Vol. 71, No. 12, December 1998
The Computerized Lawyer
Law Enforcement in Cyberspace:
Search and Seizure of Computer Data
By Michael K. McChrystal,
William C. Gleisner III, & Michael J. Kuborn
How are computers and computer data viewed under the Fourth
Amendment to the U.S. Constitution? The answer may both surprise
and trouble you. |
Have you ever considered what might become of a floppy
disk containing sensitive information that you or a client throw
away or lose? What about the hard drives in those computers you
just replaced with new 450 megahertz systems? What if they fell
into the hands of federal or state prosecutors? What about email
or sensitive information you send to or receive from a client,
even if it's encrypted? You may not have given this much thought,
but the Department of Justice has. The DOJ's Federal Guidelines
for Searching and Seizing Computers is available
online, thanks to the Freedom of Information Act.1
Fourth Amendment standards
Fourth
Amendment protections against unreasonable searches and seizures
of an individual's personal possessions apply to agents of all
levels of government - federal, state, and local2
- whether the individual's activities are criminal or civil.3 These protections are available only if
a reasonable expectation of privacy is demonstrated by the individual
with respect to those possessions. When a reasonable expectation
of privacy is not demonstrated, our courts have ruled that no
improper "search" occurs.4
Most courts, for example, have found that a person's garbage,
once placed outside his or her immediate control, lacks the required
privacy interest.5 In fact, even
documents cut into minute strips by a paper shredder involve
no greater privacy interest than that afforded to the rest of
the garbage with which they are disposed.6
A two-part test has been developed to determine whether a
reasonable expectation of privacy exists. First, the individual
by his or her conduct must have exhibited an actual (subjective)
expectation of privacy. Secondly, that subjective expectation
must be one that society is prepared to recognize as reasonable
(when viewed objectively).7 Even
if there is a reasonable expectation of privacy, protections
against unreasonable searches are by no means absolute. Once
a reasonable expectation of privacy has been established, evidence
sufficient to demonstrate probable cause that a crime has been,
is being, or will be committed, will in most instances allow
the issuance of a search warrant. Warrant requests to search
files that contain privileged information generally are subject
to the same standards.8
Search warrants are subject to attack, however, if they are
overbroad in their language, or fail to specify with particularity
the locations to be searched and the items to be seized. Historically,
these concepts were developed with reference to tangible physical
space and those items found residing there. Computer data doesn't
fit the historical mold.
Computer data
One thing is certain: If someone surrenders physical control
over computer equipment or data, he or she loses the expectation
of privacy that is fundamental to protecting against governmental
intrusion into the information that may reside there.9 However, what if an individual attempts
to delete files from a computer that is seized later pursuant
to a valid search warrant? Those attempted deletions have not
established a reasonable expectation of privacy for Fourth Amendment
purposes.10
What if a law firm, or one of its clients, decides to surrender
control of a computer to an outside consultant to perform maintenance
or other service work? In the Seventh Circuit, the firm or the
client proceeds at their considerable peril. In United
States v. Hall11 the defendant
took his computer system to a repair shop for service. In the
course of making repairs, a technician discovered image files
that contained child pornography. The technician called a detective
who called in the FBI, all unbeknownst to the defendant. Several
interviews of the technician were conducted, and the FBI recruited
the assistance of the computer shop to prolong repair on the
defendant's computer while the FBI sought and obtained a search
warrant. The court found no Fourth Amendment violation.
If surrendering a computer to an outside repair facility can
compromise Fourth Amendment rights, what of the attorney-client
privilege? Sending firm computers out for repair, and perhaps
even using onsite consultants to service systems, could lead
to many unfortunate consequences. The Hall
decision needs to be considered in light of ABA Formal Ethics
Opinion 95-398:
"A lawyer who gives a computer maintenance company access
to information in client files must make reasonable efforts to
ensure that the company has in place, or will establish, reasonable
procedures to protect the confidentiality of client information.
