United States v. DiTomasso

OPINION AND ORDER

SHIRA A. SCHEINDLIN, District Judge:

1. INTRODUCTION

Frank DiTomasso faces criminal charges for the production and transportation of child pornography. Much of the government’s case against DiTomasso depends on evidence found on his computer — evidence that he claims was obtained in violation of the Fourth Amendment. Accordingly, DiTomasso has moved to suppress (1) evidence obtained when internet service provider (“ISP”)1 American Online (“AOL”) examined the content of his email, (2) evidence obtained when ISP Omegle.com LLC (“Omegle”) examined the content of his chats, and (3) all “information and tangible and intangible evidence obtained through subsequent searches by [law enforcement]” as fruit of the poisonous tree.-2

*587This Opinion addresses two questions. First, it addresses the threshold question of whether DiTomasso had an expectation of privacy in the content of his emails and chats. If so, his Fourth Amendment challenge to AOL’s and Omegle’s conduct may proceed. If not, the challenge fails as a matter of law. Second, it addresses whether DiTomasso, by agreeing to AOL’s and Omegle’s respective terms of use, consented to a search of his emails and/or his chats.

For the reasons set forth below, DiTo-masso’s motion to suppress is DENIED in part.

II. BACKGROUND

A. AOL Emails

DiTomasso has an AOL email account— frahkieinnycl@aol.com. When AOL users send or receive emails that contain attachments, AOL runs two background monitoring systems designed to scan for illicit material, including, but not limited to, child pornography.3 The programs work by assigning “hash numbers” to image and video files. In essence, hash numbers are unique number-strings that can be used to archive packets of data — “fingerprint[s]” for electronic media.4

AOL employs two different hashing programs. The first — the Image Detection and Filtering Process (“IDFP”) — -sweeps for one-to-one matches with known child pornography.5 If an attached file is a one-to-one match, the émail is quarantined— i.e., diverted from the recipient’s inbox— and an automatic report is generated and sent to the National Center for Missing and Exploited Children (“NCMEC report”).6

AOL’s second hashing program — “pho-toDNA” — looks for similarities among hash numbers.7 If photoDNA identifies an attachment with a hash number close enough to known child pornography to raise alarm, the email is once again quarantined, and “an AOL employee reviews the flagged file to confirm the presence of apparent child pornography.”8 Once the presence of apparent child pornography is confirmed, the employee “submit[s] a [NCMEC report],”9 and the file’s hash number is entered into the IDFP database.

On August 17, 2012, two emails intended for frankieinnycl@aol.com were hashed and quarantined, giving rise to two corresponding NCMEC reports. The first email, which formed the basis of NCMEC report # 1560137, was hashed using pho-toDNA — and its contents were reviewed by an AOL employee.10 The second email, which formed the basis of NCMEC report # 1558963, was hashed using IDFP.11 No AOL employee reviewed its contents.

B. AOL’s Privacy Policy

At the time of the disputed searches, AOL’s privacy policy and terms of use required users to assent to the following *588conditions. First, they forbade users from “posting] content that contains explicit or graphic descriptions or accounts of sexual acts or is threatening, abusive, harassing, defamatory, libelous, deceptive, fraudulent, invasive of another’s privacy, or tor-tious.”12 Second, AOL’s terms provided that “AOL reserves the right to take any action it deems warranted” in response to illegal behavior, including “terminating] accounts and cooperating] with law enforcement.” 13 Third, AOL’s terms made clear that if users “disclose information about [themselves] publicly ... others outside of AOL may obtain access to [such] information,” and furthermore, that AOL itself may disclose to others — including law enforcement — “information [that is] relevant to a crime that has been or is being committed.”14

C. Omegle Chats

Omegle.com is an online platform that “randomly pairs a user in a one-on-one session with a stranger, and allows strangers to communicate via text and video chats.”15 Omegle monitors “for inappropriate content ... by capturing snapshots from chats that are conducted on Ome-gle,” 16 which are then “analyze[d]” by an automated program “for content that is likely to be inappropriate, including, but not limited to, child pornography.”17 When the automated program flags inappropriate content, the chats are “passed on to two human reviewers,” 18 and if a reviewer finds evidence of child pornography, a NCMEC report is filed.19

On three separate occasions — November 30, 2012, January 4, 2013, and December 11, 2013 — snapshots of DiTomasso’s Ome-gle chats were flagged for evidence of child pornography. This led to the filing of three NCMEC reports: # 1704143, # 1741964, and # 2235394, respectively.20

