26
1 National Center For Justice And The Rule Of Law University of Mississippi School of Law Thomas K. Clancy Director www.NCJRL.org Legal Framework outside the box "inside the box, outside the box" The Box Outside the box three different legal frameworks 1. obtaining info that has no legal regulation 2. Fourth Amendment 3. statutory regulation investigating on the internet /networks

Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

1

National CenterFor Justice And The Rule Of Law

University of MississippiSchool of Law

Thomas K. ClancyDirector

www.NCJRL.org

Legal Framework outside the box

"inside the box, outside the box"

The Box

Outside the box

three different legal frameworks

1. obtaining info that has no legal regulation

2. Fourth Amendment

3. statutory regulation

investigating on the internet /networks

Page 2: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

2

ApplicabilityDoes the 4th Apply ?

part A: need gov't activity:

"Search" or "Seizure"

part B: that activity must intrude upon aprotected interest

this presentation is about Part B

non-consensual interception of communications, etc, over the Internet to another party

example: email

possible analogies:

its like a letter in the mail

its like numbers dialed on a telephone

its like any info possessed by third party

uncertain F/A applicability outside the box

statutory protections tend to supercede

Congress /states have enacted some statutory regulation of computer network investigations:

Stored Communications Act Wiretap Act Pen Register / Trap and Trace

Page 3: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

3

Traditional F/A doctrine

No F/A Protection from 3rd Party Disclosures to Gov't

Rationale: Risk Analysis -- Voluntary Exposure

misplaced belief to whom voluntarily confides will not reveal secret

Miller

such “risk” is “probably inherent in the conditions of human society"

Hoffa

vol. exposure to public eliminates F/A protectionKatz

voluntary disclosure

assume risk that third party will disclose information, item to gov't

Peer-to-Peer (P2P) Networks

file-sharing technology --- creates virtual networks

criminal activity:

Copyright Infringement

Computer Hacking Worms -- Viruses -- Theft of information

Child Exploitation and Pornography

Page 4: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

4

How Gnutella Works

each red dot: computer offering known CP video file -- 2 day period, July, 2009

Page 5: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

5

Considerations

User on Internet voluntarily

User decides, through settings in software, how much of computer open to others on Internet

Every download exact duplicate of original

Law Enforcement Response

search file sharing networks for known child porn images

Questions:

“Search” w/in meaning of 4th Amendment?

Does user connected to Internet via P2P have reasonable expectation of privacy in files in shared folders?

Operation Fairplay

Page 6: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

6

U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008)

"To argue that Ganoe lacked the technical savvy or good sense to configure Lime Wire to prevent access to his child pornography files is like saying that

he did not know enough to close his drapes."

no REP in P2P

connecting computer to local network

US v. King, 509 F.3d 1338 (11th Cir. 2007)

• connected own laptop in dorm room to military base network

• investigator located computer on network found porn file additional CP files

REP?

hard drive contents "akin to items stored in the unsecured areas of a multi-unit apartment building or put in dumpsteraccessible to the public"

same principles applied --- No F/A protection against

1. disclosure of subscriber info by ISPs

2. Email recovered from recipient

Commonwealth v. Proetto, 771 A.2d 823 (Pa. Sup. Ct. 2001)

3. Internet chat rooms

4. Posting Info on a Website

doctrines:

voluntary exposure

assumption of risk

Page 7: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

7

application of principles to --

1. Virtual worlds

2. cloud computing

3. web based datastorage

what are the relevant considerations?

virtual worlds

http://www.lively.com/html/landing.html

create own virtual spacechat and interact with your friendsin rooms you create

express yourselfcustomize your avatar and stream personal videos and photos

add your room to your siteInvite your friends to chat anddecorate

virtual worlds

Page 8: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

8

virtual Porn

rooms in virtual world

getting more cloudy !

Page 9: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

9

on line storage

City of Ontario v. Quon, 130 S. Ct. 2619 (2010):some answers?

cop sent text messages to wife, mistress via gov't issued pager

agency reviewed printouts obtained from provider to determine if needed more capacity for police business

issues:

1. Quon have REP in messages?

2. Wife / mistress have REP in messages?

3. Was search Reasonable ?

Page 10: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

10

Formal Written Policy

explicitly said user had no REP could audit, monitor, or log all activity not for personal use Quon aware of and signed

"Informal Policy"

Lt. Duke: you pay overages, will not audit

police pager policies

Quon: NO answers

"case touches issues of far reaching significance”

concern: "broad holding" on REP “might have implications for future cases that cannot be predicted"

Therefore:

1. assumed Quon / women had REP

2. search reasonable - did not even decide if Scalia or plurality approaches in O'Connor v. Ortego proper !

Reasonable as to Quon because ...

• had very "limited" REP

• legitimate gov't purpose for search

• scope of search reasonable

redacted transcripts -- on duty hours only 2 months examined rejected least intrusive means etc

Page 11: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

11

Reasonable as to the Women ?

