The Volokh Conspiracy
Mostly law professors | Sometimes contrarian | Often libertarian | Always independent
An Important Wiretap Act Case Pending in the New Jersey Supreme Court
The law professor hypo come to life.
For decades, a major uncertainty about the scope of the Federal Wiretap Act has been how it applies to the repeated but discrete access that can often occur with electronic communications. Telephone wiretapping occurs in real time; the eavesdropper listens in. But electronic wiretapping can be periodic but discrete. An eavesdropper can access an account discretely but repeatedly over time. The question is, does the Wiretap Act, with its strong privacy protections, still apply?
Here's how I phrased the question in the LaFave Criminal Procedure treatise, for which I have written the electronic surveillance chapter, Chapter 4:
[A]n acquisition occurs under the Wiretap Act only if the collection of the communication is 'in flight' in real-time, during prospective surveillance of an ongoing communication. Exactly what this means can be tricky in cases involving electronic communications, as electronic communications can be stored or transmitted for extremely short periods of time. The basic question is this: If a tool makes copies of a communication shortly after it arrives at its destination, is that acquisition contemporaneous with transmission or is it only after the transmission has been completed? Put another way, can surveillance circumvent the Wiretap Act by acquiring communications immediately after they have arrived at their destination? If an e-mail account is accessed once an hour, is that an intercept? What about one a minute, once a second, or once a milli-second?
2 Wayne LaFave et al, Crim. Proc. § 4.6(b).
I asked the same question in my computer crime law casebook:
[T]he Wiretap Act regulates prospective surveillance and not retrospective surveillance.
At the same time, the line between prospective surveillance and retrospective surveillance can become fuzzy. Imagine a government agent has access to a suspect's e-mail account, and he can click a button and receive an update with all new incoming or outgoing messages. Is the access prospective or retrospective if the government agent clicks the button every hour? Every minute? Every second?
Orin Kerr, Computer Crime Law 667 (5th ed. 2022).
It turns out this hypothetical has turned into a real case, currently pending in the New Jersey Supreme Court, with oral argument scheduled for March 13. The question: Can the government avoid the Wiretap Act by getting access to an account every 15 minutes? New Jersey state prosecutors obtained Communications Data Warrants (CDWs) that required Facebook to hand over the contents of the suspects' accounts every 15 minutes for 30 days. Facebook objected, saying that the orders violate the Wiretap Act.
The lower court opinion held that Facebook was required to comply with the CDWs because compliance was not an "intercept" under the Wiretap Act:
[T]he CDWs did not grant access to the contents of prospective communications on Anthony's and Maurice's Facebook accounts while they were either "en route," or "within the same second," that they were placed on Facebook's servers. Rather, police would not have access until, at earliest, fifteen minutes after any electronic communication's transmission. Though the CDWs compelled Facebook to disclose the entire stored contents of each target's Facebook account for thirty prospective days, that did not make the disclosures contemporaneous with transmission. Luis, 833 F.3d at 627. Rather, once the communications would come to "rest" on Facebook's servers, they would be in "electronic storage," and thereby subject not to the wiretap acts, but to the SCA and the provisions of the NJWESCA that mirror that statute. Ibid.
The court then ruled that Fourth Amendment concerns limited this procedure to 10 days:
In formulating an acceptable constitutional solution to the disclosure of that information, we choose to apply a practical approach to the release of prospective electronically stored communications under a CDW. To remain within the parameters of state warrant procedure, the CDWs can be issued, assuming probable cause is once again established, and served on Facebook requiring that any information identified in the warrant and stored by Facebook during the period up to the day it is served with the warrant must be turned over. In addition, incorporating our state warrant procedures under Rule 3:5-5, going forward, if the State serves a CDW on Facebook for the disclosure of prospective electronic communications, no disclosures may be compelled beyond ten days from the issuance of the warrant. And, Facebook can comply with that requirement by producing the stored information on the day of or after the electronic communications have been stored.
