SEARCHES AND SEIZURES IN A NETWORKED WORLD
Jonathan Zittrain*
Replying to Orin S. Kerr, Searches and Seizures in a Digital World, 119
HARV. L. REV. 531 (2005).
Professor Kerr has published a thorough and careful article on the
application of the Fourth Amendment to searches of computers in private hands — a treatment that has previously escaped the attentions of
legal academia.1 Such a treatment is perhaps so overdue that it has
been overtaken by two phenomena: first, the emergence of an overriding concern within the United States about terrorism; and second,
changes in the way people engage in and store their most private digital communications and artifacts.
The first phenomenon has foregrounded a challenge by the executive to the very notion that certain kinds of searches and seizures may
be proscribed or regulated by Congress or the judiciary. The second
phenomenon, grounded in the mass public availability of always-on
Internet broadband, is leading to the routine entrustment of most private data to the custody of third parties — something orthogonal to a
doctrinal framework in which the custodian of matter searched, rather
than the person who is the real target of interest of a search, is typically the only one capable of meaningfully asserting Fourth Amendment rights to prevent a search or the use of its fruits.
Together, these phenomena make the application of the Fourth
Amendment to the “standard” searches of home computers —
searches that, to be sure, are still conducted regularly by national and
local law enforcement — an interesting exercise that is yet overshadowed by greatly increased government hunger for private information
of all sorts, both individual and aggregate, and by rapid developments
in networked technology that will be used to satisfy that hunger. Perhaps most important, these factors transform Professor Kerr’s view
that a search occurs for Fourth Amendment purposes only when its results are exposed to human eyes: such a notion goes from unremarkably unobjectionable — police are permitted to mirror entirely a sus–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
* Professor of Internet Governance and Regulation, Oxford University; Jack N. and Lillian R.
Berkman Visiting Professor for Entrepreneurial Legal Studies, Harvard Law School. I thank
Erin Ashwell, David Barron, Nicholas Degani, Heather Gerken, Andrew McLaughlin, Jake
Mermelstein, Charles Nesson, Jacqueline Newmyer, Leah Plunkett, and Joshua Salzman for helpful suggestions.
1 Orin S. Kerr, Searches and Seizures in a Digital World, 119 HARV. L. REV. 531, 533 n.1
(2005).
83
84
HARVARD LAW REVIEW FORUM
[Vol. 119:83
pect’s hard drive and then are constitutionally limited as they perform
searches on the copy — to dangerous to any notion of limited government powers. Professor Kerr appreciates this as a “troublesome”
result — indeed, “downright creepy” — but does not dwell upon
it beyond suggesting that the copying of data might be viewed as
a seizure if not a search, at least so long as it involves some
physical touching or temporary “commandeering” of the machine. 2 This view should be amplified: If remote “vacuum cleaner”
approaches are used to record and store potentially all Internet and
telephone communications for later searching, with no Fourth
Amendment barrier to the initial information-gathering activity in the
field, the government will be in a position to perform comprehensive
secret surveillance of the public without any structurally enforceable
barrier, because it will no longer have to demand information in individual cases from third parties or intrude upon the physical premises
or possessions of a search target in order to gather information of interest. The acts of intruding upon a suspect’s demesnes or compelling
cooperation from a third party are natural triggers for judicial process
or public objection. If the government has all necessary information
for a search already in its possession, then we rely only upon its selfrestraint in choosing the scope and depth of otherwise unmonitorable
searching. This is precisely the self-restraint that the Fourth Amendment eschews for intrusive government searches by requiring outside
monitoring by disinterested magistrates — or individually exigent circumstances in which such monitoring can be bypassed.
Professor Kerr develops the idea that “[a]ny observable retrieval of
information stored on a computer hard drive, no matter how minor,
should be considered a distinct Fourth Amendment search,”3 and then
examines in detail how specifically warrants should be worded in
framing such searches. In light of the expansion of government surveillance since the terrorist attacks of 2001, Professor Kerr’s suggestion
appears both right and quaint: at exactly the time he offers a thorough
framework of warrants and judicial review for searching hard drives,
an increasing number of searches appear to be taking place entirely
outside the well-traveled path of Fourth Amendment analysis, occurring without the knowledge of the person searched and eschewing the
use of prosecutors, judges, warrants, and particularity.
