{"id":5308,"date":"2017-10-05T22:37:10","date_gmt":"2017-10-06T02:37:10","guid":{"rendered":"http:\/\/ncjolt.org\/?p=5308"},"modified":"2020-06-04T20:52:52","modified_gmt":"2020-06-04T20:52:52","slug":"third-party-doctrine-overstayed-welcome","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/third-party-doctrine-overstayed-welcome\/","title":{"rendered":"Has the Third-Party Doctrine Overstayed Its Welcome?"},"content":{"rendered":"<p>On October 2, 2017, the Supreme Court of the United States began their 2017-2018 term, once again operating at full capacity with nine justices after the <a href=\"https:\/\/www.nytimes.com\/2017\/04\/07\/us\/politics\/neil-gorsuch-supreme-court.html?_r=0\">confirmation<\/a> of Justice Neil Gorsuch earlier this year. The Court certainly needs all its strength as it sits down to a <a href=\"http:\/\/www.scotusblog.com\/case-files\/terms\/ot2017\/\">docket<\/a> addressing freedom of religion, the definition of hacking, surveillance, and a litany of other current issues.<br \/>\nOnce case in particular is considered by <a href=\"https:\/\/arstechnica.com\/tech-policy\/2017\/10\/supreme-courts-new-term-surveillance-hacking-sports-betting-and-cake-too\/\">Arstechnica<\/a> to be \u201cperhaps the biggest privacy case to have reached the court in the Digital Age.\u201d The case, <a href=\"http:\/\/www.scotusblog.com\/case-files\/cases\/carpenter-v-united-states-2\/\"><em>Carpenter v. United States<\/em><\/a>, considers whether a seizure and search sans warrant of historical cellphone records that pinpoint the movements and location of the device\u2019s user over 127 days is permitted by the Fourth Amendment.<br \/>\nAs of <a href=\"http:\/\/www.pewinternet.org\/fact-sheet\/mobile\/\">2017<\/a>, roughly three quarters of Americans own a Smartphone, and chances are a large majority of them carry the devices almost all the time. What few owners may realize, however, is that deep within a Smartphone\u2019s many folders (for iPhone: Settings &gt; Privacy &gt; Location Services &gt; System Services &gt; Frequent Locations), there is a map that details all of the plot points the phone has been to, including dates, times, and the number of visits. It is here that any Smartphone owner can be confronted with a detailed account of their every move, likely spanning months or even years.<br \/>\nThis data, which is collected when the phone pings a nearby cell tower, has to date been able to be obtained by United States authorities <a href=\"https:\/\/arstechnica.com\/tech-policy\/2017\/10\/supreme-courts-new-term-surveillance-hacking-sports-betting-and-cake-too\/\">without a warrant<\/a>. Timothy Carpenter, who was one of two men convicted of aiding and abetting a series of robberies, <a href=\"http:\/\/www.scotusblog.com\/wp-content\/uploads\/2016\/10\/16-402-cert-petition.pdf\">contended<\/a> that a warrant for probable cause under the Fourth Amendment was necessary for authorities to obtain his cell-site location data. In a response filed at the end of September, the <a href=\"http:\/\/www.scotusblog.com\/wp-content\/uploads\/2017\/09\/16-402-bs-US.pdf\">government argued<\/a> that individuals have no right to privacy in regards to records created and kept by wireless carriers for business purposes. The government relied on the <a href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2013\/12\/what-you-need-to-know-about-the-third-party-doctrine\/282721\/\">third-party doctrine<\/a>, asserting that the Supreme Court has long held that third-party records containing non-content information about an individual are exempt from the Fourth Amendment\u2019s protections against unreasonable searches and seizures. The third-party doctrine\u2019s primary assertion is that a person has no legitimate expectation of privacy in information he \u201cvoluntarily\u201d turns over to third parties.<br \/>\nGiven the incredible advancements in digital communication and technology, how much should it really matter what the Supreme Court has long held? The <em>Carpenter<\/em> case deals with a level of technology far beyond the standard landline telephone. The third-party doctrine has increasingly waning relevance to modern notions of privacy, and the government\u2019s reliance on it in this case seems tenuous at best. Over a dozen state Supreme Courts have rejected the doctrine, and the U.S. Supreme Court <a href=\"http:\/\/repository.law.umich.edu\/mlr\/vol107\/iss4\/1\/\">has never <em>actually<\/em> articulated<\/a> a direct endorsement of it or a clear argument in its favor. Adhering to any precedent arguably in support of the doctrine becomes increasingly difficult given the doctrine\u2019s <a href=\"https:\/\/fas.org\/sgp\/crs\/misc\/R43586.pdf\">practical implications<\/a> in a modern society that shares virtually all facets of life with various entities. Justice Sonia Sotomayor has even declared that the third-party doctrine is \u201c<a href=\"https:\/\/arstechnica.com\/tech-policy\/2012\/01\/supreme-court-holds-warrantless-gps-tracking-unconstitutional\/\">ill suited to the digital age<\/a>, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks,\u201d rendering certain disclosures more essential than voluntary.<\/p>\n<blockquote><p>Since it is arguably necessary to relinquish a certain amount of personal information in order to participate in society, the forced \u201cvoluntariness\u201d of disclosure to cell phone providers triggers an automatic imposition of the third-party doctrine on almost everyone.<\/p><\/blockquote>\n<p>That is so problematic given the doctrine\u2019s complete lack of regard for degrees of privacy, since the doctrine equates exposure to a limited group with <a href=\"http:\/\/scholarship.law.cornell.edu\/cgi\/viewcontent.cgi?article=1807&amp;context=facpub\">exposure to the world<\/a>.<br \/>\nIn deciding <em>Carpenter v. United States <\/em>during the current term, the Supreme Court should not shackle itself to outdated threads of precedent. A close eye should be kept on the potential for increasing pervasiveness of government monitoring as a result of developing technology. In a world where nearly everyone\u2019s actions, thoughts, and whereabouts are already capable of being contained in a pocket-sized entity, there is no time to shy away from establishing new precedent. The Fourth Amendment must be tailored to the digital age, and that inevitably involves reconsideration of the third-party doctrine and its relevance in today\u2019s digital world.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On October 2, 2017, the Supreme Court of the United States began their 2017-2018 term, once again operating at full capacity with nine justices after the confirmation of Justice Neil Gorsuch earlier this year. The Court certainly needs all its strength as it sits down to a docket addressing freedom of religion, the definition of <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/third-party-doctrine-overstayed-welcome\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":5309,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5308"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=5308"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5308\/revisions"}],"predecessor-version":[{"id":7035,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5308\/revisions\/7035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/5309"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=5308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=5308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=5308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}