Any further attempt to secure information from prospective time periods must be based upon new CDWs issued on new showings of probable cause. We believe that this practical approach, which modifies the trial courts' dispositions, is consistent with the federal and state constitutions and our warrant procedures, comports with the applicable statutes, and fairly balances the interests of the parties before us.
The New Jersey Supreme Court then accepted review.
I think the lower court Wiretap Act's analysis is wrong, and that the Wiretap Act applies to repeated access every 15 minutes. This is one issue I felt strongly enough about that I included it in the LaFave treatise when I joined it, around 2008 or so. Here's how I recommend answering this issue in the LaFave treatise, with emphasis added:
The caselaw on the question suggests that copying within a short time of receipt counts as contemporaneous and is therefore regulated by the Wiretap Act. [FN28] This answer is consistent with the Fourth Amendment principles that should guide the answer. The Wiretap Act's heightened protections beyond the ordinary Fourth Amendment warrant were inspired by Berger v. New York. Berger indicated that the Fourth Amendment triggers heightened scrutiny when surveillance is undertaken as "a series or a continuous surveillance" rather than as "one limited intrusion."Under Berger, a statute that regulates "a series or a continuous surveillance" must include special privacy protections or risk facial invalidity under the Fourth Amendment. Given the Wiretap Act's close connection to Berger,31 the meaning of "intercept" should mirror the distinction drawn by the Supreme Court in Berger. Acquisition is an intercept when it is part of "a series or a continuous surveillance," such as ongoing prospective surveillance or its functional equivalent. Exact lines will be difficult to draw, but the essential question should be whether the means of monitoring is the functional equivalent of continuous surveillance or whether it is more like a one-time or otherwise limited access to communications.[FN32]
One narrow exception to the requirement of acquisition contemporaneous with transmission involves access to wire communications under the version of the statute in effect from 1986 to 2001. During this period, Congress attempted to protect the privacy of voicemail through the definition of "wire communication" rather than the more sensible protections of 18 U.S.C.A. § 2703. By adding communications in storage to the definition of wire communication, Congress appeared to have wanted to regulate access to stored wire communications under the Wiretap Act.The passage of Section 209 of the USA Patriot Act removed this language from the definition of wire communication, however, such that the concept of "intercept" is now consistent and applies only to access contemporaneous with acquisition.
[FN28: United States v. Szymuszkiewicz, 622 F.3d 701 (7th Cir. 2010) (Easterbrook, J.) (copying within a second counts as "contemporaneous" and therefore regulated by the Wiretap Act); Lazette v. Kulmatycki, 949 F.Supp.2d 748 (N.D.Ohio 2013) (Carr, J.); Luis v. Zang, 833 F.3d 619 (6th Cir. 2016) (claim in pleading that WebWatcher surveillance tool "immediately and instantaneously" copied communications deemed sufficient to satisfy intercept standard). In Boudreau v. Lussier, 901 F.3d 65 (1st Cir. 2018), the First Circuit rejected a "functional approach" to contemporaneity, in which the test would have been if the surveillance occurred using "technology linked to the fleeting moment in which the victim sent the electronic communication." However, Boudreau ultimately leaves unresolved how the First Circuit's understanding of contemporaneity would apply to a software program that took repeated screenshots on the technical ground that, at the summary judgment stage, the plaintiff did not provide expert evidence that was required to explain on how the program worked. The New Jersey Supreme Court also has an important case pending on the meaning of intercept involving review of the Superior Court's decision in Facebook, Inc. v. State, 471 N.J. Super. 430, 273 A.3d 958 (App. Div. 2022).]
