Joshua A.T. Fairfield & Erik Luna - Digital Innocence
Joshua A.T. Fairfield & Erik Luna - Digital Innocence
7-2014
Digital Innocence
Joshua A.T. Fairfield
Washington & Lee University School of Law, [email protected]
Erik Luna
Washington and Lee University School of Law, [email protected]
Recommended Citation
Joshua A.T. Fairfield and Erik Luna, Digital Innocence, 99 Cornell L. Rev. 981 (2014).
This Article is brought to you for free and open access by the Faculty Scholarship at Washington and Lee University
School of Law Scholarly Commons. It has been accepted for inclusion in Scholarly Articles by an authorized
administrator of Washington and Lee University School of Law Scholarly Commons. For more information, please
contact [email protected].
\\jciprod01\productn\C\CRN\99-5\CRN501.txt            unknown               Seq: 1              21-JUL-14    12:02
DIGITAL INNOCENCE
            Recent revelations have shown that almost all online activity and in-
       creasing amounts of offline activity are tracked using Big Data and data
       mining technologies. The ensuing debate has largely failed to consider an
       important consequence of mass surveillance: the obligation to provide access
       to information that might exonerate a criminal defendant. Although infor-
       mation technology can establish innocence—an ability that will only im-
       prove with technological advance—the fruits of mass surveillance have been
       used almost exclusively to convict. To address the imbalance and inform
       public dialogue, this Article develops the concept of “digital innocence” as a
       means of leveraging the tools of Big Data, data mining, ubiquitous con-
       sumer tracking, and digital forensics to prevent wrongful convictions and to
       provide hard proof of actual innocence for those already convicted.
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 982   R
    I. THE CONCEPT OF DIGITAL INNOCENCE . . . . . . . . . . . . . . . . . . . 987                                    R
   II. THE TECHNOLOGY OF DIGITAL SURVEILLANCE . . . . . . . . . . . . . 995                                          R
       A. Growth of Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 996                    R
       B. Increase in Types of Information . . . . . . . . . . . . . . . . . . . 1001                                R
       C. Aggregation and Cross-Referencing of Databases . . . . 1005                                                R
  III. THE LAW OF DIGITAL SURVEILLANCE . . . . . . . . . . . . . . . . . . . . . 1007                                R
       A. Surveillance and the Fourth Amendment . . . . . . . . . . . 1007                                           R
       B. Surveillance and FISA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1011                     R
       C. Mass Surveillance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1019               R
  IV. DEFENSE RIGHTS AND POTENTIAL BARRIERS . . . . . . . . . . . . . . . 1024                                       R
       A. Government Surveillance and Defense Rights . . . . . . . 1025                                              R
       B. Barriers to Digital Innocence . . . . . . . . . . . . . . . . . . . . . . . 1032                           R
          1. State Secrets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1032          R
          2. Agency Alignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1038                   R
   V. ESTABLISHING DIGITAL INNOCENCE . . . . . . . . . . . . . . . . . . . . . . . 1043                              R
       A. Access to Information at Trial . . . . . . . . . . . . . . . . . . . . . . 1044                            R
          1. CIPA and CIPA-like Processes. . . . . . . . . . . . . . . . . . . . . . 1045                            R
          2. Obtaining Information from Private Third Parties . . . 1054                                             R
          3. Obtaining Information from the United States as a
              Third Party . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1065           R
       B. Post-Conviction Relief . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1070                    R
                                                      981
\\jciprod01\productn\C\CRN\99-5\CRN501.txt             unknown                Seq: 2              21-JUL-14     12:02
INTRODUCTION
      The recent National Security Agency (NSA) data scandal has re-
vealed what technologists have long suspected: every aspect of online
life is tracked and recorded. The NSA maintains programs that cover
“nearly everything a typical user does on the internet”1 and collect
“pretty much everything it can”2—e-mail and text messages, voice and
video chats, photos and videos, file transfers, social networking infor-
mation, Internet browsing histories and searches, and so on—render-
ing all of this data searchable by the government.3 Pursuant to secret
court orders, Americans’ telephone and Internet metadata records
are being proactively recorded, stored, parsed, and searched.4 From
the massive datasets derived from this data, it is possible to determine
whom people talk to, where they are, what they are interested in, and
even to predict what they might do next.5 Outside of the NSA con-
text, government monitoring has expanded through the use of
third-party data and by the creation of state-run databases. Digital sur-
veillance is increasing offline as well. For example, some police cars
    1    Glenn Greenwald, XKeyscore: NSA Tool Collects “Nearly Everything a User Does on the
Internet,” THE GUARDIAN (July 31, 2013, 8:56 AM), http://www.theguardian.com/world/
2013/jul/31/nsa-top-secret-program-online-data (quoting NSA materials on XKeyscore
program) (internal quotation marks omitted).
    2    James Ball, NSA Collects Millions of Text Messages Daily in “Untargeted” Global Sweep,
THE GUARDIAN (Jan. 16, 2014, 1:55 PM), http://www.theguardian.com/world/2014/jan/
16/nsa-collects-millions-text-messages-daily-untargeted-global-sweep (quoting document
on NSA’s Dishfire program) (internal quotation marks omitted).
    3    See, e.g., id.; Greenwald, supra note 1; James Glanz, Jeff Larson & Andrew W.                                  R
Lehren, Spy Agencies Tap Data Streaming from Phone App, N.Y. TIMES, Jan. 28, 2014, at A1;
Barton Gellman & Ashkan Soltani, NSA Collects Millions of E-mail Address Books Globally,
WASH. POST, Oct. 15, 2013, at A1; Glenn Greenwald & Ewen MacAskill, Revealed: How US
Secretly Collects Private Data from AOL, Apple, Facebook, Google, Microsoft, Paltalk, Skype, Yahoo
and Youtube, THE GUARDIAN, June 7, 2013, at A1.
    4    See Barton Gellman, The Architecture: Four-Pronged U.S. Approach Relies Heavily on Data
Behind Internet, Phone Communications, WASH. POST, June 16, 2013, at A1 (Internet and te-
lephony metadata); James Ball, Verizon Court Order: Telephone Call Metadata and What It Can
Show, THE GUARDIAN (June 6, 2013, 10:12 PM), http://www.theguardian.com/world/
2013/jun/06/phone-call-metadata-information-authorities (telephony metadata).
“Metadata” can be defined as data about data. In the context of electronic communica-
tions, metadata is information about a communication—the addresses and identities of an
e-mail sender and recipient, for instance, and the time, duration, and relevant numbers of
a phone call—but it does not include the communication itself.
    5    See Barton Gellman & Ashkan Soltani, NSA Maps Targets by Their Phones, WASH.
POST, Dec. 5, 2013, at A1; James Risen & Laura Poitras, N.S.A. Examines Social Networks of
U.S. Citizens, N.Y. TIMES, Sept. 29, 2013, at A1.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown           Seq: 3           21-JUL-14   12:02
    6    See You Are Being Tracked: How License Plate Readers Are Being Used to Record Americans’
Movements, AM. C.L. UNION, https://www.aclu.org/alpr (last visited Aug. 23, 2013).
    7    See Craig Timberg, High Above, an All-Seeing Eye Watches for Crime, WASH. POST, Feb.
6, 2014, at A1.
    8    See Mariel Myers, Boston Bombings: How Facial Recognition Can Cut Investigation Time to
Seconds, CNET (Apr. 18, 2013, 5:56 PM), http://www.cnet.com/news/boston-bombings-
how-facial-recognition-can-cut-investigation-time-to-seconds/.
    9    See PRIVACY & CIVIL LIBERTIES OVERSIGHT BD., REPORT ON THE TELEPHONE RECORDS
PROGRAM CONDUCTED UNDER SECTION 215 OF THE USA PATRIOT ACT AND ON THE OPERA-
TIONS OF THE FOREIGN INTELLIGENCE SURVEILLANCE COURT (2014); PRESIDENT’S REVIEW GRP.
ON INTELLIGENCE & COMMC’NS TECHS., LIBERTY AND SECURITY IN A CHANGING WORLD (2013)
[hereinafter PRG REPORT].
   10    See Klayman v. Obama, 957 F. Supp. 2d 1 (D.D.C. 2013); ACLU v. Clapper, No. 13
Civ. 3994 (WHP), 2013 WL 6819708 (S.D.N.Y. Dec. 27, 2013).
   11    See, e.g., Examining Recommendations to Reform FISA Authorities: Hearing Before the H.
Comm. on the Judiciary, 113th Cong. (2014); Strengthening Privacy Rights and National Security:
Oversight of FISA Surveillance Programs: Hearing Before the S. Comm. on the Judiciary, 113th
Cong. (2013).
   12    See Barack Obama, U.S. President, Remarks by the President on Review of Signals
Intelligence, Address at the Department of Justice (Jan. 17, 2014), available at http://www.
whitehouse.gov/the-press-office/2014/01/17/remarks-president-review-signals-intelli
gence; see also Presidential Policy Directive 28: Signals Intelligence Activities, The White
House (Jan. 17, 2014), available at http://www.whitehouse.gov/sites/default/files/docs/
2014sigint_mem_ppd_rel.pdf (directive accompanying President Obama’s remarks).
   13    Compare PRG REPORT, supra note 9, at 24–27, 36, 86–94, 200–08 (proposing various             R
changes to the Foreign Intelligence Surveillance Court (FISC)), with Letter from John D.
Bates, Dir. of the Admin. Office of the U.S. Courts, to Dianne Feinstein, Chairman of the
Senate Select Comm. on Intelligence (Jan. 13, 2014), available at http://www.feinstein.
senate.gov/public/index.cfm/files/serve/?File_id=3bcc8fbc-d13c-4f95-8aa9-09887d6e90ed
(criticizing proposals).
   14    Compare Klayman, 957 F. Supp. 2d at 40–41 (noting the “utter lack of evidence that
a terrorist attack has ever been prevented because searching the NSA database was faster
than other investigative tactics”), PETER BERGEN ET AL., NEW AM. FOUND., DO NSA’S BULK
SURVEILLANCE PROGRAMS STOP TERRORISTS? 1–3 (2014) (rejecting government claims that
mass surveillance has kept the United States safe from terrorism), and PRG REPORT, supra
note 9, at 104 (“[T]he information contributed to terrorist investigations by the use of              R
section 215 telephony meta-data was not essential to preventing attacks and could readily
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown           Seq: 4           21-JUL-14   12:02
have been obtained in a timely manner using conventional [methods].”), with Clapper,
2013 WL 6819708, at *25–26 (citing government’s purported successes and stating that
“[t]he effectiveness of bulk telephony metadata collection cannot be seriously disputed”),
Michael Morell, Correcting the Record on the NSA Review, WASH. POST, Dec. 29, 2013, at A17
(former CIA Acting Director arguing that bulk surveillance “would likely have prevented
9/11” and “has the potential to prevent the next 9/11”), and Benjamin Wittes, A Critique of
the New America Foundation’s Recent NSA Report, LAWFARE (Jan. 23, 2014, 10:47 AM),
http://www.lawfareblog.com/2014/01/a-critique-of-the-new-america-foundations-recent-
nsa-report/ (criticizing report by BERGEN ET AL., supra).
   15    158 CONG. REC. S8384 (daily ed. Dec. 27, 2012) (statement of Sen. Diane Fein-
stein); see also Ellen Nakashima, NSA Surveillance Questioned in Plot Case, WASH. POST, June
22, 2013, at A2 (quoting and discussing Sen. Diane Feinstein’s comments concerning
reauthorization of 50 U.S.C. § 1881a); infra notes 270–82 and accompanying text (discuss-           R
ing 50 U.S.C. § 1881a).
   16    See infra notes 290–91 and accompanying text.                                              R
   17    See infra notes 387–89 and accompanying text.                                              R
   18    See, e.g., JAMES MANYIKA ET AL., MCKINSEY GLOBAL INST., BIG DATA: THE NEXT FRON-
TIER FOR INNOVATION, COMPETITION, AND PRODUCTIVITY 1 (2011) (“‘Big Data’ refers to
datasets whose size is beyond the ability of typical database software tools to capture, store,
manage, and analyze. This . . . incorporates a moving definition of how big a dataset needs
to be in order to be considered big data . . . . [A]s technology advances over time, the size
of datasets that qualify as big data will also increase.”).
   19    See, e.g., Rose Aguilar, Occupy Has Raised Class Consciousness: Now What?, TRUTHOUT
(Feb. 13, 2012), http://truth-out.org/news/item/6628-occupy-has-raised-class-conscious
ness-now-what (stating that the Occupy movement has “raised awareness about the widen-
\\jciprod01\productn\C\CRN\99-5\CRN501.txt      unknown             Seq: 5            21-JUL-14   12:02
ing wealth gap, inequality, rising student debt, criminal activity on Wall Street, poverty and
home foreclosures”).
   20    See, e.g., Kate Zernike, Wall St. Protest Isn’t Like Ours, Tea Party Says, N.Y. TIMES, Oct.
22, 2011, at A1 (discussing portrayal of Occupy protesters as, among other things, “messy,
indolent, drug-addled,” “unemployed, uneducated, and uninformed”).
   21    See Nick Pinto, Jury Finds Occupy Wall Street Protester Innocent After Video Contradicts
Police Testimony, VILLAGE VOICE (Mar. 1, 2013, 2:53 AM), http://blogs.villagevoice.com/
runninscared/2013/03/jury_finds_occu.php (noting discrepancies between law enforce-
ment officials’ account of an arrest and video evidence).
   22    Id.
   23    Id.
   24    See id. (discussing how video evidence undercut police testimony and resulted in a
not guilty verdict for protester); see also Nick Pinto, In the First Occupy Wall Street Trial, Acquit-
tal, VILLAGE VOICE (Mar. 16, 2012, 9:29 AM), http://blogs.villagevoice.com/runninscared/
2012/05/in_the_first_oc.php [hereinafter Occupy Trial ] (discussing another case in which
photographic evidence contradicted police testimony).
   25    See Radley Balko, Tech-Savvy Occupy Protesters Use Cellphone Video, Social Networking to
Publicize Police Abuse, HUFFINGTON POST (Oct. 29, 2011, 1:26 PM), http://www.huffing
tonpost.com/2011/10/29/occupy-protesters-armed-with-technology_n_1063706.html (“In
both [civil and] criminal proceedings . . . it’s likely that any significant protest will have
independent video . . . to ferret out what actually happened.”).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown           Seq: 6          21-JUL-14   12:02
   26   See, e.g., DAVID BRIN, THE TRANSPARENT SOCIETY 80–84 (1998) (discussing concept
of “reciprocal transparency”); Steve Mann et al., Sousveillance: Inventing and Using Wearable
Computing Devices for Data Collection in Surveillance Environments, 1 SURVEILLANCE & SOC’Y 331
(2003) (discussing concept of “sousveillance”).
   27   See Ron Wyden et al., Op-Ed., End the N.S.A. Dragnet, Now, N.Y. TIMES, Nov. 26,
2013, at A25 (three U.S. Senators discussing danger of mass surveillance).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt        unknown     Seq: 7         21-JUL-14   12:02
                                                   I
                           THE CONCEPT       OF    DIGITAL INNOCENCE
   28  PRG REPORT, supra note 9, at 16, 50; see also id. at 42, 50–51, 257–58 (recom-            R
mending cost-benefit analysis and risk-management approaches).
   29  Joshua Sabatini, San Francisco’s Crime Cameras Zoom in on the Innocent, S.F. EXAMINER
(July 8, 2011), http://www.sfexaminer.com/sanfrancisco/san-franciscos-crime-cameras-
zoom-in-on-the-innocent/Content?oid=2177815.
   30  See id.
   31  See id.
   32  See Balko, supra note 25.                                                                 R
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown         Seq: 8         21-JUL-14   12:02
   33    See Joshua Holland, How Video of Police Behaving Badly Made Occupy Wall Street a
Global Phenomenon, ALTERNET (Oct. 24, 2011), http://www.alternet.org/story/152856/
how_video_of_police_behaving_badly_made_occupy_wall_street_a_global_phenomenon.
   34    See Tom Balmforth, Cops, Cars, and Videotape: Russians Embrace Dash-Cam Craze, RA-
DIO FREE EUR. (Nov. 24, 2012), http://www.rferl.org/content/dash-cams-russia-fighting-
corruption-and-scams-car-crashes/24780355.html (describing how dashboard-mounted
video cameras have become “an essential accoutrement for Russian motorists,” who “use
these dash cams as a tool to help fight their corner against Russia’s notoriously corrupt
traffic police”).
   35    Sarah Wallace, Exclusive: Dashcam Video Clears NJ Man, WABC-TV (Feb. 21, 2014),
http://abclocal.go.com/wabc/story?section=news/investigators&id=9440401#.
   36    Id. (quoting defense attorney Steven Brown).
   37    NAT’L RESEARCH COUNCIL OF THE NAT’L ACADS., STRENGTHENING FORENSIC SCIENCE
IN THE UNITED STATES: A PATH FORWARD 179–80 (2009) [hereinafter NAS REPORT].
   38    See id. at 4–5, 37, 42–48, 100.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown            Seq: 9           21-JUL-14   12:02
   39    See Bob Sullivan, Lawyers Eye NSA Data as Treasure Trove for Evidence in Murder, Divorce
Cases, NBC NEWS (June 20, 2013), http://www.nbcnews.com/technology/lawyers-eye-nsa-
data-treasure-trove-evidence-murder-divorce-cases-6C10398754?franchiseSlug=technolog.
   40    See James S. Liebman et al., The Evidence of Things Not Seen: Non-Matches as Evidence of
Innocence, 98 IOWA L. REV. 577, 619–22 (2013) (noting that the civil liberties issues with
data mining have focused more on the use of such information to target specific
individuals).
   41    For a strain of this conversation, see Orin S. Kerr, Congress, the Courts, and New
Technologies: A Response to Professor Solove, 74 FORDHAM L. REV. 779 (2005); Orin S. Kerr, The
Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution, 102
MICH. L. REV. 801 (2004) [hereinafter Kerr, The Fourth Amendment]; Deirdre K. Mulligan,
Reasonable Expectations in Electronic Communications: A Critical Perspective on the Electronic Com-
munications Privacy Act, 72 GEO. WASH. L. REV. 1557 (2004); Daniel J. Solove, The Coexistence
of Privacy and Security: Fourth Amendment Codification and Professor Kerr’s Misguided Call for
Judicial Deference, 74 FORDHAM L. REV. 747 (2005). For an excellent, fairly recent summa-
tion of the debate and literature, see Joshua S. Levy, Towards a Brighter Fourth Amendment:
Privacy and Technological Change, 16 VA. J.L. & TECH. 502 (2011).
   42    See, e.g., Marc J. Zwillinger & Christian S. Genetski, Criminal Discovery of Internet Com-
munications Under the Stored Communications Act: It’s Not a Level Playing Field, 97 J. CRIM. L. &
CRIMINOLOGY 569, 571–72 (2007).
   43    Cf. Robert Weisberg, IVHS, Legal Privacy, and the Legacy of Dr. Faustus, 11 SANTA
CLARA COMPUTER & HIGH TECH. L.J. 75, 75–77 (1995) (discussing the Fourth Amendment
tradeoff—privacy rights balanced against security concerns—in the context of Intelligent
Vehicle Highway Systems).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt    unknown             Seq: 10          21-JUL-14   12:02
   44    For prominent works in this area, see BRANDON L. GARRETT, CONVICTING THE INNO-
CENT:  WHERE CRIMINAL PROSECUTIONS GO WRONG (2011); BARRY SCHECK ET AL., ACTUAL
INNOCENCE: FIVE DAYS TO EXECUTION AND OTHER DISPATCHES FROM THE WRONGLY CON-
VICTED (2000); Samuel R. Gross et al., Exonerations in the United States: 1989 Through 2003, 95
J. CRIM. L. & CRIMINOLOGY 523 (2005); Richard A. Leo & Jon B. Gould, Studying Wrongful
Convictions: Learning from Social Science, 7 OHIO ST. J. CRIM. L. 7 (2009).
