Mail Cover Surveillance - Problems & Recommendations, NACDL, 2015
Download original document:
Document text
Document text
This text is machine-read, and may contain errors. Check the original document to verify accuracy.
MAIL COVER SURVEILLANCE: PROBLEMS AND RECOMMENDATIONS A Report by NACDL’s Fourth Amendment Advocacy Committee Reporter: Steven R. Morrison April 19, 2015 Mail Cover Surveillance: Problems and Recommendations Steven R. Morrison Reporter, NACDL Vice-Chair, Fourth Amendment Advocacy Committee April 19, 2015 Introduction Mail cover surveillance (“mail covers”), which is the investigative practice of recording the information listed on the outside of mail going to or from a designated address, has existed since the nineteenth century. 1 While often a legitimate tool of criminal investigations, mail covers have been abused. They were used in the 1950s against suspected communists and expanded to include surveillance of the contents of letters.2 Indeed, CIA and FBI agents used mail covers to intercept hundreds of thousands of letters in the 1950s and 1960s, sometimes smuggling them out of post offices to open and read them to avoid postal worker intervention.3 It was only after a fifteen year-old girl was targeted in the 1970s for sending a letter to the Socialist Workers Party as a class assignment that the abuses came to light. 4 As a result of these abuses, mail cover regulations were promulgated in 1975, and now appear at 39 C.F.R. § 233.3.5 Based on concerns about the vagueness and overbreadth of 1 David S. Kris & J. Douglas Wilson, In General, NATIONAL SECURITY INVESTIGATIONS AND PROSECUTIONS § 21:1. 2 Id. 3 Id. 4 Paton v. La Prade, 469 F.Supp. 773 (D.N.J. 1978); Mail Snooping Needs More Accountability, DES MOINES REGISTER, Oct. 30, 2014. 5 Kris & Wilson, supra note 1. authorizing mail covers for “national security,” the regulations were amended in 1979 to include a more precise definition of that term.6 Despite these reforms, concerns about mail covers have persisted. In 1986, the South Florida Sun-Sentinel expressed concern that mail covers doubled from 1978 through 1985, from 4,379 to 8,597.7 The September 11, 2001 terrorist attacks prompted the Bush Administration to seek expanded mail cover authority, a move that concerned both the Postal Service and privacy and civil rights advocates. 8 In the eleven years since 2001, local, state, and federal law enforcement agencies made more than 100,000 requests for mail covers.9 One of these requests came from Maricopa County Sheriff Joe Arpaio to monitor the mail of Mary Rose Wilcox, a frequent critic of Arpaio and a Maricopa County supervisor. 10 Wilcox sued the county and won a $1 million settlement.11 In the early 2000s, federal prosecutors used a mail cover to monitor the communications between a criminal defendant and his lawyers. 12 In 2013, a former member of the Earth Liberation Front and a current bookstore owner learned his mail was being tracked.13 In response, a former Justice Department official said the current regime does not track criminal suspects, but the approach seems to be, “Let's record everyone's mail so in the future we might go back and see who you were communicating with.” 14 6 Id. Government Surveillance of Suspect Mail is Doubled, SOUTH FLORIDA SUN-SENTINEL, Mar. 2, 1986. 8 Eric Lichtblau, Bush Plan Would Let FBI Track Mail, DESERET MORNING NEWS, May 21, 2005. 9 Ron Nixon, Report Reveals Wider Tracking of Mail in U.S., NEW YORK TIMES, Oct. 27, 2014. 10 Id. 11 Id. 12 Id. 13 Ron Nixon, U.S. Postal Service Logging All Mail for Law Enforcement, NEW YORK TIMES, July 3, 2013. 14 Id. 7 2 Most recently, the Washington Post reported that the U.S. Postal Service almost never denies applications for mail covers.15 A 2014 U.S. Postal Service audit of the mail cover program revealed the breadth of the mail cover program as well as its systemic failures in authorization and monitoring.16 In 2013 alone, the Postal Service processed about 49,000 mail covers. 17 The report detailed the following violations of the governing regulation: 21 percent of requests were approved without written authority; 13 percent of requests were not adequately justified or reasonable grounds for them were not transcribed accurately; 27 percent of requests were not entered into the application in a timely fashion; 61 percent of accountable documents were not returned on time; 32 percent of case files did not include the dates that Postal Inspectors visited facilities where mail covers were processed; 10 percent of case files did not have the dates of the mail period coverage or mail counts; 15 percent of inspectors did not have the required nondisclosure form on file; 32 percent of case files were not returned to the Postal Inspection Service Office of Counsel in a timely fashion after the mail cover period ended; Mail cover requests were not always processed in a timely fashion; 15 Josh Hicks, Postal Service Almost Never Denies Mail-Surveillance Requests, WASHINGTON POST, Dec. 30, 2014. 16 Office of the Inspector General, United States Postal Service, Postal Inspection Service Mail Covers Program, May 28, 2014. 17 Id. at 1. 3 Officials did not periodically review the criminal programs as required.18 The audit reported that inadequate controls generated these failures.19 Officials at seven postal facilities cited their focus on mail processing and employee turnover as primary reasons for inadequate controls.20 The audit finally recommended improved controls for mail cover processing, timeliness, and data integrity, and establishing procedures for periodic reviews of mail covers. 