[FN32: The Ninth Circuit's decision in Konop v. Hawaiian Airlines, Inc., 302 F.3d 868 (9th Cir.2002) could be read as drawing the line between a communication that is collected "during transmission" versus one that is collected "while it is in electronic storage." Konop, 302 F.3d at 878. To the extent Konop is so read, this line is not exactly correct. The scope of the Wiretap Act should be defined by whether the surveillance is undertaken as "a series or a continuous surveillance" rather than as "one limited intrusion," Berger, 388 U.S. at 57, not whether the communication was moving or at rest at the moment of acquisition. The confusion may result from the Ninth Circuit's conclusion that a communication cannot be both stored (and therefore subject to the Stored Communications Act, 18 U.S.C.A. §§ 2701 to 2722) and yet also subject to interception under the Wiretap Act. However, the two statutes can in some circumstances regulate access and copying of the same communication. The Wiretap Act regulates prospective continuous surveillance of an account that may result in a particular communication being copied, while the Stored Communications Act regulates a single intrusion to access and copy that communication. The peaceful co-existence of the two statutes is aided by 18 U.S.C.A. § 2702(b)(2) of the Stored Communications Act, which explicitly permits a provider to disclose the contents of communications "as otherwise authorized" in Sections 2511(2)(a) or 2517 of the Wiretap Act.]
2 Wayne LaFave et al, Crim. Proc. § 4.6(b).
To really really date myself, this is the same position I took in an amicus brief in the First Circuit's Councilman case in 2004, although the First Circuit didn't reach the issue. Almost twenty years later, the issue is finally teed up in a case that squarely raises the issue. As always, stay tuned.
Full disclose: I once did a short legal project for Facebook, and I have represented a client in a case against Facebook, too.
UPDATE: For past Volokh Conspiracy blog posts on the same legal issue, see my posts from 2004 and 2005 on the First Circuit's Councilman decision collected here, and my 2010 posts on the 7th Circuit's Szymuszkiewicz decision here and here.
Editor's Note: We invite comments and request that they be civil and on-topic. We do not moderate or assume any responsibility for comments, which are owned by the readers who post them. Comments do not represent the views of Reason.com or Reason Foundation. We reserve the right to delete any comment for any reason at any time. Comments may only be edited within 5 minutes of posting. Report abuses.
Please
to post comments
“…Rather, police would not have access until, AT EARLIEST, fifteen minutes after any electronic communication’s transmission….” [emphasis added]
Didn’t this court get it exactly wrong, in a factual sense? If the govt got access to this account every 15 minutes, then it seems logical that the police would not have access until, AT THE LATEST, 15 minutes after the transmission. Or am I missing something?
12:05:00. Cops get the latest update.
12:05:04. New email sent to/from suspects.
12:20:00. Cops get the latest updates, which includes the email–which was sent 14 minutes, 54 seconds before the cops got it.
12:34:54 New email
12:35:00: Cops get the latest update, which includes the email--which had been sent only 6 seconds before the cops got it.
This doesn’t sound, to me, like a small mistake by the court. Saying, “The cops don't get the info until *at least* 15 minutes later.” is very very different from saying, “The cops get the info from just 1 second later to a max of 14 minutes, 59-seconds later.”
I saw that, and wondered if it was just a typo as well. It seems odd to misunderstand the process that thoroughly and still use it as a big part of your argument.
Although the "data at rest" argument made me laugh - I've heard the same sort of weaseling around those definitions for decades dealing with secure transmissions.
12:05:00 Cops get update
12:05:04 Email is sent to suspect
17:05:04 Suspect logs in and receives email.
It was in transit until then — see below.
Keep fighting the good fight, Prof. Kerr.
I think there is another issue here -- while I am not a fan of Farcebook, asking them to provide 96 reports a day for a whole month strikes me as rather burdensome.
My response would be to either (a) come down and tap the line in real time, (b) live with just *one* report per day, or (c) pay for us to hire three new people to provide you this service.
Imagine if they were to make a demand like this for any significant fraction of Farcebook's users -- even Farcebook would be bankrupted attempting to comply, and there has gotta be something, somewhere, about companies being bankrupted by search warrants.
And where is the reasonableness of this? Are the cops even going to read the stuff they are given in the middle of the night (paying the overtime) or are they going to let it keep until morning? What on earth are they going to need to know every 15 minutes?!?
