Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Is the 4th Amendment Dead in Cyberspace?
Inside Higher Ed ^ | July 29, 2015 | Tracy Mitrano

Posted on 08/08/2015 11:58:54 PM PDT by nickcarraway

Over a year ago former director of both the NSA and CIA, Michael Hayden, flat out admitted, "we kill people based on metadata." He quickly distinguished between the metadata about which the debate was focused, telephone records, and other forms of surveillance metadata upon which covert actions are taken. Not surprised about the actions, I confess I was taken aback when I considered the implications that this disclosure has on Fourth Amendment jurisprudence in cyberspace. Ever since the USA-Patriot Act in 2001, I have been harping on complications of the Fourth Amendment between content and metadata in data networking. For as many years I have hoped for a revision of the Electronic Communications Privacy Act (ECPA) to correct the discordance. In all that time, I have assumed that a restructuring of Fourth Amendment jurisprudence around these distinctions might be possible.

I no longer believe that is a reasonable fix. The advanced algorithms applied to metadata in government surveillance make metadata the equivalent of content. That is what struck me about Hayden’s remarks. Not just occasional leaks of subject lines or an Internet Protocol address that resolves to a web page found in routing records, but the sorting, combining and redefining of that data into identifiable predictive behaviors that function as the basis of military or law enforcement actions. It is in this sense that I declare the Fourth Amendment dead in cyberspace. The only way to resurrect the Fourth Amendment could be to place all data, both content and metadata, under Fourth Amendment rubric.

For those who have not been keeping up with the debate, here is the background. The USA-Patriot Act (“Patriot Act”) lowered the evidentiary showing for law enforcement (F.B.I. or D.O.J.) to obtain metadata for both Title III criminal courts under ECPA and the “secret courts” under the Foreign Intelligence Surveillance Act (FISA). Privacy advocates and organizations such as the A.C.L.U. have raised this issue persistently with a focus on section 215 especially, the section that covers “business records.” For whatever Congress intended – and many drafters such as Sensenbrenner have denied this was their intent -- the N.S.A. used this provision to defend its legal standing for the wholesale collection of telephone metadata. In the court of public opinion this practice was the most explosive of Edward Snowden’s revelations. Earlier this year the Second Circuit declared it illegal, at least for the plaintiff, the A.C.L.U., but also by implication to everyone else whose records have been collected since the program began, under Presidential directive, in October of 2001.

In May and June of this year, section 215 became the focus of Congress debate. One of the many sections of the Patriot Act that are under a “sunset” clause, which requires period renewal, Congress has, until now, repeatedly done so without too much pushback. Public opinion over the practice threw a political wrench into the works. Congress took a step back. Partisan wrangling resulted in a brief period when the provision lapsed. The new Freedom Act quickly revived it for a 180-day extension, time enough to bridge a shift from government collection to a requirement that Internet Service Providers hold the records. Whether the government can or will then use the same provision to get the records back in bulk, or take the tack that privacy advocates support of using those records for targeted searches, or both, remains to be experienced in practice and in the courts.

In either case, the damage to the Fourth Amendment jurisprudence in the electronic realm is done. It no longer makes any sense to distinguish content from metadata. The only way to resurrect a meaningful Fourth Amendment would therefore be to bring all electronic data under the Fourth Amendment rubric. In Title III courts, a request for metadata would require a judicially sanctioned evidentiary showing of probable cause of criminal activity particularly described, the standard that is used for a warrant. The subpoena power that comes from an investigation would not be sufficient. The same would hold true in a FISA court, or FISC, although there are the important points that need to be made to distinguish these two courts. It is upon this distinction that I also call for a repeal of FISA and an elimination of FISA Courts.

Cast your mind back to the mid-seventies, when the Central Intelligence Agency was well into its prime of covert activities. Surveillance was among some of its more benign activities given the assassination of government leaders such as Diem brothers in Vietnam and the overthrow of democratically elected governments such as Iran, Guatemala and Chile. Congress sought to impose legal process on these activities. In 1978 it passed the Foreign Intelligence Surveillance Act. This Act created the secret and ex parte FISA Court, a process for selecting the judges and even an appellate FISA review for those requests that the FISA court denied. Terrorism was something that occurred abroad, and so to have a process for the investigation of not just criminal activity but for “persons of interest” seemed to represent progress.

