Investigations: Supplement Prof. David Opderbeck Seton Hall University Law School © 2016-2019 David W. Opderbeck Creative Commons Attribution / Share-Alike
  • 2. Tracing an Email  View the email header
  • 8. Tracing an Email  View the email header  Using a header tool
  • 10. Tracing an Email  View the email header  Using a header tool  Reverse IP Lookup  WhoIs Lookup
  • 15. Comprehensive Drug Testing Case  Facts / Background  BALCO baseball steroids investigation, grand jury subpoena and search warrants for records and samples at a testing company  Motions to quash, eventual appeal to Ninth Circuit en banc
  • 16. Comprehensive Drug Testing Case  “The pressing need of law enforcement for broad authorization to examine electronic records . . . creates a serious risk that every warrant for electronic information will become, in effect, a general warrant, rendering the Fourth Amendment irrelevant.”  “Seizure of, for example, Google’s email servers to look for a few incriminating messages could jeopardize the privacy of millions.”
  • 17. Comprehensive Drug Testing Case  Kozinkski concurrence: details procedures courts should require in warrants and subpoenas for computer information  Bea concurring in part: Kozinski’s procedures are advisory  Callahan concurring in part: Kozinski’s procedures are not joined by a majority of the en banc court and aren’t binding; further they are overbroad and unreasonably restrictive
  • 18. Scale of Requests (Google) SRC = Google Transparency Report
  • 19. Scale of Requests (Google) SRC = Google Transparency Report
  • 20. Scale of Requests (Google) SRC = Google Transparency Report
  • 21. Scale of Requests (Microsoft) IMG SRC = https://www.microsoft.com/en-us/corporate-responsibility/lerr
  • 22. Scale of Requests (Microsoft) IMG SRC = https://www.microsoft.com/en-us/corporate-responsibility/lerr
  • 23. Scale of Requests (Facebook) IMG SRC = https://transparency.facebook.com/government-data-requests
  • 24. Scale of Requests (Facebook) IMG SRC = https://transparency.facebook.com/government-data-requests
  • 25. Scale of Requests (Facebook) IMG SRC = https://transparency.facebook.com/government-data-requests (Jan – June 2018)
  • 26. Google Privacy Policy We will share personal information with companies, organizations or individuals outside of Google if we have a good-faith belief that access, use, preservation or disclosure of the information is reasonably necessary to: meet any applicable law, regulation, legal process or enforceable governmental request. enforce applicable Terms of Service, including investigation of potential violations. detect, prevent, or otherwise address fraud, security or technical issues. protect against harm to the rights, property or safety of Google, our users or the public as required or permitted by law.
  • 27. SCA Extraterritoriality  U.S. v. Microsoft and the CLOUD Act  “A [service provider] shall comply with the obligations of this chapter to preserve, backup, or disclose the contents of a wire or electronic communication and any record or other information pertaining to a customer or subscriber within such provider’s possession, custody, or control, regardless of whether such communication, record, or other information is located within or outside of the United States.”
  • 28. Updates: SCA Extraterritoriality IMG SRC = https://www.ibm.com/developerworks/cloud/library/cl-cloudstorage/
  • 29. Updates: SCA Extraterritoriality IMG SRC = https://www.ibm.com/developerworks/cloud/library/cl-cloudstorage/
  • 31. Carpenter v. U.S. (2018)  Roberts Majority  Third party doctrine does not apply to historic cell site information: “seismic shifts in digital technology” make tracking much easier  Warrant with probable cause required
  • 32. Carpenter v. U.S. (2018)  Kennedy dissent (with Thomas and Alito)  Third party doctrine should apply even though new technology  “A person’s movements are not particularly private.”  Cell site records “disclose a person’s location only in a generalized area.”  Cell phones also make committing crimes easier
  • 33. Carpenter v. U.S. (2018)  Alito dissent, with Thomas  Leave the third party doctrine intact and let Congress address any particular issues  Gorsuch dissent  Fourth Amendment ties to a property interest and the third party doctrine should be overturned entirely