Legal Sidebari
The Fourth Amendment and the Internet:
Legal Limits on Digital Searches for Child
Sexual Abuse Material (CSAM)
March 24, 2022
Various federal statu
tes criminalize the production, distribution, solicitation, and possession of “child
pornography,”
defined in part as “any visual depiction” of sexually explicit conduct involving a minor.
Over time, Congress has sought to augment the enforcement of these provisions and limit the
dissemination of such material online in several ways. Among other things, f
ederal law requires covered
interactive computer service (ICS) providers, such as companies like Google and Meta, to report
“apparent violation[s]” of the statutes that involve child pornography to the CyberTipline operated by the
National Center for Missing and Exploited Children (NCMEC), a private, nonprofit organization that
receives government funding. NCM
EC refers to the material subject to reporting under the statute as
Child Sexual Abuse Material (CSAM), a term it views as “most accurately reflect[ing] what is depicted—
the sexual abuse and exploitation of children.” NCMEC i
s required by federal law to make these provider
reports available to law enforcement agencies, and NCMEC receives
legal protection from any claims
arising from the performance of its CyberTipline responsibilities and other actions, with certain
exceptions.
Currently, nothing in federal law requires providers
to monitor their services or content for CSAM in the
first instance. Under the law, although providers must report CSAM to NCMEC, which must then make
the reports available to law enforcement, providers are
not obligated to “affirmatively search, screen, or
scan for” these violations. Nevertheless, many provide
rs opt to voluntarily detect, remove, and report
CSAM on their platforms. Against the backdrop of
an increase in reports to NCMEC of suspected online
child sexual exploitation during the COVID-19 pandemic, legislation in the 117th Congress
would seek to
bolster the CSAM reporting regime by establishing a commission to promulgate voluntary best practices
for providers, among other things, as well as to
apply similar reporting frameworks to a broader set of
criminal acts.
Although CSAM
is both illegal by statute and unprotected under the First Amendment’s Free Speech
Clause, identifying and reporting CSAM nonetheless poses policy and legal hurdles. At least one major
player in the effort to remove online CSAM, Apple, has
faced backlash from privacy advocates over a
reportedly delayed plan to scan iCloud-stored photos on a user’s device for CSAM. Additionally, federal
Congressional Research Service
https://crsreports.congress.gov
LSB10713
CRS Legal Sidebar
Prepared for Members and
Committees of Congress
Congressional Research Service
2
courts are still grappling with the scope of important constitutional limits to the existing reporting regime.
For instance, in a recent decision creating a circuit split, the Nint
h Circuit held that law enforcement
violated th
e Fourth Amendment to the U.S. Constitution, which protects against “unreasonable
[government] searches and seizures,” by viewing email attachments containing apparent CSAM flagged
by Google and reported through NCMEC without a warrant. This Sidebar provides an overview of the
Fourth Amendment’s application to the existing CSAM reporting regime, including points of divergence
in recent federal caselaw that could impact congressional efforts to further encourage private ICS
providers to search for and report CSAM or other evidence of criminality.
Overview of Fourth Amendment State Action and Private Search Doctrines
The Fourth Amendment prohibits “unreasonable searches and seizures,” which ordinarily
means that law
enforcement must obtain a judicially authorized warrant based on probable cause before conducting a
search for evidence of criminal wrongdoing. In the absence of a warrant, the government typically must
show that an exception to the warrant requirement, su
ch as exigent circumstances, justified the search.
The Supreme Court has interpreted the Fourth Amendment to require the exclusion from trial of evidence
obtained in unreasonable searches unless an exception applies, generally preventing the government from
using that evidence to prove that the defendant committed a crime.
As with other constitutional guarantees, the Fourth Amendment constrains
only governmental action,
meaning that it typically does not apply to a search, however unreasonable, that a private individual or
entity voluntarily carries out. Under the state action doctrine, however, the Fourth Amendment
does apply
to private action “if the private party acted as an instrument or agent of the Government.” Whether a
private individual sho
uld be deemed such an instrument or agent for purposes of the Fourth Amendment
“necessarily turns on the degree of the Government’s participation in the private party’s activities” in
light of all the circumstances of the particular case. Where the government has directed a private party to
conduct a search—fo
r example, a police officer using a nurse to draw blood from a suspected drunk
driver—the search likely involves state action.
A private search could also involve state action even in the absence of an express government mandate. In
Skinner v. Railway Labor Executives’ Association, the Supreme Cou
rt held that private railroads
conducted searches subject to the Fourth Amendment when they tested employees for drug and alcohol
use in light of federal regulations that authorized the tests. Although the regulations at issue did not
mandate that the railroads order the challenged t
ests, they expressed a “strong preference for testing” and
“removed all barriers” to doing so. Specifically, according to the Court, the regulations did this by
authorizing and encouraging railroads to order the tests following certain procedures, preempting state
law or private agreements on the subject, providing that railroads could not contract away the testing
authority, entitling the regulating agency to receive certain testing results, and subjecting employees who
refused the testing to certain employment consequences. In
light of these “clear” signs of government
“encouragement, endorsement, and participation,” the Court concluded that the testing was not “primarily
the result of private initiative” and thus was “suffic[ient] to implicate the Fourth Amendment.”
Beyond the state action doctrine, a corollary concept sometime
s referred to as the private search doctrine
reflects that a private search without state action ordinarily will not implicate the protections of the Fourth
Amendment even if the results of the search are thereafter transmitted to the government. Should
government officials, such as law enforcement officers, subsequently conduct a search of the transmitted
materi
als that “exceed[s] the scope of the private search,” however, that secondary search may trigger the
Fourth Amendment. Whether a government actor’s follow-on search exceeds the scope of a private search
hinges on the degree to
which an individual’s reasonable expectation of privacy has been frustrated. In
Walter v. United States, the Court determined that FBI agen
ts exceeded the scope
of a private search of
packages that revealed film boxes with pictures and descriptions on the outside suggesting they were
obscene. On the basis of the pictures and descriptions, the private party th
at discovered the film boxes
Congressional Research Service
3
contacted the FBI, which took and viewed the films to confirm they were obscene in violation of federal
law. Although the Supreme Court did not settle on a single rationale, a majority of th
e Justices agreed that
the FBI conducted an unlawful Fourth Amendment search. According to at least four Justices, the FBI
exceeded the scope of the private search by opening the boxes and viewing the films, becaus
e although
the private search may have frustrated the defendants’ expectation of privacy in the contents of the
packages in part, there remained an “unfrustrated portion of that expectation” of privacy as to the content
of the
films.
By contrast, in the later case
United States v. Jacobsen, the Court held that DEA agents did
not exceed the
scope of a package search conducted by a private mail carrier, which revealed a suspicious white powder,
by reopening the package, removing the powder, and conducting a field test identifying the powder as
cocaine. In the Court’
s view, the DEA agent’s re-removal of the powder from its package “hardly
infringed respondents’ privacy,” as the private employees had already examined the package’s contents of
their own accord before contacting law enforcement. As to the field test, the Court indicated that the test
di
d not compromise any “legitimate privacy interest” in the powder because it could only reveal whether
the substance was cocaine—contraband that no one had a right to privately possess—and “no other
arguably ‘private’ fact.”
Status of ICS Providers and NCMEC Under Existing Law
Several feder
al courts of appeals have determined that ICS providers, despite their statutory obligation to
report apparent violations of federal CSAM statutes to NCMEC (and ultimately law enforcement), are not
considered government actors subject to the Fourth Amendment when they voluntarily undertake to
search for such material on their platforms. For example, in
United States v. Stevenson, the Eighth Circuit
addressed AOL’s practice of automatically scanning files on its network for CSAM. The defendan
t argued
that AOL acted as a government agent when it scanned his email, because federal law required the
company to report any violations it detected and immunized AOL for performing that duty. The Eighth
Circuit d
isagreed, distinguishing the CSAM-specific obligations from the more comprehensive provisions
in
Skinner that preempted other laws and agreements and prescribed consequences for failure to submit to
the favored private action.
According to the appellate court, the statutory requirement to report CSAM,
“standing alone, does not transform an Internet service provider into a government agent whenever it
chooses to scan files sent on its network for [CSAM].”
In contrast, in an opinion authored by then-Judge Neil Gorsuch, the Tenth Circuit
held in
United States v.
Ackerman that NCMEC itself
is a government entity or agent in this context.
Looking to the
“comprehensive” statutory scheme governing NCMEC, the court recognized that Congress required
NCMEC to report CSAM “at the government’s expense and backed by threat of sanction” and with
“special dispensation, too, to NCMEC to possess and review contraband knowingly and intentionally.” In
short, the court held that “Congress funded [NCMEC], required [providers] to cooperate with it, allowed
it to review [the defendant’s] email by excepting it from various federal criminal laws, and statutorily
mandated or authorized every bit of its challenged conduct” in opening email attachments forwarded from
AOL and alerting law enforcement. Although the court ultimately
declined to exclude the evidence at
issue in
Ackerman from the defendant’s trial based on an exception to the exclusionary rule,
Ackerman
suggests that NCMEC could be considered a state actor in facilitating the identification and reporting of
CSAM.