   45    Cf. Julie A. Singer et al., The Impact of DNA and Other Technology on the Criminal Justice
System: Improvements and Complications, 17 ALB. L.J. SCI. & TECH. 87, 118–20 (2007) (consid-
ering the idea that non–DNA technology might provide strong evidence of innocence).
   46    See Jules Epstein, “Genetic Surveillance”—the Bogeyman Response to Familial DNA Investi-
gations, 2009 U. ILL. J.L. TECH. & POL’Y 141, 141–42 (2009).
   47    See, e.g., Jeffrey Rosen, Wrongly Accused, N.Y. TIMES, Sept. 16, 2007, § 7, at 6.
   48    See, e.g., Robert P. Mosteller, Evidence History, the New Trace Evidence, and Rumblings
in the Future of Proof, 3 OHIO ST. J. CRIM. L. 523, 535–36 (2006).
   49    See, e.g., Emily Green, Forensic Advances Raise New Questions About Old Convictions,
NAT’L PUB. RADIO (Mar. 20, 2013, 12:44 PM), http://www.npr.org/2013/03/20/1748422
56/forensic-advances-raise-new-questions-about-old-convictions.
   50    Id.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown          Seq: 11          21-JUL-14   12:02
   51    See, e.g., Kevin Johnson, Storage of DNA Evidence Key to Exonerations, USA TODAY (Mar.
28, 2011), http://usatoday30.usatoday.com/news/nation/2011-03-28-crimelab28_ST_N.
htm.
   52    See Randy James, A Brief History of DNA Testing, TIME (June 19, 2009), http://con
tent.time.com/time/nation/article/0,8599,1905706,00.html.
   53    See id.
   54    See Damiano Beltrami, I’m Innocent. Just Check My Status on Facebook., N.Y. TIMES,
Nov. 12, 2009, at A27.
   55    See Zwillinger & Genetski, supra note 42, at 571 & n.7.                                     R
   56    See, e.g., Kerr, The Fourth Amendment, supra note 41, at 829 & nn.161–62; Joseph            R
Goldstein & Marc Lacy, Man Charged in Tucson Shootings Had Researched Assassins, Official
Says, N.Y. TIMES, Jan. 27, 2011, at A16.
   57    See, e.g., Goldstein & Lacy, supra note 56; see also Beltrami, supra note 54.               R
   58    See Mark Hansen, Prosecutors’ Use of Mobile Phone Tracking to Spot a Defendant Is “Junk
Science,” Critics Say, A.B.A. J., June 2013, at 15.
   59    See Sabatini, supra note 29.                                                                R
   60    See id.
   61    See Ashlee Vance, Facebook’s Is Bigger Than Yours, BUS. WK. (Aug. 23, 2012), http://
www.businessweek.com/articles/2012-08-23/facebooks-is-bigger-than-yours.
   62    See Glenn Greenwald, US Orders Phone Firm to Hand Over Data on Millions of Calls,
THE GUARDIAN, June 6, 2013, at A1.
   63    See Mathew J. Schwartz, 7 Facts About Geolocation Privacy, INFO. WK. (Aug. 20, 2012,
12:13 PM), http://www.informationweek.com/security/risk-management/7-facts-about-ge
olocation-privacy/d/d-id/1105877?.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown           Seq: 12          21-JUL-14   12:02
are stored, parsed, and keyword-searched, with his buying habits, on-
line and offline, systematically incorporated into comprehensive
databases.64 People are also subject to increasing amounts of public
surveillance.65 Cameras on street corners, cameras on ATMs, cameras
from shop windows, and cameras carried by citizens provide a wealth
of photographic and audio evidence that might bear on a criminal
case.66 Most importantly, all of this information is being stored,67
awaiting more useful access to the data.68
     Although the DNA technology literature is replete with discus-
sions of how innovation makes more accurate determinations possi-
ble,69 the advances took time and generated multiple interpretations.
New technology almost always contains the seeds of disparate mean-
ings, as proposed advances vie with traditional methodologies for
pride of place in trials and post-conviction proceedings.70 This under-
scores the importance of discovery and access to databases so that the
technology can be evaluated.71 Government databases are often
either secret or closed,72 despite the fact that the contents and algo-
rithms of these databases can be critical to criminal defense efforts.
The ongoing NSA scandal is scandalous not only because of the infor-
mation being gathered but also because of government efforts to con-
ceal the source of information used by law enforcement.73 As will be
discussed below, if databases are used for criminal investigations and
prosecutions, then defendants must be given access to them.74 In this
sense, the DNA technology literature points toward, but does not re-
solve, an issue that will be crucial for those seeking to use information
technology to exonerate.
     Certainly, the DNA revolution has placed a spotlight on the en-
tire criminal justice system. Generations of defense lawyers struggled
to free inmates who they believed to be innocent, but the available
   64   See Jennifer Valentino-Devries & Jeremy Singer-Vine, They Know What You’re Shop-
ping For, WALL ST. J., Dec. 8, 2012, at C1.
   65   See Keith Proctor, The Great Surveillance Boom, FORTUNE (Apr. 26, 2013, 4:56 PM),
http://management.fortune.cnn.com/2013/04/26/video-surveillance-boston-bombings/.
   66   See id.
   67   See Andy Greenberg, NSA’s New Data Center and Supercomputer Aim to Crack World’s
Strongest Encryption, FORBES (Mar. 16, 2012, 4:23 PM), http://www.forbes.com/sites/
andygreenberg/2012/03/16/nsas-new-data-center-and-ultra-fast-supercomputer-aim-to-
crack-worlds-strongest-crypto/.
   68   See Steve Lohr, Sizing Up Big Data, N.Y. TIMES, June 20, 2013, at F1.
   69   See, e.g., Sarah M. Ruby, Checking the Math: Government Secrecy and DNA Databases, 6
I/S: J.L. & POL’Y FOR INFO. SOC’Y 257, 258–59 (2010).
   70   See generally Note, Confronting the New Challenges of Scientific Evidence, 108 HARV. L.
REV. 1481, 1557–82 (1995) (describing “DNA Evidence and the Criminal Defense”).
   71   See Ken Strutin, Databases, E-Discovery and Criminal Law, 15 RICH. J.L. & TECH. 6,
27–28 (2008).
   72   See Ruby, supra note 69, at 263–64.                                                         R
   73   See id. at 270.
   74   See infra Part IV.A.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown          Seq: 13           21-JUL-14   12:02
   75    See Karen Christian, Note, “And the DNA Shall Set You Free”: Issues Surrounding Post-
conviction DNA Evidence and the Pursuit of Innocence, 62 OHIO ST. L.J. 1195, 1209–10 (2001).
   76    SCHECK ET AL., supra note 44, at xv.                                                         R
   77    See, e.g., DNA Exonerations Nationwide, INNOCENCE PROJECT, http://www.innocence
project.org/Content/DNA_Exonerations_Nationwide.php (last visited Mar. 25, 2014)
(noting that there have been 314 post-conviction DNA exonerations in the United States).
   78    United States v. Nixon, 418 U.S. 683, 709 (1974) (quoting Berger v. United States,
295 U.S. 78, 88 (1935)) (alteration in original).
   79    See, e.g., NAS REPORT, supra note 37, at 41 (“DNA evidence comprises only about 10           R
percent of case work and is not always relevant to a particular case. Even if DNA evidence
is available, it will assist in solving a crime only if it supports an evidential hypothesis that
makes guilt or innocence more likely.” (citation omitted)).
   80    See Marvin Zalman, Qualitatively Estimating the Incidence of Wrongful Convictions, 48
CRIM. L. BULL. 221, 230 (2012); see also D. Michael Risinger, Innocents Convicted: An Empiri-
cally Justified Factual Wrongful Conviction Rate, 97 J. CRIM. L. & CRIMINOLOGY 761, 785–88
(2007) (generalizing the factual error rate for capital rape-murders to other crimes).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown      Seq: 14        21-JUL-14   12:02
  81  See John Rhoton, Getting a Grip on Storage Growth, ZDNET (Apr. 29, 2013), http://
www.zdnet.com/getting-a-grip-on-storage-growth-7000014158/.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown        Seq: 15          21-JUL-14   12:02
                                                  II
                     THE TECHNOLOGY          OF    DIGITAL SURVEILLANCE
     In early June 2013, the Guardian and the Washington Post broke
stories on broad data surveillance programs conducted by the FBI and
the NSA.82 The Guardian revealed that Verizon was the target of a
secret order requiring it to turn over all phone call records gathered
for a ninety-day period.83 Other sources verified that such orders
were routinely renewed in a process that had been ongoing for
years.84 The result of the order was public confirmation that the gov-
ernment was collecting all “telephony metadata”—transactional infor-
mation such as the originating and terminating telephone numbers
and the time and duration of a call—regardless of who made the call,
who received the call, or where the call was made or received.85 This
was the first evidence in the United States of total detail recording of
American citizens. The order was not backward looking, in that it did
not involve the production of records that already existed or were re-
lated to a specific case. Rather, the order required a telecommunica-
tions provider to turn over all future records that would be generated.
Because the records did not yet exist at the time of the order, there
could be no possible way in which the collection was constrained by
suspicion of wrongdoing.
     The Washington Post exposé on the PRISM program followed,
describing how the NSA received access to social networking data.86 It
remains unclear whether this access was “streamlined”—that is, data
was made immediately available upon the NSA’s request in a dedi-
cated sandbox-server environment accessible by the government—or
“direct,” in the sense that the NSA had direct access to the Silicon
Valley companies’ own servers.87 Apple, Facebook, Google, and other
technology companies claimed in unison that the NSA was not permit-
ted direct access to their servers, but none addressed the question of
   82   See Barton Gellman & Laura Poitras, U.S., British Intelligence Mining Data from Nine
U.S. Internet Companies in Broad Secret Program, WASH. POST, http://www.washingtonpost.
com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-
secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html (last up-
dated June 7, 2013, 10:51 AM); Greenwald, supra note 62.                                           R
   83   See Greenwald, supra note 62; infra notes 242–48, 261–68 and accompanying text             R
(discussing section 215 of the Patriot Act, see infra note 230).
   84   See, e.g., Kimberly Dozier & Stephen Braun, Secret Court Scolded NSA over Surveillance
in 2011, Declassified Documents Reveal, NBC NEWS (Aug. 22, 2013, 5:00 AM), http://www.
nbcnews.com/news/us-news/secret-court-scolded-nsa-over-surveillance-in-2011-declassi
fied-documents-reveal-v20131077.
   85   See Greenwald, supra note 62.                                                              R
   86   See Gellman & Poitras, supra note 82.                                                      R
   87   Id.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown          Seq: 16          21-JUL-14   12:02
   A. Growth of Databases
     The most significant characteristic of databases relevant to digital
innocence is the rate of storage increase.92 Growth in storage capacity
means the data that might exonerate a defendant is stored but not
necessarily parsed.93 That data might reside in a telecommunication
provider’s cell-site location information, or in the photographs of a
user-generated content website, or in e-mail, or text messages.94 The
odds of storing a piece of exonerating evidence must grow at least
linearly as a function of the increase in storage capacity (i.e., storing
more of what is already being stored) and as a function of the increase
in types of information stored (i.e., storing additional kinds of infor-
   88    See Kevin Poulsen, Zuckerberg, Page: NSA Has No “Direct Access” to Facebook or Google
Servers, WIRED (June 7, 2013, 7:40 PM), http://www.wired.com/threatlevel/2013/06/
prism-google-facebook/.
   89    See infra Part III.
   90    See Nicole Perlroth & John Markoff, A Peephole for the N.S.A., N.Y. TIMES, Nov. 26,
2013, at B1; Craig Timberg et al., Microsoft Moves to Boost Security, WASH. POST, Nov. 27,
2013, at A1.
   91    James Ball et al., Revealed: How US and UK Spy Agencies Defeat Internet Privacy and
Security, GUARDIAN WKLY. (Sept. 5, 2013), http://www.theguardian.com/world/2013/sep/
05/nsa-gchq-encryption-codes-security/.
   92    See John Foley, As Big Data Explodes, Are You Ready for Yottabytes?, FORBES (June 21,
2013, 10:23 AM), http://www.forbes.com/sites/oracle/2013/06/21/as-big-data-explodes-
are-you-ready-for-yottabytes/ (discussing growing data demands by the U.S. Department of
Defense and business).
   93    See Rhoton, supra note 81 (arguing that businesses have incentive to store data           R
which they may not even know how to analyze yet).
   94    See Foley, supra note 92 (discussing how “burgeoning databases” force organiza-           R
tions to “rethink their IT infrastructures”).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown        Seq: 17         21-JUL-14   12:02
   95    See Greenberg, supra note 67 (“Using what will likely be the world’s fastest             R
supercomputer and the world’s largest data storage and analysis facility, the NSA plans to
comb unimaginably voluminous troves of messages for patterns they could use to crack
AES . . . .”).
   96    See Rhoton, supra note 81 (stored data need to be backed up, maintained, and             R
“replicated and reused for different purposes”).
   97    See Mark Hachman, Big Getting Bigger, Uptime Data Center Survey Finds, SLASHDOT
(Apr. 25, 2013), http://slashdot.org/topic/datacenter/big-getting-bigger-uptime-data-
center-survey-finds/ (“[T]he conclusion of preliminary data collection by the Uptime Insti-
tute . . . found that the largest data centers are receiving the largest budget increases.”).
   98    See H.R. 3523, 112th Cong. (2d Sess. 2012) (proposed law allowing technology and
manufacturing companies to share data with the U.S. government); see also Jeff Nesbit,
CISPA Rolls Along, U.S. NEWS & WORLD REP. (May 6, 2013), http://www.usnews.com/news/
blogs/at-the-edge/2013/05/06/cispa-rolls-along.
   99    See Greenberg, supra note 67.                                                            R
  100    James Bamford, The NSA Is Building the Country’s Biggest Spy Center (Watch What You
Say), WIRED (Mar. 15, 2012, 7:24 PM), http://www.wired.com/threatlevel/2012/03/
ff_nsadatacenter/.
  101    Id.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt       unknown        Seq: 18          21-JUL-14   12:02
  102   Martin Hilbert & Priscila López, The World’s Technological Capacity to Store, Communi-
cate, and Compute Information, 332 SCIENCE 60, 63–64 (2011).
  103   Id. at 62.
  104   Id.; see Jon Stewart, Global Data Storage Calculated at 295 Exabytes, BBC NEWS (Feb. 11,
2011, 6:25 AM), http://www.bbc.co.uk/news/technology-12419672 (noting that 295
exabytes “is the equivalent of 1.2 billion average hard drives”).
  105   See Greenberg, supra note 67.                                                                R
  106   See Stacey Higginbotham, Data Center Rivals Facebook and Google Pump $700M in New
Construction into Iowa, GIGAOM (Apr. 23, 2013, 1:09 PM), http://gigaom.com/2013/04/
23/data-center-rivals-facebook-and-google-pump-700m-in-new-construction-into-iowa/ (dis-
cussing Facebook’s $300 million investment and Google’s $400 million investment in addi-
tional data centers in Iowa).
  107   Katie Fehrenbacher, Cool Finnish Weather the New Hotness for Data Centers, GIGAOM
(Sept. 12, 2011), http://gigaom.com/2011/09/12/cool-finnish-weather-the-new-hotness-
for-green-data-centers/.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown           Seq: 19          21-JUL-14   12:02
  108    See Quentin Hardy, Big Data Done Cheap, N.Y. TIMES (Mar. 4, 2013, 8:00 AM),
http://bits.blogs.nytimes.com/2013/03/04/big-data-done-cheap/? (discussing develop-
ment of data storage cards that can make ordinary servers, costing thousands of dollars,
perform activities currently done on multimillion-dollar racks of computers).
  109    See Chris Poelker, Will Cloud Computing Kill the Storage Area Network?, COMPUTER
WORLD (Dec. 11, 2012, 6:00 AM), http://blogs.computerworld.com/data-storage/21360/
will-private-cloud-kill-storage-area-network (discussing the availability of cloud storage).
  110    Cf. Jon Brodkin, Bandwidth Explosion: As Internet Use Soars, Can Bottlenecks Be Averted?,
ARS TECHNICA (May 1, 2012, 12:40 PM), http://arstechnica.com/business/2012/05/
bandwidth-explosion-as-internet-use-soars-can-bottlenecks-be-averted/.
  111    See Brian Braiker, Understanding “Cloud Computing,” NEWSWEEK, June 20, 2008,
http://www.newsweek.com/technology-understanding-cloud-computing-90829.
  112    See id.
  113    See Joshua Gruenspecht, “Reasonable” Grand Jury Subpoenas: Asking for Information in
the Age of Big Data, 24 HARV. J.L. & TECH. 543, 548 (2011) (discussing how the increase in
data storage has “practically eliminated the requirement that users clean out their email
inboxes and Internet browsing history periodically in order to free up storage”); Ben
Worthen et al., H-P Explores Quitting Computers as Profits Slide, WALL ST. J., Aug. 19, 2011, at
A1 (discussing H-P’s decision—in the face of declining revenue—to shutdown its tablet
and smartphone operations, and considerations to abandon efforts to sell computers).
  114    See Worthen et al., supra note 113.                                                          R
  115    See Katherine R. Lewis, What the Heck Is Hadoop?, FCW (Mar. 25, 2013), http://fcw.
com/articles/2013/03/25/what-is-hadoop.aspx.
  116    Cade Metz, Meet the Data Brains Behind the Rise of Facebook, WIRED (Feb. 4, 2013, 6:30
AM), http://www.wired.com/wiredenterprise/2013/02/facebook-data-team/.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown           Seq: 20          21-JUL-14   12:02
     There has also been a shift in the sorts of information stored and
collected. Specifically, the past several years have seen significant in-
creases in at least three types of data that could bear on the question
of digital innocence: comprehensive browser-tracking information,
geolocation and mobile location information, and social network
mapping data. The first, comprehensive browser tracking, represents
a change in quantity and quality of data recording. Nearly everything
citizens do online is tracked and logged by advertisers,129 which now
employ more data about users’ online behavior than ever before. A
prime example is Google, which not only tracks user behavior over its
own services (e.g., YouTube, Gmail, and the Google flagship search
engine) but also behavior on any site that carries Google advertising.
Because this represents a very high percentage of the active commer-
 124    Id.
 125    Ryan Gallagher, Defence Giant Builds “Google for Spies” to Track Social Networking Users,
THE GUARDIAN, Feb. 10, 2013, at A1.
 126    See id.
 127    See Justin P. Murphy & Adrian Fontecilla, Social Media Evidence in Government Investi-
gations and Criminal Proceedings: A Frontier of New Legal Issues, 19 RICH. J.L. & TECH. 1, 23–24
(2013) (discussing cases in which MySpace and Facebook accounts contained significant
evidence used by prosecution).
 128    See MANYIKA ET AL., supra note 18, at 2.                                                       R
 129    See Valentino-Devries & Singer-Vine, supra note 64 (noting that of “roughly 70 pop-            R
ular websites that request a login . . . more than a quarter of the time, the sites passed
along a user’s real name, email address or other personal details, such as username, to
third-party companies”).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown          Seq: 22          21-JUL-14   12:02
  130   See Robert Epstein, Google’s Gotcha, U.S. NEWS & WORLD REP. (May 10, 2013),
http://www.usnews.com/opinion/articles/2013/05/10/15-ways-google-monitors-you.
  131   See id.
  132   See Ellen Messmer, Study: 86% of Top Websites Expose Visitors to Third-Party Tracking
Cookies, NETWORK WORLD (June 28, 2012, 12:47 PM), http://www.networkworld.com/
news/2012/062812-tracking-cookies-260544.html.