” Put another way, can surveillance circumvent the Wiretap Act by acquiring communications immediately after they have arrived at their destination?”
I think you are making a mistake here — the destination is the recipient’s computer and not Farcebooks. The communication hasn’t actually “arrived” until it physically gets to the computer it is being sent to — and if you remember what email sent via UUCP protocol was (spools of magnetic tape physically driven between venues) you will understand my point.
In fact, *no* electronic communication truly arrives in real time — and never did. There always was a slight delay due to transmission in voice calls and it’s even greater now that VoIP is increasingly being used. Call yourself via two cell phones and you’ll notice a significant delay between what you say and when you hear it coming out of the other phone, and that’s a local call….
I think the best model here is the US Post Office — it’s one thing to seize received mail that is in someone’s desk draw and another thing to seize mail that hasn’t been received yet — but just because it now takes the USPS upwards of a week to deliver a letter across town doesn’t mean that it has been “received” until the recipient actually receives it.
And, I’d argue, one doesn’t actually receive Farcebook mail until it physically reaches the recipient’s computer — arguably not until the recipient opens it — and it doesn’t matter how long it takes for that to happen. "Immediately after they have arrived at their destination" would be immediately after the recipient has received them....
What possesses you to opine on things that you don't have any knowledge or understanding of?
Perhaps the same freedom of speech that members of the academy demand: I have often wondered why professors of law, English, physics, et c. (as well as blog authors and commenters) "opine on things that you don’t have any knowledge or understanding of?"
Can you clarify the conditions which allow one human to speak while requiring another to hold his views to himself? Does it require self-anointing, peer-anointing, self-confidence, your personal permission, or what?
Perhaps it is time to re-read Catullus (#16) -- or at least the beginning and ending lines thereof.
Pēdīcābō ego vōs et irrumābō
Aurēlī pathice et cinaede Fūrī,
quī mē ex versiculīs meīs putāstis
quod sunt molliculī, parum pudīcum.
Nam castum esse decet pium poētam
ipsum, versiculōs nihil necesse est
quī tum dēnique habent salem ac lepōrem
Sī sint molliculī ac parum pudīcī
et quod prūriat incitāre possint
nōn dīcō puerīs sed hīs pilōsīs
quī dūrōs nequeunt movēre lumbōs.
Vōs quod mīlia multa bāsiōrum
lēgistis male mē marem putātis?
Pēdīcābō ego vōs et irrumābō.
I don't believe David Nieporent was suggesting that it should be illegal for Dr. Ed to broadcast his stupidity to the world so aggressively, just asking why he does it.
I also ask you why you think pointing out that vituperative insults were sometimes used in Ancient Rome is going to blow the mind of anyone over the age of about 12.
Well, I'm old enough to have used UUCP, and it isn't a protocol that involved driving tapes around. It started in the era of dial up modems[1], and lasted into the internet days. Arguments of the form 'because factX, therefore conclusionY' are pretty nonsensical when factX is wrong.
[1]in addition to the modems the middle aged used to connect their home computers to AOL, we geezers had our mainframes & minicomputers dial each other up on 110 and 300 baud modems.
A key characteristic UUCP was that it was good for supporting message transmission over only intermittently available connections. That certainly *could* extend to a model where the transmission was made via truck (and certainly there's been a lot of discussion over the years about how much more bandwidth you'd have by, e.g. Fedexing physical media vs. the Internet. I don't think I ever heard of any UUCP nodes actually working this way, though.
Right. I'm not familiar with all the possible UUCP protocols (all those single letters) but the ones I was familiar with didn't involve tape.
Lots of file transfer via tape, of course, just IMHE not using UUCP.
List of UUCP protocols. None of those seem to involve tapes. Maybe you could write a 't' protocol, but it seems kind of silly - to transfer files via tape you don't really need a protocol, you just mount the tape and read the files.
Do you happen to have a legal ruling that a message which hasn’t yet been received by the recipient actually has been received?
