Legal Considerations in Obtaining Electronic Evidence in Online Investigations CSC 486/586 1.

Slides:



Advertisements
Similar presentations
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Advertisements

Privacy Laws and First Amendment Content Professor Peter P. Swire Ohio State University John Marshall Symposium on Copyright & Privacy Conference November.
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Responding to Subpoenas and Law Enforcement Demands for PHI: An Overview Janet A. Newberg Chair, Health Law Section Felhaber Larson Fenlon & Vogt, P.A.
Richard Warner USA Patriot Act: Money Laundering Provisions.
Electronic Communications Privacy Act (ECPA)
Cyber Security - the Laws that Govern Incident Response Joel Michael Schwarz Department of Justice Computer Crime and Intellectual Property Section Criminal.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
CIPA Update. FOR SCHOOLS – By July 1, 2012, amend your existing Internet safety policy (if you have not already done so) to provide for the education.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Anti-Terrorism Legislation and Campus Computing Tracy Mitrano, Cornell Barbara Simons, Stanford Rodney Petersen, Maryland Copyright Tracy Mitrano, Rodney.
Cyber Security - the laws that protect your systems and govern incident response Joel Michael Schwarz Department of Justice Computer Crime and Intellectual.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
1 ISPs and Federal Privacy Law: Everything You Need to Know About the Electronic Communications Privacy Act (ECPA) Mark Eckenwiler Computer Crime and Intellectual.
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
GOVERNMENT ACCESS TO ELECTRONIC COMMUNICATIONS – UPDATING THE RULES EDUCAUSE Live! June 9, 2010 James X. Dempsey Center for Democracy & Technology 1.
Data Protection and Records Management
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
INTRODUCTION TO THE LAW OF EVIDENCE
Class 7 Internet Privacy Law Your Digital Afterlife.
Computer Forensics BACS 371
Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Whose Computer Is It, Anyway? Steven J. McDonald General Counsel Rhode Island School of Design Computer Policy and Law 2006.
1 Marc J. Zwillinger Elizabeth Banker Zwillinger Genetski LLP April 7, 2011.
Business Law for the Entrepreneur and Manager
7. Legal. Topics Fourth Amendment E-Discovery Duty to Preserve Private Searches ECPA Searching With & Without a Warrant.
1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Search Warrants & Seizure of Electronic Evidence.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Class 11 Internet Privacy Law Government Surveillance.
1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Legal Issues in Cybercrime Cases: Search & Seizure.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
U.S. Copyright Enforcement Benjamin Hardman Attorney / Advisor Office of Intellectual Property Policy & Enforcement, USPTO.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
Principles of Information System Security: Text and Cases
Stalking Awareness And Prevention Francis A. Arenas, Esq.
Chapter 18 - The Fourth Amendment and National Security.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
& SELECTED TOPICS: DIGITAL FORENSICS Xinwen Fu, UMass Lowell, USA Center for Cyber Forensics, UMass Lowell.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Activities affecting informational privacy Collection Processing dissemination Monitoring ContractNo-contract questioning AggregationSecondary useExclusion.
Copyright 2000, Marchany Computer Law Threats and Issues VA Computer Crime Act Randy Marchany VA Tech Computing Center ©Marchany,2001.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Board of Directors – March 24, 2016 Denise Mannon, AHFI, CHPC Corporate Compliance Officer.
COUNTY COUNSEL Brown Act Public Records Act Presenter: Janice D. Killion Public Records Act – Ethics – Conflicts of Interest.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Surveillance around the world
Courts System Search Warrants.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
The E-Rate Program CIPA Update Fall 2011 Applicant Trainings.
Lesson # 7 A Practical Guide to Computer Forensics Investigations
Public Recording of Police
DEVELOPING A LEGAL FRAMEWORK TO COMBAT CYBERCRIME
Search and Seizure Concepts
Laws Governing Police Surveillance
Criminal Procedure: Theory and Practice, 2d.
Government Data Practices & Open Meeting Law Overview
Texas Search and Seizure
Government Data Practices & Open Meeting Law Overview
State of florida tax information sharing Paula Barfield August 5, 2015
Presentation transcript:

Legal Considerations in Obtaining Electronic Evidence in Online Investigations CSC 486/586 1

Statutory Restrictions on Obtaining Electronic Evidence Through electronic surveillance; From ISPs & other service providers; That includes material intended for publication 2

The Statutes ECPA: Electronic Communications Privacy Act of dictates how LE obtains information from electronic communications providers –Title III (Wiretaps) –Stored Electronic Communications Privacy Protection Act – –Restricts methods LE can use to obtain info intended for publication 3