Should a significant breach of confidentiality occur, the lawyer
may be obligated to disclose it to the client."
When the Fourth Amendment is applied to computer data, three
computer-related issues can arise. The physical location of computer
data can present difficult questions of jurisdiction and scope.
Also, the scope of a search for computer data regularly requires
a more expansive warrant than courts historically have tolerated.
Finally, the form that the computer data takes may significantly
affect the search.
Location
A search warrant that describes a particular file cabinet
or set of such cabinets in a person's office rarely has given
rise to overbreadth concerns. However, "because the architecture
of cyberspace is dissimilar to most conventional notions of place,
analogizing cyberspace to a place for Fourth Amendment [purposes]
has serious limitations."12
Data accessible by a particular computer system can reside in
many different locations. Network systems almost always will
store the actual data at a different site than where it was created
or can be accessed. Any computer system with a modem attached
exponentially increases possible storage locations. This not
only greatly increases the opportunities for challenges to a
search warrant, but can pose jurisdictional problems as well.
If a person operates a fraudulent business enterprise, creating
and maintaining all of his or her records on a computer system
located in Milwaukee but stores that data on a server located
in Illinois, can a Wisconsin court authorize its seizure from
Milwaukee? When a "hacker" breaks into your client's
computer system by using a series of different modem connections,
each located in a different state, can local law enforcement
ever hope to gain the evidence necessary for prosecution?
Scope of the search and seizure
A search warrant request for a particular manila folder could
be challenged successfully if that warrant authorized the seizure
of an entire room of file cabinets. On the other hand, locating
a particular file on a computer system, even if the file name
is known, regularly will require the seizure of large parts of
the system, if not the entire system. This seeming inconsistency
is a product of at least two characteristics of computer systems.
First, the particular computer program that created the file
and even the particular hardware being used helps define how
access to the file is gained.13
Second, unlike a filing cabinet where finding a particular manila
folder will permit access to everything inside, computer information
can be less tidy. An appellate brief that took days to produce
will, despite the author's best efforts, reside in a multitude
of different locations on a hard drive. Not only can those locations
be lost or changed with a few keystrokes, but the brief can be
saved in parts that entail a nearly infinite number of addresses
or file names. Thus, a thorough government search of a client's
computer system regularly will require law enforcement officers
to seize all parts of the company's computer system, even if
it seriously disrupts the company's business.
The wholesale removal of computer equipment undoubtedly can
disable a business or professional practice and disrupt personal
lives. However, until technology and law enforcement expertise
make it possible to conduct a thorough search of a computer system
onsite, wholesale seizures likely will be permitted.14
Form of computer data
Computers can make data either amazingly simple or amazingly
difficult to access. At one end of the spectrum, encryption techniques,
powered by computers capable of performing millions of operations
in less time than it takes to yawn, have hampered many attempts
to search and seize computer data. At the other extreme, computer
searches for all the documents your office created in a particular
time period, a nearly impossible task when dealing with filing
cabinets, can be performed in a matter of minutes. Since individual
computer hardware components, as part of an overall system, are
easily exchanged and modified by the user, data may exist simultaneously
in a multitude of different forms, including CD-ROM, diskettes,
one or more hard drives, several different tape backups, and
in print. A commentator recently offered this analysis of the
effects of encryption and password protection under the Fourth
Amendment:
"Unlike a communication hidden by a password, an encrypted
message can still be viewed, albeit in encoded form. For this
reason, despite some commentators' assertions, encrypting one's
communication is insufficient to establish a reasonable expectation
of privacy. The encryption may obscure the meaning of a message
but the encrypted message itself remains in plain view; thus,
an officer's observation of that encrypted message is not a search
and does not implicate the Fourth Amendment. Furthermore, the
encoded message, once observed, may be decoded without implicating
the Fourth Amendment, just as law enforcement agents may 'decode'
communications that they overhear in other languages."15
Michael McChrystal, top, Marquette 1975, is
a professor of law at the Marquette University Law School.
