Mosaic theory of the Fourth Amendment

Last updated
A mosaic, the artistic medium after which the doctrine is named Mosaic with mask of Silenus.jpg
A mosaic, the artistic medium after which the doctrine is named

The mosaic theory is a legal doctrine in American courts for considering issues of information collection, government transparency, and search and seizure, especially in cases involving invasive or large-scale data collection by government entities. The theory takes its name from mosaic tile art: while an entire picture can be seen from a mosaic's tiles at a distance, no clear picture emerges from viewing a single tile in isolation. The mosaic theory calls for a cumulative understanding of data collection by law enforcement and analyzes searches "as a collective sequence of steps rather than individual steps." [1]

Contents

Although the doctrine was first used in cases about national security, five justices of the US Supreme Court authored concurring opinions supporting a new Fourth Amendment framework for judging whether or not an individual has been subjected to an unlawful search, in United States v. Jones . Under this framework, the US government's actions should be considered collectively rather than independently for determining whether or not the acts constitute a search under the Fourth Amendment. It requires that police action is considered "over time as a collective 'mosaic' of surveillance," [1] and allows that cumulative mosaic to qualify as a protected Fourth Amendment search, even if the individual steps that contribute to the full picture do not reach that constitutional threshold in isolation. [2] [3] [4]

Critics of the Fourth Amendment use of mosaic theory argue that it is difficult to administer and inconsistent with other Fourth Amendment jurisprudence. Proponents, on the other hand, argue that mosaic theory is a much-needed development in light of new technologies that allow law enforcement officers to collect large volumes of personal data with little effort. Human rights workers and legal scholars have been critical of how mosaic theory in national security cases undermines civil rights. [5] [6] They argue that when government agencies claim that any scrap of information is part of a larger intelligence mosaic, those agencies get free rein to determine what of their work will be kept secret. [7] This method is used by American intelligence analysts. [8] [5] [9]

History

National security origins

Mosaic theory first emerged as justification for US government agencies' denial of Freedom of Information Act (FOIA) requests for records, as "apparently harmless pieces of information that when assembled together could reveal a damaging picture." [10] :630 Its first uses were in that national security context. [10]

In United States v. Marchetti, 466 F.2d 1309, 1318 (4th Cir. 1972), the court enjoined a former Central Intelligence Agency (CIA) employee from publishing an exposé that covered their time working at the agency. [10] [11] In so doing, the court stated, "the significance of one item of information may frequently depend on the knowledge of many other items of information. What may seem trivial to the uninformed, may appear of great moment to one who has a broad view of the scene and may put the questioned item of information in its proper context." [11]

The courts went on to solidify mosaic theory in the Halkin v. Helms and Halperin v. CIA cases, in the 1970s. [10] :639 Since the Marchetti decision, mosaic theory remained an enduring concept in national security law. [12] [10] Even then, judicial understanding of when it was appropriate to heed a "mosaic" argument was unspecified. Without those guidelines, courts displayed "heightened deference" to government cases employing the theory and allowed government agencies to define both whether requested information could constitute a national security risk and whether the mosaic theory applied to a case. [10] :634

Unlike other Presidents, who held that documents should be considered for release based on their content alone, not their relationship to other sources of information, mosaic theory was supported by US President Ronald Reagan. Out of fear of Russian intelligence gathering in the Cold War, he defined the use of the mosaic theory in the executive branch to obstruct the release of records under Executive Order 12,356 in 1982. [10] :641

The first Supreme Court ruling on mosaic theory occurred in CIA vs. Sims in 1985. The court denied the plaintiff's request for FOIA records, stating that the CIA was best able to judge the national security risk of releasing the requested documents. [10] :643 With that ruling, mosaic theory became an established, precedented legal doctrine that gave intelligence agencies like the CIA "carte blanche" to deny FOIA requests. [10] :643

Expanded use after 9/11

Mosaic theory, as a legal doctrine, remained mostly out public view until the September 11 attacks in 2001. In cases like Center for National Security Studies v. U.S. Department of Justice, Bush administration officials cited the mosaic theory before the D.C. Circuit court to argue for the blanket denial of FOIA requests in the interest of US national security. [10] :631 Mosaic theory, as it pertains to national defense, was further codified in "32 CFR §701.31 – Mosaic or compilation response," [13] and President Bush expanded mosaic theory in the name of national security through an executive order. [10] :647 These changes all came alongside increased US government secrecy, as agencies took down, redacted, and hid public documentation. In this new environment, many courts, particularly the Third Circuit, either delegated or completely abdicated their responsibility for interpreting mosaic arguments. [10] :653

In CIA black sites and the US military's interrogation centers at Guantanamo, Bagram Theater Internment Facility, and Kandahar detention facility, captives not suspected of involvement with terrorism were held and interrogated, and their imprisonment was justified with a mosaic argument. [5] [6] [7] US analysts believed that interrogation of these individuals, en masse, would allow them to fill in the intelligence "mosaic" and learn about actual terrorists. In one case where the mosaic theory was used against intelligence agents, US officials called for recently returned Canadian Abdullah Khadr's extradition to the US to face charges related to terrorism in December 2005. [14] Canada's Attorney General successfully advanced claims that details of Khadr's capture and imprisonment could not be made public without endangering US national security.

Fourth Amendment interpretation

A GPS logger: its measurements can constitute a Fourth Amendment search according to the mosaic theory. GPS logger Holux M-1000C.jpg
A GPS logger: its measurements can constitute a Fourth Amendment search according to the mosaic theory.

Mosaic theory further developed in response to the drastic expansion of police surveillance in public spaces, enabled by new technologies. [2] [4] This version of the theory asserts that the comprehensive collection of discrete data over time, if analyzed in the aggregate, exposes information about the lives, habits, and relationships of those surveilled that would have previously been impossible to gather and evaluate. [2] [15] [16] [17] As the US Supreme Court later articulated in Carpenter v. United States , the judiciary is "obligated, as subtler and more far-reaching means of invading privacy have become available to the government, to ensure that the progress of science does not erode Fourth Amendment protections." [18]

The D.C. Circuit court was the first to apply mosaic theory to a Fourth Amendment issue in United States v. Maynard, a case involving GPS surveillance of a car over a period of twenty-eight days. [1] [17] To answer this question, the court applied the test developed by Justice Harlan in Katz v. United States . [19] Under the Katz test, courts consider "whether the individual has an expectation of privacy that society is prepared to recognize as reasonable," [20] with the reasonableness of the expectation of privacy dependent in large part on whether or not the information was "expose[d] to the public." [21] [1] :316

The court looked to mosaic theory in national security cases, used in that context to justify the withholding of information requested under the Freedom of Information Act on the grounds that aggregated data might allow an observer to piece together secret information like the identity of an intelligence source. [22] The Maynard court assessed the four-week period of surveillance as a whole, noting that the surveillance "illustrate[d] how the sequence of a person’s movements may reveal more than the individual movements of which it is composed." [23]

The D.C. Circuit ultimately held that the warrantless use of GPS surveillance over a 28-day period was an illegal search under the Fourth Amendment, in large part because the data captured by the GPS over that period had not been exposed to the public and because the respondent in Maynard had a reasonable expectation of privacy. [24] [1] [17] The D.C. Circuit then reversed the conviction of one of the two respondents because the conviction rested on evidence that had been obtained through the unlawful search. [25]

The Supreme Court of the United States upheld the D.C. Circuit’s reversal in United States v. Jones , which also dealt with extended GPS location surveillance of the defendant’s vehicle. [26] While not making explicit reference to mosaic theory, Justice Alito’s concurring opinion, joined by three other justices, and Justice Sotomayor’s concurring opinion are both understood to offer strong defenses of the mosaic theory developed by the D.C. Circuit in Maynard. [27] [28] Justice Alito argued that courts should consider mosaic theory when applying the Katz test, looking to the length of time of the surveillance when deciding whether it constitutes a search under the Fourth Amendment, without setting an exact, appropriate time limit for warrantless surveillance. [29] Justice Sotomayor offered a different formulation of mosaic theory, one in which courts should instead consider the quantity and quality of the data obtained through surveillance when determining whether it constitutes a search. [30] Justice Sotomayor expressed concern over the constitutionality of the generation of a comprehensive and detailed record of a defendant’s public movements, regardless of whether that record was developed in the long or short term. [1] [2] [15]

As a result of these cases, singular US law enforcement acts that are not "searches" in the traditional sense can be deemed a "search" when aggregated. [1] [12] [17]

Other cases

Riley v. California

Although mosaic theory was not identified by name in Riley v. California , some argue that the theory underpinned the majority’s holding that warrantless searches of cell phones are not permitted under the Fourth Amendment. [30] The majority cited Justice Sotomayor’s concurrence in Jones to support the idea that the information carried on a device like a cell phone is both quantitatively and qualitatively different from that which can be obtained through other searches. [30] For Chief Justice Roberts, the author of the majority opinion, access to the aggregation of personal information found on a cell phone could allow the government to gain a revealing picture of a person’s life. [30]

Carpenter v. United States

Some also argue that mosaic theory also underpinned the Court’s reasoning in Carpenter v. United States . [31] In Carpenter, the Court held that the acquisition of cell site location information (CSLI), information that could be used to determine the approximate location of a cell phone at a given time, [32] from a wireless carrier was a search under the Fourth Amendment. [33] [34]

Ordinarily, the third-party doctrine would allow the government to obtain information that a person voluntarily turns over to an entity like a bank or telephone company. [35] Such information, for example the deposit slips a customer provides to a bank, can be obtained directly from the third-party without constituting a search under the Fourth Amendment. [35] Unlike other information obtained from third parties, in Carpenter v. United States, the CSLI was protected by the Fourth Amendment because it could be used to create a "detailed chronicle of a person’s physical presence" that "implicate[d] privacy concerns far beyond those considered" by the Court in other third-party cases. [36] The Court’s focus on the depth, breadth, and comprehensive scope of the CSLI is seen as an endorsement of the mosaic theory. [31]

Lower court cases

In the wake of Jones and Carpenter, lower courts have engaged with arguments rooted in mosaic theory. For example:

Criticism

National security

Legal scholar David Pozen, writing in 2005, argued that the lenient interpretation that courts have given to government mosaic arguments is an abdication of judicial judgement. As a result, "In over thirty years of the theory's existence, only one FOIA court on record has rejected a government agency's mosaic defense. In theory, highly speculative mosaic claims are unfalsifiable; in practice, they have proven unimpeachable." [10] :679

Monica Eppinger noted, in intelligence gathering, mosaic theory arguments could allow an individual to be held and interrogated indefinitely, even if they were not a suspect:

With this "mosaic theory" of intelligence, where the goal of those conducting the inquiry and investigation is to amass enough small bits of information to piece together a broader picture of the threats ahead or the perpetrators behind, a detainee might not even be aware that he or she knows something useful, or know what to divulge were he or she inclined to facilitate the process. This departs from both the "grand criminal" (or war criminal) model and the high-value detainee model. Under the logic of this process, a "useful" detainee, i.e., one with information within the scope of relevance, may be held for questioning, even if not a criminal suspect, and, under a standard of a wide scope of relevance, the greater the number of detainees, the more sources of mosaic bits, and the more full the picture composed. [48]

Eppinger pointed out the human rights violations this caused. If individuals being held for interrogation were actual suspects, they would receive due process—a right those held under the mosaic theory were denied. [49] [50]

Fourth Amendment

One criticism of mosaic theory is that it creates a significant "line drawing" problem: it is difficult to determine just how much data needs to be gathered before actions by law enforcement officers become a search. [51] Another criticism is that mosaic theory is inconsistent with other Fourth Amendment doctrines under which data gathered through public observation or by receipt from third-parties is not the product of a search. [52] Under current law observations made through the police’s visual surveillance would not implicate the Fourth Amendment, but the same data might if gathered by a GPS device. [53] Others have argued that application of mosaic theory will "unjustifiably expand or contract the Fourth Amendment’s protections." [54]

Proponents of mosaic theory argue that current Fourth Amendment doctrine used to assess whether or not government action constitutes a search "potentially undervalue[s] privacy rights." [55] The "large-scale and long term aggregations of data" at issue in cases like Carpenter merit protection under the Fourth Amendment because they are fundamentally different from that which might be gathered in "single event" or "small-scale" acts of surveillance. [56] Supporters also argue that new technologies employed by law enforcement officers alter the "balance between the State and its citizens" making it much easier for the government to collect large amounts of data, often in ways "so pervasive that no citizen can realistically be aware of what data about him is being collected." [57]

See also

Related Research Articles

<span class="mw-page-title-main">Fourth Amendment to the United States Constitution</span> 1791 amendment prohibiting unreasonable searches and seizures

The Fourth Amendment to the United States Constitution is part of the Bill of Rights. It prohibits unreasonable searches and seizures and sets requirements for issuing warrants: warrants must be issued by a judge or magistrate, justified by probable cause, supported by oath or affirmation, and must particularly describe the place to be searched and the persons or things to be seized.

Katz v. United States, 389 U.S. 347 (1967), was a landmark decision of the U.S. Supreme Court in which the Court redefined what constitutes a "search" or "seizure" with regard to the protections of the Fourth Amendment to the U.S. Constitution. The ruling expanded the Fourth Amendment's protections from an individual's "persons, houses, papers, and effects", as specified in the Constitution's text, to include any areas where a person has a "reasonable expectation of privacy". The reasonable expectation of privacy standard, now known as the Katz test, was formulated in a concurring opinion by Justice John Marshall Harlan II.

Florida v. Riley, 488 U.S. 445 (1989), was a United States Supreme Court decision which held that police officials do not need a warrant to observe an individual's property from public airspace.

Olmstead v. United States, 277 U.S. 438 (1928), was a decision of the Supreme Court of the United States, on the matter of whether wiretapping of private telephone conversations, conducted by federal agents without a search warrant with recordings subsequently used as evidence, constituted a violation of the target’s rights under the Fourth and Fifth Amendments. In a 5–4 decision, the Court held that the Constitutional rights of a wiretapping target have not been violated. This decision was overturned by Katz v. United States in 1967.

Kyllo v. United States, 533 U.S. 27 (2001), was a decision by the Supreme Court of the United States in which the court ruled that the use of thermal imaging devices to monitor heat radiation in or around a person's home, even if conducted from a public vantage point, is unconstitutional without a search warrant. In its majority opinion, the court held that thermal imaging constitutes a "search" under the Fourth Amendment, as the police were using devices to "explore details of the home that would previously have been unknowable without physical intrusion." The ruling has been noted for refining the reasonable expectation of privacy doctrine in light of new surveillance technologies, and when those are used in areas that are accessible to the public.

In United States constitutional law, expectation of privacy is a legal test which is crucial in defining the scope of the applicability of the privacy protections of the Fourth Amendment to the U.S. Constitution. It is related to, but is not the same as, a right to privacy, a much broader concept which is found in many legal systems. Overall, expectations of privacy can be subjective or objective.

Smith v. Maryland, 442 U.S. 735 (1979), was a Supreme Court case holding that the installation and use of a pen register by the police to obtain information on a suspect's telephone calls was not a "search" within the meaning of the Fourth Amendment to the United States Constitution, and hence no search warrant was required. In the majority opinion, Justice Harry Blackmun rejected the idea that the installation and use of a pen register constitutes a violation of the suspect's reasonable expectation of privacy since the telephone numbers would be available to and recorded by the phone company anyway.

Inevitable discovery is a doctrine in United States criminal procedure that permits admission of evidence that was obtained through illegal means if it would "inevitably" have been obtained regardless of the illegality. It is one of several exceptions to the exclusionary rule, or the related fruit-of-the-poisonous tree doctrine, which prevent evidence collected in violation of a defendant's constitutional rights from being admitted in court.

United States v. White, 401 U.S. 745 (1971), was a United States Supreme Court decision which held that recording conversations using concealed radio transmitters worn by informants does not violate the Fourth Amendment protection against unreasonable searches and seizures, and thus does not require a warrant.

United States v. Knotts, 460 U.S. 276 (1983), was a United States Supreme Court case regarding the use of an electronic surveillance device. The defendants argued that the use of this device was a Fourth Amendment violation. The device in question was described as a beeper that could only be tracked from a short distance. During a single trip, officers followed a car containing the beeper, relying on beeper signal to determine the car's final destination. The Court unanimously held that since the use of such a device did not violate a legitimate expectation of privacy there was no search and seizure and thus the use was allowed without a warrant. It reasoned that a person traveling in public has no expectation of privacy in one's movements. Since there was no search and seizure there was not a Fourth Amendment violation.

United States v. Jones, 565 U.S. 400 (2012), was a landmark United States Supreme Court case in which the court held that installing a Global Positioning System (GPS) tracking device on a vehicle and using the device to monitor the vehicle's movements constitutes a search under the Fourth Amendment.

<i>Jewel v. National Security Agency</i>

Jewel v. National Security Agency, 673 F.3d 902, was a class action lawsuit argued before the District Court for the Northern District of California and the Court of Appeals for the Ninth Circuit, filed by Electronic Frontier Foundation (EFF) on behalf of American citizens who believed that they had been surveilled by the National Security Agency (NSA) without a warrant. The EFF alleged that the NSA's surveillance program was an "illegal and unconstitutional program of dragnet communications surveillance" and claimed violations of the Fourth Amendment.

<i>United States v. Graham</i>

United States v. Graham, 846 F. Supp. 2d 384, was a Maryland District Court case in which the Court held that historical cell site location data is not protected by the Fourth Amendment. Reacting to the precedent established by the recent Supreme Court case United States v. Jones in conjunction with the application of the third party doctrine, Judge Richard D. Bennett found that "information voluntarily disclosed to a third party ceases to enjoy Fourth Amendment protection" because that information no longer belongs to the consumer, but rather to the telecommunications company that handles the transmissions records. The historical cell site location data is then not subject to the privacy protections afforded by the Fourth Amendment standard of probable cause, but rather to the Stored Communications Act, which governs the voluntary or compelled disclosure of stored electronic communications records.

<i>Florida v. Jardines</i> 2013 United States Supreme Court case

Florida v. Jardines, 569 U.S. 1 (2013), was a United States Supreme Court case which resulted in the decision that police use of a trained detection dog to sniff for narcotics on the front porch of a private home is a "search" within the meaning of the Fourth Amendment to the United States Constitution, and therefore, without consent, requires both probable cause and a search warrant.

<i>American Civil Liberties Union v. Clapper</i> American federal court case

American Civil Liberties Union v. Clapper, 785 F.3d 787, was a lawsuit by the American Civil Liberties Union (ACLU) and its affiliate, the New York Civil Liberties Union, against the United States federal government as represented by then-Director of National Intelligence James Clapper. The ACLU challenged the legality and constitutionality of the National Security Agency's (NSA) bulk phone metadata collection program.

<i>In re Application of the United States for Historical Cell Site Data</i>

In re Application of the United States for Historical Cell Site Data, 724 F.3d 600, was a case in which the United States Court of Appeals for the Fifth Circuit held that the government can access cell site records without a warrant. Specifically, the court held that court orders under the Stored Communications Act compelling cell phone providers to disclose historical cell site information are not per se unconstitutional.

Carpenter v. United States, 585 U.S. ___, 138 S.Ct. 2206 (2018), is a landmark United States Supreme Court case concerning the privacy of historical cell site location information (CSLI). The Court held that the government violates the Fourth Amendment to the United States Constitution when it accesses historical CSLI records containing the physical locations of cellphones without a search warrant.

Privacy and the United States government consists of enacted legislation, funding of regulatory agencies, enforcement of court precedents, creation of congressional committees, evaluation of judicial decisions, and implementation of executive orders in response to major court cases and technological change. Because the United States government is composed of three distinct branches governed by both the separation of powers and checks and balances, the change in privacy practice can be separated relative to the actions performed by the three branches.

Digital Search and Seizure refers to the ability of the United States Government to obtain and read an individual's private digital correspondence and material under The Fourth Amendment of the United States Constitution.

<span class="mw-page-title-main">Aerial surveillance doctrine</span>

The aerial surveillance doctrine is the legal doctrine in the United States of America that under the Fourth Amendment, aerial surveillance of an individual’s property does not inherently constitute a search for which law enforcement must obtain a warrant. Courts have used several factors–sometimes only one or a few, other times many or all of them–to determine whether the surveillance in question is a search in violation of one’s constitutional rights: the object of the surveillance, the technology employed, the duration of the surveillance, scope of aggregated information, and the vantage point from which the surveillance is conducted.

