{"id":892,"date":"2022-06-01T13:10:50","date_gmt":"2022-06-01T19:10:50","guid":{"rendered":"https:\/\/ctlj.colorado.edu\/?p=892"},"modified":"2022-06-01T13:10:50","modified_gmt":"2022-06-01T19:10:50","slug":"the-misguided-activism-of-the-cryptocurrency-industry-reckoning-with-the-bank-secrecy-act-of-1970","status":"publish","type":"post","link":"https:\/\/ctlj.colorado.edu\/?p=892","title":{"rendered":"The Misguided Activism of the Cryptocurrency Industry: Reckoning With The Bank Secrecy Act of 1970"},"content":{"rendered":"<h1 style=\"text-align: center;\"><a id=\"post-892-_Toc98590342\"><\/a> The Misguided Activism of the Cryptocurrency Industry: Reckoning With The Bank Secrecy Act of 1970<\/h1>\n<h2 style=\"text-align: center;\"><a id=\"post-892-_Toc99034197\"><\/a> Grant Hespeler<sup><sup><a id=\"post-892-footnote-ref-1\" href=\"#post-892-footnote-1\">[1]<\/a><\/sup>\u2020<\/sup><\/h2>\n<h3 style=\"text-align: center;\">Print Version: <a href=\"https:\/\/ctlj.colorado.edu\/wp-content\/uploads\/2022\/06\/5-Cryptocurrency-Bank-Secrecy-Act.pdf\">Cryptocurrency &amp; Bank Secrecy Act<\/a><\/h3>\n<p><a href=\"#post-892-_Toc100161552\">Introduction 161<\/a><\/p>\n<p><a href=\"#post-892-_Toc100161553\">I. Background: Privacy Rights from Olmstead to Katz 163<\/a><\/p>\n<p><a href=\"#post-892-_Toc100161554\">A. The Olmstead Era 163<\/a><\/p>\n<p><a href=\"#post-892-_Toc100161555\">B. Katz Balances the Scales 165<\/a><\/p>\n<p><a href=\"#post-892-_Toc100161556\">II. FinCEN\u2019s Proposed Rule and Cryptocurrency Activism 167<\/a><\/p>\n<p><a href=\"#post-892-_Toc100161557\">III. The Bank Secrecy Act and <em>Miller<\/em> 171<\/a><\/p>\n<p><a href=\"#post-892-_Toc100161558\">A. The Bank Secrecy Act 171<\/a><\/p>\n<p><a href=\"#post-892-_Toc100161559\">B. Miller Upholds the Bank Secrecy Act 172<\/a><\/p>\n<p><a href=\"#post-892-_Toc100161560\">C. Cryptocurrency Activism Precluded by the Bank Secrecy Act 174<\/a><\/p>\n<p><a href=\"#post-892-_Toc100161561\">IV. Analysis: Revisiting the Bank Secrecy Act 175<\/a><\/p>\n<p><a href=\"#post-892-_Toc100161562\">Conclusion 178<\/a><\/p>\n<p><a id=\"post-892-_Toc95463694\"><\/a><a id=\"post-892-_Toc100161552\"><\/a> Introduction<\/p>\n<p>Since at least World War I, the United States through various legislative, judicial, and enforcement apparatuses has been engaged in massive surveillance of its citizens\u2019 financial activity,<a id=\"post-892-_Ref89283107\"><\/a><sup><a id=\"post-892-footnote-ref-2\" href=\"#post-892-footnote-2\">[2]<\/a><\/sup> despite the privacy rights granted by the Fourth Amendment of the United States Constitution.<sup><a id=\"post-892-footnote-ref-3\" href=\"#post-892-footnote-3\">[3]<\/a><\/sup> Since the U.S. Supreme Court\u2019s 1967 decision <em>Katz v. United States<\/em>, which upheld a liberal interpretation of the Fourth Amendment\u2019s privacy protections,<sup><a id=\"post-892-footnote-ref-4\" href=\"#post-892-footnote-4\">[4]<\/a><\/sup> the Supreme Court, Congress, and various regulatory agencies have subverted <em>Katz <\/em>to infringe on U.S. citizens\u2019 reasonable expectations of privacy regarding their financial data.<a id=\"post-892-_Ref89282244\"><\/a><sup><a id=\"post-892-footnote-ref-5\" href=\"#post-892-footnote-5\">[5]<\/a><\/sup> The most prominent tool used by the United States to access the private financial data of its citizens is the Bank Secrecy Act of 1970.<a id=\"post-892-_Ref89284472\"><\/a><sup><a id=\"post-892-footnote-ref-6\" href=\"#post-892-footnote-6\">[6]<\/a><\/sup> The issue of government financial surveillance has recently become a hot topic among activists once again.<a id=\"post-892-_Ref89281992\"><\/a><sup><a id=\"post-892-footnote-ref-7\" href=\"#post-892-footnote-7\">[7]<\/a><\/sup> This time, however, it is those in the cryptocurrency industry raising the alarm about government surveillance as a result of a new rule proposed by the U.S. Financial Crimes Enforcement Network\u2019s (FinCEN). FinCEN\u2019s proposed rule would require banks and other money service businesses (MSBs), such as cryptocurrency exchanges, to report identifying information pertaining to cryptocurrency transactions of $10,000 or more to the federal government.<a id=\"post-892-_Ref89284285\"><\/a><sup><a id=\"post-892-footnote-ref-8\" href=\"#post-892-footnote-8\">[8]<\/a><\/sup> A few scholars have criticized this proposed rule as violative of civil liberties and the promise of anonymity central to the appeal of cryptocurrency,<sup><a id=\"post-892-footnote-ref-9\" href=\"#post-892-footnote-9\">[9]<\/a><\/sup> but these analyses fall short in that they are exposed to an obvious counterargument: that FinCEN\u2019s proposed rule is simply closing the loophole between the federal surveillance of monetary transactions everywhere besides the blockchain.<sup><a id=\"post-892-footnote-ref-10\" href=\"#post-892-footnote-10\">[10]<\/a><\/sup> In this paper, the author aims to illustrate how the United States\u2019 financial surveillance of its citizens is broadly violative of the Fourth Amendment and issues a challenge to the Supreme Court\u2019s 1976 <em>United States v. Miller <\/em>decision. The author argues that the Court\u2019s decision in <em>Miller<\/em> and the financial surveillance activities which have used that decision as supporting precedent contradict both the holding of <em>Katz <\/em>and the broad privacy protections granted to Americans by the Fourth Amendment. The Court\u2019s reasoning in <em>Miller<\/em> completely ignores the two-prong test handed down by the Court in <em>Katz<\/em>: that a warrantless search or seizure violates the Fourth Amendment if the citizen had (1) an expectation of privacy, and (2) that expectation was one that \u201csociety [is] prepared to accept as reasonable.\u201d<sup><a id=\"post-892-footnote-ref-11\" href=\"#post-892-footnote-11\">[11]<\/a><\/sup> This paper takes a critical lens to the <em>Miller <\/em>decision, demonstrating not only that FinCEN\u2019s proposed rule violates the Constitution, but so too does the broader American financial surveillance state and the Supreme Court case central to their supposed legality.<\/p>\n<ol>\n<li><a id=\"post-892-_Toc95463695\"><\/a><a id=\"post-892-_Toc100161553\"><\/a> Background: Privacy Rights from <em>Olmstead <\/em>to <em>Katz<\/em><\/li>\n<li><a id=\"post-892-_Toc95463696\"><\/a><a id=\"post-892-_Toc100161554\"><\/a> The Olmstead Era<\/li>\n<\/ol>\n<p>In 1791, the United States Congress ratified the Fourth Amendment of the United States Constitution.<a id=\"post-892-_Ref89282142\"><\/a><sup><a id=\"post-892-footnote-ref-12\" href=\"#post-892-footnote-12\">[12]<\/a><\/sup> The oft-cited language of the Fourth Amendment provides that:<\/p>\n<p><em>\u201c<\/em>The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized<em>.\u201d<\/em><sup><a id=\"post-892-footnote-ref-13\" href=\"#post-892-footnote-13\">[13]<\/a><\/sup><\/p>\n<p>The goal of the Fourth Amendment is above all to protect the right to privacy and freedom from unreasonable intrusions by the government.<a id=\"post-892-_Ref89282355\"><\/a><sup><a id=\"post-892-footnote-ref-14\" href=\"#post-892-footnote-14\">[14]<\/a><\/sup> It is important to understand that the language of the Fourth Amendment protects individuals only from searches and seizures performed by the government.<sup><a id=\"post-892-footnote-ref-15\" href=\"#post-892-footnote-15\">[15]<\/a><\/sup> Additionally, such searches and seizures must be \u201cunreasonable\u201d in order to gain Fourth Amendment protection.<sup><a id=\"post-892-footnote-ref-16\" href=\"#post-892-footnote-16\">[16]<\/a><\/sup> Until its landmark 1967 decision in <em>Katz, <\/em>the United States Supreme Court struggled to define the bounds of the privacy protections granted by the Fourth Amendment.<a id=\"post-892-_Ref89282957\"><\/a><sup><a id=\"post-892-footnote-ref-17\" href=\"#post-892-footnote-17\">[17]<\/a><\/sup> Lower courts in the United States eroded those protections through narrow interpretations of the Fourth Amendment, which held that only <em>physical<\/em> intrusions resulting in unreasonable searches and seizures were unconstitutional.<sup><a id=\"post-892-footnote-ref-18\" href=\"#post-892-footnote-18\">[18]<\/a><\/sup> This era of jurisprudence was crystallized in the Supreme Court\u2019s 1928 decision in <em>Olmstead v. United States<\/em>.<sup><a id=\"post-892-footnote-ref-19\" href=\"#post-892-footnote-19\">[19]<\/a><\/sup> In <em>Olmstead, <\/em>the participants of a Prohibition-era liquor ring were arrested and convicted on the basis of incriminating evidence obtained through the then-novel technology of wiretapping.<sup><a id=\"post-892-footnote-ref-20\" href=\"#post-892-footnote-20\">[20]<\/a><\/sup> Infamously weakening citizens\u2019 constitutional privacy rights to be equivalent to the property rule of trespass,<sup><a id=\"post-892-footnote-ref-21\" href=\"#post-892-footnote-21\">[21]<\/a><\/sup> the Court held that despite the Founders\u2019 intent to confer broad liberties through the Fourth Amendment, the Constitution is not violated \u201cunless there has been an official search and seizure of his person or such a seizure of his papers or his tangible material effects or an actual physical invasion of his house \u2018or curtilage\u2019 for the purpose of making a seizure<em>.<\/em>\u201d<sup><a id=\"post-892-footnote-ref-22\" href=\"#post-892-footnote-22\">[22]<\/a><\/sup> With this decision, the Supreme Court set the stage for decades of widespread electronic surveillance of its citizens, based on the notion that only physical governmental intrusions could be considered unconstitutional searches and seizures under the Fourth Amendment.<sup><a id=\"post-892-footnote-ref-23\" href=\"#post-892-footnote-23\">[23]<\/a><\/sup><\/p>\n<ol>\n<li><a id=\"post-892-_Toc95463697\"><\/a><a id=\"post-892-_Toc100161555\"><\/a> Katz Balances the Scales<\/li>\n<\/ol>\n<p>In the years following 1928, the Supreme Court consistently wrestled with its own decision in <em>Olmstead.<\/em><sup><a id=\"post-892-footnote-ref-24\" href=\"#post-892-footnote-24\">[24]<\/a><\/sup> It was less than thirty years before the Court again faced the daunting task of delimiting the privacy protections enjoyed by U.S. citizens under the Fourth Amendment.