21 It remains unknown whether these or other recommendations will be taken up. In the meantime, constitutional and privacy concerns persist. This report addresses these concerns. To do so, it is organized as follows. In Part I, the report describes mail covers and 39 C.F.R. § 233.3, which is the sole authority governing mail covers. In Part II, the report sets forth the relevant law. This law primarily is that of the Fourth Amendment, especially involving the potential impact of United States v. Jones,22 the 2012 GPS tracking case. It also includes, to a lesser degree, First Amendment law on association, receipt of information, and anonymity. Part III discusses three potential constitutional and privacy issues generated by mail cover surveillance. These issues are (1) whether mail covers ever entail a Fourth Amendment violation; (2) whether § 233.3, if it is followed, is adequate to protect Fourth Amendment rights; and (3) whether § 233.3 is adequate to protect sub-Fourth Amendment privacy concerns (this issue assumes that there are such sub-constitutional privacy issues, and this portion of the report discusses them). Finally, Part IV proposes a set of recommendations that should protect 18 Id. at 2-6. Id. at 3-4. 20 Id. at 4. 21 Id. at 6-7. 22 132 S.Ct. 945 (2012). 19 4 individuals’ privacy, improve systemic mail cover controls, and ensure that legitimate law enforcement efforts are not hindered. I. Mail covers and 39 C.F.R. § 233.3 39 C.F.R. § 233.3 provides “the sole authority and procedure for initiating a mail cover, and for processing, using and disclosing information obtained from mail covers.” 23 Section 233.3 defines a mail cover as the process by which a nonconsensual record is made of any data appearing on the outside cover of any sealed or unsealed class of mail matter, or by which a record is made of the contents of any unsealed class of mail matter as allowed by law, to obtain information in order to: (i) Protect national security, (ii) Locate a fugitive, (iii) Obtain evidence of commission or attempted commission of a crime, (iv) Obtain evidence of a violation or attempted violation of a postal statute, or (v) Assist in the identification of property, proceeds or assets forfeitable under law. 24 The USPS is supposed to maintain “rigid control and supervision” over mail covers.25 The Chief Postal Inspector is the principal officer supervising mail covers. He may delegate any or all authority to a limited number of designees,26 who may authorize mail covers in response to a written request, stating a reason to believe the mail cover will produce evidence of a violation of a postal statute or reasonable grounds to demonstrate the mail cover is necessary to protect national security, locate a fugitive, obtain information regarding a crime, or assist in the identification of forfeitable assets. 27 When time is of the essence, an oral request for a mail cover may be acted upon.28 23 39 C.F.R. § 233.3(b). § 233.3(c)(1). 25 § 233.3(a). 26 § 233.3(d). 27 § 233.3(e). 28 § 233.3(e)(3). 24 5 With some exceptions, not vital to this report, postal officials may not record mail cover information in the absence of a mail cover order.29 In addition, they may not open, inspect the contents of, or permit such inspection of sealed mail without a federal search warrant.30 Mail cover orders are not to include correspondence between a target and her known attorney.31 Except to locate a fugitive or for national security investigations, mail cover orders remain in effect for only thirty days. They may be extended with adequate justification, and new thirty-day periods may be authorized.32 Mail cover orders may last longer than 120 days only with the personal approval of the Chief Postal Inspector or his designees at National Headquarters.33 Except to locate fugitives, mail cover orders are ineffective once a target has been indicted or an information has issued. If a target is being investigated for further crimes or to locate her assets for forfeiture, a new mail cover order may issue.34 National security mail cover requests must be approved personally by the head of the law enforcement agency requesting the cover or a designee at the agency’s headquarters level. This request must be transmitted, in writing, to the Chief Postal Inspector.35 The Chief Postal Inspector is to have custody of all mail cover requests, records of actions ordered thereon, and all reports generated pursuant thereto.36 If the Chief Postal Inspector or his designee determines that a mail cover was improperly ordered, all 29 § 233.3(f)(1) (These exceptions include undelivered mail found abandoned or in the possession of a person reasonably believed to have stolen or embezzled such mail; damaged or rifled, undelivered mail; or mail posing an immediate threat to persons or property.). 30 § 233.3(g)(1). 31 § 233.3(g)(3). 32 § 233.3(g)(5). 33 § 233.3(g)(6). 34 § 233.3(g)(7). 35 § 233.3(g)(8). 36 § 233.3(h)(1). 6 data acquired as a result of the order is to be destroyed and the requesting authority notified of the discontinuance of the mail cover.37 Data generated from a mail cover is to be available to a target through appropriate discovery procedures, 38 and the data is to be retained for eight years. 