954 lines
58 KiB
Plaintext
954 lines
58 KiB
Plaintext
########## |
|
|
########## |
|
|
### | THE DOCUMENT CASE
|
|
####### |
|
|
####### | A collection of briefs, judgments
|
|
### | white papers, rulings, and references of
|
|
########## | moment to the issues of law and order on
|
|
########## | The Electronic Frontier
|
|
|
|
|
########## |
|
|
########## |
|
|
### | Document #: 3
|
|
####### | Title: Constitutional, legal, and ethical
|
|
####### | considerations for dealing with electronic
|
|
### | files in the age of cyberspace
|
|
### | Archived/Published to the Net: August 7, 1991
|
|
### |
|
|
|
|
|
########## |
|
|
########## | Anonymous ftp archive maintained by
|
|
### | Mike Godwin and Chris Davis at
|
|
####### | The Electronic Frontier Foundation (eff.org)
|
|
####### |
|
|
### | These documents are in the DOCS subdirectory
|
|
### | of the ftp directory. Related files may be
|
|
### | found in the EFF and SJG subdirectories.
|
|
|
|
|
|
|
|
FEDERAL ENFORCEMENT 1991
|
|
Georgetown University Law Center
|
|
Washington, D.C.
|
|
May 16-17, 1991
|
|
|
|
CONSTITUTIONAL, LEGAL, AND ETHICAL
|
|
CONSIDERATIONS FOR DEALING
|
|
WITH ELECTRONIC FILES IN THE AGE OF CYBERSPACE
|
|
|
|
Harvey A. Silverglate and Thomas C. Viles (FN1)
|
|
|
|
|
|
Introduction -- The Reach of
|
|
Cybernetic Technology.
|
|
|
|
Without pause over the past decade, computers have transformed the
|
|
physical organization of work in virtually every office in the nation.
|
|
Businesses and law firms are spurning the use of paper to deliver and
|
|
store information; instead, they have become dependent upon the use of
|
|
computers and electronic systems for these functions. Now it is common to
|
|
draft, revise, and edit all documents -- from briefs, to business
|
|
proposals, to contracts -- without ever generating a paper "hard" copy
|
|
until the document is ready for signature and submission.
|
|
Furthermore, now it is possible for the personnel of a company or
|
|
law firm to conduct all of their in-house discussions on a computer
|
|
network which transmits and receives electronic mail ("e-mail"). E-mail
|
|
can be used for written messages of great import as well as trivial asides
|
|
and gossip. All such messages can be stored for later retrieval. Using
|
|
networks and e-mail in tandem, teams of people in different offices can
|
|
create, edit and complete lengthy written projects, literally without ever
|
|
speaking to each other, or ever looking at paper copy.
|
|
Communications between the office workplace and the outside world
|
|
also can be conducted through the use of "networks" of computer systems.
|
|
For example, the home office of a company can communicate with all of its
|
|
affiliates and subsidiaries by the transmission of written messages
|
|
between their respective computers ("nodes", in computer argot). In this
|
|
way, all operations which can be performed simultaneously within one
|
|
office, can be performed with equal facility among many offices, linked by
|
|
the computer networks. Such systems also enable the attorney to stay in
|
|
close contact with a client when it is necessary to work together on a
|
|
project which requires close attention to detail.
|
|
Computers and computer networks also promise to substantially and
|
|
rapidly transform civil society. There exists a variety of computer
|
|
networks, which enable academic institutions and scholars, to conduct
|
|
global conferences on matters of common interest. Through e-mail and
|
|
electronic bulletin boards, scholars and researchers can share
|
|
experimental data and resources. See "Common Electronic Policy," The
|
|
Economist, Feb. 16, 1991, at 24. Recently, the volume of academic message
|
|
traffic in the United States has been increasing by 30-40% per month. Id.
|
|
This session of Congress is considering a bill, introduced by Sen. Albert
|
|
Gore, to spend over $1 billion in computer research, of which $400 million
|
|
would be dedicated to the construction of a new National Research and
|
|
Education Network (NREN), capable of handling computer traffic many times
|
|
faster than the networks currently in existence -- analogous to a new
|
|
electronic interstate highway system. See id.; Leccese, "Hackers under
|
|
Attack: Crackdown Raises Questions about New Forms of Speech," Boston
|
|
Phoenix, Sept. 7, 1990, at 8, 18. It is estimated that the entire project
|
|
will cost $200 billion to complete. Leccese, supra, at 22.
|
|
There also are smaller networks, too numerous to mention, which
|
|
are not affiliated with any company, university, government agency, or
|
|
other established entity. These independent networks function as forums
|
|
for people all over the world to communicate with one another about
|
|
matters of interest, from the sublime to the ridiculous. The largest
|
|
computer networks in the United States, InterNet and UseNet, are each
|
|
actually made up of 2,000 smaller networks. See, e.g., "Common Electronic
|
|
Policy," supra, at 24; Costikyan, "Closing the Net," Reason, Jan. 1991, at
|
|
22. InterNet reportedly carries the electromagnetic impulses created by
|
|
over 500 billion keystrokes per month. Leccese, supra, at 9.
|
|
Approximately 5,000 bulletin boards operate over the networks. Costikyan,
|
|
supra, at 22.
|
|
One notable example of the use of computer networks for purely
|
|
expressive purposes is the Whole Earth 'Lectronic Link ("WELL"), which
|
|
provides political activists, small businessmen, rock and roll fans, and
|
|
hundreds of other groupings of people (including lawyers) a forum in which
|
|
to discuss matters of common interest. The WELL is a "node" capable of
|
|
running hundreds of different multi-party conversations (or "conferences")
|
|
simultaneously. Like an electronic town meeting, groups of people can
|
|
communicate together on a multiplicity of bulletin boards, or users can
|
|
send each other private messages by e-mail. (FN2)
|
|
Other networks, utilizing more modest equipment, can maintain only
|
|
one or two bulletin boards at a time. Everyone with a personal computer
|
|
and access to a phoneline can participate in any of these open networks --
|
|
and, with only a little extra equipment, can start a new bulletin board.
|
|
|
|
Searches and Seizures
|
|
Involving Cybernetic Machines.
|
|
|
|
Over the past 15 months, the following incidents have come to our
|
|
attention:
|
|
*On January 24, 1990, a handful of Secret Service agents,
|
|
accompanied by two employees of the local telephone company, seized the
|
|
equipment of a twenty year old man living with his mother in New York.
|
|
From his bedroom, they seized a Commodore 128 computer, 200 floppy disks,
|
|
a telephone answering machine, cassette-playing radio, and all of his
|
|
musical cassette tapes. Apparently, the Secret Service was searching for
|
|
evidence of alleged "computer crimes." See Dibbell, "On Line and Out of
|
|
Bounds", Village Voice, July 24, 1990, at 27; Jahnke, "The Cops Come to
|
|
Cyberspace," Boston Magazine, November 1990, at 140; J. Barlow, Crime and
|
|
Puzzlement 8P9 (1990) According to some reports, this raid (and a few
|
|
other raids which were carried out simultaneously) marked the beginning of
|
|
the so-called "Operation Sun Devil," described as a "two-year Secret
|
|
Service investigation which involved 150 federal agents, numerous local
|
|
and state law enforcement agencies, and the combined security resources"
|
|
of numerous private telecommunications companies.(FN3) Barlow, supra, at
|
|
9; see also "Crime of the Century," Personal Computer World, Mar. 1991, at
|
|
187; Zachary, "Group to Defend Civil Rights of Hackers Founded by Computer
|
|
Industry Pioneer," Wall Street Journal, July 11, 1990, at B4; Schatz,
|
|
"Foundation to Defend PC Users," Washington Post, July 11, 1990, at B8;
|
|
Edelman, "Kapor for the Defense in Computer Field," Boston Globe, July 11,
|
|
1990, at 33; "Kapor Forms Group to Aid Hackers," USA Today, July 11, 1990,
|
|
at 2B.
|
|
*On March 1, 1990 the Secret Service raided the offices of Steve
|
|
Jackson Games, a small Austin start-up company which designed and
|
|
manufactured fantasy role-playing books and games. The Secret Service
|
|
seized the company's three computer systems, two laser printers,
|
|
miscellaneous hardware, papers, back-up disks, and a single pocket
|
|
calculator. The company's plans and galleys for a new role-playing game,
|
|
GURPS Cyberpunk(FN4), also were seized, after an agent opined that the
|
|
game was a handbook for computer crime. (The format of Steve Jackson's
|
|
games is similar to that of "Dungeons and Dragons"; GURPS Cyberpunk
|
|
consists of a lengthy instruction book plus general information about the
|
|
game. In fact, all of the company's games consist solely of printed
|
|
matter. The company was not in the business of manufacturing any
|
|
software.) The Secret Service apparently suspected that an employee of
|
|
Steve Jackson Games had participated in unlawful activity on the
|
|
employee's own home computer system. At no time was the owner or any
|
|
other employee of Steve Jackson Games considered a suspect. Because the
|
|
seizure of the computers thoroughly disrupted Steve Jackson's business,
|
|
half of the company's employees had to be laid off. It was months before
|
|
the company was even able to gain access to its equipment, which held the
|
|
manuscript for the about-to-be-published GURPS Cyberpunk game. Some of
|
|
the seized equipment ran a bulletin board which was maintained for the
|
|
purpose of swapping new role-playing game ideas with similarly interested
|
|
people elsewhere in the United States. The board, which users gave the
|
|
tongue-in-cheek title of "The Illuminati," ceased to operate. See Levy,
|
|
"Search and Destroy: What Happened when the Secret Service Visited Steve
|
|
Jackson Games," MacWorld, March 1991, at 51, 52; Costikyan, "Closing the
|
|
Net," Reason, Jan. 1991, at 22P24; Lewis, "Can Invaders Be Stopped but
|
|
Civil Liberties Upheld?," New York Times, Sept. 9, 1990, at 12; Zachary,
|
|
supra, at B4; O'Connor, "$275,000 Donated for Hackers," San Jose Mercury
|
|
News, July 11, 1990, at 1F; "Computer Foundation Planned," San Francisco
|
|
Chronicle, July 11, 1990, at C4; Edelman, supra, at 39; "Kapor Forms Group
|
|
to Aid Hackers," supra, at 2B.
|
|
*On the day of the Steve Jackson Games raid, the employee's home
|
|
was searched. His computer equipment, software, a quantity of TV cable
|
|
wire, and telephone parts were seized and carted away. Also seized was an
|
|
arcade version of Pac Man. To date, the employee has not been charged
|
|
with any crime. See Lewis, supra, at 12; Dibbell, supra, at 30.
|
|
*Two years ago, a computer hobbyist running a small bulletin board
|
|
service out of Lockport, Illinois, discovered that his bulletin board had
|
|
been used to transmit a telephone company document. He promptly notified
|
|
the telephone company, and cooperated fully and voluntarily with law
|
|
enforcement authorities in the investigation of what he had reported. He
|
|
probably regrets that now, for the Secret Service agents, armed with a
|
|
warrant, later seized all of the man's computer equipment, in order to
|
|
secure evidence in their investigation of the transfer of telephone codes.
|
|
Because of the seizure, his bulletin board was shut down. See, e.g.,
|
|
Costikyan, supra, at 24; Leccese, supra, at 21; Goldstein, Special Issue,
|
|
"2600 magazine's commentary on Operation Sun Devil," 1 Computer
|
|
Underground Digest #1.10 (May 17, 1990) (available on the WELL, April 12,
|
|
1991); J. Barlow, supra, at 11-12.
|
|
*A college student in Missouri published a computer magazine
|
|
entitled Phrack, which he distributed over the networks to about 1,300
|
|
people. He found a phone company document on a publicly accessible
|
|
computer bulletin board, and he reprinted it in his magazine. Although
|
|
the government never alleged that he was involved in taking the document,
|
|
his computer system was seized, and he was charged with interstate
|
|
transportation of stolen property. The computer seizure, ostensibly
|
|
occasioned by his republication of a stolen document, effectively
|
|
restrained him from publishing any more issues of Phrack.(FN5) Charges
|
|
against the young man later were quietly dropped, when it was discovered
|
|
that the "stolen property" -- the phone company document -- was available
|
|
from the phone company itself, and that it cost somewhat less that $20.
|
|
But the entire episode must have dampened his zeal to publish, for the
|
|
magazine no longer appears. See "Crime of the Century," supra, at 188;
|
|
Costikyan, supra, at 23-25; Levy, supra, at 52, 54; "United States v.
|
|
Zod," The Economist, Sept. 7, 1990, at 23; Leccese, supra, at 20; J.
|
|
Barlow, supra, at 10-11; Zachary, supra, at B4; Edelman, supra, at 39;
|
|
"Kapor Forms Group to Aid Hackers," supra, at 2B; "Computer Foundation
|
|
Planned," supra, at C4; O'Connor, supra, at 8F; Markoff, "U.S. Drops
|
|
Computer Case against Student," New York Times, July 28, 1990, at 9.
|
|
*On May 8, 1990(FN6), as part of "Operation Sun Devil," another
|
|
bulletin board, called "RIPCO," was raided. All of the equipment
|
|
necessary to run the bulletin board was seized. The RIPCO board had
|
|
operated since 1983, and it had accumulated extensive text files which
|
|
were accessible to its 600 users. No arrests were made, nor have any
|
|
charges been filed against the operators. But the board was shut down.
|
|
See, e.g., Thomas & Meyer, "Update on Ripco BBS and Dr. Ripco," 1 Computer
|
|
Underground Digest, #1.26, (Aug. 2, 1990) (available on the WELL, Apr. 12,
|
|
1991).
|
|
*Also frequent are instances where computers are seized incident
|
|
to an unrelated arrest. For example, on February 28, 1991, following an
|
|
arrest on charges of rape and battery, the Massachusetts state and local
|
|
police seized the suspect's computer equipment. The suspect reportedly
|
|
operated a 650-subscriber bulletin board called "BEN," which is described
|
|
as "geared largely to a gay/leather/S&M crowd." It is not clear what the
|
|
board's seizure is supposed to have accomplished, but the board is now
|
|
shut down, and the identities and messages of its users are in the hands
|
|
of the police. See Boyce, "Police Confiscate SM Files," Gay Community
|
|
News, Mar. 11-17, 1991, at 3.(FN7)
|
|
|
|
The Gulf between Law Enforcement
|
|
Procedure and the Constitution.
|
|
|
|
This small sampling of cases demonstrates the unequivocal
|
|
determination of the government to conduct investigative seizures of
|
|
entire computer systems, even when only a few files may be relevant to an
|
|
investigation or prosecution. Such seizures can have immediate and
|
|
catastrophic effects on computer users who have no connection to the
|
|
conduct being investigated. Offices cease to function; businesses can no
|
|
longer operate or service customers; bulletin boards and other forums are
|
|
shut down. As discussed below, it is no exaggeration to compare such
|
|
searches and seizures to the writs of assistance and general warrants
|
|
which the Constitution's framers found so odious, and which the Fourth
|
|
Amendment was designed to prevent.