  133   See id.
  134   See Ryan Gallagher, Microsoft Finally Releases Info About Law Enforcement Shooting on
Skype, Other User Data, SLATE (Mar. 21, 2013, 2:38 PM), http://www.slate.com/blogs/future
_tense/2013/03/21/microsoft_transparency_report_details_law_enforcement_requests_
for_skype.html?wpisrc=obinsite (“The report reveals that in 2012, Microsoft and Skype re-
ceived a total of 75,378 law enforcement requests . . . .”).
  135   See Ellen Nakashima, “Tower Dumps” Give Police Masses of Cellphone Data, WASH. POST,
Dec. 9, 2013, at A1.
  136   See Anton Troianovski, Phone Firms Sell Data on Customers, WALL ST. J., May 22, 2013,
at B1.
  137   See Hansen, supra note 58; see also Andrew E. Kramer, Ukraine’s Opposition Says Gov-       R
ernment Stirs Violence, N.Y. TIMES, Jan. 22, 2014, at A6 (protesters received threatening text
message from ersatz government cellphone tower).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown        Seq: 23         21-JUL-14    12:02
  138   See Cell Phone Tower Records Can Be Crucial in Court Cases, GAZETTE.NET (Nov. 14,
2012), http://www.gazette.net/article/20121114/NEWS/711149556/cell-phone-tower-
records%20-can-be-crucial-in-court-cases&template=gazette.
  139   See Michael Brick, Cellphone Records Help to Clear a Murder Suspect, N.Y. TIMES, Aug.
24, 2007, at B3 (“A man was cleared of murder charges yesterday after offering cellular
telephone records [containing his location] as alibi evidence.”).
  140   See infra Part V.A.2.
  141   See, e.g., Adam Popescu, 3 Must-Have Geolocation Apps, MASHABLE (May 8, 2013),
http://mashable.com/2013/05/08/top-geolocation-apps-you-need/.
  142   See John D. Sutter, What’s Next for “Check-in” Apps?, CNN (Aug. 27, 2010, 10:44 AM),
http://www.cnn.com/2010/TECH/innovation/08/27/checkin.apps/index.html.
  143   See Mathew J. Schwartz, 7 Facts About Geolocation Privacy, INFO. WK. (Aug. 20, 2012,
12:13 PM), http://www.informationweek.com/security/risk-management/7-facts-about-ge
olocation-privacy/d/d-id/1105877? (“While smartphone users may realize that their de-
vices have the capability to track their whereabouts, what they may not know is that other
devices, such as new cameras, also have the capability to know their location and add loca-
tion information to a photograph . . . .” (internal quotation marks omitted)).
  144   See id.
  145   See LEXISNEXIS, LAW ENFORCEMENT PERSONNEL USE OF SOCIAL MEDIA IN INVESTIGA-
TIONS: SUMMARY OF FINDINGS 1, http://images.solutions.lexisnexis.com/Web/LexisNexis/
Infographic-Social-Media-Use-in-Law-Enforcement.pdf.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt    unknown             Seq: 24          21-JUL-14   12:02
value of social media data comes from its availability, its specificity
when tied to Internet protocol (IP) logs or geolocation information,
and the fact that it maps the social networks that often serve as the
broader social contexts for alleged criminal wrongdoing.
     By enhancing pre-digital media, it is also possible to data mine
the past.146 Although analog recordings of video and sound have sup-
ported convictions for years, the tapes are often blurry or the sounds
unclear and therefore subject to challenge. The situation has
changed with the marriage of digital technology with sophisticated
search algorithms.147 This technology may help reveal more informa-
tion from background noise on analog-taped telephone calls or other
recordings than was ascertainable at the time of trial. Likewise, state-
of-the-art graphics programs can resolve blurred features on pre-digi-
tal tapes, which then might show that the wrong person was
convicted.148
     These new types of information could play an ever-larger part in
defense and post-conviction exoneration efforts.149 Obtaining access
to data will be an impediment in such efforts,150 although presumably
the hurdle will be at its lowest for broadly shared social media.151 In-
formation from social media is often publicly posted, publicly stored,
and even publicly searchable for a limited time. It may not be perma-
nently stored outside of the virtual wall of the social network itself,
however, and semi-closed ecosystems like Facebook can be hard to
research. But tweets and blogs are often stored by wayback machines
  146    See, e.g., Maurice Possley, Roberto Cuevas, NAT’L REGISTRY OF EXONERATIONS, https://
www.law.umich.edu/special/exoneration/Pages/casedetail.aspx?caseid=3928 (“[The de-
fendant’s] appellate attorney informed the district attorney’s office that another enhanced
version of the video recording had been made using state of the art technology that al-
lowed for the creation of still photographs. The attorney contended the new photographs
showed that [the defendant] was not involved.”).
  147    See Jeremy Brown, Pan, Tilt, Zoom: Regulating the Use of Video Surveillance of Public
Places, 23 BERKELEY TECH. L.J. 755, 762 (2008) (“The technological constraints that pre-
vented misuse of analog surveillance cameras—grainy images, limited storage capacity, and
difficult duplication—no longer impede video surveillance.”); cf. Ric Simmons, Technology-
Enhanced Surveillance by Law Enforcement Officials, 60 N.Y.U. ANN. SURV. AM. L. 711,
712 (2005) (“These surveillance tools . . . do not provide extraordinarily intrusive
information . . . .”).
  148    For example, Brian Avery was convicted in 1994 of armed robbery based in part on
surveillance videos. Years later, digital enhancement techniques showed that the person in
the videotape was three inches shorter than Avery. See State v. Avery, 807 N.W.2d 638, 654
(Wis. Ct. App. 2011) (granting a new trial on the basis of the new evidence), rev’d, 826
N.W.2d 60, 76–77 (Wis. 2013) (ruling new trial not warranted).
  149    See Robert D. Richards, Compulsory Process in Cyberspace: Rethinking Privacy in the Social
Networking Age, 36 HARV. J.L. & PUB. POL’Y 519, 523 (2013).
  150    See, e.g., Ethan Bronner, Lawyers, Saying DNA Cleared Inmate, Pursue Access to Data,
N.Y. TIMES, Jan. 4, 2013, at A1.
  151    See Gruenspecht, supra note 113, at 544 (“The advent of mass digital storage, how-            R
ever, has significantly increased the chances that records of any given document exist and
is increasingly unifying the locations in which those records can be found.”).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown       Seq: 25         21-JUL-14    12:02
 152     See, e.g., About the Internet Archive, INTERNET ARCHIVE, http://archive.org/about/
(last visited June 28, 2013).
 153     See Google Cached Pages: What Are Cached Pages?, GOOGLE GUIDE, http://www.google
guide.com/cached_pages.html (last visited Jan. 16, 2014).
 154     See Neil M. Richards, The Dangers of Surveillance, 126 HARV. L. REV. 1934, 1957
(2013).
 155     See Ashkan Soltani et al., NSA Using Online “Cookies” to Find Targets, WASH. POST,
Dec. 11, 2013, at A1.
 156     This practice became so widespread that rules governing sponsored advertising
were expanded to include bloggers who received gifts from a company whose products
they reviewed. See Tim Arango, Soon, Bloggers Must Give Full Disclosure, N.Y. TIMES, Oct. 6,
2009, at B3.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown         Seq: 26         21-JUL-14   12:02
 157    See, e.g., Memorandum in Support of Motion for Full Discovery Regarding the Facts
and Circumstances Underlying Surveillance at 16–17, 21–25, 31, 49, United States v.
Mohamud, 941 F. Supp. 2d 1303 (D. Or. 2013) (No. 3:10-cr-00475-KI) [hereinafter
Mohamud Motion] (describing various techniques used by law enforcement).
 158    See Ben Weitzenkorn, Details of 1 Million Facebook Users Sold for $5, NBC NEWS (Oct.
26, 2012, 4:36 PM), http://www.nbcnews.com/technology/details-1-million-facebook-
users-sold-5-1C6714691.
 159    See Bogomil Shopov, Mixed Feelings After My Conversation with Facebook.(updated), A
GROWTH HACKER BLOG, http://talkweb.eu/mixed-feelings-after-my-conversation-with-
facebook/ (last visited Mar. 25, 2014).
 160    See Charles Arthur, iPhone Keeps Record of Everywhere You Go, THE GUARDIAN (Apr. 20,
2011), http://www.theguardian.com/technology/2011/apr/20/iphone-tracking-prompts-
privacy-fears; Greg Kumparak, AT&T Considers Selling Your Browsing History, Location, and
More to Advertisers. Here’s How to Opt Out, TECHCRUNCH (July 5, 2013), http://techcrunch.
com/2013/07/05/att-considers-selling-your-browsing-history-location-and-more-to-adverti
sers-heres-how-to-opt-out/.
 161    See James Glanz et al., Spy Agencies Tap Data Streaming from Phone Apps, N.Y. TIMES,
Jan. 28, 2014, at A1.
 162    Google Glass—What It Does, GOOGLE, http://www.google.com/glass/start/what-it-
does/ (last visited Aug. 25, 2013).
 163    See Julia Angwin & Jennifer Valentino-Devries, Apple, Google Collect User Data, WALL
ST. J. (Apr. 22, 2011), http://online.wsj.com/news/articles/SB1000142405274870398
3704576277101723453610.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt          unknown     Seq: 27          21-JUL-14    12:02
                                                     III
                             THE LAW         OF   DIGITAL SURVEILLANCE
     Given the technological basis for digital innocence—as a func-
tion of the growth in database size, the wealth of new types of informa-
tion stored, and the increase in the ability to connect more data
points to new types of information—this Part addresses the legal foun-
dation for the current state of government surveillance, including
how the government got access to Big Data. This implicates elements
of standard Fourth Amendment doctrine as well as the shadowy re-
gime of government surveillance in service of national security. The
jurisprudence helps frame a discussion of the legal basis for and im-
pediments to defense access to proof of digital innocence.
 164     See, e.g., Olmstead v. United States, 277 U.S. 438, 465–66 (1928).
 165     See Nardone v. United States, 308 U.S. 338, 339 (1939); Nardone v. United States,
302 U.S. 379, 380–85 (1937).
 166     See, e.g., Herbert Brownell, Jr., The Public Security and Wire Tapping, 39 CORNELL L.Q.
195, 197–200 (1954); Richard G. Donnelly, Comments and Caveats on the Wire Tapping Contro-
versy, 63 YALE L.J. 799, 799–801 (1954).
 167     389 U.S. 347 (1967).
 168     Id. at 352.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown            Seq: 28          21-JUL-14   12:02
test for when state action implicates the Fourth Amendment would be
interpreted as requiring an expectation of privacy that “society is pre-
pared to recognize as ‘reasonable.’”169 Somewhat ironically, the case
that safeguarded conversations by telephone, one of the seminal
breakthroughs in modern communications, did not provide much
protection against subsequent advances of technology. More often
than not, the Supreme Court has held that a given investigative tech-
nique does not violate a reasonable expectation of privacy and there-
fore does not trigger the Fourth Amendment at all.170
      Two features of this jurisprudence are especially important for
electronic surveillance: (1) data about data (i.e., metadata) may be
considered deficient of any content that might engender a privacy ex-
pectation,171 and (2) data may lose the protection afforded by a rea-
sonable expectation of privacy once the information is provided to
third parties.172 Thus, the government may eavesdrop on otherwise
private conversations in residences transmitted by wired infor-
mants,173 obtain records detailing an individual’s otherwise private fi-
nancial information,174 and install pen registers on home phone
numbers to determine whom someone is calling.175 In the latter
  169   Id. at 361 (Harlan, J., concurring); see also Erik Luna, The Katz Jury, 41 U.C. DAVIS L.
REV. 839, 842–43 (2008) (discussing the basis and evolution of the Katz standard).
  170   See, e.g., Illinois v. Caballes, 543 U.S. 405, 407–10 (2005) (use of a narcotics-detec-
tion dog during a lawful traffic stop); Florida v. Riley, 488 U.S. 445, 450–52 (1989) (obser-
vations of a private greenhouse from a helicopter 400 feet away); California v. Greenwood,
486 U.S. 35, 39–44 (1988) (warrantless search and seizure of garbage left on the street for
collection); United States v. Dunn, 480 U.S. 294, 300–03 (1987) (investigation, without
physically entering, of a barn outside the curtilage of a private house); California v.
Ciraolo, 476 U.S. 207, 212–15 (1986) (observations of a private backyard from a private
airplane); Dow Chem. Co. v. United States, 476 U.S. 227, 234–39 (1986) (aerial photogra-
phy taken from public navigable airspace); Oliver v. United States, 466 U.S. 170, 176–77
(1984) (government intrusion on open fields); United States v. Jacobsen, 466 U.S. 109,
118–26 (1984) (DEA agents’ warrantless search and seizure of a package after the owner’s
privacy interest was compromised); United States v. Place, 462 U.S. 696, 700–07 (1983)
(subjecting personal luggage to a “canine sniff”).
  171   See Smith v. Maryland, 442 U.S. 735, 741–43 (1979).
  172   See United States v. Miller, 425 U.S. 435, 442–44 (1976).
  173   See United States v. White, 401 U.S. 745, 746–54 (1971).
  174   See United States v. Payner, 447 U.S. 727, 741–42 (1980) (loan guarantee); Miller,
425 U.S. at 440–45 (copies of checks and deposit slips retained by bank); Couch v. United
States, 409 U.S. 322, 335–36 (1973) (financial records given to accountant).
  175   See Smith, 442 U.S. at 741–46. As defined by statute, a pen register “records or
decodes dialing, routing, addressing, or signaling information transmitted by an instru-
ment or facility from which a wire or electronic communication is transmitted.” 18 U.S.C.
§ 3127(3) (2012). By contrast, a trap and trace device “captures the incoming electronic
or other impulses which identify the originating number or other dialing, routing, address-
ing, and signaling information reasonably likely to identify the source of a wire or elec-
tronic communication.” 18 U.S.C. § 3127(4). Neither pen registers nor trap and trace
devices are supposed to include the contents of communications. Although Smith only
concerned pen registers, its logic has been applied to trap and trace devices as well. See,
e.g., United States v. Hallmark, 911 F.2d 399, 402 (10th Cir. 1990) (citing Smith for the
proposition that “[t]he installation and use of a pen register and trap and trace device is
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown        Seq: 29         21-JUL-14    12:02
not a ‘search’ requiring a warrant pursuant to the Fourth Amendment”); S. Bell Tel. & Tel.
Co. v. Hamm, 409 S.E.2d 775, 780 (S.C. 1991) (“In light of the holding in Smith, we cannot
hold that the telephone number of the equipment from which a call has been placed is
entitled to more privacy than the telephone numbers called by someone.”).
 176    Smith, 442 U.S. at 744–45.
 177    533 U.S. 27, 29–30 (2001).
 178    Id. at 34.
 179    Id. at 35.
 180    See United States v. Karo, 468 U.S. 705 (1984); United States v. Knotts, 460 U.S. 276
(1983).
 181    Knotts, 460 U.S. at 284.
 182    132 S. Ct. 945 (2012).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown        Seq: 30         21-JUL-14   12:02
  183   “By means of signals from multiple satellites, the device established the vehicle’s
location within 50 to 100 feet, and communicated that location by cellular phone to a
Government computer.” Id. at 948.
  184   Id. at 952.
  185   Justice Sotomayor provided the critical fifth vote in support of Justice Scalia’s
trespassory test for Fourth Amendment protection where “the Government obtains infor-
mation by physically intruding on a constitutionally protected area.” Id. at 954
(Sotomayor, J., concurring) (quoting majority opinion). But she also agreed with a four-
member concurrence that, “at the very least, ‘longer term GPS monitoring in investiga-
tions of most offenses impinges on expectations of privacy.’” Id. at 955 (quoting Justice
Samuel Alito’s concurrence).
  186   Id. at 955.
  187   Id. at 957 (citing Smith v. Maryland, 442 U.S. 735, 742 (1979); United States v.
Miller, 425 U.S. 435, 443 (1976)).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown        Seq: 31          21-JUL-14    12:02
       sure to the Government of a list of every Web site they had visited in
       the last week, or month, or year. But whatever the societal expecta-
       tions, they can attain constitutionally protected status only if our
       Fourth Amendment jurisprudence ceases to treat secrecy as a pre-
       requisite for privacy.188
     The opinion underscores the potential danger of a third-party ex-
ception in the age of Big Data technology, although the actual state of
affairs has already gone beyond the world Justice Sotomayor describes.
She expressed concern about a state of affairs in which any record for
any person could be disclosed to the government, retrospectively. But
as discussed below,189 the third-party exception has been expanded to
require disclosure of every record regarding every person,
prospectively.190
 188    Id.
 189    See infra Part III.C.
  190   See infra Part III.C.
  191   Katz v. United States, 389 U.S. 347, 357 (1967).
  192   Id. at 358 n.23; see also id. at 363–64 (White, J., concurring) (noting that the deci-
sion did not address national security cases).
  193   Pub. L. No. 90-351, 82 Stat. 197 (1968) (codified as amended at 18 U.S.C.
§§ 2510–2522 (2012)). Congress was reacting not only to Katz but also to Berger v. New
York, 388 U.S. 41 (1967), which had struck down a state eavesdropping statute.
  194   Title III wiretaps involve a detailed application process and are subject to limita-
tions on duration and scope, including procedures that minimize the capture of innocent
communications. See 18 U.S.C. § 2518(3) (2012).
  195   18 U.S.C. § 2511(3) (1970), repealed by Foreign Intelligence Surveillance Act of
1978, Pub. L. No. 95-511, § 201(c), 92 Stat. 1783, 1797.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown         Seq: 32         21-JUL-14   12:02
     In its review of Title III in United States v. U.S. District Court (Keith),
the Supreme Court held that warrantless domestic wiretapping was
unconstitutional even when done for national security purposes.196
The Keith Court did acknowledge that the focus of intelligence surveil-
lance “may be less precise than that directed against more conven-
tional types of crime.”197 Moreover, different standards “may be
compatible with the Fourth Amendment if they are reasonable both
in relation to the legitimate need of Government for intelligence in-
formation and the protected rights of our citizens.”198 Although the
Court denied that it was attempting “to guide the congressional judg-
ment” in this area, it offered some direction for subsequent legisla-
tion, in which a showing of probable cause could be different than in
traditional criminal investigations, the time and reporting require-
ments may be less strict, and, “in sensitive cases,” applications for prior
judicial authorization might be made to “a specially designated
court.”199
     Around the same time, media exposés and congressional investi-
gations revealed a troubling history of executive branch abuses for the
sake of national security.200 Much of this came to light in the mid-
1970s through the reports of the so-called “Church Committee,” a
U.S. Senate committee tasked with scrutinizing the exploits of Ameri-
can intelligence agencies.201 The Church Committee found that
“[i]ntelligence agencies pursued a ‘vacuum cleaner’ approach to in-
 202     CHURCH COMMITTEE BOOK II, supra note 200, at 165, 178. For instance, the NSA            R
obtained copies of almost all telegrams to or from the United States, involving the private
communications of millions of U.S. citizens, in what was at that time “the largest govern-
mental interception program affecting Americans ever undertaken.” SELECT COMM. TO
STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO INTELLIGENCE ACTIVITIES, SUPPLEMEN-
TARY DETAILED STAFF REPORTS ON INTELLIGENCE ACTIVITIES AND THE RIGHTS OF AMERICANS,
BOOK III, S. REP. NO. 94-755, at 765 (1976).
 203     CHURCH COMMITTEE BOOK II, supra note 200, at 5.                                         R
 204     Meet the Press (NBC television broadcast Aug. 17, 1975) (comments of Sen.
Church), available at http://www.youtube.com/watch?v=9DjJKYYb5-4.
 205     Foreign Intelligence Surveillance Act of 1978, Pub. L. No. 95-511, 92 Stat. 1783
(codified at 50 U.S.C. §§ 1801–1885c (2006 & Supp. V 2011)).