Wiretap Act, 18 USC 2511 Prohibits “interception” of “oral,” “wire,” or “electronic communications” with a “mechanical device” “Interception” means real-time acquisition Govt can get “T-III order” for oral or wire communications only for a very specific list of felonies - Statutory suppression for violations 4

Obtaining a Title III Wiretap Order for Electronic Evidence ECPA applies wiretap act to electronic communications intercepted in real-time (“keystroke monitoring”) Federal prosecutor can get court order for electronic wiretapping on any felony; no statutory suppression remedy Order must be issued where “interception” occurs 5

Exceptions to warrant requirement If wiretapping (and don’t have court order), committing a federal felony (5 years imprisonment) unless fall within one of 4 exceptions –Provider protection exception –Consent exception –Inadvertently obtained information –Computer trespass exception 6

Provider Protection Exception Interception authorized to protect provider (18 U.S.C. 2511(2)(a)(i)) Authorizes interception or disclosure “while engaged in any activity which is a necessary incident to the rendition of service or the protection of the rights or property of the provider of the service.” Provider can give results of past monitoring to law enforcement 7

Wiretaps-Consent exception Consent of party –Banner –Terms of service agreement Consent of system operator -- No! Dangerous to rely on implied consent forever –When need a T-III decided on a case-by-case basis 8

Inadvertently Obtained ECS provider may also disclose a communication to law enforcement if communication was inadvertently obtained and appears to pertain to the commission of a crime. –18 U.S.C. 2511(3)(b) 9

The Computer Trespasser Exception Solution: new exception to Title III at 18 U.S.C. 2511(2)(i) (Subject to 4-year sunset provision) –“Computer trespasser” defined (18 U.S.C. 2510(21)) Person who accesses “without authorization” Definition continues: “and thus has no reasonable expectation of privacy…” –Excludes users who have “an existing contractual relationship” Congress worried about violations of terms of service There is an opportunity to gain consent from such users Without it, possible constitutional problems 10

Limits of the New Exception Interception under this exception requires: –Consent of the owner –Under color of law –Relevant to an investigation –Cannot acquire communications other than to/from the trespasser May combine this authority with other exceptions, such as consent 11

Stored Communications and Transactional Records 12

Stored Electronic Communications Act Dictates how and when LE may obtain information from Internet Service Providers, Telcos, other computing service providers –Enacted in 1986 as part of “ECPA” –Codified at 18 USC 2701 et seq –Modified (slightly) by Patriot Act 13

Government Access to Customer Communications and Records These provisions apply only to info held on provider’s system, not to standalone PC Content of communications vs. non-content –content unopened vs. opened –non-content transactional records vs. subscriber information Basic rule: content receives more protection 14

Stored Electronic Communications Act - Overview Covers 3 categories of information Held by ECS or RCS -- –Content –Basic subscriber information –Transactional Records (everything else) Substantive provisions –a. When services may disclose –b. When services must disclose Remedies 15

Stored Electronic Communications Act - Coverage Three categories of information (18 U.S.C. Sec. 2703): Content Basic subscriber information Transactional Records (everything else) 16

Remedies Civil damages exclusively (2707, 08) No suppression remedy for non- constitutional violation –but decision in McVeigh (gay Navy officer with AOL account) granted suppression remedy, voided administrative action (discharge) 17

Stored Electronic Communications: Key Terms “Electronic Communication Service Provider” “Remote Communications Service Provider” A B ECS A RCS 18

Provisions of the Stored Electronic Communications Act 18 USC 2701: Prohibits: –Accessing without or in excess of authorization; –A facility through which electronic communication services are provided; –And thereby obtain, alter, or prevent access to a wire or electronic communication; –While in electronic storage Misdemeanor 19

When ECS or RCS May Disclose (2702) If public, prohibited from voluntarily disclosing the content of stored electronic communications Exceptions: –consent –necessary to protect property of service provider –to law enforcement if contents inadvertently obtained, pertains to the commission of a crime If not public, not so constrained, as to any of the three classes of information 20

Requiring Disclosure of Information from ECS or RCS 2703: Three categories: Content Basic subscriber information Transactional Records (everything else) 21

Stored Wire and Electronic Communications Act - Content and voice mail in electronic storage –Which is: “Any temporary, intermediate storage of a wire or electronic communication” incidental to transmission, or intended to be a backup Once opened, no longer protected Protects customers and subscribers: the real party of interest 22