Historical circumstances would turn what was intended to be a brake on government into an accelerator. The Patriot Act exacerbated that shift. Government interpretations of ambiguous sections, such as 215, opened the floodgates. Moreover, other aspects of FISA became more an encouragement than a restraint. Anyone – U.S. citizen or foreign national, in the United States or outside of it – “relevant” or “significant” to a terrorist investigation could be brought in its scope. That scope included three contact orbits out from persons under surveillance. I am not great at math, but I know that this pattern represents the possibility of exponential searches, searches that software engineering and sophisticated algorithms made feasible if not inviting.

Under the contemporary circumstances of the FISA practices, it is not consistent with the Fourth Amendment. The blurred lines between citizens and “persons of interest” outside of U.S. is so great as to throw the Fourth Amendment completely out of focus. Combine that effect with the telephone records quagmire and it would appear to be a legal mess. This mess is difficult to describe and even more so for people to understand, a symptom that it is unworkable in a democratic republic. Basic concepts such as transparency and accountability are absent. We therefore have a choice: either become prey to more and more slippage of core values or return to first principles of due process.

In favor of the latter, Congress should enact two radical reforms. The first is to end the distinction between content and metadata in the Electronic Communications Privacy Act, any acts that serve in a similar capacity, and any law that would be represented as a reform of ECPA. The second is the abolition of the FISA. Under current historical circumstances it is no longer consistent with a democratic republic. Investigations of terrorism should continue to exist. Insofar as they involve U.S. persons (which includes citizens, resident aliens) those investigations should come under regular Title III criminal courts.

Please note, I am not calling for an abolition of the Central Intelligence Agency nor the end of intelligence gathering in the name of U.S. interests. In other words, when the individual(s) under surveillance are not U.S. persons, have at it. This is an area of law that the international community should pick up, debate and strive for a harmonic effect on electronic search and seizures. While I suspect that some liberals with not be happy with that conclusion, I can only say that being a privacy advocate in my view does not mean willfully ignoring real threats to national interests. At the same time, conservatives doubt that open courts are appropriate for national security threats. To the degree that some investigations understandably require a period of time in which disclosures would damage law enforcement process, legal tools in these traditional courts already exist to allow those investigations to proceed as such.

The surest path for terrorist success would be to undermine our democratic republic. There are many ways in which we can join the fight against crime and terrorism. One of them is to protect civil liberties. In fact, civil liberties are a core component of our national interests.


TOPICS: Constitution/Conservatism; Crime/Corruption; Culture/Society; Extended News
KEYWORDS: 4thamendment; cia; fisa; internet; nsa; patriotact; privacy; tech

1 posted on 08/08/2015 11:58:54 PM PDT by nickcarraway
[ Post Reply | Private Reply | View Replies]

To: nickcarraway

The Rand Paul eye roll to Chris Christie at the #GOPDebate https://t.co/hf318QSoWD— Frank Thorp V (@frankthorpNBC) August 7, 2015


2 posted on 08/09/2015 12:13:30 AM PDT by Berlin_Freeper
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway
No, we aren't listening to your conversations.

But we do know when you leave, come home, where you work, everyone who visits your house, what you leave in your yard, the names and addresses of everyone you get mail from, your Netflix choices, your credit cards bills, your 1040 form and all subsidiary schedules, your bank deposits, your withdrawals, and -- of course -- what your post on Free Republic.

But it's just metadata. So...

3 posted on 08/09/2015 12:58:19 AM PDT by FredZarguna ( "I pulled the lever on the machine, but the Clark Bar didn't COME OUT!!!")
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

“it is not consistent with the Fourth Amendment.”

“it is no longer consistent with a democratic republic.”

“The surest path for terrorist success would be to undermine our democratic republic.”

This is the sort of question and problem that should have been handled through the Article V process. We the Sovereign People are the ones to decide the extent of governmental powers.


4 posted on 08/09/2015 2:37:12 AM PDT by Jacquerie ( To shun Article V is to embrace tyranny.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

True intelligence and security comes from the people. The people of the United States need to be brought back into national defense and law enforcement. The more we rely upon government in principle, the more we will see misdirected and ineffectual efforts like FISA courts and mass data collection.