 206     S. REP. NO. 95-604, at 7 (1977).
 207     S. REP. NO. 95-701, at 9 (1978).
 208     See id. at 11, 15–16 (discussing Keith).
 209     See 50 U.S.C. § 1803(a), (c) (2006 & Supp. V 2011). A subsequent amendment
extended that authority to issuing court orders to conduct physical searches for foreign
intelligence purposes. See Intelligence Authorization Act for Fiscal Year 1995, Pub. L. No.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown          Seq: 34         21-JUL-14   12:02
103-359, § 807, 108 Stat. 3423, 3443 (1994) (codified at 50 U.S.C. §§ 1821–1824 (2006 &
Supp. V 2011)).
  210    See 50 U.S.C. § 1803(b). If the FISCR upholds the denial of an order, the U.S.
Supreme Court may hear the case by writ of certiorari. The FISCR is composed of three
judges. The FISC is composed of eleven judges drawn from at least seven of the twelve
judicial circuits. At least three of the FISC judges must reside within twenty miles of the
District of Columbia. The Chief Justice of the U.S. Supreme Court designates district court
judges to serve on the FISC, as well as appellate or district court judges to serve on the
FISCR. See id. § 1803(a)(1), (b). The judges on both courts serve seven-year, staggered
terms, and they may only serve once on either the FISC or FISCR. See id. § 1803(d).
  211    See id. § 1802(a)(1)(B). But see infra notes 281–82 and accompanying text (discuss-      R
ing inevitable interception of communications by U.S. persons).
  212    50 U.S.C. § 1801(i) (2006 & Supp. V 2011).
  213    Id. § 1805(a)(2) (2006 & Supp. V 2011). This is different from probable cause in
the traditional sense, that is, reasonable grounds to believe that a crime has been or is
about to be committed, and evidence of that crime will be obtained by the proposed
search. See, e.g., Brinegar v. United States, 338 U.S. 160, 175–76 (1949) (providing classic
formulation of probable cause). Nonetheless, the courts found that FISA’s “requirements
provide an appropriate balance between the individual’s interest in privacy and the govern-
ment’s need to obtain foreign intelligence information, and that FISA does not violate the
probable cause requirement of the Fourth Amendment.” United States v. Duggan, 743
F.2d 59, 74 (2d Cir. 1984).
  214    50 U.S.C. § 1801(a)–(b). Subject to certain requirements, the Attorney General
may authorize foreign intelligence surveillance in an emergency situation without a court
order. See id. § 1805(e).
  215    Id. § 1801(h)(1); see, e.g., In re All Matters Submitted to the Foreign Intelligence
Surveillance Court, 218 F. Supp. 2d 611, 617–18 (Foreign Intelligence Surveillance Ct.
2002) (describing some of the minimization procedures).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown        Seq: 35         21-JUL-14    12:02
  216    50 U.S.C. § 1805(a)(4). The Attorney General must approve each application
“based upon his finding that it satisfies the criteria and requirements” of FISA. Id.
§ 1804(a) (2006 & Supp. V 2011). Among other things, the application must include a
certification by the National Security Advisor (or another high-ranking official designated
by the President) that the information sought is foreign intelligence information, that the
purpose of the surveillance is to gather such information, and that this information cannot
reasonably be obtained by normal investigative techniques. Id. § 1804(a)(6). The term
“[f]oreign intelligence information” means information relating to “the ability of the
United States to protect against” hostile actions of a foreign power or agent of a foreign
power, including actual or potential attacks, clandestine intelligence activities, sabotage,
and international terrorism. Id. § 1801(e). When the target is a United States person, the
FISC judge must determine that the certifications are not clearly erroneous based on the
statements provided. Id. § 1805(a)(4). A similar process applies to applications for FISA
orders to conduct physical searches. Id. § 1824.
  217    See id. § 1803(c) (2006 & Supp. V 2011).
  218    See Intelligence Authorization Act for Fiscal Year 1999, Pub. L. 105-272, § 601, 112
Stat. 2396, 2404 (1998) (codified as amended at 50 U.S.C. §§ 1841–1846 (2006 & Supp. V
2011)).
  219    See id.
  220    50 U.S.C. § 1862(b)(2)(B) (2000).
  221    See 18 U.S.C. § 2516(8)(d) (2012) (requiring that the target be notified of the sur-
veillance within ninety days of the wiretap’s termination).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown            Seq: 36          21-JUL-14   12:02
  222   See United States v. Johnson, 952 F.2d 565, 572 (1st Cir. 1991); United States v.
Pelton, 835 F.2d 1067, 1076 (4th Cir. 1987); United States v. Badia, 827 F.2d 1458, 1464
(11th Cir. 1987); United States v. Duggan, 743 F.2d 59, 77–78 (2d Cir. 1984).
  223   In re Sealed Case, 310 F.3d 717, 727–28 (Foreign Intelligence Surveillance Ct. Rev.
2002). See generally Diane C. Piette & Jesselyn Radack, Piercing the “Historical Mists”: The
People and Events Behind the Passage of FISA and the Creation of the “Wall,” 17 STAN. L. & POL’Y
REV. 437 (2006).
  224   Since its establishment, the CIA was tasked with collecting intelligence outside of
the United States but was given “no police, subpoena, or law enforcement powers or inter-
nal security functions.” National Security Act of 1947, § 102(d), Pub. L. No. 80-253 (codi-
fied at 50 U.S.C. § 3036). In turn, the FBI was responsible for domestic surveillance,
including gathering foreign intelligence within the United States. Various agencies within
the Department of Defense were concerned with military-related intelligence both at home
and abroad; for instance, the NSA collected and processed signals intelligence, a term that
includes all forms of communication using the electromagnetic spectrum. In December
1981, President Reagan formalized the division by issuing an executive order that, among
other things, barred the CIA and military intelligence agencies from engaging in domestic
electronic surveillance unless coordinated with the FBI. See Exec. Order No. 12,333, 46
Fed. Reg. 59,941 (Dec. 4, 1981).
  225   Exec. Order No. 12,333, pt. 1.1, 46 Fed. Reg. 59,941 (Dec. 4, 1981).
  226   See, e.g., NAT’L COMM’N ON TERRORIST ATTACKS UPON THE U.S., THE 9/11 COMMIS-
SION REPORT, at xvi, 80, 263–65, 353–57, 399–406, 409 (2004) [hereinafter 9/11 COMMIS-
SION REPORT] (describing and critiquing the foreign-domestic divide).
  227   See, e.g., Sealed Case, 310 F.3d at 723–27 (concluding that “primary purpose” re-
quirement was not mandated by FISA itself); 9/11 COMMISSION REPORT, supra note 224, at
78–80, 270–72 (describing misinterpretation of wall requirements).
  228   9/11 COMMISSION REPORT, supra note 226, at 353.                                              R
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown           Seq: 37          21-JUL-14    12:02
 229     OFFICE OF THE INSPECTOR GEN., U.S. DEP’T OF JUSTICE, A REVIEW OF THE FBI’S HAN-
DLING OF INTELLIGENCE INFORMATION          RELATED TO THE SEPTEMBER 11 ATTACKS 21–22 (2004).
  230    See Uniting and Strengthening America by Providing Appropriate Tools Required
to Intercept and Obstruct Terrorism Act (Patriot Act) of 2001, Pub. L. No. 107-56, 115 Stat.
272 (codified as amended in scattered sections of the U.S. Code).
  231    See, e.g., Administration’s Draft Anti-Terrorism Act of 2001: Hearing Before the H. Comm.
on the Judiciary, 107th Cong. 57–59 (2001) (comments of Rep. Bob Barr).
  232    See Patriot Act § 218 (codified at 50 U.S.C. §§ 1804(a)(6)(B), 1823(a)(6)(B) (2006
& Supp. V 2011)).
  233    One provision allows the disclosure of foreign intelligence and counterintelligence
information uncovered during the course of criminal investigations—including informa-
tion obtained by grand juries and Title III surveillance—to “any Federal law enforcement,
intelligence, protective, immigration, national defense, or national security official.” Id.
§ 203 (codified at FED. R. CRIM. P. 6(e)(3) and 18 U.S.C. § 2517(6) (2012)). Another
provision permits federal officials conducting foreign intelligence surveillance to consult
with law enforcement officers to coordinate efforts to investigate or protect against actual
or potential attacks, sabotage, international terrorism, and clandestine intelligence activi-
ties by foreign powers or their agents. Id. § 504 (codified at 50 U.S.C. §§ 1806(k), 1825(k)
(2006 & Supp. V 2011)).
  234    See id. § 905 (codified at 50 U.S.C. § 403-5b(a)(1) (2006 & Supp. V 2011)); Memo-
randum from John Ashcroft, U.S. Att’y Gen., to FBI Director et al., Intelligence Sharing
Procedures for Foreign Intelligence and Foreign Counterintelligence Investigations Con-
ducted by the FBI (Mar. 6, 2002), available at http://www.fas.org/irp/agency/doj/fisa/
ag030602.html.
  235    See, e.g., In re Sealed Cases, 310 F.3d 717, 736–46 (Foreign Intelligence Surveillance
Ct. Rev. 2002) (upholding amendments); United States v. Abu-Jihaad, 630 F.3d 102, 120
(2d Cir. 2010) (collecting cases).
  236    Mayfield v. United States, 504 F. Supp. 2d 1023, 1036–37 (D. Or. 2007), rev’d on
other grounds, 599 F.3d 964 (9th Cir. 2010).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown         Seq: 38         21-JUL-14   12:02
   C. Mass Surveillance
     In October 2001, President Bush secretly authorized the NSA to
conduct warrantless eavesdropping on international communications
and to engage in bulk collection of metadata on telephone and
Internet communications.249 In 2004, in response to a near revolt by
high-ranking Justice Department and FBI officials,250 the bulk collec-
tion of Internet metadata was transitioned from a warrantless program
to one requiring FISC authorization.
     To achieve this feat, the government made the remarkable claim
that FISA’s pen register/trap and trace (PR/TT) provisions could be
used to collect the metadata for e-mail communications by millions of
  245   See USA PATRIOT Improvement Reauthorization Act of 2005, Pub. L. No. 109-177,
§ 106, 120 Stat. 192 (2006).
  246   See 50 U.S.C. § 1861(b)(2)(A). The items sought would be presumptively relevant
to an investigation if the government shows that they pertain to a foreign power or its
agents. See id.
  247   See id. § 1861(a)(3), (g). High-level FBI approval is also required for book sales
records, book customer lists, firearms sales records, tax return records, educational
records, and medical records. See id. § 1861(a)(3). In addition, the amendments de-
manded the adoption of minimization procedures for the retention and dissemination of
information; required approval at the national level of the FBI when demanding records
that raise certain constitutional sensitivities, including information from libraries; and al-
lowed recipients to disclose the order to an attorney for purposes of legal advice and to
seek judicial review of an order in the FISC. See id. § 1861(c)(2)(D), (d)(1), (f). Although
the production order may be challenged immediately, the recipient must wait a year
before seeking review of a nondisclosure order. See id. § 1861(f)(2)(A)(i). Moreover, a
FISC judge must treat a high-level certification, made in good faith, as conclusive “that
disclosure may endanger the national security of the United States or interfere with diplo-
matic relations.” Id. § 1861(f)(2)(C)(ii).
  248   See Citing Improvements to Law, ACLU Withdraws Section 215 Case but Vows to Fight
Individual Orders, AM. C.L. UNION (Oct. 27, 2006), http://www.aclu.org/national-security/
citing-improvements-law-aclu-withdraws-section-215-case-vows-fight-individual-orde (last vis-
ited Feb. 15, 2014).
  249   DNI Announces the Declassification of the Existence of Collection Activities Authorized by
President George W. Bush Shortly After the Attacks of September 11, 2001, IC ON THE RECORD (Dec.
21, 2013) [hereinafter DNI Announces], http://icontherecord.tumblr.com/post/70683717
031/dni-announces-the-declassification-of-the.
  250   See, e.g., OFFICES OF THE INSPECTORS GEN., U.S. DEP’T OF DEFENSE ET AL., UNCLASSI-
FIED REPORT ON THE PRESIDENT’S SURVEILLANCE PROGRAM 21–27 (2009) [hereinafter OIG
Report] (describing incidents); Gellman, supra note 4 (same).                                          R
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown            Seq: 40          21-JUL-14   12:02
  251    Opinion and Order at 1–2, 23, 39, 58, [redacted], No. PR/TT [redacted] (Foreign
Intelligence Surveillance Ct. [redacted]) [hereinafter Kollar-Kotelly Opinion], available at
http://www.dni.gov/files/documents/1118/CLEANEDPRTT%201.pdf.
  252    See id. at 58–66.
  253    See supra Part III.A.
  254    442 U.S. 735 (1979); Kollar-Kotelly Opinion, supra note 251, at 59–62.
  255    50 U.S.C. § 1842(a)(1),(c)(2) (2006 & Supp. V 2011); see Kollar-Kotelly Opinion,
supra note 251, at 48–49. The court ignored obvious signs that the PR/TT scheme was                  R
aimed at “the micro scale, not the macro scale.” Orin Kerr, Problems with the FISC’s Newly-
Declassified Opinion on Bulk Collection of Internet Metadata, LAWFARE (Nov. 19, 2013, 2:35 AM),
http://www.lawfareblog.com/2013/11/problems-with-the-fiscs-newly-declassified-opinion-
on-bulk-collection-of-internet-metadata/. It also failed to appreciate the critical differ-
ences between the Internet transactional data at issue in the NSA program and the type of
phone call data involved in Smith. Julian Sanchez, Are Internet Backbone Pen Registers Constitu-
tional?, JUST SECURITY (Sept. 23, 2013, 7:55 PM), http://justsecurity.org/2013/09/23/inter
net-backbone-pen-registers-constitutional/.
  256    See supra note 4 and accompanying text.                                                     R
  257    See Leslie Cauley, NSA Has Massive Database of Americans’ Phone Calls, USA TODAY,
May 11, 2006, at A1 (phone call records); James Risen & Eric Lichtblau, Bush Lets U.S. Spy
on Callers Without Courts, N.Y. TIMES, Dec. 16, 2005, at A1 (eavesdropping).
  258    See, e.g., GEORGE W. BUSH, REMARKS ON THE TERRORIST SURVEILLANCE PROGRAM
(2006); 1 PUBLIC PAPERS OF THE PRESIDENTS OF THE UNITED STATES: GEORGE W. BUSH 917
(2006) (“We’re not mining or trolling through the personal lives of millions of innocent
Americans. Our efforts are focused on links to al Qaida and their known affiliates.”).
  259    Compare U.S. DEP’T OF JUSTICE, LEGAL AUTHORITIES SUPPORTING THE ACTIVITIES OF
THE NATIONAL SECURITY AGENCY DESCRIBED BY THE PRESIDENT (2006), available at http://
www.justice.gov/opa/whitepaperonnsalegalauthorities.pdf (Justice Department
whitepaper providing some of the underlying reasoning for the NSA’s activities), and Let-
ter from William E. Moschella, Assistant Att’y Gen., to Pat Roberts, Chairman, Senate Se-
lect Comm. on Intelligence et al. (Dec. 22, 2005), available at http://www.justice.gov/ag/
readingroom/surveillance6.pdf (similar arguments offered in letter from Assistant Attor-
ney General), with Letter from Curtis A. Bradley et al., to Congressional Leadership (Feb.
2, 2006), reprinted at 81 IND. L.J. 1415 (2006) (critiquing Justice Department white paper),
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown         Seq: 41          21-JUL-14    12:02
and Letter from Curtis A. Bradley et al., to Congressional Leadership (Jan. 9, 2006), re-
printed at 81 IND. L.J. 1364 (2006) (critiquing Moschella letter).
  260    See DNI Announces, supra note 249 (noting the transitioning of both programs to the         R
FISC).
  261    See Memorandum of Law in Support of Application for Certain Tangible Things for
Investigations to Protect Against International Terrorism, In re FBI for an Order Requiring
the Production of Tangible Things from [redacted], No. BR 06-05, at 2 (Foreign Intelli-
gence Surveillance Ct. May 23, 2006), available at https://www.eff.org/document/br-06-05-
memo-law.
  262    See Order, In re FBI for an Order Requiring the Production of Tangible Things
from [redacted], No. BR 06-05, at 2 (Foreign Intelligence Surveillance Ct. May 24, 2006),
available at http://www.dni.gov/files/documents/section/pub_May%2024%202006%20
Order%20from%20FISC.pdf.
  263    See, e.g., Ellen Nakashima, FISA Court Releases Ruling Upholding Phone Program, WASH.
POST, Sept. 18, 2013, at A4 (quoting ACLU’s Jameel Jaffer, who described the opinion as “a
document that appears to have been cobbled together over the last few weeks in an effort
to justify a decision that was made seven years ago”).
  264    In re FBI for an Order Requiring Production of Tangible Things from [redacted],
No. BR 13-109, 2013 WL 5741573, at *1 (Foreign Intelligence Surveillance Ct. Aug. 29,
2013) [hereinafter Eagan Opinion].
  265    Id. at *6.
  266    Also known as legislative ratification, the doctrine presumes the legislature appreci-
ates and adopts a judicial or administrative interpretation of a statute that lawmakers subse-
quently reenact without change. See Forest Grove Sch. Dist. v. T.A., 557 U.S. 230, 239–40
(2009); Lorillard v. Pons, 434 U.S. 575, 580 (1978).
  267    See Eagan Opinion, supra note 264, at *8–9 (discussing legislative reenactment in           R
the context of section 215); PATRIOT Sunsets Extension Act of 2011, Pub. L. No. 112-14,
125 Stat. 216 (codified in scattered sections of 50 U.S.C.) (reauthorizing section 215).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt    unknown            Seq: 42          21-JUL-14   12:02
  268    Id. at *2–3. Like the PR/TT opinion, the FISC’s section 215 opinion leaves much
to be desired. “Congress intended [section 215] to allow the intelligence communities to
access targeted information for specific investigations,” said Representative Jim Sensen-
brenner, one of the sponsors of the Patriot Act. “How can every call that every American
makes or receives be relevant to a specific investigation?” Jim Sensenbrenner, This Abuse of
the Patriot Act Must End, THE GUARDIAN (June 9, 2013, 7:00 AM), http://www.theguardian.
com/commentisfree/2013/jun/09/abuse-patriot-act-must-end. He later wrote in a letter
to Attorney General Eric Holder, “The administration’s interpretation to allow for bulk
collection is at odds with Congressional intent and with both the plain and legal meanings
of ‘relevance.’” Letter from F. James Sensenbrenner Jr., Rep., to Eric Holder, U.S. Att’y
Gen. (Sept. 6, 2013), available at http://sensenbrenner.house.gov/uploadedfiles/sensen
brenner_letter_to_attorney_general_eric_holder.pdf. As for reliance on the doctrine of
legislative reenactment, Sensenbrenner and other members of Congress have said they
were not briefed on the expansive interpretation of section 215. See, e.g., Jim Sensenbren-
ner, How Obama Has Abused the Patriot Act, L.A. TIMES (Aug. 19, 2013), http://articles.
latimes.com/2013/aug/19/opinion/la-oe-sensenbrenner-data-patriot-act-obama-20130819
(“As I have said numerous times, I did not know the administration was using the Patriot
Act for bulk collection, and neither did a majority of my colleagues.”). But see ACLU v.
Clapper, 959 F. Supp. 2d 724, 745 n.13 (S.D.N.Y. 2013) (questioning Rep. Sensenbrenner’s
claim of ignorance). In addition, the FISC’s opinion failed to grapple with the disparity
between the limited information gleaned by the now-archaic pen register in Smith versus
the far richer telephony metadata gathered by the NSA. Jennifer Granick, Debate: Metadata
and the Fourth Amendment, JUST SECURITY (Sept. 23, 2013, 2:00 PM), http://justsecurity.org/
2013/09/23/metadata-fourth-amendment/. Perhaps the most troubling lapse in the opin-
ion, however, was the absence of any mention, let alone discussion, of the Supreme Court’s
groundbreaking 2012 decision on high-tech surveillance and the Fourth Amendment,
United States v. Jones, 132 S. Ct. 945 (2012). See supra notes 182–90 and accompanying text           R
(discussing Jones).