Obtaining Content of s For ECS, if unopened and in storage for less than 180 days, search warrant (2703(a)) –Warrant operates like a subpoena –Patriot Act gave nation-wide effect to warrants Must be issued by court having jurisdiction over the offense No notice to customer necessary 23

Obtaining Electronic Content Not In “Electronic Storage” What’s not in “electronic storage”? –opened –files (text, database, programs, etc.) As to this category, statute protects only materials stored with a provider “to the public” –excludes, e.g., private corporate networks –if provider isn’t public, investigator can use a normal subpoena to compel disclosure 24

Obtaining Content (cont.) For ECS if more than 180 days or for RCS –Warrant –Subpoena with notice May delay notice 90 days (2705) if show -- –destruction or tampering w/ evidence –intimidation of potential witnesses –otherwise seriously jeopardizing an investigation May extend delay an additional 90-days 25

Obtaining the Contents of Voice Mail Pre-Patriot Act: If unopened, obtainable only with a Title III order –§ 2703 inapplicable by its own terms Patriot Act included contents of voice mail into 2703(b) 26

Basic Subscriber Information Can be obtained through subpoena Gives you only: name, address, telephone toll billing records, telephone number, type of service provided, and length of service rendered Patriot Act added connection records, session times, and temp assigned IP addresses Do not subpoena “all customer records” 27

Transactional Records Not content, not basic subscriber information Everything in between –financial information (e.g., credit card) –audit trails/logs –web sites visited –identities of correspondents –cell site data from cellular/PCS carriers 28

Transactional Records Obtain through –Warrant –Consent of customer –Articulable facts order (can get non-disclosure order): “specific and articulable facts showing that there are reasonable grounds to believe that [the specified records] are relevant and material to an ongoing criminal investigation.” (2703(d) order) 29

Summary: Legal Process & ECPA Warrant –required for unopened Court order under § 2703(d) –opened or files (with prior notice) –transactional records Subpoena –opened or files (with prior notice) –basic subscriber info 30

Overview of 2703 processes for public ESPs 31

Process Can talk to ECS/RCS in advance about what you want, what they may have May request provider for 90 days, to “take all necessary steps to preserve records and other evidence in its possession pending the issuance of a court order or other process.” 2703(f) –Only for information already in their possession, not future information 32

Cable Problems 47 USC § 551. Protection of subscriber privacy Restricts dissemination by cable provider of “personally identifiable information” collected by cable operator – “Personally identifiable information”? –Restriction applies to PII collected as part of providing “other services” “Other services” include “wire or radio communications” provided using facilities of cable operator 33

Cable Problems -- Cont’d 47 USC § 551(h) Disclosure of information to governmental entity pursuant to court order A governmental entity may obtain personally identifiable information concerning a cable subscriber pursuant to a court order only if, in the court proceeding relevant to such court order-- (1) such entity offers clear and convincing evidence that the subject of the information is reasonably suspected of engaging in criminal activity and that the information sought would be material evidence in the case; and (2) the subject of the information is afforded the opportunity to appear and contest such entity's claim. 34

Patriot Act Cable Fix Added 47 USC 551(c)(2)(D) –ECPA governs access to cable Internet service –Provisions of Sec. 551 still govern access to traditional cable services 35

The Privacy Protection Act 36

Privacy Protection Act 42 USC 2000AA Response to Zucher v. Stanford Daily 37

Privacy Protection Act Protects material intended for dissemination to the public: –Work product (e.g., book in progress) Prepared for communication and intended for dissemination to the public (included impressions, conclusions, opinions, theories) –Documentary materials (materials used to produce “work product”) Defined as media which holds info used “in connection with” work product materials Includes e.g. photo/film/tape/disk. 38

Privacy Protection Act Must use a subpoena to obtain work product, documentary materials in the possession of a person reasonably believed to have a purpose to disseminate it. 39

Exceptions Allowing Use of Search Warrant/Seizure Contraband or fruits or instrumentalities of a crime Exigent circumstances Probable cause that person possessing such material has committed or is committing a criminal offense –Except if mere possession offense Except classified material or child pornography 40

The PPA in an Electronic Environment Anyone with a modem can be a publisher Problems of commingling, connections If need to seize protected materials, obtain DAAG approval--through CCIPS Subject to civil penalties, not suppression Guest v. Leis -- can seize PPA materials “incidental to lawful search” Be reasonable: The 300,000 lessons of Steve Jackson Games 41

WHERE TO GET MORE INFORMATION CCIPS phone number: Computer Crime Section’s page on the World Wide Web: or 42

43 Questions??? Use the discussion board, as usual…

44