13.07.2015 Views

Vol 7 No 1 - Roger Williams University School of Law

Vol 7 No 1 - Roger Williams University School of Law

Vol 7 No 1 - Roger Williams University School of Law

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Internet addressing and transactional material is generallyeither Uniform Resource Locator (URL) data or Internet Protocol(IP) addresses.44 A URL is the “electronic address” a person typeswhen sending an electronic mail message.45 “JohnDoe@aol.com”is an example <strong>of</strong> a URL address. An IP address is a computer’spersonal identification number that accompanies any electronictransmission that is sent over the Internet from that particularcomputer.46 An example <strong>of</strong> an IP address is 207.226.3.43.As the Internet has become more and more <strong>of</strong> a pervasive part<strong>of</strong> everyday life, some discussion has suggested that a traditionalanalysis, such as that invoked in Smith and Miller, should not beapplied to the Internet forum. The basis for such a proposition isthe theory that Internet addressing information, unlike moretraditional addressing or transactional material, is much morerevealing <strong>of</strong> content. For instance, if an individual logs onto aparticular Website and requests information, literature, etc., therequest message will be sent to that particular Website’s URLaddress, or mailbox.47 Therefore, if a person logs onto“WforPresident.com” and requests information about thepresidential campaign, how to donate, etc., this request will besent to the “WforPresident” Website URL. Unlike telephonedigits, which when viewed alone and in the absence <strong>of</strong> furtherinvestigation reveal little if any element <strong>of</strong> content, a simpleInternet message such as this could expressly illustrate a person’spolitical affiliations. In fact, unlike telephone numbers, theinterception <strong>of</strong> URL information can give law enforcement a fairlycomprehensive picture <strong>of</strong> the individual’s interests and activitiesonline.48 The FBI could know what type <strong>of</strong> books an individualreads, his romantic and artistic interests, and much more.49Advocates against the application <strong>of</strong> traditional reasoning arguethat such information is more analogous to a telephoneconversation than the digits dialed and thus should receive Fourth44. See Carnivore’s Challenge, supra note 6.45. See Tim Wyatt, Secure Shopping, Dallas Morning News, Apr. 27, 2000, at 3J;see also J. Timothy Hunt, Moving Target, Nat’l Post, Oct. 1, 2000, at 48.46. Carnivore’s Challenge, supra note 6.47. Id.48. See James X. Dempsey, Communications Privacy in the Digital Age:Revitalizing the Federal Wiretap <strong>Law</strong>s to Enhance Privacy, 8 Alb. L.J. Sci. & Tech. 65(1997).49. See id.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!