A government owes its citizens physical protection, and there are
times when searches are called for that do not abide by the usual
Fourth Amendment protections. The Fourth Amendment itself invites
departures from any particular set of implementing protections, since it
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
2
3
Id. at 560–61.
Id. at 547–48.
2006]
SEARCHES AND SEIZURES IN A NETWORKED WORLD
85
simply proscribes “unreasonable” searches and seizures.
Hence
searches undertaken to search for a ticking time bomb, rather than to
find evidence of a past crime, may be reasonable even if undertaken
without a warrant. So, too, are standards lowered when housing inspectors look for safety violations or police officers frisk a suspect for
weapons — instances in which special needs like immediate security
trump privacy concerns.4 Taken together, however, the current areas
of expansion of surveillance appear permanent rather than exigent,
and sweeping rather than focused, causing the justifications behind
special needs exceptions to swamp the baseline protections established
for criminal investigations. This expansion stands to remove the structural safeguards designed to forestall the abuse of power by a government that knows our secrets.
I. SHIFTS FROM PERSONAL TO NETWORKED STORAGE
The rise of always-on broadband has led to a shift toward the use
of our personal computers as mere workstations, with private data
stored remotely in the hands of third parties. There is little reason to
think that people have — or ought to have — any less of a first-order
reasonable expectation of privacy for e-mail stored on their behalf by
Google and Microsoft than they would have if it were stored “locally”
in personal computers after being downloaded and deleted from their
e-mail service providers. The latest version of Google Desktop offers a “Search Across Computers” feature that is advertised as allowing users with multiple computers to find documents with
one computer that are stored on another. 5 It accomplishes this
by sending a copy of the user’s documents to Google itself. While
functionally networking one’s own private computers would also not
appear to change expectations of privacy in their contents, the placement or storage of the data in others’ hands seems to render the
Fourth Amendment’s doctrinal protections largely irrelevant. In SEC
v. Jerry T. O’Brien, Inc.,6 the Supreme Court held:
It is established that, when a person communicates information to a third
party even on the understanding that the communication is confidential,
he cannot object if the third party conveys that information or records
thereof to law enforcement authorities. . . . These rulings disable respondents from arguing that notice of subpoenas issued to third parties is necessary to allow a target to prevent an unconstitutional search or seizure of
his papers.7
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
4
5
See Terry v. Ohio, 392 U.S. 1 (1968); Camara v. Mun. Court, 387 U.S. 523 (1967).
See Google.com, Google Desktop — About, http://desktop.google.com/about.html#privacy
(last visited Feb. 14, 2006).
6 467 U.S. 735 (1984).
7 Id. at 743.
86
HARVARD LAW REVIEW FORUM
[Vol. 119:83
A transition of computing habits, from storing diaries, e-mail, and
documents at home to generating business records held by a dot-com,
can largely moot such debates as whether the interception of e-mail in
transit (whether by government or private party) should be viewed as
covered by the lesser statutory protections of the Stored Communications Act or the heightened ones of the Wiretap Act,8 since nearly all
transient communication can now end up permanently and accessibly
stored in the hands of third parties.
These third parties typically say that they may elect to disclose
any information upon the request of the government — at least after
receiving assurances by the requesting party that the information is
sought to enhance the public safety.9 Should a custodian deny a mere
request for cooperation, the records might further be sought under the
Stored Communications Act, which Professor Kerr has rightly described as not entirely protective of privacy.10
Or the holders of private records may be compelled to release them
through any of a series of expanded information-gathering tools enacted by Congress in the wake of September 11. For example, a third
party storing networked, sensitive personal data could be sent a secretly obtained, Federal Intelligence Security Act (FISA)-approved
PATRIOT Act section 215 order, directing the production of “any tangible things (including books, records, papers, documents, and other
items) for an investigation . . . to protect against international terrorism or clandestine intelligence activities.”11 The party upon whom the
order is served can neither disclose nor appeal the order.12 The fact of
the search therefore is not readily known by the target of interest in
the search, since the party searched — whether a library, accountant,
or Internet Service Provider (ISP) — is not itself the target of interest.
