62
139 FILE:C:\WINDOWS\DESKTOP\MYBRIE~1\SLOBOGIN.WP Dec 12/13/05 Tue 12:53PM TRANSACTION SURVEILLANCE BY THE GOVERNMENT Christopher Slobogin * Many important aspects of our lives are inscribed in writ- ten and digitized records, housed in private businesses, gov- ernment agencies and other institutions. These records include all sorts of information about us: reports on our medical status and financial condition; data about our purchases, rentals, real estate holdings, licenses, and memberships; logs listing the destination of our emails and our Internet wanderings; and countless other bits of individual descriptors, ranging from salary levels to college grades to driver's license numbers. Whether the information memorializes our own version of personal activities or is created by the record-holder itself, there is often an explicit or implicit understanding that the information will be used or viewed by a limited number of people for circumscribed purposes. In other words, we consider the contents of many of these records private, vis-a-vis most of the world. Thus, it may be surprising that law enforcement officials can, perfectly legally, gain access to all of this information much more easily than they can search our houses or even our cars. While the latter types of actions require probable cause, government can obtain many of the records just described simply by asking (or paying) for them. 1 And, at most, all the S t e p h e n C . O ' C o n n e l l P r o f e s s o r o f L a w , U n i v e r s i t y o f F l o r i d a F r e d r i c G . L e v i n C o l l e g e o f L a w . F o r t h e i r c o m m e n t s o n t h i s p a p e r , I w o u l d l i k e t o t h a n k J e r o l d I s r a e l , S c o t t S u n d b y , P e t e r S w i r e , G e o r g e T h o m a s , a n d p a r t i c i p a n t s i n w o r k s h o p s o r s y m p o s i a a t t h e f o l l o w i n g s c h o o l s : M i s s i s s i p p i , D e P a u l , F l o r i d a S t a t e , O h i o S t a t e , a n d H a s t i n g s . 1 S e e g e n e r a l l y D a n i e l J . S o l o v e , A c c e s s a n d A g g r e g a t i o n : P u b l i c R e c o r d s , P r i - v a c y a n d t h e C o n s t i t u t i o n , 8 6 M . L . R E V . 1 1 3 7 ( 2 0 0 2 ) .

2005 - Transaction Surveillance by the Government

  • Upload
    lykhue

  • View
    214

  • Download
    1

Embed Size (px)

Citation preview

Page 1: 2005 - Transaction Surveillance by the Government

139

FILE:C:\WINDOWS\DESKTOP\MYBRIE~1\SLOBOGIN.WP Dec

12/13/05 Tue 12:53PM

TRANSACTION SURVEILLANCE BY THE GOVERNMENT

Christopher Slobogin* Many important aspects of our lives are inscribed in writ-ten and digitized records, housed in private businesses, gov-ernment agencies and other institutions. These records include all sorts of information about us: reports on our medical status and financial condition; data about our purchases, rentals, real estate holdings, licenses, and memberships; logs listing the destination of our emails and our Internet wanderings; and countless other bits of individual descriptors, ranging from salary levels to college grades to driver's license numbers. Whether the information memorializes our own version of personal activities or is created by the record-holder itself, there is often an explicit or implicit understanding that the information will be used or viewed by a limited number of people for circumscribed purposes. In other words, we consider the contents of many of these records private, vis-a-vis most of the world. Thus, it may be surprising that law enforcement officials can, perfectly legally, gain access to all of this information much more easily than they can search our houses or even our cars. While the latter types of actions require probable cause, government can obtain many of the records just described simply by asking (or paying) for them.1 And, at most, all the

S t e p h e n C . O ' C o n n e l l P r o f e s s o r o f L a w , U n i v e r s i t y o f F l o r i d a F r e d r i c G . L e v i n C o l l e g e o f L a w . F o r t h e i r c o m m e n t s o n t h i s p a p e r , I w o u l d l i k e t o t h a n k J e r o l d I s r a e l , S c o t t S u n d b y , P e t e r S w i r e , G e o r g e T h o m a s , a n d p a r t i c i p a n t s i n w o r k s h o p s o r s y m p o s i a a t t h e f o l l o w i n g s c h o o l s : M i s s i s s i p p i , D e P a u l , F l o r i d a S t a t e , O h i o S t a t e , a n d H a s t i n g s . 1 S e e g e n e r a l l y D a n i e l J . S o l o v e , A c c e s s a n d A g g r e g a t i o n : P u b l i c R e c o r d s , P r i -v a c y a n d t h e C o n s t i t u t i o n , 8 6 M . L . R E V . 1 1 3 7 ( 2 0 0 2 ) .

Page 2: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 4 0 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

government needs to show in order get any of these records is that they are Arelevant@ to a government investigationBa much lower, and much more diffuse, level of justification than proba-ble cause.2 This state of affairs might make sense when the records sought are truly public in nature. It might also be justifiable when the records involve an entity such as a corporation, professional service provider, or government department and are sought in an effort to investigate the entity and its mem-bers. But today, facilitated by the computerization of informa-tion and communication, government routinely obtains person-al medical, financial and email records, in connection with investigations that have nothing to do with business or gov-ernmental corruption.3 That practice is much more questionable. This article explores the scope and regulation of what I will call Atransaction surveillance@ by the government. That term is meant to distinguish the subject of this article from both Aphysical surveillance@ and Acommunications surveil-lance.@ Physical surveillance is real-time observation of physi-cal activities, using either the naked eye or enhancement devices such as binoculars or video cameras. Communications surveillance is real-time interception of the content of commu-nications, relying on wiretapping, bugging, hacking, and vari-ous other methods of intercepting oral statements and wire and electronic transmissions. Transaction surveillance, in contrast, involves accessing already-existing records, either physically or through computer databanks. It also encompass-es accessing, in real-time or otherwise, the identifying signals of a transaction (such as the address of an email recipient).4

2 S e e i n f r a t e x t a c c o m p a n y i n g n o t e s 3 5 - 3 7 . 3 S e e S o l o v e , s u p r a n o t e 1 . 4 T h i s t r i p a r t i t e d i v i s i o n o f s u r v e i l l a n c e w a s d e v e l o p e d b y t h e A m e r i c a n B a r A s s o c i a t i o n ' s T a s k F o r c e o n L a w E n f o r c e m e n t a n d T e c h n o l o g y a n d i s e x p l i c a t e d f u r t h e r i n C h r i s t o p h e r S l o b o g i n , T e c h n o l o g i c a l l y - A s s i s t e d P h y s i c a l S u r v e i l l a n c e : T h e A m e r i c a n B a r A s s o c i a t i o n ' s T e n t a t i v e D r a f t S t a n d a r d s , 1 0 H A R V . J . L . & T E C H . 3 8 3 ,

Page 3: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 141

Like physical and communications surveillance, transac-tion surveillance is a potent way of discovering and making inferences about a person's activities, character and identity. Yet, despite a bewildering array of statutorily created authori-zation requirements, transaction surveillance by the govern-ment is subject to far less regulation than either physical surveillance of activities inside the home or communications surveillance.5 My principal argument is that transaction sur-veillance should be subject to much more legal monitoring than it is. To get to that conclusion, this article proceeds in four parts. Part I explains why government, and in particular law enforcement, finds transaction surveillance so attractive, and why it is so easy to carry out in this digital age. Part II de-scribes the current law regulating transaction surveillance. Not only is this regulation minimal, it is confusing and contra-dictory; beyond the traditional subpoena, challengeable by the target of the investigation, current law recognizes a number of subpoena mutations that seem to have little rhyme or reason. If it contributes nothing else, this article should at least clarify the nature of today's regulatory framework. Part III criticizes this framework and outlines a more promising approach. The proposed reform recognizes, as does the current regime, that different sorts of records merit differ-ent levels of protection. But, in contrast to current law, the proposal would significantly increase the degree of protection in a number of situations, to the probable cause level for per-sonal records held by private and public entities and to the 3 8 7 - 8 8 ( 1 9 9 7 ) . 5 A s d i s c u s s e d i n f r a t e x t a c c o m p a n y i n g n o t e s 3 8 - 8 2 , t r a n s a c t i o n s u r v e i l l a n c e n e v e r r e q u i r e s p r o b a b l e c a u s e . I n c o n t r a s t , c o m m u n i c a t i o n s s u r v e i l l a n c e r e q u i r e s a w a r r a n t , , w h i c h m a y b e i s s u e d o n l y i f t h e r e i s p r o b a b l e c a u s e a n d o t h e r m e t h o d s o f o b t a i n i n g t h e i n f o r m a t i o n h a v e f a i l e d . S e e 1 8 U . S . C . ' 2 5 1 8 ( 3 ) . P h y s i c a l s u r v e i l l a n c e o f t h e h o m e r e q u i r e s a w a r r a n t u n l e s s i t c a n t a k e p l a c e w i t h t h e n a k e d e y e f r o m a l a w f u l v a n t a g e p o i n t u s i n g t e c h n o l o g y t h a t o n l y r e p l i c a t e s s u c h n a k e d e y e v i e w i n g o r i t i n v o l v e s t e c h n o l o g y t h a t i s i n g e n e r a l p u b l i c u s e . K y l l o v . U n i t e d S t a t e s , 5 3 3 U . S . 2 7 , 3 4 - 3 5 ( 2 0 0 1 ) .

Page 4: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 4 2 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

reasonable suspicion level for personal records readily avail-able to the public. Part IV concludes by examining alternatives to the pro-posal (and to the current regime). It rejects both an approach that requires probable cause for all records searches and, at the other extreme, an approach that would allow suspicionless records searches on condition that anything discovered is subject to strict limitations on disclosure. It also criticizes an approach that relies on the legislature, rather than the courts and the Fourth Amendment, to establish fundamental regula-tory requirements. Not all recorded information warrants the maximum refuge from government intrusion. But much of it deserves much more protection than it receives today.

I. THE CURRENT REACH OF TRANSACTION SURVEILLANCE Transaction surveillance comes in many forms. This arti-cle divides it into two types: target-based and event-based. Using these categorizations, the following discussion relies on hypotheticals to flesh out the various ways transaction sur-veillance can assist law enforcement in investigating street crime.

Page 5: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 143

A. Target-Based Transaction Surveillance

Assume that I'm a federal agent, and that I'm suspicious of you for some vague reasonBperhaps you often pay for your airplane tickets with cash,6 or you have been observed with accessories you shouldn't be able to afford,7 or you are a young, Arab male who goes to the local mosque on a daily basis.8 Under these types of circumstances, I clearly do not have sufficient suspicion for an arrest.9 On the other hand, I feel I would be neglecting my obligation as a law enforcement official if I did not investigate you a bit further. So how do I find out more about you? I could confront you directly, either on the street or through a grand jury.10 But neither approach is likely to net much information, and both will tip you off that I'm checking you out. Ditto with respect to going to your acquaintances and neighbors; they will probably not be complely forthcoming and they might let you know I've been nosing around. I could try the undercover agent approachBthere might be rich payoffs if I or one of my informants can weasel into your good graces. But success at that endeavor is rare, and spending so much effort 6 C f . F l o r i d a v . R o y e r , 4 6 0 U . S . 4 9 1 , 4 9 3 n . 2 ( 1 9 8 3 ) ( n o t i n g t h a t p a y i n g f o r a n a i r l i n e t i c k e t w i t h c a s h i s o f t e n a n e l e m e n t o f d r u g c o u r i e r p r o f i l e s u s e d b y t h e D r u g E n f o r c e m e n t A d m i n i s t r a t i o n ) . 7 C f . S t a t e v . C o o k s o n , 3 6 1 S . W . 2 d 6 8 3 , 6 8 4 ( M o . 1 9 6 2 ) ( i n f o r m a n t , w h o a l -l e g e d t h a t d e f e n d a n t s h a d r o b b e d a t a v e r n , r e p o r t e d t h a t At h e y h a d a l a r g e s u m o f m o n e y a n d w e r e s p e n d i n g f r e e l y @) . 8 C f . M i c h a e l J . W h i d d e n , U n e q u a l J u s t i c e : A r a b s i n A m e r i c a a n d U n i t e d S t a t e s A n t i t e r r o r i s m L e g i s l a t i o n , 6 9 F O R D H A M L . R E V . 2 8 2 5 , 2 8 6 5 ( 2 0 0 1 ) ( r e c o u n t i n g F B I s u r v e i l l a n c e o f a B r o o k l y n m o s q u e ) . 9 A n a r r e s t o r p r o l o n g e d q u e s t i o n i n g i n t h e s t a t i o n h o u s e r e q u i r e s p r o b a b l e c a u s e . C H A R L E S H . W H I T E B R E A D & C H R I S T O P H E R S L O B O G I N , C R I M I N A L P R O C E D U R E : A N

A N A L Y S I S O F C A S E S A N D C O N C E P T S 7 2 - 7 6 ( 4 t h e d . 2 0 0 0 ) . 1 0 N o t e f u r t h e r t h a t e v e n q u e s t i o n i n g i n t h e f i e l d t h a t l a s t s l o n g e r t h a n a f e w m i n u t e s r e q u i r e s r e a s o n a b l e s u s p i c i o n , w h i c h e x i s t s o n l y i f t h e r e a r e s p e c i f i c a n d a r t i c u l a b l e f a c t s t h a t t h e p e r s o n i s o r h a s b e e n e n g a g i n g i n c r i m i n a l a c t i v i t y . I d .

Page 6: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 4 4 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

on someone about whom I'm merely suspicious would usually be a waste of time. I could also surreptitiously follow you around for awhile, but that tactic is unlikely to produce much, especially if you make most of your contacts through techno-logical meansBphones, emailBrather than physical travel. Of course, I could tap your phone and intercept your emails, but that requires a warrant based on probable cause, which I do not have. Thankfully there are other, much more efficient ways I can covertly acquire information about you, many of which I can carry out without leaving my desk and most of which, as the next section describes, require no or little legal authoriza-tion. The easiest way to get useful data is to contact one of the many companies, usually called commercial data brokers (CDBs), that use computers and the Internet to dig up Adirt@ from public and not-so public records.11 One such company is LexisNexis, the legal research bohemoth, which operates Accurint, a program that allows Aorganizations to quickly and easily extract valuable knowledge from . . . tens of billions of data records on individuals and businesses,@ armed with no more than a name, address, phone number, or social security number.12 Through this process, I can obtain information about a wide array of your transactions, including: bankrupt-cies and corporate filings, criminal convictions and criminal and civil court data (including marriage and divorce informa-tion), driver's licenses and motor vehicle information, firearms, hunting, fishing and professional licenses and permits, Internet domain names, property deeds and assessments, and 1 1 I n f a c t , t h e w e b s i t e f o r o n e o f t h e s e c o m p a n i e s c a n b e f o u n d a t Ad i g d i r t . c o m @. T h e s e r v i c e s a r e o f u n e v e n q u a l i t y . S e e P r e s t o n G r a l i a , D i g i t a l G u m s h o e s , a v a i l a b l e a t h t t p : / / w w w . p c m a g . c o m / a r t i c l e 2 / 0 , 4 1 4 9 , 2 0 1 4 8 , 0 0 . a s p ( N o v . 1 3 , 2 0 0 1 ) ( r e c o u n t i n g e f f o r t s t o u s e v a r i o u s s e r v i c e s , i n c l u d i n g d i g d i r t , w i t h m i x e d r e s u l t s ) . F o r p r e s e n t p u r p o s e s , h o w e v e r , t h e p o i n t i s t h a t t h e i r p o t e n t i a l f o r t r a n s a c t i o n s u r v e i l l a n c e i s e n o r m o u s . 1 2 S e e A c c u r i n t W e b s i t e , a v a i l a b l e a t w w w . a c c u r i n t . c o m / a o u t u s . h t m l ( l a s t a c c e s s e d o n S e p t . 1 3 , 2 0 0 5 ) . L e x i s N e x i s b o u g h t A c c u r i n t f r o m S e i s I n t i n 2 0 0 5 .

Page 7: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 145

voter registration information.13 For some states, the informa-tion held in Apublic records@ by government bureaucracies and available via computer is immensely broader: some types of medical records, Social Security numbers, crime victim's names, credit card and account numbers, psychiatric evalu-ation reports, tax returns, payroll information, and family profiles.14 For a time, all of this was made even more easily accessible to state law enforcement officials through MATRIX (Multi-State Anti-Terrorist Information Exchange), a multi-state consortium that allowed police to use Accurint for inves-tigative purposes until its federal funding was discontinued in 2005.15 The FBI and other federal agencies rely on equally power-ful commercial data brokers, with perhaps the most popular being Choicepoint.16 Under its contract with the federal gov-ernment, Choicepoint can provide me, as a federal agent, with Acredit headers@ (information at the top of a credit report which includes name, address, previous address, phone number, social security number and employer); pre-employment screen-ing information (including financial reports, education verification, reference verification, felony check, motor vehicle record and professional credential verification); Aasset location services@; information about neighbors and family members; licenses (driver's, pilot's and professional); business informa-tion compiled by state bureaucracies; and Aderogatory informa- 1 3 I d . 1 4 R o b e r t E l l i s S m i t h , H e r e ' s W h y P e o p l e A r e M a d , 2 9 P R I V A C Y J . 7 , 7 ( J a n . 2 0 0 3 ) ( c i t i n g S t e p h e n G r i m e s , a d m i n i s t r a t o r o f t h e J u d i c i a l R e c o r d s C e n t e r i n R h o d e I s l a n d ) , a v a i l a b l e a t h t t p : / / w w w . p r i v a c y j o u r n a l . n e t / . 1 5 S e e F l a . D e p ' t L a w E n f o r c e m e n t , M A T R I X P i l o t P r o j e c t C o n c l u d e s ( A p r i l 1 4 , 2 0 0 5 ) , a v a i l a b l e a t h t t p : / / w w w . f d l e . s t a t e . f l . u s . p r e s s _ r e l e a s e s / 2 0 0 5 0 4 1 5 _ m a t r i x _ p r o j e c t ( n o t i n g , h o w e v e r , t h a t F l o r i d a a n d s e v e r a l o t h e r s t a t e s m a y c o n t i n u e f u n d i n g t h e p r o g r a m ) . 1 6 S e e C h r i s J a y H o o f n a g l e , B i g B r o t h e r ' s L i t t l e H e l p e r s : H o w C h o i c e P o i n t a n d O t h e r C o m m e r c i a l D a t a B r o k e r s C o l l e c t a n d P a c k a g e Y o u r D a t a f o r L a w E n f o r c e m e n t , 2 9 N . C . J . I N T ' L & C O M M . R E G . 5 9 5 , 6 1 7 - 1 8 ( d e s c r i b i n g t h e F B I ' s As e c r e t , c l a s s i f i e d c o n t r a c t @ w i t h C h o i c e p o i n t ) .

Page 8: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 4 6 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

tion@ such as arrests, liens, judgments and bankruptcies.17 If you think I wouldn't bother requesting such a check, think again; between 1999 and 2001, Choicepoint and similar servic-es ran between 14,000 and 40,000 searches per month for the United States Marshall's Service alone.18 The one drawback to the type of information I get from CDBs is that it is pretty general. I may want to know more about what you do on a daily basis. Fortunately, there are a number of services that can help me out. For instance, ad-vances in data warehousing and data exchange technology in the financial sector allow very easy access to a virtual cornu-copia of transaction-related information that can reveal, among other things, Awhat products or services you buy; what charities, political causes, or religious organizations you con-tribute to; . . . where, with whom, and when you travel; how you spend your leisure time; . . . whether you have unusual or dangerous hobbies; and even whether you participate in certain felonious activities.@19 If I jump through some pro for-ma legal hoops (detailed in Part II), I can also get records of all the phone numbers you dial and receive calls from,20 and from your Internet Service Provider (ISP) I can get every website address you have visited (so-called Aclickstream data@) and

1 7 I d . a t 6 0 1 - 0 2 . N o t e a l s o t h a t o n c e a s o c i a l s e c u r i t y n u m b e r a n d o t h -e r i d e n t i f y i n g i n f o r m a t i o n i s o b t a i n e d , o t h e r p e r s o n a l i n f o r m a t i o n m i g h t b e c o m e m u c h m o r e e a s i l y a c c e s s i b l e . S e e L y n n M . L o P u c k i , H u m a n I d e n t i f i c a t i o n T h e o r y a n d t h e I d e n t i t y T h e f t P r o b l e m , 8 0 T E X . L . R E V . 8 9 , 1 0 8 - 1 4 ( 2 0 0 1 ) ( p o i n t i n g o u t t h a t s c h o o l s , f i n a n c i a l i n s t i t u t i o n s a n d o t h e r e n t i t i e s m a k e p e r s o n a l i n f o r m a t i o n a c c e s s i b l e b y a n y o n e w i t h t h e r i g h t S o c i a l S e c u r i t y n u m b e r , a d d r e s s , a n d m o t h e r ' s m a i d e n n a m e ) . 1 8 I d . a t 4 - 6 . I n 2 0 0 1 , t h e I m m i g r a t i o n a n d N a t u r a l i z a t i o n S e r v i c e c o n d u c t e d a p p r o x i m a t e l y 2 3 , 0 0 0 s u c h s e a r c h e s a m o n t h . I d . a t 1 1 . 1 9 J a n e t D e a n G e r t z , T h e P u r l o i n e d P e r s o n a l i t y : C o n s u m e r P r o f i l i n g i n F i n a n c i a l S e r v i c e s , 3 9 S A N D I E G O L . R E V . 9 4 3 , 9 4 4 - 4 5 , 9 5 1 ( 2 0 0 2 ) . 2 0 T h e E l e c t r o n i c C o m m u n i c a t i o n s P r i v a c y A c t , 1 8 U . S . C . ' 3 1 2 1 a l l o w s p r o s e c u t o r s t o o b t a i n t h i s i n f o r m a t i o n b y c e r t i f y i n g t o a c o u r t t h a t i t i s Ar e l e v a n t @ t o a n o n g o i n g i n v e s t i g a t i o n . S e e i n f r a t e x t a c c o m p a n y i n g n o t e s 4 3 - 4 7 .