D. Omegle’s Privacy Policy

At the time of the disputed searches, Omegle’s privacy policy set forth the following conditions. First, Omegle’s policy explained that Omegle keeps “record[s] of the IP addresses involved in every chat,”21 The policy articulated numerous reasons for maintaining such records — including “for the purpose of law enforcement.”22 Second, Omegle’s policy also made clear that it engages in two forms of monitoring' distinct from its IP record-keeping, which are intended for “quality control purposes.” 23 The first is that messages flagged as spam “may be read by a human being to improve Omegle’s anti-spam software.”24 The second is that “[w]ebcam videos may be captured from Omegle video *589charts ... and monitored,” on an ad hoc basis, “for misbehavior.”25 Third, Ome-gle’s policy cautioned users to be “careful about what information [they] reveal” during chats, because “strangers can potentially tell other people anything you tell them.”26

E. DiTomasso’s Probation

At the time of the disputed searches, DiTomasso was on probation in connection with a 2010 conviction for possession of child pornography.27 The probation terms—to which DiTomasso consented— required, among other- things, that he “[pjermit [his] probation officer or their designee to inspect and access your computer at anytime, [] including] storage devices and any other media.”28

III. APPLICABLE LAW

A. Expectations of Privacy in General

The Fourth Amendment to the United States Constitution protects “the right of the people to be secure ... against unreasonable searches and seizures.” 29 Whether an investigative activity qualifies as a “search”—and triggers Fourth Amendment scrutiny—depends on subjective expectations of privacy.30 If (1) an individual expects that information will remain private, and (2) society is “prepared to recognize [that expectation] as ‘reasonable,’”31 the Fourth Amendment regulates the investigation of that information by law enforcement.

Constitutionally-recognized “expectations of privacy” differ in two important respects from the “mere expectation ... that certain facts will not come to the attention of the authorities.”32 First, the Fourth Amendment does not protect ill-advised trust. It provides no recourse for “a wrongdoer’s misplaced belief that a person to whom he voluntarily confides his wrongdoing will not reveal it.”33 By disclosing sensitive information to someone else, one runs the risk that the other person will reveal the information to law enforcement.

Second,.“a person has no legitimate expectation of privacy in information that he voluntarily turns over to third parties.” 34 Because this principle, if taken to its logical endpoint, would erode nearly all privacy protections, in Smith v. Maryland the Supreme Court distinguished between (1) the “contents of communieation[ ]” and (2) the ancillary information that the act of communication incidentally discloses.35 Today, this distinction is often described as the difference between data and metadata. While the former retains Fourth Amendment protection even if disclosed to a third *590party, the latter loses its protection immediately once disclosed.

B.Diminished Expectations of Privacy While on Probation

“Probationers and parolees are subject to ‘a degree of impingement upon privacy that would not be constitutional if applied to the public at large.’ ”36 In United States v. Knights, the Supreme Court held that probation agreements containing consent-to-search provisions “significantly diminish! ] [the probationer’s] expectation of privacy.”37 In so holding, the Court explicitly reserved the question of whether a consent-to-search provision simply “diminishe[s], or completely eliminate[s], [the probationer’s] expectation of privacy”38— and correspondingly, whether “a search by a law enforcement officer without any individualized suspicion would [satisfy] the reasonableness requirement of the Fourth Amendment.”39

Elaborating on these principles, the Second Circuit has explained that “persons on supervised release who sign [] documents [consenting to future searches of their home] manifest an awareness that supervision can include intrusions into their residence and, thus, have ‘a severely diminished expectation of privacy.’ ”40 Furthermore, the Second Circuit has also held that home visits by probation officers — as opposed to full probationary searches — do not even require “reasonable suspicion,” because home visits are so much “less intrusive.” 41

C. Fourth Amendment Standing

“Fourth Amendment rights are personal rights which ... may not be vicariously asserted.”42 A person lacks standing to raise Fourth Amendment claims if the disputed evidence was procured “by a search of a third person’s premises or property” rather than his own premises or property.43

D. Consent to Search

“[T]he ultimate touchstone of the Fourth Amendment is reasonableness.”44 Even if a search would otherwise be invalid — -because it encroaches unreasonably on one’s expectations of privacy — “an individual may consent to a search, thereby rendering it reasonable.”45 Consent only renders a search reasonable, however, if “the consent was ‘a product of [the] individual’s free and unconstrained choice.’ ”46 This *591test is not as exacting as the “knowing and intelligent waiver” standard familiar to other areas of criminal procedure.47 Rather, “so long as [consent is] not coerce[d], a search conducted on the basis of consent is not [ ] unreasonable.”48 Ultimately, whether consent was properly given is an “objective” question: it depends on how “the typical reasonable person [would understand]” the conduct supposedly amounting to consent49

IV. DISCUSSION

A. DiTomasso’s Expectations of Privacy

In assessing DiTomasso’s expectations of privacy, three questions arise. First, did DiTomasso have an expectation of privacy in his electronic communications? Second, did DiTomasso’s probation agreement, granting his probation officer (or the officer’s designee) blanket permission to “inspect and access [his] computer at any time,”50 extinguish his expectation of privacy? Third, does the fact that DiTomas-so never received the emails — because they were quarantined by AOL — deprive him of standing to raise a Fourth Amendment challenge?

1. Expectations of Privacy in Electronic Communications Generally

The government offers multiple theories why DiTomasso had no expectation of privacy in his electronic communications. First, the government maintains that by “broadcasting] his statements in the presence of others”51 — that is, by exchanging emails and chats with other people — DiTomasso relinquished his expectation of privacy in those statements. This argument is baseless. Although the government is correct that “when an individual reveals private information to another, he assumes the risk that his confidant will reveal [it] to the authorities,”52 it does not follow that no expectation of privacy exists. In fact, just the opposite: it only make sense to speak of a betrayed expectation of privacy insofar as one has an expectation of privacy. The government’s reliance on the “misplaced confidence” cases is not helpful.

On the government’s logic, if DiTomasso were to disclose private information to a friend over the phone- — which, by the nature of the act, would cause DiTomasso to “assume[ ] the risk” that his friend might relay the information to law enforcement— he would have no expectation of privacy in the phone call, and no Fourth Amendment protection would apply. This reasoning was rejected by the Supreme Court in Katz v. United States,53 when it held that disclosing information to someone else does not automatically permit intrusion (in particular, wiretapping) by law enforee*592ment. To this day, Katz remains a “lodestar” of Fourth Amendment law.54

Second, the government argues that even if DiTomasso had an expectation of privacy in the .emails, the same is not true of the chats, because the latter occurred in “a public chat room, which was open to all who cared to enter.”55 The government likens DiTomasso’s “statements in [the Omegle chatroom]” to “those made loudly ... while standing in a town square”56 — a category of disclosure that clearly falls beyond the scope of Fourth Amendment protection.

This argument misunderstands how Omegle works. Although the company adopts the term “chatroom” to refer to its online platform, that platform is “a far cry from the public chat rooms that were popular [ ] years ago,” in which “a user [knew] that his comments are out there for the rest of the world to see.”57 Indeed, the whole point of Omegle’s service is to allow two strangers to chat anonymously, and only with one- another. For Fourth Amendment purposes, there is no distinction between an Omegle chat and an email correspondence — or for that matter, between an Omegle chat and a phone call. Both involve one-on-one interactions that users clearly expect to be kept private.

Third, the government suggests that DiTomasso had no expectation of privacy in his electronic communications because the ISPs responsible for facilitating those communications — -AOL and Ome-gle — warned him that they might be “monitor[ing]” his activity.58 Given DiTomas-so’s “clear and explicit” notice that AOL “reserved the right to :.. disclose[ ] the content of his communications to law enforcement, if [DiTomasso used] his email account for illegal activities,”59 and that Omegle was using an “automated system” to “screen [DiTomasso’s chats]” and potentially “share [them] with third parties, including law enforcement,”60 the government argues that DiTomasso can claim no reasonable expectation that his emails and chats “would not be reviewed].”61

Along with the Sixth and Ninth Circuits, both of whom have addressed variations on this argument,62 I conclude that it would subvert the purpose of the Fourth Amendment to understand its privacy guarantee as “waivable” in the sense urged by the government. In today’s world, meaningful participation in social and professional life requires using electronic devices — and the use of electronic devices almost always requires acquiescence to some manner of consent-to-seareh terms. If this .acquiescence were enough to waive one’s expectation of privacy, the result would either be (1) the chilling of social interaction or (2) the evisceration of the Fourth Amendment. Neither result is acceptable.