Probable cause is not required for the search to be ordered, and indeed
the target of interest may be assumed to be an innocent party, if the
party is still generating records of interest to the government in an international terrorism or counterintelligence investigation. Roughly
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
8 See United States v. Councilman, 418 F.3d 67, 79 (1st Cir. 2005) (holding that transient email falls under the heightened protections of the Wiretap Act).
9 See, e.g., Google.com, Google Privacy Policy, http://www.google.com/privacypolicy.html (last
visited Feb. 14, 2006) (noting that Google discloses personal information only when it has “a good
faith belief that access, use, preservation or disclosure of such information is reasonably necessary
to (a) satisfy any applicable law, regulation, legal process or enforceable governmental request,
. . . (d) protect against imminent harm to the rights, property or safety of Google, its users or the
public as required or permitted by law”).
10 See Orin S. Kerr, A User’s Guide to the Stored Communications Act, and a Legislator’s
Guide to Amending It, 72 GEO. WASH. L. REV. 1208, 1208–09 (2004).
11 50 U.S.C. § 1861(a) (Supp. II 2002).
12 See id. § 1861(c)–(d).
2006]
SEARCHES AND SEIZURES IN A NETWORKED WORLD
87
1700 FISA applications were lodged in each of 2003 and 2004.13 (Four
were rejected each year.)
Any of these remote hosts might also be served a “national security
letter” concerning the production of “envelope information.” The letters are written and executed without judicial oversight, and those
who receive such letters are prohibited by law from telling anyone that
they received them.14 National security letters may be used to solicit
information held by particular kinds of private parties, including the
records of telephone companies, financial institutions (now including
such entities as pawn shops and travel agencies), and ISPs.15 For ISPs,
the sorts of information that can be sought this way are “subscriber information and toll billing records information, or electronic communication transactional records.”16 This “envelope information” is not
thought to extend to the contents of e-mail, but includes such things as
the “to” and “from” fields of e-mail — or perhaps the contents of
Google or other search engine queries made by a subscriber, since such
queries are usually embedded in the URLs visited by that subscriber.
If the government has questions about the identity of a user of a particular Internet Protocol address — the standard way to uniquely label
each computer on the Internet — a national security letter could be
used to match that address to a subscriber name. Under section 505 of
the PATRIOT Act, national security letters must meet a standard short
of the probable cause standard associated with a traditional warrant:
the FBI must instead assert to the private recipients of such letters
that the records are sought in connection with an investigation into international terrorism.17 Government officials are cited as indicating
that more than 30,000 national security letters are issued per year.18
Even if recipients of FISA orders or national security letters successfully press challenges to be permitted to disclose to the public that they
have received such mandates,19 there is no assurance that they will do
so — indeed, many may elect to remain silent about cooperating with
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
13 See Letter from William E. Moschella, Assistant Attorney Gen., to L. Ralph Mecham, Dir.,
Admin. Office of the U.S. Courts (Apr. 30, 2004), available at http://www.fas.org/
irp/agency/doj/fisa/2003rept.pdf; Letter from William E. Moschella, Assistant Attorney Gen., to J.
Dennis Hastert, Speaker, U.S. House of Representatives (Apr. 1, 2005), available at
http://www.fas.org/
irp/agency/doj/fisa/2004rept.pdf.
14 See 18 U.S.C. § 2709(c) (2000).
15 See 12 U.S.C. § 3414(a)(5)(A), (D) (2000 & Supp. II 2002); 15 U.S.C. § 1681u (2000 & Supp. II
2002); id. § 1681v(a) (Supp. II 2002); 18 U.S.C. § 2709(a) (2000); 50 U.S.C. § 436 (2000).
16 18 U.S.C. § 2709(a).
17 Id. § 2709(b) (2000 & Supp. II 2002).
18 Barton Gellman, The FBI’s Secret Scrutiny, WASH. POST, Nov. 6, 2005, at A1.
19 See Doe v. Ashcroft, 334 F. Supp. 2d 471, 475 (S.D.N.Y. 2004) (holding that prohibiting an
ISP from communicating the fact that it received a national security letter is an impermissible
prior restraint on speech).
88
HARVARD LAW REVIEW FORUM
[Vol. 119:83
the government under these circumstances, keeping each of these
searches secret from the target.
While techniques for obtaining private communications and data
that require less than probable cause are being explicitly deployed so
far in the context of terrorism prevention, the movement of data from
the PC to the network suggests that local law enforcement will follow:
warrants served upon personal computers and their hard drives will
yield less and less information since the data resides elsewhere, driving
law enforcement to the networked third parties now hosting that information.
Since the protections provided by these statutory schemes for the
privacy of citizens’ digital communications are low compared to the
default common law protections of warrants in criminal cases, it is
particularly important for government searches of the sort described
here to meet a basic Fourth Amendment test of reasonableness. For
remotely stored data, this suggests limiting the holding of SEC v. Jerry
T. O’Brien, Inc. to the financial records held by a broker similar to
those who figured in that case, rather than deducing that all cases of
third-party custody of personal information entail no Fourth Amendment protections for the person whose information is so held. This is a
reasonable limit to draw if the borders of one’s home no longer correlate well to the borders of one’s digital private life. The ability to store
nearly all one’s data remotely is an important and helpful technological advance, all the more so because the data can still be made to appear to the user as if it were sitting on his or her own personal computer. But this suggests that the happenstance of where data is
actually stored should not alone control the constitutional assessment
of what standard the government must meet to intrude upon it.
Consider Chapman v. United States,20 in which a police search of a
rented house for a whiskey still was found to be a violation of the
Fourth Amendment rights of the tenant whose illegally unregistered
still was found — despite the fact that the landlord had consented to
the search.21 The Court properly refused to find that the right against
intrusion was held only by the absentee owner of the place intruded
— rather, it was held by the person who actually lived and kept his effects there. Similarly, the data we store for ourselves in servers that
others own ought to be thought of as our own papers and effects in
which we have a right to be secure. Government intrusion into one’s
personal data should face a Fourth Amendment test whatever its storage configuration — PC or network.
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
20
21
365 U.S. 610 (1961).
Id. at 610, 615–16.
2006]
SEARCHES AND SEIZURES IN A NETWORKED WORLD
89
Even information stored on a personal computer may no longer require the physical access to the hard drive that Professor Kerr so meticulously documents and for which he seeks to establish boundaries.
So long as the computer is networked, the government might obtain
the suspect computer’s IP address using any of the less formal mechanisms described above. Then, it may insist that any provider of software for that computer that supports “automatic update” deliver a
special update to the computer prompting it to divulge any contents
residing on the PC to the provider, which will in turn divulge them
to the government.