<sup><a id=\"post-892-footnote-ref-25\" href=\"#post-892-footnote-25\">[25]<\/a><\/sup> In the 1967 case <em>United States v. Katz<\/em>, the facts were extremely similar to those in the <em>Olmstead <\/em>case: an individual was arrested for violating federal anti-gambling laws, and at trial the government introduced evidence obtained through wiretapping a public telephone booth.<sup><a id=\"post-892-footnote-ref-26\" href=\"#post-892-footnote-26\">[26]<\/a><\/sup> This time, the Supreme Court explicitly rejected the false equivacation ofthe property rule of trespass and the privacy protections imparted by the Fourth Amendment it had espoused only decades earlier.<a id=\"post-892-_Ref89282878\"><\/a><sup><a id=\"post-892-footnote-ref-27\" href=\"#post-892-footnote-27\">[27]<\/a><\/sup> The following language from the <em>Katz <\/em>decision completely changed course from previous Supreme Court Fourth Amendment jurisprudence: the \u201cFourth Amendment protects people\u2014and not simply \u2018areas\u2019\u2014against unreasonable searches and seizures.\u00a0.\u00a0. [it is] clear that the reach of that Amendment cannot turn upon the presence or absence of a physical intrusion into any given enclosure.\u201d<sup><a id=\"post-892-footnote-ref-28\" href=\"#post-892-footnote-28\">[28]<\/a><\/sup> With these words, the Supreme Court affirmed that the Fourth Amendment is a shield against all forms of unreasonable governmental intrusion,<sup><a id=\"post-892-footnote-ref-29\" href=\"#post-892-footnote-29\">[29]<\/a><\/sup> something that defendants who had suffered unconstitutional searches and seizures and constitutional privacy activists had been arguing all along. <sup><a id=\"post-892-footnote-ref-30\" href=\"#post-892-footnote-30\">[30]<\/a><\/sup><\/p>\n<p>The Supreme Court in <em>Katz <\/em>unambiguously stated that whether a governmental search or seizure is facilitated via electronic means or a physical intrusion has no \u201cconstitutional significance.\u201d<sup><a id=\"post-892-footnote-ref-31\" href=\"#post-892-footnote-31\">[31]<\/a><\/sup> This was only one aspect of the <em>Katz <\/em>decision\u2019s impact.<a id=\"post-892-_Ref89285202\"><\/a><sup><a id=\"post-892-footnote-ref-32\" href=\"#post-892-footnote-32\">[32]<\/a><\/sup> The Court\u2019s real impact in <em>Katz <\/em>was its two-factor test to determine whether a governmental search or seizure is \u201creasonable\u201d under the Fourth Amendment.<sup><a id=\"post-892-footnote-ref-33\" href=\"#post-892-footnote-33\">[33]<\/a><\/sup> The Court considered the example of a conversation in a public telephone booth and determined that despite its public location and shared use, the content of a conversation between two individuals on such a telephone is protected by the Fourth Amendment because of the individuals\u2019 <em>expectation of privacy.<\/em><sup><a id=\"post-892-footnote-ref-34\" href=\"#post-892-footnote-34\">[34]<\/a><\/sup> The Court expounded on this concept and established a rule for determining whether a piece of evidence is protected by the Fourth Amendment. The Court stated that in order for evidence to be implicated by the language of the Fourth Amendment, \u201c.\u00a0.\u00a0. a person [must] [exhibit] an actual (subjective) expectation of privacy and, second, the expectation [must] be one that society is prepared to recognize as \u2018reasonable.\u2019\u201d<sup><a id=\"post-892-footnote-ref-35\" href=\"#post-892-footnote-35\">[35]<\/a><\/sup> In establishing this rule, the Supreme Court reversed course from its narrow interpretation of the Fourth Amendment in <em>Olmstead<\/em><sup><a id=\"post-892-footnote-ref-36\" href=\"#post-892-footnote-36\">[36]<\/a><\/sup> and successfully aligned its constitutional privacy rights jurisprudence with the goals of the Constitution, which were to give broad protection to citizens against unreasonable government behavior.<sup><a id=\"post-892-footnote-ref-37\" href=\"#post-892-footnote-37\">[37]<\/a><\/sup> The two-part test of <em>Katz <\/em>has been the guiding star for courts considering Fourth Amendment questions since 1967,<sup><a id=\"post-892-footnote-ref-38\" href=\"#post-892-footnote-38\">[38]<\/a><\/sup> and it has also been the most significant obstacle for the U.S. government in its never-ending attempts to infringe on the privacy rights of its citizens.<sup><a id=\"post-892-footnote-ref-39\" href=\"#post-892-footnote-39\">[39]<\/a><\/sup><a id=\"post-892-_Toc95463698\"><\/a><\/p>\n<ol>\n<li><a id=\"post-892-_Toc100161556\"><\/a> FinCEN\u2019s Proposed Rule and Cryptocurrency Activism<\/li>\n<\/ol>\n<p>Government surveillance and its ever-present constitutional tension with the Fourth Amendment has been called into question at various times since the <em>Katz <\/em>decision.<sup><a id=\"post-892-footnote-ref-40\" href=\"#post-892-footnote-40\">[40]<\/a><\/sup> Statutes such as the PATRIOT Act<sup><a id=\"post-892-footnote-ref-41\" href=\"#post-892-footnote-41\">[41]<\/a><\/sup> and the Foreign Intelligence Surveillance Act (FISA)<sup><a id=\"post-892-footnote-ref-42\" href=\"#post-892-footnote-42\">[42]<\/a><\/sup> have gained widespread media attention and prompted numerous legal challenges by activist groups such as the American Civil Liberties Union (ACLU), with mixed success.<sup><a id=\"post-892-footnote-ref-43\" href=\"#post-892-footnote-43\">[43]<\/a><\/sup> The latest bout between privacy activists and government over the expanding reach of government surveillance is set to take place in the realm of cryptocurrency.<sup><a id=\"post-892-footnote-ref-44\" href=\"#post-892-footnote-44\">[44]<\/a><\/sup> Cryptocurrency is essentially digital currency secured on online ledgers using cryptography.<sup><a id=\"post-892-footnote-ref-45\" href=\"#post-892-footnote-45\">[45]<\/a><\/sup> These online ledgers run on technology called \u201cblockchain\u201d and serve as decentralized databases that facilitate the recording of digital assets and transactions.<sup><a id=\"post-892-footnote-ref-46\" href=\"#post-892-footnote-46\">[46]<\/a><\/sup> Cryptocurrency is attractive to users worldwide for many reasons \u2014 one of the most emphasized is its potential to facilitate anonymous, untraceable transactions between users. However, the actual privacy implications of using cryptocurrency are hotly debated.<sup><a id=\"post-892-footnote-ref-47\" href=\"#post-892-footnote-47\">[47]<\/a><\/sup> Many activists also view cryptocurrency as a method for \u201cbanking the unbanked.\u201d<a id=\"post-892-_Ref89283545\"><\/a><sup><a id=\"post-892-footnote-ref-48\" href=\"#post-892-footnote-48\">[48]<\/a><\/sup> If an individual or household is \u201cunbanked,\u201d it means they do not have access to a bank account.<sup><a id=\"post-892-footnote-ref-49\" href=\"#post-892-footnote-49\">[49]<\/a><\/sup> The term \u201cunderbanked\u201d similarly refers to those who, although they may have a bank account, are reliant on services outside the traditional banking system for their financial needs.<sup><a id=\"post-892-footnote-ref-50\" href=\"#post-892-footnote-50\">[50]<\/a><\/sup> In a world where financial activity is increasingly institution-driven, living as an unbanked or underbanked person can be time-consuming, exhausting, and \u2014 paradoxically, expensive.<sup><a id=\"post-892-footnote-ref-51\" href=\"#post-892-footnote-51\">[51]<\/a><\/sup> Yet, an estimated seven million households in the United States do not have a bank account,<sup><a id=\"post-892-footnote-ref-52\" href=\"#post-892-footnote-52\">[52]<\/a><\/sup> while an estimated twenty-five percent of United States households are considered underbanked.<sup><a id=\"post-892-footnote-ref-53\" href=\"#post-892-footnote-53\">[53]<\/a><\/sup> Proponents of cryptocurrency argue that since blockchain technology allows individuals to securely store and access their money on-demand, cryptocurrency can help bridge the gap between the un-banked, the under-banked, and the rest of society.<sup><a id=\"post-892-footnote-ref-54\" href=\"#post-892-footnote-54\">[54]<\/a><\/sup> Cryptocurrency is not without detractors; however, with many who argue that these potential benefits are as-yet unproven<sup><a id=\"post-892-footnote-ref-55\" href=\"#post-892-footnote-55\">[55]<\/a><\/sup> and that cryptocurrency is used to facilitate illegal activities.<a id=\"post-892-_Ref89285604\"><\/a><sup><a id=\"post-892-footnote-ref-56\" href=\"#post-892-footnote-56\">[56]<\/a><\/sup> Despite these debates, cryptocurrencies have gained significant popularity in the United States and abroad,<sup><a id=\"post-892-footnote-ref-57\" href=\"#post-892-footnote-57\">[57]<\/a><\/sup> spurring a wave of activism dedicated to preserving the use of cryptocurrencies and the blockchain.<sup><a id=\"post-892-footnote-ref-58\" href=\"#post-892-footnote-58\">[58]<\/a><\/sup><\/p>\n<p>In December 2020, FinCEN proposed a new rule with a host of reporting requirements for this burgeoning industry.<sup><a id=\"post-892-footnote-ref-59\" href=\"#post-892-footnote-59\">[59]<\/a><\/sup> FinCEN\u2019s proposed rule would require cryptocurrency exchanges, banks, and \u201cmoney service businesses\u201d to maintain records of personal information, including individually identifying information, of cryptocurrency transactions over $3,000.<sup><a id=\"post-892-footnote-ref-60\" href=\"#post-892-footnote-60\">[60]<\/a><\/sup> For cryptocurrency transactions over $10,000, the proposed rule would require the exchange to submit a full report of the transaction, including personally-identifying information, to FinCEN.<sup><a id=\"post-892-footnote-ref-61\" href=\"#post-892-footnote-61\">[61]<\/a><\/sup><\/p>\n<p>FinCEN\u2019s proposed rule has provoked outrage among activists in the cryptocurrency industry<sup><a id=\"post-892-footnote-ref-62\" href=\"#post-892-footnote-62\">[62]<\/a><\/sup> and has been decried as \u201cunconstitutional\u201d by various activist groups via public comments on the proposed rule.<sup><a id=\"post-892-footnote-ref-63\" href=\"#post-892-footnote-63\">[63]<\/a><\/sup> Many of these groups, such as the Electronic Frontier Foundation, argue that the proposed rule \u201cviolates the Fourth Amendment\u2019s protections for individual privacy.