  269    But there were some warning signs. For instance, a few lawmakers spoke out about
secret constructions of surveillance authority. “I want to deliver a warning this afternoon,”
said Senator Ron Wyden during a 2011 floor debate. “When the American people find out
how their government has secretly interpreted the Patriot Act, they will be stunned and
they will be angry.” Charlie Savage, Senators Say Patriot Act Is Being Misinterpreted, N.Y. TIMES,
May 27, 2011, at A17 (quoting Sen. Ron Wyden); see also Letter from Ron Wyden & Mark
Udall, Sens., to Eric Holder, U.S. Att’y Gen. (Sept. 21, 2011), available at https://
s3.amazonaws.com/s3.documentcloud.org/documents/250829/wyden-udall-letter-to-
holder-on-wiretapping.pdf (expressing concerns that “Justice Department officials have—
on a number of occasions—made what we believe are misleading statements pertaining to
the government’s interpretation of surveillance law,” and warning that “Americans will
eventually and inevitably come to learn about the gap that currently exists between the
public’s understanding of government surveillance authorities and the official, classified
interpretation of these authorities”). Around this time, one could discern a sizeable in-
crease in the use of section 215. See Ellen Nakashima, FBI Heads to Court More Often to
Obtain Data on Personal Internet Usage, WASH. POST, Oct. 26, 2011, at A6 (detailing increase
in business record requests); Foreign Intelligence Surveillance Act Court Orders 1979–2012,
EPIC, http://epic.org/privacy/wiretap/stats/fisa_stats.html (last updated May 4, 2012)
(listing by year number of FISA applications for business records).
  270    See Department of Justice Oversight: Hearings Before the S. Comm. on the Judiciary, 110th
Cong. 6–7 (2007) (statement of Alberto Gonzales, U.S. Att’y Gen.) (noting that FISC had
approved electronic surveillance).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown        Seq: 43         21-JUL-14    12:02
  271   For a half year, the surveillance program was governed by the Protect America Act
(PAA) of 2007, Pub. L. No. 110-55, 121 Stat. 552 (2007). Although short-lived, it was the
subject of the second opinion ever issued by the FISCR. See In re Directives [redacted] Pur-
suant to Section 105B of Foreign Intelligence Surveillance Act, 551 F.3d 1004, 1011 (For-
eign Intelligence Surveillance Ct. Rev. 2008). The PAA was replaced by the FISA
Amendments Act (FAA) of 2008, Pub. L. No. 110-261, 122 Stat. 2436 (2008).
  272   50 U.S.C. § 1881a (2006 & Supp. V 2011).
  273   See, e.g., Amnesty Int’l USA v. Clapper, 638 F.3d 118, 124 (2d Cir. 2011) (describing
differences between section 702 and approach under preexisting FISA scheme), rev’d, 133
S. Ct. 1138 (2013).
  274   See 50 U.S.C. § 1881a(a), (c)(1), (i)(2), (i)(3).
  275   Brief for Respondents at 11, Clapper v. Amnesty Int’l USA, 133 S. Ct. 1138 (2013)
(No. 11-1025); see also Amnesty Int’l USA, 638 F.3d at 126 (listing Russia, Venezuela, and
Israel as potential areas of foreign policy interest).
  276   Clapper, 133 S. Ct. at 1145–56. Among other things, the “communications include
discussions with family members of those detained at Guantanamo, friends and acquaint-
ances of those persons, and investigators, experts and others with knowledge of circum-
stances related to terrorist activities.” Id. at 1158–59 (Breyer, J., dissenting).
  277   Complaint for Declaratory and Injunctive Relief at ¶ 1, Amnesty Int’l USA v.
McConnell, No. 08 CIV 6259(JGK), 646 F. Supp. 2d 633 (S.D.N.Y. Aug. 20, 2009).
  278   See Clapper, 133 S. Ct. at 1147–55.
  279   Id. at 1159.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt    unknown         Seq: 44         21-JUL-14   12:02
the Government is doing its job (to find out about, and combat,
terrorism).”280
     The government did not deny that communications by U.S. per-
sons had been captured under section 702. Apologists for the pro-
gram claim it is impossible not to examine discussions by Americans
when using technology that collects millions of electronic messages,
and, in fact, the inability to distinguish communications of Americans
from those of foreigners was “one of the main things that drove” the
government to press for the changes in the FAA.281 Reportedly, NSA
analysts use search terms designed to create at least 51% confidence
in a target’s “foreignness”282—hardly a rigorous standard and one vir-
tually guaranteed to collect domestic communications. After Clapper,
however, it seemed possible that the government would fully employ
its powers under the FAA, countless communications of Americans
would be captured thereby, and yet no one would ever be able to chal-
lenge the law.
                                               IV
                       DEFENSE RIGHTS        AND POTENTIAL BARRIERS
     All told, the government has the ability to track and record every
aspect of someone’s online life—and much of his offline, real-world
behavior too.283 Both Congress and the courts have facilitated domes-
tic spying by creating a legal environment in which the government is
only loosely bound by legislation and largely unchecked by meaning-
ful judicial review, allowing the executive branch to take aggressive
stances on statutory and constitutional interpretation that have largely
eliminated any previous constraints on surveillance ostensibly for for-
eign intelligence purposes.284 Given the government’s ability to draw
upon Big Data information, the issue here is the basic rights of crimi-
nal defendants to access that information as well. The following lays
the groundwork for an extension of these rights to evidence of digital
innocence. This Part then reviews two of the primary arguments likely
to be made to deprive defendants of their rights of access: the state
secrets privilege and agency alignment.
 280     Id. at 1160 (Breyer, J., dissenting); see also Transcript of Oral Argument at 25–26,
Clapper v. Amnesty Int’l USA, 133 S. Ct. 1138 (2013) (No. 11-1025) (remarks of Justice
Anthony Kennedy that “it’s hard for me to think that the government isn’t using all of the
powers at its command under the law . . . in order to protect this country”).
 281     James Risen & Eric Lichtblau, Extent of E-mail Surveillance Renews Concerns in Con-
gress, N.Y. TIMES, June 17, 2009, at A1 (quoting former Homeland Security Advisor).
 282     Gellman & Poitras, supra note 82.                                                        R
 283     See supra Part II.
 284     See supra Part III.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown          Seq: 45           21-JUL-14    12:02
  285   Brief for Respondents at 57, Clapper v. Amnesty Int’l USA, 133 S. Ct. 1138 (2013)
(No. 11-1025).
  286   Id. at 58 n.22.
  287   Reply Brief for Petitioners at 15, Clapper v. Amnesty Int’l USA, 133 S. Ct. 1138
(2013) (No. 11-1025).
  288   See Transcript of Oral Argument at 4–5, Clapper v. Amnesty Int’l USA, 133 S. Ct.
1138 (2013) (No. 11-1025).
  289   See Clapper v. Amnesty Int’l USA, 133 S. Ct. 1138, 1154 (2013) (“[I]f the Govern-
ment intends to use or disclose information obtained or derived from [electronic surveil-
lance] in judicial or administrative proceedings, it must provide advance notice of its
intent, and the affected person may challenge the lawfulness of the acquisition.”).
  290   See Adam Liptak, A Secret Surveillance Program Proves Challengeable in Theory Only, N.Y.
TIMES, July 16, 2013, at A11; Devlin Barrett, U.S. Spy Program Lifts Veil in Court, WALL. ST. J.,
July 31, 2013, at A1; Ellen Nakashima, NSA Surveillance Questioned in Plot Case, WASH. POST,
June 22, 2013, at A2; Eric Schmitt et al., Mining of Data Is Called Crucial to Fight Terror, N.Y.
TIMES, June 8, 2013, at A1.
  291   See Robert Barnes & Ellen Nakashima, U.S. to Use Warrantless Evidence in Terror Case,
WASH. POST, Oct. 26, 2013, at A1; Charlie Savage, Doors May Open for Challenge to Secret
Wiretaps, N.Y. TIMES, Oct. 17, 2013, at A3; Charlie Savage, Justice Dept. Defends Its Conduct on
Evidence, N.Y. TIMES, Feb. 15, 2014, at A9; Charlie Savage, Warrantless Surveillance Continues
to Cause Fallout, N.Y. TIMES, Nov. 21, 2013, at A20.
  292   50 U.S.C. § 1806(e) (2006 & Supp. V 2011) (electronic surveillance); id. § 1845(e)
(pen register and trap and trace devices); see also id. § 1825(f) (suppression motion for
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown          Seq: 46         21-JUL-14   12:02
FISA physical searches); id. § 1881e (stating that information acquired under FAA section
702 is governed by 50 U.S.C. § 1806). Patriot Act section 215 does not contain provisions
concerning government notification and motions to suppress, which led the government
to claim there is no remedy for any section 215 violation. See United States’ Response and
Opposition to Defendants’ Joint Motion for New Trial at 17–19, United States v. Moalin,
No. 10-cr-4246-JM, 2013 WL 6079518 (S.D. Cal. Nov. 18, 2013). This remarkable claim was
not addressed in the district court’s opinion. See United States v. Moalin, No. 10-cr-4246-
JM, 2013 WL 6079518 (S.D. Cal. Nov. 18, 2013).
  293    See Defendant’s Motion to Suppress Evidence Obtained or Derived from Surveil-
lance Under the FISA Amendments Act and Motion for Discovery at 20–47, United States
v. Muhtorov, No. 12-cr-00033-JLK-1 (D. Colo. filed Jan 29, 2014) [hereinafter Muhtorov
Motion] (on file with authors) (challenging constitutionality of electronic surveillance
under section 702 of the FISA Amendments Act); Statement of Facts and Memorandum of
Points and Authorities in Support of Joint Motion Pursuant to Rule 33, Fed. R. Crim. P.,
for a New Trial at 1–4, 11–25, United States v. Moalin, No. 10-cr-4246-JM, 2013 WL
6079518 (S.D. Cal. Nov. 18, 2013) [hereinafter Moalin Motion] (arguing for new trial
based on, inter alia, unconstitutionality of bulk metadata collection program); Defendant’s
Motion Requesting that This Court Declare the FISA Amendments Act of 2008 Unconstitu-
tional at 1, United States v. Qazi, No. 12-60298-CR-Scola/O’Sullivan (S.D. Fla. May 28,
2013) (on file with authors) (requesting that FAA be declared unconstitutional because it
violates the First and Fourth Amendments, as well as Article III).
  294    See Mohamud Motion, supra note 157, at 17–25; Muhtorov Motion, supra note 293,           R
at 47–56; Moalin Motion, supra note 293, at 2–7, 25–34, 37–38.                                    R
  295    United States v. Daoud, No. 12-cr-723, 2014 WL 321384, at *3 (N.D. Ill. Jan. 29,
2014). But see In re Grand Jury Proceedings of Special April 2002 Grand Jury, 347 F.3d 197,
203 (7th Cir. 2003) (noting that “every FISA wiretap review had been conducted in camera
and ex parte”); Moalin, 2013 WL 6079518, at *9–10 (refusing to order defense access to
surveillance-related materials). As of this writing, similar defense motions are pending in
criminal cases in Colorado (United States v. Muhtorov, No. 12-cr-00033-JLK-1 (D. Colo.)),
Florida (United States v. Qazi, No. 12-60298-CR-Scola/O’Sullivan (S.D. Fla.)), and Oregon
(United States v. Mohamud, No. 3:10-cr-00475-KI (D. Or.)). Other motions may be forth-
coming. See Ellen Nakashima, No Warrant, Inmate Is Told, WASH. POST, Feb. 26, 2014, at A4
(most recent government notification); Patrick C. Toomey, In Reversal, DOJ Poised to Give
Notice of Warrantless Wiretapping, ACLU BLOG OF RIGHTS (Oct. 18, 2013), https://www.aclu.
org/blog/national-security/reversal-doj-poised-give-notice-warrantless-wiretapping (listing
affected cases).
  296    Andrew Harris & Steven Church, Terror Defendant’s Lawyer Wins Access to Secret Court
Papers, BUS. WK. (Jan. 30, 2014), http://www.businessweek.com/news/2014-01-29/chicago-
bomb-sting-defense-lawyer-allowed-to-see-fisa-papers-1 (quoting defense attorney Ronald
Kuby) (internal quotations marks omitted).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown          Seq: 47          21-JUL-14    12:02
 297    Rawlings v. Kentucky, 448 U.S. 98, 121 (1980) (Marshall, J., dissenting).
 298    Draper v. United States, 358 U.S. 307, 314 (1959) (Douglas, J., dissenting); see also
Minnesota v. Carter, 525 U.S. 83, 110 (1998) (Ginsburg, J., dissenting) (“Other decisions
have similarly sustained Fourth Amendment pleas despite the criminality of the defend-
ants’ activities.” (internal citations omitted)); Brinegar v. United States, 338 U.S. 160, 181
(1949) (Jackson, J., dissenting) (“Only occasional and more flagrant abuses come to the
attention of the courts, and then only those where the search and seizure yields incriminat-
ing evidence and the defendant is at least sufficiently compromised to be indicted.”).
  299   See Mincey v. Arizona, 437 U.S. 385, 395 (1978) (rejecting the notion that there is a
“murder scene exception” to the Fourth Amendment). In the few instances when the
Constitution does distinguish among crimes for purposes of individual rights, the relevant
provisions were intended to provide greater protection to those facing more serious charges
and greater punishment. See U.S. CONST. art. III, § 3, cl. 1 (heightened proof requirements
for treason); id. amend. V (“No person shall be held to answer for a capital, or otherwise
infamous crime, unless on a presentment or indictment of a Grand Jury . . . .”); Alabama v.
Shelton, 535 U.S. 654, 658 (2002) (recognizing that the right to counsel applies in any case
where incarceration may result); Baldwin v. New York, 399 U.S. 66, 69 (1970) (holding that
right to trial by jury applies whenever charged crime authorizes punishment of more than
six months’ imprisonment). In other words, the fact that the foregoing cases involve very
serious criminal charges (i.e., terrorism) cannot justify lower constitutional protections.
But cf. United States v. Abdulmutallab, No. 10-20005, 2011 WL 4345243, at *5–6 (E.D.
Mich. Sept. 16, 2011) (expanding “public safety” exception to Miranda to terrorism
investigations).
  300   Kimmelman v. Morrison, 477 U.S. 365, 380 (1986); see also Ohio v. Reiner, 532 U.S.
17, 18 (2001) (per curiam) (“[O]ur precedents dictate that the privilege [against self-
incrimination] protects the innocent as well as the guilty . . . .”); Trupiano v. United States,
334 U.S. 699, 709 (1948) (“The Fourth Amendment was designed to protect both the
innocent and the guilty from unreasonable intrusions upon their right of privacy . . . .”),
overruled in part on other grounds, United States v. Rabinowitz, 339 U.S. 56 (1950).
  301   Murphy v. Waterfront Comm’n of N.Y. Harbor, 378 U.S. 52, 55 (1964) (internal
quotation marks omitted).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown            Seq: 48           21-JUL-14   12:02
  302    In these cases, one of the key FISA provisions applies not just to suppression mo-
tions but also to “any motion or request . . . pursuant to any other statute or rule . . . to
discover or obtain applications or orders or other materials relating to electronic surveil-
lance or to discover [or obtain] evidence or information obtained or derived from elec-
tronic surveillance.” 50 U.S.C. § 1806(f) (2006 & Supp. V 2011); see also id. § 1845(f)(1)
(analogous provision for pen register and trap and trace devices).
  303    Some defendants are now seeking discovery of mass surveillance and bulk metadata
collection activities in criminal cases having nothing to do with terrorism or national secur-
ity. See, e.g., Notice of Motion and Motion to Compel Discovery of Defendant Lara, United
States v. Diaz-Rivera et al., No. 12-cr-00030-EMC/EDL (N.D. Cal. Oct. 2, 2013) (on file with
authors) (drug prosecution).
  304    Perhaps the best-known example was Director of National Intelligence James Clap-
per’s congressional testimony denying that the NSA was collecting data on millions of
Americans. Clapper would latter describe his answer as the “‘least untruthful’” and then
later issue an apology for his “‘clearly erroneous statements.’” James Risen, Lawmakers
Question White House Account of an Internet Surveillance Program, N.Y. TIMES, July 4, 2013, at A6
(quoting Director Clapper); see also Spencer Ackerman, Congressional Trio Criticize James
Cole’s NSA Testimony as Misleading, THE GUARDIAN (Feb. 12, 2014), http://www.theguardian.
com/world/2014/feb/12/nsa-james-cole-congress-testimony-surveillance-phone-records
(characterizing Deputy Attorney General James Cole’s statements as “not entirely accu-
rate”); Greg Miller, A Trail of Inaccuracy About NSA Programs, WASH. POST, July 1, 2013, at A1
(discussing inaccuracies and careful phrasing in administration statements about NSA sur-
veillance programs); Shaun Waterman, NSA Chief’s Admission of Misleading Numbers Adds to
Obama Administration Blunders, WASH. TIMES (Oct. 2, 2013), http://www.washingtontimes.
com/news/2013/oct/2/nsa-chief-figures-foiled-terror-plots-misleading/ (discussing Gen-
eral Keith Alexander’s testimony that the number of terrorist plots foiled was one or two,
and not fifty-four as the Obama administration claimed). For earlier incidents of govern-
ment misstatements regarding mass surveillance, see Charles Babington & Dan Eggen,
Gonzales Seeks to Clarify Testimony on Spying, WASH. POST, Mar. 1, 2006, at A8; Dan Eggen &
Walter Pincus, Varied Rationales Muddle Issue of NSA Eavesdropping, WASH. POST, Jan. 27,
2006, at A6 (noting that administration officials had “emphasized in testimony and public
statements that the NSA was prohibited from engaging in domestic surveillance—even as
the agency was clearly doing so” pursuant to President Bush’s orders).
  305    See Glenn Greenwald & Spencer Ackerman, How the NSA Is Still Harvesting Your
Online Data, THE GUARDIAN (June 27, 2013), http://www.theguardian.com/world/2013/
jun/27/nsa-online-metadata-collection (“A review of top-secret NSA documents suggests
that the surveillance agency still collects and sifts through large quantities of Americans’
online data—despite the Obama administration’s insistence that the program that began
under Bush ended in 2011.”).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown         Seq: 49          21-JUL-14    12:02
  306    See, e.g., [redacted], No. [redacted], 2011 WL 10945618, at *5 & n.14, *6, *9 (Foreign
Intelligence Surveillance Ct. Oct. 3, 2011) (noting that “for the first time, the government
has now advised the Court that the volume and nature of the information it has been
collecting is fundamentally different from what the Court had been led to believe,” and
stating that the court was “troubled that the government’s revelations regarding NSA’s
acquisition of Internet transactions mark the third instance in less than three years in
which the government has disclosed a substantial misrepresentation regarding the scope of
a major collection program”); In re FBI for an Order Requiring the Production of Tangible
Things from [redacted], No. BR 09-13, 2009 WL 9150896, at *2 (Foreign Intelligence Sur-
veillance Ct. Sept. 25, 2009) (stating that it was “deeply troubled” by noncompliance inci-
dents, which occurred shortly after the NSA’s completion of “end to end review” of the
relevant processes “and its submission of a report intended to assure the Court that NSA
had addressed and corrected the issues giving rise to the history of serious and widespread
compliance problems”); In re Production of Tangible Things from [redacted], No. BR 08-13,
2009 WL 9150913, at *2–9 (Foreign Intelligence Surveillance Ct. Mar. 2, 2009) (describing
government misrepresentations and violations of court orders); In re Production of Tangi-
ble Things from [redacted], No. BR 08-13, 2009 WL 9157881, at *2 (Foreign Intelligence
Surveillance Ct. Jan. 28, 2009) (“The Court is exceptionally concerned about what appears
to be a flagrant violation of its Order in this matter . . . .”); Memorandum Opinion at 3,
[redacted], No. PR/TT [redacted] (Foreign Intelligence Surveillance Ct. [redacted]) (“NSA
exceeded the scope of authorized acquisition continuously during the more than [redacted]
years of acquisition . . . .”), available at http://www.dni.gov/files/documents/1118/CLEAN
EDPRTT%202.pdf; see also In re All Matters Submitted to the Foreign Intelligence Surveil-
lance Court, 218 F. Supp. 2d 611, 620–21 (Foreign Intelligence Surveillance Ct. 2002)
(describing government’s “misstatements and omissions of material facts” in FISA applica-
tions), rev’d on other grounds, In re Sealed Case, 310 F.3d 717 (Foreign Intelligence Surveil-
lance Ct. Rev. 2002).
