Page 234 - Privacy in a Cyber Age Policy and Practice
P. 234

222  NOTES

              http://www.theguardian.com/commentisfree/2013/jun/19/fisa-court-over-
              sight-process-secrecy; Conor Friedersdorf, “The NSA Scandal Is All That: A
              Polite Rebuttal to Marc Ambinder,” The Atlantic, August 22, 2013, http://www
              .theatlantic.com/politics/archive/2013/08/the-nsa-scandal-is-em-all-that-em
              -a-polite-rebuttal-to-marc-ambinder/278886/.
           74.  Barton Gellman and Ashkan Soltani, “NSA Tracking Cellphone Locations
              Worldwide, Snowden Documents Show,”  Washington Post, December 4,
              2013.
           75.  Information voluntarily handed over to another party does not receive Fourth
              Amendment protection “even if the information is revealed on the assumption
              that it will be used only for a limited purpose and the confidence placed in
              the third party will not be betrayed.” United States v. Miller, 425 U.S. 435, 443
              (1976); see also, Orin Kerr, “The Case for the Third Party Doctrine,” Michigan
              Law Review 107 (2009): 561, 569–70. Earlier cases that built up this doctrine
              include Lee v. United States 343 U.S. 747 (1952) and Couch v. United States 409
              U.S. 322 (1973).
           76.  United States v. Miller, 425 U.S. 435 (1976).
           77.  Smith v. Maryland, 442 U. S. 735 (1979).
           78.  Robert Litt, “General Counsel Litt’s Remarks on Intelligence Collection,”
              Council on Foreign Relations, July 18, 2013, http://www.cfr.org/intelligence/
              general-counsel-litts-remarks-intelligence-collection/p31130?cid=
              rss-primarysources-general_counsel_litt_s_remarks-071813.
           79.  As Orin Kerr notes: “The third-party doctrine is the Fourth Amendment rule
              scholars love to hate. It is the Lochner of search and seizure law, widely criticized
              as profoundly misguided . . . The verdict among commentators is has been fre-
              quent and apparently unanimous: The third-party doctrine is not only wrong,
              but horribly wrong. Even many state court judges have agreed. Over a dozen
              state Supreme Courts have rejected the doctrine under parallel provisions of
              their state constitutions. . . . Remarkably, even the U.S. Supreme Court has never
              offered a clear argument in its favor. Many Supreme Court opinions have applied
              the doctrine; few have defended it” (“The Case for the Third-Party Doctrine,”
              563–64). Though Kerr highlights the many criticisms of the doctrine, the cited
              paper attempts to defend the doctrine by defusing prominent criticism and pre-
              senting positive reasons for accepting the doctrine, e.g., it preserves the Fourth
              Amendment’s technological neutrality and ensures its ex ante clarity.
           80.  Matthew Tokson, “Automation and the Fourth Amendment,” Iowa Law Review
              96 (2011): 581, 586.

           81. Greenwald, “Fisa Court Oversight.”
           82.  Friedersdorf, “The NSA Scandal Is  All That: A Polite Rebuttal to Marc
              Ambinder.”
           83.  Pew Research, “Few See Adequate Limits on NSA surveillance programs,”
              July 26, 2013, http://www.people-press.org/2013/07/26/few-see-adequate-
              limits-on-nsa-surveillance-program/.
           84.  David Ignatius, “NSA Weighs Its Options,” The Washington Post, July 26,
              2013, http://articles.washingtonpost.com/2013-07-26/opinions/40859128_1_
              national-security-agency-surveillance-programs-calling-records.
   229   230   231   232   233   234   235   236   237   238   239