Professor Kerr’s exposure-based approach to searches seems particularly troublesome in this context. “[I]n the computer context,” he
writes, “there is no need to focus the ‘search’ inquiry on a physical action like entry; the law can look directly to exposure.”22 By exposure,
Professor Kerr means “when information from or about the data is exposed to possible human observation, such as when it appears on a
screen, rather than when it is copied by the hard drive or processed by
the computer.”23 Such reasoning, however, would give constitutional
imprimatur to the wholesale copying of users’ hard drives over the
network using this technique, entailing no physical intrusion for which
a warrant would be needed, and for which the copying itself would not
be deemed a search until some indefinite later time when government
officials chose to examine the data so copied. Users’ private data —
even that stored on their own PCs — could then, under this theory, be
surreptitiously obtained and stored by the government, to be searched
later should probable cause arise and a warrant be obtained or one of
the newer terrorism-fighting tools be used — here by the government
upon its own copy of hoarded citizen data. Professor Kerr evinces
some concern about this prospect and explores describing such copying
as a seizure if not a search.24 Yet he rejects declaring outright that the
very production of a “complete and invasive” machine copy by the government is a seizure, instead focusing on the “interference” caused by
copying — interference that wanes as the ability to intrude remotely increases. He further appears to want to avoid the “seizure” label since it
raises the question of how long the government can retain any copies it
makes, analogous to having to return seized physical items to their
original owners.25 But this is exactly a question that ought to figure
into government-induced copying of our most private data: the reasonableness of such a search ought to hinge in part on retaining such data
no longer than necessary for a specific purpose. To explain that such a
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
22
23
24
25
Kerr, supra note 1, at 551.
Id.
Id. at 560–61.
Id. at 562.
90
HARVARD LAW REVIEW FORUM
[Vol. 119:83
question is difficult — for the odd reason that deleting files may not actually fully erase them from a particular hard drive26 — makes it no less
pressing.
The wholesale migration of private data from personal custody to
that of faraway third parties should not entail a complete stripping of
our Fourth Amendment interests in having that data secure from unreasonable government intrusion. The shift from local to network
storage also compels skepticism of the idea that mirroring of private
data by the government is not itself a search. We should avoid setting
up a constitutional framework that would be silent should the government choose to clone as much private data as it can extract from any
source, left to its own self-restraint not to examine its own permanently held copy of that data without obtaining a warrant.
II. MASS DATA MINING
Professor Kerr’s view that a search does not take place until human
eyes set upon its results may wrongly suggest that the newly revealed
National Security Agency (NSA) surveillance program, which appears
to rely on mass data mining, is comparatively innocuous from a Fourth
Amendment perspective.
In December 2005, the New York Times reported that the NSA has
monitored telephone and Internet communications within the United
States that originated or terminated outside the United States.27 According to government officials cited in the article, “[u]nder a presidential order signed in 2002, the intelligence agency has monitored the
international telephone calls and international e-mail messages of hundreds, perhaps thousands, of people inside the United States without
warrants over the past three years in an effort to track possible ‘dirty
numbers’ linked to Al Qaeda.”28
The Attorney General confirmed the existence of the classified program in a press conference shortly thereafter.29 In follow-up reporting,
the Times reported that the NSA has “reached agreements with major
American telecommunications companies to gain access to some of the
country’s biggest ‘switches’ carrying phone and e-mail traffic into and
out of the country” for large-scale data mining.30 The program was
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
26
27
Id.
See James Risen & Eric Lichtblau, Bush Lets U.S. Spy on Callers Without Courts, N.Y.
TIMES, Dec. 16, 2005, at A1.
28 Id.
29 Press Briefing, Alberto Gonzales, Attorney Gen. & General Michael Hayden, Principal
Deputy Dir. for Nat’l Intelligence (Dec. 19, 2005), available at http://www.whitehouse.gov/
news/releases/2005/12/20051219-1.html.
30 Eric Lichtblau, Bush Defends Spy Program and Denies Misleading Public, N.Y. TIMES,
Jan. 2, 2006, at A11.
2006]
SEARCHES AND SEIZURES IN A NETWORKED WORLD
91
not specifically authorized by Congress — and indeed, the Attorney
General conceded that it appears on its face to violate FISA.31 He believes it is permissible nonetheless, as authorized either by the more
general Authorization for the Use of Military Force legislated in the
wake of the September 11 terrorist attacks, or through the inherent
(and perhaps congressionally unmodifiable) power of the President to
protect national security and to wage war.32
The parameters of the NSA surveillance program are not well understood — public knowledge is thus far built around leaks to the New
York Times and limited statements by public officials in reaction to the
leaks — but it appears to involve data mining at key points of interconnection for the global Internet, with the acquiescence of the network operators.33 If the NSA has indeed spliced in to Internet and telephony backbones in order to perform such scanning, there would be
few technical barriers to it saving all such data as it measures it, for
later searching. As such databases grow, the government then essentially possesses its own stockpile of the nation’s communications on
which to perform searches. For the direct purposes of the NSA program, the executive might elect to search the database for communications that appear to begin or terminate overseas and that, through the
search terms used, appear to involve only terrorism. However, it — or
local governments, for that matter — might then obtain traditional
warrants by which to search the database more broadly. If the original compilation of the database is of no Fourth Amendment moment,
then the use of warrants, based upon probable cause, to search for information having to do with regular crimes might also be deemed
permissible. Such searches would naturally be secret since no further
intrusion upon the target or a third party (such as an ISP) is needed to
execute them.