|
|
Law enforcement agencies explain this practice by referring to
|
|
problems inherent in searching not only computers but any other storage
|
|
system: The searching officers cannot know precisely which part of the
|
|
system contains the data they seek. Furthermore, with the right sort of
|
|
elegant technology, computer files can be deleted at the push of a button.
|
|
According to this view, prudence suggests that the computer search will
|
|
be futile, unless the entire system is seized and removed, so that the
|
|
contents can be examined at leisure.
|
|
That means, of course, the government's leisure, not the user's.
|
|
It is cold comfort that the Fourth Amendment tolerates searches of the
|
|
property of people not suspected of criminal conduct, and that it even
|
|
permits searches in entirely noncriminal contexts.(FN8) People who are
|
|
the victims of such a seizure are naturally outraged. Where the object of
|
|
the seizure is a bulletin board, potentially thousands of users are
|
|
deprived of a forum in which to communicate, and their words (recorded in
|
|
the computer system housing the bulletin board) now are open to government
|
|
scrutiny. The seizure of a small business's computer system, especially
|
|
one involved in sales or research and development, effectively destroys
|
|
the business. In larger companies, when the investigation into the
|
|
operations of one department or subsidiary leads to a computer seizure,
|
|
the operations of the entire company can be crippled or frozen. And, of
|
|
course, the seizure of one or two pieces of computer equipment in a law
|
|
office effectively can constitute the seizure of all of the office's
|
|
client and billing files.
|
|
The practice of conducting these searches and seizures represents
|
|
the immense gulf that exists between law enforcement personnel and
|
|
magistrates, on the one hand, and sophisticated computer users, on the
|
|
other. As Mitchell Kapor and Michael Godwin point out in "Civil Liberties
|
|
Implications of Computer Searches and Seizures: Some Proposed Guidelines
|
|
for Magistrates who Issue Search Warrants," law enforcement personnel who
|
|
conduct computer seizures seem to focus exclusively on what *could* go
|
|
wrong in a computer-related situation.(FN9) The appropriate question
|
|
under the Fourth Amendment, which every magistrate should ask before
|
|
issuing a warrant, is not what could go wrong, but instead for what
|
|
adverse events probable cause has been shown.
|
|
|
|
It may be useful for prosecutors to know that "the data in the storage
|
|
device or media can be erased, replaced with other data, hidden,
|
|
encrypted, modified, misnamed, misrepresented, physically destroyed, or
|
|
otherwise made unusable." But this does not mean that the magistrate
|
|
should always find probable cause to believe that a particular computer
|
|
owner or operator has done so, and then authorize a highly intrusive and
|
|
disruptive seizure of a BBS [computer bulletin board system] so that
|
|
investigators can do a low-level search for hidden or encrypted data.
|
|
|
|
Reprinted in Proceedings: Fourth Annual Virus & Security Conference 426,
|
|
428 (1991), quoting D. Parker, Computer Crime: Criminal Justice Resource
|
|
Manual, at 68 (1989). What seems to have happened is that prosecutors and
|
|
law enforcement agents, in their zeal to avoid even the possibility that
|
|
evidence might be lost, have gone overboard and undertaken general
|
|
searches. As noted, the seizure of an entire computer system is
|
|
equivalent to seizing all of a person's hard copy files, or (in the case
|
|
of a bulletin board system or desktop publisher) seizing an entire
|
|
printing press.
|
|
|
|
Writs of Assistance, General Searches,
|
|
and the Fourth Amendment.
|
|
|
|
Even people of the so-called "framer's intent" school of
|
|
constitutional interpretation must concede that such seizures go too far.
|
|
"The use by government of the power of search and seizure as an adjunct to
|
|
a system for the suppression of objectionable publications is not new."
|
|
Marcus v. Search Warrant, 367 U.S. 717, 724 (1961). The Writs of
|
|
Assistance, which the British Crown issued to authorize searches for, and
|
|
seizures of, unlicensed publications, were an abomination to the American
|
|
colonists. See generally Stanford v. Texas, 379 U.S. 476, 481-82 (1965).
|
|
James Otis described the general search warrants used to enforce as "the
|
|
worst instrument of arbitrary power, the most destructive of English
|
|
liberty, and the fundamental principles of law, that ever was found in an
|
|
English law book." Id. at 481, citing Boyd v. United States, 116 U.S.
|
|
616, 625 (1886). The Writs authorized the search of anyone connected with
|
|
an unlawful or unlicensed publication, and the seizure of all of the
|
|
papers and documents of such people.
|
|
The Fourth Amendment has roots in the cases of Wilkes v. Wood, 19
|
|
How. St. Tr. 1153 (1763), and Entick v. Carrington, 19 How. St. Tr. 1029
|
|
(1765), in which free-thinking pamphleteers were arrested, and all of
|
|
their books and papers seized, because of their alleged publication of
|
|
seditious libels. The Wilkes case ended in liberty's favor, when the
|
|
Court of Common Pleas ordered the Secretary of State to pay Wilkes
|
|
damages. The Entick case resulted in Lord Camden's declaration that the
|
|
power to issue Writs of Assistance, and to conduct general searches, was
|
|
an unlawful offense to civilized notions of justice. In Lord Camden's
|
|
words,
|
|
|
|
this power so assumed by the Secretary of State is an execution upon all
|
|
of the party's papers, in the first instance. His house is rifled; his
|
|
most valuable secrets are taken out of his possession, before the paper
|
|
for which he is charged is found to be criminal by any competent
|
|
jurisdiction, and before he is convicted either of writing, publishing, or
|
|
being concerned in the paper.
|
|
|
|
19 How. St. Tr. at 1064, quoted in Stanford, supra, 379 U.S. 484.
|
|
Parliament later acted legislatively to declare general warrants to be
|
|
unlawful. Stanford, supra, 379 U.S. at 484, citing 16 Hansard's
|
|
Parliamentary History of England, at 207.
|
|
The Fourth Amendment was adopted a generation after Wilkes and
|
|
Entick, while the memory of the Crown's unrestrained searches of colonial
|
|
businesses for statutory violations was fresh. The amendment provides
|
|
that all warrants shall "particularly describ[e] the place to be searched,
|
|
and the ... things to be seized." In view of the Fourth Amendment's
|
|
history, and its explicit language, it is beyond serious dispute that the
|
|
Constitution prohibits wide-ranging exploratory searches. Neither can the
|
|
police rummage through a person's belongings sua sponte, nor can a
|
|
magistrate issue a warrant permitting a general and unlimited search.
|
|
E.g., Steagald v. United States, 451 U.S. 204, 220 (1980); Lo-Ji Sales,
|
|
Inc. v. New York, 442 U.S. 319, 325-26 (1979); see also Marshall v.
|
|
Barlow's, Inc., 436 U.S. 307, 312-13 (1978); Roaden v. Kentucky, 413 U.S.
|
|
496 (1973); Coolidge v. New Hampshire, 403 U.S. 443, 467 (1971)("[T]he
|
|
specific evil is the 'general warrant' abhorred by the colonists, and the
|
|
problem is not that of an intrusion per se, but of a general, explanatory
|
|
rummaging in a person's belongings."); Stanford, supra, 379 U.S. at
|
|
485-86; Marcus, supra, 367 U.S. at 728-29. Instead, the Fourth Amendment
|
|
plainly directs that a search shall be lawful only when it is directed to
|
|
particular items for which probable cause is demonstrable.