*593In her concurrence in United States v. Jones, Justice Sonia Sotomayor wrote that in “the digital age,” people tend to “reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks,” making it “necessary to reconsider the premise that an individual has no reasonable expectation of privacy in information voluntarily disclosed to third parties.”63 Justice So-tomayor is certainly correct. But even beyond that, the “premise” to which she refers — that “an individual has no expectation of privacy in information voluntarily disclosed to third parties” — is not nearly as strong, in Fourth Amendment jurisprudence, as the government implies.

For example, the Supreme Court has held that employees, including public employees, enjoy an expectation of privacy in their workplace desks — and that the expectation stays intact vis-a-vis law enforcement even if it would be unreasonable, given the “operational realities” of the workplace, for employees to expect the same privacy protection from their supervisors.64 In other words, when employees constructively consent to searches by their supervisors, it does not automatically follow that they also consent to searches by law enforcement. Similarly, in the context of hotels,- it is well-established that granting hotel management access to one’s room for limited purposes — for example, in case of emergency, or for housekeeping — neither vitiates one’s expectation of privacy in the room nor authorizes hotel employees to consent to a search by the government on behalf of the guest.65

Both of these holdings cut against the government’s position. In essence, the government argues that by consenting to have his emails and chats searched by AOL and Omegle — as DiTomasso arguably did when he agreed to their respective terms of use — he also consented to permitting the government to search. Fourth Amendment privacy, however, is a context-sensitive question of societal norms. In some domains, people expect information to stay shielded from law enforcement even as they knowingly disclose it to other parties. As the Supreme Court has recognized, workplace desks and hotel rooms are two such domains. In the digital age, electronic communication is another.

Moreover, the lower-court cases that the government cites — United States v. Hagood, from the Northern District of California, and United States v. Caraballo, from the District of Vermont — do not support its position. Neither case holds that users lack an expectation of privacy in the contents of digital communication. Rather, both cases are about expectations of *594privacy in the metadata of digital communication. In Hagood, the court held that the defendant had no expectation of privacy in his IP address because an IP address is “analog[ous] [ ] to the outside of a letter, and the monitoring of an IP address [is analogous to] a pen register.”66 Similarly, in Caraballo, the court held that the defendant had no expectation of privacy in the location information generated by his cell phone.67 These cases do not support the proposition that DiTomasso lacked an expectation of privacy in the content of his emails and chats.68

2. DiTomasso’s Probation Agreement Does Not Extinguish His Expectation of Privacy

The government argues that DiTomasso’s expectation of privacy in his computer&emdash;and by extension, in his emails and chats&emdash;was “severely diminished” by his probation agreement,69 which gave his “probation officer or their desig-nee” blanket license to “inspect and access [DiTomasso’s] computer at anytime, [] including] storage devices and other media.”70

Even supposing the government is right, however, it requires a significant leap to conclude that DiTomasso had no expectation of privacy in his computer. Were that so, any government actor could continually surveil all of DiTomasso’s electronic communications without ever triggering Fourth Amendment scrutiny. This would be a radical extension of existing case law. If anything, the probation search cases are about a probationer’s expectations of privacy vis-a-vis his probation officer, not visa-vis all law enforcement.71 And even then, it is unclear whether probationers have no expectation of privacy from their probation officers&emdash;or whether Fourth *595Amendment protection still applies, but in an attenuated fashion.72

If it had been DiTomasso’s probation officer who examined his chat history, or who looked through his emails, this might well be a different case. As it stands, however, I cannot conclude that DiTomas-so’s probation agreement extinguished his expectations of privacy vis-a-vis law enforcement in general.

3. AOL’s Interception of DiTomasso’s Emails Does Not Vitiate His Expectation of Privacy

Finally, the government argues that DiTomasso does not have “standing” to challenge the search of emails that “[he] never received.”73 In other words, “[b]e-cause [DiTomasso] has not shown that he had any reasonable expectation of privacy in the emails of another that never came into his possession,” he cannot raise a Fourth Amendment claim.74

This arguments fails. For Fourth Amendment purposes, there is no basis for treating recipients of email differently from senders of email. Both have a reasonable expectation of privacy in the content of correspondence. If the government’s reasoning were correct, law enforcement officers could read a user’s incoming email with impunity, so long as they made sure to divert it from the user’s inbox before doing so. In other words, on the government’s logic, a search that might otherwise be subject to Fourth Amendment scrutiny — were the email in the recipient’s inbox — would escape Fourth Amendment scrutiny if law enforcement took the added step of seizing the email outright.