\u201d<sup><a id=\"post-892-footnote-ref-64\" href=\"#post-892-footnote-64\">[64]<\/a><\/sup> The New Civil Liberties Alliance, a U.S. nonprofit civil rights group, argues:<\/p>\n<p>FinCEN\u2019s proposed rule [is an] unconstitutional power grab [in which FinCEN] unlawfully attempts to transform the agency\u2019s limited authority to regulate banks into permission to engage in the mass financial surveillance of innocent individuals who merely use digital assets .\u00a0.\u00a0. FinCEN ought to recognize that its proposal would be grossly unconstitutional and promptly scrap this rule.<sup><a id=\"post-892-footnote-ref-65\" href=\"#post-892-footnote-65\">[65]<\/a><\/sup><\/p>\n<p>While such barebones constitutional arguments make up much of the scholarly outcry against FinCEN\u2019s proposed rule,<sup><a id=\"post-892-footnote-ref-66\" href=\"#post-892-footnote-66\">[66]<\/a><\/sup> activist groups have relied more heavily on complex and nuanced arguments relating to the differences between cryptocurrency and traditional forms of currency in their opposition to this rule.<sup><a id=\"post-892-footnote-ref-67\" href=\"#post-892-footnote-67\">[67]<\/a><\/sup> For example, the nonprofit cryptocurrency research and advocacy group, Coin Center, has stated that exchanges would face increased difficulty and costs in monitoring cryptocurrency transactions under the rule because of the technical barriers to identifying participants in a cryptocurrency transaction.<a id=\"post-892-_Ref89284928\"><\/a><sup><a id=\"post-892-footnote-ref-68\" href=\"#post-892-footnote-68\">[68]<\/a><\/sup> As the following section of this paper will show, the activism surrounding FinCEN\u2019s proposed rule and critiques by scholars (1) fails to address the legal basis for the rule and (2) fails to predict or counter obvious and predictable counterarguments by proponents of FinCEN\u2019s proposal.<a id=\"post-892-_Ref89284846\"><\/a><sup><a id=\"post-892-footnote-ref-69\" href=\"#post-892-footnote-69\">[69]<\/a><\/sup><a id=\"post-892-_Toc95463699\"><\/a><\/p>\n<ol>\n<li><a id=\"post-892-_Toc100161557\"><\/a> The Bank Secrecy Act and <em>Miller<\/em><a id=\"post-892-_Toc95463700\"><\/a><\/li>\n<li><a id=\"post-892-_Toc100161558\"><\/a> The Bank Secrecy Act<\/li>\n<\/ol>\n<p>The Bank Secrecy Act (BSA)<sup><a id=\"post-892-footnote-ref-70\" href=\"#post-892-footnote-70\">[70]<\/a><\/sup> and the subsequent U.S. Supreme Court case upholding its constitutionality provide a strong basis for legal counterarguments to activists in the President Richard Nixon\u2019s \u201cWar on Drugs\u201d and his broader war against organized crime were extremely popular policy initiatives among large swaths of American society in the 1960\u2019s and 1970\u2019s.<a id=\"post-892-_Ref89284434\"><\/a><sup><a id=\"post-892-footnote-ref-71\" href=\"#post-892-footnote-71\">[71]<\/a><\/sup> Through legislation such as the Controlled Substances Act (CSA)<sup><a id=\"post-892-footnote-ref-72\" href=\"#post-892-footnote-72\">[72]<\/a><\/sup> and the Racketeer Influenced Corrupt Practices Act (RICO),<sup><a id=\"post-892-footnote-ref-73\" href=\"#post-892-footnote-73\">[73]<\/a><\/sup> the Nixon administration and a friendly Congress continuously expanded the reach of law enforcement and prosecution.<sup><a id=\"post-892-footnote-ref-74\" href=\"#post-892-footnote-74\">[74]<\/a><\/sup> With the passage of the BSA in 1970,<sup><a id=\"post-892-footnote-ref-75\" href=\"#post-892-footnote-75\">[75]<\/a><\/sup> Congress aimed to further extend that reach to prosecute even more individuals who had avoided prosecution under legislation such as the CSA and RICO<a id=\"post-892-_Ref89284529\"><\/a><sup><a id=\"post-892-footnote-ref-76\" href=\"#post-892-footnote-76\">[76]<\/a><\/sup> by targeting transactions the government deemed to be \u201csuspicious.\u201d<sup><a id=\"post-892-footnote-ref-77\" href=\"#post-892-footnote-77\">[77]<\/a><\/sup> Title I and II of the BSA, which respectively contain requirements for recordkeeping and reporting for financial institutions,<sup><a id=\"post-892-footnote-ref-78\" href=\"#post-892-footnote-78\">[78]<\/a><\/sup> raise the most significant Fourth Amendment issues and are the basis for FinCEN\u2019s proposed cryptocurrency rule.<sup><a id=\"post-892-footnote-ref-79\" href=\"#post-892-footnote-79\">[79]<\/a><\/sup> Relevant provisions of Title I of the BSA require financial institutions to maintain separate records of identifying information, not only of all account holders, but also of all individuals entering into transactions using a financial institution\u2019s services in a transaction of $5,000 or greater.<sup><a id=\"post-892-footnote-ref-80\" href=\"#post-892-footnote-80\">[80]<\/a><\/sup> Title II of the BSA requires financial institutions to file \u201cSuspicious Activity Reports\u201d (SARs) with the government, including identifying information of all parties involved in a transaction.<sup><a id=\"post-892-footnote-ref-81\" href=\"#post-892-footnote-81\">[81]<\/a><\/sup> Although this rule seems clearly violative of the Fourth Amendment as interpreted by the Supreme Court in <em>Katz,<\/em><sup><a id=\"post-892-footnote-ref-82\" href=\"#post-892-footnote-82\">[82]<\/a><\/sup> Congress argued in Congressional findings for the BSA that such records \u201chave a high degree of usefulness in criminal, tax, and regulatory investigations and proceedings.\u201d<sup><a id=\"post-892-footnote-ref-83\" href=\"#post-892-footnote-83\">[83]<\/a><\/sup> Thus, the BSA was signed into law.<sup><a id=\"post-892-footnote-ref-84\" href=\"#post-892-footnote-84\">[84]<\/a><\/sup><a id=\"post-892-_Toc95463701\"><\/a><\/p>\n<ol>\n<li><a id=\"post-892-_Toc100161559\"><\/a>Miller Upholds the Bank Secrecy Act<\/li>\n<\/ol>\n<p>The BSA was often a subject of litigation in various state and federal cases after its passage, and only six years after President Nixon signed it into law, the BSA was challenged before the Supreme Court. In its 1976 decision <em>United States v. Miller<\/em>, the Supreme Court determined the outcome of a challenge to the Bank Secrecy Act brought by a distiller who had been convicted of violating a whiskey tax.<sup><a id=\"post-892-footnote-ref-85\" href=\"#post-892-footnote-85\">[85]<\/a><\/sup> In securing the distiller\u2019s conviction, the government relied upon deposits and other bank records obtained through a subpoena of the distiller\u2019s bank.<sup><a id=\"post-892-footnote-ref-86\" href=\"#post-892-footnote-86\">[86]<\/a><\/sup> The Court, in a familiar exercise in doublethink, expressed that it wished to uphold and indeed relied upon <em>Katz<\/em> in its decision<em>,<\/em><sup><a id=\"post-892-footnote-ref-87\" href=\"#post-892-footnote-87\">[87]<\/a><\/sup> yet proceeded to effectively and completely undermine its holding in <em>Katz<\/em>.<a id=\"post-892-_Ref89284576\"><\/a><sup><a id=\"post-892-footnote-ref-88\" href=\"#post-892-footnote-88\">[88]<\/a><\/sup> The <em>Miller <\/em>Court first quoted <em>Katz<\/em> and stated that pieces of evidence an individual consciously reveals to the public do not receive Fourth Amendment protection.<sup><a id=\"post-892-footnote-ref-89\" href=\"#post-892-footnote-89\">[89]<\/a><\/sup> The Court then attempted to equate information given to a financial institution during the course of normal banking activities to public disclosure of information in an extraordinary feat of bending logic and language.<sup><a id=\"post-892-footnote-ref-90\" href=\"#post-892-footnote-90\">[90]<\/a><\/sup> The Court never employed the two-part test from <em>Katz,<\/em><sup><a id=\"post-892-footnote-ref-91\" href=\"#post-892-footnote-91\">[91]<\/a><\/sup> and instead emphasized that \u201c[a]ll of the documents obtained, including financial statements and deposit slips, contain only information voluntarily conveyed to the banks and exposed to their employees in the ordinary course of business.\u201d<sup><a id=\"post-892-footnote-ref-92\" href=\"#post-892-footnote-92\">[92]<\/a><\/sup> This language preceded the Supreme Court\u2019s explicit adoption of the so-called \u201cthird party doctrine\u201d by only a few sentences.<sup><a id=\"post-892-footnote-ref-93\" href=\"#post-892-footnote-93\">[93]<\/a><\/sup> The <em>Miller <\/em>Court adopted this exceptionally expansive doctrine with the following deceptive passage:<\/p>\n<p>[T]he Fourth Amendment does not prohibit the obtaining of information revealed to a third party and conveyed by him to Government authorities, even if the information is revealed on the assumption that it will be used only for a limited purpose and the confidence placed in the third party will not be betrayed.<sup><a id=\"post-892-footnote-ref-94\" href=\"#post-892-footnote-94\">[94]<\/a> <\/sup><\/p>\n<p>Even though the Court had ostensibly relied upon <em>Katz <\/em>as supporting authority for its decision,<sup><a id=\"post-892-footnote-ref-95\" href=\"#post-892-footnote-95\">[95]<\/a><\/sup> in reality, the Court did away with the <em>Katz <\/em>decision\u2019s two-parts test,<a id=\"post-892-_Ref89284621\"><\/a><sup><a id=\"post-892-footnote-ref-96\" href=\"#post-892-footnote-96\">[96]<\/a><\/sup> leaving it virtually impotent in some of the most significant cases in which the scope of Fourth Amendment privacy protections have been challenged.<sup><a id=\"post-892-footnote-ref-97\" href=\"#post-892-footnote-97\">[97]<\/a><\/sup> The third-party doctrine essentially means that whenever an individual shares a piece of evidence with a third party, whether during the course of banking activities or through some other interaction, they forfeit their Fourth Amendment privacy protection for that piece of evidence.<sup><a id=\"post-892-footnote-ref-98\" href=\"#post-892-footnote-98\">[98]<\/a><\/sup> While seemingly incompatible with its own ruling in <em>Katz, <\/em>the Supreme Court\u2019s decision in <em>Miller<\/em> upheld both <em>Katz <\/em>and the BSA as good law,<sup><a id=\"post-892-footnote-ref-99\" href=\"#post-892-footnote-99\">[99]<\/a><\/sup> leaving the current landscape of Fourth Amendment privacy protections opaque in many situations.