PogoWasRight.org

Menu
  • About
  • Privacy
Menu

In U.S. v Wilson, the Ninth Circuit Reaffirms Fourth Amendment Protection for Electronic Communications

Posted on October 7, 2021June 24, 2025 by Dissent

Jennifer Lynch writes:

In a powerful new ruling for digital privacy rights, the Ninth Circuit Court of Appeals has confirmed that the police need to get a warrant before they open your email attachments—even if a third party’s automated system has flagged those attachments as potentially illegal. We filed an amicus brief in the case.

How We Got Here

Federal law prohibits the possession and distribution of child sexual assault material (also known as child pornography or CSAM). It also requires anyone who knows another possesses or is engaged in distributing CSAM to report to a quasi-governmental organization called the National Center for Missing and Exploited Children (NCMEC).

Although federal law does not require private parties to proactively search for CSAM, most, if not all major ISPs do, including Google, the ISP at issue in Wilson’s case. Once one of Google’s employees identifies an image as CSAM, the company uses a proprietary technology to assign a unique hash value to the image. Google retains the hash value (but not the image itself), and its system automatically scans all content passing through Google’s servers and flags any images with hash values that match it. Once an image is flagged, Goggle’s system automatically classifies and labels the image based on what it has previously determined the image depicts and sends the image with its label to NCMEC, along with the user’s email address and IP addresses. NCMEC then sends the images and identifying information to local law enforcement, based on the IP address.

In Wilson’s case, Google’s automated system flagged four images attached to one of his emails. No Google employee ever looked at the exact images attached to Wilson’s email. Google forwarded them to NCMEC, and NCMEC sent them to San Diego law enforcement. There, an agent opened the images and confirmed they were CSAM – without a warrant.

Read more on EFF

Related posts:

  • Google’s Scans of Private Photos Led to False Accusations of Child Abuse
  • Apple’s Plan to “Think Different” About Encryption Opens a Backdoor to Your Private Life
Category: BreachesBusinessCourtFeatured NewsGovtOnlineSurveillanceU.S.

Post navigation

← Prominent activist targeted with Indian-made spyware linked to notorious hacker group
Legal Implications of Facebook Hearing for Whistleblowers & Employers – Privacy Issues on Many Levels →

Now more than ever

Search

Contact Me

Email: [email protected]

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

Categories

Recent Posts

  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets
  • Franklin, Tennessee Resident Sentenced to 30 Months in Federal Prison on Multiple Cyber Stalking Charges
  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law

RSS Recent Posts on DataBreaches.net

  • Avantic Medical Lab hacked; patient data leaked by Everest Group
  • Integrated Oncology Network victim of phishing attack; multiple locations affected (2)
  • HHS’ Office for Civil Rights Settles HIPAA Privacy and Security Rule Investigation with Deer Oaks Behavioral Health for $225k and a Corrective Action Plan
  • HB1127 Explained: North Dakota’s New InfoSec Requirements for Financial Corporations
  • Credit reports among personal data of 190,000 breached, put for sale on Dark Web; IT vendor fined
©2025 PogoWasRight.org. All rights reserved.