39 The Chief Postal Inspector or his designee at Inspection Service Headquarters is to periodically review mail cover orders issued to ensure compliance with § 233.3.40 A separate periodic review of national security mail cover orders is mandated.41 The Chief Postal Inspector’s determination in all matters involving mail covers is final and conclusive, and is not subject to further administrative review.42 Section 233.3 does not apply to the military postal system. 43 II. Relevant law: Fourth and First Amendments Mail covers are potentially limited by the Fourth Amendment as well as First Amendment rights to associate, to receive information, and to anonymity. a. Fourth Amendment: Ex Parte Jackson In 1877, the United States Supreme Court in Ex Parte Jackson held that the Fourth Amendment protects the contents of letters and sealed packages subject to letter postage from inspection in the absence of a warrant or other justification.44 The Court also ruled, however, that the Fourth Amendment did not protect letters’ and packages’ “outward form and weight.”45 As to “printed matter” (advertisements, bulk mail, and 37 § 233.3(h)(2). § 233.3(h)(3). 39 § 233.3(h)(4). 40 § 233.3(j)(1). 41 § 233.3(j)(2). 42 § 233.3(j)(3). 43 § 233.3(k). 44 Ex Parte Jackson, 96 U.S. 727, 733 (1877). 45 Id. 38 7 other mail open to examination), the Court held that contents may be inspected but transportation of such matter could not be regulated “so as to interfere in any manner with the freedom of the press.”46 Jackson, therefore, stood for three propositions. First, the Fourth Amendment protects the contents of letters and packages that senders generally consider private. Second, the Fourth Amendment does not protect information on mail covers. Third, mail has both Fourth Amendment and First Amendment implications. b. Fourth Amendment: Katz v. United States The U.S. Supreme Court’s opinion in Katz v. United States set forth the familiar two-part privacy test for implicating the Fourth Amendment.47 Under the Katz test, an individual is protected by the Fourth Amendment in areas where she has an actual (subjective) expectation of privacy, and when that expectation is one that society is prepared to accept as reasonable.48 Katz, moreover, generally reaffirmed Ex Parte Jackson.49 As Katz tracked the holding in Jackson, which protected the contents of mail but not the information on mail covers, courts have uniformly held that mail covers usually do not violate the Fourth Amendment.50 At least one court, however, has left open the possibility that mail covers that extend beyond their proper scope may generate Fourth Amendment violations.51 To date, however, violations of § 233.3 have not resulted in suppression of evidence. The justification for the lack of suppression is that although 46 Id. 389 U.S. 347 (1967). 48 Id. at 361 (Harlan, J., concurring). 49 Id. at 351-52. 50 Daniel E. Feld, Validity, Under Fourth Amendment, of “Mail Cover”, 57 A.L.R. FED. 742 (1982). 51 United States v. Huie, 593 F.2d 14, 15 (5th Cir. 1979). 47 8 violations of mail cover regulations lead to unauthorized surveillance, the information surveilled is not protected by Katz and the Fourth Amendment. The violation is therefore merely regulatory, not constitutional, and thus suppression is unavailable.52 c. Fourth Amendment: United States v. Jones In 2012, the Supreme Court issued its opinion in United States v. Jones,53 which is a potential basis for successful Fourth Amendment challenges to mail covers where Katz-based challenges have been unsuccessful. In that case, the Court held that the attachment of a GPS device to a suspect’s car, which was then used to track the suspect on public streets for twenty-eight days, was a Fourth Amendment search.54 Justice Scalia, writing for the majority, based the opinion on the trespass model of the Fourth Amendment, in which government agents perform Fourth Amendment searches when they physically enter or access private property to obtain information.55 While Justice Scalia discounted the validity of the Katz privacy test in favor of the trespass approach,56 Justices Sotomayor and Alito, concurring, ensured that Katz remains good law.57 Alito went a step further, basing his opinion in part on what some scholars have called the “mosaic theory” of the Fourth Amendment, pursuant to which a Fourth Amendment search occurs when government agents observe enough publicly 52 United States v. Hinton, 222 F.3d 664, 674 (9th Cir. 2000); United States v. Felipe, 148 F.3d 101, 109 (2d Cir. 1998) (citing U.S. v. Caceres, 440 U.S. 741, 755-57 (1979)); United States v. Loudon, 2009 WL 88339, *1-2 (D.Vt.); Kris & Wilson, supra note 1. 53 132 S.Ct. 945 (2012). 54 Id. at 949. 55 Id. 56 Id. at 953. 57 Id. at 954-55, 959-60 (Sotomayor, J., concurring; Alito, J., concurring). 9 ascertainable conduct or information to create a picture of a suspect so detailed as to meet the Katz privacy test.58 He wrote, [R]elatively short-term monitoring of a person's movements on public streets accords with expectations of privacy that our society has recognized as reasonable . . . But the use of longer term GPS monitoring in investigations of most offenses impinges on expectations of privacy. For such offenses, society's expectation has been that law enforcement agents and others would not — and indeed, in the main, simply could not — secretly monitor and catalogue every single movement of an individual's car for a very long period. In this case, for four weeks, law enforcement agents tracked every movement that respondent made in the vehicle he was driving . . . I conclude that the lengthy monitoring that occurred in this case constituted a search under the Fourth Amendment. 