Page 9: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 147

every email address you have contacted.21 The latter information can be particularly revealing to the extent you transact your business over the Internet. Recently some ISPs, like America OnLine, have stopped maintaining clickstream data, precisely so they won't have to answer such law enforcement requests.22 No worries. All I have to do is invest in something called Asnoopware.@ Bearing names like BackOrifice, Spyagent, and WinWhatWhere,23 snoopware is to be distinguished from adware and spyware. The latter soft-ware tells the buyer of the program how to contact people who visit the buyer's website. Snoopware, in contrast, allows its buyer to track the target well beyond a single website; it accu-mulates the addresses of all the Internet locations the target visits, as well as the recipients of the target's emails. The FBI has developed a similar program, once dubbed Carnivore, now called DCS-1000, that filters all emails that pass through a particular server.24 Although some transaction snoopware 2 1 T h e E l e c t r o n i c C o m m u n i c a t i o n s P r i v a c y A c t a t m o s t r e q u i r e s a s h o w i n g o f r e l e v a n c e f o r t h i s i n f o r m a t i o n . S e e 1 8 U . S . C . ' 3 1 2 1 ; i n f r a n o t e s 6 9 - 7 7 a n d a c c o m p a n y i n g t e x t ; s e e a l s o G a v i n S k o k , E s t a b l i s h i n g a L e g i t i m a t e E x p e c t a t i o n o f P r i v a c y i n C l i c k s t r e a m D a t a , 6 M I C H . J . T E L E C O M M . & T E C H . L . R E V . 6 1 , 6 8 - 6 9 ( 2 0 0 0 ) ( d e t a i l i n g t h e t y p e o f i n f o r m a t i o n g o v e r n m e n t c a n o b t a i n t h r o u g h c l i c k s t r e a m d a t a ) . 2 2 C o n v e r s a t i o n w i t h P e t e r S w i r e , P r o f e s s o r , O h i o S t a t e S c h o o l o f L a w , S e p t e m b e r 2 0 , 2 0 0 4 . T h e E l e c t r o n i c F r o n t i e r F o u n d a t i o n s h a s r e c o m m e n d e d t h a t I S P s o n l y k e e p p e r s o n a l l y i d e n t i f i a b l e c o m m u n i c a t i o n s l o g s f o r As o l o n g a s i t i s o p e r a -t i o n a l l y n e c e s s a r y , a n d i n n o e v e n t f o r m o r e t h a n a f e w w e e k s . @ E l e c t r o n i c F r o n t i e r F o u n d a t i o n , B e s t D a t a P r a c t i c e s f o r O n l i n e S e r v i c e P r o v i d e r s , f r o m t h e E l e c t r o n i c F r o n t i e r F o u n d a t i o n a t h t t p : / / w w w . e f f . o r g / o s p / 2 0 0 4 0 8 1 9 _ O S P B e s t P r a c t i c e s . p d f 2 ( J u n e 2 9 , 2 0 0 5 ) . 2 3 S e e C a d e M e t z , S p y w a r e : I t ' s L u r k i n g o n Y o u r M a c h i n e , P C M A G . , A p r . 2 2 , 2 0 0 3 , a t 8 5 , 8 8 . 2 4 J e r e m y C . S m i t h , T h e U S A P A T R I O T A c t : V i o l a t i n g R e a s o n a b l e E x p e c t a t i o n s o f P r i v a c y P r o t e c t e d b y t h e F o u r t h A m e n d m e n t W i t h o u t A d v a n c i n g N a -t i o n a l S e c u r i t y , 8 2 N . C . L . R E V . 4 1 2 , 4 4 8 - 4 9 ( 2 0 0 3 ) . R e c e n t l y , t h e F B I a n n o u n c e d t h a t i t w o u l d n o l o n g e r u s e D C S - 1 0 0 0 , b u t i n s t e a d r e l y o n Au n s p e c i f i e d c o m m e r c i a l s o f t w a r e t o e a v e s d r o p o n c o m p u t e r t r a f f i c . @ F B I C u t s C a r n i v o r e I n t e r n e t P r o b e , a t h t t p : / / w w w . c n n . c o m / 2 0 0 5 / T E C H / i n t e r n e t / 0 1 / 1 8 / f b i . c a r n i v o r e . a p / i n d e x . h t m l ( o n f i l e w i t h t h e M i s s i s s i p p i L a w J o u r n a l ) .

Page 10: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 4 8 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

requires access to the server or computer to install, other types, called Trojan Horses, can electronically worm their way onto the system disguised as something useful.25 In short, even if you stay at home and conduct all your business and social life via phone, email and surfing the `Net, I can construct what one commentator has called Aa complete mosaic@ of your characteristics.26 And I can do all of this with-out you having a clue I'm doing it. It is also possible that I could surreptitiously obtain an even wider array of transac-tional informationBon matters ranging from medical treatment to financial decisionsBwith very little effort. But further dis-cussion of that possibility, as well as of the huge amount of transactional information that government can obtain if it is willing to proceed overtly, will have to await Part II's explana-tion of the current legal regime.

2 5 M e t z , s u p r a n o t e 2 3 , a t 8 5 . S o m e s n o o p w a r e , u s i n g Ak e y l o g g e r @ t e c h n o l o g y , c a n e v e n t e l l t h e u s e r t h e c o n t e n t o f o n e ' s c o m p u t e r s c r e e n . I d . D C S -1 0 0 0 c a n a l s o b e p r o g r a m m e d t o a c c e s s c o n t e n t a s w e l l a s i d e n t i f y i n g i n f o r m a t i o n . J o s e p h F . K a m p h e r s t e i n , I n t e r n e t P r i v a c y L e g i s l a t i o n a n d t h e C a r n i v o r e S y s t e m , 1 9 T E M P . E N V T L . L . & T E C H . J . 1 5 5 , 1 6 7 ( 2 0 0 1 ) . B o t h f u n c t i o n s a r e f o r m s o f c o m m u n i c a t i o n s s u r v e i l l a n c e t h a t a r e b e y o n d t h e s c o p e o f t h i s a r t i c l e . 2 6 A n t h o n y P a u l M i l l e r , T e l e i n f o r m a t i c s , T r a n s b o r d e r D a t a F l o w s a n d t h e E m e r g i n g S t r u g g l e f o r I n f o r m a t i o n : A n I n t r o d u c t i o n t o t h e A r r i v a l o f t h e N e w I n f o r m a t i o n A g e , 2 0 C O L U M . J . L . & S O C . P R O B S . 8 9 , 1 1 1 ( 1 9 8 6 ) .

Page 11: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 149

B. Event-Based Transaction Surveillance

Now consider an entirely different type of scenario, one in which government has no suspicion of or even interest in a specific individual, but rather possesses information about a particular crime that has been or will be committed. Govern-ment efforts to obtain transactional data in this situation is not target-based, but event-based. Say, for instance, that the police know that a sniper-killer wears a particular type of shoe (thanks to mudprints near a sniper site), that he owns a particular type of sweater (because of threads found at another site), and that he reads Elmore Leonard novels (because of allusions to those books made in his communications to the police). Law enforcement understandably might want to pe-ruse the purchase records of local shoe, clothing, and book stores as part of their investigation. Once police obtain the credit card numbers of those who bought, say, the type of sweater found at the murder scene, they can trace other pur-chases made with the same card, to see if the relevant type of shoe or book was bought by any of the same people. Of course, if there is a match on two or three of the items, the surveil-lance may then turn into a target-based investigation. Or say that a CIA informant reports that he believes Al Qaeda is considering blowing up a major shopping mall, using skydivers jumping from rental planes.27 The FBI might want to requisition the records of all companies near major metro-politan areas that teach ski-diving and that rent airplanes, as well as the Acookie@ logs (records of cyberspace visitors) of all websites that provide information about manufacturing ex-plosives, to see if there are any intersections between these three categories of data, in particular involving men with

2 7 T h i s i m a g i n a r y s c e n a r i o i s b o r r o w e d f r o m t h e s e c o n d M a r k l e R e p o r t . M a r k l e F o u n d a t i o n , C r e a t i n g a T r u s t e d N e t w o r k f o r H o m e l a n d S e c u r i t y : S e c o n d R e p o r t o f t h e M a r k l e F o u n d a t i o n T a s k F o r c e , a p p . D a t 1 2 1 - 3 3 ( 2 0 0 3 ) , a v a i l a b l e a t h t t p : / / w w w . m a r k l e t a s k f o r c e . o r g / .

Page 12: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 5 0 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

Arab-sounding names. If there are then, again, further target-based surveillance investigation might take place. Although the first type of event-based surveillance is backward-looking and the second is forward-looking, both law enforcement efforts are a form of what has been called Adata mining@ or Aprofiling,@ that is, an attempt to look through transaction information to find patterns of behavior that per-mit police to zero in on possible suspects.28 If the information sought is not digitized, which is likely with respect to records kept by ski-diving companies, for instance, then law enforce-ment may have to rely on good old-fashioned human snooping. In this day and age, however, a significant amount of data mining can be carried out using technology. For example, the Defense Department's Total Information Awareness program, before it was severely limited by Congress, would have used software developed by private companies Ato sift through virtu-al mountains of data of everyday transactions, such as credit card purchases, e-mail and travel itineraries, in an attempt to discover patterns predictive of terrorist activity.@29 Whether it relies on computers or humans, event-based data mining, like transaction surveillance of particular individuals, can easily be conducted unbeknownst to those whose records are surveilled.

2 8 F o r a g e n e r a l d e s c r i p t i o n o f d a t a m i n i n g a n d i t s p r e v a l e n c e , s e e A n d r e w J . M c C l u r g , A T h o u s a n d W o r d s A r e W o r t h a P i c t u r e : A P r i v a c y T o r t R e s p o n s e t o C o n s u m e r D a t a P r o f i l i n g , 9 8 N W . U . L . R E V . 6 3 , 7 1 - 8 8 ( 2 0 0 3 ) . 2 9 I d . a t 6 4 ; s e e a l s o i n f r a n o t e 1 2 2 .

Page 13: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 151

C. Summary

Technology has made transaction surveillance a particu-larly powerful law enforcement tool. Given the potential that transaction surveillance provides the government for creating personality mosaics and linking people to crime, it could well be even more useful than visual tracking of person's activities (physical surveillance) and eavesdropping on or hacking into a person's communications (communications surveillance). But the real beauty of transaction surveillance for the government is that, compared to physical surveillance of activities inside the home and communications surveillance, it is so lightly regulated. As Part II explains, under today's regulatory regime it is much easier for government to obtain information about our most intimate transactions, including medical and financial matters, than it is to intercept our communications about those transactions.

Page 14: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 5 2 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

II. CURRENT LEGAL REGULATION OF TRANSACTION

SURVEILLANCE Under the Fourth Amendment, the government usually cannot conduct a search of houses, persons, papers and effects without probable cause,30 a relatively high level of certainty akin to a more-likely-than-not standard (which, in non-exigent situations, must be found by a magistrate pursuant to an application for a warrant).31 For some less invasive actions (a frisk, for instance), police only need reasonable suspicion, which is a lower level of certainty than probable cause but still requires Aspecific and articulable facts@ that Acriminal activity may be afoot,@ to quote from the famous case of Terry v. Ohio.32 Finally, in some Aspecial needs@ situations (searches of school children or employees; drug testing; health and safety inspections; roadblocks), the police need only act Areasonably,@ but that test still usually requires reasonable suspicion,33 or at least a showing that those conducting the government action are pursuing some end other than criminal law enforcement.34 3 0 S e e U . S . C O N S T . a m e n d . I V . 3 1 S e e W H I T E B R E A D & S L O B O G I N , s u p r a n o t e 9 , a t 1 3 7 - 4 2 . 3 2 3 9 2 U . S . 1 , 2 1 , 3 0 ( 1 9 6 8 ) . 3 3 S e e O ' C o n n o r v . O r t e g a , 4 8 0 U . S . 7 0 9 , 7 2 4 ( 1 9 8 7 ) ( AT h e d e l a y i n c o r r e c t i n g t h e e m p l o y e e m i s c o n d u c t c a u s e d b y t h e n e e d f o r p r o b a b l e c a u s e r a t h e r t h a n r e a s o n a b l e s u s p i c i o n w i l l b e t r a n s l a t e d i n t o t a n g i b l e a n d o f t e n i r r e p a r a b l e d a m a g e t o t h e a g e n c y ' s w o r k , a n d u l t i m a t e l y t o t h e p u b l i c i n t e r e s t . @) ; N e w J e r s e y v . T . L . O . , 4 6 9 U . S . 3 2 5 , 3 4 1 - 4 2 , 3 4 4 ( 1 9 8 5 ) ( h o l d i n g t h a t Aa s e a r c h o f a s t u d e n t b y a t e a c h e r o r o t h e r s c h o o l o f f i c i a l w i l l b e ` j u s t i f i e d a t i t s i n c e p t i o n ' w h e n t h e r e a r e r e a s o n a b l e g r o u n d s f o r s u s p e c t i n g t h a t t h e s e a r c h w i l l t u r n u p e v i d e n c e @ a n d f i n d i n g t h a t t h i s s t a n d a r d w a s m e t i n t h i s c a s e b e c a u s e t h e r e w a s r e a s o n a b l e s u s p i c i o n ) . 3 4 S e e B d . o f E d u c . v . E a r l s , 5 3 6 U . S . 8 2 2 , 8 2 9 ( 2 0 0 2 ) ( u p h o l d i n g w a r r a n t l e s s , s u s p i c i o n l e s s s c h o o l d r u g t e s t i n g , n o t i n g t h a t Ai n t h e c o n t e x t o f s a f e t y a n d a d m i n i s t r a t i v e r e g u l a t i o n s , a s e a r c h u n s u p p o r t e d b y p r o b a b l e c a u s e m a y b e r e a s o n a b l e w h e n ` s p e c i a l n e e d s , b e y o n d t h e n o r m a l n e e d f o r l a w e n f o r c e m e n t , m a k e t h e w a r r a n t a n d p r o b a b l e - c a u s e r e q u i r e m e n t i m p r a c t i c a b l e ' @) ; C i t y o f I n d i a n a p o l i s v . E d m o n d , 5 3 1 U . S . 3 2 , 4 1 ( 2 0 0 0 ) ( AW e h a v e n e v e r a p p r o v e d a c h e c k p o i n t p r o g r a m

Page 15: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 153

In contrast, transaction surveillance, whether it is event-based or target-based, never requires probable cause or rea-sonable suspicion, even when conducted by government agents whose primary goal is criminal investigation. At most, govern-ment agents seeking transactional information need a subpoe-naBeither a subpoena duces tecum issued by a grand jury, or an Aadministrative subpoena@ issued by a government agen-cyBwhich is valid as long as the information it seeks is Arel-evant@ to a legitimate (statutorily-authorized) investigation. Relevance, as defined by the Supreme Court, is an extremely low standard. In the grand jury context, a subpoena may be quashed on irrelevancy grounds only when the court Adeter-mines that there is no reasonable possibility that the category of materials the Government seeks will produce information relevant to the general subject of the grand jury's investiga-tion.@35 The relevancy standard in the administrative subpoe-na context is even lower, with the Supreme Court holding that A[e]ven if one were to regard the [subpoena] as caused by nothing more than official curiosity, nevertheless law-enforc-ing agencies have a legitimate right to satisfy themselves that corporate behavior is consistent with the law and the public interest.@36 In short, the link between the information a sub-poena commands and the investigation the government is pursuing can be very tenuous indeed. Although a subpoena w h o s e p r i m a r y p u r p o s e w a s t o d e t e c t e v i d e n c e o f o r d i n a r y c r i m i n a l w r o n g d o i n g . R a t h e r , o u r c h e c k p o i n t c a s e s h a v e r e c o g n i z e d o n l y l i m i t e d e x c e p t i o n s t o t h e g e n e r a l r u l e t h a t a s e i z u r e m u s t b e a c c o m p a n i e d b y s o m e m e a s u r e o f i n d i v i d u a l i z e d s u s p i c i o n . @) . 3 5 U n i t e d S t a t e s v . R . E n t e r s . , I n c . , 4 9 8 U . S . 2 9 2 , 3 0 1 ( 1 9 9 1 ) ( e m p h a s i s a d d e d ) . 3 6 U n i t e d S t a t e s v . M o r t o n S a l t C o . , 3 3 8 U . S . 6 3 2 , 6 5 2 ( 1 9 5 0 ) ; s e e a l s o U n i t e d S t a t e s v . P o w e l l , 3 9 7 U . S . 4 8 , 5 7 - 5 8 ( 1 9 6 4 ) ( h o l d i n g t h a t a d m i n i s t r a t i v e s u b p o e n a s a r e v a l i d i f t h e r e c o r d s s o u g h t a r e Ar e l e v a n t @ t o a n i n v e s t i g a t i o n c o n d u c t e d f o r a Al e g i t i m a t e p u r p o s e @) ; U n i t e d S t a t e s v . H u n t o n & W i l l i a m s , 9 5 2 F . S u p p . 8 4 3 , 8 5 4 ( D . D . C . 1 9 9 7 ) ( h o l d i n g t h a t t h e P o w e l l i n q u i r y i s m o r e d e f e r e n t i a l t h a n t h e Aa r b i t r a r y a n d c a p r i c i o u s @ s t a n d a r d o f r e v i e w f o r a g e n c y a c t i o n u n d e r t h e A d m i n i s t r a t i v e P r o c e d u r e A c t ) .

Page 16: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 5 4 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

may be challenged before it is executed, a successful challenge is exceedingly rare, whether the subpoena is issued by a grand jury or an administrative agency.37 Furthermore, as we shall see, the law does not require even a traditional subpoena for most types of transaction surveillance. Instead, the government, in particular Congress, has either invented new forms of authorization that are even easier to obtain or has simply permitted unrestrained law enforcement access to transactional information. The following account of this incredibly weak regulatory regime starts with the law regarding transaction surveillance of identifying infor-mation, conducted in real-time, then describes regulation of government attempts to obtain public records, and finally describes transaction surveillance of records held by private entities.

A. Interception of Transaction Information Real-time government interception of the content of com-munications (what I am calling communications surveillance) is prohibited unless authorized by a warrant based on probable cause.38 In contrast, interception of the identifying features of the communicationBthe names of the communica-tors, their phone numbers or email addresses, and the ad-dresses of websites visitedBcan take place on a much lesser showing. The Fourth Amendment does not apply at all to this type of transaction surveillance, and statutory law places virtually no restrictions on it.