|
|
The courts recognize that the First and Fourth Amendments grew
|
|
from the same historical source, for the struggle for press freedom was
|
|
energized by the struggle against the license to print, and against the
|
|
prior restraints imposed by the Crown to enforce the license. In the
|
|
Supreme Court's words,
|
|
The struggle for the freedom of the press was primarily directed against
|
|
the power of the licensor ... And the liberty of the press became
|
|
initially a right to publish "without a license what formerly could be
|
|
published only with one." While this freedom from previous restraint upon
|
|
publication cannot be regarded as exhausting the guaranty of liberty, the
|
|
prevention of that restraint was a leading purpose in the adoption of that
|
|
constitutional provision.
|
|
|
|
Lovell v. City of Griffin, 303 U.S. 444, 452 (1938). The Supreme Court
|
|
commands that special care be taken when authorizing or reviewing a search
|
|
involving any entity engaged in the publication or dissemination of ideas.
|
|
|
|
"Freedom of the press" long has been interpreted broadly to
|
|
protect not only newspapers publishers and pamphleteers, e.g., Lovell,
|
|
supra, 303 U.S. at 452, but also motion pictures, Roaden, supra, 413 U.S.
|
|
496; Joseph Burstyn, Inc. v. Wilson, 343 U.S. 495, 502 (1952); United
|
|
States v. Paramount Pictures, Inc., 334 U.S. 131, 166 (1948), and even
|
|
computer bulletin boards, Legi-Tech v. Keiper, 766 F.2d 728, 734-35 (2d
|
|
Cir. 1985), from prior restraints and general searches. In order to avoid
|
|
prior restraints on speech, the particularity requirement of the Fourth
|
|
Amendment "is to be accorded the most scrupulous exactitude when the
|
|
`things [to be seized]' are books, and the basis for their seizure is the
|
|
ideas which they contain." Stanford, supra, 379 U.S.at 485, citing
|
|
Marcus, supra, 367 U.S. 717; A Quantity of Copies of Books v. Kansas, 378
|
|
U.S. 205 (1964).
|
|
|
|
The Need for Heightened Awareness
|
|
and New Limiting Rules.
|
|
|
|
The seizure of a computer's hard drive is the functional
|
|
equivalent of the seizure of all of the files in a small to medium size
|
|
law office, or all of the records of a small to medium size business.
|
|
After the seizure is accomplished, law enforcement personnel are able to
|
|
read virtually every word that had been printed in an attorney's files, or
|
|
to control the continued life of a business. It is critical that rules
|
|
and protocols be developed so that the scope of computer searches and
|
|
seizures are minimized.
|
|
Law enforcement professionals and attorneys must begin to realize
|
|
that just because it is convenient to seize a computer system (because the
|
|
system can consist of no more than a half dozen pieces of equipment), it
|
|
is not necessarily constitutional. Such seizures are tantamount to the
|
|
general searches and seizures which were generally regarded as the patent
|
|
abuses of tyranny when the Constitution was drafted.
|
|
Judges and magistrates who issue computer search warrants must
|
|
become more sensitive to the constitutional problems posed by authorizing
|
|
the seizure of entire computer systems. Because such warrants are
|
|
tantamount to the Writs of Assistance (which even the English courts under
|
|
George III condemned a generation before the United States Constitution
|
|
was adopted) the courts should be especially aware not only of Fourth
|
|
Amendment interests, but also of the First Amendment interests, when a
|
|
bulletin board or network equipment is seized. The Constitution imposes
|
|
"special restraints upon searches for and seizures of material arguably
|
|
protected by the First Amendment." Lo-Ji Sales, supra, 442 U.S. at 326
|
|
n.5.(FN10)
|
|
We all need to think more critically when dealing with the notion
|
|
that, unless entire computer systems are seized, electronic data will be
|
|
altered or destroyed. Magistrates should also require that parties
|
|
seeking a warrant similarly should demonstrate the probability that the
|
|
owner of the system is capable and willing to obliterate data within the
|
|
system during the short interval between presentation of the warrant and
|
|
commencement of the search.
|
|
To seize an entire computer system for the sake of a couple of
|
|
documents contained therein is inefficient, overly intrusive, and
|
|
potentially disastrous for the owner of the system. A better course would
|
|
be to have agents sophisticated in the use of computer equipment search
|
|
the system on-site, and to copy onto a disk the documents which motivated
|
|
the application for a warrant in the first place. Before authorizing the
|
|
seizure of entire computer systems, magistrates should require that the
|
|
applicant demonstrate probable cause for the belief that the entire system
|
|
is either completely dedicated to illegal activity, or permeated with
|
|
evidence of unlawful conduct. Wherever possible, the warrant should
|
|
authorize the seizure only of the relevant documents; if the documents
|
|
cannot be identified, then just the disks or tapes containing the relevant
|
|
documents should be taken. Too often there have been cases where a
|
|
computer operator's entire collection of disks has been seized. There is
|
|
no difference between this and ransacking a library.
|
|
Law enforcement professionals and magistrates also should be aware
|
|
of the fact that, where there are no disks, and the document to be seized
|
|
is likely to be found in the computer's central data storage (or "hard
|
|
disk"), the document easily can be copied onto a portable (or "floppy")
|
|
disk. The need to show authenticity should not justify the seizure of a
|
|
computer when disk or tape copies can be made. A document thus retrieved
|
|
still would be admissible evidence under Rule 1001(1), which defines
|
|
"writings" and "recordings" broadly to include "letters, words, or
|
|
numbers, or theirequivalent, set down by . . . magnetic impulse,
|
|
mechanical or electronic recording, or other form of data
|
|
compilation."(FN11)
|
|
It is technologically possible that a computer system is rigged
|
|
with a "booby trap or degausser," which is designed to obliterate data in
|
|
a computer when there has been unauthorized tampering. This possibility
|
|
can be invoked to justify all sorts of Fourth Amendment mischief,
|
|
including wholesale seizure and "no-knock" warrants. In fact, it is
|
|
highly unlikely that a computer system would be fitted with a such booby
|
|
trap, and this factor should not be regarded as common, but as highly
|
|
exceptional as the "Mission: Impossible" tape which self-destructs in five
|
|
seconds. When an officer posits a potential booby trap to justify a
|
|
highly intrusive and disruptive search and seizure, the courts should be
|
|
prepared to impose a heavy burden of proof on law enforcement officials
|
|
who claim that such devices are in place; law enforcement officials should
|
|
be prepared to meet such a burden.
|
|
It is worth noting, however, that in certain situations the
|
|
computer system itself is the means or instrumentality of a crime. Using
|
|
a network, software can be stolen, funds can be embezzled, and various
|
|
wire frauds can occur. See, e.g., J. McEwen, Dedicated Computer Crime
|
|
Units 1-5 (National Institute of Justice, 1989). But it is critical that
|
|
magistrates and law enforcement officials distinguish investigations where
|
|
the computer itself has been used to commit a crime, and where the
|
|
computer system merely is a channel of communication, like a telephone.
|
|
To seize a computer, because information related to a crime was merely
|
|
communicated through it, is tantamount to seizing telephones because two
|
|
co-conspirators spoke to each other over it. Proof of the crime can be
|
|
gotten by less intrusive means, and innocent third parties still may need
|
|
to use those telephones.