Respondents:

If unreasonable as to Quon, also unreasonable as to correspondents

no argument unreasonable even if Quon s/reasonable

Court:

"In light of this litigating position," since search reasonable as to Quon, others lose

dicta on REP analysis -- some possible factors

Duke's statements change in policy?

did Duke have "fact or appearance" of authority to change / guarantee REP

should public/ private employees be treated differently

gov't had interests to review messages:• performance evaluations• litigation on lawfulness of police actions• comply w/ open records laws

Rapid changes in communication

many employers expect / tolerate personal use often increases worker efficiency

employer policies concerning communications shape REP, "especially" when "clearly communicated"

some state statutes require employers to notify when monitoring electronic communications

uncertain evolution of workplace norms / law's treatment

Page 12: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

12

Cell phone / text messaging pervasive -- hence:

one view:

"essential means or necessary instruments for self-expression, even self-identification"

another view:

due to ubiquity / affordability employees can buy own

Scalia, concurring

Applicability discussion “unnecessary” & “exaggerated”

rejects "implication" about electronic privacy that Ct should decide less than otherwise would –

The-times-they-are-a-changin' is a feeble excuse for disregard of duty.

courts/ litigants likely to use dicta as "heavy-handed hint about how they should proceed"

Standard unworkable:

"Any rule that requires evaluating whether a given gadget is a 'necessary instrument for self-expression, even self-identification,' on top of assessing the degree to which 'the law's treatment of workplace norms has evolved,' is (to put it mildly) unlikely to yield objective answers."

Page 13: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

13

Smiling Bob meets the 6th Circuit

Is email protected by the Fourth Amendment?

Warshak #1, 532 F.3d 521 (6th Cir. 2008) (en banc)

QUESTION not ripe:

privacy expectations

"may well shift over time"

“shifts from internet-service agreement to internet-service agreement"

requires knowledge about ever-evolving technologies

variety of internet-service agreements

Service providers ....

will "not ... read or disclose subscribers' e-mail to anyone except authorized users"

"will not intentionally monitor or disclose any private email message" but "reserves the right" to do so in some cases

reserves right "to pre-screen, refuse or move any Content that is available via the Service"

e-mails will be provided to government on request

other individuals will have access to email can use information

user has no REP in any communications

Page 14: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

14

U.S. v. Warshak (#2),631 F.3d 266 (6th Cir. 2010)

SCA subpoena on less than probable cause to get emails from ISP violates 4th Amend

(but got good faith reliance)

analogy to letters / phone calls ISP = post office / telephone company

subscriber agreement: limited access only to protect ISP

not holding: subscriber agreement will never be broad enough to snuff out REP .... if ISP intends to “audit, inspect, and monitor” emails, might be enough

AOL ServerTemporary Storage

Sender (AOL)

Recipient (gmail)

Where email can be read

google ServerTemporary Storage

wikipedia

Page 15: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

15

statutory regulation of obtaining digital evidence

Congress /states have enacted “gap fillers”

ECPA wiretap pen register / trap and trace

See outline in binder

AOL ServerTemporary Storage

Sender (AOL)

Recipient (google)

obtaining evidence

Gmail ServerTemporary Storage

AOL ServerTemporary Storage

Sender (AOL)

Recipient (google)

Gmail ServerTemporary Storage

Stored CommunicationsAct

Page 16: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

16

AOL ServerTemporary Storage

Sender

Recipient

Gmail ServerTemporary Storage

Search Warrant

Search Warrant

wiretap (content)

pen/trap(non content)

1. type of surveillance

real time vs. stored info

2. type of information is gov't seeking

content vs. non-content

significant statutory considerations

two types of Network surveillance

1. Real time: monitoring of communicationsin transit

2. stored records: retrospective surveillance

Statutory regulation depends on type of surveillance

Real time vs. stored surveillance

Page 17: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

17

type of information is gov't seeking

content:the communication itself

non-content:addressing information

NCJRL.org

Device that records numbers dialed by telephone

Smith v. MD, 442 U.S. 735 (1979): robber kept calling victim

Have no REP in numbers dialed1. doubted if any actual EP

2. No REP -- voluntarily conveyed info to 3rd party-- assumed risk of disclosure

pen registers

NCJRL.org

But what about automation?

"We are not inclined to hold that a different constitutional result is required because the telephone company decided to automate."

Page 18: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

18

obtaining non-content

Pen Registers: Outgoing

Trap & Trace: Incoming

Pen Register / Trap & Trace18 U.S.C. §§ 3121-3127

get “dialing, routing, addressing, or signaling information”

Not a search under 4th Amendment

U.S. v. Forrester, 512 F.3d 500 (9th Cir. 2008)

o to/from addresses

o IP addresses of websites visited

o volume of info to/from his account

Non-content Information

Dialing, routing, addressing, or signaling information

Basic customer or subscriber records

Transactional information

same definitions as in SCA

Page 19: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

19

Info in Real Time with Pen/Trap

“To”, “From”

IP address & port

For both source & destination

get most e-mail header information

But not

“Subject” line of e-mails

Content of downloaded file

Post-Cut Through Dialed Digits

numbers dialed after call initially set up

includes acct #s, pin numbers, ID #s, social security #, credit card #s

Content or Non-content?

In re Application, 515 F. Supp. 2d 325 (E.D.N.Y. 2007):

"functional equivalent of the human voice"

URLs (uniform resource locators)

Content or not?

www.biosupplies.com /mailorder /Anthrax.htm

path or "file path"host

In re application, 396 F. Supp. 2d 45 (D. Mass. 2005):same as post-cut through digit extraction

Page 20: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

20

Legal requirements for Pen / Traps

gov't can get order when 18 U.S.C. § 3123

1. authorized attorney applies under oath for order and

2. assert that “information likely to be obtained is relevant to an ongoing criminal investigation”

no independent judicial determination of 2In re application

pen /trap remedies

no exclusion in criminal cases See Forester

Criminal penalties for violations

Civil remedies for violations

Roy Olmstead

wiretapping --yesteryears

Page 21: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

21

structure of 4th Amendment analysis

IN EVERY CASE, ....

1. Does the 4th Apply?

A. Gov't activity: "Search" or "Seizure"

B. Protected interest: liberty, possession, privacy

2. Is it Satisfied?"Reasonable" Warrant Clause requirements

[3. Remedies?]

sole issue inOlmstead

OLMSTEAD: What Does F/A Protect ?

1. PROTECTS MATERIAL THINGS

• tangible obj: -- (ex) letter

• conversations not protected

2. LIMITED LIST OF TANGIBLES PROTECTED

• phone lines not on list

3. AGAINST PHYSICAL INVASIONS

• hearing not search or seizure

hearing

Katz 1967

excluding the uninvited ear

Page 22: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

22

Wiretapping today

statutory framework has largely superceded F/Aanalysis

Prohibits unauthorized government AND private party “real-time” interception of content

Requires suppression of illegally intercepted oral and “wire” communications

wiretapping

wiretap?

Page 23: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

23

Wiretap Act – “Title III”18 U.S.C. §§ 2510-2522

Regulates interception of content of communications in real time (not "stored")

Applies to everybody (not just gov’t actors)

Establishes floor:

state laws can be more restrictive, not less

Wiretap Orders requirements include:

need probable cause of specified felonies

less intrusive techniques “reasonably appear unlikely to succeed”

short time period (30 days)

minimization requirements: avoid communications not subject to order

wiretap remedies

statutory exclusion of evidence for

oral communications

wire communications

Criminal penalties for violations

Civil remedies for violations

types of Communications:

Oral -- in person recording of human voiceWire -- containing human voice“Electronic” -- others, including email

Page 24: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

24

Controls disclosure of stored data on networked computers of –

non content &

content of stored data & communications

Legal process varies, depending on information sought

Stored Communications Act (SCA) (18 U.S.C. §§ 2701-2712)

Compelled Production –types of process under SCA

Subpoenas

Subpoenas with notice

"d" orders [§ 2703(d)]

"d" orders w/notice

Search warrants

applies to public andnonpublic providers

more process = more info

Compelled Production – subpoenas

Subpoenas: get basic subscriber info

name and address session records (time, duration)

telephone number

length of service, including starting date types of services used dynamic IP addresses connection and session logs means of payment (credit card, bank account numbers)

no prior notice tosubscriber needed

Page 25: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

25

Compelled Production – subpoenas with notice to subscriber

get contents in Electronic Storage more than 180 days contents in RCS, including open emails all info could have got w/ mere subpoena

exception: 9th Circuitneed warrant for opened email

Theofel v. Farey-Jones

Compelled Production – "d" orders

"d" orders [§ 2703(d)]: get account logs, transactional records

all info could have got w/ lesser process Historical data involving past activity on account E-mail addresses of correspondents Web sites visited Cell-site data for cellular phone calls buddy lists

Must show: specific and articulable facts that info sought is

relevant and material to ongoing criminal investigation

Compelled Production –"d" orders w/ notice

all info could have got w/ lesser process

Contents in RCS storage (including opened email) Contents in electronic storage more than 180 days

Must show:

specific and articulable facts that info sought is relevant and material to ongoing criminal investigation

Page 26: Legal Framework outside the box - University of Mississippi 25-26-11 MSU Judges/Ta… · 6 U.S. v. Ganoe, 538 F.3d 1117 (9th Cir. 2008) "To argue that Ganoe lacked the technical savvy

26

Compelling Content Production: warrants

Search Warrant: gets everything !

may always be needed when content sought

safer course: Get warrant for any content

SCA remedies

No exclusion of evidence

Criminal penalties for violations

Civil remedies for violations