3 7 S e e W A Y N E R . L A F A V E , J E R O L D H . I S R A E L & N A N C Y J . K I N G , 3 C R I M I N A L

P R O C E D U R E 1 3 4 ( 2 d e d . 1 9 9 9 ) ( AC o u r t s g e n e r a l l y g i v e g r a n d j u r i e s c o n s i d e r a b l e l e e w a y i n j u d g i n g r e l e v a n c y . @) ; J A C O B A . S T E I N , G L E N N A . M I T C H E L L & B A S I L J . M E Z I N E S , 3 A D M I N I S T R A T I V E L A W 2 0 - 5 9 ( 2 0 0 2 ) ( A[ S ] u b p o e n a s w i l l b e e n f o r c e d a s t o a n y d o c u m e n t s t h a t ` a r e n o t p l a i n l y i m m a t e r i a l o r i r r e l e v a n t t o t h e i n v e s t i g a t i o n . ' @) . 3 8 1 8 U . S . C . ' 2 5 1 8 ( 3 ) . T h e c o u r t m u s t a l s o f i n d t h a t An o r m a l i n v e s t i g a t i v e p r o c e d u r e s h a v e b e e n t r i e d a n d h a v e f a i l e d o r r e a s o n a b l y a p p e a r t o b e u n l i k e l y t o s u c c e e d i f t r i e d o r t o b e t o o d a n g e r o u s . @ I d . ' 2 5 1 8 ( 3 ) ( c ) .

Page 17: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 155

The Fourth Amendment's justification require-mentsBprobable cause and the likeBonly apply if government engages in a Asearch or seizure.@ Although one might reason-ably label government efforts to track down a person's phone and email correspondents a search, the Supreme Court has held that a Fourth Amendment search occurs only when a government action infringes a reasonable expectation of priva-cy.39 More importantly for present purposes, the Court has determined, in Smith v. Maryland,40 that we do not have a reasonable expectation in the phone numbers we dial because we know or should know that phone companies keep a record of these numbers, and thus Aassume the risk@ that the phone company will decide to disclose this information to the govern-ment.41 Because it is generally known that Internet service providers monitor, if only temporarily, our emails and Internet surfing, the Court would probably also say that we assume the risk these providers will become government informants. Al-though Universal Resource Locators (URLs) can be more infor-mative than a mere phone number, both because they are addresses (e.g., www.amazon.com/kidneydisease) and because they allow access to the website and thus permit government to ascertain what the user has viewed, the lower courts apply-ing Smith appear to see no difference between the two types of routing information.42 Accordingly, the government can proba- 3 9 K y l l o v . U n i t e d S t a t e s , 5 3 3 U . S . 2 7 , 3 3 ( 2 0 0 1 ) ( A[ A ] F o u r t h A m e n d -m e n t s e a r c h o c c u r s w h e n t h e g o v e r n m e n t v i o l a t e s a s u b j e c t i v e e x p e c t a t i o n o f p r i v a c y t h a t s o c i e t y r e c o g n i z e s a s r e a s o n a b l e . @) ( c i t i n g K a t z v . U n i t e d S t a t e s , 3 8 9 U . S . 3 4 7 , 3 6 1 ( 1 9 6 7 ) ( H a r l a n , J . , c o n c u r r i n g ) ) . 4 0 4 4 2 U . S . 7 3 5 ( 1 9 7 9 ) . 4 1 I d . a t 7 4 4 ( A[ P ] e t i t i o n e r v o l u n t a r i l y c o n v e y e d n u m e r i c a l i n f o r m a t i o n t o t h e t e l e p h o n e c o m p a n y a n d ` e x p o s e d ' t h a t i n f o r m a t i o n t o i t s e q u i p m e n t i n t h e o r d i -n a r y c o u r s e o f b u s i n e s s . . . [ t h e r e b y ] a s s u m [ i n g ] t h e r i s k t h a t t h e c o m p a n y w o u l d r e v e a l t o p o l i c e t h e n u m b e r s h e d i a l e d . @) 4 2 C f . T h y g e s o n v . U . S . B a n c r o f t , N o . C U - 0 3 - 4 6 7 - S T 2 0 0 4 W L 2 0 6 6 7 4 6 ( D . O r . S e p t . 1 5 , 2 0 0 4 ) ( A[ W ] h e n t h e i n f o r m a t i o n d e f e n d a n t s c o l l e c t e d w a s o n l y t h e w e b s i t e a d d r e s s e s , r a t h e r t h a n t h e a c t u a l c o n t e n t o f t h e w e b s i t e s T h y g e s o n v i s i t e d , [ t h e s u r v e i l l a n c e ] i s a n a l o g o u s t o a p e n r e g i s t r y s e a r c h , w h e r e i n

Page 18: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 5 6 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

bly ignore the Fourth Amendment when intercepting phone numbers and Internet addresses. Congress has imposed some statutory restraints on this type of surveillance, but nothing approaching the usual Fourth Amendment protections. In the Electronic Communications Privacy Act of 1986 (ECPA), it created a new, streamlined type of authorization process for use of pen registers (technology which intercepts outgoing phone numbers) and trap and trace devices (technology which intercepts incoming numbers), a process that can be initiated by either a federal government attorney or a state law enforcement officer. All the government agent must do is certify to a court facts that show the information is Arelevant to an ongoing investigation@ and is Alikely to be obtained by [the surveillance].@43 If that certifi-cation is made, the court must issue the order.44 The USA Patriot Act of 2001 expanded the definition of pen registers and trap and trace devices to include all devices

t h e F o u r t h A m e n d m e n t c o n t e x t , c o u r t s h a v e h e l d t h a t d e f e n d a n t s h a v e n o r e a s o n a b l e e x p e c t a t i o n o f p r i v a c y i n t h e t e l e p h o n e n u m b e r s t h e y d i a l b e c a u s e t h e n u m b e r s a r e c o n v e y e d t o t h e t e l e p h o n e c o m p a n y . @) ; U n i t e d S t a t e s v . K e n n e d y , 8 1 F . S u p p . 2 d 1 1 0 3 , 1 1 1 0 ( D . K a n . 2 0 0 0 ) ( AW h e n d e f e n d a n t e n t e r e d i n t o a n a g r e e m e n t w i t h R o a d R u n n e r f o r I n t e r n e t s e r v i c e , h e k n o w i n g l y r e v e a l e d a l l i n f o r m a t i o n c o n -n e c t e d t o t h e I P a d d r e s s . . . . @) ; s e e a l s o i n f r a n o t e 4 6 . B i l l i n g r e c o r d s o f I S P s m a y a l s o b e u n p r o t e c t e d b y t h e F o u r t h A m e n d m e n t . U n i t e d S t a t e s v . H a m b r i c k , 2 2 5 F . 3 d 6 5 6 ( 4 t h C i r . 2 0 0 0 ) ( u n p u b l i s h e d o p i n i o n ) ( h o l d i n g t h a t p e r s o n d o e s n o t h a v e a r e a s o n a b l e e x p e c t a t i o n o f p r i v a c y Ai n t h e a c c o u n t i n f o r m a t i o n g i v e n t o t h e I S P i n o r d e r t o e s t a b l i s h t h e e - m a i l a c c o u n t , [ b e c a u s e i t ] i s n o n - c o n t e n t i n f o r m a t i o n @ d i s c l o s u r e o f w h i c h At o a t h i r d p a r t y d e s t r o y s t h e p r i v a c y e x p e c t a t i o n t h a t m i g h t h a v e e x i s t e d p r e v i o u s l y @) , a v a i l a b l e a t 2 0 0 0 U . S . A p p . L E X I S 1 8 6 6 5 , a t * 1 2 . I n d e e d , s o m e c o u r t s h a v e h e l d t h a t t h e c o n t e n t o f e m a i l m e s s a g e s , o n c e t h e y a r e o p e n e d , d e s e r v e n o F o u r t h A m e n d m e n t p r o t e c t i o n b e c a u s e o n e a s s u m e s t h e r i s k t h e r e c i p i e n t w i l l r e v e a l i t t o o t h e r s . U n i t e d S t a t e s v . C h a r b o n n e a u , 9 7 9 F . S u p p . 1 1 7 7 , 1 1 8 4 ( S . D . O h i o 1 9 9 7 ) ; S m y t h v . P i l l s b u r y , 9 1 4 F . S u p p . 9 7 , 1 0 1 ( E . D . P a . 1 9 9 6 ) ; U n i t e d S t a t e s v . M a x w e l l , 4 5 M . J . 4 0 6 , 4 1 7 - 1 8 ( C . A . A . F . 1 9 9 6 ) . 4 3 1 8 U . S . C . ' 3 1 2 3 ( a ) ( 1 ) ( 2 0 0 0 ) . 4 4 U n i t e d S t a t e s v . F r e g o s o , 6 0 F . 3 d 1 3 1 4 , 1 3 2 0 ( 8 t h C i r . 1 9 9 5 ) ( t h e Aj u d i c i a l r o l e i n a p p r o v i n g u s e o f t r a p a n d t r a c e d e v i c e s i s m i n i s t e r i a l i n n a t u r e @) .

Page 19: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 157

that obtain Adialing, routing, addressing, or signaling informa-tion utilized in the processing and transmitting of wire or elec-tronic communications . . . @45 Thus, to use snoopware, DCS-1000, and other means of ascertaining a person's email corre-spondents and favorite websites, the government need only certify the relevance of this information to a current investiga-tion.46 Again, if this certification is made, the court must issue an order. Those of us who teach Fourth Amendment law sometimes joke about supposedly Aneutral and detached@ magistrates rubberstamping warrant applications, but we also assume that judicial independence is theoretically possible.47 Here, in contrast, Congress has legislatively invented mandatory rubberstamping. It is tempting to call this type of authoriza-tion a Arubberstamp order,@ but I will instead use the more measured term certification order. Whatever one calls the authorization process, it amounts to minimal limitation on interception of transaction information.

4 5 1 8 U . S . C . ' 3 1 2 1 ( c ) ( 2 0 0 0 ) . 4 6 M o s t c o u r t s h a v e h e l d t h a t c o m p a n i e s t h a t a c q u i r e Ac l i c k s t r e a m d a -t a @ a b o u t w h e r e a n I n t e r n e t u s e r g o e s o n t h e I n t e r n e t d o n o t v i o l a t e E C P A b e c a u s e t h e w e b s i t e s v i s i t e d b y t h e u s e r h a v e a u t h o r i z e d t h e c o m p a n i e s t o a c c e s s t h i s i n f o r -m a t i o n . S e e I n r e D o u b l e C l i c k , I n c . , P r i v a c y L i t i g . , 1 5 4 F . S u p p . 2 d 4 9 7 , 5 2 6 ( S . D . N . Y . 2 0 0 1 ) ; C h a n c e v . A v e . A , I n c . , 1 6 5 F . S u p p . 2 d 1 1 5 3 , 1 1 6 3 ( W . D . W a s h . 2 0 0 1 ) ; I n r e T o y s R U s , I n c . , P r i v a c y L i t i g . , N o . C 0 0 - 2 7 4 6 2 0 0 1 U . S . D i s t . L E X I S 1 6 9 4 7 , a t * 2 8 ( N . D . C a l . O c t . 9 , 2 0 0 1 ) . T h u s , g o v e r n m e n t c o u l d a l s o o b t a i n r o u t i n g i n f o r m a t i o n f r o m t h e s e p r i v a t e c o m p a n i e s , w i t h o u t u s i n g s n o o p w a r e . H o w e v e r , s o m e c o u r t s m i g h t c o n s i d e r t h a t a p p r o a c h t o b e a c c e s s i n g As t o r e d @ i n f o r m a t i o n . S e e , e . g . , U n i t e d S t a t e s v . S t e i g e r , 3 1 8 F . 3 d 1 0 3 9 , 1 0 5 0 ( 1 1 t h C i r . 2 0 0 3 ) . I f s o , g o v e r n m e n t m a y h a v e t o o b t a i n a s u b p o e n a . S e e i n f r a t e x t a c c o m p a n y i n g n o t e s 6 5 - 6 8 . 4 7 S e e R I C H A R D V A N D U I Z E N D , L . P A U L S U T T O N & C H A R L O T T E A . C A R T E R , T H E S E A R C H W A R R A N T P R O C E S S : P R E C O N C E P T I O N S , P E R C E P T I O N S A N D P R A C T I C E S 4 7 - 4 8 ( 1 9 8 5 ) ( d e s c r i b i n g s t u d y o f w a r r a n t p r o c e s s i n d i c a t i n g v a r y i n g d e g r e e s o f j u d i c i a l r u b b e r s t a m p i n g a c r o s s j u r i s d i c t i o n s ) .

Page 20: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 5 8 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

B. Access to Publicly-held Records

Most transaction surveillance does not involve real-time interception of information, but rather contemplates accessing already-existing records, held either by public or private insti-tutions. Information in public records is particularly easy to secure. Under current law, law enforcement officials do not need even a certification order to use MATRIX, Choicepoint and similar vehicles for perusing public records. In fact, law enforcement officials need consult no other entity (certainly not a court, and not even a prosecutor) before obtaining such information. Again, the Fourth Amendment's ban on unreasonable searches and seizures might appear to apply here, because looking for and through records is a search in the usual mean-ing of the word. But, as already noted, the Supreme Court has made clear that one cannot reasonably expect privacy in con-nection with information voluntarily given to third parties. Even more important than Smith in this regard is United States v. Miller,48 decided three year earlier. There the Court held that once a person surrenders information to an agency or institution, he or she assumes the risk the third party will hand it over to the government.49 The key declaration in Miller is worth quoting in full: A[T]he Fourth Amendment does not prohibit the obtaining of information revealed to a third party and conveyed by him to Government authorities, even if the in-formation is revealed on the assumption that it will be used only for a limited purpose and the confidence placed in the third party will not be betrayed.@50 The Privacy Act, enacted by Congress in 1974, does bar or limit access to public records when they are sought by private individuals, and even when most government officials want 4 8 4 2 5 U . S . 4 3 5 ( 1 9 7 6 ) . 4 9 M i l l e r , 4 2 5 U . S . a t 4 4 3 . 5 0 I d . a t 4 4 3 ( e m p h a s i s a d d e d ) .

Page 21: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 159

them.51 But when law enforcement officials are after the re-cords, the Act merely requires a letter from the head of the agency that is seeking the information, detailing the law en-forcement reasons a particular person's records are needed.52 No court is involved, and neither individualized suspicion or even a relevance showing is required, just the sayso of the law enforcement department. I will call this kind of authorization an extrajudicial certification. Not even this level of authorization is necessary for gov-ernment access to most public records, however. The Privacy Act only applies to federal documents. Unless there is similar legislation at the state level, law enforcement access to state public records is unrestricted.53 Furthermore, the federal gov-ernment takes the position that when it obtains information from a commercial data broker like Choicepoint, the Privacy Act does not apply at all, because the Act literally only refers to law enforcement efforts to get records from other govern-ment agencies and from private companies that are adminis- 5 1 S e e 5 U . S . C . ' 5 5 2 a ( b ) ( 2 0 0 0 ) ( AN o a g e n c y s h a l l d i s c l o s e a n y r e c o r d w h i c h i s c o n t a i n e d i n a s y s t e m o f r e c o r d s . . . u n l e s s [ l i s t i n g 1 2 e x c e p -t i o n s ] . @) . 5 2 I d . ' 5 5 2 a ( b ) ( 7 ) ( p e r m i t t i n g d i s c l o s u r e At o a n o t h e r a g e n c y o r t o a n i n s t r u m e n t a l i t y o f a n y g o v e r n m e n t a l j u r i s d i c t i o n w i t h i n o r u n d e r t h e c o n t r o l o f t h e U n i t e d S t a t e s f o r a c i v i l o r c r i m i n a l l a w e n f o r c e m e n t a c t i v i t y i f t h e a c t i v i t y i s a u -t h o r i z e d b y l a w , a n d i f t h e h e a d o f t h e a g e n c y o r i n s t r u m e n t a l i t y h a s m a d e a w r i t t e n r e q u e s t t o t h e a g e n c y w h i c h m a i n t a i n s t h e r e c o r d s p e c i f y i n g t h e p a r t i c u l a r p o r t i o n d e s i r e d a n d t h e l a w e n f o r c e m e n t a c t i v i t y f o r w h i c h t h e r e c o r d i s s o u g h t @) . 5 3 S e e P a u l M . S c h w a r t z , P r i v a c y a n d P a r t i c i p a t i o n : P e r s o n a l I n f o r m a t i o n a n d P u b l i c S e c t o r R e g u l a t i o n i n t h e U n i t e d S t a t e s , 8 0 I O W A L . R E V . 5 5 3 , 6 0 5 ( 1 9 9 5 ) ( m o s t s t a t e s l a c k Ao m n i b u s d a t a p r o t e c t i o n l a w s , @ b u t r a t h e r h a v e As c a t t e r e d l a w s [ t h a t ] p r o v i d e o n l y l i m i t e d p r o t e c t i o n s f o r p e r s o n a l i n f o r m a t i o n i n t h e p u b l i c s e c t o r . @) . O n e r e a s o n F l o r i d a i s a n a t t r a c t i v e p l a c e t o b a s e a n o p e r a t i o n l i k e M A T R I X i s t h a t i t s p u b l i c r e c o r d s l a w i s q u i t e e x t e n s i v e . S e e F L A . S T A T . ' 1 1 9 . 0 1 e t s e q . ( AI t i s t h e p o l i c y o f t h i s s t a t e t h a t a l l s t a t e , c o u n t y a n d m u n i c i p a l r e c o r d s s h a l l b e o p e n f o r p e r s o n a l i n s p e c t i o n b y a n y p e r s o n . @) . R e c o g n i z i n g t h i s p r o b l e m , t h e F l o r i d a S u p r e m e C o u r t r e c e n t l y o r d e r e d a m o r a t o r i u m o n t h e d i g i t i z a t i o n o f F l o r i d a ' s p u b l i c r e c o r d s . J a s o n K r a u s e , T o o M u c h I n f o r m a t i o n ? C o u n t y C l e r k s T u s s l e w i t h N e r v o u s S t a t e O f f i c i a l s O v e r P o s t i n g C o u r t R e c o r d s O n l i n e , A . B . A . J . , A p r i l 2 0 0 4 , a t 2 4 .