This highlights the most worrisome aspects of current government
surveillance of digital space: it is undertaken entirely in secret, both as
a general matter and for any specific search, and it exists in the absence of any statutory framework or judicial oversight. Professor
Stuntz explains the value of a renewed focus on analogous physical
“data mining” via group sweeps — for example, the searching of all
cars near the site of a terrorist threat — and points out that such
searches are naturally (and healthily) limited by the fact that large
swaths of the public are noticeably burdened by them and can therefore object to them through the judicial or political processes should
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
31
32
33
See Press Briefing, supra note 29.
Id.
See Lichtblau, supra note 30.
92
HARVARD LAW REVIEW FORUM
[Vol. 119:83
they become too onerous.34 No such check is present in the digital environment; boundless searching can be done with no noticeable burden
— indeed, without notice of any kind — on the parties searched.
Those who believe that no search takes place until human eyes rest
upon results may not worry about data mining — they may even find
such searches to comprise a perfect balance of benefit for law enforcement and protection of privacy. This view relies on two misconceptions.
First, as Professor Kerr points out, there is no such thing as a “Perfect Tool” that will ferret out only evidence of, say, a terrorist plot.35
The existence of a trove of data — for Professor Kerr’s purposes, an
entire hard drive; for ours, an entire network’s worth of interchanges
— therefore inevitably calls upon human eyes to see both innocent and
not-so-innocent contents. Professor Kerr’s solution to this problem is
not to limit the kinds of searches that can be performed — so-called
“ex ante” restrictions imposed through warrants that clearly specify
what kinds of searches can be performed — but instead to consider,
though not yet fully advocate, eliminating the plain view doctrine for
digital searches. This would prevent more broadly conducted searches
from becoming fishing expeditions for evidence of any crime once
probable cause to search for a given crime had been obtained. This
solution does not prevent the revelation of wholly innocent private material found in searches — it merely alters what the government can
successfully prosecute should incriminating evidence be found. In the
context of broad-based secret searches, Professor Stuntz also turns to
limits on prosecution to avoid abuse, believing that a line can be
drawn between awful crimes that are serendipitously uncovered and
less severe ones that would be off limits to prosecution,36 even as he
acknowledges that the history of criminal procedure has been “transsubstantive,” with constitutional limits on searches applying “equally
to suspected drug dealers and suspected terrorists.”37 He also proposes
limits on public disclosure of any other data retrieved through secret
searches.38 These solutions are only effective to the extent that one believes that the principal damage from unfettered government access to
private data arises from unjustified (if evidence-supported) criminal
prosecutions or from embarrassing public disclosures of search results.
These are evils, to be sure, but they are not the only ones. The realization that every digital movement is recorded and monitored itself will
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
34 See William J. Stuntz, Local Policing After the Terror, 111 YALE L.J. 2137, 2163, 2165–66
(2002).
35 Kerr, supra note 1, at 569–70.
36 See Stuntz, supra note 34, at 2183–84.
37 See id. at 2140.
38 See id. at 2183–84.
2006]
SEARCHES AND SEIZURES IN A NETWORKED WORLD
93
chill private behavior, and public concern about abuse can further affect behavior even if that concern is unwarranted because the public
actors are good or because they are limited by law.