  307    United States v. Valenzuela-Bernal, 458 U.S. 858, 867 (1982) (referring to defense
rights contained in the Fifth and Sixth Amendments).
  308    California v. Trombetta, 467 U.S. 479, 485 (1984).
  309    U.S. CONST. amend. VI.
  310    Washington v. Texas, 388 U.S. 14, 19 (1967).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown          Seq: 50          21-JUL-14   12:02
facts as well as the prosecution’s to the jury so it may decide where the
truth lies.”311
     At a minimum, the Supreme Court’s jurisprudence establishes
that a defendant has “the right to the government’s assistance in com-
pelling the attendance of favorable witnesses at trial and the right to
put before a jury evidence that might influence the determination of
guilt.”312 To be sure, the Court has also made clear that “the mere
invocation of that right cannot automatically and invariably outweigh
countervailing public interests.”313 Compulsory process cannot be
used irresponsibly to undermine the basic goals of a criminal justice
system by hampering the legal process or impeding the fact-finding
function of a criminal trial.314 But although officials have some lati-
tude concerning the disclosure of information and its use in court,
that flexibility has limits when it infringes upon a criminal defendant’s
right to “a meaningful opportunity to present a complete defense.”315
     The refusal to disclose potentially exonerating evidence under-
cuts the aims of the criminal justice system—most obviously, an accu-
rate fact-finding process in pursuit of the truth. In holding that even
the President could not resist a subpoena in a criminal case, the
Supreme Court emphasized that the nation, through its Constitution
and legal tradition,
       elected to employ an adversary system of criminal justice in which
       the parties contest all issues before a court of law. The need to de-
       velop all relevant facts in the adversary system is both fundamental
       and comprehensive. The ends of criminal justice would be defeated
       if judgments were to be founded on a partial or speculative presen-
       tation of the facts. The very integrity of the judicial system and pub-
       lic confidence in the system depend on full disclosure of all the
       facts, within the framework of the rules of evidence. To ensure that
       justice is done, it is imperative to the function of courts that com-
       pulsory process be available for the production of evidence needed
       either by the prosecution or by the defense.316
    Another fundamental part of the defense right of access is the
government’s discovery obligations under the Due Process Clause.
Pursuant to Brady v. Maryland and its progeny, the prosecution is re-
quired to disclose favorable evidence—essentially, exculpatory and
 311    Id.
 312    Pennsylvania v. Ritchie, 480 U.S. 39, 56 (1987).
 313    Taylor v. Illinois, 484 U.S. 400, 414 (1988).
 314    See id. at 414–15 (“The integrity of the adversary process, which depends both on
the presentation of reliable evidence and the rejection of unreliable evidence, the interest
in the fair and efficient administration of justice, and the potential prejudice to the truth-
determining function of the trial process must also weigh in the balance.”).
 315    Crane v. Kentucky, 476 U.S. 683, 690 (1986) (quoting California v. Trombetta, 467
U.S. 479, 485 (1984)) (internal quotation marks omitted).
 316    United States v. Nixon, 418 U.S. 683, 709 (1974).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown           Seq: 51          21-JUL-14    12:02
  317    See Brady v. Maryland, 373 U.S. 83, 87 (1963) (holding that “suppression by the
prosecution of evidence favorable to an accused upon request violates due process where
the evidence is material either to guilt or to punishment”); Giglio v. United States, 405 U.S.
150 (1972) (holding that suppression of material impeachment evidence violates due pro-
cess under Brady).
  318    United States v. Bagley, 473 U.S. 667, 682 (1985). “A ‘reasonable probability’ is a
probability sufficient to undermine confidence in the outcome.” Id.
  319    Kyles v. Whitley, 514 U.S. 419, 437 (1995); see also Giglio, 405 U.S. at 154 (noting
that the prosecution has the burden of ensuring “communication of all relevant informa-
tion on each case to every lawyer who deals with it”).
  320    FED. R. CRIM. P. 16(a)(1).
  321    See, e.g., THE PROSECUTOR IN TRANSNATIONAL PERSPECTIVE 84–86, 200–01 (Erik Luna
& Marianne L. Wade eds., 2012) (discussing the broad charging discretion granted to
American prosecutors).
  322    See generally David A. Sklansky, Quasi-Affirmative Rights in Constitutional Criminal Pro-
cedure, 88 VA. L. REV. 1229, 1238–43 (2002) (discussing the rights that the government is
required to provide criminal defendants, most notably, those rights granted by the Fifth
and Sixth Amendments).
  323    After revelations of warrantless mass surveillance under the Bush Administration—
known as the “President’s Surveillance Programs” (PSP)—the Inspector General admon-
ished the Justice Department to review its discovery obligations for information derived
from such surveillance. See OIG Report, supra note 250, at 19 (summarizing the Inspector               R
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown          Seq: 52         21-JUL-14   12:02
       1. State Secrets
     The so-called “state secrets privilege” provides the government a
limited prerogative to withhold classified information (and perhaps
nonclassified “state secrets”) sought in court proceedings, most often
in civil cases brought against the government and its private-sector
partners. A related procedural bar can preclude judicial inquiry alto-
gether where state secrets are essential to the litigation.324 The
Supreme Court has long acknowledged that “no governmental inter-
est is more compelling than the security of the Nation.”325 This in-
cludes “protecting both the secrecy of information important to our
national security and the appearance of confidentiality so essential to
the effective operation of our foreign intelligence service.”326 For in-
stance, terrorism investigations can implicate various types of informa-
tion that, if disclosed, might aid terrorist organizations and further
violent schemes. In the case of Zacarias Moussaoui, the so-called
“20th Hijacker” in the 9/11 plot, the government argued:
General’s report). In particular, the Inspector General called upon the Justice Depart-
ment to: (1) “carefully consider whether it must re-examine past cases to see whether po-
tentially discoverable but undisclosed Rule 16 or Brady material was collected under the
PSP, and take appropriate steps to ensure that it has complied with its discovery obligations
in such cases”; and (2) “implement a procedure to identify PSP-derived information, if any,
that may be associated with international terrorism cases currently pending or likely to be
brought in the future and evaluate whether such information should be disclosed in light
of the government’s discovery obligations under Rule 16 and Brady.” Id.
 324     See, e.g., Tenet v. Doe, 544 U.S. 1, 11 (2005) (adhering to categorical bar an-
nounced in Totten v. United States, 92 U.S. 105 (1876), and emphasizing that the “state
secrets privilege and the more frequent use of in camera judicial proceedings simply cannot
provide the absolute protection” necessary in lawsuits against the government where the
plaintiffs’ success depends upon the existence of their alleged secret relationship with the
government).
 325     Haig v. Agee, 453 U.S. 280, 307 (1981).
 326     Snepp v. United States, 444 U.S. 507, 509 n.3 (1980) (per curiam).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown        Seq: 53         21-JUL-14    12:02
  327   Hamdan v. Rumsfeld, 548 U.S. 557, 723–24 (2006) (Thomas, J., dissenting) (quot-
ing Brief for the United States at 9, United States v. Moussaoui, 382 F.3d 453 (4th Cir.
2004) (No. 03-4792)) (internal quotation marks omitted).
  328   See, e.g., Richards, supra note 154, at 1934, 1958–59 (noting that private and public      R
sector surveillance “use the same technologies and techniques” and “operate through a
variety of public/private partnerships”).
  329   See Glenn Greenwald et al., Microsoft Gave NSA Access to Users’ Messages, THE GUARD-
IAN, July 12, 2013, at A1 (describing partnerships between the NSA and several
corporations).
  330   See, e.g., Greenwald, supra note 62 (explaining that Verizon could not “disclos[e] to      R
the public either the existence of the FBI’s request for its customers’ records or the court
order” compelling the production of those call records to the NSA).
  331   See, e.g., United States v. Curtiss-Wright Exp. Corp., 299 U.S. 304, 320 (1936) (not-
ing that regarding foreign affairs, “[s]ecrecy in respect of information gathered by [gov-
ernment agents] may be highly necessary, and the premature disclosure of it productive of
harmful results”).
  332   See Richards, supra note 154, at 1942–45 (criticizing surveillance law’s limited pro-      R
tections where plaintiffs “can only challenge secret government surveillance they can
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown           Seq: 54          21-JUL-14   12:02
prove,” yet acknowledging the simultaneous benefits of such a standard, which provides
security from potential crime).
 333    345 U.S. 1 (1953).
 334    Id. at 8 (citation omitted).
 335    Id. at 9–11.
 336    Id. at 9.
 337    Ellsberg v. Mitchell, 709 F.2d 51, 57 (D.C. Cir. 1983); see also Doe v. Tenet, 329 F.3d
1135, 1152–53 (9th Cir. 2003), rev’d, 544 U.S. 1 (2005) (providing possible safeguards to
prevent public exposure of secret materials).
 338    See, e.g., CIA v. Sims, 471 U.S. 159, 178 (1985).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown        Seq: 55          21-JUL-14    12:02
privilege may be invoked to bar its disclosure and the court cannot
order the government to disentangle this information from other clas-
sified information.”339
      Jewel v. National Security Agency provides an example of how these
complex issues are resolved in an ongoing case.340 In 2008, the plain-
tiffs in Jewel brought a challenge to the NSA warrantless mass surveil-
lance program conducted by gathering Internet backbone
information directly from telecommunications providers.341 On re-
mand from the Ninth Circuit,342 Judge Jeffrey White considered
whether the state secrets privilege barred the entire subject matter of
the litigation because the programs themselves were secret, and
whether the FISA section relating to procedures for use of electronic
surveillance data, 50 U.S.C. § 1806(f), preempted the federal com-
mon law of state secrets.343
      On the first question, Judge White determined that recent public
disclosure of government mass electronic surveillance meant that
there was no longer an interest in keeping the existence of the pro-
grams secret.344 Obviously, this is an important point for those seek-
ing disclosure of government surveillance information to prove their
innocence. The surveillance programs are now public, and the data
sought by run-of-the-mill defendants will not touch on national secur-
ity. As such, there remains little in the way of a secret to keep were the
government required to disclose non-sensitive data, such as informa-
tion relevant to a defendant’s alibi.
      Judge White further developed this distinction between subject
matter and individual data in his analysis of the FISA procedures for
reviewing information derived from electronic surveillance. The court
noted that 50 U.S.C. § 1806(f) provides the exclusive means for evalu-
ating electronic surveillance evidence.345 Because Congress chose to
impose these rules “notwithstanding any other . . . law,”346 and author-
 339     Kasza v. Browner, 133 F.3d 1159, 1166 (9th Cir. 1998).
 340     See Jewel v. NSA, No. C 08-04373 JSW, No. C 07-00693 JSW, 2013 WL 3829405 (N.D.
Cal. July 23, 2013).
  341    Id. at *23.
  342    Jewel v. NSA, 673 F.3d 902, 913–14 (9th Cir. 2011).
  343    Jewel, 2013 WL 3829405, at *7.
  344    Id. In December 2013, the Director of National Intelligence, James Clapper, filed a
declaration stating that the government was no longer asserting privilege over the exis-
tence of the warrantless mass surveillance program. Public Declaration of James R. Clap-
per, Director of National Intelligence at 2–6, Jewel v. NSA, No. C 08-04373 JW, No. C 07-
00693 JSW, 2013 WL 3829405 (N.D. Cal. July 23, 2013), available at http://www.dni.gov/
files/documents/1220/DNI%20Clapper%202013%20Jewel%20Shubert%20SSP%20Un
classified%20Signed%20Declaration.pdf. Nonetheless, the government continues to claim
the state secrets privilege with regard to still-classified information on the program’s scope
and operational details. See id. at 6–21.
  345    Jewel, 2013 WL 3829405, at *8.
  346    50 U.S.C. § 1806(f) (2006 & Supp. V 2011).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown       Seq: 56         21-JUL-14   12:02
  351    See, e.g., United States v. Aref, 533 F.3d 72, 79–80 (2d Cir. 2008) (holding that the
state secrets privilege applies to requests for privileged information brought under the
Classified Information Procedures Act in criminal cases).
  352    Motion to Compel Production of Phone Records at 3, United States v. Davis, No.
11-cr-60285-RSR (S.D. Fla. filed June 9, 2013).
  353    See supra notes 345–48 and accompanying text.                                              R
  354    Order Requiring Response from Government at 3, United States v. Davis, No. 11-cr-
60285-RSR (S.D. Fla. filed June 10, 2013), available at http://de.scribd.com/doc/
147116286/Order-Requiring-Response-Re-FISA-Records.
  355    Government’s Response to the Court’s Order and Motion for a Protective Order
Pursuant to Section 4 of the Classified Information Procedures Act and Rule 16(d)(1) of
the Federal Rules of Criminal Procedure and Memorandum of Law at 2, United States v.
Davis, No. 11-cr-60285-RSR (S.D. Fla. filed June 19, 2013).
  356    See Gellman & Soltani, supra note 5. The NSA Director, General Keith Alexander,            R
testified that the NSA had run pilot projects collecting U.S. cellphone location data. Al-
though claiming that the program was discontinued, General Alexander acknowledged
that the NSA may resume the collection process in the future. See id.
  357    See supra notes 261–68 and accompanying text.                                              R
  358    See Reply to Government’s Response to Defendant’s Motion to Compel at 1, United
States v. Davis, No. 11-cr-60285-RSR (S.D. Fla. filed June 20, 2013) (“Given the govern-
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown          Seq: 58         21-JUL-14   12:02
       2. Agency Alignment
      Another potential barrier to digital innocence claims is the divide
between the law enforcement community and the intelligence com-
munity. As discussed earlier, the roots of the problem lie in the histor-
ical separation of intelligence gathering from criminal investigation—
a separation that was always somewhat sketchy, given that the targets
of intelligence agents are often involved in crime, while law enforce-
ment has long relied upon information gleaned from intelligence op-
erations. Moreover, the legal predicate for the separation no longer
exists post–Patriot Act,360 although the government continues to as-
sert the division to limit defense access to information.361
      Originally, the separation may have made some sense, as the
goals of the two communities are not immediately congruent. The
mission of the federal law enforcement community “is to identify, tar-
get, investigate, arrest, prosecute, and convict those persons who com-
mit crimes in violation of Federal laws.”362 By contrast, the mission of
the intelligence community—which includes more than a dozen gov-
ernment organizations, such as the CIA and the NSA363—“is to per-
form intelligence activities necessary for the conduct of foreign
relations and the protection of the national security, including the
collection of information and the production and dissemination of
intelligence; and the collection of information concerning espionage,
international terrorist activities, and international narcotics
activities.”364
      Few published cases have provided guidance on discovery obliga-
tions for information held by the intelligence community.365 In gen-
ment’s representation, Mr. Brown concedes that the records will not assist him in establish-
ing his innocence . . . [and] therefore withdraws his requests . . . .”).
 359     See supra note 294 and accompanying text.                                                R
 360     See supra notes 232–35 and accompanying text.                                            R
 361     See, e.g., Mohamud Motion, supra note 157, at 46–50 (describing how prosecution          R
narrowly construed its discovery obligations).
 362     U.S. DEP’T OF JUSTICE, UNITED STATES ATTORNEYS’ MANUAL § 9-90.210(A) (rev. ed.
2008) [hereinafter USAM].
 363     See Mission: Member Agencies, U.S. INTELLIGENCE COMMUNITY, http://www.intelli
gence.gov/mission/member-agencies.html (last visited Mar. 24, 2014).
 364     USAM, supra note 362, § 9-90.210(A).                                                     R
 365     In United States v. Libby, a former White House official was charged with the unau-
thorized disclosure of classified information, namely, an undercover operative’s affiliation
with the CIA. Given “a rather free flow of documents” from the CIA to the special prosecu-
tor’s office, the trial judge concluded that the CIA was closely aligned with the prosecution
for discovery purposes. United States v. Libby, 429 F. Supp. 2d 1, 11 (D.D.C. 2006); see also
United States v. Diaz-Munoz, 632 F.2d 1330 (5th Cir. 1980) (determining that trial court
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown        Seq: 59         21-JUL-14    12:02
was required to undertake in camera review of CIA documents that defendant claimed
were exculpatory); United States v. Poindexter, 727 F. Supp. 1470, 1487 (D.D.C. 1989)
(determining that defendant was entitled to discovery of a limited set of documents pre-
pared by the executive branch relating to the Iran-Contra affair).
  366   See, e.g., Moon v. Head, 285 F.3d 1301, 1309 (11th Cir. 2002).
  367   See, e.g., United States v. Brooks, 966 F.2d 1500, 1503 (D.C. Cir. 1992) (quoting
United States ex rel. Smith v. Fairman, 769 F.2d 386, 391 (7th Cir. 1985)) (internal quota-
tion marks omitted).
  368   See, e.g., United States v. Blanco, 392 F.3d 382, 393–94 (9th Cir. 2004) (DEA
agents); United States v. Antone, 603 F.2d 566, 570 (5th Cir. 1979) (state agents); United
States v. Burnside, 824 F. Supp. 1215, 1257–58 (N.D. Ill. 1993) (federal prison personnel).
  369   See Afsheen John Radsan, Remodeling the Classified Information Procedures Act (CIPA),
32 CARDOZO L. REV. 437, 454–57 (2010).
  370   Smith v. Sec’y of N.M. Dep’t of Corr., 50 F.3d 801, 825 n.36 (10th Cir. 1995) (citing
United States v. Thornton, 1 F.3d 149, 158 (3d Cir. 1993)).
  371   United States v. Osorio, 929 F.2d 753, 760, 62 (1st Cir. 1991).
  372   United States v. Locascio, 6 F.3d 924, 949 (2d Cir. 1993).
  373   Compare United States v. Safavian, 233 F.R.D. 12, 14 (D.D.C. 2005) (adopting an
expansive view), with United States v. Libby, 429 F. Supp. 2d 1, 6 n.10 (D.D.C. 2006) (sup-
porting a narrower view).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown         Seq: 60        21-JUL-14   12:02
 374      United States v. McVeigh, 923 F. Supp. 1310, 1315 (D. Colo. 1996).
 375      See United States v. McVeigh, 954 F. Supp. 1441, 1450 (D. Colo. 1997).
 376      Id.
 377      See supra notes 221–23 and accompanying text.                                         R
 378      USAM, supra note 362, § 9-90.210(A).                                                  R
 379      Id.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown      Seq: 61    21-JUL-14    12:02
fundamental role in assessing the factual basis for court orders. Most
of all, information laundering deprives the accused of a meaningful
opportunity to defend himself at trial. Criminal defendants must
know the path information has taken in order to locate sources of
information that may prove them innocent. When the government
obscures the origin and course of information, they not only inhibit
the defense from challenging the information’s origins but also un-
dermine efforts to locate other discoverable, and perhaps exonerat-
ing, material. Defendants find themselves confronted with evidence
that they have no way to contest or contextualize. For this reason,
defense attorneys are now challenging the practice as a violation of
the defendant’s right to a fair trial, and they are making more aggres-
sive discovery requests to ensure that potentially exculpatory evidence
is not secreted in intelligence files.392
     All of this justifies a straightforward approach: agency alignment
should follow the movement of information, not arbitrary lines of
agency organization. Where incriminating information flows between
organizations, exonerating information must flow as well. This is a far
simpler principle than attempting to unpack the organizational charts
of agencies, which cooperate in providing incriminating information
but too often refuse to assist in discovering proof of innocence.