<sup><a id=\"post-892-footnote-ref-100\" href=\"#post-892-footnote-100\">[100]<\/a><\/sup><a id=\"post-892-_Toc95463702\"><\/a><\/p>\n<ol>\n<li><a id=\"post-892-_Toc100161560\"><\/a> Cryptocurrency Activism Precluded by the Bank Secrecy Act<\/li>\n<\/ol>\n<p>The cryptocurrency industry activists discussed in Section II of this paper would be well served to familiarize themselves with the pertinent provisions of the Bank Secrecy Act (BSA) and the Supreme Court\u2019s subsequent <em>Miller<\/em> decision upholding the BSA\u2019s constitutionality. Even a cursory review of the BSA and <em>Miller <\/em>illustrates how the arguments put forth by cryptocurrency activist groups are obviated by the recordkeeping and reporting requirements contained in Titles I and II of the BSA.<sup><a id=\"post-892-footnote-ref-101\" href=\"#post-892-footnote-101\">[101]<\/a><\/sup> Review makes clear that FinCEN\u2019s proposed rule is almost duplicative of the BSA<sup><a id=\"post-892-footnote-ref-102\" href=\"#post-892-footnote-102\">[102]<\/a><\/sup> \u2013 which, again, has been ruled to be constitutional by the Supreme Court.<sup><a id=\"post-892-footnote-ref-103\" href=\"#post-892-footnote-103\">[103]<\/a><\/sup> Indeed, FinCEN emphasized the duplicative nature of the proposed rule when it published its Notice of Proposed Rulemaking.<sup><a id=\"post-892-footnote-ref-104\" href=\"#post-892-footnote-104\">[104]<\/a><\/sup> The notice stated that the \u201crule addresses substantial national security concerns in the CVC market, aims to close the gaps that malign actors seek to exploit in the recordkeeping and reporting regime, [and] is consistent with existing requirements.\u201d <sup><a id=\"post-892-footnote-ref-105\" href=\"#post-892-footnote-105\">[105]<\/a><\/sup> Although its arguments may not be especially convincing as to the constitutionality of its proposed rule, FinCEN has an irrefutable point that all the proposed rule seeks to do is to close an extant loophole between unmonitored cryptocurrency transactions and more traditional forms of monetary transactions,<sup><a id=\"post-892-footnote-ref-106\" href=\"#post-892-footnote-106\">[106]<\/a><\/sup> such as banking. Since <em>Miller <\/em>upheld the constitutionality of government surveillance of such traditional forms of transactions, FinCEN needs only to point to <em>Miller<\/em> for support for their proposed cryptocurrency monitoring rule.<sup><a id=\"post-892-footnote-ref-107\" href=\"#post-892-footnote-107\">[107]<\/a><\/sup> Those in the cryptocurrency industry implicitly argue that the anonymized roots of cryptocurrency grant it rights not enjoyed by other industries.<sup><a id=\"post-892-footnote-ref-108\" href=\"#post-892-footnote-108\">[108]<\/a><\/sup> Even leading cryptocurrency scholar-activists, such as Marta Belcher of Ropes &amp; Gray and the Electronic Frontier Foundation, have been left without answers when faced with the seemingly obvious question: What makes FinCEN\u2019s proposed rule any different from existing monetary reporting requirements?<sup><a id=\"post-892-footnote-ref-109\" href=\"#post-892-footnote-109\">[109]<\/a><\/sup> Lackluster responses from cryptocurrency activists, such as Ms. Belcher, that emphasize specific unique aspects of cryptocurrency and its users highlight the need for an approach to governmental financial surveillance that goes farther and is unrestricted by unnecessary focus on a particular industry.<sup><a id=\"post-892-footnote-ref-110\" href=\"#post-892-footnote-110\">[110]<\/a><\/sup> FinCEN\u2019s proposed cryptocurrency reporting rule is problematic, but it is only an extension of the BSA and <em>Miller <\/em>decision,<sup><a id=\"post-892-footnote-ref-111\" href=\"#post-892-footnote-111\">[111]<\/a><\/sup> which must be revisited to align Supreme Court Fourth Amendment jurisprudence with <em>Katz<\/em>.<sup><a id=\"post-892-footnote-ref-112\" href=\"#post-892-footnote-112\">[112]<\/a><\/sup><a id=\"post-892-_Toc95463703\"><\/a><\/p>\n<ol>\n<li><a id=\"post-892-_Toc100161561\"><\/a> Analysis: Revisiting the Bank Secrecy Act<\/li>\n<\/ol>\n<p>Cryptocurrency industry activists, and those activists involved more broadly in the fight for proper recognition of Fourth Amendment privacy protections, should revisit the BSAwith an emphasis on the still-valid two-part test handed down by the Supreme Court in <em>Katz<\/em>.<sup><a id=\"post-892-footnote-ref-113\" href=\"#post-892-footnote-113\">[113]<\/a><\/sup> Such a challenge to the BSA, and by extension the <em>Miller <\/em>decision, should stress that the <em>Miller <\/em>court erred in failing to properly apply the two-part expectation of privacy test as outlined in its <em>Katz <\/em>decision.<sup><a id=\"post-892-footnote-ref-114\" href=\"#post-892-footnote-114\">[114]<\/a><\/sup> In upholding the BSA, through the adoption of the third-party doctrine,<sup><a id=\"post-892-footnote-ref-115\" href=\"#post-892-footnote-115\">[115]<\/a><\/sup> the <em>Miller <\/em>Court essentially created an exception to Fourth Amendment privacy protections where none should exist.<sup><a id=\"post-892-footnote-ref-116\" href=\"#post-892-footnote-116\">[116]<\/a><\/sup> Even if the third-party doctrine is in some way constitutionally valid, it could be harmonized with the two-part test from <em>Katz<\/em>.<sup><a id=\"post-892-footnote-ref-117\" href=\"#post-892-footnote-117\">[117]<\/a><\/sup> Such a balance could be struck by applying <em>Katz\u2019<\/em>s two-part test in the context of third-party disclosures as follows: if an individual has an expectation of privacy in information given to a third-party <em>and <\/em>society is prepared to accept such an expectation as reasonable, then the information is protected by the Fourth Amendment.<sup><a id=\"post-892-footnote-ref-118\" href=\"#post-892-footnote-118\">[118]<\/a><\/sup> There are clearly many third-party disclosures, often protected by their own statutes,<sup><a id=\"post-892-footnote-ref-119\" href=\"#post-892-footnote-119\">[119]<\/a><\/sup> which society is prepared to accept as conferring a reasonable expectation of privacy under the Fourth Amendment. There are others that society is not as prepared to accept.<sup><a id=\"post-892-footnote-ref-120\" href=\"#post-892-footnote-120\">[120]<\/a><\/sup><\/p>\n<p>Although activists in the industry have thus far been ineffective at challenging the reach of governmental financial surveillance in the U.S.,<sup><a id=\"post-892-footnote-ref-121\" href=\"#post-892-footnote-121\">[121]<\/a><\/sup> the rise of cryptocurrency and the widespread outcry against FinCEN\u2019s proposed rule from both industry activists and those outside the industry is indicative that society <em>is <\/em>prepared to accept an expectation of privacy in a financial transaction as reasonable.<a id=\"post-892-_Ref89285590\"><\/a><sup><a id=\"post-892-footnote-ref-122\" href=\"#post-892-footnote-122\">[122]<\/a><\/sup> The <em>Katz <\/em>holding, including the two-prong test, is written so as to be interpreted in light of <em>society\u2019s<\/em> belief of what constitutes a reasonable expectation of privacy at the present time.<sup><a id=\"post-892-footnote-ref-123\" href=\"#post-892-footnote-123\">[123]<\/a><\/sup> Cryptocurrency has grown exponentially in popularity in the past decade,<a id=\"post-892-_Ref89286002\"><\/a><sup><a id=\"post-892-footnote-ref-124\" href=\"#post-892-footnote-124\">[124]<\/a><\/sup> and over three million estimated transactions take place per day using Bitcoin<sup><a id=\"post-892-footnote-ref-125\" href=\"#post-892-footnote-125\">[125]<\/a><\/sup>\u2013just one of myriad cryptocurrencies available for use in financial transactions today.<sup><a id=\"post-892-footnote-ref-126\" href=\"#post-892-footnote-126\">[126]<\/a><\/sup> This move to anonymized, electronically secured forms of currency is illustrative of the fact that U.S. society desires privacy in its financial transactions,<a id=\"post-892-_Ref89286140\"><\/a><sup><a id=\"post-892-footnote-ref-127\" href=\"#post-892-footnote-127\">[127]<\/a><\/sup> therefore, society is prepared to accept an expectation of privacy in such circumstances as reasonable.<sup><a id=\"post-892-footnote-ref-128\" href=\"#post-892-footnote-128\">[128]<\/a><\/sup> Under <em>Katz<\/em>, Title I and II of the BSA are violative of the privacy protections of the Fourth Amendment, and must be ruled unconstitutional.<sup><a id=\"post-892-footnote-ref-129\" href=\"#post-892-footnote-129\">[129]<\/a><\/sup> It must be acknowledged that this line of reasoning invites a predictable counterargument: how can society be prepared to accept an expectation of privacy in cryptocurrency transactions when it is not prepared to accept the same expectation of privacy in traditional monetary transactions? However, by framing the argument for a societal expectation for privacy under <em>Katz <\/em>by using the rise of cryptocurrency as <em>supporting evidence<\/em>, activists could argue that society is indeed prepared to accept an expectation of privacy in traditional monetary transactions. By framing a challenge to the BSA and the Court\u2019s decision in <em>Miller<\/em> in this way, a court would likely consider ruling relevant provisions of the BSA unconstitutional.<sup><a id=\"post-892-footnote-ref-130\" href=\"#post-892-footnote-130\">[130]<\/a><\/sup> By espousing this approach, cryptocurrency industry activists can expand their self-centered, dead-end arguments against FinCEN\u2019s proposed rule and help U.S. citizens reclaim their lost Fourth Amendment privacy protections under <em>Katz<\/em>.<sup><a id=\"post-892-footnote-ref-131\" href=\"#post-892-footnote-131\">[131]<\/a><\/sup><\/p>\n<p><a id=\"post-892-_Toc95463704\"><\/a><a id=\"post-892-_Toc100161562\"><\/a> Conclusion<\/p>\n<p>The financial surveillance of United States citizens by their own government is not a new phenomenon,<sup><a id=\"post-892-footnote-ref-132\" href=\"#post-892-footnote-132\">[132]<\/a><\/sup> and FinCEN\u2019s proposed rule for monitoring and reporting cryptocurrency transactions is seemingly a natural outreach of the ever-growing U.S. surveillance state.