Page 22: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 6 0 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

tering a system of records for the government.54 Under this interpretation, the only obstacle to complete government ac-cess to all the data maintained by commercial brokers is the price of the information.55

C. Access to Privately-held Records Compared to the meager limitations on intercepting trans-actional information and accessing public records, the restric-tions on government access to the contents of records held by nominally private entities, such as hospitals and banks, phone companies and Internet providers, have more teeth, but the teeth are blunt. Again, the Fourth Amendment is pretty much irrelevant here. The notion that one assumes the risk that third parties will be, or turn into, government informants applies to private entities as well as public agencies. The Su-preme Court has specifically so held with respect to phone companies (in Smith)56 and banks (in Miller).57 It has wavered in its willingness to declare private entities untrustworthy confidants only in the medical context, where it has stated, in dictum, that the Fourth Amendment or the due process clause might place constitutional limitations on law enforcement access.58 Although there are also statutory constraints on gov- 5 4 5 U . S . C . ' 5 5 2 a ( m ) . 5 5 S e e H o o f n a g l e , s u p r a n o t e 1 6 , a t 6 2 3 ( A[ A ] d a t a b a s e o f i n f o r m a t i o n t h a t o r i g i n a t e s a t a C D B w o u l d n o t t r i g g e r t h e r e q u i r e m e n t s o f t h e P r i v a c y A c t [ , t h u s a l l o w i n g C D B s ] t o a m a s s h u g e d a t a b a s e s t h a t t h e g o v e r n m e n t i s l e g a l l y p r o h i b i t e d f r o m c r e a t i n g . @) . 5 6 S m i t h , 4 4 2 U . S . a t 7 4 4 . 5 7 M i l l e r , 4 2 5 U . S . a t 4 4 3 . 5 8 C f . F e r g u s o n v . C i t y o f C h a r l e s t o n , 5 3 2 U . S . 6 7 , 7 8 ( 2 0 0 1 ) ( AT h e r e a s o n a b l e e x p e c t a t i o n o f p r i v a c y e n j o y e d b y t h e t y p i c a l p a t i e n t u n d e r g o i n g d i a g n o s t i c t e s t s i n a h o s p i t a l i s t h a t t h e r e s u l t s o f t h o s e t e s t s w i l l n o t b e s h a r e d w i t h n o n m e d i -c a l p e r s o n n e l w i t h o u t h e r c o n s e n t . @) ; J a f f e e v . R e d m o n d , 5 1 8 U . S . 1 , 1 5 ( 1 9 9 6 ) ( AB e c a u s e w e a g r e e w i t h t h e j u d g m e n t o f t h e s t a t e l e g i s l a t u r e s a n d t h e A d v i s o r y C o m m i t t e e t h a t a p s y c h o t h e r a p i s t - p a t i e n t p r i v i l e g e w i l l s e r v e a p u b l i c g o o d t r a n -s c e n d i n g t h e n o r m a l l y p r e d o m i n a n t p r i n c i p l e o f u t i l i z i n g a l l r a t i o n a l m e a n s f o r a s c e r -

Page 23: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 161

ernment accessing of privately-held records, they are ex-tremely weak. Medical records receive the most protection. Even here, however, neither probable cause or reasonable suspicion is required. Rather, pursuant to rules promulgated under the Health Insurance Portability and Accountability Act (HIPAA), the government can obtain medical records from HMOs and hospitals with a simple subpoena. A subpoena, it will be re-called, merely requires a finding that the information sought is relevant to a law enforcement investigation (although the target is entitled to notice and thus has the opportunity to challenge the subpoena on relevance or privilege grounds).59 Given the limited scope of the Privacy Act described above, even that obstacle is removed if, as is true in some states, medical and similar information is maintained as a Apublic re-cord@ and the government receives it through a commercial data broker. Financial records receive similarly minimal protection. To get detailed information from credit agencies, a regular sub-poena is required under the Fair Credit Reporting Act.60 How-

t a i n i n g t r u t h , . . . w e h o l d t h a t c o n f i d e n t i a l c o m m u n i c a t i o n s b e t w e e n a l i c e n s e d p s y c h o t h e r a p i s t a n d h e r p a t i e n t s i n t h e c o u r s e o f d i a g n o s i s o r t r e a t m e n t a r e p r o t e c t e d f r o m c o m p e l l e d d i s c l o s u r e u n d e r R u l e 5 0 1 o f t h e F e d e r a l R u l e s o f E v i d e n c e . @) ; W h a l e n v . R o e , 4 2 9 U . S . 5 8 9 , 6 0 5 ( 1 9 7 7 ) ( r e c o g n i z i n g , i n t h e c o n t e x t o f a c a s e i n v o l v i n g d i s c l o s u r e o f m e d i c a l i n f o r m a t i o n , t h a t a As t a t u t o r y o r r e g u l a t o r y d u t y t o a v o i d u n w a r r a n t e d d i s c l o s u r e s . . . i n s o m e c i r c u m s t a n c e s . . . a r g u a b l y h a s i t s r o o t s i n t h e C o n s t i t u t i o n @) . 5 9 4 5 C . F . R . ' 1 6 4 . 5 1 2 ( f ) ( 1 ) ( i i ) ( B ) ( 2 0 0 5 ) ( d i s c l o s u r e o f m e d i c a l r e c o r d s u n d e r H I P A A i s p e r m i s s i b l e w i t h o u t p e r m i s s i o n o f t h e i r s u b j e c t i f i n f o r m a t i o n i s s o u g h t f o r l a w e n f o r c e m e n t p u r p o s e s t h r o u g h a g r a n d j u r y s u b p o e n a ) . S o m e c o u r t s h a v e r e q u i r e d a g r e a t e r s h o w i n g t o o b t a i n m e d i c a l r e c o r d s . S e e , e . g . , D o e v . B r o d e r i c k , 2 2 5 F . 3 d 4 4 0 , 4 5 0 - 5 1 ( 4 t h C i r . 2 0 0 0 ) ( f i n d i n g M i l l e r i n a p p l i c a b l e t o m e d i c a l r e c o r d s ) ; H a w . P s y c h i a t r i c S o c . , D i s t . B r a n c h o f A m e r i c a n P s y c h i a t r i c A s s ' n v . A r i y o s h i , 4 8 1 F . S u p p . 1 0 2 8 ( D . H a w . 1 9 7 9 ) ; K i n g v . S t a t e , 5 3 5 S . E . 2 d 4 3 2 , 4 9 5 ( G a . 2 0 0 0 ) ; T h u r m a n v . S t a t e , 8 6 1 S . W . 2 d 9 6 , 9 8 ( T e x . C t . A p p . 1 9 9 3 ) . 6 0 1 5 U . S . C . ' 1 6 8 1 b ( a ) ( 1 ) . N a m e , a d d r e s s e s , a n d p l a c e s o f e m p l o y m e n t c a n b e o b t a i n e d s i m p l y u p o n a r e q u e s t . I d . ' 1 6 8 1 f .

Page 24: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 6 2 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

ever, analogous to the situation with medical records, no law governs government requests for similar information from database companies and other companies that have obtained it from credit agencies.61 As a result, the government routinely gets the financial information it wants directly from a com-mercial data broker, without bothering with a subpoena.62 Bank records are also easily accessible. The Right to Financial Privacy Act generally requires only a traditional subpoena to obtain financial records from a bank. It also recognizes a sig-nificant variation to the traditional subpoena process: notifica-tion of the seizure may be delayed for up to 90 days if there is concern that service of the subpoena will tip off a suspect, result in loss of evidence, endanger witnesses or in some other way compromise the government's investigation.63 In these circumstances, in contrast to the typical subpoena process, the target of a financial investigation will not find out that the government has the information until well after it is obtained. I will call this type of authorization a delayed-notice subpoena. Outside of situations covered by the Right to Financial Privacy Act and the Internal Revenue Code, a government agency that is authorized to use administrative subpoenas to obtain financial and business information from third party

6 1 D a n i e l J . S o l o v e , D i g i t a l D o s s i e r s a n d t h e D i s s i p a t i o n o f F o u r t h A m e n d m e n t P r i v a c y , 7 5 S . C A L . L . R E V . 1 0 8 3 , 1 1 4 6 ( 2 0 0 2 ) . 6 2 C h r i s H o o f n a g l e h a s m a d e t h e a r g u m e n t t h a t t h i s a b i l i t y t o o b t a i n i n f o r m a t i o n t h r o u g h a p r i v a t e a g e n c y c i r c u m v e n t s t h e P r i v a c y A c t , w h i c h p r o h i b i t s g o v e r n m e n t f r o m c o l l e c t i n g s u c h i n f o r m a t i o n u n l e s s t h e r e i s a s p e c i f i c n e e d f o r i t . H o o f n a g l e , s u p r a n o t e 1 6 , a t 1 8 . 6 3 1 2 U . S . C . ' 3 4 0 9 . F u r t h e r m o r e , w h e n s u b p o e n a p o w e r i s n o t a v a i l a b l e t o t h e g o v e r n m e n t , i t n e e d o n l y s u b m i t a f o r m a l w r i t t e n r e q u e s t f o r t h e i n -f o r m a t i o n , a p r o c e s s t h i s a r t i c l e c a l l s e x t r a j u d i c i a l c e r t i f i c a t i o n . ' 3 4 0 8 . I n d e e d , a p p a r e n t l y b a n k s s o m e t i m e s s t i l l s i m p l y h a n d o v e r i n f o r m a t i o n u p o n r e q u e s t . S e e D A V I D F . L I N O W E S , P R I V A C Y I N A M E R I C A : I S Y O U R P R I V A T E L I F E I N T H E P U B L I C E Y E ? 1 0 6 - 1 0 8 ( 1 9 8 9 ) ( d e s c r i b i n g a n u m b e r o f c a s e s i n w h i c h b a n k s s u r r e n d e r e d a c c o u n t i n f o r m a t i o n t o l a w e n f o r c e m e n t o f f i c e r s s i m p l y u p o n r e q u e s t a n d d e s c r i b i n g a s u r v e y f i n d i n g t h a t s e v e n t y - f o u r p e r c e n t o f b a n k s d i d n o t i n f o r m t h e i r c u s t o m e r s o f t h e i r r o u -t i n e d i s c l o s u r e s t o l a w e n f o r c e m e n t ) .

Page 25: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 163

entities need not give any notice to the customer whose records are sought.64 This practice recognizes still another subpoena mutation, which I will call an ex parte subpoena. This label is meant to distinguish between third party subpoenas that allow the target to contest the demand for production and those that don't. The term Aex parte subpoena@ emphasizes that the customer is outside the process entirely, thus remov-ing, in most cases, the only meaningful inhibition on fishing expedition-by-subpoena. Transaction surveillance of communications-related infor-mation is regulated in a similarly weak fashion. Under ECPA, real-time interception of the content of phone and email com-munications requires a warrant based on probable cause.65 But if email has sat on a server for longer than 180 days with-out being opened, or the recipient of email or voicemail access-es it and stores it on an outside server for any length of time, then a subpoenaBdelayed if necessaryBis all that is needed to obtain the content of the communication.66 Apparently, the rationale behind permitting easy access to unopened mail that is stored for 180 days is that it is, in effect, abandoned.67 The

6 4 E L L E N S . P O D G O R & J E R R Y H . I S R A E L , W H I T E C O L L A R C R I M E I N A N U T S H E L L 2 6 9 ( 2 0 0 4 ) . 6 5 1 8 U . S . C . ' 2 5 1 8 ( 3 ) ( 2 0 0 0 ) . 6 6 1 8 U . S . C . ' 2 7 0 3 ( a ) ( 2 0 0 0 ) ; 2 7 0 3 ( b ) ( 1 ) ( B ) . F u r t h e r , a s u b p o e n a i s o n l y r e q u i r e d w h e n t h e i n f o r m a t i o n i s s o u g h t f r o m a Ar e m o t e c o m p u t e r s e r v i c e @ ( e . g . , a s e r v i c e a v a i l a b l e t o t h e g e n e r a l p u b l i c , l i k e A O L ) . I f t h e i n f o r m a t i o n i s s t o r e d w i t h a s e r v i c e n o t a v a i l a b l e t o t h e g e n e r a l p u b l i c ( e . g . , o n e r u n b y a n e m p l o y e r ) , t h e n E C P A d o e s n o t a p p l y a t a l l a n d g o v e r n m e n t m a y o b t a i n t h e s t o r e d i n f o r m a t i o n ( c o n t e n t o r i d e n t i f y i n g ) s i m p l y u p o n a r e q u e s t . S e e 1 8 U . S . C . ' 2 7 0 3 ( a ) ( 1 - 3 ) ; s e e a l s o 1 8 U . S . C . ' 2 7 1 1 ( 2 ) ( 2 0 0 0 ) ( d e f i n i n g r e m o t e c o m p u t i n g s e r v i c e ) ; U . S . D e p ' t o f J u s t i c e , S e a r c h i n g a n d S e i z i n g C o m p u t e r s a n d O b t a i n i n g E l e c t r o n i c E v i d e n c e i n C r i m i n a l I n v e s t i g a t i o n s 8 9 ( J u l y 2 0 0 2 ) , a v a i l a b l e a t h t t p : / / w w w . c y b e r c r i m e . g o v / s & s m a n u a l 2 0 0 2 . h t m . 6 7 S e e P a t r i c i a L . B e l l i a , S u r v e i l l a n c e L a w T h r o u g h C y b e r l a w ' s L e n s , 7 2 G E O . W A S H . L . R E V . 1 3 7 5 , 1 4 2 1 ( 2 0 0 4 ) . T h i s a r t i c l e i s a n e x t r e m e l y h e l p f u l r o a d m a p a n d a n a l y s i s o f E C P A w h i c h , u n f o r t u n a t e l y , I d i s c o v e r e d o n l y a f t e r w a d i n g t h r o u g h t h e s t a t u t e m y s e l f . I d .

Page 26: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 6 4 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

rationale for permitting access on less than probable cause to opened email and other communications stored by a third party is that it becomes akin to a business record.68 ECPA also gives the government easy access to business records held by phone companies and Internet service provid-ers. Under Title II of ECPA, as amended by the Patriot Act of 2001, basic subscriber informationBname, address, session times and durations, length and type of service, means and source of payment (including credit card numbers), and the identity of Internet users who use a pseudonymBcan be ob-tained pursuant to an ex parte subpoena, the type of autho-rization that requires no customer notice.69 If the government seeks additional transactional informationBsuch as account logs and email addresses of other individuals with whom the account holder has correspondedBit still need not alert the sub-scriber, but must allege Aspecific and articulable facts showing that there are reasonable grounds to believe that . . . the records or other information sought, are relevant and material to an ongoing criminal investigation.@70 Apparently, this latter standard, found in ' 2703(d) of ECPA, is meant to be more demanding than the relevance standard normally required for a subpoena. Yet it is not clear that it is much different. Although the Aspecific and articulable@ language sounds like it requires reasonable suspi-cion, note that the specific and articulable facts need only support a finding that the information is relevant and material 6 8 S e e C L I F F O R D S . F I S H M A N & A N N E T . M C K E N N A , W I R E T A P P I N G A N D E A V E S -D R O P P I N G ' 2 6 : 9 ( 2 d e d . 1 9 9 5 ) ( e x p l a i n i n g t h a t C o n g r e s s f e l t t h a t w h e n a n e - m a i l s t a y s o n a s e r v e r l o n g e r t h a n 1 8 0 d a y s t h e s e r v i c e p r o v i d e r i s l e s s l i k e a P o s t O f f i c e a n d m o r e l i k e a s t o r a g e f a c i l i t y ) . 6 9 1 8 U . S . C . ' 2 7 0 3 ( c ) ( 1 ) ( E ) ( 2 0 0 1 ) ( d e s c r i b i n g i n f o r m a t i o n t h a t c a n b e o b t a i n e d ) ; ' 2 7 0 3 ( c ) ( 3 ) ( AA g o v e r n m e n t a l e n t i t y r e c e i v i n g r e c o r d s o r i n f o r m a t i o n u n d e r t h i s s u b s e c t i o n i s n o t r e q u i r e d t o p r o v i d e n o t i c e t o a s u b s c r i b e r o r c u s t o m -e r . @) . 7 0 ' 2 7 0 3 ( c ) ( d e s c r i b i n g r e q u i r e m e n t s f o r a c o u r t o r d e r t o o b t a i n A[ r ] e c o r d s c o n c e r n i n g e l e c t r o n i c c o m m u n i c a t i o n s e r v i c e o r r e m o t e c o m p u t i n g s e r -v i c e @) .

Page 27: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 165

to an ongoing investigation. Even if the latter highlighted word is meant to augment the former, it does not add much; materiality, in evidence law, merely means that the evidence be logically related to a proposition in the case.71 Furthermore, whereas Terry contemplated that reasonable suspicion exist with respect to the targeted individual, a ' 2703(d) order, like a subpoena, allows accessing any records that might be rele-vant to an investigation, not just the target's. Finally, it is not clear that the Arelevant and material@ language can be mean-ingfully enforced. The statute seems to say that the only ground on which an order issued pursuant to ' 2703(d) may be challenged is burdensomeness, which eliminates a challenge on relevance grounds.72 Post-9/11, government access to some sorts of privately-held records is even easier when a significant purpose of the investigation is to nab terrorists or spies. In such cases, Sec-tion 215 of the Patriot Act authorizes the FBI to demand the production of Aany tangible things (including books, records, papers, documents and other items)@ if it follows a simple two-step process.73 First, the Director or his or her designee must certify to a court that the items sought are Afor an investiga-tion to protect against international terrorism or clandestine intelligence activities,@ and that the investigation does not focus Asolely@ on activities protected by the First Amendment.74 Second, the court must find that the investigation meets these conditions; if so, it Ashall@ issue a Section 215 order authorizing

7 1 M C C O R M I C K O N E V I D E N C E ' 1 8 5 a t 2 7 6 - 7 8 ( J o h n W . S t r o n g e d . , 5 t h e d . 1 9 9 9 ) ( AM a t e r i a l i t y . . . l o o k s t o t h e r e l a t i o n b e t w e e n t h e p r o p o s i t i o n s t h a t t h e e v i d e n c e i s o f f e r e d . . . a n d t h e i s s u e s i n t h e c a s e . . . . A f a c t t h a t i s ` o f c o n s e q u e n c e ' i s m a t e r i a l . . . . I t i s e n o u g h i f t h e i t e m c o u l d r e a s o n a b l y s h o w t h a t a f a c t i s s l i g h t l y m o r e p r o b a b l e t h a n i t w o u l d a p p e a r w i t h o u t t h a t e v i d e n c e . @) . 7 2 ' 2 7 0 3 ( d ) ( p r o v i d i n g c o u r t m a y q u a s h o r m o d i f y o r d e r i f t h e r e q u e s t i s Au n u s u a l l y v o l u m i n o u s i n n a t u r e o r c o m p l i a n c e w i t h s u c h o r d e r o t h e r w i s e w o u l d c a u s e a n u n d u e b u r d e n o n s u c h p r o v i d e r @) . 7 3 5 0 U . S . C . ' 1 8 6 1 ( 2 0 0 1 ) . 7 4 ' 1 8 6 1 ( a ) & ( b ) .

Page 28: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 6 6 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

the seizure.75 In other words, a variant of the certification order discussed in connection with use of pen registers and trap and trace devices will suffice in this situation. In an additional twist, however, not only is the target unable to challenge such orders, but the third party record-holder is prohibited from telling the target the order has been issued.76 In counter-terrorist investigations, this procedure is all that is required to obtain customer records of Internet service provid-ers, libraries, video stores, schools and other private entities (including, possibly, medical providers). Further, the records that may be obtained in this way are not just those of suspected terrorists, but those of anyone who might be Arelevant@ to the investigation.77 Finally, even a Section 215 order is not needed when the FBI is seeking a particular subset of Atangible items@ (elec-tronic or communication records, financial records or credit records) in connection with a national security investigation. Rather, all it must do is issue a form of administrative sub-poena, known as a ANational Security Letter,@ in which a Special Agent (in other words, a field agent) certifies that the information sought is relevant to a national security investiga-

7 5 ' 1 8 6 1 ( c ) . T h i s p r o v i s i o n a l s o i n d i c a t e s t h a t t h e j u d g e m a y m o d i f y t h e g o v e r n m e n t ' s o r d e r . A p p a r e n t l y , t h e m o d i f i c a t i o n p o w e r i s m e a n t t o p r o t e c t a g a i n s t F i r s t A m e n d m e n t a n d o v e r b r e a d t h c o n c e r n s . B u t , a s s u m i n g n o s u c h c o n -c e r n s , t h e j u d g e m u s t i s s u e t h e o r d e r w h e n t h e t a n g i b l e i t e m s s o u g h t a r e Af o r a n a u t h o r i z e d i n v e s t i g a t i o n . . . t o o b t a i n f o r e i g n i n t e l l i g e n c e i n f o r m a t i o n . @ ' 1 8 6 1 ( b ) . C f . P a u l R o s e n z w e i g , C i v i l L i b e r t y a n d t h e R e s p o n s e t o T e r r o r i s m , 4 2 D U Q . L . R E V . 6 6 3 , 6 9 4 - 9 5 ( 2 0 0 4 ) ( a r g u i n g t h a t t h e p r o v i s i o n f o r j u d i c i a l m o d i f i c a t i o n , t o g e t h e r w i t h t h e r e q u i r e m e n t s t h a t t h e g o v e r n m e n t s w e a r t h e c e r t i f i c a t i o n i s c o r r e c t a n d t h a t t h e A t t o r n e y G e n e r a l r e p o r t t o C o n g r e s s o n t h e u s e o f S e c t i o n 2 1 5 , p r o v i d e m o r e s a f e -g u a r d s t h a n t h o s e a s s o c i a t e d w i t h a s u b p o e n a r e v i e w a b l e o n l y a f t e r c h a l l e n g e ) . 7 6 1 8 U . S . C . ' 2 7 0 9 ( c ) ( 2 0 0 1 ) ; 5 0 U . S . C . ' 1 8 6 1 ( d ) . 7 7 P e t e r P . S w i r e , T h e S y s t e m o f F o r e i g n I n t e l l i g e n c e S u r v e i l l a n c e L a w , 7 2 G E O . W A S H . L . R E V . 1 3 0 6 , 1 3 3 1 - 3 3 ( 2 0 0 4 ) ; s e e a l s o 1 8 U . S . C . ' 2 7 0 9 ( b ) ( w i r e o r e l e c t r o n i c s e r v i c e p r o v i d e r s ) ; 2 0 U . S . C . ' 1 2 3 2 g ( j ) ( A ) ( s c h o o l r e c o r d s ) ; K a t h r y n M a r t i n , T h e U S A P a t r i o t A c t ' s A p p l i c a t i o n t o L i b r a r y P a t r o n s R e c o r d s , 2 9 J . L E G I S . 2 8 3 ( 2 0 0 3 ) ( d i s c u s s i n g l i b r a r y r e c o r d s ) .

