Law in the Internet Society
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

"U.S. Surveillance Through Bulk Metadata Collection: Exploiting the Weakness of Fourth Amendment Jurisprudence"

-- By JuanPaoloFajardo - 10 Dec 2015

A. Introduction

On June 5, 2013, the Guardian published a confidential Foreign Intelligence Surveillance Court (“FISC”) Order, care of Edward Snowden, requiring Verizon to hand over to the National Security Agency telephony metadata generated from its users. In response, President Barack Obama released a carefully worded statement: “[N]obody is listening to your calls. That’s not what this program’s about… But by sifting through this so-called metadata, they may identify potential leads with respect to folks who might engage in terrorism.”

On the surface, the President’s words are both an appeal to the American public’s basic Fourth Amendment sensibilities and a legal maneuver to remove the NSA’s surveillance activities outside the standard of “ legitimate expectation of privacy”. However, underneath, Mr. Obama’s deliberate focus on Fourth Amendment principles steers public attention away from the more horrifying aspect of Mr. Snowden’s exposé: that the U.S. government’s most effective surveillance tool involves the wholesale collection of bulk metadata from telecommunications and technology companies (“TTC”) for purposes of engaging in population surveillance which easily evades current Fourth Amendment protections and, much worse, public scrutiny.

B. Metadata and Reasonable Expectations of Privacy

At the onset, we must understand what metadata is. It means “data about data”. It refers to “structured information that describes, explains, locates, or otherwise makes it easier to retrieve, use, or manage an information source.”. Telephony metadata, for example, includes “the length and time of the calls and other similar dialing, routing, addressing, or signaling information.” Metadata essentially functions to establish second tier knowledge regarding the data or information apart from its content.

When the President contrasted “listening to your calls” from the term “metadata”, he was referring not only to the technical distinction between content and metadata, but also the legal limits of obtaining one as compared to the other within the context of the Fourth Amendment. This distinction lies at the heart of the government’s surveillance claims: the acquisition of bulk metadata from TTC’s without the need for establishing probable cause does not constitute an unreasonable search.

The bedrock of the government’s position can be traced to the Supreme Court’s rulings in U.S. v. Miller and Smith v. Maryland, both of which apply Katz v. United States’ third-party doctrine exception to the Fourth Amendment: “[w]hat a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection.” In Miller, the court ruled that bank depositors have no legitimate expectation of privacy in the transaction records maintained by banks. Similarly, in Smith, the court saw as permissible the installation of pen registers in telephone company property without a search warrant because it did “not acquire the contents of communications” and because there is no legitimate expectation of privacy in numerical information voluntarily conveyed to the telephone in the ordinary course of its business.

Based on these cases, the government’s argument is simple: The acquisition of metadata is not synonymous to the acquisition of private communications, which explicitly enjoys Fourth Amendment protections. Any extension of the Fourth Amendment to metadata must be based on the existence of legitimate expectations of privacy over such information, which the Supreme Court has already ruled otherwise due to the voluntary nature of its conveyance to third parties, namely TTCs.

This argument, however, is an obvious exploitation of the weakness of current Fourth Amendment jurisprudence in the face of present-day bulk metadata collection and the growth of technology that has allowed metadata to fuel covert intrusions into individual privacy. Current jurisprudence is fixated only on the front-end level of metadata collection and no court has ever considered the privacy implications of bulk metadata aggregation at the back-end.

B. What Happens at the Back-End?

When Smith was promulgated in 1979, the idea of metadata collection was limited in terms of subject, breadth and purpose. In fact, the constitutionality of the pen register installation was adjudicated in the context of a criminal investigation of a suspected robber and the information obtained was limited to telephone numbers. Fast-forward to 2013, Mr. Snowden’s disclosures have painted a different view of metadata collection. Now, U.S. surveillance efforts involve the broad collection of bulk telephony metadata from millions of users stored in the servers of the world’s largest technology companies, unrelated to the investigation of any specific person or any specific crime.

According to the Foreign Intelligence Surveillance Court, the volume of metadata records currently being acquired by the U.S. government does not alter the Supreme Court’s conclusion in Smith. From the front-end, yes, the volume of metadata collection doesn’t change the nature of metadata as understood by the court in Smith. However, at the back-end, what the U.S. government does with bulk metadata necessitates a change in judicial perspective.

After the U.S. government acquires bulk metadata from TTCs, it subjects this information to various Big Data processes that allows it to “search, aggregate and cross-reference large data sets” with the hope of unearthing “actionable data” for “national security and policing purposes”. Through this aggregation, bulk metadata can “reveal who we are, who we know, what we do and care about and plan to do next”. It can even “reveal things that we never intentionally communicated at all.” An example of the U.S. government’s Big Data practice is the PRISM program which allows the NSA direct access to the servers of companies such as Apple, Facebook, Google, Microsoft, Skype, Yahoo, and YouTube? .

With Big Data practices driving the back-end of the U.S. government’s bulk metadata collection, surveillance activities can now unearth information that falls outside the category of communications content, but nevertheless intrudes into reasonable zones of privacy that may require further protection of the courts. The problem is that current jurisprudence is merely concerned with whether the acquisition of metadata is permissible under the Fourth Amendment. It never considered the nature of the information metadata generates when aggregated. While it is simply a matter of time and judicial willingness (See Justice Sotomayor's concurring opinion in U.S. v. Jones) before the privacy implications of bulk metadata collection is directly addressed by the courts, this gaping jurisprudential hole begs the question: How do we protect our privacy in the meantime?


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.

Navigation

Webs Webs

r5 - 14 Jan 2016 - 16:34:43 - JuanPaoloFajardo
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM