United States v. Warshak

Last updated

United States v. Warshak
US-CourtOfAppeals-6thCircuit-Seal.png
CourtUnited States Court of Appeals for the Sixth Circuit
Full case name'United States v. Steven Warshak et al.'
ArguedJune 16 2010
DecidedDecember 14 2010
Citation631 F.3d 266; 2010 WL 5071766; 2010 U.S. App. LEXIS 25415;
Holding
Government agents violated the defendant's Fourth Amendment rights when they compelled his ISP to produce the content of his emails without first obtaining a warrant based on probable cause.
Court membership
Judges sitting Damon Keith, Danny Boggs, and David McKeague
Case opinions
MajorityBoggs, joined by McKeague
ConcurrenceKeith
Laws applied
Fourth Amendment to the United States Constitution, Stored Communications Act 18 U.S.C.   § 2701 et seq.

United States v. Warshak, 631 F.3d 266 (6th Cir. 2010) is a criminal case decided by the United States Court of Appeals for the Sixth Circuit holding that government agents violated the defendant's Fourth Amendment rights by compelling his Internet service provider (ISP) to turn over his emails without first obtaining a search warrant based on probable cause. However, constitutional violation notwithstanding, the evidence obtained with these emails was admissible at trial because the government agents relied in good faith on the Stored Communications Act (SCA). The court further declared that the SCA is unconstitutional to the extent that it allows the government to obtain emails without a warrant. [1]

Contents

This case is notable because it is the first case from the United States Circuit Court of Appeals to explicitly hold that there is a reasonable expectation of privacy in the content of e-mails stored on third party servers and that the content of these emails is subject to Fourth Amendment protection. [1]

Background

Facts

Steven Warshak owned and operated Berkeley Premium Nutraceuticals, Inc. (Berkeley) which sold, among other products, an herbal supplement marketed as a pill for natural male enhancement, called Enzyte. [2] His mother, Harriet Warshak, worked at Berkeley with him in the credit card department. [1]

In 2001, Berkeley launched Enzyte and by 2004, Berkeley's annual sales approached $250 million, in large part due to the success of Enzyte. Enzyte was marketed extensively, and approximately 98% of the advertising was done on television featuring a character known as "Smilin' Bob." [1] [2] In some advertisements, Berkeley presented false information. Phony surveys were presented as fact at Warshak's request, the customer satisfaction rating of 96% was fabricated according to Warshak's request, and even the medical professionals who Berkeley claimed developed Enzyte were fictitious. [1] [3]

Sales of Berkeley's products occurred via telephone, email, and the Internet. Over the phone, Berkeley's sales force followed a script approved by Warshak designed to try to slip pertinent information past the customer. In the script, customers signing-up for a free trial were informed that they were being enrolled in an "auto-ship" program which would charge their credit card at the end of the first prescription period and send them a refill for their current prescription. To end this auto-shipping, customers had to opt out of the program. This program led to a large number of consumer complaints filed against Berkeley. [1]

The auto-ship program and customers' dislike for this practice resulted in many orders being canceled. The canceled orders hurt Berkeley's reputation among banks and credit card companies who became reluctant to extend credit to Berkeley. To combat this, Warshak invented various ways of reducing the apparent percentage of refunded charges through questionable tactics. One tactic was to charge the customer's account multiple times for the same purchase, once for the purchase of the supplement and another time for shipping. Warshak referred to this as "double dinging". Later, he instituted the practice of "triple dinging" as well. Additionally, to secure other lines of credit, Warshak, along with his mother Harriet, provided false information to banks. [1]

Much of the information about Warshak's questionable activities was contained in his email correspondence. In conjunction with a criminal investigation of Warshak and his questionable business practices, the government seized roughly 27,000 private emails from Warshak's ISP. [1]

Procedural history

On June 12, 2006, Warshak filed a claim against the United States seeking a declaratory judgment and injunctive relief. Warshak claimed that the compelled disclosure violated his Fourth Amendment rights. The district court filed a preliminary injunction which was affirmed by the Sixth Circuit, finding that Warshak had a privacy interest in the content of his emails. [4] However, that decision was reviewed by an en banc panel of the Sixth Circuit and vacated on ripeness grounds. [5]

In September 2006, a grand jury in Ohio returned an indictment with more than 100 counts charging Warshak and his mother with various crimes including conspiracy to commit mail, wire, and bank fraud, mail fraud, bank fraud, and money laundering. [6] Warshak moved before trial to exclude emails obtained from his ISP; which the court denied. [1]

In January 2008, the case went to trial. Six weeks later Warshak and his mother were convicted of a majority of the charges. Shortly thereafter, a jury found that certain assets were sufficiently related to the crimes such that Warshak was ordered to forfeit illegally obtained gains. [1]

In August 2008, the defendants were sentenced. Warshak received a prison term of 25 years, ordered to pay a fine of $93,000 and to forfeit the sums of $459,540,000 and $44,876,781.68 which represented the proceeds of the crimes. Harriet was sentenced to 24 months imprisonment and to be jointly and severally liable with Warshak for the forfeiture amounts. [7] [8]

The defendants appealed their convictions, sentences, and forfeiture judgments resulting in the opinion discussed here. [1]

Opinion of the court

Holding

The court held that government agents infringed upon Warshak's Fourth Amendment rights when they compelled his ISP to produce the content of his emails without first obtaining a warrant based on probable cause. As the government agents operated in good faith on provisions of the Stored Communications Act, the exclusionary rule was not applicable and reversal of Warshak's convictions was not warranted.

Stored Communications Act (SCA)

Under the SCA, agents of the government can request access to emails using an administrative subpoena or by obtaining a court order, depending on certain statutory classifications. [9] [10] [11] Government agents ordered Warshak's ISP to store emails citing 18 U.S.C. § 2703(f) as granting them that authority. [12] The government then ordered the ISP to turn over the content of Warshak's emails using a subpoena. Warshak was not informed that his ISP was archiving his email and he did not receive notice of the subpoena and order to his ISP until May 2006, nearly one year after the government served the subpoena. [1]

Fourth Amendment

As stated by the United States Supreme Court, the purpose of the Fourth Amendment is "to safeguard the privacy and security of individuals against arbitrary invasions by government officials." [13] To fall under the protection of the Fourth Amendment, the invasion by government officials must arise to the level of a search, which occurs when the government infringes upon "an expectation of privacy that society is prepared to consider reasonable." [14] Thus, there is a two-part inquiry to decide if an invasion by the government qualifies as an unreasonable search under the Fourth Amendment: [15]

Analyzing the first prong of the two-part inquiry using the facts of the case, the Sixth Circuit found that Warshak manifested a subjective expectation of privacy in the content of his emails. The court reasoned that: "[g]iven the often sensitive and sometimes damning substance of his emails, we think it highly unlikely that Warshak expected them to be made public, for people seldom unfurl their dirty laundry in plain view." [1]

The court then proceeded to the second prong of the inquiry, whether society is willing to accept Warshak's expectation of privacy as reasonable. The court stated that the question is of grave importance because email communication has assumed a prominent role in today's society. Moreover, the Fourth Amendment must not fall behind technological advances or it will "wither and die." [16]

The court began by discussing traditional forms of communication such as letters and telephone calls. Each enjoys Fourth Amendment protection. This protection does not disappear even though intermediaries, such as the post office or a telephone company, are capable of accessing the content of communication. The court then stated that communication via email is akin to communication via letters and telephone calls because email is pervasive and can be personal. Furthermore, the court declared it would be incongruous to treat email, letters, and telephone calls differently because of the method of delivery. "It follows that email requires strong protection under the Fourth Amendment; otherwise, the Fourth Amendment would prove an ineffective guardian of private communication, an essential purpose it has long been recognized to serve." [1]

Analogizing email to letters and telephone calls, the court declared that an ISP is the functional equivalent of the post office or telephone company. The government cannot compel them to turn over the content of communications absent a warrant based on probable cause. "It only stands to reason that, if government agents compel an ISP to surrender the contents of a subscriber's emails, those agents have thereby conducted a Fourth Amendment search, which necessitates compliance with the warrant requirement absent some exception." [1]

The threat of possible access by an ISP to the content of a subscriber's email does not defeat this reasonable expectation of privacy, the court continued. Both the post office and telephone companies have the ability to access and the right to access, under certain conditions, the contents of a communication, yet these facts do not eliminate Fourth Amendment protection. There may be some cases where the subscriber agreement may be broad enough to defeat a reasonable expectation of privacy in the content of a subscriber's email, but the court held that this was not such a situation. [1]

Finally, the court distinguished United States v. Miller which involved business records voluntarily given to a bank. Where Miller involved simple business records, the emails at issue here are personal and confidential and concern a wide variety of topics. Where the information in Miller was used in the ordinary course of business of the bank, the ISP here was an intermediary, not the intended recipient. [1] [17]

The court concluded that a subscriber enjoys a reasonable expectation of privacy in the contents of emails sent or received through, or stored with, a commercial ISP. Therefore, the government violated Warshak's Fourth Amendment rights when they obtained the contents of his emails. The court went on to declare: "to the extent that the SCA purports to permit the government to obtain such emails warrantlessly, the SCA is unconstitutional." [1]

However, even though the government violated Warshak's Fourth Amendment rights, the illegally obtained emails were not subject to exclusionary rules of evidence because the agents of the government relied in good faith on the SCA. [18] "Consequently, we find that, although the government violated the Fourth Amendment, the exclusionary rule does not apply, as the government relied in good faith on [18 U.S.C.] § 2703(b) and § 2703(d) to access the contents of Warshak's emails." [1] The court held that the primary reason the exclusionary rule did not apply is because the deterrence rationale is lacking, quoting a prior decision, the court stated that "...where an officer acts in objectively reasonable reliance upon a statute that is later found unconstitutional, exclusion of the evidence would not deter future police misconduct." [1]

Other issues

Additionally, the court sustained the convictions for conspiracy to commit mail, wire, and bank fraud, along with the convictions for mail fraud, bank fraud, and money laundering because the evidence was sufficient to support them. However, Warshak's sentence was vacated and remanded to the lower court because the court's previous ruling lacked an adequate explanation of losses to justify the sentence. [1]

Result

The Sixth Circuit held that the government violated Steven Warshak's Fourth Amendment rights when it compelled his ISP to turn over the contents of his email without a warrant based on probable cause. However, the emails were not excluded from evidence because the government agents relied in good faith on the provisions of the SCA. As a result, the Sixth Circuit: [1]

Concurring opinion

The concurring opinion addressed the use of the SCA by the government to request that Warshak's ISP retain emails it would have otherwise deleted. Section 2703(f) of the SCA, according to Judge Keith, should have no prospective effect. [12] The government's request that the ISP preserve Warshak's stored and future email communications without notifying Warshak is analogous to tapping his telephone line without a warrant. This type of action would not survive a challenge under the Fourth Amendment: "The government cannot use email collection as a means to monitor citizens without a warrant anymore than they can tap a telephone line to monitor citizens without a warrant." [1] However, because Judge Keith's interpretation of § 2703(f) did not affect the outcome of the case, he concurred in the result.

Subsequent proposed legislation

The Email Privacy Act, a bill introduced in the United States Congress, would codify the holding in Warshak, applying its rule nationwide. [19] [20]

Related Research Articles

<span class="mw-page-title-main">Fourth Amendment to the United States Constitution</span> 1791 amendment prohibiting unreasonable searches and seizures

The Fourth Amendment to the United States Constitution is part of the Bill of Rights. It prohibits unreasonable searches and seizures and sets requirements for issuing warrants: warrants must be issued by a judge or magistrate, justified by probable cause, supported by oath or affirmation, and must particularly describe the place to be searched and the persons or things to be seized.

A pen register, or dialed number recorder (DNR), is a device that records all numbers called from a particular telephone line. The term has come to include any device or program that performs similar functions to an original pen register, including programs monitoring Internet communications.

<span class="mw-page-title-main">Electronic Communications Privacy Act</span> 1986 United States federal law

The Electronic Communications Privacy Act of 1986 (ECPA) was enacted by the United States Congress to extend restrictions on government wire taps of telephone calls to include transmissions of electronic data by computer, added new provisions prohibiting access to stored electronic communications, i.e., the Stored Communications Act, and added so-called pen trap provisions that permit the tracing of telephone communications . ECPA was an amendment to Title III of the Omnibus Crime Control and Safe Streets Act of 1968, which was primarily designed to prevent unauthorized government access to private electronic communications. The ECPA has been amended by the Communications Assistance for Law Enforcement Act (CALEA) of 1994, the USA PATRIOT Act (2001), the USA PATRIOT reauthorization acts (2006), and the FISA Amendments Act (2008).

Katz v. United States, 389 U.S. 347 (1967), was a landmark decision of the U.S. Supreme Court in which the Court redefined what constitutes a "search" or "seizure" with regard to the protections of the Fourth Amendment to the U.S. Constitution. The ruling expanded the Fourth Amendment's protections from an individual's "persons, houses, papers, and effects", as specified in the Constitution's text, to include any areas where a person has a "reasonable expectation of privacy". The reasonable expectation of privacy standard, now known as the Katz test, was formulated in a concurring opinion by Justice John Marshall Harlan II.

California v. Greenwood, 486 U.S. 35 (1988), was a case in which the Supreme Court of the United States held that the Fourth Amendment does not prohibit the warrantless search and seizure of garbage left for collection outside the curtilage of a home.

Olmstead v. United States, 277 U.S. 438 (1928), was a decision of the Supreme Court of the United States, on the matter of whether wiretapping of private telephone conversations, conducted by federal agents without a search warrant with recordings subsequently used as evidence, constituted a violation of the target’s rights under the Fourth and Fifth Amendments. In a 5–4 decision, the Court held that the constitutional rights of a wiretapping target have not been violated.

Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as when it is stored on email servers or on a user's computer, or when the user reads the message. In countries with a constitutional guarantee of the secrecy of correspondence, whether email can be equated with letters—therefore having legal protection from all forms of eavesdropping—is disputed because of the very nature of email.

In United States constitutional law, expectation of privacy is a legal test which is crucial in defining the scope of the applicability of the privacy protections of the Fourth Amendment to the U.S. Constitution. It is related to, but is not the same as, a right to privacy, a much broader concept which is found in many legal systems. Overall, expectations of privacy can be subjective or objective.

Hudson v. Michigan, 547 U.S. 586 (2006), is a United States Supreme Court case in which the Court held that a violation of the Fourth Amendment requirement that police officers knock, announce their presence, and wait a reasonable amount of time before entering a private residence does not require suppression of the evidence obtained in the ensuing search.

Smith v. Maryland, 442 U.S. 735 (1979), was a Supreme Court case holding that the installation and use of a pen register by the police to obtain information on a suspect's telephone calls was not a "search" within the meaning of the Fourth Amendment to the United States Constitution, and hence no search warrant was required. In the majority opinion, Justice Harry Blackmun rejected the idea that the installation and use of a pen register constitutes a violation of the suspect's reasonable expectation of privacy since the telephone numbers would be available to and recorded by the phone company anyway.

<span class="mw-page-title-main">Stored Communications Act</span>

The Stored Communications Act is a law that addresses voluntary and compelled disclosure of "stored wire and electronic communications and transactional records" held by third-party Internet service providers (ISPs). It was enacted as Title II of the Electronic Communications Privacy Act of 1986 (ECPA).

State v. Reid, 194 N.J. 386, 954 A.2d 503, was a criminal court case in which the New Jersey Supreme Court ruled that Internet service provider (ISP) subscribers have a reasonable expectation of privacy in the identifying information they provide to ISPs. This case has helped place New Jersey at the forefront of the states committed to providing their residents with broader privacy protections than those available under federal law.

Ontario v. Quon, 560 U.S. 746 (2010), is a United States Supreme Court case concerning the extent to which the right to privacy applies to electronic communications in a government workplace. It was an appeal by the city of Ontario, California, from a Ninth Circuit decision holding that it had violated the Fourth Amendment rights of two of its police officers when it disciplined them following an audit of pager text messages that discovered many of those messages were personal in nature, some sexually explicit. The Court unanimously held that the audit was work-related and thus did not violate the Fourth Amendment's protections against unreasonable search and seizure.

United States v. Jones, 565 U.S. 400 (2012), was a landmark United States Supreme Court case in which the court held that installing a Global Positioning System (GPS) tracking device on a vehicle and using the device to monitor the vehicle's movements constitutes a search under the Fourth Amendment.

<i>United States v. Graham</i>

United States v. Graham, 846 F. Supp. 2d 384, was a Maryland District Court case in which the Court held that historical cell site location data is not protected by the Fourth Amendment. Reacting to the precedent established by the recent Supreme Court case United States v. Jones in conjunction with the application of the third party doctrine, Judge Richard D. Bennett found that "information voluntarily disclosed to a third party ceases to enjoy Fourth Amendment protection" because that information no longer belongs to the consumer, but rather to the telecommunications company that handles the transmissions records. The historical cell site location data is then not subject to the privacy protections afforded by the Fourth Amendment standard of probable cause, but rather to the Stored Communications Act, which governs the voluntary or compelled disclosure of stored electronic communications records.

The third-party doctrine is a United States legal doctrine that holds that people who voluntarily give information to third parties—such as banks, phone companies, internet service providers (ISPs), and e-mail servers—have "no reasonable expectation of privacy" in that information. A lack of privacy protection allows the United States government to obtain information from third parties without a legal warrant and without otherwise complying with the Fourth Amendment prohibition against search and seizure without probable cause and a judicial search warrant.

<i>In re Application of the United States for Historical Cell Site Data</i>

In re Application of the United States for Historical Cell Site Data, 724 F.3d 600, was a case in which the United States Court of Appeals for the Fifth Circuit held that the government can access cell site records without a warrant. Specifically, the court held that court orders under the Stored Communications Act compelling cell phone providers to disclose historical cell site information are not per se unconstitutional.

<i>United States v. Davis</i> (2014)

United States v. Quartavious Davis is a United States federal legal case that challenged the use in a criminal trial of location data obtained without a search warrant from MetroPCS, a cell phone service provider. Mobile phone tracking data had helped place the defendant in this case at the scene of several crimes, for which he was convicted. The defendant appealed to the Eleventh Circuit Court of Appeals, which found the warrantless data collection had violated his constitutional rights under the Fourth Amendment to the United States Constitution, but declined to order a new trial because the evidence was collected in good faith. The Eleventh Circuit has since vacated this decision pending a rehearing by the Eleventh Circuit en banc. United States v. Davis, 573 Fed. Appx. 925. On 5 May 2015, the en banc order upheld the use of the information. On 9th Nov 2015, the Supreme Court of the United States declined to hear this case on appeal.

Carpenter v. United States, 585 U.S. 296 (2018), is a landmark United States Supreme Court case concerning the privacy of historical cell site location information (CSLI). The Court held that the government violates the Fourth Amendment to the United States Constitution when it accesses historical CSLI records containing the physical locations of cellphones without a search warrant.

Digital Search and Seizure refers to the ability of the United States Government to obtain and read an individual's private digital correspondence and material under The Fourth Amendment of the United States Constitution.

References