|
|
|
|
Law Enforcement and the
|
|
Particularity Requirement.
|
|
|
|
It is well established that search warrants should leave nothing
|
|
to the discretion of the executing officer; indiscriminate searches are
|
|
constitutionally intolerable. Indeed, any search warrant which authorizes
|
|
the search and seizure of items beyond those for which probable cause has
|
|
been demonstrated, is constitutionally defective. See, e.g., Lo-Ji Sales,
|
|
supra, 442 U.S. 319; Voss v. Bergsgaard, 774 F.2d 402, 404-05 (10th Cir.
|
|
1985)(warrant invalid where most of it authorized rummaging through files
|
|
and records for evidence pertaining to any federal crime, under the guise
|
|
of a criminal conspiracy investigation). It therefore is troubling that
|
|
law enforcement officers have so frequently resorted to the general
|
|
seizures of computer systems, which contain a myriad of different files,
|
|
when only particular files or categories of files are relevant. Even more
|
|
disturbing is the apparent insouciance with which some law enforcement
|
|
officers regard the seizure of entire systems of computer equipment; to
|
|
some officers, the particularity clause of the Fourth Amendment is not
|
|
even relevant. Illustrative is this statement by a Special Agent at the
|
|
FBI Academy:
|
|
|
|
[The Fourth Amendment "particularity"] provision requires that a warrant
|
|
authorize only a search of a specific place for specific named items.
|
|
Coupled with the probable cause requirement, this provision prevents
|
|
general searches by insuring that the warrant describes a discreet,
|
|
defined place to be searched, describes only items connected with criminal
|
|
activity for which probable cause has been established, and describes the
|
|
items so definitely that it removes from an officer executing the warrant
|
|
the discretion of determining which items are covered by the warrant and
|
|
which are not. It also provides a signal of when a search is at an end,
|
|
that is, when all items named in the warrant have been located and seized
|
|
or when all possible hiding places for items not located have been
|
|
explored. Since the "place to be searched" portion of the particularity
|
|
requirement has no special impact on computer searches, it will not be
|
|
discussed.
|
|
|
|
Sauls, "Raiding the Computer Room: Fourth Amendment Considerations (Part
|
|
I), 55 FBI Law Enforcement Bulletin 25, 29 (May 1986) (emphasis added).
|
|
Similarly, another Department of Justice publication sets forth, with
|
|
apparent approval, the following wide-ranging language in a "sample"
|
|
search warrant:
|
|
In the county of Baltimore, there is now property subject to seizure, as
|
|
such computers, keyboards, central processing units, external and/or
|
|
internal drives, internal and/or external storage devices such as magnetic
|
|
tapes and/or disks, terminals and/or video display unit and/or receiving
|
|
devices and peripheral equipment such as, but not limited to, printers,
|
|
automatic dialers, modems, acoustic couplers, and or [sic] direct line
|
|
couplers, peripheral interface boards and connecting cables or ribbons,
|
|
diaries, logs, and other records, correspondence, journals, ledgers
|
|
memoranda [sic], computer software, programs and source documentation,
|
|
computer logs, magnetic audio tapes and recorders used in the obtaining,
|
|
maintenance, and or [sic] dissemination of information obtained from the
|
|
official files and computers of the [sic] MCI Telecommunications, Inc. and
|
|
other evidence of the offense.
|
|
|
|
See, C. Connolly, Organizing for Computer Crime Investigation and
|
|
Prosecution at 81 (National Institute of Justice, 1989).
|
|
When computers are the object of the search, we see again the zeal
|
|
of the special investigating judges in the Court of High Commission under
|
|
King James I -- whose mission was "to inquire and search for . . . all
|
|
heretical, schismatical and seditious books, libels, and writings, and all
|
|
other books, pamphlets and portraitures offensive to the state or set
|
|
forth without sufficient and lawful authority in that behalf . . . and
|
|
their printing-presses themselves likewise to seize and so to order and
|
|
dispose of them . . . as they may not have to serve or be employed for any
|
|
such lawful use," Marcus, supra, 367 U.S. at 725-26, citing Pat. Roll, 9,
|
|
Jac. I, Pt. 18 & Jac. II, Pt. 15. The electronic bulletin board
|
|
appropriately should be viewed not as a weapon or burglary tool, but
|
|
instead as a First Amendment-protected institution, like the newspaper or
|
|
any public forum.(FN12) See generally, Jensen, An Electronic Soap
|
|
Box:Computer Bulletin Boards and the First Amendment, 39
|
|
Fed.Communications L.J. 217, 235P43, and authorities cited therein.
|
|
In all cases, consideration should be given to training
|
|
technologically sophisticated law enforcement officers, and having them
|
|
available to execute the computer searches. Furthermore, magistrates
|
|
should consider appointing similarly knowledgeable special masters to
|
|
supervise such searches. Such roles can be assumed by people who, though
|
|
technically literate, are not officers of the court or law enforcement
|
|
agency. See, e.g., Forro Precision, Inc. v. International Business
|
|
Machines Corp., 673 F.2d 1045, 1054 (9th Cir. 1982)(police search assisted
|
|
by IBM employee because warrants required that specific technical
|
|
documents be identified); see also, DeMassa v. Nunez, 747 F.2d 1283, 1285
|
|
(9th Cir. 1984)(court-appointed special master supervised search of law
|
|
office files, permitted seizure only of documents within scope of
|
|
warrant). Of course, the court should clearly explain to any appointed
|
|
special master the proper limits of the master's role in the search. See,
|
|
e.g., Lo-Ji Sales, supra, 442 U.S. at 321-24.
|
|
|
|
Privacy Rights of Third Parties
|
|
and Statutory Provisions.
|
|
|
|
In addition to the Constitution's basic guarantees, Congress and
|
|
various state legislatures have enacted additional privacy protections for
|
|
people who use computers, and for people whose information is stored in
|
|
them.
|
|
Magistrates and law enforcement officials should be cognizant of
|
|
the Electronic Communications Privacy Act ("ECPA"), 18 U.S.C. 2701-2711,
|
|
which protects the privacy of various electronic communications, including
|
|
e-mail. See, Kapor & Godwin, supra, at 431-32. Under the ECPA, a piece
|
|
of electronic mail cannot be reviewed or seized unless the law governing
|
|
warrants has been strictly complied with. See 18 U.S.C. 2703(a). The
|
|
language of this section seems to require that an order for the disclosure
|
|
of electronic mail must particularly describe the communications to be
|
|
sought; general rummaging and reviewing is not permitted. Id.(FN13)
|
|
Also important is the First Amendment Privacy Protection Act
|
|
("PPA"), 42 U.S.C. 2000aa et seq., which was enacted in response to the
|
|
Supreme Court's holding in Zurcher v. Stanford Daily, 436 U.S. 547 (1978).
|
|
Protected under the PPA are documents and materials "possessed in
|
|
connection with a purpose to disseminate to the public a newspaper, book,
|
|
broadcast or similar form of public communication," 42 U.S.C. 2000aa(a),
|
|
which would seem to embrace electronic bulletin boards and
|
|
publicly-accessible computer networks. The PPA operates to prohibit
|
|
blanket searches and seizures of such entities, unless there exists
|
|
"probable cause to believe that the person possessing the materials has
|
|
committed a criminal offense to which the materials relate," and such
|
|
criminal offense does not consist of "the receipt, possession,
|
|
communication or withholding of such materials." 42 U.S.C. 2000aa(a)(1).