And exactly what is “stupid” with my definition of transmission?
You mean, besides the fact that you think electronic messages "physically get to" a computer, or that communications sent via Facebook are sent to a user's computer, rather than to Facebook's server?
Now I'm confused :-).
1)What's the objection to 'physically get to'? Electrons are physical things. If some law says 'blah blah when the message physically arrives at the destination blah blah', why wouldn't that mean when an email arrives at the destination computer, e.g. when the end user's computer downloads it from an IMAP or POP server?
2)A facebook message (or email or tweet) starts on the sender's keyboard and transits a bunch of servers and routers and what not. I don't know facebook's architecture, so let's talk email. It doesn't seem nonsensical to say 'the message is sent to the end users computer', as opposed to 'the message is sent to the end user's IMAP server'.
Or maybe you are distinguishing messages with multiple recipients? An email to a mailing list might be described as being sent to the mail list server instead of the subscriber's IMAP servers, I suppose.
TBH, it seems like that is going to involve some pretty context specific hairsplitting, i.e. what is the destination of an email sent to fred@gmail (using POP), alice@gmail (using IMAP), betty@bettysprivateSMPTserver, and somemaillist@groups.io?
This seems like laws stretched out of their original form, to listen in on conversations, yet to need a warrant to raid data on a computer.
Why not argue transmission over lines from the processor to hard drive, or from one server to its bro 8 inches away? It's all network and wire transmission.
Then you can fight the same fight patent lawyers do.
You raise an interesting point — almost all telephone conversations are now digital and many are stored as part of line diagnostics.
Under the theory being presented here, it would be wiretapping to listen to the voice call in real time, but not to listen to it it 15 minutes later. I consider that a distinction without a difference.
And I'm making a distinction of to the destination IP address, but you have a point about the 4" of wire between the processor & hard drive. And remember that VoIP (eg. Skype) are phone calls on your computer.
If you're confused now, wait until the NJ SC gets through with it.
"You mean, besides the fact that you think electronic messages “physically get to” a computer, or that communications sent via Facebook are sent to a user’s computer, rather than to Facebook’s server?"
Yes, and yes.
With TCP/IP, data (including electronic messages) is broken down into packets, each with a mathematical checksum, and sent (and if corrupted, resent) to the destination where they are reassembled into the data. It is physical digital data -- a circuit that is charged or not, a piece of magnetic media (including old-style floppy & hard drives) that has a magnetic charge or not, a spot on a CD or DVD that is either silver (and can reflect a laser) or black (and can't), or however flash memory works.
It is every bit as real as ink marks on a piece of paper.
It also takes measurable time to travel across the internet -- both because of the speed of light (186,000 miles per second) *and* because all the components of the internet slow it down even more. In fact, when Internet 2 first came out and people into such things were playing with it, they found that because of the time delay to go up to a satellite and come back down again, you had to go at least a thousand miles before you saw any time savings.
We're talking fractions of a second here, but it is real time and is measurable. Messages have to physically get to Farcebook's servers. But this isn't like AOL where you are dialing into their machine -- you have your own IP address and they have to physically send it to your IP address -- and that involves binary digital data transmitted over a wire or fiber to your home. It's real -- a packet sniffer can capture it.
And that's why I argue that the message isn't delivered until it physically gets onto your computer.
" In fact, when Internet 2 first came out and people into such things were playing with it, they found that because of the time delay to go up to a satellite and come back down again, you had to go at least a thousand miles before you saw any time savings."
What does Internet2 have to do with satellite communications?
" But this isn’t like AOL where you are dialing into their machine — you have your own IP address and they have to physically send it to your IP address — and that involves binary digital data transmitted over a wire or fiber to your home."
When you connect to an AOL server - or any other computer - via dialup modem, that also involves 'binary digital data transmitted over a wire or fiber to your home'.
Your posts read like they were generated by an AI program that isn't working quite right.