<sup><a id=\"post-892-footnote-ref-133\" href=\"#post-892-footnote-133\">[133]<\/a><\/sup> Activists in the cryptocurrency industry have not been wrong to argue that FinCEN\u2019s proposed rule is unconstitutional,<sup><a id=\"post-892-footnote-ref-134\" href=\"#post-892-footnote-134\">[134]<\/a><\/sup> but they have thus far failed to effectively engage with the supporting authority for the rule\u2013the Bank Secrecy Act of 1970.<sup><a id=\"post-892-footnote-ref-135\" href=\"#post-892-footnote-135\">[135]<\/a><\/sup> The BSA effectively overruled the Supreme Court\u2019s holding in <em>Katz<\/em>,<sup><a id=\"post-892-footnote-ref-136\" href=\"#post-892-footnote-136\">[136]<\/a><\/sup> but the <em>Miller <\/em>decision ignored this fact and upheld the BSA on the basis of the third-party doctrine.<sup><a id=\"post-892-footnote-ref-137\" href=\"#post-892-footnote-137\">[137]<\/a><\/sup> Cryptocurrency and privacy activists should push for the Court to revisit the BSA while adhering to the two-prong expectation of privacy test from <em>Katz<\/em>.<sup><a id=\"post-892-footnote-ref-138\" href=\"#post-892-footnote-138\">[138]<\/a><\/sup> By emphasizing the ability of the third-party doctrine to survive in harmony with <em>Katz<\/em>\u2019s two-part test and society\u2019s push for privacy as evidenced by the rise of cryptocurrency transactions, activists in the cryptocurrency industry can lead the modern charge for U.S. citizens\u2019 reclamation of their privacy rights under the Fourth Amendment.<\/p>\n<ol>\n<li id=\"post-892-footnote-1\">\u2020 Grant Hespeler is an Associate at the firm of Lewis Brisbois Bisgaard and Smith LLP and a member of Colorado Law\u2019s class of 2021. The author wishes to thank Eileen Powers, Kurt Hespeler, Emily Hespeler, Colleen Hespeler, Geraldine Powers, Edward Powers, Ann Hespeler, Herb Hespeler, and Skye Myers for their endless love and support. The author would also like to thank Brian Stuenkel for his thoughtful encouragement, which instilled the confidence needed to submit this article for publication, and Professor J. Brad Bernthal, who fostered the author\u2019s passion for law and technology. Thank you Colorado Law and to Law Buffs everywhere: Lux Vestra Luceat! <a href=\"#post-892-footnote-ref-1\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-2\"><em>.See U.S. Supreme Court Case Summaries: 1891-Present<\/em>, Ctr. for Reprod. Rts. (Aug. 1, 2007), https:\/\/reproductiverights.org\/u-s-supreme-court-case-summaries-privacy-law-1891-present\/ [https:\/\/perma.cc\/GW94-FLHG];<em> see generally <\/em>Alfred W. McCoy, Policing America\u2019s Empire: The United States, The Philippines, and the Rise of the Surveillance State 1, 14 (2009); <em>see generally <\/em>John O. Tyler Jr., <em>FISA vs the Constitution<\/em>, HBU News (July 24, 2018) https:\/\/hbu.edu\/news-and-events\/2018\/07\/24\/fisa-vs-the-constitution\/ [https:\/\/perma.cc\/72YD-DW7M]. <a href=\"#post-892-footnote-ref-2\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-3\">.U.S. Const. amend. IV. <a href=\"#post-892-footnote-ref-3\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-4\"><em>.See <\/em>Katz v. U.S., 389 U.S. 347 (1967). <a href=\"#post-892-footnote-ref-4\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-5\"><em>.See <\/em>Boyd v. U.S., 116 U.S. 616, 620\u201421 (1886); <em>see also<\/em> Anna Leslie Krouse, Eavesdropping on History: Olmstead v U.S and the Emergence of Privacy Jurisprudence during Prohibition 1 (2011) (M.A. thesis, Will. &amp; Mary), https:\/\/dx.doi.org\/doi:10.21220\/s2-97zs-w976 [https:\/\/perma.cc\/2QCZ-FJK6]; <em>see also <\/em>Morgan Cloud, <em>The Fourth Amendment During the Lochner Era: Privacy, Property, and Liberty in Constitutional Theory<\/em>, 48 Stan. Univ. L. Rev. 555 (1996). <a href=\"#post-892-footnote-ref-5\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-6\">.31 U.S.C. \u00a7 5311; <em>see also<\/em> 12 C.F.R. \u00a7 21.11; 12 C.F.R. \u00a7 21.21; <em>see generally <\/em>Jackie Wheeler, <em>The Bank Secrecy Act: Five Decades of Fighting Financial Crime<\/em>, Forbes (Nov. 2, 2020, 9:45 AM), https:\/\/www.forbes.com\/sites\/jumio\/2020\/11\/02\/the-bank-secrecy-act-five-decades-of-fighting-financial-crime\/?sh=7632106f5331 [https:\/\/perma.cc\/XT67-LQP5]. <a href=\"#post-892-footnote-ref-6\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-7\"><em>.See <\/em>Sebastian Sinclair, <em>Civil Liberties Group Calls FinCEN Crypto Wallet Rule \u2018Unconstitutional\u2019<\/em>, Coindesk News (Mar. 29, 2021, 9:07 PM), https:\/\/www.coindesk.com\/fincen-us-treasury-department-civil-rights-group [https:\/\/perma.cc\/74RJ-8FLK]; Caleb Kruckenberg, <em>Re: Requirements for Certain Transactions Involving Convertible Virtual Currency or Digital Assets<\/em>, New Civ. Liberties All. (Mar. 29, 2021), https:\/\/nclalegal.org\/wp-content\/uploads\/2021\/03\/NCLA-Comment-FinCEN-Digital-Asset-Rule-3.29.21.pdf [https:\/\/perma.cc\/9PHA-UMBC]; <em>see generally <\/em>Ben Jessel, <em>The Treasury\u2019s Crypto Reporting Proposal May Be a Fourth Amendment Breach<\/em>, Forbes (Jan. 4, 2021, 10:04 AM), https:\/\/www.forbes.com\/sites\/benjessel\/2021\/01\/04\/the-treasurys-crypto-reporting-proposal-may-be-a-fourth-amendment-breach\/?sh=22c6844ea1ee [https:\/\/perma.cc\/49TK-LG9P]; <em>see generally <\/em>Marta Belcher, <em>FinCEN\u2019s Crypto Surveillance Rule Violates the US Constitution<\/em>, Coindesk (Jan. 13, 2021, 12:55 PM), https:\/\/www.coindesk.com\/fincens-crypto-surveillance-rule-violates-us-constitution [https:\/\/perma.cc\/86C9-WVHZ]. <a href=\"#post-892-footnote-ref-7\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-8\">.Brian R. Michael, et al., <em>Pumping the Brakes: FinCEN Reopens Comment Period for Controversial Crypto Reporting &amp; Recordkeeping Rules<\/em>, King &amp; Spalding (Jan. 15, 2021), https:\/\/www.kslaw.com\/attachments\/000\/008\/499\/original\/Pumping_the_Brakes_FinCEN_Reopens_Comment_Period_for_Controversial_Crypto_Reporting___Recordkeeping_Rules.pdf?1610742340 [https:\/\/perma.cc\/AA2S-K2G3]. <a href=\"#post-892-footnote-ref-8\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-9\">.Belcher, <em>supra<\/em> note 7. <a href=\"#post-892-footnote-ref-9\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-10\"><em>.The Financial Crimes Enforcement Network Proposes Rule Aimed at Closing Anti-Money Laundering Regulatory Gaps for Certain Convertible Virtual Currency and Digital Asset Transactions<\/em>, U.S. Dept. of the Treasury (Jan. 18, 2020), https:\/\/home.treasury.gov\/news\/press-releases\/sm1216 [https:\/\/perma.cc\/S42T-QWQG]; <em>see <\/em>Jessel, <em>supra<\/em> note 7. <a href=\"#post-892-footnote-ref-10\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-11\">.U.S. v. Miller, 425 U.S. 435, 442 (1976); <em>see also<\/em> Katz v. U.S., 389 U.S. 347 (1967). <a href=\"#post-892-footnote-ref-11\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-12\"><em>.The Bill of Rights: A Transcription<\/em>, America\u2019s Founding Documents, Nat\u2019l Archives (Oct. 7, 2021),\u00a0https:\/\/www.archives.gov\/founding-docs\/bill-of-rights-transcript. <a href=\"#post-892-footnote-ref-12\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-13\">.U.S. Const. amend. IV. <a href=\"#post-892-footnote-ref-13\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-14\">.Cornell L. Sch., <em>Fourth Amendment Overview<\/em>, Legal Info. Inst., <a href=\"https:\/\/www.law.cornell.edu\/wex\/fourth_amendment\">https:\/\/www.law.cornell.edu\/wex\/fourth_amendment<\/a> <a href=\"https:\/\/perma.cc\/WG2X-RH6E\">[https:\/\/perma.cc\/WG2X-RH6E]<\/a>; <em>see generally <\/em>, Nat\u2019l Archives <em>supra <\/em>note 12. <a href=\"#post-892-footnote-ref-14\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-15\">.Cornell L. Sch., <em>supra <\/em>note 14; <em>see generally <\/em>Katz v. U.S., 389 U.S. 347 (1967); <em>see also <\/em>Nat\u2019l Archives, <em>supra<\/em> note 12. <a href=\"#post-892-footnote-ref-15\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-16\">.Cornell L. Sch., <em>supra <\/em>note 14; <em>see generally <\/em>Katz v. U.S., 389 U.S. 347 (1967); <em>see also <\/em>Nat\u2019l Archives, <em>supra<\/em> note 12. <a href=\"#post-892-footnote-ref-16\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-17\"><em>.See generally <\/em>Daniel T. Pesciotta,<em> I\u2019m Not Dead Yet: Katz, Jones, and the Fourth Amendment in the 21st Century<\/em>, 63 Case W. Rsrv. L. Rev. 187 (2012). <a href=\"#post-892-footnote-ref-17\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-18\"><em>.See <\/em>Boyd v. U.S., 116 U.S. 616, 620\u201321 (1886); <em>see also<\/em> Krouse, <em>supra<\/em> note 5; <em>see also <\/em>Cloud,<em> supra <\/em>note 5<em>.<\/em> <a href=\"#post-892-footnote-ref-18\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-19\"><a id=\"post-892-bookmark=id.30j0zll\"><\/a><a id=\"post-892-bookmark=id.gjdgxs\"><\/a> .Olmstead v. U.S., 277 U.S. 438 (1928). <a href=\"#post-892-footnote-ref-19\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-20\"><em>.Id.