Circuit Split Regarding Scope of Private Search for CSAM
With respect to the scope of private ICS provider searches for CSAM, and the question of whether
NCMEC or law enforcement review of forwarded material exceeds that scope, recent appellate decisions
have created a circuit split based on differing views of the technological mechanism providers use to
screen for illicit material. Many providers rely on what is
known as “hash-value” matching to identify
Congressional Research Service
4
CSAM on their platforms. Essentially, the proces
s involves assigning known CSAM a unique identifier,
the hash value, so that files shared on a provider’s platform can be efficiently and automatically screened
against that universe for matches. In other words, a provider might use hash values to identify files that
match the unique identifier of known CSAM automatically, suggesting with a high degree of accuracy
that the files are themselves CSAM without a person having to inspect each individual file on a provider’s
platform visually. In recent cases, the Fifth, Sixth, Eighth, and Ninth Circuits have all addressed the
practice of hash-value matching in similar contexts: where a provider identifies CSAM through the
automated hash-value matching process, reports the offending files, and law enforcement ultimately
opens and views the files that the provider flagged based on the matching hash values. T
he Fifth, Sixth,
and
Eighth Circuits held that in this situation, so long as only matching files are subsequently inspected
by law enforcement, the follow-on government search does not exceed the scope of the provider’s hash-
value search, even though the nature of that underlying process does not involve visual inspection by
provider employees of the files that are reported. These courts relied on the h
igh degree of
reliability of
the pr
ocess, analogies between the relevant search and the search and testing of the white powder in
Jacobsen, and th
e fact that the nature of hash-value matching means that a person at some point viewed
files identical to the flagged ones and identified them as CSAM.
In a 2021 opinion,
United States v. Wilson, the Ninth Circuit split from the other circuits and
held that law
enforcement review of email attachments tagged by Google as CSAM through hash-value matching
“exceed[ed] the limits of the private search exception as delineated in
Walter and
Jacobsen and their
progeny.” In the Ninth Circuit’
s view, a “large gap” existed between the information revealed by
Google’s process and by a law enforcement officer’s subsequent visual inspection of the flagged email
attachments, such that
Walter “offer[ed] a much more apt comparison” than the search in
Jacobsen.
According to th
e court, as in Walter, viewing the email attachments “substantively expanded the
information available to law enforcement far beyond what the label” from Google’s matching process
“alone conveyed, and was used to provide probable cause to search further and to prosecute.” The court
also emphasized that no one at Google had actually viewed the email attachments at issue but had only at
some point viewed images that were then matched with the images in the attachments. The court
expressly
rejected the conclusions reached by the Fifth and Sixth Circuits described above.
Considerations for Congress
The Supreme Court has not addressed whether, in the context of CSAM reporting, (1) NCMEC is a
government entity or agent, (2) ICS providers are private actors in light of statutory reporting
requirements, or (3) law enforcement examination of a hash-value-matched file exceeds the scope of an
initial search using that process. Based on appellate caselaw to date, it appears that the Fourth
Amendment permits voluntary ICS provider searches for CSAM without a warrant but may not authorize
NCMEC to exceed the scope of those searches absent judicial process or a recognized exception to the
Fourth Amendment warrant requirement. (In this respect, it is always possible that particular searches
could be permissible even assuming NCMEC or another entity is acting as a government agent and
intrudes on a user’s reasonable expectation of privacy without a warrant based on probable cause—for
instanc
e, if exigent circumstances exist.)
As the 117th Congress considers whether changes to the existing CSAM reporting regime should be made,
it may wish to consider the extent to which additional statutory inducement for ICS providers to
undertake CSAM searches could implicate the state action doctrine. Even in the absence of an express
mandate to search, incentives or requisite procedures for CSAM se
arches might be viewed by a court as
additional government “encouragement, endorsement, and participation” in ICS provider screening for
CSAM under
Skinner. Beyond the question of whether and when an entity is considered an agent of the
government for Fourth Amendment purposes, courts’ treatment of hash-value searching could also have
implications for ICS providers’ ability to stem the flow of CSAM voluntarily and for any contemplated
Congressional Research Service
5
congressional support of such efforts. Under the Ninth Circuit’s view in
Wilson, hash-value matching by
an ICS provider is not sufficient to permit subsequent warrantless review of the matched content by
government actors. As such, under
Wilson, to insulate its CSAM reporting and review from Fourth
Amendment scrutiny, a provider employee would need to inspect visually the images flagged as CSAM
through hash-value matching. In contrast, such inspection would not be required to invoke the private
search doctrine under the caselaw from the Fifth, Sixth, and Eighth Circuits
, which the Supreme Court
declined to
review. It remains to be seen whether and when the Court or additional circuits may address
this nascent circuit split.
Author Information
Michael A. Foster
Legislative Attorney
Disclaimer
This document was prepared by the Congressional Research Service (CRS). CRS serves as nonpartisan shared staff
to congressional committees and Members of Congress. It operates solely at the behest of and under the direction of
Congress. Information in a CRS Report should not be relied upon for purposes other than public understanding of
information that has been provided by CRS to Members of Congress in connection with CRS’s institutional role.
CRS Reports, as a work of the United States Government, are not subject to copyright protection in the United
States. Any CRS Report may be reproduced and distributed in its entirety without permission from CRS. However,
as a CRS Report may include copyrighted images or material from a third party, you may need to obtain the
permission of the copyright holder if you wish to copy or otherwise use copyrighted material.
LSB10713 · VERSION 1 · NEW