59 Jones presents two possible arguments against the constitutionality of some mail covers. First, Justice Scalia’s trespass argument may lead courts to conclude that mail covers entail “occupying” an individual’s private property, namely the envelope that she sends through the mail, and are therefore searches. Second, Justice Alito’s mosaic theory argument may lead courts to conclude that mail covers of long duration comprise searches. Both approaches would result in some mail covers being deemed Fourth Amendment searches. They would, therefore, have to be initiated by a search warrant or other justification; satisfaction of § 233.3’s requirements would not be sufficient to overcome the constitutional hurdle. The trespass argument has some merit in the mail cover context. Just as someone who drives her car on a public street relinquishes her right to hide the appearance of her car and her location at any given moment, but does not relinquish her possessory interest in the car, someone who sends a letter in the mail relinquishes and retains the same interests. However, Justice Scalia’s trespass argument depended upon government agents 58 United States v. Katzin, 732 F.3d 187, 237 n. 23 (3d Cir. 2013); Orin S. Kerr, The Mosaic Theory of the Fourth Amendment, 111 MICH. L. REV. 311 (2012). 59 Jones, 132 S.Ct. at 964. 10 “occupying” private property by placing a device on someone’s car. In contrast, mail covers simply gather information from the outside of an envelope or package; they do not attach anything to private property. That said, the trespass involved in mail covers is that government officials must take possession of and detain, if only for a brief moment, private property in a way that they would not possess and detain it if they were merely processing mail for delivery. While attaching a GPS device to a car is more obviously a trespass than handling mail for a mail cover, the difference can be viewed as one of degree, and not quality. As such, the Jones trespass theory may provide a basis for Fourth Amendment mail cover challenges. The mosaic theory argument is more convincing in one way, and less convincing in another way, than the trespass argument. It is more convincing because the very purpose of a mail cover is to establish a target’s network of people with whom she communicates. This type of information is not available unless the target is surveilled persistently and over a period of days. Mail covers are virtually explicitly meant to create a mosaic. Furthermore, the maximum initial regulatory period of mail covers is thirty days — two days longer than the twenty-eight day period considered in Jones (one suspects that virtually all mail covers are authorized for at least thirty days, no less). Jones, therefore, speaks directly to the mail cover regime. However, the basis for this argument is not the originalist, well-established trespass approach, but the novel, academic mosaic theory. For a court to hold that mail covers are Fourth Amendment searches, it would have not only to find so under either Katz or Jones, but also to adopt the mosaic theory. The time may not yet be ripe for such a jurisprudential innovation. 60 60 See, e.g., United States v. Cuevas-Perez, 640 F.3d 272, 284 (7th Cir. 2011); In re Application of F.B.I., 2014 WL 5463097, *10 (FISC); United States v. Graham, 846 F.Supp.2d 384, 390-91 (D.Md. 2012). 11 d. First Amendment: Paton v. La Prade While most courts have rejected First Amendment arguments against mail covers on the grounds that surveillance of the outside of mailings cannot infringe upon free speech,61 others have claimed that the First Amendment is implicated because mail cover data reveals much about a target’s “relationships with both individuals and organizations.”62 In United States v. Gering, the Ninth Circuit rejected a defendant’s argument that mail covers entail per se violations of the First Amendment, but suggested that there may be a violation in cases where a defendant can demonstrate an actual First Amendment burden.63 In another case, the Ninth Circuit implied that mail covers might violate the First Amendment when initiated for the purpose of abridging First Amendment freedoms.64 The major case presenting a First Amendment challenge to mail covers was Paton v. La Prade.65 In that case, Lori Paton was enrolled in her high school’s social studies course. To complete one of her assignments, Paton wrote a letter to the Socialist Labor Party requesting information about its program, policies, and positions.66 Paton inadvertently addressed the letter to The Socialist Workers Party, against which the FBI had initiated a mail cover.67 61 United States v. Choate, 576 F.2d 165, 180-81 (9th Cir. 1978); Cohen v. United States, 378 F.2d 751, 760 (9th Cir. 1967). Indeed, the recent decision ACLU v. Clapper, which upheld the government’s bulk telephony metadata collection program, looked for support to prior courts’ rejection of First Amendment arguments against mail covers. 959 F.Supp.2d 724, 753 (S.D.N.Y. 2013). 62 Choate, 576 F.2d at 203 (Hufstedler, J., concurring and dissenting). 63 716 F.2d 615, 620 (9th Cir. 1983); see also United States v. Mayer, 490 F.3d 1129, 1137 (9th Cir. 2007). 