<\/em> at 455\u201357. <a href=\"#post-892-footnote-ref-20\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-21\"><em>.See generally<\/em> Krouse, <em>supra<\/em> note 5. <a href=\"#post-892-footnote-ref-21\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-22\"><em>.Olmstead<\/em>, 277 U.S. at 466. <a href=\"#post-892-footnote-ref-22\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-23\"><em>.See <\/em>U.S. v. Bell, 48 F. Supp. 986, 995 (S.D. Cal 1943); <em>see also <\/em>Krouse, <em>supra<\/em> note 5; <em>see also<\/em> Cloud, <em>supra <\/em>note 5; <em>see also <\/em>Nat\u2019l Archives, <em>supra<\/em> note 12; <em>see also <\/em>Cornell L. Sch., <em>supra<\/em> note 14. <a href=\"#post-892-footnote-ref-23\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-24\"><em>.See Bell<\/em>, 48 F. Supp. at 995.; <em>see also <\/em>Krouse, <em>supra<\/em> note 5; <em>see also <\/em>Cloud, <em>supra <\/em>note 5; <em>see also <\/em>Nat\u2019l Archives, <em>supra<\/em> note 12; <em>see also <\/em>Cornell L. Sch., <em>supra<\/em> note 14. <a href=\"#post-892-footnote-ref-24\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-25\"><em>.See <\/em>Katz v. U.S., 389 U.S. 347 (1967); <em>see also <\/em>Boyd v. U.S., 116 U.S. 616, 616 (1886); <em>see also <\/em>Krouse, <em>supra<\/em> note 5; <em>see also <\/em>Cloud, <em>supra <\/em>note 5. <a href=\"#post-892-footnote-ref-25\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-26\"><em>.See Katz<\/em>, 389 U.S. at 348\u201349. <a href=\"#post-892-footnote-ref-26\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-27\"><em>.See id<\/em>.;<em> see also <\/em>Olmstead v. U.S., 277 U.S. 438,455\u201357 (1928); <em>see also <\/em>Nicandro Iannacci, <em>Katz v. United States: The Fourth Amendment Adapts to New Technology<\/em>, Nat. Const. Ctr. (Dec. 18, 2018), https:\/\/constitutioncenter.org\/blog\/katz-v-united-states-the-fourth-amendment-adapts-to-new-technology\/ [https:\/\/perma.cc\/M6JA-QSJP]. <a href=\"#post-892-footnote-ref-27\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-28\"><em>.Katz<\/em>, 389 U.S. at 353. <a href=\"#post-892-footnote-ref-28\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-29\"><em>.See <\/em>Cornell L. Sch., <em>supra<\/em> note 14; <em>see generally <\/em>Iannacci, <em>supra<\/em> note 27. <a href=\"#post-892-footnote-ref-29\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-30\"><em>.See generally <\/em>David E. Steinberg, <em>The Uses and Misuses of Fourth Amendment History<\/em>, 10 Univ. Pa. J. Const. L. 581 (2008); <em>see also <\/em>Cloud, <em>supra <\/em>note 5; <em>see generally <\/em>Krouse, <em>supra<\/em> note 5. <a href=\"#post-892-footnote-ref-30\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-31\">.Katz v. U.S., 389 U.S. 347, 353 (1967). <a href=\"#post-892-footnote-ref-31\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-32\"><em>.See id.<\/em>;<em> see also<\/em> Iannacci, <em>supra <\/em>note 27; <em>see also<\/em> Michael B. Fusco,<em> Katz in the Era of Mobile Computing: How Society\u2019s Changing Expectations of Privacy Impact the Law<\/em>, Seton Hall Univ. L. Sch. Student Scholarship (2010) https:\/\/scholarship.shu.edu\/cgi\/viewcontent.cgi?article=1037&amp;context=student_scholarship [<a href=\"https:\/\/perma.cc\/MG6X-TMUZ\">https:\/\/perma.cc\/MG6X-TMUZ<\/a>]; <em>see also<\/em> Pesciott<em>a<\/em>, <em>supra<\/em> note 17. <a href=\"#post-892-footnote-ref-32\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-33\"><em>.Katz<\/em>, 389 U.S. at 361 (Harlan, J., concurring). <a href=\"#post-892-footnote-ref-33\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-34\"><em>.Id.<\/em> at 360\u201361 (Harlan, J., concurring). <a href=\"#post-892-footnote-ref-34\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-35\"><em>.Id.<\/em> <a href=\"#post-892-footnote-ref-35\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-36\"><em>.See generally<\/em> Katz v. U.S., 389 U.S. 347 (1967);<em> see <\/em>Olmstead v. U.S., 277 U.S. 438 (1928). <a href=\"#post-892-footnote-ref-36\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-37\"><em>.Katz<\/em>, 389 U.S. at 347, 361; <em>see generally <\/em>Iannacci, <em>supra <\/em>note 27. <a href=\"#post-892-footnote-ref-37\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-38\"><em>.See <\/em>Iannacci, <em>supra <\/em>note 27; <em>see also Katz<\/em>, 389 U.S. at 347, 361; <em>see generally <\/em>Pesciott<em>a<\/em>, <em>supra<\/em> note 17. <a href=\"#post-892-footnote-ref-38\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-39\"><em>.See generally <\/em>Pesciotta,<em> supra <\/em>note 17. <a href=\"#post-892-footnote-ref-39\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-40\"><em>.See id.<\/em>;<em> see<\/em> U.S. v. Miller, 425 U.S. 435, 442 (1976).; <em>see also <\/em>Timothy Casey, <em>Electronic Surveillance and the Right to Be Secure<\/em>, 48 Univ. Ca. Davis L. Rev. 977 (2008). <a href=\"#post-892-footnote-ref-40\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-41\">.Andrew Morgan, <em>The Patriot Act and Civil Liberties<\/em>, Jurist Legal Commentary (Jul. 20, 2013, 10:03 PM), <a href=\"https:\/\/www.jurist.org\/archives\/feature\/the-patriot-act-and-civil-liberties\/\">https:\/\/www.jurist.org\/archives\/feature\/the-patriot-act-and-civil-liberties\/<\/a> [https:\/\/perma.cc\/76WD-VTP6]. <a href=\"#post-892-footnote-ref-41\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-42\"><em>.See generally <\/em>Tyler Jr., <em>supra<\/em> note 2. <a href=\"#post-892-footnote-ref-42\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-43\"><em>.Id.<\/em>;<em> see also <\/em>Morgan, <em>supra<\/em> note 40; <em>see also NSA Surveillance<\/em>, ACLU, <a href=\"https:\/\/www.aclu.org\/issues\/national-security\/privacy-and-surveillance\/nsa-surveillance\">https:\/\/www.aclu.org\/issues\/national-security\/privacy-and-surveillance\/nsa-surveillance<\/a> [<a href=\"https:\/\/perma.cc\/8RP2-DKYB\">https:\/\/perma.cc\/8RP2-DKYB<\/a>](last visited Sept. 26, 2021). <a href=\"#post-892-footnote-ref-43\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-44\"><em>.See <\/em>Sinclair, <em>supra<\/em> note 7. <a href=\"#post-892-footnote-ref-44\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-45\"><em>.See <\/em>Kate Ashford &amp; John Schmidt, <em>What is Cryptocurrency?<\/em>, Forbes (Dec. 18, 2020, 12:27 AM), https:\/\/www.forbes.com\/advisor\/investing\/what-is-cryptocurrency\/ [<a href=\"https:\/\/perma.cc\/4CND-QFX6\">https:\/\/perma.cc\/4CND-QFX6<\/a>]. <a href=\"#post-892-footnote-ref-45\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-46\"><em>.See <\/em>Scott Likens, <em>Making Sense of Bitcoin, Cryptocurrency, and Blockchain<\/em>, PricewaterhouseCoopers, https:\/\/www.pwc.com\/us\/en\/industries\/financial-services\/fintech\/bitcoin-blockchain-cryptocurrency.html (last visited Sept. 26, 2021). <a href=\"#post-892-footnote-ref-46\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-47\">.Nasser Alsalami &amp; Bingsheng Zhang,<em> SoK: A Systematic Study of Anonymity in Cryptocurrencies<\/em>, Inst. Elec. &amp; Elec.s Eng\u2019rs (Nov. 20, 2019), https:\/\/core.ac.uk\/download\/pdf\/266984898.pdf. <a href=\"#post-892-footnote-ref-47\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-48\">.Marco Lichtfous et al., <em>Can Blockchain Accelerate Financial Inclusion Globally?<\/em>, Deloitte Inside Mag. 1, 70 (Oct. 2018), https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/lu\/Documents\/about-deloitte\/Inside\/lu-inside19-full.pdf <a href=\"#post-892-footnote-ref-48\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-49\">.Lauren Perez, <em>What Does it Mean to be Unbanked?<\/em>, Magnify Money (May 13, 2020), <a href=\"https:\/\/www.magnifymoney.com\/blog\/banking\/unbanked\/\">https:\/\/www.magnifymoney.com\/blog\/banking\/unbanked\/<\/a> [<a href=\"https:\/\/perma.cc\/B5MN-SLKU\">https:\/\/perma.cc\/B5MN-SLKU<\/a>]. <a href=\"#post-892-footnote-ref-49\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-50\"><em>.Id.<\/em>; Steve Tanner, <em>Access to Banking: What Does Underbanked Mean?<\/em>, Freedom Debt Relief (July 9, 2020), https:\/\/www.freedomdebtrelief.com\/blog\/access-to-banking-what-does-underbanked-mean\/. <a href=\"#post-892-footnote-ref-50\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-51\">.Justin Pritchard &amp; Charles Potters, <em>How The Underbanked Handle Finance in the U.S.<\/em>, Balance (May 18, 2021), <a href=\"https:\/\/www.thebalance.com\/how-the-underbanked-handle-finances-in-the-u-s-4175509\">https:\/\/www.thebalance.com\/how-the-underbanked-handle-finances-in-the-u-s-4175509<\/a> <a href=\"https:\/\/perma.cc\/74LD-DGRT\">[https:\/\/perma.cc\/74LD-DGRT]<\/a>; Emily Guy Birken, <em>The Costs of Being Unbanked or Underbanked<\/em>, Forbes Advisor (July 28, 2020, 12:03 AM), https:\/\/www.forbes.com\/advisor\/banking\/costs-of-being-unbanked-or-underbanked\/. <a href=\"#post-892-footnote-ref-51\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-52\">.Megan Leonhardt, <em>7.1 Million American Households Didn\u2019t Have a Bank Account Last Year \u2013 The Lowest Rate Since 2009<\/em>, CNBC (Oct. 19, 2020, 1:27 PM), https:\/\/www.cnbc.com\/2020\/10\/19\/7point1-million-american-households-didnt-have-a-bank-account-last-year.html. <a href=\"#post-892-footnote-ref-52\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-53\">.Erin Barry, <em>25% of US Households are Either Unbanked or Underbanked<\/em>, CNBC (Mar. 9, 2019, 11:01 AM), https:\/\/www.cnbc.com\/2019\/03\/08\/25percent-of-us-households-are-either-unbanked-or-underbanked.html. <a href=\"#post-892-footnote-ref-53\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-54\">.Lichtfous et al., <em>supra<\/em> note 48. <a href=\"#post-892-footnote-ref-54\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-55\"><em>.See <\/em>Yaya Fanusie, <em>Stop Saying You Want to Bank the Unbanked<\/em>, FORBES (Jan. 1, 2021, 6:12 PM), https:\/\/www.forbes.com\/sites\/yayafanusie\/2021\/01\/01\/stop-saying-you-want-to-bank-the-unbanked\/?sh=3cf4ce42456a [<a href=\"https:\/\/perma.cc\/UY2R-W7WF\">https:\/\/perma.cc\/UY2R-W7WF<\/a>]. <a href=\"#post-892-footnote-ref-55\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-56\">.Sesha Kethineni &amp; Ying Cao, <em>The Rise in Popularity of Cryptocurrency and Associated Criminal Activity<\/em>, 30 Int\u2019l. Crim. Just. Rev. 325, 326 (2019). <a href=\"#post-892-footnote-ref-56\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-57\"><em>.Id.<\/em>; Jared Dean, <em>Cryptocurrency Popularity Continues to Rise<\/em>, KEYC News Now (last updated Feb. 11, 2021, 5:12 PM), https:\/\/www.keyc.com\/2021\/02\/11\/cryptocurrency-popularity-continues-rise\/. <a href=\"#post-892-footnote-ref-57\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-58\">.Robert Stevens, <em>How Cryptocurrency Activism is Trying to Change the World<\/em>, Decrypt (Nov. 24, 2019), https:\/\/decrypt.co\/11786\/how-crypto-activism-is-trying-to-change-the-world. <a href=\"#post-892-footnote-ref-58\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-59\">.85 Fed. Reg. 83840 (Dec. 23, 2020). <a href=\"#post-892-footnote-ref-59\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-60\"><em>.Id.<\/em> <a href=\"#post-892-footnote-ref-60\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-61\"><em>.Id.