It takes about 1/4 of a second for a signal to get up to the satellite and back down again, and the point they were making is that Internet2 was so fast that you could go a thousand miles on the ground in less time than that — that the time savings in a satellite hop now only was for distances more than that.
My point is that internet traffic is not instantaneous. It may be fast enough for the human not to be able to notice the delay, but there inherently *is* a delay and it can be measured. (In most cases, it is measured and documented although you may not always see that documentation.)
Now legally -- I don't know the difference between 1/100th of a second, one second, one minute, one hour and one day -- but if it comes down to the binary question of "is there a delay in transmission", the answer is that there inherently is. (In fact, the easiest way to tell that an email message was forged is the lack of delays...)
“When you connect to an AOL server – or any other computer – via dialup modem, that also involves ‘binary digital data transmitted over a wire or fiber to your home’.”
Yes but not exactly — the difference is that when you dialed into AOL, you were logging into the computer located there, and were only a remote terminal of that computer. It’s like the wireless landline phones we had in the ’90s — you could be in the back yard but were still connecting to the phone in your house, and using that phone number.
Having your own IP address is like having your own phone number and thus you now are making a call from your cell phone. Even if you call the landline in your house, you now are making a phone call from one phone number to another over the telephone network.
And like phone numbers, each IP address is unique — worldwide. The only two differences are (a) they are virtually mapped and (b) you have to use the full number (i.e. the country code) all the time.
Without going too deeply into the weeds, nslookup gives us:
Name: facebook.com
Addresses: 31.13.71.36
Again without going too deeply into the weeds (which I undoubtedly will be faulted for) that’s Farcebook’s phone number, and to connect to it your computer uses its phone number to call that phone number. (Sort of....)
That’s the distinction I am making — while in both cases you are receiving digital data, I’m making the distinction of you having a unique IP address instead of being logged into a distant computer.
Ed, I spent decades as a software developer and sysadmin. And I don’t mean I installed new versions of windows on the computer at Joe’s bar and grill; I’m talking the biggest mainframes IBM made early on, and later on computer rooms full of thousands of servers. I was there with a breakout box making RS232 cables to connect to BITNET in the 1980s, and the university I worked at was one of the founders of Internet2 in the 90’s.
I’d thank you for Edsplaining about nslookup and IP addresses, but to engage in some British understatement, those really aren’t news to me.
You are just throwing out gibberish word salad here.
It's not like I'm some great expert here - other people know more than I about all but the .0000001% that I worked on personally. But based on what you write here, you are not one of those people.
It’s really not. When one orders a book from Amazon and the UPS guy brings it, it’s physically delivered to one’s house. When one downloads a Kindle book, nobody would describe that as Amazon “physically delivering” it to one’s house.
As to the rest of your attempt to demonstrate you understand the technology, when I message you on Facebook or Twitter or whatever, I'm not sending anything at all to your IP address.
It really is. While perhaps no one would describe that as Amazon “physically delivering” it to one’s house, anyone who understands the physics of electronic communication would describe it as Amazon “physically delivering” it to one’s Kindle. You understand that Kindle stores the books, in digital format, locally, yes? How do you suppose those books appear on the Kindle?
See, I think most people would describe that as virtually delivering it to one's Kindle.
Netflix has two business models: you can get DVDs in the mail (yes, still!) or you can download/stream. Only one of those is naturally described as physically delivering the movie to someone.
Ok, so you don't get it. The Kindle stores a downloaded book on the local device. There is a physical copy of the book, stored as physical bits in the device's memory. When you stream something off a Netflix server, you don't. Lawyers should stick to legal matters, which hopefully they understand, and stay out of physics or technology, which as you demonstrate, they don't.
How does buffering work?
Isn't it physically stored into RAM and then discarded later?
1) The Kindle stores information, not a book. There is, of course, no "physical copy" at all.
2) When you stream a video, information also gets sent to your device, and stored in memory. That it's not permanently stored there doesn't change that.
David, I'm trying to grasp your physical/virtual distinction.