Page 29: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 167

tion to protect against international terrorism or clandestine intelligence activities.78 This type of authorization is akin to the extrajudicial certification discussed in connection with law enforcement efforts to seek public documents under the Priva-cy Act, but with the same gag order proviso that exists with Section 215 orders.79 The Patriot Act allowed this extrajudicial process with respect to financial information only when it was held by banks. However, in December, 2003, that power was expanded by the Intelligence Authorization Act of 2003, which was en-acted by Congress as part of an appropriations bill, with no vetting by the Judiciary Committee and no debate on the floor or in the media.80 The 2003 Act allows the FBI to use extraju-dicial certification to obtain statements and records from any financial institution Awhose cash transactions have a high degree of usefulness in criminal, tax or regulatory matters,@ including banks, stockbrokers, car dealers, casinos, credit card companies, insurance agencies, jewelers, pawn brokers, travel agents and airlines.81 All of this information is the government's simply on its sayso.82

7 8 1 2 U . S . C . ' 3 4 1 4 ( a ) ( 5 ) ( A ) ( 2 0 0 3 ) . A g a i n , t h e r e c o r d - h o l d e r i s p r o h i b i t e d f r o m i n f o r m i n g t h e t a r g e t o f t h e r e q u e s t . ' 3 4 1 4 ( a ) ( 5 ) ( D ) . 7 9 S w i r e , s u p r a 7 7 , a t 1 3 3 2 - 3 3 . 8 0 K y l e O ' D o w d , C o n g r e s s H a n d s F B I AP a t r i o t I I @ S n o o p i n g P o w e r , 2 8 F e b . C H A M P . 1 8 ( 2 0 0 4 ) 8 1 3 1 U . S . C . ' 5 3 1 2 ( 1 9 9 6 ) . 8 2 T h e P a t r i o t A c t ' s N a t i o n a l S e c u r i t y L e t t e r ( N S L ) p r o v i s i o n w a s d e c l a r e d u n c o n s t i t u t i o n a l i n D o e v . A s h c r o f t , 3 3 4 F . S u p p . 2 d 4 7 1 ( 2 0 0 4 ) , b e c a u s e o f t h e l a c k o f j u d i c i a l r e v i e w a n d t h e g a g p r o v i s i o n . H o w e v e r , t h e d e c i s i o n d i d n o t f i n d f a u l t w i t h e i t h e r t h e r e l e v a n c e s t a n d a r d o r t h e f a c t t h a t l e t t e r s c a n b e i s s u e d b y a s p e c i a l a g e n t . I n d e e d , t h e c o u r t s t a t e d At h e s t a n d a r d o f r e v i e w f o r a d m i n i s t r a t i v e s u b p o e n a s s i m i l a r t o N S L s i s s o m i n i m a l t h a t m o s t s u c h N S L s w o u l d l i k e l y b e u p h e l d i n c o u r t . @ I d . a t 5 0 2 . R e c e n t p r o p o s e d a m e n d m e n t s a t m o s t a r e l i k e l y t o c o d i f y D o e . E r i c L i c h t b l a u , C o n g r e s s N e a r s D e a l t o R e n e w A n t i t e r r o r L a w , N . Y . T I M E S , N o v . 1 7 , 2 0 0 5 , a t A 1 , A 2 1 . I n t h e m e a n t i m e , t h e F B I i s s u e s r o u g h l y 3 0 , 0 0 0 N S L s a y e a r , m a i n t a i n s a l l t h e r e c o r d s t h e r e b y o b t a i n e d ( e v e n w h e n n o t l i n k e d t o t e r r o r i s m ) , a n d a s o f t h i s w r i t i n g h a d s t i l l n o t r e s p o n d e d t o a y e a r - o l d c o n g r e s s i o n a l r e q u e s t f o r

Page 30: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 6 8 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

D. Summary of Transaction Surveillance Law

Transaction surveillance has spawned a wide array of new regulatory schemes, which are usefully summarized by locat-ing them within the standard Fourth Amendment hierarchy. As noted earlier, the most protective type of authorization is the warrant, based on probable cause. Although intercepting the content of communications and physical surveillance of the home both require a warrant,83 no type of transaction surveil-lance requires this most demanding form of authorization. The next type of authorization in the hierarchy, at least in theory, is an order based on reasonable suspicion, or what could be called a Terry order, after Terry v. Ohio,84 which required this degree of justification for a stop and frisk. Again, none of the statutory provisions I have described (or any other regulatory regime for that matter) mandates this type of order; I include it both for the sake of comprehensiveness and because it is important to the regulatory scheme I propose below. After a Terry order comes the traditional subpoena, issued upon a judicial finding of relevance and challengeable by the target. This is the first type of authorization that plays a role in transaction surveillance; subpoenas are required to access most medical, financial and stored email records. Below the traditional subpoena is the delayed-notice sub-poena, which authorizes, temporarily, unobstructed access to financial records and stored email when a traditional subpoe-na might frustrate the investigation. Next is the ex parte subpoena (unchallengeable by the target), which allows access to many types of customer records held by third party entities, including phone and ISP account records.85 The certification

i n f o r m a t i o n a b o u t t h e i r u s e . B a r t o n G e l l m a n , T h e F B I ' s S e c r e t S c r u t i n y , W A S H . P O S T ( N o v . 6 , 2 0 0 5 ) , a t A 1 . 8 3 S e e s u p r a n o t e 5 . 8 4 3 9 2 U . S . 1 ( 1 9 6 8 ) . 8 5 A r g u a b l y , t h e As p e c i f i c a n d a r t i c u l a b l e f a c t s @ e x p a r t e s u b p o e n a

Page 31: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 169

(judicial rubberstamp) order follows in the hierarchy; it autho-rizes the use of pen registers, trap and trace devices and other forms of transaction-oriented snoopware, as well as tangible items other than financial records thought to be relevant to national security investigations.86 At the bottom of the autho-rization totem pole there is the extrajudicial certification, which permits access to public records, and to financial and other records relevant to national security investigations. However, even this type of authorization is not needed to access public records that come from a state with no privacy statute or that are accumulated by a commercial data broker. All of the authorization mechanisms described in this para-graph are statutory inventions, and are particularly punchless given the lack of a remedy in the unlikely event government is found to have abused them.87 The chart below depicts the foregoing summary, consist-ing of eight levels of authorization: CURRENT LAW OF TRANSACTION SURVEILLANCE Transaction Auth'zation Req'd Certainty Level r e q u i r e d b y 1 8 U . S . C . ' 2 7 0 3 ( d ) i s m o r e d i f f i c u l t t o o b t a i n t h a n a n o r d i n a r y s u b p o e n a ( a n d a p p a r e n t l y C o n g r e s s s o b e l i e v e d ) , b u t f o r t h e r e a s o n s s u g g e s t e d a b o v e , s e e s u p r a n o t e s 6 9 - 7 2 a n d a c c o m p a n y i n g t e x t , i t i s c l a s s i f i e d h e r e a s l e s s p r o t e c t i v e t h a n a r e g u l a r s u b p o e n a , a t l e a s t o n e t h a t n o t i f i e s t h e t a r g e t . 8 6 P e o p l e w h o h a v e w o r k e d a t t h e D e p a r t m e n t o f J u s t i c e s t a t e t h a t , i n p r a c t i c e , a c e r t i f i c a t i o n o r d e r m a y b e h a r d e r t o o b t a i n t h a n a s u b p o e n a . P e r s o n a l c o n v e r s a t i o n s w i t h O r i n K e r r ( F e b . 1 7 , 2 0 0 5 ) a n d P a u l O h m ( J a n . 2 0 , 2 0 0 5 ) . B u t I r a n k t h e c e r t i f i c a t i o n o r d e r l o w e r i n t h e h i e r a r c h y o f p r o t e c t i o n b e c a u s e t h e j u d g e p l a y s s u c h a m i n i m a l r o l e ; a t l e a s t w i t h a s u b p o e n a t h e j u d g e i s p e r m i t t e d t o f i n d a s e i z u r e i n v a l i d o n r e l e v a n c e g r o u n d s , a l t h o u g h h e m a y r a r e l y d o s o . 8 7 F o r i n s t a n c e , t h e r e i s n o e x c l u s i o n a r y s a n c t i o n u n d e r E C P A , o r u n d e r t h e R i g h t t o F i n a n c i a l P r i v a c y A c t . W H I T E B R E A D & S L O B O G I N , s u p r a n o t e 9 , a t 3 4 4 - 4 5 ; U n i t e d S t a t e s v . K i n g t o n , 8 0 1 F . 2 d 7 3 3 , 7 3 4 ( 5 t h C i r . 1 9 8 6 ) . N o r a r e d a m a g e s a c t i o n s a s i g n i f i c a n t d e t e r r e n t , g i v e n t h e i n t a n g i b l e n a t u r e o f t h e h a r m i n v o l v e d . C f . D o e v . C h a o , 3 0 6 F . 3 d 1 7 0 , 1 7 7 ( 4 t h C i r . 2 0 0 2 ) ( h o l d i n g t h a t , u n d e r E C P A , Aa p e r s o n m u s t s u s t a i n a c t u a l d a m a g e s t o b e e n t i t l e d t o t h e s t a t u t o r y m i n i -m u m d a m a g e s a w a r d @ o f $ 1 , 0 0 0 ) .

Page 32: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 7 0 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

CCC- Warrant Probable cause

CCC- Terry Order Reasonable suspicion

Medical, financial & tax records; stored email

Subpoena Relevance, challengeable by target

Financial records and stored email if notification poses risks

Delayed-notice Subpoena Relevance, challengeable by target only after records ob-tained

Billing records and logs of phone companies & ISPs; most customer records

Ex Parte Subpoena Relevance, challengeable only by third party record-holder

Interception of catalogic information re calls & email; tangible items re terrorism

Certification Order Relevance (determined by government), issued by court, challengeable only by third party record-holder

Federal public records; financial records re terrorism

Extrajudicial Certification

Relevance (determined by government), not challenge-able by any party(?)88

State public records not protected by law or that are acquired by a CDB

None None

8 8 S e e s u p r a n o t e 8 2 a n d a c c o m p a n y i n g t e x t .

Page 33: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 171

III. A PROPOSAL FOR REGULATION OF TRANSACTION

SURVEILLANCE The differences between the various types of authorization outlined above are sometimes subtle, but one thing is certain: their number goes well beyond (and below) the traditional three-tiered approach of probable cause, reasonable suspicion, and special needs/reasonableness determinations, all chal-lengeable by the target of the investigation. As a conceptual matter, a system that recognizes more than three authoriza-tion levels may make sense. In previous work, for instance, I have argued for application of a proportionality principle, which specifically requires that the certainty required for a search be roughly proportionate to its intrusiveness, and which suggests that the traditional probable cause/reasonable suspicion dichotomy is insufficient as a means of implementing that idea.89 My disagreement with current law is not with the general approach, but with the order and substance of the hierarchy. The degree to which transaction surveillance is regulated should not depend on whether the information sought is inter-cepted in real-time or is stored, or on whether it may be relat-ed to terrorist actions or some other crime. Rather, the key variables should be the type of information sought and the type of transaction surveillance (target-based or event-based) that is at issue. I propose recognizing three types of distinc-tions based on the type of records sought: (1) the content of personal records would be entitled to more protection than the content of organizational records; (2) the content of personal records held by private entities would be entitled to more pro-tection than the content of personal records held by public

8 9 C h r i s t o p h e r S l o b o g i n , L e t ' s N o t B u r y T e r r y : A C a l l f o r R e j u v e n a t i o n o f t h e P r o p o r t i o n a l i t y P r i n c i p l e , 7 2 S T . J O H N ' S L . R E V . 1 0 5 3 , 1 0 8 1 - 8 2 ( 1 9 9 8 ) ; C h r i s t o -p h e r S l o b o g i n , T h e W o r l d W i t h o u t A F o u r t h A m e n d m e n t , 3 9 U C L A L . R E V . 1 , 6 8 - 7 5 ( 1 9 9 1 ) .

Page 34: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 7 2 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

entities for public consumption; and (3) the content of records, regardless of their subject or who holds them, would presump-tively be entitled to more protection than records memorializ-ing what I call Acatalogic data@ (information that simply iden-tifies the nature of a communication or links a person to an activity). With catalogic data, however, the second variable mentioned aboveBthe government's motivation in carrying out the surveillanceBis also important. If the information is sought in connection with target-based, as opposed to event-based, surveillance it should receive heightened protection. More specifically, I propose that government should have to obtain: (1) a warrant based on probable cause when it seeks the content of personal records, or seeks catalogic data in connection with target-based surveillance; (2) a Terry order based on reasonable suspicion when it seeks the content of records that are Apublic@ in nature; (3) a traditional subpoena based on relevanceBor when there is concern about tipping off a suspect, a delayed-notice subpoena based on relevance90Bto access the content of organizational records and to access catalogic data in connection with event-based transaction surveillance. Ex parte subpoenas, certification orders and extrajudicial certifications should never be sufficient authority to carry out nonconsensual searches and seizures for personal transaction information, except in emergencies, and then only if quickly subject to judicial review. The following chart repre-sents my proposal: PROPOSED LAW OF TRANSACTION SURVEILLANCE 9 0 O r i n K e r r n o t e s t h a t , g i v e n t h e e a s e w i t h w h i c h s u b p o e n a - s e r v i c e d e -l a y s c a n b e o b t a i n e d , t h e g o v e r n m e n t c a n u s e s u b p o e n a s Aw i t h o u t m e a n i n g f u l n o -t i c e . @ O r i n S . K e r r , S y m p o s i u m , A U s e r ' s G u i d e t o t h e S t o r e d C o m m u n i c a t i o n s A c t , a n d a L e g i s l a t o r ' s G u i d e t o A m e n d i n g I t , 7 2 G E O . W A S H . L . R E V . 1 2 0 8 , 1 2 3 4 ( 2 0 0 4 ) . H e a l s o a r g u e s t h a t t h e n i n e t y - d a y d e l a y p e r i o d As e r v e s n o l e g i t i m a t e p u r p o s e , @ a n d i n s t e a d p r o p o s e s a t h i r t y - d a y d e l a y , p e r m i t t e d o n l y u p o n j u d i c i a l a u t h o r i z a t i o n , w i t h ( r a r e ) f u r t h e r e x t e n s i o n s o n l y a f t e r f u r t h e r j u d i c i a l r e v i e w . I d . a t 1 2 3 5 . T h i s r e g i m e s e e m s s e n s i b l e .

Page 35: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 173

Transaction Auth'zation Req'd Certainty Level

Content of privately-held per-sonal records

Warrant Probable Cause

Content of publicly-held personal records

Terry Order Reasonable Suspicion

Content of organizational records

Subpoena Relevance

Catalogic Data Target-based surveillance Event-based surveillance

Warrant Subpoena

Probable Cause Relevance

Under this scheme, again, the contents of Apersonal@ re-cords are distinguished from the contents of Aimpersonal,@ organizational records, with acquisition of the former requir-ing something more than mere relevance. Within the Aperson-al@ record category, Aprivately-held@ records are distinguished from Apublicly-held@ records, with acquisition of the former requiring probable cause and of the latter reasonable suspi-cion. Finally, Acontent@ is distinguished from Acatalogic data@ that simply describes the nature of a transaction, with the authorization level for the latter dependent on whether it is sought in connection with event-based surveillance of the type involved in data mining and profiling, where only relevance is required, or target-based surveillance which requires probable cause. The reasoning behind these proposals, and definitions of the key terms, follow, beginning with the all-important distinction between organizational and personal transactions.

Page 36: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 7 4 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

A. Organizational v. Personal Content

Page 37: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 175

In a previous article, Subpoenas and Privacy, I canvassed several possible justifications for the current relaxed state of transaction surveillance regulation.91 Although I discussed six such justifications, they all fit within one of two categories: they either minimize privacy concerns associated with transac-tional information or rest on an assertion that law enforce-ment could not function if transaction surveillance were sub-ject to significant regulation. I also concluded that these ratio-nales are not unpersuasive in the context in which subpoenas first flourishedBgovernment efforts to obtain documentary evidence of crimes committed by or within a business or other regulated organization. As the Supreme Court has recognized on numerous occasions, records of businesses and similar entities are associated with a minimal degree of privacy, given their impersonal nature and the high degree of state regula-tion to which organizations are subject.92 The Court has also pointed out in several cases that investigation of economic crimes and regulatory violations would be extremely difficult without ready access to documents detailing business activi-ty.93 But my previous analysis also concluded that neither the

9 1 C h r i s t o p h e r S l o b o g i n , S u b p o e n a s a n d P r i v a c y , 3 4 D E P A U L L . R E V . 8 0 5 ( 2 0 0 5 ) . 9 2 I n H a l e v . H e n k e l , 2 0 1 U . S . 4 3 ( 1 9 0 6 ) , t h e l e a d i n g S u p r e m e C o u r t c a s e o n g r a n d j u r y d o c u m e n t s u b p o e n a s , t h e C o u r t s t a t e d t h a t w h i l e a c o r p o r a t i o n Ai s a c r e a t u r e o f t h e s t a t e . . . [ i t ] i s p r e s u m e d t o b e i n c o r p o r a t e d f o r t h e b e n e f i t o f t h e p u b l i c [ a n d ] Ar e c e i v e s c e r t a i n s p e c i a l p r i v i l e g e s a n d f r a n c h i s e s , a n d h o l d s t h e m s u b j e c t t o t h e l a w s o f t h e s t a t e a n d t h e l i m i t a t i o n s o f i t s c h a r t e r , @ w h i l e a n i n d i v i d u a l Ao w e s n o s u c h d u t y t o t h e s t a t e , s i n c e h e r e c e i v e s n o t h i n g t h e r e f r o m , b e y o n d t h e p r o t e c t i o n o f h i s l i f e a n d p r o p e r t y . @ I d . a t 7 4 . I n U n i t e d S t a t e s v . M o r t o n S a l t C o . , 3 3 8 U . S . 6 3 2 ( 1 9 5 0 ) , o n e o f t h e C o u r t ' l e a d i n g a d m i n i s t r a t i v e s u b p o e n a c a s e s , i t w a s e v e n m o r e f o r t h r i g h t : A[ C ] o r p o r a t i o n s c a n c l a i m n o e q u a l i t y w i t h i n d i v i d u a l s i n t h e e n j o y m e n t o f a r i g h t t o p r i v a c y . @ I d . a t 6 5 2 . 9 3 S e e , e . g . , U n i t e d S t a t e s v . W h i t e , 3 2 2 U . S . 6 9 4 , 7 0 0 ( 1 9 4 4 ) ( AT h e s c o p e a n d n a t u r e o f t h e e c o n o m i c a c t i v i t i e s o f i n c o r p o r a t e d a n d u n i n c o r p o r a t e d o r g a n i z a t i o n s a n d t h e i r r e p r e s e n t a t i v e s d e m a n d t h a t t h e c o n s t i t u t i o n a l p o w e r o f t h e f e d e r a l a n d s t a t e g o v e r n m e n t s t o r e g u l a t e t h o s e a c t i v i t i e s b e c o r r e s p o n d i n g l y e f f e c -t i v e . @) .

Page 38: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 7 6 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

diminished-privacy rationale or the heightened-need justifica-tion applies when the records sought are personal. The diminished-privacy rationale, as applied to personal records, is both descriptively and normatively flawed. When such records are retained by the individual, they are thought to be, and ought to be, as private as anything else in one's home. Even when maintained by a third party, records about an individual are, and should be, considered similarly private if, as is usually the case, the transfer or collection of the infor-mation occurred because the third party requires it in order to carry out an important societal service. Hospitals, banks, Internet service providers and public agencies usually only have personal data because we must provide it (or allow it to be accumulated) in order to receive the services these entities provide. Stated another way, most third party record-holders possess information about us because we cannot otherwise realistically function in the modern world. Thus, contrary to the Supreme Court's assertion in Miller, the surrender of per-sonal information to these third parties is hardly Avoluntary.@ Nor does it, or should it, lead us to Aassume@ that the third party will function as an institutional undercover agent, a conduit for any information the government wants.94 The argument that more rigorous regulation of transac-tion surveillance would unduly hinder the government's law enforcement efforts is also weak when applied to personal records. There is no doubt that requiring probable cause to 9 4 E m p i r i c a l r e s e a r c h c o n f i r m s t h a t m o s t p e o p l e v i e w a s e a r c h o f r e c o r d s c o n t a i n i n g t h e i r p e r s o n a l i n f o r m a t i o n t o b e a t l e a s t a s i n t r u s i v e a s a s e a r c h o f a c a r o r l u g g a g e . S e e C h r i s t o p h e r S l o b o g i n & J o s e p h S c h u m a c h e r , R e a s o n a b l e E x p e c t a t i o n s o f P r i v a c y a n d A u t o n o m y i n F o u r t h A m e n d m e n t C a s e s : A n E m p i r i c a l L o o k a t AU n d e r s t a n d i n g s R e c o g n i z e d a n d P e r m i t t e d b y S o c i e t y @, 4 2 D U K E L . J . 7 2 7 , 7 3 8 - 3 9 ( 1 9 9 3 ) ( T a b l e 1 ) ( f i n d i n g t h a t a s a m p l e o f 2 1 7 i n d i v i d u a l s , o n a v e r a g e , r a n k e d Ap e r u s i n g b a n k r e c o r d s @ a s m o r e Ai n t r u s i v e @ t h a n s e a r c h e s o f t h e t r u n k o f a c a r a n d a f o o t l o c k e r i n a c a r ) ; s e e a l s o L i o r S t r a h i l e v i t z , A S o c i a l N e t w o r k s T h e o r y o f P r i v a c y , 7 2 U . C H I . L . R E V . 9 1 9 ( 2 0 0 5 ) ( a r g u i n g t h a t , u n d e r s o c i a l n e t w o r k s t h e o r y , i n f o r m a t i o n r e v e a l e d t o s m a l l s o c i a l g r o u p s s h o u l d g e n e r a l l y b e c o n s i d e r e d p r i v a t e u n l e s s t h e t a r g e t ' s a c t i o n s o r s t a t u s r e m o v e s i t f r o m o b s c u r i t y ) .