5 posted on 08/09/2015 6:57:32 AM PDT by Carry_Okie (Donald Trump is Ross Perot, with hair.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: FredZarguna
what your post on Free Republic. But it's just metadata. So...

No, that and most of your other examples are data. They are specific records associated with a specific person. Metadata is the "names and addresses of everyone you get mail from" and also email and phone calls. Metadata is everything and it is from everybody which is a big part of the problem. As the author said he has no problem collecting data about non-US persons to which I would add US persons with a foreign terrorist association.

6 posted on 08/09/2015 7:21:06 AM PDT by palmer (Net "neutrality" = Obama turning the internet into FlixNet)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Carry_Okie

I agree with that. Most of the intelligence community believes that they will find more needles by building a bigger haystack. I don’t know about the real investigators but I can imagine that they would rather have targeted data collected in depth rather than zettabytes of metadata.


7 posted on 08/09/2015 7:23:55 AM PDT by palmer (Net "neutrality" = Obama turning the internet into FlixNet)
[ Post Reply | Private Reply | To 5 | View Replies]

To: palmer
It's what the Second Amendment was all about. This country was to be defended by a national militia. To keep it "well regulated" that means they need practice in defensive arts. Organizing that activity was to be left to the States.

In essence, we have lost our grasp on the principle of the Second Amendment in the struggle over arms, but in fact it is a much broader idea that needs to be brought back into the national discussion. Just think of how effective a letter of marque would be to infiltrate and round up Muslim conspirators or illegal aliens. Yet to do it well means the people need education and training, much of which can be accomplished over the Internet or by contract.

8 posted on 08/09/2015 7:35:02 AM PDT by Carry_Okie (Donald Trump is Ross Perot, with hair.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: palmer
Nope, they're not. What constitutes data, and what constitutes metadata is an entirely arbitrary distinction based on usage. Knowing who calls you, and when, who mails you and where they live, who emails you, when, from where, and what IP route they use is data to some consumer every bit as much as it is metadata to somebody else.

A coder's [or a spy's] definition of what constitutes acceptable intrusion under the Fourth Amendment, or what constitutes "metadata" as opposed to "data" is arbitrary, situational, and unacceptable. The definition needs to be made by the legislature, signed by the executive and subjected to scrutiny by the judiciary.

Not by appointees.

Not by bureaucrats.

Some of the other things I cited are not normally considered "metadata." Nevertheless, they are being illegally gathered. Because everything is being gathered. And if you think it isn't, or that any of it isn't being looked at, you're naïve and mistaken.

What is most shocking is that there is no need to collect it. Paul missed a golden opportunity the other night by getting into a childish shouting match with an oaf instead of pointing how exactly how good the targeting technology is, and how it doesn't have to be aimed at US citizens.

9 posted on 08/09/2015 10:23:08 AM PDT by FredZarguna ( "I pulled the lever on the machine, but the Clark Bar didn't COME OUT!!!")
[ Post Reply | Private Reply | To 6 | View Replies]

To: FredZarguna
Because everything is being gathered. And if you think it isn't, or that any of it isn't being looked at, you're naïve and mistaken.

Being in tech for a couple decades I have had a chance to dip into a small portion of everything. I can guarantee that everything is not being gathered. But a lot of personal stuff is.

But your main point is very valid: the distinction between metadata ("ok" to gather) and what I defined as data is arbitrary and dangerous to liberty. There is no way we can allow metadata to be acceptable just because some says it is metadata and someone else says metadata is ok.

10 posted on 08/09/2015 12:25:38 PM PDT by palmer (Net "neutrality" = Obama turning the internet into FlixNet)
[ Post Reply | Private Reply | To 9 | View Replies]

To: palmer
Being in tech for five decades, I can assure you that everything that is of interest that can be gathered is being gathered.
11 posted on 08/09/2015 12:31:38 PM PDT by FredZarguna ( "I pulled the lever on the machine, but the Clark Bar didn't COME OUT!!!")
[ Post Reply | Private Reply | To 10 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson