|  | Technology | Crime | dominant 4A metaphor | 4A protection | 
    
      | 1928 | early telephone | Prohibition | Castle: property/trespass (Olmstead) | none b/c no trespass | 
    
      | 1968 | mass market phones | Gambling/Organized Crime | People not places: reasonable expectation of
        privacy (Katz) | Title III enacts guidance of Katz & Berger 
          PClimit class of crimesafter the fact inventory | 
    
      | 1984 | store & forward | [pre-emptive strike by technophiles] | Generalized Communications protected: 3rd party
        business records vs. 1st class mail | ECPA 
          email gets status of 1st class mailtechnical detail | 
    
      | 1994 | transactional records | [a new Web] | 3rd Party Records Can be revealing | CALEA | 
    
      | 2003-> | Semantic Web | Terrorism/9-11 | ?? | ?? |