<\/em> <a href=\"#post-892-footnote-ref-61\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-62\">.Adrian Zmudzinski, <em>Opposition to FinCEN Rule Grows After a16z Promises Court Challenge<\/em>, Modern Consensus (Jan. 6, 2021),\u00a0https:\/\/modernconsensus.com\/regulation\/opposition-to-fincen-crypto-rule-grows-after-a16z-promises-court-challenge\/. <a href=\"#post-892-footnote-ref-62\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-63\">.Sinclair, <em>supra<\/em> note 7; Kruckenberg, <em>supra<\/em> note 7. <a href=\"#post-892-footnote-ref-63\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-64\">.Belcher, <em>supra<\/em> note 7. <a href=\"#post-892-footnote-ref-64\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-65\">.Kruckenberg, <em>supra<\/em> note 7. <a href=\"#post-892-footnote-ref-65\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-66\"><em>.Id.<\/em>;<em> see also generally <\/em>Michael et al., <em>supra<\/em> note 8. <a href=\"#post-892-footnote-ref-66\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-67\"><em>.See Michael et al., supra <\/em>note 8; <em>see also <\/em>Kruckenberg,<em> supra<\/em> note 7. <a href=\"#post-892-footnote-ref-67\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-68\"><em>.See <\/em>Jerry Brito &amp; Peter Van Valkenburgh,<em> Supplemental Comments to the Financial Crimes Enforcement Network on Requirements for Certain Transactions Involving Convertible Virtual Currency or Digital Assets<\/em>, Coin Ctr. (Jan. 7, 2020), https:\/\/www.coincenter.org\/app\/uploads\/2021\/01\/Coin-Center-FinCEN-Second-Comment.pdf. <a href=\"#post-892-footnote-ref-68\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-69\"><em>.See generally <\/em>Jessel, <em>supra<\/em> note 7; <em>see also <\/em>U.S. Dep\u2019t Treasury, <em>The Financial Crimes Enforcement Network Proposes Rule Aimed at Closing Anti-Money Laundering Regulatory Gaps for Certain Convertible Virtual Currency and Digital Asset Transactions<\/em>, U.S. Dep\u2019t Treasury (Dec. 18, 2020), https:\/\/home.treasury.gov\/news\/press-releases\/sm1216. <a href=\"#post-892-footnote-ref-69\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-70\">.31 U.S.C \u00a7 5311 (2011). <a href=\"#post-892-footnote-ref-70\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-71\">.Cigdem V. Sirin, <em>From Nixon\u2019s War on Drugs to Obama\u2019s Drug Policies Today: Presidential Progress in Addressing Racial Injustices and Disparities<\/em>, 18 Race, Gender &amp; Class 82 (2011); Terence McArdle, <em>The \u2018Law and Order\u2019 Campaign that Won Richard Nixon the White House 50 Years Ago<\/em>, Wash. Post (Nov. 5, 2018), <a href=\"https:\/\/www.washingtonpost.com\/history\/2018\/11\/05\/law-order-campaign-that-won-richard-nixon-white-house-years-ago\/\">https:\/\/www.washingtonpost.com\/history\/2018\/11\/05\/law-order-campaign-that-won-richard-nixon-white-house-years-ago\/<\/a> [<a href=\"https:\/\/perma.cc\/FVU3-QB39\">https:\/\/perma.cc\/FVU3-QB39<\/a>]. <a href=\"#post-892-footnote-ref-71\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-72\">.21 U.S.C. \u00a7\u00a7 811\u201312. <a href=\"#post-892-footnote-ref-72\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-73\">.18 U.S.C. \u00a7\u00a7 1961\u201368. <a href=\"#post-892-footnote-ref-73\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-74\">.Sirin, <em>supra<\/em> note 71; McArdle, <em>supra <\/em>note 71. <a href=\"#post-892-footnote-ref-74\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-75\">.31 U.S.C. \u00a7 5311. <a href=\"#post-892-footnote-ref-75\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-76\">.Wheeler,<em> supra<\/em> note 6; Office of the Comptroller of the Currency, <em>Bank Secrecy Act (BSA)<\/em>, Off. Comptroller Currency, https:\/\/www.occ.treas.gov\/topics\/supervision-and-examination\/bsa\/index-bsa.html (last visited Sept. 26, 2021). <a href=\"#post-892-footnote-ref-76\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-77\">.Wheeler,<em> supra<\/em> note 6; Office of the Comptroller of the Currency, <em>supra<\/em> note 76. <a href=\"#post-892-footnote-ref-77\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-78\">.31 U.S.C. \u00a7\u00a7 5311\u20135330. <a href=\"#post-892-footnote-ref-78\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-79\"><em>.The 1970 Bank Secrecy Act and the Right of Privacy<\/em>, 14 Wm. &amp; Mary L. Rev. 929, 935 (1973). <a href=\"#post-892-footnote-ref-79\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-80\">.31 U.S.C. \u00a7\u00a7 5311\u20135330. <a href=\"#post-892-footnote-ref-80\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-81\"><em>.Id.<\/em> <a href=\"#post-892-footnote-ref-81\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-82\">.Katz v. U.S., 389 U.S. 347 (1967). <a href=\"#post-892-footnote-ref-82\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-83\">.Cal. Bankers Ass\u2019n v. Shultz, 416 U.S. 21, 26 (1974). <a href=\"#post-892-footnote-ref-83\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-84\">.Wheeler, <em>supra<\/em> note 6; Office of the Comptroller of the Currency, <em>supra<\/em> note 76. <a href=\"#post-892-footnote-ref-84\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-85\">.U.S. v. Miller, 425 U.S. 435, 436\u201338 (1976). <a href=\"#post-892-footnote-ref-85\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-86\"><em>.Id.<\/em> at 442\u201344. <a href=\"#post-892-footnote-ref-86\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-87\"><em>.Id.<\/em> at 442. <a href=\"#post-892-footnote-ref-87\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-88\"><em>.See generally<\/em> Richard M. Thompson II, <em>The Fourth Amendment Third-Party Doctrine<\/em>, Cong. Rsch. Serv. 1, 1 (June 5, 2014), https:\/\/sgp.fas.org\/crs\/misc\/R43586.pdf <a href=\"https:\/\/perma.cc\/86CD-JW68\">[https:\/\/perma.cc\/86CD-JW68]<\/a>. <a href=\"#post-892-footnote-ref-88\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-89\"><em>.Miller<\/em>, 425 U.S. at 442. <a href=\"#post-892-footnote-ref-89\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-90\"><em>.Id<\/em>. at 442\u201343. <a href=\"#post-892-footnote-ref-90\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-91\"><em>.<\/em> U.S. v. Miller, 425 U.S. 435, 442\u201343 (1976). <a href=\"#post-892-footnote-ref-91\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-92\"><em>.Id. <\/em>at 442. <a href=\"#post-892-footnote-ref-92\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-93\"><em>.Id.<\/em> at 442\u201343; Thompson, <em>supra<\/em> note 88. <a href=\"#post-892-footnote-ref-93\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-94\">.U.S. v. Miller, 425 U.S. 435, 443 (1976). <a href=\"#post-892-footnote-ref-94\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-95\"><em>.Id.<\/em> at 442. <a href=\"#post-892-footnote-ref-95\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-96\"><em>.See generally id.<\/em>; <em>see also <\/em>Sherry F. Colb, <em>The Third-Party Doctrine vs. Katz v. United States<\/em>, Justia Verdict (June 17, 2020), https:\/\/verdict.justia.com\/2020\/06\/17\/the-third-party-doctrine-vs-katz-v-united-states. <a href=\"#post-892-footnote-ref-96\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-97\"><em>.See generally<\/em> <em>Miller<\/em>, 425 U.S. at 443; <em>see also Cal. Bankers Ass\u2019n<\/em>, 416 U.S. 21, 88, 95\u201396 (Douglas, J., dissenting and Marshall, J., dissenting); <em>see also <\/em>Pesciotta,<em> supra <\/em>note 17. <a href=\"#post-892-footnote-ref-97\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-98\"><em>.See generally<\/em> <em>Miller<\/em>, 425 U.S. at 443; <em>see <\/em>Thompson, <em>supra<\/em> note 88 at 9; <em>see also <\/em>Sherry F. Colb, <em>supra<\/em> note 96; <em>see also Cal. Bankers Ass\u2019n<\/em>, 416 U.S. 21, 88, 95\u201396 (Douglas, J., dissenting and Marshall, J., dissenting). <a href=\"#post-892-footnote-ref-98\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-99\"><em>.Miller<\/em>, 425 U.S. at 436\u201337, 442, 444\u201347. <a href=\"#post-892-footnote-ref-99\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-100\">.U.S. v. Miller, 425 U.S. 435, 435, 446 (1976); <em>see generally <\/em>Colb, <em>supra <\/em>note 96; <em>see generally Cal. Bankers Ass\u2019n<\/em>, 416 U.S. 22, 24, 42, 52, 54. <a href=\"#post-892-footnote-ref-100\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-101\"><em>.See generally<\/em> 31 U.S.C. \u00a7 5311 (the Bank Secrecy Act);<em> see generally Miller<\/em>, 425 U.S. 435; <em>see also <\/em>Wheeler, <em>supra <\/em>note 6; <em>see also <\/em>Off. Comptroller Currency, <em>supra <\/em>note 76; <em>see also <\/em>Jessel, <em>supra<\/em> note 7 at 13\u20134 (because of Miller\u2019s holding, and the so-called third-party doctrine, the entire BSA regime, which mandated disclosures to FinCEN, even without any suspicion of wrongdoing, was viewed as simply outside the protection of the Fourth Amendment). <a href=\"#post-892-footnote-ref-101\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-102\"><em>.See generally<\/em> U.S. Dep\u2019t. of the Treasury, <em>supra <\/em>note 69. <a href=\"#post-892-footnote-ref-102\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-103\"><em>.See<\/em> <em>Miller<\/em>, 425 U.S. at 436\u201337, 444\u201347; <em>see also <\/em>Jessel, supra note 7 at 13\u201314. <a href=\"#post-892-footnote-ref-103\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-104\">.31 C.F.R. \u00a7\u00a7 1010, 1020, 1022 (2010); <em>see generally<\/em> U.S. Dep\u2019t. Treasury, <em>supra<\/em> note 69. <a href=\"#post-892-footnote-ref-104\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-105\">.U.S. Dep\u2019t. Treasury, <em>supra <\/em>note 69. <a href=\"#post-892-footnote-ref-105\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-106\"><em>.Id.