|
|
|
|
The practical effect of the PPA would seem to be to strictly limit
|
|
wholesale computer seizures where the systems are used for bulletin boards
|
|
or other general communications. In such situations, a seizure is
|
|
appropriate only where the system's operators are directly implicated in
|
|
unlawful activity. However, where the system has been used as a conduit
|
|
by others who are criminally motivated, but the operator is not involved,
|
|
the PPA would seem to require that no search take place, but that instead
|
|
a subpoena be issued for the relevant information.
|
|
It also is worth noting that the Attorney General has issued
|
|
guidelines under the PPA, governing the execution of search warrants where
|
|
highly confidential or personal information relating to innocent third
|
|
parties might fall into the hands of law enforcement authorities. See 28
|
|
C.F.R., Part 59. Under the guidelines, federal officials should "not use
|
|
search and seizure to obtain documentary materials in the possession of
|
|
disinterested third parties unless reliance on alternative means would
|
|
substantially jeopardize their availability. . . or usefulness," where
|
|
less obtrusive means of obtaining such materials are available. 28 C.F.R.
|
|
59.1, 59.4(a)(1). Under the PPA guidelines, "documentary materials"
|
|
include "materials upon which information is electronically or
|
|
magnetically recorded." 28 C.F.R. 59.2(c). Sensitive to the potential
|
|
for violating the privacy rights of innocent third parties, the Attorney
|
|
General's guidelines impose strict controls over search warrants executed
|
|
upon records in the custody of physicians, lawyers, or the clergy. 28
|
|
C.F.R. 29.4(b)(4). This heightened sensitivity to the privacy rights of
|
|
innocent third parties is reasonable, and should be extended to situations
|
|
where third parties other than patients, clients, and penitents are
|
|
affected by the documentary search and seizure. Considering the high
|
|
volume of communications which occur over many computer systems, and the
|
|
potential chilling effect that the government seizure of such
|
|
communications will have, magistrates and prosecutors appropriately should
|
|
impose similar limiting rules for computer seizures.
|
|
|
|
Ethical and Practical
|
|
Considerations for Attorneys.
|
|
|
|
Private defense attorneys and in-house corporate counsel also can
|
|
play a useful role in controlling the unbridled search and seizure of
|
|
computers.
|
|
They should become aware of how vulnerable their clients' computer
|
|
systems are to such searches, and of the potentially disastrous
|
|
consequences which would follow the seizure of a computer system. They
|
|
should be prepared to move for the return of seized computer equipment
|
|
under Rule 41(e), Fed.R.Crim.P., on the ground, inter alia, that the
|
|
particularity clause of the Fourth Amendment has been violated by such an
|
|
overbroad search and seizure. For the same reason, if the client is
|
|
indicted, computer searches and seizures provide fertile grounds for
|
|
suppression motions.(FN14)
|
|
Short of such disasters, however, counsel should be aware of some
|
|
of the ethical problems which computer filekeeping and communications
|
|
pose. Both the Constitution and the ethical precepts of the legal
|
|
profession protect client secrets. Although some details of the
|
|
attorney-client relationship may not be privileged -- for example, the
|
|
mere fact that the relationship exists, the identity of the client, and
|
|
the legal fees paid -- communications between counsel and client are
|
|
absolutely privileged, and attorney work-product enjoys presumptive
|
|
protection from disclosure.
|
|
The Code of Professional Responsibility prohibits the attorney
|
|
from revealing either "confidences" which a client has revealed for the
|
|
purpose of obtaining legal services, or "secrets" of the client's affairs
|
|
which, although not useful for the purpose of representation, might
|
|
embarrass the client or hurt business interests. See DR 4-101(A), (B).
|
|
The attorney-client privilege, limited by law to communications for the
|
|
purpose of seeking or rendering legal advice, is "more limited than the
|
|
ethical obligation of a lawyer to guard the confidences and the secrets of
|
|
his client." EC 4-4. The code similarly imposes on the attorney the duty
|
|
to exercise reasonable care to prevent employees, associates and all
|
|
others from disclosing client secrets and confidences. See DR 4-101(D).
|
|
The Model Rules of Professional Conduct also are protective of
|
|
client confidences. Rule 1.1 enjoins the lawyer not to reveal
|
|
"information relating to the representation of a client." Although this
|
|
language seems to eliminate from the attorney's duties the protection of
|
|
information which, though not essential to representation, may prejudice
|
|
the client's non-legal interests, the Comment to Rule 1.1 seems to
|
|
rehabilitate the protection of non-legal client secrets. The Comment
|
|
explains that attorney-client confidentiality is necessary for the client
|
|
"to communicate fully and frankly with the lawyer even as to embarrassing
|
|
or legally damaging subject matter." (Emphasis added.) The Comment
|
|
distinguishes Rule 1.6 from DR 4-101, and it holds that the Rule's
|
|
application to information "relating to the representation" reaches
|
|
morebroadly than the Code's protection of information "gained in" the
|
|
relationship which the client has requested to be kept confidential.
|
|
In-house counsel should be certain that confidential legal files
|
|
are segregated from general corporate files. Other attorneys should make
|
|
sure that their clients similarly segregate such files on separate disks.
|
|
If possible, and especially when a particularly sensitive investigation is
|
|
underway, in-house counsel should detach its computer system from the
|
|
network upon which the rest of the company's computers operate. Clients
|
|
should be instructed to store privileged information to "floppy" disks,
|
|
and that such information should be erased completely from the computer's
|
|
memory or "hard" disks.
|
|
Counsel need to be prepared to convince a court that certain
|
|
communications were made in complete confidence. See, e.g., S.E.C. v.
|
|
Gulf & Western Industries, Inc., 518 F. Supp. 675 (D.D.C. 1981); In re
|
|
Ampicillin Antitrust Litigation, 81 F.R.D. 377 (D.D.C. 1978). It will be
|
|
harder to make this showing if it should turn out that privileged files
|
|
were accessible to anyone in the corporation. Instead, the expectation of
|
|
confidentiality should be clearly apparent from the demonstrable conduct
|
|
of the party asserting a privilege. Gulf & Western, supra, 518 F.Supp. at
|
|
682; see also, Upjohn Co. v. United States, 449 U.S. 383, 387 (1981)
|
|
(counsel should be able to show that employee was aware that
|
|
communications were for the purpose of legal advice when made).
|
|
Similarly, counsel should make sure that employees understand that
|
|
confidential communications should not be placed over a generally
|
|
accessible office computer network, and that legal communications should
|
|
be removed and segregated from parts of the system which are generally
|
|
accessible. Under certain circumstances, when privileged documents are
|
|
left in computer files where others can view them, confidentiality may
|
|
have been constructively waived. "[O]nce the privilege exists
|
|
the corporate client must be diligent in its intra-corporate
|
|
confidentiality." J. Gergacz, Attorney-Corporate Client Privilege
|
|
3.02[2][d][ii](1987) (FN15)
|
|
There is only so much counsel can do, however, to minimize the
|
|
possibility that privileged information is seized. Obviously, it would be
|
|
wasteful to restructure an entire filing system in seemingly paranoid
|
|
anticipation of a general search. But counsel should insure that the
|
|
client takes deliberate and painstaking precautions to keep its
|
|
electronically recorded confidential communications from prying eyes
|
|
within the office, as well as from without.
