Peter Roff, 5/10/2017 [Archive]

Protecting Privacy in the Internet Age

Protecting Privacy in the Internet Age

By Peter Roff


The rise of cloud computing is forcing policymakers to take a long overdue look at the limits of privacy in cyberspace, just how far the U.S. government can go in invading it, and what the rules should to be. The global proliferation of electronic mail has given the issue a sense of urgency.

Prior to the advent of the Internet, messages sent by post were presumed the property of the sender until they reached the recipient. Equally important, the post office didn't open the letter along the way, make a copy, and perpetually keep it on file. Electronic mail differs as the servers through which it pass keeps a copy as they move toward their ultimate destination.

Up to now the government has been creative in its assertion that email trail belongs to the companies owning the servers. At times this has been a useful work around for federal prosecutors trying cases involving money laundering, terrorist financing, and other crimes where the electronic paper trail is evidence of criminal wrongdoing. Nonetheless U.S. courts have been clear the constitutional protection against illegal search and seizure still applies, meaning a warrant is usually necessary.

A July 14, 2016 ruling by the Second Circuit Court of Appeals stating the United States government cannot compel Microsoft or other companies to turn over customer emails stored on servers outside the United States has that all up for review.

The outcome of the case - Microsoft vs. the United States - hinged on the question of whether Section 2703(a) of the Stored Communications Act (SCA), the provision under which the government sought and received a search warrant for the email account applied extraterritorially. In a reversal of a lower court the circuit found it does not. The Justice Department is appealing and the case is working its way through the judiciary.

If one accepts the server carve out is legitimate - which some people don't but it is the issue at hand - current law needs to be updated to take cloud computing and other Internet-based services located offshore of the United States into account lest it all be wrecked.

Sometime in May the Senate Judiciary Subcommittee on Crime and Terrorism will be holding a hearing on this issue in response to what is believed to be a request by the U.S. Department of Justice to change existing law to make it easier for the federal government to seize data stored on servers located overseas.

If that were to happen, it would lead directly to data localization and the destruction of cloud computing, at least as it exists today. No one would be safe from the prying eyes of federal investigators as long as they could find a server located outside the United States where a document they wanted was stored or through which an email they wanted to read had passed.

Legislation updating the law on warrants like the LEADS Act, introduced in the last Congress by Utah GOP Sen. Orrin Hatch provide a way for the government to gain access to data stored in other countries based on a showing of probable cause is clearly needed. The Justice Department and other federal agencies cannot, in the course of assembling evidence in a criminal case, be allowed to vitiate the long-standing legal theory that warrants are territorial.

This is hardly a benign issue. As Edward Snowden showed us all the U.S. government has been spying on everyone. While we might want them to have easy access to information on the activities of terrorists and drug smugglers would we really want to perpetuate an international legal environment in which the Chinese or Cubans could come to the United States demanding information about the cyber-activities of human rights groups and individuals opposed to those specific regimes?

This is not an abstraction. The Justice Department now has strong guidelines, but these are only internal guidelines and they only apply to the DOJ. There needs to be a path forward to update the law to permit the cloud to be more meaningful and useful to everyone while addressing concerns about data privacy and security.

Congress has a chance to bolster the competitiveness of an emerging and important area of our information economy by moving it along.

---

© 2017 Peter Roff. Distributed exclusively by Cagle Cartoons newspaper syndicate.

Roff is a former senior political writer for UPI and a well-known commentator based in Washington, D.C. Email him at Peter.Roff@Verizon.net.

Download Peter Roff's color photo - Download Peter Roff's black and white mug shot photo
Why not run a cartoon with the column? We recommend the cartoons below as a good compliment to Peter Roff's topic.
Click on the thumbnail images to preview and download the cartoons.

Related Cartoons

Privacy Violation
By: Steve Sack

April 2, 2017

Privacy Violation
By: Steve Sack

April 2, 2017

Browser Privacy Is History
By: John Darkow

April 2, 2017
  

We do not accept and will not review unsolicited submissions from cartoonists.
Sales & Information: (805) 969-2829 sales@cagle.com
Billing Information: (805) 969-2829billing@cagle.com
Technical Support: support@cagle.com

FREE cartoons for your website if you're already a paying print subscriber!
Artwork and columns are copyrighted by each creator. All Rights Reserved. Unauthorized reproduction prohibited. [Privacy Policy]