<\/em>; <em>see<\/em> Jessel, <em>supra<\/em> note 7. <a href=\"#post-892-footnote-ref-106\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-107\"><em>.See generally<\/em> U.S. v. Miller, 425 U.S. 435, 436\u201337, 444\u201347 (1976). <a href=\"#post-892-footnote-ref-107\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-108\">.Jessel, <em>supra <\/em>note 7. <a href=\"#post-892-footnote-ref-108\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-109\"><em>.See generally<\/em> Brito &amp; Valkenburgh,<em> supra <\/em>note 68; <em>see also<\/em> Sinclair, <em>supra<\/em> note 7. <a href=\"#post-892-footnote-ref-109\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-110\"><em>.See generally <\/em>Michael et. al., <em>supra <\/em>note 8; <em>see generally <\/em>Jessel, <em>supra <\/em>note 7. <a href=\"#post-892-footnote-ref-110\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-111\"><em>.See generally<\/em> 31 U.S.C. \u00a7 5111;<em> Miller<\/em>, 425 U.S. at 436\u201337, 444\u201347; <em>see also <\/em>U.S. Dep\u2019t. of the Treasury, <em>supra <\/em>note 69<em>.<\/em> <a href=\"#post-892-footnote-ref-111\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-112\"><em>.See generally <\/em>Katz v. U.S., 389 U.S. 347 (1967); <em>see also <\/em>Colb, <em>supra <\/em>note 96. <a href=\"#post-892-footnote-ref-112\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-113\"><em>.See<\/em> <em>Katz<\/em>, 389 U.S. at 354\u201359. <a href=\"#post-892-footnote-ref-113\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-114\"><em>.Id.<\/em>;<em> see generally <\/em>31 U.S.C. \u00a7 5111; <em>see generally <\/em>U.S. v. Miller, 425 U.S. 435, 436\u201356 (1976). <a href=\"#post-892-footnote-ref-114\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-115\"><em>.See generally Katz<\/em>, 389 U.S. at 347;<em> see generally <\/em>Thompson, <em>supra <\/em>note 88 at 9\u201311. <a href=\"#post-892-footnote-ref-115\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-116\"><em>.See generally Miller<\/em>, 425 U.S. at 441\u201344; <em>see also <\/em>Colb, <em>supra <\/em>note 96. <a href=\"#post-892-footnote-ref-116\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-117\"><em>.See generally Miller<\/em>, 425 U.S. at 435;<em> see also <\/em>Iannacci, <em>supra <\/em>note 27; <em>see also <\/em>Pesciotta,<em> supra <\/em>note 17. <a href=\"#post-892-footnote-ref-117\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-118\"><em>.See generally <\/em>Colb, <em>supra <\/em>note 96;<em> see generally <\/em>Pesciotta,<em> supra <\/em>note 17, at 197\u201398. <a href=\"#post-892-footnote-ref-118\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-119\"><em>.See <\/em>Thompson<em>, supra<\/em> note 88 at 26. <a href=\"#post-892-footnote-ref-119\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-120\"><em>.See<\/em> Thompson<em>, supra<\/em> note 88 at 26;<em> see generally <\/em>Iannacci, <em>supra <\/em>note 27; <em>see <\/em>Pesciotta, <em>supra <\/em>note 17 at 199, 205. <a href=\"#post-892-footnote-ref-120\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-121\"><em>.See generally <\/em>Shawn Bradstreet, <em>Reforming the Bank Secrecy act to Address Emerging Technology and Prevent Illicit Financing<\/em>, Ctr. for Homeland Def. &amp; Sec. Naval Postgraduate Sch. (Dec. 2019), https:\/\/www.hsdl.org\/?view&amp;did=834584; <em>see also <\/em>Wheeler, <em>supra <\/em>note 6; <em>see also <\/em>Off. Comptroller of the Currency, <em>supra<\/em> note 76. <a href=\"#post-892-footnote-ref-121\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-122\"><em>.See generally Number of Daily Transactions in Bitcoin, Ethereum, and Nine other Cryptocurrencies from January 2017 to March 28, 2021<\/em>, Statista (Mar. 28, 2021), <a href=\"https:\/\/www.statista.com\/statistics\/730838\/number-of-daily-cryptocurrency-transactions-by-type\/\">https:\/\/www.statista.com\/statistics\/730838\/number-of-daily-cryptocurrency-transactions-by-type\/<\/a> [<a href=\"https:\/\/perma.cc\/3CDJ-JGT5\">https:\/\/perma.cc\/3CDJ-JGT5<\/a>]; <em>see also<\/em> Fusco, <em>supra <\/em>note 32. <a href=\"#post-892-footnote-ref-122\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-123\">.Fusco, <em>supra<\/em> note 32; <em>see <\/em>Iannacci, <em>supra<\/em> note 27. <a href=\"#post-892-footnote-ref-123\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-124\"><em>.See generally <\/em>Statista, <em>supra <\/em>note 122; <em>see also <\/em>Kethineni et. al., <em>supra<\/em> note 56<em>; see also Cryptocurrency Market Size, Share and COVID-19 Impact Industry Analysis, By Component, By Type, By End-Use, and Regional Forecast, 2020-2027<\/em>, Fortune Bus. Insights (May 2020), <a href=\"https:\/\/www.fortunebusinessinsights.com\/industry-reports\/cryptocurrency-market-100149\">https:\/\/www.fortunebusinessinsights.com\/industry-reports\/cryptocurrency-market-100149<\/a> [<a href=\"https:\/\/perma.cc\/4YUW-YTUQ\">https:\/\/perma.cc\/4YUW-YTUQ<\/a>]. <a href=\"#post-892-footnote-ref-124\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-125\"><em>.See <\/em>Statista, <em>supra <\/em>note 122. <a href=\"#post-892-footnote-ref-125\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-126\">.Statista, <em>supra<\/em> note 122;<em> see <\/em>Fortune Bus. Insights, <em>supra <\/em>note 124. <a href=\"#post-892-footnote-ref-126\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-127\"><em>.See generally <\/em>Geoff Goodell &amp; Tomaso Aste, <em>Can Cryptocurrencies Preserve Privacy and Comply with Regulations, <\/em>Frontiers Blockchain (May 28, 2019), https:\/\/www.frontiersin.org\/articles\/10.3389\/fbloc.2019.00004\/full [<a href=\"https:\/\/perma.cc\/XM9Q-5JRS\">https:\/\/perma.cc\/XM9Q-5JRS<\/a>]. <a href=\"#post-892-footnote-ref-127\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-128\"><em>.Id.<\/em>; <em>see <\/em>Iannacci, <em>supra <\/em>note 27. <a href=\"#post-892-footnote-ref-128\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-129\"><em>.See generally<\/em> Katz v. U.S., 389 U.S. 347 (1967); <em>see generally <\/em>Iannacci, <em>supra <\/em>note 27; <em>see generally<\/em> Fusco, <em>supra <\/em>note 32. <a href=\"#post-892-footnote-ref-129\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-130\"><em>.See generally <\/em>Iannacci<em>,<\/em> <em>supra<\/em> note 27. <a href=\"#post-892-footnote-ref-130\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-131\"><em>.See generally<\/em> <em>Katz<\/em>, 389 U.S. at 347; <em>see generally <\/em>Iannacci, <em>supra <\/em>note 27. <a href=\"#post-892-footnote-ref-131\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-132\"><em>.See generally <\/em>McCoy, <em>supra <\/em>note 2; <em>see also<\/em> Center for Reproductive Rights, <em>supra <\/em>note 2<em>; see also<\/em> Goodell &amp; Aste<em>, supra <\/em>note 127<em>.<\/em> <a href=\"#post-892-footnote-ref-132\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-133\"><em>.See <\/em>Goodell &amp; Aste, <em>supra <\/em>note 127. <a href=\"#post-892-footnote-ref-133\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-134\">.Belcher,<em> supra<\/em> note 7; Dr. Josephine Wolff, <em>Losing our Fourth Amendment Data Protection<\/em>, N.Y. Times Priv. Project (Apr. 28, 2019), <a href=\"https:\/\/www.nytimes.com\/2019\/04\/28\/opinion\/fourth-amendment-privacy.html?auth=login-google\">https:\/\/www.nytimes.com\/2019\/04\/28\/opinion\/fourth-amendment-privacy.html?auth=login-google<\/a> [<a href=\"https:\/\/perma.cc\/K9CN-JL3Z\">https:\/\/perma.cc\/K9CN-JL3Z<\/a>]. <a href=\"#post-892-footnote-ref-134\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-135\"><em>.See generally <\/em>U.S. v. Miller, 425 U.S. 435, (1976). <a href=\"#post-892-footnote-ref-135\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-136\">.31 U.S.C. \u00a7 5111; <em>Miller<\/em>, 425 U.S. at 435; Katz v. U.S., 389 U.S. 347 (1967). <a href=\"#post-892-footnote-ref-136\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-137\"><em>.Miller<\/em>, 425 U.S. at 435, 445\u201346. <a href=\"#post-892-footnote-ref-137\">\u2191<\/a><\/li>\n<li id=\"post-892-footnote-138\"><em>.See <\/em>Iannacci, <em>supra <\/em>note 27. <a href=\"#post-892-footnote-ref-138\">\u2191<\/a><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Misguided Activism of the Cryptocurrency Industry: Reckoning With The Bank Secrecy Act of 1970 Grant Hespeler[1]\u2020 Print Version: Cryptocurrency &amp; Bank Secrecy Act Introduction 161 I. Background: Privacy Rights from Olmstead to Katz 163 A. The Olmstead Era 163 B. Katz Balances the Scales 165 II. FinCEN\u2019s Proposed Rule and Cryptocurrency Activism 167 III. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[9,37],"tags":[],"class_list":["post-892","post","type-post","status-publish","format-standard","hentry","category-printed","category-volume-20"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"portfolio_item-thumbnail":false,"portfolio_item-thumbnail@2x":false,"portfolio_item-masonry":false,"portfolio_item-masonry@2x":false,"portfolio_item-thumbnail_cinema":false,"portfolio_item-thumbnail_portrait":false,"portfolio_item-thumbnail_portrait@2x":false,"portfolio_item-thumbnail_square":false},"uagb_author_info":{"display_name":"Grant Hespeler","author_link":""},"uagb_comment_info":0,"uagb_excerpt":"The Misguided Activism of the Cryptocurrency Industry: Reckoning With The Bank Secrecy Act of 1970 Grant Hespeler[1]\u2020 Print Version: Cryptocurrency &amp; Bank Secrecy Act Introduction 161 I. Background: Privacy Rights from Olmstead to Katz 163 A. The Olmstead Era 163 B. Katz Balances the Scales 165 II. FinCEN\u2019s Proposed Rule and Cryptocurrency Activism 167 III.&hellip;","featured_media_urls":[],"_links":{"self":[{"href":"https:\/\/ctlj.colorado.edu\/index.php?rest_route=\/wp\/v2\/posts\/892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ctlj.colorado.edu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ctlj.colorado.edu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ctlj.colorado.edu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ctlj.colorado.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=892"}],"version-history":[{"count":1,"href":"https:\/\/ctlj.colorado.edu\/index.php?rest_route=\/wp\/v2\/posts\/892\/revisions"}],"predecessor-version":[{"id":894,"href":"https:\/\/ctlj.colorado.edu\/index.php?rest_route=\/wp\/v2\/posts\/892\/revisions\/894"}],"wp:attachment":[{"href":"https:\/\/ctlj.colorado.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ctlj.colorado.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ctlj.colorado.edu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}