Page 39: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 177

obtain records will make investigation of crime more difficult. But to convert that fact into a rationale for removing restric-tions on government evidence-gathering makes a mockery of constitutional protections, for the warrant and probable cause requirements always have that effect. In this context as well, a viable distinction exists between investigations of organiza-tional activity and investigation of street crime and the like. Evidence of organizational crime, particularly of the economic variety, is largely if not entirely documentary; indeed, without such evidence even the victims of such crime may not realize it has occurred. But the same is seldom true of other types of crime. Whereas Ait is a fact of life that agencies charged with regulating economic activity often cannot articulate probable cause or even reasonable suspicion that a violation has tran-spired without first examining documents reflecting a party's economic activity,@95 police engaged in investigating other types of criminal activity usually can develop some non-docu-mentary lead, whether it is from the victim, a third party eyewitness, or physical surveillance of public movements.96 If one accepts these arguments, then it is important to separate personal from organizational documents. Fortunately, as I explained in Subpoenas and Privacy,97 the Supreme Court has already done much work in this regard, in the course of defining the concept of a Acollective@ entity and the notion of Arequired records@ for purposes of determining 9 5 P a r k s v . F D I C , 6 5 F . 3 d 2 0 7 , * 1 1 ( 1 s t C i r . 1 9 9 5 ) , w i t h d r a w n 6 4 U S L W 2 1 6 6 ( S e l y a , J . , d i s s e n t i n g ) . 9 6 S A R A S U N B E A L E E T A L . , 1 G R A N D J U R Y L A W & P R A C T I C E 6 - 3 ( 2 d e d . 2 0 0 2 ) ( AO r d i n a r i l y , i n v e s t i g a t i o n s o f s o - c a l l e d ` s t r e e t c r i m e s ' s u c h a s m u r d e r , r a p e , r o b b e r y , a n d a s s a u l t , c a n b e c o n d u c t e d e f f e c t i v e l y w i t h o u t r e s o r t t o t h e s u b p o e n a p o w e r . @) ; K E N N E T H M A N N , D E F E N D I N G W H I T E C O L L A R C R I M E : A P O R T R A I T O F A T T O R N E Y S A T

W O R K 2 3 3 - 3 4 ( 1 9 8 5 ) ( n o t i n g t h a t t h e e a s i e s t c r i m e s t o h i d e a r e t h o s e w h e r e t h e v i c t i m d o e s n o t r e a l i z e h e o r s h e h a s b e e n v i c t i m i z e d , t h o s e w h e r e t h e l o c a t i o n o f t h e c r i m e i s An o t a p p a r e n t @B m a k i n g w i t n e s s e s h a r d t o i d e n t i f y B a n d t h o s e w h e r e t h e Ai n c u l p a t o r y i n f o r m a t i o n i s e m b e d d e d i n n o r m a l s o c i a l l i f e , @ a l l f a c t o r s m u c h m o r e l i k e l y t o b e a s s o c i a t e d w i t h o r g a n i z a t i o n a l r a t h e r t h a n i n d i v i d u a l c r i m e ) . 9 7 S l o b o g i n , s u p r a n o t e 9 1 .

Page 40: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 7 8 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

when there is a Fifth Amendment right to resist documentary subpoenas. Although the Court's reconceptualization of the Fifth Amendment in the mid-1970s has rendered these cases largely irrelevant for Fifth Amendment purposes,98 they are di-rectly pertinent to the current task of identifying which types of records are associated with minimal privacy. That is because these cases explicitly tried to demarcate when records are entitled to what the Court eventually called Aa zone of privacy.@99 In essence, in its collective entity cases the Court concluded that the records of any organization that has an identity separate from its individual members lie outside that zone.100 In its required records cases, the Court similarly held that the government may force individuals to keep and disclose documents that are crucial for regulating their activi-ties and Ahave assumed `public aspects' which render [the records] at least analogous to public documents.@101 Consistent with these two lines of cases, records that pertain to a collective entity or that fit the required-records criteria ought to be accessible on mere issuance of a subpoena. Other records, however, should receive more protection.

9 8 T h e c r u c i a l d e c i s i o n w a s F i s h e r v . U n i t e d S t a t e s , 4 2 5 U . S . 3 9 1 ( 1 9 7 6 ) , w h i c h d e c i s i v e l y m o v e d t h e C o u r t ' s F i f t h A m e n d m e n t j u r i s p r u d e n c e f r o m a f o c u s o n p r i v a c y t o a f o c u s o n c o e r c i o n . T h e r e t h e C o u r t h e l d t h a t b e c a u s e a d o c u m e n t s u b p o e n a d o e s n o t c o m p e l t h e c r e a t i o n o f d o c u m e n t s , i t o n l y i m p l i c a t e s t h e F i f t h A m e n d m e n t w h e n t h e a c t o f p r o d u c t i o n i t c o m p e l s p r o v i d e s t h e p r o s e c u t i o n w i t h u s e f u l i n c r i m i n a t i n g i n f o r m a t i o n . S e e a l s o A n d r e s e n v . M a r y l a n d , 4 2 7 U . S . 4 6 3 ( 1 9 7 6 ) ( h o l d i n g t h a t a s e a r c h w a r r a n t c o m p e l s n e i t h e r t h e c r e a t i o n o r p r o d u c t i o n o f d o c u m e n t s ) . 9 9 G r i s w o l d v . C o n n e c t i c u t , 3 8 1 U . S . 4 7 9 , 4 8 4 ( 1 9 6 5 ) . 1 0 0 S e e B e l l i s v . U n i t e d S t a t e s , 4 1 7 U . S . 8 5 , 9 2 , 9 4 - 9 5 ( 1 9 7 4 ) ( h o l d i n g t h a t e v e n t h o u g h a s m a l l l a w f i r m Ae m b o d i e s l i t t l e m o r e t h a n t h e p e r s o n a l l e g a l p r a c t i c e o f t h e i n d i v i d u a l p a r t n e r s , @ i t i s a Af o r m a l i n s t i t u t i o n a l a r r a n g e m e n t o r g a n i z e d f o r t h e c o n t i n u i n g c o n d u c t o f t h e f i r m ' s l e g a l p r a c t i c e , @ a n d t h u s w a s Aa n i n d e p e n d e n t e n t i t y a p a r t f r o m i t s i n d i v i d u a l m e m b e r s @) . 1 0 1 S e e G r o s s o v . U n i t e d S t a t e s , 3 9 0 U . S . 6 2 , 6 7 - 6 8 ( 1 9 6 8 ) ( d e s c r i b i n g t h e c o m p o n e n t s o f t h e r e q u i r e d r e c o r d s d o c t r i n e e s t a b l i s h e d i n S h a p i r o v . U n i t e d S t a t e s , 3 3 5 U . S . 1 ( 1 9 4 8 ) ) .

Page 41: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 179

The Fourth Amendment specifically speaks of searches of papers, as well as searches of persons, houses, and effects, and it usually requires probable cause for these searches. Accord-ingly, subpoenas demanding the contents of personal records should generally be invalid under the Fourth Amendment unless they are based on such a showing. The rest of this section discusses whether there should be any other exceptions to this rule outside of the organizational investigation setting.

B. Private v. Public Records One distinction regarding personal records that could be made is between those records that are Aprivate@ and those that are in the public domain. As the required-records line of cases suggests, when the records fit in the latter category, the privacy associated with their content is considerably dimin-ished. With truly public records, the information can no longer be said to be Aowned@ solely by the individual and the record-holder. In that instance, reasonable suspicionBthe justification level that falls between probable cause and relevanceBought to be sufficient justification for permitting government access. Public records and records held by a public entity are not synonymous however. The word Apublic@ can apply to function-ally Aprivate@ institutions such as hospitals, schools and librar-ies, as well as to courthouses and government agencies. And even government agencies can house records that are more personal than public.102 How can we determine when public records are not really public and therefore deserving of full Fourth Amendment protection? Once again, statutory law and litigation in other contexts have already ploughed this ground. In particular, provisions in the federal Freedom of Information Act and simi-lar state statutes are directly on point. While these laws es- 1 0 2 S e e D A N I E L J . S O L O V E , T H E D I G I T A L P E R S O N : T E C H N O L O G Y A N D P R I V A C Y I N

T H E I N F O R M A T I O N A G E 1 2 7 ( 2 0 0 2 ) ( d e s c r i b i n g Aa s y s t e m w h e r e t h e g o v e r n m e n t e x t r a c t s p e r s o n a l i n f o r m a t i o n f r o m t h e p o p u l a c e a n d p l a c e s i t i n t h e p u b l i c d o m a i n @) .

Page 42: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 8 0 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

tablish a presumption in favor of disclosure of records held by government agencies, primarily as a means of increasing gov-ernment transparency and facilitating social transactions such as business deals,103 they usually exempt from disclosure a wide array of Apersonal@ records. Thus, under the federal stat-ute, government agencies must resist a FOIA request for Acommercial or financial information obtained from a person and privileged or confidential,@104 Apersonnel and medical files and similar files the disclosure of which would constitute a clearly unwarranted invasion of personal privacy,@105 and law enforcement records to the extent they include information that Acould reasonably be expected to constitute an un-warranted invasion of personal privacy.@106 State FOIA stat- 1 0 3 I d . a t 1 4 0 . 1 0 4 5 U . S . C . 5 5 2 ( b ) ( 4 ) . M a n y c i r c u i t s h a v e h e l d t h a t v o l u n t a r i l y s u b -m i t t e d i n f o r m a t i o n w i l l b e d e e m e d ` ' c o n f i d e n t i a l @ f o r t h e p u r p o s e o f t h i s e x e m p t i o n i f i t i s o f a k i n d t h a t w o u l d c u s t o m a r i l y n o t b e r e l e a s e d t o t h e p u b l i c b y t h e p e r s o n f r o m w h o m i t h a s o b t a i n e d r e c o r d s . S e e , e . g . , C r i t i c a l M a s s E n e r g y P r o j e c t v . N u c l e a r R e g u l a t o r y C o m m ' n , 9 7 5 F 2 d 8 7 1 , 8 7 2 ( D . C . C i r . 1 9 9 2 ) , c e r t . d e n i e d , 5 0 7 U . S . 9 8 4 ( 1 9 9 2 ) . S e e g e n e r a l l y W h a t C o n s t i t u t e s AT r a d e S e c r e t s a n d C o m m e r c i a l o r F i n a n c i a l I n f o r m a t i o n O b t a i n e d f r o m P e r s o n a n d P r i v i l e g e d o r C o n f i d e n t i a l , @ E x e m p t f r o m D i s c l o s u r e u n d e r F r e e d o m o f I n f o r m a t i o n A c t ( 5 U . S . C . A . ' 5 5 2 ( b ) ( 4 ) ) ( F O I A ) , 1 3 9 A . L . R . F E D . 2 2 5 ( 2 0 0 4 ) . 1 0 5 I d . ' 5 5 2 ( b ) ( 6 ) . T h e S u p r e m e C o u r t h a s d e f i n e d As i m i l a r f i l e s @ b r o a d -l y , t o i n c l u d e Ad e t a i l e d G o v e r n m e n t r e c o r d s o n a n i n d i v i d u a l w h i c h c a n b e i d e n t i f i e d a s a p p l y i n g t o t h a t i n d i v i d u a l , @ U . S . D e p ' t o f S t a t e v . W a s h i n g t o n P o s t C o . , 4 5 6 U . S . 5 9 5 , 6 0 2 ( 1 9 8 2 ) , a l t h o u g h i t h a s a l s o m a d e c l e a r t h a t s u c h f i l e s c a n n o t b e w i t h h e l d s i m p l y b e c a u s e s u c h i d e n t i f i c a t i o n c a n n o t b e g u a r a n t e e d , a n d t h a t r e d a c t i o n o f i d e n t i f y i n g n a m e s m a y b e s u f f i c i e n t . D e p a r t m e n t o f A i r F o r c e v . R o s e , 4 2 5 U . S . 3 5 2 , 3 8 1 - 8 2 ( 1 9 7 6 ) . S e e g e n e r a l l y A n n o t a t i o n , W h e n A r e G o v e r n m e n t R e c o r d s AS i m i l a r F i l e s @ E x e m p t f r o m D i s c l o s u r e u n d e r F r e e d o m o f I n f o r m a t i o n A c t P r o v i s i o n ( 5 U . S . C . A . ' 5 5 2 ( b ) ( 6 ) ) E x e m p t i n g , C e r t a i n P e r s o n n e l , M e d i c a l , a n d AS i m i l a r @ F i l e s , 1 0 6 A . L . R . F E D . 9 4 ( 2 0 0 4 ) . 1 0 6 I d . a t 5 5 2 ( b ) ( 7 ) ( c ) . T h u s , f o r i n s t a n c e , a p e r s o n ' s r a p s h e e t m a y b e e x e m p t f r o m d i s c l o s u r e . S e e U . S . D e p ' t o f J u s t i c e v . R e p o r t e r ' s C o m m . f o r F r e e d o m o f P r e s s , 4 8 9 U . S . 7 4 9 , 7 7 4 ( 1 9 8 9 ) . S e e g e n e r a l l y J a m e s O . P e a r s o n , A n n o t a t i o n , W h a t C o n s t i t u t e s AU n w a r r a n t e d I n v a s i o n o f P e r s o n a l P r i v a c y @ f o r P u r p o s e s o f L a w E n f o r c e m e n t I n v e s t i g a t o r y R e c o r d s E x e m p t i o n o f F r e e d o m o f I n f o r m a t i o n A c t ( 5

Page 43: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 181

utes or interpretive caselaw protect various other types of records. For instance, Florida, which is known as the Sunshine State not only because of its weather but also because of the breadth of its public records disclosure law, nonetheless ex-empts from unrestricted disclosure some types of motor vehicle registration information,107 identifying information relating to health care provided by the state,108 credit information held by state agencies,109 and educational records.110 In many states, some types of licensing information are also exempt from disclosure.111 When federal or state law indicates that information found in government records should be withheld despite the strong interest in freedom of information, it ought to be con-sidered private for Fourth Amendment purposes as well. That should mean that law enforcement must demonstrate probable cause to obtain it. For other records held by public entities, reasonable suspicion is sufficient. Recall, however, that even this latter level of justification demands more than the current legal regime, which usually does not even require a subpoena in such situations, but rath-er permits law enforcement access to public records with a simple extrajudicial certification. A curious law enforcement officer should not be able to sift through the personal data found in divorce papers, real estate documents and court pro-ceedings without articulating a specific need for it. That artic-ulation should take place beforehand to a judge or, in the U . S . C . A . s e c . 5 5 2 ( b ) ( 7 ) ( C ) ) , 5 2 A . L . R . F E D . 1 8 1 ( 2 0 0 4 ) . 1 0 7 F L A . S T A T . ' 1 1 9 . 0 7 ( a a ) . 1 0 8 I d . a t ( b b ) , ( c c ) , & ( h h ) . 1 0 9 I d . a t ( d d ) . 1 1 0 F L A . S T A T . ' 1 0 0 2 . 2 2 ( d ) . 1 1 1 S e e , e . g . , M a g e r v . S t a t e D e p ' t o f P o l i c e , 5 9 5 N . W . 2 d 1 4 2 , 1 4 3 ( 1 9 9 9 ) ( h o l d i n g t h a t Ag u n o w n e r s h i p i s i n f o r m a t i o n o f a p e r s o n a l n a t u r e ' @ r e q u i r i n g e x e m p t i o n f r o m t h e s t a t e f r e e d o m o f i n f o r m a t i o n a c t ) ; s e e a l s o O R . R E V . S T A T . ' 6 5 6 . 7 0 2 ( 1 ) ( A[ t ] h e r e c o r d s o f t h e S t a t e A c c i d e n t I n s u r a n c e F u n d C o r p o r a t i o n , e x c e p t i n g e m p l o y e r a c c o u n t r e c o r d s a n d c l a i m a n t f i l e s , s h a l l b e o p e n t o p u b l i c i n s p e c t i o n . @) ( e m p h a s i s a d d e d ) .

Page 44: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 8 2 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

manner typical of a subpoena, after notification and chal-lenge.112 A common complaint about such an approach is that it places more limits on government officials than on members of the public, who can access public records at will and, with the advent of Google and other Internet search services, can do so more easily than ever before. But most of the time the public only seeks public information when it has a specific need for it (akin to the reasonable suspicion standard).113 More impor-tantly, government's resources and power are so much more significant, and its hunger for information so much more vora-cious, especially post-9/11, that its potential for abusing per-sonal information far exceeds anything individuals or even corporations might do.114

1 1 2 N o t e t h a t t h i s p r o c e d u r e i s n o m o r e o n e r o u s , f r o m t h e l a w o f f i c e r ' s p e r s p e c t i v e , t h a n t h e c u r r e n t p e n r e g i s t e r r e g i m e . S e e s u p r a n o t e s 4 3 - 4 7 a n d a c -c o m p a n y i n g t e x t . 1 1 3 N o a h R o t h b a u m , S p i e s L i k e U s , S M A R T M O N E Y ( F e b . 2 0 0 5 ) a t 8 9 - 9 2 ( d e s c r i b i n g t h e v a r i o u s w a y s p e o p l e m i g h t a n d d o u s e n e w s e a r c h e n g i n e s , i n c l u d i n g i n v e s t i g a t i n g j o b a p p l i c a n t s a n d r e a l e s t a t e f o r s a l e ) . 1 1 4 S e e i n f r a n o t e s 1 4 2 - 4 6 a n d a c c o m p a n y i n g t e x t ( d e s c r i b i n g c o n c e r n s a b o u t g o v e r n m e n t ' s a b i l i t y t o o b t a i n a n d a b u s e i n f o r m a t i o n ) ; s e e a l s o S O L O V E , s u p r a n o t e 1 0 2 , a t 1 6 8 - 7 5 ( d e s c r i b i n g c u r r e n t g o v e r n m e n t e f f o r t s t o o b t a i n i n f o r m a t i o n a b o u t m i l l i o n s o f c i t i z e n s a n d c o n c l u d i n g t h a t Aw e a r e a l r e a d y c l o s e r t o T o t a l I n f o r m a t i o n A w a r e n e s s t h a n w e m i g h t t h i n k @) & 1 7 5 - 8 7 ( d e s c r i b i n g p o s s i b l e a b u s e s o f i n f o r m a t i o n - g a t h e r i n g , i n c l u d i n g Ac r e e p i n g t o t a l i t a r i a n i s m , @ i n h i b i t i o n o f f r e e d o m o f a s s o c i a t i o n , a n d J . E d g a r H o o v e r ' s m i s u s e o f s u r v e i l l a n c e a g a i n s t a l l e g e d c o m m u n i s t p a r t y m e m b e r s a n d p e o p l e l i k e M a r t i n L u t h e r K i n g ) .

Page 45: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 183

C. Catalogic Data

By Acatalogic data@ I mean information that classifies and describes a transaction, as distinguished from the content of the transaction. Catalogic data includes descriptors of commu-nications and transmissions, such as phone numbers dialed, the addresses that route emails, and the duration of phone calls and Internet session times. This category of transactional information also includes membership lists; plane, train and ship passenger manifests; business records listing who pur-chased what and when; and other archives that describe the identities of those who have participated in a particular activi-ty or communication. This listing overlaps with some of the information that ECPA permits the government to obtain with an ex parte subpoena or a certification order. However, I would not include within the rubric of catalogic data other types of personal information ECPA currently allows government to obtain with an ex parte subpoena, such as the URLs of websites visited or the identity of those using pseudonyms.115 This kind of information is more akin to content: the URLs can be used to visit the same websites the target visits, and disclosure of the person behind the pseudonym will often allow government to link that person to particular messages.116 So limited, catalogic data should not be entitled to as much protection as the content of communications, because it is not as personal as the substance of communications made during the transaction. That is not to say, as the Supreme Court has said, that the Fourth Amendment is irrelevant when something other than content is at issue. Smith v. Mary-

1 1 5 S e e s u p r a n o t e s 6 9 - 7 2 a n d a c c o m p a n y i n g t e x t . 1 1 6 S e e g e n e r a l l y J o h n A l a n F a r m e r , N o t e , T h e S p e c t e r o f C r y p t o -A n a r c h y : R e g u l a t i n g A n o n y m i t y C P r o t e c t i n g P e e r - t o - P e e r N e t w o r k s , 7 2 F O R D H A M L . R E V . 7 2 5 ( 2 0 0 3 ) .