This, as DiTomasso rightly puts it, “is completely antithetical to the general public’s expectations of privacy.”75 Although he cites no case law squarely on point— and I have not been able to locate any— the reason for the lack of authority is clear. The government’s position is untenable.

Nevertheless, a helpful parallel arises in cases involving the surveillance of prisoner mail. There, courts have assumed that prisoners have a privacy interest in all mail, regardless of whether it is incoming or outgoing — and any Fourth Amendment analysis proceeds from that assumption. If prisoners have an expectation of privacy in their incoming mail, it follows a fortiori that free citizens do as well.76 Furthermore, for the purposes of this inquiry— whether recipients, in addition to senders, enjoy an expectation of privacy in their correspondence — there is no difference between regular mail and email. The same *596holds for both. DiTomasso has standing, as the intended recipient of the emails hashed and quarantined by AOL, to raise a Fourth Amendment claim.

B. DiTomasso Consented to Search of His Emails, But Not His Chats

Having established that DiTomasso had an expectation of privacy in the content of his electronic communications, the final question the Court must resolve is whether DiTomasso consented to a search of those communications by law enforcement. Because consent cases typically involve encounters between citizens and police officers, the voluntariness of agreement is often a source of controversy. Here, by contrast, there is no question that DiTo-masso voluntarily agreed to AOL’s and Omegle’s policies. The only question is what he consented to by doing so.

As the Supreme Court has explained, this question should be answered “objective[ly]”&emdash;by reference to what a “typical reasonable person [would understand]” AOL’s and Omegle’s policies to mean.77 Furthermore, to hold that DiTomasso waived his Fourth Amendment rights with respect to the monitoring of his chats or emails, it is not enough to conclude that the policies contemplated a search by AOL or Omegle in their capacity as private entities. ' Rather, to hold that DiTomasso waived his Fourth Amendment rights, it would be necessary to conclude that the policies contemplated a search by AOL or Omegle in a law enforcement capacity. Put otherwise, because DiTomasso’s constitutional claim rests on the proposition that AOL and Omegle were acting as government agents when they monitored his electronic communications, the policies only defeat his constitutional claim if, by agreeing to them, he was consenting to a search by AOL and Omegle as government agents.

Omegle’s policy makes two references to “law enforcement.”78 First, it puts users on notice that “Omegle keeps a record of the IP addresses involved in every chat,” and that those “records are intended to be used for the purpose of law enforcement.”79 Second, at its conclusion, the policy reiterates that Omégle “may [ ] share[ ] with third parties for the purposes of law enforcement” the “records” that it keeps,80 though the log of IP addresses is the only “record” mentioned. In other sections, the policy also explains that Ome-gle reserves the right&emdash;for “quality control purposes”81&emdash;to monitor user chats for the purposes of (1) filtering spam and (2) ferreting out “misbehavior.”82

On these facts, I cannot conclude that DiTomasso consented to a search by Ome-gle in a law enforcement capacity. Ome-gle took snapshots of DiTomasso’s .chats and parsed them for content. Although that form of monitoring is referenced in the policy, it is mentioned exclusively as a means of “monitoring for misbehavior”83&emdash; by which the policy clearly means violations of Omegle’s rules, not criminal activity&emdash;and of improving Omegle’s internal monitoring system.84

*597A reasonable person, having read carefully through the policy, would certainly understand that by using Omegle’s chat service, he was running the risk that another party — including Omegle — might divulge his sensitive information to law enforcement. But this does not mean that a reasonable person would also think that he was consenting to let Omegle freely monitor his chats if Omegle was working as an agent of law enforcement. When Omegle’s policy refers to the “law enforcement [purpose]” behind maintaining IP address records, it is unclear whether this “purpose” is motivated (1) by Omegle’s independent desire to aid criminal investigations, or (2) by Omegle’s obligations under state or federal law. In other words, it is plausible to interpret the policy as implying that Ome-gle is required to keep IP address records. So construing the policy, a reasonable user would be unlikely to conclude that Omegle intended to act as an agent of law enforcement. And such a user would he even less likely to conclude that he had agreed to permit such conduct.

AOL’s policy is quite different. Not only does it explicitly warn users that criminal activity is disallowed,85 and that AOL monitors for such activity; the policy also explains that “AOL reserves the right to take any action it deems warranted” in response to illegal behavior, including “terminating] accounts and cooperating] with law enforcement.”86 The policy, also makes clear that AOL reserves the right to reveal to law enforcement' information about “crimes[s] that [have] been or [are] being committed.”87 In contrast to Ome-gle’s policy, which includes only a passing reference to law enforcement — and which gives no indication of the role Omegle intends to play in criminal investigations— AOL’s policy makes clear that AOL intends to actively assist law enforcement. For this reason, I conclude that a reasonable person familiar with AOL’s policy would understand that by agreeing to the policy, he was consenting not just to monitoring by AOL as an ISP, but also to monitoring by AOL as a government agent. Therefore, DiTomasso’s Fourth Amendment challenge fails as to the emails.

Y. CONCLUSION

For the foregoing reasons, I conclude that DiTomasso had a reasonable expectation of privacy in the contents of his Ome-gle chats as well as his AOL emails. However, by agreeing to AOL’s terms of service, DiTomasso consented to a search of his AOL emails by law enforcement, thereby waiving his Fourth Amendment rights. Therefore, the two NCMEC reports arising from DiTomasso’s AOL emails, # 1560137 and # 1558963 — as well as any other evidence gathered as a result of those reports — are admissible under the Fourth Amendment.

The constitutional status of NCMEC reports # 1704143, # 1741964, and # 2235394 — the reports resulting from Omegle chats — remains unresolved. The next question this Court must address is whether Omegle’s monitoring of DiTomas-so’s chats was a “private search,” outside the bounds of constitutional protection, or whether it was a search carried out at the *598behest of law enforcement, which would trigger Fourth Amendment scrutiny. Because DiTomasso addressed this issue in his initial memorandum, and the government has offered a response in opposition, DiTomasso is ordered to submit a supplemental reply, of no more than ten pages and limited to the private search issue, by November 3, and the government is ordered to submit a supplemental sur-reply, also of no more than ten pages and limited to the private search issue, by November 10. A suppression hearing is scheduled for November 13 at 10 AM.

SO ORDERED.

. The exact meaning of "Internet Service Provider” is unclear. Wikipedia defines the term broadly — to encompass not only entities that provide "internet service,” thereby allowing consumers to get online (such as Comcast and Time Warner), but also entities that provide internet-based services (such as Google and AOL). See "Internet Service Provider,” Wife-ipedia, available at http://en.wikipedia.org/wiki/ Internetservice-provider (last updated Sept. 24, 2014). The parties here have followed suit, adopting the broader interpretation. This Opinion does the same.

. Memorandum of Law in Support of Motion to Suppress, at 1.

. See Declaration of Greg Phillips, Senior Technical Security Investigator for the Public Safety and Criminal Investigation at AOL (“Phillips Decl.”), Exhibit ("Ex.”) F to Government's Memorandum in Opposition to the Motion to Suppress ("Opp. Mem.”), ¶-¶ 4-6.

. I'd. ¶ 5.

. See id. ¶¶ 7-8.

. See id. ¶ 7.

. See id. ¶ 9.

. I'd. ¶11.

. Id.

. See Opp. Mem. at 3.

. See id.

. AOL Terms of Service, Ex. I to Opp. Mem., at 1.

. AOL Member Community Guidelines ("AOL Guidelines”), Ex. G to Opp. Mem., at 1-2.

. AOL Privacy Policy, Ex. H to Opp. Mem., at 2.

. Declaration of Lief Brooks, Founder of Omegle.com, Ex. C to Opp. Mem., V 2.

. Id. It 3.

. Id. ¶4.

. Id.

. Id.

. Id.

. See Order and Conditions of Probation for Frank DiTomasso (“Probation Order”), Ex. J to Opp. Mem.

. Id. at 2 ¶ U.

. U.S. Const, amend. IV.

. See Katz v. United States, 389 U.S. 347, 360-62, 88 S.Ct. 507, 19 L.Ed.2d 576 (1967) (Harlan J., concurring).

. Id. at 361, 88 S.Ct. 507.

. United States v. Jacobsen, 466 U.S. 109, 122, 104 S.Ct. 1652, 80 L.Ed.2d 85 (1984).

. Hoffa v. United States, 385 U.S. 293, 302, 87 S.Ct. 408, 17 L.Ed.2d 374 (1966).

. Smith v. Maryland, 442 U.S. 735, 743-44, 99 S.Ct. 2577, 61 L.Ed.2d 220 (1979).

. Id. at 741, 99 S.Ct. 2577 (emphasis added).

. See id. V 5.

. See Opp. Mem. at 3.

. Omegle.com Privacy Policy (“Omegle Policy”), Ex. E to Opp. Mem. at 1.