|
|
It is important to note that the law is far from settled on the
|
|
issue of whether privileged materials which have been abandoned or stolen
|
|
lose their protective character. Older authorities hold that all
|
|
involuntary disclosures of information remove the privilege. 8 Wigmore,
|
|
Evidence, sec. 2326 (McNaughton Rev. Ed. 1961). The modern view is to the
|
|
contrary. See, e.g., J. Gergacz, supra, 5.03[2][e]; Suburban Sew 'N
|
|
Sweep, Inc. v. Swiss-Bernina, Inc., 91 F.R.D. 254, 260 (N.D.Ill. 1981);
|
|
see also Bower v. Weisman, 669 F. Supp. 602, 606 (S.D.N.Y. 1987). But it
|
|
is safe to say that it does not help a client's case to have filed
|
|
confidential communications promiscuously in the company's computer
|
|
network. And disclosure of communications beyond employees who "need to
|
|
know" may constitute a waiver of confidentiality. See, J. Gergacz, supra,
|
|
at 5.03[3], citing James Julian, Inc. v. Raytheon Co., 93 F.R.D. 138, 142
|
|
(D.Del. 1982). As John Gergacz observes,
|
|
|
|
Courts which have strongly emphasized the confidentiality characterization
|
|
of the waiver doctrine may be less amenable to corporate policies that do
|
|
not strongly limit access by non-essential employees to the privileged
|
|
communications. Even so, corporate counsel should take care in preserving
|
|
the confidentiality of the privileged communications within the
|
|
organization. Privileged documents should be circulated only to those
|
|
corporate members who need to know. The broader the circulation list, the
|
|
less distinguishable corporate treatment of confidential communications
|
|
will be from general firm memos. In addition, . . . separate files should
|
|
be kept for privileged communications and those that are circulated should
|
|
be kept in separately marked . . . folders so as to minimize commingling
|
|
of privileged documents with nonPprivileged, even within the same filing
|
|
system. Finally, the corporation should have and follow a policy of
|
|
authorized and unauthorized access to various files.
|
|
|
|
J. Gergacz Attorney-Corporate Client Privilege, supra, 5.03[3].
|
|
|
|
|
|
Conclusion.
|
|
|
|
This suggestive (but far from exhaustive) review is a plea to
|
|
judges and magistrates, prosecutors and defense attorneys, in-house and
|
|
independent counsel, who are or may be involved in the criminal process --
|
|
to study the constitutional, ethical, strategic, and business implications
|
|
of the new computer technology more closely. Computers have essentially
|
|
miniaturized the office place; but they pose the concomitant danger of the
|
|
revival of the Writ of Assistance. True, computers enable us to easily
|
|
store, and more easily to retrieve, a wide variety of information using a
|
|
very small "file cabinet"; but one should resist the temptation to pack
|
|
everything into one system. The courts and prosecutors should be
|
|
sensitive to how close indiscriminate computer seizures come to the police
|
|
practices which precipitated a revolution. And counsel should be
|
|
sensitive to the possibility that the poorly considered use of computer
|
|
technology can erode the client's constitutional rights and privileges.
|
|
We should be alert to the computer's dangers as well as to its undeniable
|
|
convenience and other benefits.
|
|
|
|
|
|
FN1. Mr. Silverglate is a partner, and Mr. Viles an associate, at the
|
|
Boston (Mass.) law firm of Silverglate & Good. The authors are counsel to
|
|
the Electronic Frontier Foundation (EFF), which is described in this
|
|
paper, and which is involved in a few of the matters discussed here. The
|
|
authors gratefully acknowledge the help of Mitchell Kapor and Michael
|
|
Godwin of EFF, as well as of associate Sharon Beckman and legal assistants
|
|
Chauncey Wood and Gia Barresi of Silverglate & Good.
|
|
|
|
FN2. John Perry Barlow, one of the founders of the Electronic Frontier
|
|
Foundation, explains the meaning of "cyberspace" best -- it is the
|
|
totality of interconnected computer networks, and the activities taking
|
|
place on them:
|
|
The WELL ... is an example of the latest thing in frontier
|
|
villages, the computer bulletin board. In this kind of small town, Main
|
|
Street is a minicomputer to which ... as many as 64 microcomputers may be
|
|
connected at one time by phone lines and ... modems.
|
|
In this silent world, all conversation is typed. To enter it, one
|
|
forsakes both body and place and becomes a thing of words alone. You can
|
|
see what your neighbors are saying (or recently said) ... . Town meetings
|
|
are continuous and discussions rage on everything from sexual kinks to
|
|
depreciation schedules.
|
|
There are thousands of these nodes in the United States, ranging
|
|
from PC clone hamlets of a few users to mainframe metros like CompuServe,
|
|
with its 550,000 subscribers. They are used by corporations to transmit
|
|
memoranda and spreadsheets, universities to disseminate research, and a
|
|
multitude of factions, from apiarists to Zoroastrians, for purposes unique
|
|
to each.
|
|
Whether by one telephonic tendril or millions, they are all
|
|
connected to one another. Collectively, they form what their inhabitants
|
|
call the Net. It extends across the immense region of electron states,
|
|
microwaves, magnetic fields, light pulses and thought which sci-fi writer
|
|
William Gibson named Cyberspace.
|
|
|
|
J. Barlow, Crime and Puzzlement, 2P3 (1990)(emphasis in original). For
|
|
other descriptions of the range of topics open for discussion on the
|
|
networks, see Walker, "American Diary: In Thrall to the Data Bank,"
|
|
Manchester Guardian Weekly, Mar. 24, 1991, at 24, and Leccese, supra, at
|
|
18.
|
|
|
|
FN3. As of this writing, the scope of "Operation Sun Devil" is unclear.
|
|
Although many wholesale seizures of computer equipment have occurred over
|
|
the past year and a half, executed by teams of federal and state agents,
|
|
some law enforcement officers specifically have disavowed that their
|
|
particular police action was a part of "Sun Devil." For example,
|
|
"[f]ederal officials said that the raid on Steve Jackson Games [see infra]
|
|
was not part of Operation Sun Devil." Lewis, "Can Invaders Be Stopped but
|
|
Civil Liberties Upheld?," New York Times, Sept. 9, 1990, at 12F.
|
|
|
|
FN4. "GURPS" is an acronym for "Generic Universal Role-Playing System."
|
|
|
|
FN5 It is instructive to compare the experience of Phrack's young
|
|
publisher with the treatment accorded other well-known publishers of
|
|
pilfered documents. See New York Times v. United States, 403 U.S. 713
|
|
(1971).
|
|
|
|
FN6 This apparently was the climactic day for the "Sun Devil"
|
|
investigations. Barlow writes:
|
|
|
|
One May 8, 1990, Operation Sun Devil, heretofore an apparently random and
|
|
nameless trickle of Secret Service actions, swept down on the Legion of
|
|
Doom and its ilk like a bureaucratic tsunami. On that day, the Secret
|
|
Service served 27 search warrants in 14 cities from Plano, Texas to New
|
|
York, New York. ...
|
|
In a press release following the sweep, the Secret Service boasted
|
|
having shut down numerous computer bulletin boards, confiscated 40
|
|
computers, and seized 23,000 disks. They noted in their statement that
|
|
"the conceivable criminal violations of this operation have serious
|
|
implications for the health and welfare of all individuals, corporations,
|
|
and United States Government agencies relying on computers and telephones
|
|
to communicate." ...
|
|
[T]he deliciously ironic truth is that, aside from [a] 3-page
|
|
Bell South document, the hackers had neither removed nor damaged anyone's
|
|
data. Operation Sun Devil, on the other hand, had "serious implications"
|
|
for a number of folks who relied on "computers and telephones to
|
|
communicate." They lost the equivalent of about 5.4 million pages of
|
|
information. Not to mention a few computers and telephones.