This reveals a second misconception: that a democratic system
cannot thrive in the long term in the absence of independent oversight
of government surveillance activity. Judge Posner believes that any
abuse of secret, warrantless surveillance will be readily outed by government leaks and punished by the political process — presumably either at the ballot box or through removal, impeachment, or even
prosecution of implicated officials.39 His reasoning would appear to
apply equally to wholly domestic surveillance as it does to surveillance
in which one party is thought to be outside the United States. This is
too thin a basis on which to find the combination of new search tactics
consonant with the Fourth Amendment. The Fourth Amendment
hazards an answer to the question, “Who will watch the watchers?”
Judge Posner’s answer — whistleblowers who leak to the press — is
especially inapt when a small number of people in power could perform nearly unlimited searching without the assistance of many others,
circumscribing the number of potential whistleblowers even as the
amount of information they can unearth is unprecedented.
III. CONCLUSION
The power of the Fourth Amendment interpretation intended by
Professor Kerr for personal hard drives in the “standard” criminal context is that it involves disinterested parties from an entirely separate
branch of government providing at least a cursory review of the facts
and issuing warrants in the first place, whether broadly or narrowly
drawn. Each search has a beginning and an end, requiring another
consultation with a magistrate if it is to be relaunched later. The
Fourth Amendment has been rightly construed flexibly to allow the
government to conduct certain searches in exigent circumstances without consultation with a judge, and even entirely in secret — limited
exceptions to a general rule, the exceptions themselves designed and
regulated by judges.
A lack of oversight or adversarial process for the kinds of searches
that are about to become common threatens to have the exceptions
dwarf the rule. National security letters, subject to no oversight except
the conscience of the branch issuing them, push this limit, and exceed
it when the recipients of such letters are said to be committing a
criminal act when they consult lawyers about their options. When the
determination of whether a given search falls within certain secret pa–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
39
A31.
See Richard A. Posner, Our Domestic Intelligence Crisis, WASH. POST, Dec. 21, 2005, at
94
HARVARD LAW REVIEW FORUM
[Vol. 119:83
rameters is made by an intelligence agency shift supervisor rather than
a federal judge, as part of a program that is both secret from the public and most members of Congress, and is able to search massive
amounts of private data traversing a network — the Fourth Amendment has been stretched to the point of breakage. “National security”
and “terrorism” are ill-defined terms,40 and the pressures of fighting an
unending war against unseen foes are too much for even the most
dedicated shift supervisor or President to handle alone.
The kind of incisive analysis used to parse the right balance to apply in permitting standard police searches of hard drives must be used
to determine a new balance for searching our expanding digital world.
We can find a way to use new investigative opportunities to thwart
very real threats, while using processes that minimize the prospects for
abuse. We can understand remotely stored data as no less precious to
the public merely because it has not been limited to a single personal
hard drive, and require that special circumstances be shown before it
can be seized by the government.
Professor Viet Dinh, a former Department of Justice official, testified that “the current threat to America’s freedom comes from Al
Qaeda and others who would do harm to America and her people, and
not from the men and women of law enforcement who protect us from
harm.”41 Concern for privacy is not, however, premised on impugning
any particular law enforcement officer — indeed, officers ought to be
presumed innocent of ill motive, just as a member of the public is entitled to be, secure with his or her digital papers and effects, until there
is reason to suspect otherwise. The good work of law enforcement is
honored by a process by which its work is observed and regulated, and
by which its extraordinary tools of information gathering and its use
of force are bounded. The beauty of our system of checks and balances is that, if deployed properly, it need not ask us to trade off between fear of harm from outsiders and fear of intrusion from a runaway government.
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
40 Professor Kerr agrees, at least regarding the definition of “terrorism.” Kerr, supra note 1, at
580–81.
41 America After 9/11: Freedom Preserved or Freedom Lost?: Hearing Before the S. Comm. on
the Judiciary, 108th Cong. 277 (2003) (prepared testimony of Professor Viet D. Dinh, Professor of
Law, Georgetown University Law Center).