Page 46: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 8 4 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

land notwithstanding,117 most of us would not expect the peo-ple who work at our phone company (or Internet service pro-vider) to care who we call (or write to), an expectation that is undoubtedly correct.118 But the evidence that catalogic data provides about content is, at best, circumstantial. Catalogic data is to the substance of the contact as the visage is to per-sonality. Thus, while it is entitled to some protection, catalogic data should not be treated in the same way the associated content is. The analysis changes, however, when the government uses technologically-enhanced transaction surveillance to aggregate catalogic data. When information from pen registers, snoopware programs, and commercial data broker programs is combined, it can identify all of our surreptitious connections with the world, providing powerful evidence of our activities and beliefs.119 To use the words of the commentator quoted earlier, law enforcement can construct a Acomplete mosaic of a person's characteristics@ through this type of transaction sur-veillance. Under these circumstances, the information the government accumulates is more akin to content than mere cataloguing. The visage analogy no longer applies. This distinction between aggregated and isolated catalogic data roughly maps onto the distinction between target-based and event-based transaction surveillance described earlier. When government has identified a target, it will tend to accu-mulate as much information as possible about the target. Under such circumstances, the transaction surveillance will 1 1 7 S e e s u p r a n o t e s 4 0 - 4 1 a n d a c c o m p a n y i n g t e x t . 1 1 8 C f . W a y n e L a F a v e , T h e F o r g o t t e n M o t t o o f O b s t a P r i n c i p i s i n F o u r t h A m e n d m e n t J u r i s p r u d e n c e , 2 8 A R I Z . L . R E V . 2 9 1 , 3 0 2 ( 1 9 8 6 ) ( b a n k o f f i c i a l s d o n o t h a v e Ad i r e c t , s i g n i f i c a n t c o n t a c t w i t h t h e u n d e r l y i n g t r a n s a c t i o n a l i n f o r m a t i o n @ i n t h e s a m e w a y l a w e n f o r c e m e n t o f f i c e r s w h o c o l l e c t a l l o f a n i n d i v i d u a l ' s f i n a n c i a l i n f o r m a t i o n w o u l d ) ( q u o t i n g N o t e , 8 3 Y A L E L . J . 1 4 3 9 , 1 4 6 3 - 6 4 ( 1 9 7 4 ) ) . 1 1 9 S e e g e n e r a l l y S t a n K a r a s , P r i v a c y , I d e n t i t y , D a t a b a s e s , 5 2 A M . U . L . R E V . 3 9 3 , 3 9 8 ( 2 0 0 2 ) ( AW h a t w e b u y i s h o w w e p r e s e n t o u r s e l v e s t o t h e o u t s i d e w o r l d ; i t r e p r e s e n t s h o w w e c h o o s e t o i n t e r a c t w i t h i t . . . . T h e s e p r e f e r e n c e s a r e e x p r e s s i v e , r e v e a l i n g a n d p r i v a t e . @) .

Page 47: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 185

produce a personality Amosaic@ that is deserving of maximum protection. Event-based transaction surveillance of catalogic data is usually different. Recall the example given earlier of the snip-er investigation in which police find a sweater thread and footprint they believe belong to the sniper, and also know that the sniper reads a particular type of detective novel. Law enforcement attempts to identify the sniper through accessing the records of local clothing, shoe and bookstores are likely to disclose the names of numerous innocent people who have purchased items similar to those thought to be owned by the criminal. But this information, while personal, is merely a piece of the mosaic, not nearly the complete picture that tar-get-based surveillance is likely to produce. In this situation, a relevance showing should be enough, at least when the access does not infringe First Amendment interests.120 However, ex parte subpoenas, certification orders and extrajudicial certifications, which are the current means of regulating access to catalogic data when there is any regula-tion at all, are insufficiently restrictive despite their reliance on the relevance standard. These devices leave the transaction surveillance decision about personal data entirely or almost entirely in the discretion of law enforcement even when no exigent circumstances exist, a notion that is antithetical to the Fourth Amendment.121 Instead, in non-emergency situations 1 2 0 T h e S u p r e m e C o u r t h a s i n d i c a t e d t h a t r e q u i r i n g a n i n d i v i d u a l e n g a g e d i n a d v o c a c y t o s u r r e n d e r a n o n y m i t y w i t h o u t g o o d c a u s e c a n i n f r i n g e F i r s t A m e n d m e n t i n t e r e s t s . S e e , e . g . , N A A C P v . A l a b a m a e x . r e l . P a t t e r s o n , 3 5 7 U . S . 4 4 9 , 4 6 2 ( 1 9 5 8 ) ( AI t i s h a r d l y a n o v e l p e r c e p t i o n t h a t ` c o m p e l l e d d i s c l o s u r e o f a f -f i l i a t i o n w i t h g r o u p s e n g a g e d i n a d v o c a c y m a y c o n s t i t u t e [ a n ] e f f e c t i v e . . . r e s t r a i n t o n f r e e d o m o f a s s o c i a t i o n . ' @) ; S h e l t o n v . T u c k e r , 3 6 4 U . S . 4 7 9 , 4 9 0 ( 1 9 6 0 ) ( p r o h i b i t i n g c o m p e l l i n g t e a c h e r s t o d i s c l o s e g r o u p m e m b e r s h i p s ) . 1 2 1 A s J u s t i c e J a c k s o n s t a t e d i n J o h n s o n v . U n i t e d S t a t e s , 3 3 3 U . S . 1 0 , 1 3 - 1 4 ( 1 9 4 8 ) :

T h e p o i n t o f t h e F o u r t h A m e n d m e n t , w h i c h o f t e n i s n o t g r a s p e d b y z e a l o u s o f f i c e r s , i s n o t t h a t i t d e n i e s l a w e n f o r c e m e n t t h e s u p p o r t o f t h e u s u a l i n f e r e n c e s w h i c h r e a s o n a b l e m e n d r a w f r o m e v i d e n c e . I t s p r o t e c t i o n

Page 48: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 8 6 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

the government should be able to obtain catalogic data in connection with event-based surveillance only when a judge finds it is relevant to an investigation, an assertion the record-holder should have the opportunity to challenge unless notifi-cation would undermine the investigation.

c o n s i s t s i n r e q u i r i n g t h a t t h o s e i n f e r e n c e s b e d r a w n b y a n e u t r a l a n d d e t a c h e d m a g i s t r a t e i n s t e a d o f b e i n g j u d g e d b y t h e o f f i c e r e n g a g e d i n t h e o f t e n c o m p e t i t i v e e n t e r p r i s e o f f e r r e t i n g o u t c r i m e . . . . W h e n t h e r i g h t o f p r i v a c y m u s t r e a s o n a b l y y i e l d t o t h e r i g h t o f s e a r c h i s , a s a r u l e , t o b e d e c i d e d b y a j u d i c i a l o f f i c e r , n o t b y a p o l i c e m a n o r G o v e r n m e n t e n f o r c e m e n t a g e n t . . . .

J a c k s o n t h e n w e n t o n t o l i s t t h e Ae x c e p t i o n a l c i r c u m s t a n c e s i n w h i c h , o n b a l a n c i n g t h e n e e d f o r e f f e c t i v e l a w e n f o r c e m e n t a g a i n s t t h e r i g h t o f p r i v a c y , i t m a y b e c o n t e n d e d t h a t a m a g i s t r a t e ' s w a r r a n t f o r s e a r c h m a y b e d i s p e n s e d w i t h : w h e n a As u s p e c t w a s f l e e i n g o r l i k e l y t o t a k e f l i g h t @; A[ t ] h e s e a r c h w a s o f . . . a m o v a b l e v e h i c l e @; o r Ae v i d e n c e o r c o n t r a b a n d w a s t h r e a t e n e d w i t h r e m o v a l o r d e s t r u c t i o n . @ I d . a t 1 5 .

Page 49: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 187

D. Data Mining/Profile Information

Data mining is event-based transaction surveillanceBthe use of records searches to discern patterns of behavior that can be linked to past or future crime, without having a specific individual or individuals in mind. Several formal data mining programs exist. For instance, the Homeland Security Depart-ment runs something called the Electronic Surveillance Sys-tem for Early Notification of Community-Based Epidemics (ESSENCE), which gathers personally identifiable information from emergency rooms, health plans, clinical laboratories, 911 calls, pharmacies, and veterinary clinics in an effort to discern unusual or suspicious symptoms and events.122 The Enhanced Border Security and Visa Entry Reform Act of 2002 requires aircrafts and sea vessels to submit departure and arrival man-ifests indicating the names of all alien passengers, which can be combed for suspicious travel patterns.123 The much more sophisticated Computer Assisted Passenger Prescreening Sys-tem (CAPPS) purportedly combines airline passenger lists with travel reservations, rental car status, travel companions, and address.124 Data mining comes in many forms, but all varieties have one thing in common: they rely on dragnet perusal of transaction information. One way of analyzing the Fourth Amendment implica- 1 2 2 S e e K a t h e r i n e M c I n t i r e P e t e r s , P a t t e r n R e c o g n i t i o n , S e p t . 1 9 , 2 0 0 3 , a v a i l a b l e a t h t t p : / / w w w . g o v e x e c . c o m / f e a t u r e s / 0 9 0 3 / 0 9 0 3 s 2 . h t m ( d e -s c r i b i n g E S S E N C E ) . E S S E N C E i s a m u c h r e d u c e d v e r s i o n o f t h e m a l i g n e d T o t a l I n f o r -m a t i o n A w a r e n e s s p r o g r a m , n o w l a b e l e d T e r r o r i s m I n f o r m a t i o n P r o g r a m , t h a t w a s r e s t r i c t e d b y C o n g r e s s i n 2 0 0 2 . 1 0 U . S . C . ' 2 2 4 1 ( l i m i t i n g s c o p e a n d a p p r o p r i a -t i o n s f o r t o t a l i n f o r m a t i o n a w a r e n e s s p r o g r a m ) . 1 2 3 8 U . S . C . ' 1 7 3 1 ( a ) ( 2 ) ( r e q u i r i n g t h e e s t a b l i s h m e n t o f a d a t a b a s e f o r a l l a r r i v a l s a n d d e p a r t u r e s ) . 1 2 4 S e e C h a r u A . C h a n d r a s e k h a r , F l y i n g W h i l e B r o w n : F e d e r a l C i v i l R i g h t s R e m e d i e s t o P o s t - 9 / 1 1 A i r l i n e R a c i a l P r o f i l i n g o f S o u t h A s i a n s , 1 0 A S I A N L . J . 2 1 5 , 2 2 1 ( 2 0 0 3 ) ( d e s c r i b i n g a p r o f i l e u s i n g r o u g h l y 4 0 i t e m s w h i c h , a l t h o u g h s e c r e t , a r e l i k e l y t o i n c l u d e t h o s e l i s t e d ) .

Page 50: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 8 8 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

tions of data mining would be to focus on the nature of the records that are mined. Under this approach, if ESSENCE ac-cesses the contents of personally identified medical records for criminal investigation purposes, its algorithm ought to identify only people who are highly likely to be perpetrators of crime, while if all of its information comes from Apublic@ records or is composed of isolated catalogic sources, then its ability to iden-tify criminals need not be as potent. A second way of analyzing data mining would be to look at the extent to which it aggregates information about the individuals it investigates and tags. If one accepts the concern about creation of Aper-sonality mosaics@ described earlier, data mining would need a high hit rate to the extent it accumulates a significant amount of identifiable data about individuals, even if, as with CAPPS, all of the information is catalogic in nature. Either way, data mining does not fare well. From what we know, the profiles used in the programs are very unlikely to identify even a small number of terrorists or other criminals. In other words, they may not even be successful enough to pass the relevance test (which requires that the investigative technique do better than chance), much less reach a level of success commensurate with reasonable suspicion or probable cause. Perhaps if such a data mining program relied only on a small amount of catalogic data to identify potential targets, it would be permissible under the interpretation of the Fourth Amendment put forward here.125 But once government begins using multiple databases to put together detailed dossiers on the activities of its citizens, it would have to show more than 1 2 5 A r e c e n t l y r e l e a s e d r e p o r t b y a D e p a r t m e n t o f D e f e n s e a d v i s o r y c o m m i t t e e r e q u i r e s c o u r t a p p r o v a l o f d a t a m i n i n g t h a t w i l l o b t a i n Ap e r s o n a l l y i d e n t i f i -a b l e i n f o r m a t i o n @ f r o m r e c o r d s n o t r e a d i l y a v a i l a b l e t o t h e p u b l i c . S e e R e p o r t o f t h e T e c h n o l o g y a n d P r i v a c y A d v i s o r y C o m m i t t e e , S a f e g u a r d i n g P r i v a c y i n t h e F i g h t A g a i n s t T e r r o r i s m 4 9 , 5 1 ( M a r c h 2 0 0 4 ) . H o w e v e r , i t r e q u i r e s t h e c o u r t t o f i n d o n l y t h a t t h e i n f o r m a t i o n o b t a i n e d b e Ar e a s o n a b l y r e l a t e d @ t o t h e i n v e s t i g a t i o n p u r p o s e B a r e l e v a n c e s t a n d a r d ? B a n d d o e s n o t o t h e r w i s e d i s t i n g u i s h b e t w e e n t y p e s o f r e c o r d s . I d . a t 5 1 - 5 2 . T h e r e p o r t m a k e s s e v e r a l g o o d s u g g e s t i o n s r e g a r d i n g Aa n o n y m i z i n g @ d a t a , r e c o r d - k e e p i n g a n d o t h e r m e a n s o f m o n i t o r i n g d a t a m i n i n g . I d . a t 4 8 - 5 9 .

Page 51: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 189

just a possibility that something useful might turn up.

IV. COUNTER-PROPOSALS What does this set of proposals mean for our detective friend, described in Part I of this article? If he is investigating a particular person (the frequent flyer, the free-spender or the young Arab man), he needs a Terry order to access public records through Choicepoint or one of the other commercial data brokers. And he needs a warrant based on probable cause to access the contents of the suspect's financial, school, medical and similar personal records, as well as to obtain aggregated catalogic information such as addresses of the person's email messages. If instead he is engaging in event-based investiga-tion, the nature of the records sought determines the justifica-tion needed. If, as in the hypotheticals described in Part I, the focus is store records (in an effort to track down a sniper-kill-er), or skydiving club membership lists and cookies of websites (in an effort to identify terrorists planning to bomb a mall), he would be on solid ground if this catalogic data is likely to increase the probability of identifying the perpetrators. If instead access is sought to the content of personal records or to catalogic data that implicates First Amendment interests, individualized suspicion would be required.126 While this set of rules is not uncomplicated, it recognizes fewer types of authorizations than the current regime. The officer need merely make distinctions between personal and public records when conducting target-based transaction sur-veillance, and between content and catalogic data when con-

1 2 6 T h e a n a l y s i s s h o u l d n o t c h a n g e i f g o v e r n m e n t s e e k s p e r s o n a l i n f o r m a t i o n f r o m r e c o r d s a c q u i r e d b y a c o m m e r c i a l d a t a b r o k e r t h a t h a s o b t a i n e d t h e i n f o r m a t i o n f r o m t h e o r i g i n a l r e c o r d - h o l d e r s . O t h e r w i s e , m u c h o f t h i s r e g u l a t i o n c o u l d b e a v o i d e d . D a t a d o e s n o t b e c o m e l e s s p e r s o n a l s i m p l y b e c a u s e i t h a s b e e n s h i f t e d f r o m o n e e n t i t y t o a n o t h e r . T h e c r u c i a l q u e s t i o n s a r e w h e t h e r i t i s c o n t e n t o r c a t a l o g i c / o r g a n i z a t i o n a l i n f o r m a t i o n , a n d w h e t h e r i t w a s o r i g i n a l l y c o l l e c t e d f o r p r i v a t e o r p u b l i c p u r p o s e s .

Page 52: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 9 0 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

ducting event-base surveillance. Moreover, since transaction surveillance should generally only proceed pursuant to court order, any confusion on the detective's part can be cleared up by a judge. One can imagine numerous alternative methods of regu-lating transaction surveillance. Professor Daniel Solove has put forth the most coherent alternative to current law and the proposal presented here.127 He points out that technology has made it easier both to maintain information about people and to aggregate it.128 Thus, he proposes that, rather than attempt to figure out a privacy hierarchy and match authorization requirements to it (the proportionality approach that informs this article), we should adopt a uniform regulatory regime for government access to any Asystem of records.@129 Specifically, Solove proposes that, outside of emergency situations, gov-ernment should not be able to obtain information in re-cordsBwhether it is content or catalogic data, whether it is held by private or public agenciesBunless it can obtain what he calls a Aregulated subpoena.@130 To obtain such a subpoena the government would have to demonstrate it has probable cause to believe the person whose records are sought is involved in criminal activity, and that the specific records targeted are of Amaterial importance@ to the investigation, which he describes as a standard that is Aslightly more permissive than that of a warrant,@ though more demanding than the relevance standard required for a subpoena (and, presumably, the reasonable suspicion required for a Terry order).131 As with tra-ditional subpoenas, the regulated subpoena would be chal-lengeable by the target.132

1 2 7 D a n i e l J . S o l o v e , D i g i t a l D o s s i e r s a n d t h e D i s s i p a t i o n o f F o u r t h A m e n d m e n t P r i v a c y , 7 5 S . C A L . L . R E V . 1 0 8 3 ( 2 0 0 2 ) . 1 2 8 I d . a t 1 0 9 0 - 9 5 . 1 2 9 I d . a t 1 1 5 2 - 5 9 . 1 3 0 I d . a t 1 1 6 4 . 1 3 1 I d . a t 1 1 6 4 - 6 5 . 1 3 2 I d . a t 1 1 6 5 .

Page 53: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 191

Solove makes interesting arguments as to why his ap-proach is superior to a proportionality approach. First, he points to the difficulty of differentiating between degrees of privacy and intimacy,133 a difficulty illustrated by my attempts to distinguish content from catalogic information, personal from organizational records, and private from public records. Second, even if we could resolve these definitional problems, Solove believes that making privacy the linchpin of analysis is conceptually bankrupt. He notes, for instance, that we would never think of requiring the police to obtain a warrant in order to obtain a description of a suspect's genitals from his sexual partner, yet that information is probably as Aprivate@ as anything found in one's medical records.134 Privacy, Solove argues, is a contextual concept that cannot form the basis for uniform regulation.135 Rather, in the transaction surveillance setting, the focus should be whether the information is main-tained in a system of records.136 So, to return to his example, the police could interview the sexual partner without restric-tion, but would need a regulated subpoena to access the medi-cal record of the suspect for the same information. I agree with the premise of both of Solove's arguments, but am less persuaded that they lead to his conclusion. Solove is right that making the subtle distinctions demanded by a proportionality approach is difficult and can result in over or under protection of information at the margins. But requiring a uniform standard of probable cause for all record searches, as Solove would, provides far too much protection for some types of information. For instance, data mining of any sort 1 3 3 I d . a t 1 1 5 2 - 5 3 . 1 3 4 I d . a t 1 1 5 4 . 1 3 5 I d . a t 1 1 5 3 - 5 4 . S o l o v e d e v e l o p s t h i s p o i n t i n m u c h m o r e d e t a i l i n D a n i e l J . S o l o v e , C o n c e p t u a l i z i n g P r i v a c y , 9 0 C A L . L . R E V . 1 0 8 7 , 1 0 8 8 - 9 9 ( 2 0 0 2 ) . 1 3 6 S o l o v e , s u p r a n o t e 1 2 7 , a t 1 1 5 7 ( AF o c u s i n g o n ` s y s t e m s o f r e c o r d s ' t a r g e t s t h e t y p e o f i n f o r m a t i o n f l o w t h a t r a i s e s c o n c e r n . B e c a u s e t h e p r o b l e m o f m o d e r n g o v e r n m e n t i n f o r m a t i o n - g a t h e r i n g i s c a u s e d b y t h e i n c r e a s i n g d o s s i e r s m a i n t a i n e d i n p r i v a t e s e c t o r r e c o r d s y s t e m s , t h e a r c h i t e c t u r e t a r g e t s t h o s e t h i r d p a r t i e s t h a t s t o r e d a t a i n r e c o r d s y s t e m s . @) .