References

  1. 1 2 3 4 5 6 7 Kerr, Orin (2012). "The Mosaic Theory of the Fourth Amendment". Michigan Law Review. 111: 311–354.
  2. 1 2 3 4 Bellovin, Hutchins, Jebara, Zimmeck (2014). "When Enough is Enough: Location Tracking, Mosaic Theory, and Machine Learning". New York University Journal of Law & Liberty. 8: 555–628 via SquareSpace.com.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  3. Bennardo, Christian (2017). "The Fourth Amendment, CSLI Tracking, and the Mosaic Theory". Fordham Law Review. 85: 2385–2416.
  4. 1 2 "Commonwealth v. McCarthy". Justia US Law. 2020. Retrieved May 31, 2020.
  5. 1 2 3 Michael P. Goodwin (Winter 2010). "A National Security Puzzle: Mosaic Theory and the First Amendment Right of Access in the Federal Courts" (PDF). Hastings Communications and Entertainment Law Journal. Archived (PDF) from the original on 2012-07-03. Retrieved 2012-04-07.
  6. 1 2 "Guantánamo: An Oral History". Vanity Fair magazine. January 2012. Archived from the original on 2012-01-12. Retrieved 2012-04-07.
  7. 1 2 Andy Worthington (2009-03-14). "Judge Gladys Kessler Releases Yemeni Detainee, Slams "Mosaic" Of Guantanamo Intelligence And Unreliable Witnesses". Huffington Post. Archived from the original on 2016-03-04. Retrieved 2012-04-07.
  8. Tom Lasseter; Carol Rosenberg (2011-04-25). "Guantanamo prisoner threat assessments shaped by a few, often-questionable informants: Analysis". Cleveland Plain Dealer. Archived from the original on 2018-02-11. Retrieved 2012-04-07.
  9. Benjamin Wittes (May 2011). "The Emerging Law of Detention 2.0: The Guantánamo Habeas Cases as Lawmaking -- Chapter 8 – Mosaic Theory, Conditional Probability, and the Totality of the Evidence" (PDF). Brookings Institution. Archived from the original (PDF) on 2016-07-17. Retrieved 2012-04-07.
  10. 1 2 3 4 5 6 7 8 9 10 11 12 13 Pozen, David (2005). "The Mosaic Theory, National Security, and the Freedom of Information Act" (PDF). The Yale Law Journal. 115: 628–679.
  11. 1 2 "United States v. Marchetti". CaseText: Smarter Legal Research. Sep 11, 1972. Retrieved May 31, 2020.
  12. 1 2 Ostrander, Benjamin (2011). "The "Mosaic Theory" and Fourth Amendment Law" (PDF). Notre Dame Law Review. 86: 1733–1766.
  13. "32 CFR 701.31 - Mosaic or compilation response". GovInfo.gov. July 1, 2005. Retrieved May 31, 2020.
  14. Gus Van Harten (2009). "Weaknesses of Adjudication in the Face of Secret Evidence". International Journal of Evidence and Proof . Vol. 13, no. 1. pp. 23–24. Retrieved 2021-02-28.
  15. 1 2 Schlabach, Gabriel (2015). "Privacy in the Cloud: The Mosaic Theory and the Stored Communications Act" (PDF). Stanford Law Review. 67: 678–716.
  16. Bedi, Monu (2014). "Social Networks, Government Surveillance, and the Fourth Amendment Mosaic Theory" (PDF). Boston University Law Review. 94: 1809–1880.
  17. 1 2 3 4 "U.S. v. Maynard". CaseText: Smarter Legal Research. 2009. Retrieved May 31, 2020.
  18. "Carpenter v. United States". CaseText: Smarter Legal Research. 2018. Retrieved May 31, 2020.
  19. Maynard, 615 F.3d at 555 (citing Katz v. United States, 389 U.S. 347, 360-61 (1967) (Harlan, J., concurring)).
  20. Maynard, 615 F.3d at 558 (quoting Kyllo v. United States, 533 U.S. 27, 34 (2001)).
  21. Maynard, 615 F.3d at 558 (quoting Katz, 389 U.S. at 351 (majority opinion)).
  22. Maynard, 615 F.3d at 562 (citing CIA v. Sims, 471 U.S. 159, 178 (1985)).