64 United States v. Aguilar, 883 F.2d 662, 705 (9th Cir. 1989). 65 469 F.Supp. 773 (D.N.J. 1978). 66 Id. at 774-75. 67 Id. at 775. 12 When the FBI obtained Paton’s letter, it opened an investigation on her for “subversive” matter, and a field investigation ensued. It soon became local and national news that Paton was the subject of an FBI investigation. 68 The district court found that Paton had the First Amendment right to receive her requested information “free of government interference and to remain anonymous in her request for political information.”69 The court also, however, limited its holding to national security cases, finding that they “often reflect a convergence of First and Fourth Amendment values not present in cases of ‘ordinary’ crime.”70 The court therefore addressed only mail covers involving national security, ultimately holding that “[n]ational security as a basis for the mail cover is unconstitutionally vague and overbroad.”71 In a more recent case, a former member of the Earth Liberation Front and a current bookstore owner, Leslie Pickering, learned his mail was being tracked.72 In that case, the post office accidently sent to Pickering a card ordering the mail cover and reading, “Show all mail to supv” — supervisor — “for copying prior to going out on the street.” It included Pickering’s name, address and the type of mail that needed to be monitored. The word “confidential” was highlighted in green. The post office confirmed to Pickering that it was tracking his mail, but would say nothing else. These cases suggest three potential First Amendment challenges to mail covers. While not strictly prohibiting communication or directly infringing upon First 68 Id. at 776. Id. at 778. 70 Id. at 781. 71 Id. at 782. 72 Nixon, supra note 13. 69 13 Amendment rights, mail covers may chill individuals’ right to associate, 73 to receive information,74 and to engage in First Amendment activity anonymously. 75 To be sure, Paton and Pickering knew they were being monitored — often a requirement for a successful First Amendment claim because it is thought that without knowledge of monitoring, the monitoring cannot chill First Amendment activities.76 Without knowledge, there can often be no standing.77 However, the standing requirement has been relaxed for First Amendment overbreadth claims, allowing litigants to challenge a law “not because their own rights of free expression are violated, but because of a judicial prediction or assumption that the statute’s very existence may cause others not before the court to refrain from constitutionally protected speech or expression.”78 III. Three issues Based on the mail cover regime and the relevant law, there are three potential constitutional and privacy issues generated by mail cover surveillance. These issues are (1) whether mail covers ever entail a Fourth Amendment violation; (2) whether § 233.3, if it is followed, is adequate to protect Fourth Amendment rights; and (3) whether § 233.3 is adequate to protect sub-Fourth Amendment privacy concerns. a. Do mail covers ever entail a Fourth Amendment violation? Courts have uniformly held that mail covers do not entail Fourth Amendment violations because they function to reveal only information that is already readily visible to anyone who observes the mailing. Under the Katz expectation of privacy test, courts 73 N.A.A.C.P. v. Alabama ex rel. Patterson, 357 U.S. 449 (1958). Kleindienst v. Mandel, 408 U.S. 753, 762 (1972). 75 McIntyre v. Ohio Elections Com’n, 514 U.S. 334, 342 (1995). 76 Cooksey v. Futrell, 721 F.3d 226, 236 (4th Cir. 2013); Toscano v. Lewis, 2013 WL 1632691, *5 (N.D.Cal.). 77 See Clapper v. Amnesty Int’l USA, 133 S.Ct. 1138 (2013). 78 Broadrick v. Oklahoma, 413 U.S. 601, 612 (1973). 74 14 have held that no one has a reasonable expectation of privacy in the information contained on mailings’ external packaging. Since Jones, however, no court has considered the constitutionality of mail covers under the Fourth Amendment. Jones presents a potential for mail covers to be found unconstitutional in some cases where the mail cover surveillance was particularly longlasting and invasive. There are three notable issues in this analysis. First, the length of time the mail cover is in place matters for two reasons. A period of twenty-eight days of GPS tracking in Jones was too long to satisfy the Fourth Amendment, though the Court refrained from setting a constitutionally permissible period of time during which agents could track a suspect via GPS without a warrant. The first reason that the length of time matters in the mail cover context is simply that it mattered in Jones. The second reason that it matters is that § 233.3 authorizes mail covers for renewable thirty-day periods. Each period is therefore two days longer than Jones’ twenty-eight days. The length of time a mail cover is in effect could, therefore, implicate the Fourth Amendment in two ways: the length of time could entail a violation, and § 233.3 itself, authorizing a thirty-day period, could itself be held unconstitutional, at least as applied in certain cases. Second, the intensity of the search matters. Justice Alito’s opinion in Jones rested in part on how much information officers could glean from a persistent GPS tracking of the defendants. In turn, how intensive a mail cover is could contribute to whether it violates the Fourth Amendment. Third, whether proper