Page 54: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 9 2 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

would be almost impossible; if probable cause were required, the sniper-killer and terrorist investigations described above would probably never get off the ground. Or imagine that police want to find out from the phone company who called a murder victim in the two weeks prior to the murder (a scenario often depicted on TV shows like Law & Order). While they would certainly be able to demonstrate the relevance of this catalogic data, they would not have probable cause with re-spect to any of the callers, and thus would not be able to ob-tain the regulated subpoena for the phone company's records that Solove would demand. Creating a hierarchy of privacy, as tricky as it is, is important as a means of enabling the balanc-ing of government and individual interests that the Supreme Court has sanctioned since the 1960s.137 I also agree that the extent to which we are willing to protect private information is contextual, as Solove's example of the sexual partner interview demonstrates. However, that conclusion does not mean that privacy should be discarded as the baseline consideration in determining the government's authority to obtain information about its citizens. The reason we should treat interviews differently from records requests is not because privacy somehow is irrelevant in the former situa-tion, but because the target's interest in privacy is countered by an even stronger interestBthe third party's autonomy. Hu-man information sources, such as the sexual partner, should have a right to decide what to do with the information they possess; in such cases, the subject's privacy interest is out-weighed by the source's autonomy interest.138 When the third party is an impersonal record-holder, on the other hand, con-cerns about denigrating Apersonhood@ through limitations on

1 3 7 S e e C a m a r a v . M u n . C t . , 3 8 7 U . S . 5 2 3 , 5 3 6 - 3 7 ( 1 9 6 7 ) ( A[ T ] h e r e c a n b e n o r e a d y t e s t f o r d e t e r m i n i n g r e a s o n a b l e n e s s o t h e r t h a n b y b a l a n c i n g t h e n e e d t o s e a r c h a g a i n s t t h e i n v a s i o n w h i c h t h e s e a r c h e n t a i l s . @) . 1 3 8 M a r y I r e n e C o o m b s , S h a r e d P r i v a c y a n d t h e F o u r t h A m e n d m e n t , o r T h e R i g h t s o f R e l a t i o n s h i p s , 7 5 C A L . L . R E V . 1 5 9 3 , 1 6 4 3 - 4 4 ( 1 9 8 7 ) .

Page 55: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 193

when information may be revealed are non-existent.139 It is the absence of a legitimate third party interest in surrendering the target's private information, not the bare fact that the information happens to reside in a record, that distinguishes the records request scenario from the interview setting. These considerations lead me to conclude, contrary to Solove, that privacy concerns should be the fundamental con-sideration in analyzing transaction surveillance. While infor-mation generally should be accorded privacy protection when recorded, the extent of that protection should depend on the degree of privacy associated with the information, not simply on whether it exists in record form. Thus, some transactional informationBi.e., that found in truly public records and catalogic dataBshould be accessible on less than probable cause. Another alternative to the proportionality approach ad-vanced here evades the issue of whether it is under or over protective of privacy by asserting that it focuses on the wrong sort of privacy invasion. Professor William Stuntz concedes that Asecret searches@ of our transactional information create risks that Aare worth worrying about.@140 But he contends that we would not be particularly bothered by easy government access to such information if we never find out it has occurred except in connection with prosecutions for serious crime.141 In other words, covert access to and stringent control over use of 1 3 9 F o r f u r t h e r d e v e l o p m e n t o f t h i s p o i n t , s e e S l o b o g i n , s u p r a n o t e 8 9 , a t 8 3 4 - 3 5 . O f c o u r s e , t h e e m p l o y e e s o f t h e r e c o r d - h o l d e r m i g h t w a n t t o r e v e a l p r i v a t e i n f o r m a t i o n . S e e , e . g . , S u s a n F r e i w a l d , U n c e r t a i n P r i v a c y : C o m m u n i c a t i o n A t t r i b u t e s A f t e r t h e D i g i t a l T e l e p h o n y A c t , 6 9 S . C A L . L . R E V . 9 4 9 , 1 0 1 3 ( 1 9 9 6 ) ( AA s t h e p r e s i d e n t o f t h e U n i t e d S t a t e s T e l e p h o n e A s s o c i a t i o n p u t i t i n e x p l a i n i n g t h a t t e l e -p h o n e c o m p a n i e s a r e i n t e r e s t e d i n a c c e d i n g t o l a w e n f o r c e m e n t r e q u e s t s f o r a s s i s t a n c e , t h e c o m p a n i e s w a n t t o b e ` g o o d l o c a l c i t i z e n [ s ] . ' @) . B u t l i m i t i n g t h a t a b i l i t y i s n o t d e n y i n g t h e e m p l o y e e ' s Ap e r s o n h o o d , @ b e c a u s e t h e i n f o r m a t i o n i s m a i n t a i n e d b y t h e i n s t i t u t i o n , n o t t h e p e r s o n . 1 4 0 W i l l i a m J . S t u n t z , L o c a l P o l i c i n g A f t e r t h e T e r r o r , 1 1 1 Y A L E L . J . 2 1 3 7 , 2 1 8 1 ( 2 0 0 2 ) . 1 4 1 I d . a t 2 1 8 4 - 8 5 .

Page 56: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 9 4 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

transaction information should permit relaxation of the rules as to how we obtain it. This ignorance-is-bliss notion is superficially attractive. But limiting information flow, which is essential to Stuntz' scheme, can be very difficult. The notion that data gathered by law enforcement will be restricted to a small group of govern-ment employees is particularly naive in the wake of 9/11, when literally hundreds of thousands of law enforcement offi-cers are charged with fighting Aterrorism,@ an amorphous threat to say the least.142 And ensuring that the information government officials acquire through covert surveillance is used only for the purpose of prosecuting serious crime could be equally difficult, precisely because the surveillance is covert.143 Finally, abandoning all suspicion requirements, as Stuntz would do, virtually guarantees that data would be gathered about large numbers of innocent people, which in turn is likely to increase the chances of government files containing mis-leading information about its citizens.144 Even if the information gathered is somehow confined to a limited and discrete group and is not misused or inaccurate in any way, routine suspicionless and covert transaction surveil-lance can eat away at whatever trust is left between govern-ment and its citizenry. As I wrote in a discussion of Stuntz'

1 4 2 S e e g e n e r a l l y , G a b r i e l S o l l , T e r r o r i s m : T h e K n o w n E l e m e n t N o O n e C a n D e f i n e , 1 1 W I L L A M E T T E J . I N T ' L L . & D I S P . R E S O L . 1 2 3 ( 2 0 0 4 ) . S e e a l s o P e t e r S w i r e , T h e S y s t e m o f F o r e i g n I n t e l l i g e n c e S u r v e i l l a n c e L a w , 7 2 G E O . W A S H . L . R E V . 1 3 0 6 , 1 3 7 1 ( 2 0 0 4 ) ( s t a t i n g t h a t At h e h i s t o r y o f p r e v i o u s c y c l e s s h o w s t h e t e m p t a t i o n o f s u r v e i l l a n c e s y s t e m s t o j u s t i f y a n e v e r - i n c r e a s i n g s c o p e o f a c t i v i t y , i n t h e h o p e s t h a t j u s t a l i t t l e b i t m o r e s u r v e i l l a n c e w i l l c a t c h t h e t e r r o r i s t s o r p r e v e n t a n a t t a c k @) . 1 4 3 I d . a t 1 3 6 6 ( d i s c u s s i n g Aa l o n g - r u n c o n c e r n t h a t s e c r e t . . . o r d e r s @ a l l o w i n g Aa c c e s s t o e n t i r e d a t a b a s e s o f r e c o r d s . . . w i l l b e u s e d e x p a n s i v e l y t o i n t r u d e i n t o a w i d e a r r a y o f d o m e s t i c m a t t e r s @) . 1 4 4 T h e r e c e n t e x e m p t i o n o f t h e F B I ' s C e n t r a l R e c o r d s S y s t e m d a t a b a s e f r o m t h e p r o v i s i o n i n t h e P r i v a c y A c t t h a t r e q u i r e s g o v e r n m e n t r e c o r d s t o b e a c c u -r a t e , 6 8 F e d . R e g . 1 4 1 4 0 ( M a r . 2 4 , 2 0 0 3 ) ( t o b e c o d i f i e d a s 2 8 C . F . R . p t . 1 6 ) , w i l l n o t h e l p m a t t e r s .

Page 57: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 195

proposal in the context of public camera surveillance:

o n c e t h e p u b l i c b e c o m e s a w a r e t h a t r a n d o m c o v e r t s u r v e i l -l a n c e i s o c c u r r i n g , a s i t i n e v i t a b l y w o u l d a f t e r a f e w p r o s e c u -t i o n s i n w h i c h t h e c o v e r t l y g l e a n e d i n f o r m a t i o n i s u s e d , t h e p a n o p t i c e f f e c t o f t h i s r e g i m e w i l l b e g r e a t e r t h a n o c c u r s w i t h o v e r t [ s u r v e i l l a n c e ] . . . . [ W ] e w o u l d a s s u m e t h a t s e c r e t s u r v e i l l a n c e w a s p e r v a s i v e , n o t j u s t i n c i d e n t a l . . . . P r o b a b l y n o p a s s a g e i n O r w e l l ' s n o v e l 1 9 8 4 i s m o r e c h i l l i n g t h a n t h e [ f o l l o w i n g ] : At h e r e w a s o f c o u r s e n o w a y o f k n o w i n g w h e t h e r y o u w e r e b e i n g w a t c h e d a t a n y g i v e n m o m e n t . . . I t w a s e v e n c o n c e i v a b l e t h a t t h e y w a t c h e d e v e r y b o d y a l l t h e t i m e . @

With the power of today's computers, government could monitor the transactions of everybody, all the time. A regulatory regime that explicitly endorsed that sort of process would destroy any sense of security people might have in today's technological society. Indeed, if government is to be allowed to find out details of our lives whenever it is interested in doing so, we would probably be more comfortable knowing precisely when the surveillance is occurring, rather than being left in the dark.146 A final means of regulating transaction surveillance is to leave the task up to the legislature, specifically Congress. Professor Orin Kerr has made the most powerful argument for this approach.147 He correctly points out that congressional statutes

1 4 5 C h r i s t o p h e r S l o b o g i n , P u b l i c P r i v a c y : C a m e r a S u r v e i l l a n c e o f P u b l i c P l a c e s a n d t h e R i g h t t o A n o n y m i t y , 7 2 M I S S . L . J . 2 1 3 , 3 0 5 ( 2 0 0 2 ) ; s e e a l s o T h e C o u n c i l f o r E x c e l l e n c e i n G o v e r n m e n t , F r o m t h e H o m e F r o n t t o t h e F r o n t L i n e s , A m e r i c a S p e a k s O u t A b o u t H o m e l a n d S e c u r i t y 6 ( M a r c h 2 0 0 4 ) a v a i l a b l e a t h t t p : / / w w w . e x c e l g o v . o r g ( p o l l i n d i c a t i n g t h a t 7 2 % o f A m e r i c a n s h a v e As o m e @ o r Av e r y l i t t l e @ t r u s t i n t h e g o v e r n m e n t t o Au s e p e r s o n a l i n f o r m a t i o n a p p r o p r i a t e l y @) . 1 4 6 C f . D A V I D B R I N , T H E T R A N S P A R E N T S O C I E T Y ( 1 9 9 8 ) ( a r g u i n g t h a t Aw a t c h i n g t h e w a t c h e r s @ i s t h e o n l y w o r k a b l e m e t h o d o f r e g u l a t i n g g o v e r n m e n t i n t r u -s i o n i n t h e a g e o f t e c h n o l o g y ) . 1 4 7 O r i n S . K e r r , T h e F o u r t h A m e n d m e n t a n d t h e N e w T e c h n o l o g i e s : C o n s t i t u t i o n a l M y t h s a n d t h e C a s e f o r C a u t i o n , 1 0 2 M I C H . L . R E V . 8 0 1 ( 2 0 0 4 ) .

Page 58: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 9 6 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

have provided more protection against transaction surveillance than the Supreme Court's construal of the Fourth Amendment in cases like Miller,148 and that, in theory, legislatures are bet-ter equipped than courts to craft clear rules governing transac-tion surveillance in an era of rapidly changing, complicated technology.149 But his arguments fail to negate two crucial facts, documented in this article, about the transaction surveil-lance rules that Congress has enacted to date: The rules have not been particularly clear150 and, more importantly, they do not provide adequate protection against government access to our personal records. Especially in the wake of 9/11, Congress is unlikely to alter its stance unless the courts, relying on the Fourth Amendment, nudge it in the right direction. Will the courts be willing to engage in such nudging? Cer-tainly, Miller, Smith and like cases indicate that the Supreme Court is reticent about doing so. But in more recent decisions applying the Aspecial needs@ doctrine, which raises parallel issues, the Court has backed off its nonchalant attitude toward nontraditional searches and seizures. In Ferguson v. City of Charleston,151 the Court declared unconstitutional a policy that authorized hospital drug testing of pregnant patients for the purpose of detecting illegal drug use, over a dissent by Justice Scalia arguing that, under Miller, the patients voluntarily assumed the risk the results of such tests would be used for investigative purposes.152 The majority in Ferguson ignored 1 4 8 I d . a t 8 5 6 . 1 4 9 I d . a t 8 5 7 - 8 7 . 1 5 0 K e r r h i m s e l f h a s n o t e d t h a t m u c h o f t h e l e g i s l a t i o n g o v e r n i n g t r a n s a c t i o n s u r v e i l l a n c e i s c o m p l i c a t e d . S e e , e . g . , K e r r , s u p r a n o t e 9 0 , a t 1 2 0 8 ( A[ C ] o u r t s , l e g i s l a t o r s , a n d e v e n l e g a l s c h o l a r s h a v e h a d a v e r y h a r d t i m e m a k i n g s e n s e o f t h e [ S t o r e d C o m m u n i c a t i o n s A c t o f E C P A ] . @) ; O r i n S . K e r r , L i f t i n g t h e AF o g @ o f I n t e r n e t S u r v e i l l a n c e : H o w a S u p p r e s s i o n R e m e d y W o u l d C h a n g e C o m p u t e r C r i m e L a w , 5 4 H A S T I N G S L . J . 8 0 5 , 8 2 0 ( 2 0 0 3 ) ( t h e Al a w o f e l e c t r o n i c s u r v e i l l a n c e i s f a -m o u s l y c o m p l e x , i f n o t e n t i r e l y i m p e n e t r a b l e . @) . 1 5 1 5 3 2 U . S . 6 7 ( 2 0 0 1 ) . 1 5 2 I d . a t 9 5 ( S c a l i a , J . , d i s s e n t i n g ) ( AU n t i l t o d a y , w e h a v e n e v e r h e l d C o r e v e n s u g g e s t e d C t h a t m a t e r i a l w h i c h a p e r s o n v o l u n t a r i l y e n t r u s t s t o s o m e o n e e l s e

Page 59: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 197

Scalia's complaint, reasoning that a reasonable patient would assume the test results would be used for diagnostic purposes and that otherwise they would be kept confidential.153 In both Ferguson and Indianapolis v. Edmond,154 which held invalid a roadblock set up to interdict narcotics, the Court also empha-sized that individualized cause requirements may not be re-laxed if the only Aspecial need@ pleaded by the government is a Ageneral interest in law enforcement.@155 Ferguson signals that the Court is hesitant about granting the government an exemption from traditional Fourth Amendment standards simply because information relevant to a criminal investigation has been handed over to a third party (thus undermining Miller's premise). And both Ferguson and Edmond suggest that strong government allegations that relaxation of those standards is necessary to detect criminal activity will not always prevail (thus undermining the Aheightened need@ rationale as a ground for reducing Fourth Amendment protections). These decisions provide a glimmer of hope that, when confronted with cases challenging subpoenas for personal records about medical treatment, personal finances and the contents of email messages, the Court will withdraw from its broad pronouncements in Miller. If it does so, further, more detailed rule-making along the lines suggested here might best

c a n n o t b e g i v e n b y t h a t p e r s o n t o t h e p o l i c e , a n d u s e d f o r w h a t e v e r e v i d e n c e i t m a y c o n t a i n . @) . 1 5 3 I d . a t 7 8 ( AT h e u s e o f a n a d v e r s e t e s t r e s u l t t o d i s q u a l i f y o n e f r o m e l i g i b i l i t y f o r a p a r t i c u l a r b e n e f i t , s u c h a s a p r o m o t i o n o r a n o p p o r t u n i t y t o p a r t i c i p a t e i n a n e x t r a c u r r i c u l a r a c t i v i t y , i n v o l v e s a l e s s s e r i o u s i n t r u s i o n o n p r i v a c y t h a n t h e u n -a u t h o r i z e d d i s s e m i n a t i o n o f s u c h r e s u l t s t o t h i r d p a r t i e s . T h e r e a s o n a b l e e x p e c t a t i o n o f p r i v a c y e n j o y e d b y t h e t y p i c a l p a t i e n t u n d e r g o i n g d i a g n o s t i c t e s t s i n a h o s p i t a l i s t h a t t h e r e s u l t s o f t h o s e t e s t s w i l l n o t b e s h a r e d w i t h n o n m e d i c a l p e r s o n n e l w i t h o u t h e r c o n s e n t . @) . 1 5 4 5 3 1 U . S . 3 2 ( 2 0 0 0 ) . 1 5 5 F e r g u s o n , 5 3 2 U . S . a t 7 9 ; E d m o n d , 5 3 1 U . S . a t 4 7 ( AW h e n l a w e n f o r c e m e n t a u t h o r i t i e s p u r s u e p r i m a r i l y g e n e r a l c r i m e c o n t r o l p u r p o s e s a t c h e c k p o i n t s s u c h a s h e r e , h o w e v e r , s t o p s c a n o n l y b e j u s t i f i e d b y s o m e q u a n t u m o f i n d i v i d u a l i z e d s u s p i c i o n . @) .

Page 60: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 1 9 8 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5

be left to Congress, for the reasons Kerr suggests. The goal is meaningful protection of personal information. The source of that protection is not so important.

CONCLUSION Analysis of government surveillance has tended to focus on communications and physical surveillance. Yet transaction surveillance is at least as pervasive as these other types of investigative techniques, and can be as inimical to privacy interests. Public and private records contain information re-garding virtually every aspect of our lives. In the past few decades, technology has made that information infinitely more easily aggregated and accessible. Nonetheless, neither legislatures nor courts have evidenced much concern about transaction surveillance. Congress appears to think of transaction information as Abusiness records,@ and thus at most entitled to the protection afforded by subpoenas, while the Supreme Court tells us we must assume the risk that record-holders will betray us. These positions ignore the obvi-ous fact that medical, financial and other types of private and public records contain much personal information. They also fail to acknowledge that disclosure of that information to re-cord-keepersBdisclosure that those of us who live a modern lifestyle cannot avoidBis no different, in expectation of privacy terms, than communicating with others by phone or email or interacting with others inside one's home, both activities clearly protected by the Constitution. As Senator Sam Ervin recog-nized in 1974, A[g]overnment has an insatiable appetite for power, and it will not stop usurping power unless it is re-strained by laws they cannot repeal or nullify.@156 When it comes to transaction surveillance, only the Fourth Amendment provides that type of restraint. 1 5 6 I n t r o d u c t o r y R e m a r k s o f S e n a t o r S a m J . E r v i n o n S . 3 4 1 8 , H . R . R E P . N O . 9 3 - 1 4 1 6 ( 1 9 7 4 ) , r e p r i n t e d i n U . S . C O N G R E S S , L E G I S L A T I V E H I S T O R Y O F T H E P R I -V A C Y A C T O F 1 9 7 4 , a t 3 - 8 ( 1 9 7 6 ) .

Page 61: 2005 - Transaction Surveillance by the Government

FILE:C:\SLOBOGIN.DTP Dec 12/13/05 Tue 12:53PM 2005] TRANSACTION SURVEILLANCE 199

Page 62: 2005 - Transaction Surveillance by the Government

F I L E : C : \ S L O B O G I N . D T P D e c 1 2 / 1 3 / 0 5 T u e

1 2 : 5 3 P M 2 0 0 M I S S I S S I P P I L A W J O U R N A L [ V o l . 7 5