. Id. In fact, users’ IP addresses are recorded with the explicit “inten[tion] [of] be[ing] used for the purpose of law enforcement.” Id.

. Id.

. Id.

. United States v. Newton, 369 F.3d 659, 665 (2d Cir.2004) (citing Griffin v. Wisconsin, 483 U.S. 868, 875, 107 S.Ct. 3164, 97 L.Ed.2d 709 (1987)).

. 534 U.S. 112, 120, 122 S.Ct 587, 151 L.Ed.2d 497 (2001).

. Id. at 120 n. 6, 122 S.Ct. 587.

. Id.

. Newton, 369 F.3d at 665 (citing United States v. Reyes, 283 F.3d 446, 461 (2d Cir.2002)).

. United States v. Lifshitz, 369 F.3d 173, 182 (2d Cir.2004) (internal citations omitted).

. Alderman v. United States, 394 U.S. 165, 174, 89 S.Ct. 961, 22 L.Ed.2d 176 (1969).

. Rakas v. Illinois, 439 U.S. 128, 134, 99 S.Ct. 421, 58 L.Ed.2d 387 (1978).

. Brigham City v. Stuart, 547 U.S. 398, 403, 126 S.Ct. 1943, 164 L.Ed.2d 650 (2006) (internal citations omitted).

. United States v. Garcia, 56 F.3d 418, 422 (2d Cir.1995) (emphasis added). Accord Schneckloth v. Bustamonte, 412 U.S. 218, 222, 93 S.Ct. 2041, 36 L.Ed.2d 854 (1973) ("[A] search conducted pursuant to a valid consent is constitutionally permissible.”).

. Garcia, 56 F.3d at 422 (quoting United States v. Wilson, 11 F.3d 346, 352 (2d Cir.1993)).

. See Schneckloth, 412 U.S. at 241-42, 93 S.Ct. 2041 (explaining the differences between criminal procedure rights associated with trial, and criminal procedure rights associated with search). See also Ohio v. Robinette, 519 U.S. 33, 117 S.Ct. 417, 136 L.Ed.2d 347 (1996) (holding, inter alia, that a search can be consented to even if a defendant to be advised that he is "free to go”); United States v. Drayton, 536 U.S. 194, 122 S.Ct. 2105, 153 L.Ed.2d 242 (2002) (holding that a search can be consented to even if a defendant does not subjectively feel free to leave).

. Garcia, 56 F.3d at 422.

. Florida v. Jimeno, 500 U.S. 248, 250, 111 S.Ct. 1801, 114 L.Ed.2d 297 (1991).

. Probation Order at 2 ¶ U.

. Opp. Mem. at 11.

. United States v. Jacobsen, 466 U.S. 109, 117, 104 S.Ct. 1652, 80 L.Ed.2d 85 (1984) (emphasis added).

. See Katz, 389 U.S. at 356-57, 88 S.Ct. 507.

. Smith, 442 U.S. at 740, 99 S.Ct. 2577.

. Opp. Mem. at 11.

. Id.

. DiTomasso’s Reply Memorandum ("Rep. Mem.”), at 5.

. Opp. Mem. at 13.

. Id. at 12.

. Id. at 13.

. Id. at 12.

.See Warshak v. United States, 490 F.3d 455 (6th Cir.2007) (holding that users have a reasonable expectation of privacy in the content of stored email), vacated en hanc on other grounds, 532 F.3d 521 (6th Cir.2008); Quon v. Arch Wireless Operating Co., 529 F.3d 892 (9th Cir.2008) (holding that users have reasonable expectation of privacy in text messages, despite advance warning that the messages could be read), rev'd on other grounds, 560 U.S. 746, 130 S.Ct. 2619, 177 L.Ed.2d 216 (2010).

. United States v. Jones, -U.S. -, 132 S.Ct. 945, 957, 181 L.Ed.2d 911 (2012) (Soto-mayor J., concurring).

. See O’Connor v. Ortega, 480 U.S. 709, 717-18, 107 S.Ct. 1492, 94 L.Ed.2d 714 (1987) ("[Although] [t]he operational realities of the workplace [] may make some employees’ expectations of privacy unreasonable when an intrusion is by a supervisor rather than a law enforcement official ... [the] [constitutional protection, against unreasonable searches by the government does not disappear merely because the government has the right to make reasonable intrusions in its capacity as employer.”).

