{"id":5393,"date":"2017-11-01T16:48:26","date_gmt":"2017-11-01T20:48:26","guid":{"rendered":"http:\/\/ncjolt.org\/?p=5393"},"modified":"2020-06-04T20:52:51","modified_gmt":"2020-06-04T20:52:51","slug":"catch-can-not-cloud","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/catch-can-not-cloud\/","title":{"rendered":"Catch Me If You Can, But Not When I am In \u201cThe Cloud\u201d"},"content":{"rendered":"<p>Nearly all Internet users interact with \u201cthe cloud\u201d every day, but most never consider what\u2011or where\u2011<a href=\"https:\/\/www.google.com\/about\/datacenters\/inside\/locations\/index.html\">\u201cthe cloud\u201d is<\/a>. The \u201cwhere\u201d of data is not a straightforward inquiry.<br \/>\nThe Supreme Court has announced that it will hear a major digital privacy case, <a href=\"http:\/\/www.scotusblog.com\/case-files\/cases\/united-states-v-microsoft-corp\/\"><em>United States v. Microsoft Corp.<\/em><\/a>, which will determine whether law enforcement officials can demand user data stored by technology companies in other countries on October 16, 2017.<br \/>\nBack in December of 2013, federal investigators acquired a warrant under the <a href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/18\/2701\">Stored Communications Act<\/a> (SCA) for the content associated with a Microsoft Network (MSN) email address to investigate drug trafficking. Microsoft handed over responsive data stored in the United States. However, Microsoft refused to retrieve the information from the server in Ireland for lack of the jurisdiction of the warrant.<br \/>\nThe lower court denied Microsoft\u2019s motion to quash the warrant. The court argued that letting Microsoft withhold the data stored in Ireland would allow criminals to evade the SCA warrant by forcing the government to rely solely on <a href=\"https:\/\/www.fjc.gov\/sites\/default\/files\/2017\/MLAT-LR-Guide-Funk-FJC-2014.pdf\">Mutual Legal Assistance Treaties<\/a> (MLATs) to obtain information stored abroad. Many countries have no MLAT with the United States.<br \/>\n<a href=\"https:\/\/www.leagle.com\/decision\/infco20160714063\">The case<\/a> was then escalated to the Second Circuit Court of Appeals. The Second Circuit held that the government cannot compel Internet Service Providers (ISPs) to turn over data stored overseas, even with a\u00a0warrant. Judge Lynch concurred and stressed what the case was not about: privacy. According to Judge Lynch, the case boiled down to a dispute over the \u201cinternational reach of American law.\u201d<br \/>\nThe SCA was enacted to extend to electronic records privacy protections analogous to those provided by the <a href=\"https:\/\/www.law.cornell.edu\/constitution\/fourth_amendment\">Fourth Amendment<\/a>. As the term is used in the Constitution, a warrant is traditionally attached to privacy concepts applied within the territory of the United States. <a href=\"https:\/\/www.law.cornell.edu\/rules\/frcrmp\/rule_41\">Federal Rule of Criminal Procedure<\/a> requires that the \u201cwarrant\u201d be obtained \u201cwithin the district\u201d where the property is located. It is worth noting that the SCA was passed as part of the <a href=\"https:\/\/it.ojp.gov\/PrivacyLiberty\/authorities\/statutes\/1285\">Electronic Communications Privacy Act<\/a>, with the word \u201cprivacy\u201d in its very title.<br \/>\nFor parties on both sides of the privacy debate, a Supreme Court ruling on the scope of the SCA warrants could have significant ripple effects, from potentially hindering law enforcement investigation capabilities to calling into question international data transfer treaties and the business value of U.S. tech companies.<br \/>\n<a href=\"http:\/\/www.scotusblog.com\/wp-content\/uploads\/2017\/09\/17-2-cert-rb.pdf\">The Department of Justice argued<\/a> that affirming the Second Circuit ruling would severely limit the ability of law enforcement to conduct criminal investigations on not only foreign suspects, but American ones as well. However, if the Supreme Court permits the production of this data, we will see other nations reciprocating by serving U.S. companies present in their jurisdictions search warrants for the production of data stored in the U.S. And such a move could prove controversial, given that U.S. companies might be inclined to honor warrant types of searches from Russia, China, and others, who may request data on dissidents or other politically sensitive persons.<br \/>\nFor now, Microsoft\u2019s overseas customers can be confident that their data is being protected against unwanted collection by U.S. authorities. But if such confidence is taken away, those consumers might look elsewhere for their tech-related needs. However, Judge Lynch from the Second Circuit doubted the privacy interests would be better protected by the business decision of a private corporation than by the traditional constitutional safeguard of a search warrant.<br \/>\nMany commentators have concluded that the very idea of online being located in a particular physical place is becoming rapidly outdated. In sum, data is what Jennifer Daskal calls \u201c<a href=\"https:\/\/www.yalelawjournal.org\/article\/the-un-territoriality-of-data\">un-territorial<\/a>.\u201d<\/p>\n<blockquote><p>When courts must apply old laws to modern technology, they face a choice: they can treat technology as they would anything else, or they can acknowledge its unique qualities and consider adapting their application of existing laws accordingly.<\/p><\/blockquote>\n<p><em>Microsoft<\/em> is not the first time the Supreme Court has to grapple with legal wrinkle created by new technology. In <a href=\"https:\/\/www.oyez.org\/cases\/1900-1940\/277us438\"><em>Olmstead v. United States<\/em><\/a>, the Supreme Court held that a wiretap did not constitute a search by applying the trespass test under the Fourth Amendment. It was not until <a href=\"https:\/\/www.oyez.org\/cases\/1967\/35\"><em>Katz v. United States<\/em><\/a>, decided nearly forty years later, that the Court created the expectation-of-privacy test appropriate for modern technology.<br \/>\nAlternatively, if Congress thinks the Supreme Court got it wrong, Congress can fix it because it is not a constitutional question, but a question of statutory interpretation. But Congress can be a wild card these days. It is difficult to see Congress agreeing on privacy issues that are so fraught at both ends of the aisle.<br \/>\nIn either scenario, another forty years would be too long to wait.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nearly all Internet users interact with \u201cthe cloud\u201d every day, but most never consider what\u2011or where\u2011\u201cthe cloud\u201d is. The \u201cwhere\u201d of data is not a straightforward inquiry. The Supreme Court has announced that it will hear a major digital privacy case, United States v. Microsoft Corp., which will determine whether law enforcement officials can demand <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/catch-can-not-cloud\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":5394,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5393"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=5393"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5393\/revisions"}],"predecessor-version":[{"id":7008,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5393\/revisions\/7008"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/5394"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=5393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=5393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=5393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}