William Gleisner, middle, Marquette 1974,
both a practicing attorney and computer consultant, maintains
a law firm-based litigation support service bureau in Milwaukee.
Michael Kuborn, bottom, Marquette 1998, is
with Olsen, Kloet, Gundersen & Conway, and is trained in
computer recovery and computer search and seizure techniques.
Products and services mentioned in this article should not be
construed as an endorsement.
|
The commentator also argues that "cyberspace communication
should be protected with a password to establish a reasonable
expectation of privacy. The password functions like a closed
container or a seal on a letter; it hides from view the contents
of the message. [L]aw enforcement agents should be required to
obtain a warrant before trying to defeat a password just as they
must obtain a warrant (absent some exigency) to open a closed
container or a sealed package in the mail."16
With regard to email and other electronic communications,
encryption and passwords will not necessarily provide protection
from governmental access. A decision by the Court of Military
Appeals suggests that an email message is like an unopened letter
until the recipient retrieves it to his or her computer.17 Once opened, the privacy of the email
no longer is within the sender's control. Thus, the Fourth Amendment
protects the electronic communication from interception, but
the protection may be lost once the communication is complete.
Conclusion
In terms of the Fourth Amendment, the steps one takes to prevent
any actual government intrusion are not as important as the measures
one takes to ensure that information is regarded, and treated
consistently, as private. There are many ways to lose the protection
of the Fourth Amendment for computer data. If you or your client
surrender hardware or data to even the most trusted third parties,
or are careless in your disposal of same, you run the considerable
risk that a court might determine that the all-important reasonable
expectation of privacy under the Fourth Amendment has been lost.
In addition, information, even though encrypted, will be vulnerable
if it is not protected from prying eyes by means of password
protection or some other design to restrict access to those clearly
authorized. "A failed attempt at secrecy by reason of underestimation
of police resourcefulness"18will
be cold comfort to you or your clients if the government comes
calling.
Endnotes
1To obtain a comprehensive guide
to the state of Fourth Amendment law as it applies to computers,
request the Federal Guidelines for Searching and Seizing Computers
(1994) and its Supplement (October 1997) from the U.S. Department
of Justice, Criminal Division, Computer Crime & Intellectual
Property Section by mail or from its Web
site.
2See, New
Jersey v. T.L.O., 469 U.S. 325 (1985).
3 See, e.g., Marshall
v. Barlow's Inc., 436 U.S. 307 (1978); Camara
v. Municipal Court, 387 U.S. 523 (1967).
4 See, United
States v. Jacobsen, 466 U.S. 109 (1984).
5 See, California
v. Greenwood, 486 U.S. 35 (1988); but see contra,
State v. Hempele, 576 A.2d 793 (1990).
6 United States v. Scott,
975 F.2d 927 (1st Cir. 1992).
7 See, Smith
v. Maryland, 442 U.S. 735 (1979).
8See, Klitzman v. Krut, 744
F.2d 955 (3rd Cir. 1984).
9 United States v. Redman,
138 F.3d 1109, 1112 (7th Cir. 1998); United States v. Scott,
975 F.2d 927, 930 (1st Cir. 1992).
10 Pennsylvania v. Copenhefer,
587 A.2d 1353, 1356 (Pa. 1991).
11 142
F.3d 988 (7th Cir. 1998).
12 Note, Keeping Secrets in
Cyberspace, Establishing Fourth Amendment Protection for Internet
Communication, 110 Harv. L. Rev. 1591, 1599-1601 (1997).
13 This explains some problems
that occur in offices using more than one system or for people
who do work at home on a system different from the one at work.
14 United States v. Hunter,
13 F. Supp. 2d 574, 583 (D. Vt. 1998).
15Note 12, supra, at 1604.
16 Id.
17 United States v. Maxwell,
45 M.J. 406, 418 (C.M.A. 1996).
18 United States v. Scott,
supra, note 9 at 930.
|