procedures were followed matters. Justice Scalia’s opinion in Jones rested on a trespass theory, which could have been overcome had the officers in 15 that case executed their search warrant in a timely fashion. Just as proper police procedures in Jones could have led to an avoidance of the trespass-based Fourth Amendment violation, so could following § 233.3 in the mail cover context. At the very least, whether the mail cover regulations were followed could contribute to a finding of constitutionality or unconstitutionality. The important upshot is that if a mail cover is found to have entailed a Fourth Amendment violation, then suppression of resulting evidence is an option. However, if only § 233.3 was violated, then suppression is not available. b. Is § 233.3 adequate to protect Fourth Amendment rights? Most provisions of § 233.3 are untroubling from a strictly Fourth Amendment point of view. Sections (g)(5) and (g)(6), however, present potential constitutional problems. Section (g)(5) provides for a thirty-day period of mail monitoring, with thirtyday extensions only with “adequate justification.” Section (g)(6) provides for a maximum 120-day continuous period of monitoring, with extensions beyond that only if personally approved by the Chief Postal Inspector or his designees at National Headquarters. There are two ways that these provisions could violate the Fourth Amendment. First, as noted above, Jones could be interpreted to mean that even an initial thirty-day period of monitoring is unconstitutional without a search warrant. Second, Jones should likely be interpreted to mean that a mail cover at some point of duration becomes unconstitutional in the absence of a search warrant. How long that period is could depend upon at least two factors. 16 First, it could depend upon how courts understand the value and volume of information gleaned from a mail cover. If the value and volume is viewed as similar to that of GPS tracking, as in Jones, then the acceptable time period should roughly track that of future cases that refine Jones. Twenty-eight days of monitoring could, in light of Jones, constitute a violation. Second, it could depend upon the safeguards in place. In Jones, the government agents had an expired search warrant, which the Court effectively treated as no search warrant at all. Therefore, in Jones, safeguards were entirely lacking. Section 233.3 does, however, provide some safeguards. If followed, they could serve to make mail covers more “reasonable” for Fourth Amendment purposes and thus enlarge the period of time mail covers are constitutionally permissible. Conversely, if § 233.3 is not followed, such a regulatory violation might decrease the amount of time a mail cover may be constitutionally in effect.79 c. Is § 233.3 adequate to protect sub-Fourth Amendment privacy issues? Whether § 233.3 is adequate to protect sub-constitutional privacy issues — i.e. privacy interests that are not protected by the Fourth Amendment — depends upon a normative assessment of what those issues are. Section 233.3 raises a number of them, involving who authorizes of mail covers; evidentiary standards and procedures for authorization; reliability of evidence supporting authorization; and retention of evidence gleaned from mail covers. A final issue, that of the duration of mail covers, is detailed above and not repeated here. 79 To be sure, courts prior to Jones did not consider a regulatory violation in their Fourth Amendment analyses. This was so because the information gleaned was in plain view, so there could be no Fourth Amendment violation. Post-Jones, however, lengthy surveillance of people and information in plain view at some point violates the Fourth Amendment. The question is when. The duration of time matters, but so too should the presence of safeguards and whether procedures were followed. 17 The first potential privacy issue concerns the people who may authorize mail covers. Section 233.3(d) provides that the Chief Postal Inspector or his designees may authorize mail covers, and § 233.3(j)(3) makes these authorizations “final and conclusive and not subject to further administrative review.” This is problematic for three related reasons. First, mail covers are being authorized by postal inspectors, and not judges, who have experience evaluating evidence, applying evidence to evidentiary standards, and judging credibility of witnesses and affiants. Second, the evidence presented by law enforcement agents to postal inspectors is not presented under oath in an affidavit, nor is its presentation subject to the penalties of perjury. Third, there appears to be little scrutiny of the reliability of evidence presented to postal inspectors. The second potential privacy issue is that there appears to be no appellate process in place to correct for errors, negligence, or willful misrepresentation. In short, the process of authorization appears siloed, impervious to external criticism, and not based on any critical analysis of evidence provided in mail cover applications. The evidentiary standards and procedures for authorization exacerbate the problems inherent in the process of authorization. While mail cover applications must be made in writing,80 they need only state a “reasonable grounds to demonstrate the mail cover is necessary to” further the legitimate purposes of a mail cover (to protect the national security, locate a fugitive, etc.).81 The “reasonable grounds” standard is generally applied to brief, superficial law enforcement encounters with individuals, like Terry stops and brief, on-the-street seizures.82 These stops and seizures are meant to permit law enforcement agents to quickly determine whether crime is afoot in as short a 80 39 C.F.R. § 233.3(d)(3). 