                                                V
                              ESTABLISHING DIGITAL INNOCENCE
     To some extent, all criminal trials pit the rights of the accused
against the interests of government. These conflicts are magnified,
however, when a defendant seeks information that has been gathered
as part of the national security apparatus. On the one hand, all agree
that the government must function with some level of secrecy on is-
sues of national security. This is particularly true when the informa-
tion in question could be used against the United States by foreign
powers, or when it might be exploited by terrorist organizations to
plan and carry out violent attacks. On the other hand, removing the
wall between intelligence surveillance and law enforcement has cre-
ated a troubling asymmetry in the criminal justice system. The gov-
ernment acts expeditiously to secure those records that it needs to
secure a conviction, but it may overlook or at least not pursue digital
information that undermines the prosecution. Such duplicity is in-
compatible with a fair adversarial system committed to accurate
 392     See David Ingram & John Shiffman, U.S. Defense Lawyers to Seek Access to DEA Hidden
Intelligence Evidence, REUTERS, Aug. 8, 2013, available at http://www.reuters.com/article/
2013/08/08/us-dea-irs-idUSBRE9761AZ20130808.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown          Seq: 64         21-JUL-14   12:02
 393    See 4 WILLIAM BLACKSTONE, COMMENTARIES *352 (“[F]or the law holds, that it is
better that ten guilty persons escape, than that one innocent suffer.”); see also Letter from
Benjamin Franklin to Benjamin Vaughan (Mar. 14, 1785), in 9 THE WRITINGS OF BENJAMIN
FRANKLIN: COLLECTED AND EDITED WITH A LIFE AND INTRODUCTION 291, 293 (Albert H.
Smyth ed., 1906) (“That it is better 100 guilty Persons should escape than that one inno-
cent Person should suffer, is a Maxim that has been long and generally approved.”).
 394    This hypothetical is based on Order Requiring Response from Government at 1–2,
United States v. Davis, No. 11-60285-CR-ROSENBAUM (S.D. Fla. June 10, 2013), ECF No.
786.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown       Seq: 65         21-JUL-14    12:02
 395    Classified Information Procedures Act (CIPA), 18 U.S.C. app. 3 §§ 1–16 (2012).
 396    See id. § 1 (defining “Classified information”); see also Exec. Order No. 13,526, 3
C.F.R. 298 (2010) (current executive order establishing “a uniform system for classifying,
safeguarding, and declassifying national security information”).
  397   See, e.g., United States v. Baptista-Rodriguez, 17 F.3d 1354, 1363 (11th Cir. 1994)
(“CIPA does not create new law governing the admissibility of evidence.”); United States v.
Yunis (Yunis II), 867 F.2d 617, 621 (D.C. Cir. 1989) (“[CIPA] creates no new rights of or
limits on discovery of a specific area of classified information.”).
  398   See, e.g., United States v. O’Hara, 301 F.3d 563, 568 (7th Cir. 2002) (“[CIPA was
intended] to protect classified information from unnecessary disclosure at any stage of a
criminal trial . . . in a way that does not impair the defendant’s right to a fair trial.”).
  399   See S. REP. NO. 96-823, at 1–4 (1980); H.R. REP. NO. 96-831, at 7 (1980).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown           Seq: 66          21-JUL-14   12:02
 400    See, e.g., United States v. Collins, 720 F.2d 1195, 1197 (11th Cir. 1983).
 401    United States v. Abu-Jihaad, 630 F.3d 102, 140 (2d Cir. 2010).
  402   Compare Yunis II, 867 F.2d at 623 (“[T]he procedures [CIPA] mandates protect a
government privilege in classified information similar to the informant’s privilege . . . .”),
and United States v. Sarkissian, 841 F.2d 959, 966 (9th Cir. 1988) (“[A]rguendo . . . the
enactment of CIPA does not affect the validity of Reynolds.”), and H.R. REP. NO. 96-831, at
15 n.12 (“[I]t is well-settled that the common law state secrets privilege is not applicable in
the criminal arena.”), with United States v. Aref, 533 F.3d 72, 78–79 (2d Cir. 2008) (hold-
ing that CIPA implicates the state secrets privilege), and United States v. Klimavicius-
Viloria, 144 F.3d 1249, 1261 (9th Cir. 1998) (same), and United States v. Garey, 2004 WL
2663023 (M.D. Ga. Nov. 15, 2004) (same).
  403   United States v. Reynolds, 345 U.S. 1, 12 (1953).
  404   S. REP. NO. 96-823, at 9.
  405   See United States v. Fernandez, 913 F.2d 148, 154 (4th Cir. 1990); cf. United States
v. Coplon, 185 F.2d 629, 638 (2d Cir. 1950) (Hand, J.) (“Few weapons in the arsenal of
freedom are more useful than the power to compel a government to disclose the evidence
on which it seeks to forfeit the liberty of its citizens.”).
  406   Fernandez, 913 F.2d at 154.
  407   18 U.S.C. app. 3 § 2 (2012).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown         Seq: 67          21-JUL-14    12:02
 408     Id. § 6(a). But see In re Washington Post Co., 807 F.2d 383, 393 (4th Cir. 1986).
 409     18 U.S.C. app. 3 § 4.
 410     Roviaro v. United States, 353 U.S. 53, 60–61 (1957); see, e.g., United States v. Aref,
533 F.3d 72, 79–80 (2d Cir. 2008) (adopting “the Roviaro standard for determining when
the Government’s privilege must give way in a CIPA case” and citing other circuits that
have adopted this standard). There is an ongoing debate as to whether the courts should
impose a higher evidentiary threshold in CIPA cases by balancing the defendant’s need for
relevant classified information against the government’s interest in national security. Com-
pare United States v. Rosen, 557 F.3d 192, 198 (4th Cir. 2009) (accepting balancing ap-
proach), and United States v. Sarkissian, 841 F.2d 959 (9th Cir. 1988) (same), with United
States v. Baptista-Rodriguez, 17 F.3d 1354, 1363–64 (11th Cir. 1994) (rejecting balancing
approach), United States v. Libby, 453 F. Supp. 2d 35, 44 (D.D.C. 2006) (same), and S.
REP. NO. 96-823, at 9 (1980) (same). But cf. United States v. Yunis (Yunis II), 867 F.2d 617,
625 (D.C. Cir. 1989) (refusing to adopt or reject balancing standard). But even those
CIPA cases acknowledging a higher evidentiary threshold have stressed that the govern-
ment’s interest in protecting national security cannot override the defendant’s right to a
fair trial. See Fernandez, 913 F.2d at 154 (discussing United States v. Smith, 780 F.2d 1102
(4th Cir. 1985) (en banc)).
 411     18 U.S.C. app. 3 § 4.
 412     Id. § 6(c)(1).
 413     Id. § 6(e)(1).
 414     United States v. Collins, 720 F.2d 1195, 1201 (11th Cir. 1983).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown          Seq: 68         21-JUL-14   12:02
  415   18 U.S.C. app. 3 § 6(e)(2). Under CIPA § 7, the government can take an interlocu-
tory appeal from district court rulings authorizing disclosure of classified information, im-
posing sanctions for nondisclosure of such information, or denying protective orders. See
id. § 7(a); see also United States v. Clegg, 740 F.2d 16, 18 (9th Cir. 1984) (holding that
appellate court has jurisdiction over disclosure of classified information to the public).
The appeal may occur before or during trial and regardless of whether the defendant has
been placed in jeopardy. The issue must be reviewed on an expedited basis by the appel-
late court, which is authorized to dispense with written briefs by the parties and the issu-
ance of a written opinion in rendering its judgment. See 18 U.S.C. app. 3 § 7(b).
  416   18 U.S.C. app. 3 § 3 (2012).
  417   See Security Procedures Established Pursuant to Public Law 96-456, 94 Stat. 2025, by
the Chief Justice of the United States for the Protection of Classified Information (1981)
(available in notes following 18 U.S.C. app. 3 § 9).
  418   See United States v. Smith, 899 F.2d 564, 567 (6th Cir. 1990).
  419   S. REP. NO. 96-823, at 10 (1980).
  420   See 18 U.S.C. app. 3 § 8(a).
  421   See id. § 8(b).
  422   See id. § 8(c).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown         Seq: 69          21-JUL-14    12:02
 428    United States v. Yunis (Yunis II), 867 F.2d 617, 623 (D.C. Cir. 1989).
 429    See United States v. Rezaq, 134 F.3d 1121, 1142 (D.C. Cir. 1998) (stating that plac-
ing facts in context should work to protect the interests of the defendant).
 430    Old Chief v. United States, 519 U.S. 172, 189 (1997).
 431    H.R. REP. NO. 96-1436, at 12–13 (1980).
 432    United States v. Moussaoui, 382 F.3d 453, 477 (4th Cir. 2004).
 433    See, e.g., United States v. Aref, 533 F.3d 72, 77 (2d Cir. 2008) (describing court’s
denial and grant of motions under seal); United States v. Ressam, 221 F. Supp. 2d 1252,
1259 (W.D. Wash. 2002) (discussing statutory provisions that permit sealing of information
sensitive to national security).
 434    See, e.g., United States v. Koubriti, 305 F. Supp. 2d 723, 728 (E.D. Mich. 2003) (issu-
ing gag order); United States v. McVeigh, 931 F. Supp. 756, 757 (D. Colo. 1996) (describ-
ing gag order).
 435    See, e.g., United States v. Abu Marzook, 412 F. Supp. 2d 913, 915 (N.D. Ill. 2006)
(granting government’s motion to close hearing to the public).
 436    See, e.g., United States v. El-Mezain, 664 F.3d 467, 491 (5th Cir. 2011) (permitting
use of pseudonyms for witnesses in certain cases).
 437    See, e.g., United States v. Zettl, 835 F.2d 1059, 1063 (4th Cir. 1987) (describing
procedures used to avoid disclosing government secrets during proceedings in open
court).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown       Seq: 71         21-JUL-14    12:02
 438    See United States v. Lopez, 328 F. Supp. 1077, 1086 (E.D.N.Y. 1971) (describing
efforts taken to prevent disclosure of sensitive programmatic information in a criminal
case).
 439    FED. R. CRIM. P. 16(d)(1).
 440    Id. 16(e) and advisory committee’s notes.
 441    See National Security Agency Act of 1959, § 6(a), 50 U.S.C. § 3605 (2006 & Supp. V
2011) (stating that nothing in statute, with limited exceptions, should be construed to
require disclosure from the NSA).
 442    See United States v. Drake, No. RBD 10-181, 2011 WL 2175007, at *5 (D. Md. June
2, 2011) (“Section 6(a) . . . provides the NSA with a statutory privilege protecting against
the disclosure of information relating to its activities . . . .”).
 443    See id. at *3–4 (beginning CIPA analysis).
 444    See United States v. Moussaoui, 382 F.3d 453, 471 n.20 (4th Cir. 2004) (stating that
even though CIPA does not apply, it still provides a useful framework for evaluating defen-
dant access to enemy combatant witnesses); United States v. Moussaoui, 333 F.3d 509, 513
(4th Cir. 2003) (discussing the district court’s application of the CIPA procedures).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown            Seq: 72           21-JUL-14   12:02
  445   See Waller v. Georgia, 467 U.S. 39, 46 (1984) (a public trial is a guarantee provided
by both the First and Sixth Amendments); United States v. Aref, 533 F.3d 72, 83 (2d Cir.
2008) (transparency in court judgments is essential to constitutional system of checks and
balances); United States v. Abu Ali, 528 F.3d 210, 255 (4th Cir. 2008) (hiding evidence
from the defendant, but giving it to the jury, is a violation of the Confrontation Clause).
  446   See Joshua L. Dratel, Section 4 of the Classified Information Procedures Act: The Growing
Threat to the Adversary Process, 53 WAYNE L. REV. 1041, 1042–47 (2007).
  447   18 U.S.C. app. 3 § 4 (2012).
  448   See S. REP. NO. 96-823, at 6 (1980).
  449   See FED. R. CRIM. P. 16 advisory committee notes (“The Committee changed the
[proposed] mandatory language to permissive language. A Court may, not must, conduct
an ex parte proceeding if a party so requests.”).
  450   H.R. REP. NO. 94-247, at 16 (1975).
  451   See United States v. Carmichael, 232 F.3d 510, 517 (6th Cir. 2000) (“[E]x parte
communications with the court are an extraordinarily bad idea [particularly in criminal
cases because] giving the government private access to the ear of the court is not only ‘a
gross breach of the appearance of justice,’ but also a ‘dangerous procedure.’” (quoting
United States v. Minsky, 963 F.2d 870, 874 (6th Cir. 1992))); American-Arab Anti-Discrimi-
nation Comm. v. Reno, 70 F.3d 1045, 1069 (9th Cir. 1995) (noting that judges “are neces-
sarily wary of one-sided process” and “fairness can rarely be obtained by secret, one-sided
determination”) (internal quotation marks omitted); Abourezk v. Reagan, 785 F.2d 1043,
1060–61 (D.C. Cir. 1986) (stating that party access to case evidence is a hallmark of Ameri-
can adjudication and “serves to preserve both the appearance and the reality of fairness in
the adjudications of United States courts”); see also MODEL CODE OF JUDICIAL CONDUCT
Canon 3(B)(7) (2004) (setting out a general rule against ex parte communications).
  452   See United States v. Abuhamra, 389 F.3d 309, 322–23 (2d Cir. 2004).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown          Seq: 73          21-JUL-14    12:02
than a fraud on the court.459 Most telling of all are the FISC opinions
exposing the government’s serial misrepresentations,460 none of
which resulted in the court stopping a mass surveillance program.461
Such prevarications, and the spy court’s failure to discipline the gov-
ernment for them, reinforce the argument against secret ex parte
proceedings.
      The incidents also help make the case for installing a civil liber-
ties advocate in the FISC to argue against the government’s position,
which has been recommended by President Obama’s blue-ribbon ad-
visory committee462 and endorsed by the President himself.463 When
the issue is discovery under CIPA section 4, however, the process al-
ready provides for an advocate in the form of security-cleared defense
counsel. In Daoud, the government offered no meaningful response
to the contention that national security interests are not implicated
when defense counsel has the required security clearances, other than
to say that it had never been done before.464 “That response is unper-
suasive where it is the government’s claim of privilege to preserve
national security that triggered this proceeding,” the court opined,
finding that “the probable value of disclosure and the risk of nondis-
closure outweigh the potential danger of disclosure to cleared coun-
sel.”465 Unless CIPA is a charade, security-cleared counsel should be
allowed to participate in the discovery process in order to secure
exculpatory evidence.
 466     See Zwillinger & Genetski, supra note 42, at 585 (stating that certain exceptions            R
permit a criminal defendant to obtain his own messages or messages intended for him).
 467     See Shirin Chahal, Note, Balancing the Scales of Justice: Undercover Investigations on
Social Networking Sites, 9 J. TELECOMM. & HIGH TECH. L. 285, 306 (2011) (detailing ethical
restrictions on defense use of deception to gain access to social media information).
 468     FED. R. CRIM. P. 17(c).
 469     See id.
 470     See id.
 471     See Patricia L. Bellia, Surveillance Law Through Cyberlaw’s Lens, 72 GEO. WASH. L. REV.
1375, 1396–97 (2004).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown        Seq: 76         21-JUL-14   12:02
 472    See Zwillinger & Genetski, supra note 42, at 579–81 (stating that the SCA is broad      R
enough to include e-mails stored on ISP servers that are not in temporary storage).
 473    See id. at 580 (discussing Theofel v. Farey-Jones, 359 F.3d 1066 (9th Cir. 2004)).
 474    See id. (detailing the need for a search warrant to access stored communications).
 475    See 18 U.S.C. § 2702(a) (2012); see also Theofel, 359 F.3d at 1076–77 (interpreting
section 2702(a)).
 476    See 18 U.S.C. § 2510(12).
 477    Id. §§ 2510(15), 2711(2).
 478    See Zwillinger & Genetski, supra note 42, at 581 n.62 (“The distinction between         R
materials in ‘electronic storage,’ and materials that may just be stored electronically is
crucial.”).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown       Seq: 77         21-JUL-14    12:02
  488     See United States v. Amawi, 552 F. Supp. 2d 679, 680 (N.D. Ohio 2008) (“[M]oving
to compel disclosure from the providers directly does seem to be the more appropri-
ate . . . route for the defendant to take.”).
  489     See, e.g., O’Grady v. Superior Court, 44 Cal. Rptr. 3d 72, 88–89 (Cal. Ct. App. 2006)
(stating that prohibition of discovery from ISPs imposes no new burdens on litigants and
encourages the development of digital communications); Facebook, Inc. v. Aguayo-Gomez,
No. A13-0579 (Minn. Ct. App. May 1, 2013) (granting writ of prohibition stopping district
court’s order to compel disclosure by Facebook).
  490     See, e.g., Amawi, 552 F. Supp. 2d at 680.
  491     717 F. Supp. 2d at 975; see Mintz v. Mark Bartelstein & Assocs., Inc., 885 F. Supp. 2d
987, 991 (C.D. Cal. 2012); Flagg v. City of Detroit, 252 F.R.D. 346, 350 (E.D. Mich. 2008)
(“[A]s noted by the courts and commentators alike, § 2702 lacks any language that explic-
itly authorizes a service provider to divulge the contents of a communication pursuant to a
subpoena or court order.”); Viacom Int’l Inc. v. Youtube Inc., 253 F.R.D. 256, 264
(S.D.N.Y. 2008); In re Subpoena Duces Tecum to AOL, LLC, 550 F. Supp. 2d 606, 611
(E.D. Va. 2008); O’Grady, 44 Cal. Rptr. 3d at 89.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown        Seq: 79          21-JUL-14    12:02
craft relief that satisfies the SCA and makes sure that parties receive
discovery to which they are entitled.492
     In civil cases, parties often seek the communications, records, or
social media information of the opposing party.493 Discovery of this
sort of information has become routine, with the request directed at
the opposing party rather than at the service provider.494 For discov-
ery purposes, the information is deemed to be in the control of the
party required to produce it.495 So, for example, plaintiffs whose
social media posts contradict their personal injury claims are usually
required to consent to the social network provider’s disclosure of ac-
count information and posts.496
     Courts make sure that such social network access is not a mere
fishing expedition by, for instance, restricting access and discovery by
time or by subject.497 But they do order plaintiffs to consent to the
access if there is a basis for the request.498 As noted by the court in
  492    See, e.g., Juror No. One v. Superior Court, 142 Cal. Rptr. 3d 151, 156 (Cal. Ct. App.
2012) (“One exception is recognized where the customer or subscriber has given consent
to the disclosure.”); see also 18 U.S.C. § 2702(b)(3) (“A provider . . . may divulge the con-
tents of a communication . . . with the lawful consent of the originator or an addressee or
intended recipient of such communication . . . .”).
  493    See Offenback v. L.M. Bowman, Inc., No. 1:10-CV-1789, 2011 WL 2491371 (M.D. Pa.
June 22, 2011); Levine v. Culligan of Florida, Inc., No. 50-2011-CA-010339-XXXXXMB,
2013 WL 1100404, at *3 (Fla. Cir. Ct. Jan. 29, 2013) (“Similarly, courts seem to be in agree-
ment that the [SCA] prohibits records from being subpoenaed directly from Facebook and
other social networking sites. However, in Florida, in certain circumstances, courts may
require a plaintiff to provide a signed authorization for the production of relevant social
media discovery to allow an opposing party to obtain those records directly.” (citations
omitted)); EEOC v. Simply Storage Mgmt., LLC, 270 F.R.D. 430, 434 (S.D. Ind. 2010);
Romano v. Steelcase Inc., 907 N.Y.S.2d 650, 657 (Sup. Ct. 2010); Zimmerman v. Weis Mar-
kets, Inc., No. CV-09-1535, 2011 WL 2065410 (Pa. Ct. Com. Pl. May 19, 2011); McMillen v.