.See Stoner v. California, 376 U.S. 483, 84 S.Ct. 889, 11 L.Ed.2d 856 (1964) (holding that searches of hotel rooms are subject to Fourth Amendment scrutiny despite the fact that “when a person [rents] a [] room he undoubtedly gives 'implied or express permission' to 'such persons as maids, janitors or repairmen' to enter his room ‘in the performance of their duties,’ ”) (internal citations omitted). See also Chapman v. United States, 365 U.S. 610, 81 S.Ct. 776, 5 L.Ed.2d 828 (1961) (holding the same with respect to an apartment).

. United States v. Hagood, No. 13 Cr. 393, 2014 WL 2918271, at *2 (N.D.Cal. June 26, 2014).

. See United States v. Caraballo, 963 F.Supp.2d 341, 361 (D.Vt.2013). But see In re United States for an Order Authorizing the Release of Historical Cell-Site Infonnation, 809 F.Supp.2d 113 (E.D.N.Y.2011) (holding that Fourth Amendment protection extends to cell-site location records).

. With respect to one of the electronic communications in dispute&emdash;the email hashed by IDFP, forming the basis of NCMEC report # 1558963&emdash;it appears that only the metada-ta was examined. Unlike the "photoDNA” program, which hashes for image and video attachments that are "similar” to known child pornography&emdash;and requires an AOL employee to screen the file manually&emdash;IDFP only finds exact matches, making it possible to send "an automatic report to [NCMEC]” without human review. Phillips Decl. ¶¶ 7, 11. In essence, IDFP is a mechanism for flagging images and videos that have already been transmitted through AOL, which means that the file is already known to be illicit.

To challenge the constitutionality of AOL's IDFP hashing program, DiTomasso must claim an expectation of privacy not in the content of his email, but rather in the "hash number” of an attached file. Whether he can do so is unclear: the constitutional status of digital metadata is currently in flux. Compare ACLU v. Clapper, 959 F.Supp.2d 724, 749-53 (S.D.N.Y.2013) (holding, under Smith, that individuals do not have a reasonable expectation of privacy in telephony metadata), with Klayman v. Obama, 957 F.Supp.2d 1, 32 (D.D.C.2013) ("I am convinced that the surveillance program now before me is so different from a simple pen register [in] Smith ... that bulk telephony metadata collection and analysis [violates] a reasonable expectation of privacy.”). Because I conclude that DiTo-masso consented to law enforcement search of his emails when he agreed to AOL’s terms of use, no ruling on the metadata issue is necessary.

. Opp. Mem. at 13.

. Probation Order at 2 ¶ U.

. See Reyes, 283 F.3d at 462 (focusing exclusively on home visits and searches by probation officers, not by law enforcement in general).

.In the Second Circuit, the rule is that consent-to-search provisions attenuate, but do not destroy, the need for a baseline level of suspicion in searches by probation officers. See Lifshitz, 369 F.3d at 181-82 (explaining that consent-to-search terms in probation agreements lessen expectations of privacy, but they do not give probation officers carte blanche to perform truly suspicionless searches); Newton, 369 F.3d at 665 (holding that probationers who sign consent-to-search agreements have a " 'severely diminished expectation of privacy' " in connection with their "supervision” by probation officers) (quoting Reyes, 283 F.3d at 461). See also U.S. v. Knights, 534 U.S. 112, 119-20, 122 S.Ct. 587, 151 L.Ed.2d 497 (2001) (explicitly reserving the question of whether a consent-to-search provision in a probation agreement “diminishe[s], or completely eliminate[s], [the probationer’s] expectation of privacy”).

. Opp. Mem. at 12.

. Id.

. Rep. Mem. at 3.

. See, e.g., United States v. Felipe, 148 F.3d 101, 107-08 (2d Cir.1998) (assuming that the defendant, while in prison, had an expectation of privacy in both incoming and outgoing mail).

. Jimeno, 500 U.S. at 250, 111 S.Ct. 1801.

. Omegle Policy at 1.

. Id.

. Id.

. Id.

. Id.

. Id.

. See id. (explaining that snapshots of chats are sometimes “stored and used to improve Omegle’s monitoring process”). Not only does the policy itself distinguish between IP address records (kept for law enforcement *597purposes) and the monitoring of chats (for quality control purposes) — this distinction also tracks Fourth Amendment doctrine. Unlike the content of chats, IP addresses are metadata, in which DiTomasso would have a, far more limited expectation of privacy, if any.

. See AOL Terms of Service at 1.

. AOL Guidelines at 1-2.

. AOL Privacy Policy at 2.