39 C.F.R. § 233.3(e)(2). 82 Illinois v. Wardlow, 528 U.S. 119 (2000); Terry v. Ohio, 392 U.S. 1 (1968). 81 18 time as possible. They are not meant to justify persistent, invasive surveillance like a mail cover. The “reasonable grounds” standard that justifies mail cover orders seems excessively deferential to law enforcement in relation to the resulting surveillance and in comparison to other government actions justified by the same standard. To make matters worse, there appears to be no requirement that agencies that request a mail cover must meet any level of evidentiary reliability. The rules of evidence do not apply, nor are they even admonitory guidelines; applicants need not file affidavits under oath; no hearings are held, as they are for search warrant applications; it seems sufficient merely to state — with no evidence whatsoever — that a mail cover is necessary; and there is no provision for a Franks hearing or its equivalent to test the truthfulness of the contents of an application. Because suppression is not available in the mail cover context, there is no deterrent to either negligent or intentionally bad police conduct or rubber-stamping of applications. Once a mail cover is in place, postal agents begin to collect data on a target’s sent and received mail. This data must be stored for eight years.83 This is quite a long period of time, exceeding by three years even the storage period of data the National Security Agency generates in its bulk telephony metadata program, which Edward Snowden revealed.84 If privacy advocates have been concerned with the lengthy storage of mounds of telephony metadata85 and, as another example, automatically collected data on date- 83 39 C.F.R. § 233.3(h)(4). Klayman v. Obama, 957 F.Supp.2d 1, 37 (D.D.C. 2013). 85 In response, President Obama last year advanced a policy to end the bulk storage of such metadata. Obama to end NSA’s mass storage of telephone metadata, REUTERS, Jan. 17, 2014, available at http://www.cnbc.com/id/101345381#. 84 19 stamped locations of automobiles,86 they should also be concerned with this eight-year storage of mail cover data. IV. Remedies and recommendations There are a number of potential and actual problems with the current mail cover regime. First, there appear to be systemic failures to follow § 233.3 with regard to authorization, justification, processing, oversight, and recordkeeping. Second, United States v. Jones opens the possibility that at least some mail covers may violate the Fourth Amendment. Third, even if § 233.3 is followed such that there is no Fourth Amendment violation, mail covers may violate some sub-constitutional principles of privacy because there are siloed and unreviewable authorization procedures, low evidentiary standards for authorization, no checks on the reliability of such evidence, an eight-year data retention mandate, and potential problems with the duration of mail covers. This section outlines remedies and recommendations, including litigation strategies, to address these problems. a. Systemic failures to follow § 233.3 At a minimum, government agents ought to follow their own regulations. NACDL therefore seconds the OIG’s recommendation to improve managerial controls over authorization, processing, oversight, and reviews of mail cover program protocols. These improved controls, however, are only as good as the enforcement mechanisms that ensure them. Congress should, therefore, considering passing a law that requires suppression of evidence gleaned from a mail cover if the evidence was obtained during the course of a reckless or intentional violation of § 233.3. This standard would not penalize agents who occasionally do not follow § 233.3 provisions because of their focus 86 Bennett Stein, FOIA Documents Reveal Massive DEA Program to Record American’s Whereabouts With License Plate Readers, ACLU, Jan. 26, 2015, available at https://www.aclu.org/blog/technology-andliberty-criminal-law-reform/foia-documents-reveal-massive-dea-program-record-ame. 20 on, say, mail processing or employee turnover, 87 but would require them to ensure that, over time, these resource issues are not used as an excuse to maintain an illegal mail cover program.88 b. The United States v. Jones remedy Katz has never been an effective basis for arguing that mail covers violate the Fourth Amendment because the expectation of privacy in the outside of a mailing is not reasonable. United States v. Jones, however, has opened new avenues for Fourth Amendment arguments against mail covers. Defense attorneys should use Jones to argue for Fourth Amendment violations and therefore for suppression of evidence generated by mail covers. They can do so in four ways. First, as a general matter, attorneys should use Jones to argue that the plain view doctrine is infirm in the age of mass, persistent surveillance. Because government agents are able to persistently and easily monitor suspects over time, they can generate a mosaic image of a suspect with information available only in plain view. As in Jones, this means that the Katz expectation of privacy test may have new vitality, even where agents surveille suspects or data solely in plain view. Second, and specifically regarding certain mail covers, attorneys should argue that some mail covers entail surveillance for an excessive and therefore unconstitutional length of time. Jones’ twenty-eight-day period offers a grounded baseline. 