Hummingbird Speedway, Inc., No. 113-2010 CD, 2010 WL 4403285 (Pa. Ct. Com. Pl. Sept.
9, 2010).
  494    See, e.g., Romano, 907 N.Y.S.2d at 651; Largent v. Reed, No. 2009-1823, 2011 WL
5632688, at *11 (Pa. Ct. Com. Pl. Nov. 8, 2011) (“Crispin is distinguishable. In that case,
the defendants sought information via subpoena to Facebook and other social networking
sites. In this case, [defendant] seeks the information directly from [plaintiff].”); Zimmer-
man, 2011 WL 2065410; McMillen, 2010 WL 4403285.
  495    See supra note 494.                                                                        R
  496    See supra notes 491–93 and accompanying text.                                              R
  497    See, e.g., Tompkins v. Detroit Metro. Airport, 278 F.R.D. 387 (E.D. Mich. 2012) (re-
jecting social media discovery request as overbroad); Levine, 2013 WL 1100404, at *4 (refus-
ing access to Facebook information where defendant “failed to establish a factual predicate
with respect to the relevance [sic] of the evidence” and finding that the defendant “essen-
tially sought permission to conduct ‘a fishing expedition’ into plaintiff’s Facebook account
based on the mere hope of finding relevant evidence” (quoting McCann v. Harleysville Ins.
Co. of New York, 910 N.Y.S.2d 614 (App. Div. 2010)) (internal quotation marks omitted));
see also Winchell v. Lopiccolo, 954 N.Y.S.2d 421, 424 (Sup. Ct. 2012) (finding defendant’s
request for unrestricted access to social media accounts was overbroad).
  498    See Flagg v. City of Detroit, 252 F.R.D. 346, 363 (E.D. Mich. 2008) (“[I]t is not an
‘oxymoron’ to conclude, under the particular circumstances presented here, that a party
may be compelled to give its consent. It is a necessary and routine incident of the rules of
discovery that a court may order disclosures that a party would prefer not to
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown           Seq: 80          21-JUL-14   12:02
 508     See Derek S. Witte, Bleeding Data in a Pool of Sharks: The Anathema of Privacy in a World
of Digital Sharing and Electronic Discovery, 64 S.C. L. REV. 717, 729–30 (2013) (giving exam-
ples of popular services with such EULAs).
 509     See Juror No. One v. Superior Court, 142 Cal. Rptr. 3d 151, 158 (Cal. Ct. App.
2012).
 510     See Bobbie Johnson, Privacy No Longer a Social Norm, Says Facebook Founder, THE
GUARDIAN (Jan. 10, 2010, 8:58 PM), http://www.theguardian.com/technology/2010/jan/
11/facebook-privacy.
 511     See Data Use Policy, FACEBOOK, https://www.facebook.com/full_data_use_policy
(last modified Nov. 15, 2013) (“We may access, preserve and share your information in
response to a legal request (like a search warrant, court order or subpoena) if we have a
good faith belief that the law requires us to do so.”). The policy is phrased in terms of
Facebook’s own belief as to whether it is obligated to comply—that is, it may disclose if it
believes it may disclose—which may mean that its obligation to disclose under the lawful
consent obtained in its terms of service may rest on its own beliefs about whether it may
disclose. Whether courts will accept such a circular argument remains to be seen.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown         Seq: 83          21-JUL-14    12:02
age.”519 For this reason, a number of cases have held that there is no
implied exception in the SCA for discovery subpoenas under the Fed-
eral Rules of Civil Procedure.520
     But in criminal cases, the constitutional dimension of a defen-
dant’s right to present a defense affects the function of a subpoena
issued pursuant to Rule 17 of the Federal Rules of Criminal Proce-
dure. In interpreting the role of subpoenas under the SCA, one court
differentiated between civil discovery and constitutional criminal pro-
cedure: “Rule 17 is not a discovery device, but rather a vehicle by
which to obtain compulsory process.”521 In all likelihood, a defendant
denied access to data held by Internet intermediaries might be able to
claim a violation of several defense rights.522 Responding to this ten-
sion, “some trial courts in California have issued bench orders and
oral rulings finding that the restrictions . . . threaten to interfere with
the defendant’s constitutional rights to due process and effective assis-
tance of counsel.”523
     The SCA’s permissions are much more lenient for non-content
data, including metadata, which is significant because, in many ways,
Big Data is more about metadata than content. Data about communi-
cations—the location of the person sending a communication, the IP
address accessed, login time, amount of traffic, type of traffic, and so
on—can tell a powerful story. Disclosure of non-content data to
nongovernment entities is not barred by the SCA, and, in fact, it is the
one category of data that is easier to obtain by private parties than it is
by government entities.524 The ISPs have written exceptions for them-
selves in their user agreements and privacy policies that permit them
to disclose subscriber information in response to a subpoena. In fact,
metadata disclosure has become almost routine in other areas of the
law. Consider, for example, the cases in which the recording industry
regularly and successfully used subpoenas to discover the IP addresses
and, in many cases, the identities of peer-to-peer file sharers.525 This
information is stock non-content information about a subscriber
 519     See Crispin v. Christian Audigier, Inc., 717 F. Supp. 2d 965, 989 (C.D. Cal. 2010).
 520     See Mintz v. Mark Bartelstein & Assocs., Inc., 885 F. Supp. 2d 987, 991 (C.D. Cal.
2012); Crispin, 717 F. Supp. 2d at 975; Flagg v. City of Detroit, 252 F.R.D. 346, 350 (E.D.
Mich. 2008); In re Subpoena Duces Tecum to AOL, LLC, 550 F. Supp. 2d 606, 611 (E.D.
Va. 2008); O’Grady v. Superior Court, 44 Cal. Rptr. 3d 72, 89 (Cal. Ct. App. 2006).
 521     See FTC v. Netscape Commc’ns Corp., 196 F.R.D. 559, 561 (N.D. Cal. 2000) (citing
United States v. Nixon, 418 U.S. 683, 698–99 (1974)).
 522     See Zwillinger & Genetski, supra note 42, at 595–96 (citing Coleman v. Alabama, 399       R
U.S. 1, 9 (1970); Pennsylvania v. Ritchie, 480 U.S. 39, 40, 56 (1987)).
 523     Electronic Communications Privacy Act and the Revolution in Cloud Computing: Hearing
Before the Subcomm. on the Constitution, Civil Rights & Civil Liberties of the H. Comm. on the
Judiciary, 111th Cong. 7 (2010) (statement of Marc J. Zwillinger), available at http://scholar
ship.law.georgetown.edu/cong/109.
 524     See 18 U.S.C. § 2702(c)(6) (2012).
 525     See, e.g., Interscope Records v. Does, 558 F. Supp. 2d 1176, 1179–80 (D. Kan. 2008).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown      Seq: 85        21-JUL-14    12:02
under the SCA but was readily available by subpoena. Moreover, com-
pliance with a subpoena is hardly burdensome, given that most com-
panies have set up a regular path and fee structure. All one needs to
do is serve the subpoena on the company’s custodian of records and
pay the fee, and the company provides the information.
 526     Smith v. Cromer, 159 F.3d 875, 883 (4th Cir. 1998) (Phillips, J., dissenting).
 527     Id. (citation omitted).
  528    5 U.S.C. § 301 (2012). Most federal agencies have created such regulations. See,
e.g., 10 C.F.R. §§ 202.21–202.26 (2013) (regulations for the Department of Energy).
  529    See 28 C.F.R. §§ 16.21–16.29 (2013).
  530    See id. §§ 16.22, 16.24.
  531    See id. § 16.24(a).
  532    See id. § 16.24(c).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown          Seq: 86         21-JUL-14   12:02
 541    See, e.g., Kasi v. Angelone, 300 F.3d 487, 504–06 (4th Cir. 2002); United States v.
Williams, 170 F.3d 431, 433 (4th Cir. 1999); Smith v. Cromer, 159 F.3d 875, 878–81 (4th
Cir. 1998); Louisiana v. Sparks, 978 F.2d 226, 236 (5th Cir. 1992); FBI v. Superior Court, 507
F. Supp. 2d at 1092–95.
 542    H.R. REP. NO. 85-1461, at 1 (1958).
 543    Id. at 2.
 544    Id.
 545    5 U.S.C. § 301 (2012).
 546    See, e.g., Chrysler Corp. v. Brown, 441 U.S. 281, 310 (1979); United States ex rel.
O’Keefe v. McDonnell Douglas Corp., 132 F.3d 1252, 1255–56 (8th Cir. 1998); United
States v. Henson, 123 F.3d 1226, 1237 (9th Cir. 1997).
 547    United States ex rel. Touhy v. Ragen, 340 U.S. 462, 467 (1951).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown      Seq: 88         21-JUL-14   12:02
  556   Cf. Pennsylvania v. Ritchie, 480 U.S. 39, 60 (1987) (ordering such an in camera
review by a state trial court).
  557   See, e.g., Kasi v. Angelone, 200 F. Supp. 2d 585, 596 (E.D. Va. 2002) (discussing a
state court performing an in camera review), aff’d, 300 F.3d 487 (4th Cir. 2002); 28 C.F.R.
§ 17.17(b) (2013).
  558   See supra note 444 and accompanying text. See generally supra Part V.A.1.                R
  559   See 5 U.S.C. §§ 701–706 (2012).
  560   See 28 U.S.C. § 1361 (2012).
  561   92 F. Supp. 2d 993 (N.D. Cal. 2000).
  562   See id. at 995.
  563   See id. at 994.
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown          Seq: 90          21-JUL-14   12:02
   B. Post-Conviction Relief
     Where proof of innocence is only found after conviction, defend-
ants face a range of legal arguments intended to limit post-conviction
challenges. Some restrictions are considered necessary to stop repeti-
tive and abusive petitions, but they can also severely restrict the ability
of the actually innocent to exonerate themselves. This section consid-
ers the procedural bar to habeas relief imposed by the Antiterrorism
and Effective Death Penalty Act (AEDPA),568 before turning to recent
developments in the law that may provide hope for the wrongfully
convicted who discover digital evidence of actual innocence.
 564    United States v. Andolschek, 142 F.2d 503, 506 (2d Cir. 1944).
 565    Johnson, 92 F. Supp. 2d at 995 (quoting 5 U.S.C. § 706(2)(A)–(B) (2012)) (internal
quotation marks omitted). In the alternative, the Johnson court found that the mandamus
requirements were met because: (1) the defendant’s claim was “clear and certain”; (2) the
agencies had ignored and/or violated the standards delimiting their discretion; and (3) no
other adequate remedy was available. Id. (internal quotation marks omitted).
  566   In re Boeh, 25 F.3d 761, 770 n.4 (9th Cir. 1994) (Norris, J., dissenting).
  567   See, e.g., Hines v. Superior Court, 251 Cal. Rptr. 28, 30 (Cal. Ct. App. 1988) (laying
out guidelines for California courts making adverse findings after privilege is invoked by
state officers).
  568   Pub. L. No. 104-132, 110 Stat. 1214 (codified as amended in scattered sections of
the U.S. Code).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown         Seq: 91          21-JUL-14    12:02
  569   See 28 U.S.C. § 2244(d)(1)(A) (2012) (“A 1-year period of limitation shall apply to
an application for a writ of habeas corpus by a person in custody pursuant to the judgment
of a State court.”).
  570   See, e.g., Herrera v. Collins, 506 U.S. 390, 404–05 (1993) (“We have never held that
it extends to freestanding claims of actual innocence.”).
  571   28 U.S.C. § 2244(d)(1)(D).
  572   See id.
  573   Id. § 2244(c).
  574   See, e.g., Lee Kovarsky, Death Ineligibility and Habeas Corpus, 95 CORNELL L. REV. 329,
342 (2010) (discussing AEDPA’s statute of limitations requirement).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt   unknown            Seq: 92           21-JUL-14   12:02
  575   See, e.g., Emily G. Uhrig, The Sacrifice of Unarmed Prisoners to Gladiators: The Post-
AEDPA Access-to-the-Courts Demand for a Constitutional Right to Counsel in Federal Habeas Corpus,
14 U. PA. J. CONST. L. 1219, 1243 (2012) (discussing the doctrine of equitable tolling).
  576   See Gruenspecht, supra note 113, at 545 (“[B]ecause of the networking of digital              R
storage, third parties are now significantly more likely to possess digital data, such as per-
sonal communications and stored documents, created by others.”); Richards, supra note
154, at 1939 (describing the concept of Big Data and its potential implications); Schwartz,           R
supra note 63 (examining the legal issues surrounding GPS data privacy).                              R
  577   See Daniel M. Katz, Quantitative Legal Prediction—or—How I Learned to Stop Worrying
and Start Preparing for the Data-Driven Future of the Legal Services Industry, 62 EMORY L.J. 909,
943 (2013) (“The decrease in data storage cost and increase in processor speed has
brought with it a massive proliferation of electronically stored information . . . .”).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown          Seq: 93           21-JUL-14    12:02
patterns. This is consistent with the way the technology works: digital
parsing tools reveal patterns,578 and a pattern is not one fact in isola-
tion but rather a set of relationships between different parts.579 In
pattern recognition, some parts of the pattern will become apparent
before others, and at times almost the entire pattern will be available
with just a few pieces missing to make the picture complete. The facts
will become known at different times, although some, if not most, may
already be known at the time of trial. Generally speaking, this situa-
tion is the mosaic theory redux.580 As the Supreme Court said in
CIA v. Sims, “bits and pieces of data may aid in piecing together bits of
other information even when the individual piece is not of obvious
importance in itself.”581
      Now consider the question from the perspective of a prisoner
who finds a fact that tends toward her exoneration. Should she file
within a year, even though she has not obtained corroborating evi-
dence, or should she seek to corroborate that evidence? If she waits
but the first fact is the only one she finds, the defendant will have lost
her only chance to challenge her imprisonment.582 But if she files
within the deadline despite the fact that there is much more to find,
the defendant will have foregone her best chance to convince the
court that she is innocent based on multiple corroborating data
points. The tradeoff between time and certainty may impel prisoners
to file under-supported claims before the deadline runs, regardless of
how much corroboration they have obtained.
      The speed of a database claim may be inversely related to its relia-
bility as a hard proof of innocence. Some pieces of a data puzzle will
be open and obvious from the outset. The pattern may not be con-
vincing until the pattern is complete, but at that point it may be com-
pletely convincing. The fact that data mining excels at matching
pieces of data over time complicates things for the courts. If they per-
mit prisoners to file habeas petitions based on the timing of the last
fact discovered, past-known facts would be grandfathered in based on
the discovery of some new fact.583 If courts instead focus solely on the
date of the first related fact necessary to complete the pattern, they
could effectively foreclose the “new evidence” exception for an entire
category of digital innocence cases.
       2. Actual Innocence
     With sufficiently strong proof of digital innocence, however, peti-
tioners may be able to avoid the procedural bars of AEDPA. In its
recent decision in McQuiggin v. Perkins,584 the Supreme Court consid-
ered whether there was an actual innocence exception to AEDPA’s
diligence requirement, and if so, how strong the evidence must be to
pass through this gateway. The pre-AEDPA jurisprudence had recog-
nized a “miscarriage of justice” exception to overcome procedural
defaults in filing a habeas petition.585 In particular, an inmate who
could not provide good cause for a procedural default, such as abusive
or successive uses of the writ of habeas corpus, nonetheless “may have
his federal constitutional claim considered on the merits if he makes a
proper showing of actual innocence.”586 A credible showing of actual
innocence could overcome procedural bars to relief, “grounded in
the ‘equitable discretion’ of habeas courts to see that federal constitu-
tional errors do not result in the incarceration of innocent
persons.”587
     To be viable today, this exception would need to have survived
AEDPA’s enactment, and the relationship between pre-AEDPA law
and post-AEDPA deadlines is thorny. AEDPA’s statute of limitations
can be equitably tolled if the petitioner has acted diligently with
regards to the claim’s development and was prevented from filing by
some extraordinary event. These criteria were not met in Perkins
because the statute of limitations had expired and the defendant had
  584    See 133 S. Ct. 1924, 1928 (2013) (holding that evidence of actual innocence can
overcome the habeas statute of limitations if “in light of the new evidence, no juror, acting
reasonably, would have voted to find him guilty beyond a reasonable doubt”).
  585    See, e.g., Keeney v. Tamayo-Reyes, 504 U.S. 1, 12 (1992) (“A habeas petitioner’s
failure to develop a claim in state-court proceedings will be excused . . . if . . . a fundamen-
tal miscarriage of justice would result from failure to hold a federal evidentiary hearing.”);
Coleman v. Thompson, 501 U.S. 722, 750 (1991) (“[F]ederal habeas review of the claims is
barred unless the . . . failure to consider the claims will result in a fundamental miscarriage
of justice.”); McCleskey v. Zant, 499 U.S. 467, 494–95 (1991) (“[T]he failure to raise the
claim in an earlier petition may nonetheless be excused if . . . a fundamental miscarriage of
justice would result from a failure to entertain the claim.”); Murray v. Carrier, 477 U.S. 478,
495–96 (1986) (“[V]ictims of a fundamental miscarriage of justice will meet the cause-and-
prejudice standard.” (quoting Engle v. Isaac, 456 U.S. 107, 135 (1982)) (internal quotation
marks omitted)); Kuhlmann v. Wilson, 477 U.S. 436, 454 (1986) (“[S]uccessive federal
habeas review should . . . be available when the ends of justice so require.”).
  586    Herrera v. Collins, 506 U.S. 390, 404 (1993); see also Carrier, 477 U.S. at 496 (“[A]
federal habeas court may grant the writ even in the absence of a showing of cause for the
procedural default.”).
  587    Herrera, 506 U.S. at 404 (quoting McCleskey, 449 U.S. at 502).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt     unknown       Seq: 95         21-JUL-14    12:02
 588    See Perkins, 133 S. Ct. at 1936 (“[E]quitable tolling was unavailable to Perkins be-
cause he could demonstrate neither exceptional circumstances nor diligence.”).
 589    See id. at 1928.
 590    Id.
 591    Id. (quoting Schlup v. Delo, 513 U.S. 298, 319 (1995)) (internal quotation marks
omitted).
 592    Id.
 593    Id. at 1930 (quoting the district court’s opinion); see Perkins v. McQuiggin, No.
2:08-cv-139, 2013 WL 4776285, at *3 (W.D. Mich. Sept. 4, 2013) (dismissing petition on
remand).
\\jciprod01\productn\C\CRN\99-5\CRN501.txt      unknown   Seq: 96    21-JUL-14   12:02
                                             CONCLUSION
      In the wake of the Snowden disclosures, Americans are being
forced to weigh the costs and benefits of Big Data and mass surveil-
lance in terms of their privacy and security. To date, however, the
analysis has failed to consider an important consequence: as a result
of their spying en masse, the government and commercial entities
assume an obligation to provide criminal defendants access to poten-
tially exculpatory evidence. The depth and breadth of corporate and
government surveillance virtually guarantee that evidence of digital
innocence will be found using the tools of Big Data. This Article has
sought to identify and describe the relevant technology, and to sug-
gest a path forward to prevent wrongful convictions and exonerate the
actually innocent already behind bars. We do not revel in the emer-
gence of a surveillance society and an Orwellian national security
apparatus. But we do want to make clear one unavoidable conse-
quence for the watchers. Conceptualizing digital innocence is just the
first step, but a necessary one, to ensure that Big Data and data min-
ing are not reserved solely for convictions.