  23. Maynard, 615 F.3d at 562 n.*.
  24. Maynard, 615 F.3d at 558-64.
  25. Maynard, 615 F.3d at 566-68.
  26. United States v. Jones, 565 U.S. 400, 404-05 (2012).
  27. Gray, David; Citron, Danielle Keats (2013). "A Shattered Looking Glass: The Pitfalls and Potential of the Mosaic Theory of Fourth Amendment Privacy". North Carolina Journal of Law & Technology. 14: 395–97.
  28. Schlabach, Gabriel R. (2015). "Privacy in the Cloud: The Mosaic Theory and the Stored Communications Act" (PDF). Stanford Law Review. 67: 682–86.
  29. Schlabach, supra note 13, at 684.
  30. 1 2 3 4 Schlabach, supra note 13, at 685.
  31. 1 2 Ohm, Paul S. (2019). "The Many Revolutions of Carpenter" (PDF). Harvard Journal of Law & Technology. 32: 372–73.
  32. Carpenter v. United States, 138 S. Ct. 2206, 2208 (2018).
  33. Carpenter, 138 S. Ct. at 2223.
  34. Liptak, Adam (22 June 2018). "In Ruling on Cellphone Location Data, Supreme Court Makes Statement on Digital Privacy". The New York Times. Retrieved 21 March 2021.
  35. 1 2 Carpenter, 138 S. Ct. at 2216.
  36. Carpenter, 138 S. Ct. at 2220.
  37. United States v. Kubasiak, No. 18-cr-120-pp, 2018 WL 4846761, at *1 (E.D. Wis. Oct. 5, 2018)
  38. Kubasiak, No. 18-cr-120-pp, 2018 WL 4846761, at *5.
  39. Kubasiak, No. 18-cr-120-pp, 2018 WL 4846761, at *7.
  40. United States v. Moore-Bush, 381 F. Supp. 3d 139, 141 (D. Mass. 2019).
  41. Moore-Bush, 381 F. Supp. 3d at 147.
  42. 1 2 Moore-Bush, 381 F. Supp. 3d at 150.
  43. United States v. Shipton, No. 18-CR-0202, 2019 WL 5305573, at *1 (D. Minn. Oct. 21, 2019).
  44. United States v. Shipton, No. 18-CR-0202, 2019 WL 5330928, at *15 (D. Minn. Sept. 11, 2019).
  45. Shipton, No. 18-CR-0202, 2019 WL 5330928, at *15.
  46. Shipton, No. 18-CR-0202, 2019 WL 5305573, at *1(agreeing with the magistrate judge’s analysis and adopting her magistrate’s report and recommendations).
  47. Shipton No. 18-CR-0202, 2019 WL 5330928, at *16.
  48. Monica Eppinger (2013). "Reality Check: Detention in the War on Terror" (PDF). Catholic University Law Review . Vol. 62, no. 2. pp. 358, 360, 367, 368. Archived (PDF) from the original on 2021-02-28. Retrieved 2021-02-28.
  49. D. A. Jeremy Telman (2012). "Intolerable Abuses: Rendition for Torture and the State Secrets Privilege". Alabama Law Review . Vol. 63, no. 3. Retrieved 2021-02-28.
  50. Seth F. Kreimer (2007-12-05). "Rays of Sunlight in a Shadow "War": FOIA, the Abuses of AntiTerrorism, and the Strategy of Transparency". Faculty Scholarship at Penn Law . p. 1155. Archived from the original on 2020-01-08. Retrieved 2021-02-28.
  51. Gray, David; Citron, Danielle (2013). "The Right to Quantitative Privacy". Minnesota Law Review. 98: 71.
  52. Gray & Keats, supra note 12, at 402.
  53. Gray & Keats, supra note 12, at 403-04.
  54. Slobogin, Christopher (2015). "A Defense of Privacy as the Central Value Protected by the Fourth Amendment's Prohibition on Unreasonable Searches" (PDF). Texas Tech Law Review. 48: 160.
  55. Bellovin, Steven M.; Hutchins, Renée M.; Jebara, Tony; Zimmeck, Sebastian (2014). "When Enough is Enough: Location Tracking, Mosaic Theory, and Machine Learning" (PDF). New York University Journal of Law & Liberty. 8: 556.
  56. Rosenzweig, Paul (2017-11-29). "In Defense of the Mosaic Theory". Lawfare. Retrieved 2020-03-28.
  57. Rosenzweig, supra note 42.

Further reading