87 Lack of resources has, indeed, been claimed by postal authorities as a reason for failure to comply with § 233.3. Office of the Inspector General, United States Postal Service, Postal Inspection Service Mail Covers Program, May 28, 2014. 88 This approach can be compared to Fourth Amendment law on maintaining warrant databases, pursuant to which negligent maintenance of databases does not warrant suppression, but that systemic, reckless, or intentional failure to maintain databases may result in suppression. See Herring v. United States, 129 S.Ct. 695 (2009). 21 Third, attorneys can argue that mailings consist of senders’ private property, such that any government action upon such mailing (beyond that which is necessary to process the mailing) is a trespass. In the absence of a warrant (which § 233.3 does not, of course, require), any information gleaned from such trespass must be suppressed under Jones. Fourth, attorneys can argue that failure to follow the provisions of § 233.3 contribute to the unreasonableness and thus unconstitutionality of any subsequent search. To be sure, prior courts have rejected such arguments, concluding that a violation of a regulation, in the absence of a Fourth Amendment violation, does not make suppression available. However, Jones may convince courts that a mail cover can be a Fourth Amendment search. If it does, then the question of the reasonableness of that search arises. Any regulatory violation could contribute to a finding of unreasonableness. c. Siloed and unreviewable authorization procedures Currently, the decisions of the Chief Postal Inspector or his designees regarding mail covers are unreviewable. This violates basis principles of due process and checks and balances, and has resulted in abuses throughout the history of the mail cover program. NACDL recommends the creation of a review or appellate-type system. This system cannot be based upon suspects or their attorneys challenging mail covers, since to be effective mail covers must be secret. The system should, therefore, be housed in the government. Much like current proposals to have a privacy advocate in Foreign Intelligence Surveillance Courts to challenge what have been viewed as one-sided, rubber-stamping procedures to obtain surveillance orders in the national security context,89 mail cover procedures should be subject to similar internal controls. 89 Denver Nicks, Privacy Advocates Call for FISA Court Reform, TIME, July 10, 2014, available at http://time.com/2970766/privacy-freedom-act-reform-secret-nsa-oversight-fisa/. 22 d. Low evidentiary standard and unreliable evidence Currently, mail cover authorizations require only reasonable grounds, and there exist no apparent checks on the reliability of evidence presented to support such a low evidentiary standard. This low bar has been criticized in the national security context, and should be addressed in the mail cover context. Section 233.3(e)(2) provides that one may authorize a mail cover “when the requesting authority specifies the reasonable grounds to demonstrate the mail cover is necessary.” NACDL recommends that this provision be altered to authorize a mail cover “when the requesting authority specifies the reasonable grounds to demonstrate the mail cover is necessary and the Chief Postal Inspector or his designee concludes there are articulable facts, based on reliable evidence, to believe the mail cover is necessary.” The authorizing person should then be required to record and maintain the articulable facts and reasons the supporting evidence is reliable. During a subsequent criminal proceeding, suppression of evidence should be an available remedy if a judge determines that there were no articulable facts or the evidence supporting them was unreliable. e. Eight-year data retention mandate There appears to be no justification for maintaining mail cover data for eight years; if national security-related telephony metadata is retained only for five years, the retention of more mundane mail cover data for eight years seems arbitrary. NACDL recommends that the Postal Service and Congress consider revising that period down. While a certain period of data retention is justified — both for law enforcement purposes and to protect potential defendants’ rights — that period should be grounded in reason. 23 Conclusion While mail covers have been used since the nineteenth century, their benefit to law enforcement must be analyzed in light of their demonstrated abuses. The 2014 OIG report is just the latest evidence that the mail cover program is not always followed according to law. Even if the law were followed, Fourth Amendment and privacy concerns persist. This report has detailed the mail cover program, its abuses and systemic failures, the relevant law, and has provided a set of recommendations that can protect individuals’ privacy while permitting law enforcement agents to use mail covers to effectively investigate crime. In the post-Jones and national security era, addressing the potential for mail covers to violate the Fourth Amendment and privacy norms is more important than ever. *** 24