Suppose I put something - book, picture, whatever - on WORM storage, like a CD-R disc. I have permanently changed the atoms on the CD-R, just like printing ink on paper. Does that meet your definition of making a physical copy?
How about writing the same bits to a CD-RW? I have made physical changes to the atoms of the CD-RW. Those changes are stable, but can be reversed - like an etch-a-sketch or chalkboard, or for that matter taking an erase to pencil marks or solvent to ink. Normal magnetic disk drives work the same way - reversible changes to atoms. For that matter, so does the Kindle's E-Ink display.
Is your position that ink+paper and CD-R's are what you call physical, but CD-RWs, disk drives, SD cards, blackboards, and etch-a-sketches are what you call virtual?
Fundamentally, I'm not grokking what you view as the underlying principle for your physical/virtual distinction. Given some data in on arbitrary media, how do I decide whether you think it is virtual or physical?
The Kindle stores a book, Not a paper and ink book, but a book, nonetheless, with the same content as the paper and ink version. It was not on the Kindle when you bought the Kindle device, and now it is there. How do you suppose it got there?
"I’m not sending anything at all to your IP address."
Then, where are you sending it?
To Facebook's.
And where is Facebook sending it???
It depends?
"Send a message" means different things depending on what tool and protocol is used.
Facebook can send direct messages to other users. These, as you say, are posted to the Facebook servers and retrieved by the other user (from Facebook) whenever.
Facebook also supports at least one instant messaging client that communicates directly peer-to-peer. In that case, messages are sent directly to the other user.
Facebook also allows sending emails, which can be routed god-knows-how-many different ways, some of which are resident on a server (maybe Facebook, maybe not) some of which are removed from any intermediate servers when "delivered" to the client email application.
As with many things about computers, the devil is in the details, and trying to make comparisons to the physical world is difficult.
Suppose I send snail mail to you. As with email or facebook, I'm not putting it directly in your mailbox. I'm dropping it in my mailbox, and the carrier picks it up and takes it to a local post office, which sends it to a regional center, that sends it to another regional center, which sends it to your local post office, where a carrier gets it and stuffs it in your mail box.
I wouldn't characterize that as 'I’m not sending anything at all to your mailbox' merely because it is routed via intermediaries.
If electronic transmissions never get sent to the user’s computer, how do they appear on the user’s screen when the user sees them? it’s not clear this argument is as stupid as has been made out.
Again, if Facebook owns the content, then Facebook receiving the content is the owner receiving the content. But if not, it could at least be argued that the content has to arrive at the recipient in the sense of the recipient viewing it or arriving at tne recipien’ts device. It’s not so clear a Facebook or email account is the equivalent of a PO box at the post office so that delivering to the account completes delivering to the owner. It seems to me that countering the argument needs something better than “that’s stupid.”
Not that Dr. Ed 2 doesn't have a lot of wrong ideas, but certainly the contents of the message must be transmitted from the Facebook server to your computer/phone/etc. in order for you to view it, even if that's just in the form of an app or a web page rendering the message locally.
How about we draw a line here: You want to perform 96 searches a day, then get 96 warrants a day. If you are asking for communications 15 minutes after you just asked for those communications, then you need probable cause that there will, in fact, be new evidence in that time frame.
As far as I can tell, no one is disputing that the warrants were supported by probable cause. Rather, the question is whether they need to satisfy the extra requirements for a wiretap.
Because they were looking at it wrong. I'm sure there was probable cause to believe that they would get *something* in all those days. But was there probable cause to believe at 3:30 AM there would be a communication that was not there at 3:15 AM? I'm thinking no, especially if it was the fifth day and there was a pattern of them logging off at midnight to sleep.
And would the cops have acted on it at 3:30?
And I ask is if it has become a distinction without a difference?
A wiretap once literally was that — tapping into a wire to listen to (or record) a conversation conducted in real time that would otherwise be gone forever and was contrasted against written documents.
It’s now all digital data, which no longer is completely in real time.
Should the distinction still exist?