|
|
|
|
J. Barlow, supra, at 14. Similar numbers were reported in Leccese,
|
|
"Hackers under Attack," supra, at 9.
|
|
|
|
FN7. It would be impossible to exaggerate the frequency with which
|
|
computer information banks containing private information of third parties
|
|
are seized, ostensibly in search of criminal evidence. A greenhouse owner
|
|
in Indiana, charged with aiding and abetting in the cultivation of
|
|
marijuana, had his computer equipment seized. More bizarre is the story
|
|
of the nonprofit California cryogenics organization, whose computer
|
|
equipment and cryogenics-related bulletin board were seized and shut down,
|
|
in the course of a coroner's office investigation into the whereabouts of
|
|
a missing human head. The organization reportedly initiated litigation
|
|
under the Electronic Communications Privacy Act, 18 U.S.C. 2701 et seq.
|
|
(discussed infra), and at this writing it appears that the case was
|
|
settled after some proceedings. See Meeks, "The Case of the Missing Head
|
|
and the Missing BBS" (available on the WELL, Apr. 12, 1991)(story reported
|
|
as originating from BIX's Microbytes newswire, no date given).
|
|
|
|
FN8. See e.g., Donovan v. Dewey, 452 U.S. 595 (1981); Zurcher v. Stanford
|
|
Daily, 436 U.S. 547, 554-55 (1978); United States v. Kahn, 415 U.S. 143,
|
|
157 (1974); See v. City of Seattle, 387 U.S. 541 (1967); Camara v.
|
|
Municipal Court, 387 U.S. 523 (1967).
|
|
|
|
FN9 See Proceedings: Fourth Annual Computer Virus & Security Conference
|
|
426P42 (1991). Kapor and Godwin are, respectively, the President and
|
|
Staff Counsel of the Electronic Frontier Foundation, a civil liberties
|
|
group headquartered in Cambridge, Massachusetts, dedicated to "civilizing
|
|
the electronic frontier." It "aims to lobby for laws to facilitate public
|
|
computer networks, and to help in the legal defense of those it considers
|
|
unjustly charged with computer crimes." See Dyson, "Commentary: Hackers'
|
|
Rights," Forbes, Jan. 7, 1991, at 288. As part of EFF's work, it has
|
|
undertaken litigation efforts on behalf of some of the parties described
|
|
above who have been subjected to computer searches and seizures (including
|
|
Steve Jackson Games and the publisher of Phrack). EFF also has intervened
|
|
as amicus curiae in other cases implicating the constitutional liberties
|
|
of bulletin board operators.
|
|
|
|
FN10. Similarly, as discussed below, courts and attorneys should be
|
|
sensitive to the interests protected by the Fifth and Sixth Amendments,
|
|
when the equipment to be seized potentially contains attorney-client
|
|
communications and legal work-product.
|
|
|
|
FN11 Furthermore, Rule 1001(3) holds that an "original" can be "any
|
|
print-out or other output readable by sight [and] shown to reflect the
|
|
data accurately," which has been taken from a "computer or similar
|
|
device." In view of this, it would seem that the Rules of Evidence have
|
|
eliminated the need for many evidentiary disputes over the admissibility
|
|
of a transcribed disk (as a supposed "duplicate") in lieu of the entire
|
|
"original" computer system's data storage.
|
|
|
|
FN12. Plainly, the decisional law has given newspapers and books stronger
|
|
and surer protection against government intrusion than it has given to the
|
|
broadcast media. Compare, e.g., Minneapolis Star and Tribune v. C.I.R.,
|
|
460 U.S. 575 (1983); Near v. Minnesota, 283 U.S. 697 (1931), with F.C.C.
|
|
v. League of Women Voters, 468 U.S. 364 (1984); Red Lion Broadcasting v.
|
|
F.C.C., 395 U.S. 367 (1969). The courts' tolerance for government
|
|
interference in broadcasting finds its principal justification in the
|
|
notion that "[u]nlike other modes of expression, radio inherently is not
|
|
available to all. That is its unique characteristic, and that is why,
|
|
unlike other modes of expression, it is subject to government regulation."
|
|
National Broadcasting Co. v. United States, 319 U.S. 190, 226 (1943). The
|
|
N.B.C. Court's observation may have been accurate in the 1940's but it is
|
|
not so today. In the past fifty years we have witnessed a dizzying
|
|
proliferation of electronic channels of communication. It would be a
|
|
mistake to assume that there is a scarcity of modes of expression on the
|
|
computer networks, and to consequently limit speech in those forums. See
|
|
generally Peretti, "Computer Publication and the First Amendment," 3
|
|
Computer Underground Digest #3.09 (Feb. 28, 1991)(available on the WELL
|
|
Apr. 12, 1991).
|
|
|
|
FN13. It should be pointed out, however, that the ECPA also sets up as
|
|
defenses to civil actions under the Act, "good faith reliance" on warrants
|
|
or court orders. See 18 U.S.C. 2707(d)(1).
|
|
|
|
FN14. Although the seizure of law office computer systems has not yet
|
|
caught on in this country, it seems that it is a only a matter of time
|
|
before it does. In the past decade, we have witnessed wide-ranging
|
|
searches through attorneys' client files. E.g., DeMassa v. Nunez, 747
|
|
F.2d 1283 (1984). Other nations already have extended this procedure to
|
|
electronic files. One example is the case of South African anti-apartheid
|
|
attorney Yunus Mahomed. According to reports, his professional activities
|
|
were "directly disrupted by police searches of his office and home in
|
|
January and again in February 1989. On the first occasion computer disks
|
|
were removed and later returned. During the second raid, the computer was
|
|
removed. Mr. Mahomed obtained an injunction restraining police from
|
|
tampering or retrieving information from the computer unless he is
|
|
present." "Lawyer to Lawyer Network," March 1989 (appeal issued by
|
|
Lawyers Committee for Human Rights).
|
|
|
|
FN15. See also Baltica-Skandinavia Insurance Co. v. Booth, Potter, Seal &
|
|
Co., No. 86-1967, 1987 U.S. Dist. LEXIS 9371 slip op. (E.D.Pa. Oct. 15,
|
|
1987), cited in J. Gergacz, supra, at 36 (Mar. 1989 Supp.)(court decided
|
|
that document intended to remain confidential when it had been filed
|
|
separately with other privileged documents, file was specially marked, and
|
|
staff was instructed concerning its confidentiality); Allen v. Burns Fry,
|
|
Ltd., No. 83 C 2915, 1987 U.S.Dist. LEXIS 4777, slip op. (N.D.Ill. June 8,
|
|
1987), cited in J. Gergacz, supra, at 36 (same). Generally, in cases
|
|
where the client is a corporation, the courts seem to be most willing to
|
|
honor the confidential nature of documents which both the attorney and
|
|
client took explicit and energetic measures to guard. Compare Lois
|
|
Sportswear U.S.A., Inc. v. Levi Strauss & Co., 104 F.R.D. 103 (S.D.N.Y.
|
|
1985)("Because the client's intent determines whether the communication
|
|
was confidential to begin with, such intent must be negated before the
|
|
confidentiality can be deemed to have been destroyed and the privilege
|
|
surrendered.").
|
|
|
|
|
|
|
|
Downloaded From P-80 International Information Systems 304-744-2253
|
|
|