SPYING ON THE MOB: UNITED STA TES V. SCARFO

Transcription

SPYING ON THE MOB: UNITED STA TES V. SCARFO
SPYING ON THE MOB: UNITED STA TES V. SCARFO - A
CONSTITUTIONAL ANALYSIS
Nathan E. Carrell
In this day and age, crime and technology have become entwined
concepts. Criminals have been using technology to avoid detection,
literally cloaking their business dealings through cryptography. In order
to compensate for these technological advances, law enforcement has
upped its own technological applications. From theuse of infrared
photography and DNA testing, to the advent of the Keystroke Logging
System, which decipers encryted data, law enforcement has taken a
proactice step towards catching tech savvy criminals. More advanced
technologies have begun to spring up that have less gliches. These new
technologies, particularly the Keystroke Logging System, have implicated
several constitutionalconcerns. This note discusses the applicationof the
Fourth Amendment "search and seizure" clause to these new technologies,
focusing on the competing privacy interests and law enforcement interests.
It then proceeds to recommend judicial and legislative solutions that will
better balance these interests.
Subtler and more far-reaching means of invading privacy have
become available to the Government. Discovery and invention have made
it possiblefor the Government, by means far more effective than stretching
upon the rack, to obtain disclosure in court of what is whispered in the
closet. ...
The progress of science in furnishing the Government with
means of espionage is not likely to stop with wiretapping. Ways may some
day be developed by which the government, without removing papers
from secret drawers, can reproduce them in court, and by which it will be
enabled to expose to a jury the most intimate occurrences of the home.
I. INTRODUCTION
As the use of technology in society rapidly advances, the practice of
criminals who seek to use this technology to avoid detection and arrest
increases exponentially. Organized crime groups and drug traffickers
utilize computers and the Internet to their advantage 2 while seeking to
cloak their communications using strong cryptography which makes
1. Olmstead v. United States, 277 U.S. 438, 473-74 (1928) (Brandeis, J., dissenting).
2. FBI Programs and Initiatives - Carnivore Diagnostic Tool, at http://www.fbi.gov/hq/
lab/carnivore/carnivore2.htm (last visited Feb. 10, 2002) [hereinafter Carnivore].
JOURNAL OF LAW, TECHNOLOGY & POLICY
[Vol. 2002
them undecipherable.3 Cryptographic software is easily accessible, and
criminals can utilize it in a variety of ways.4 Law enforcement, on the
other hand, has not stood idle to these developments.
Technological advances, including infrared photography and DNA
testing, have provided law enforcement officials with new devices to
assist in the detection of criminal activity.5 The Federal Bureau of
Investigation (FBI) has also evolved by expanding its arsenal of tools to
thwart criminal use of the Internet and cryptography. The FBI has
developed Carnivore - a tool to intercept e-mail and other electronic
communications passing through a data point at an Internet Service
Provider (ISP).6 Another tool in the FBI's repertoire is the Keystroke
Logger System (KLS) which monitors and records keystrokes entered
into a computer.7 This allows the FBI to access passwords entered via
keystrokes which are required for deciphering encrypted data. The FBI
is currently working on a software version of the KLS. This new
software, known as Magic Lantern, can be inserted into a suspect's
machine through a computer virus or a common network vulnerability.8
New technology in law enforcement results in new challenges for the
courts, not only in determining reliability of the evidence gathered, but
also in balancing society's interest in law and order with an individual's
constitutionally protected civil liberties.9 In a case of first impression, a
federal judge denied a motion to suppress evidence obtained utilizing the
KLS. l° The court found that a special warrant pursuant to Title III" is
not needed for the KLS because the method used to obtain evidence is
not regulated under the statute. 2 The court also rejected an argument
3. Statement for the Record of Donald M. Kerr, Assistant Director Laboratory Division
Federal Bureau of Investigation on Internet and Data Interception Capabilities Developed by the
FBI, Before the United States House of Representatives, The Committee on the Judiciary,
Subcommittee
on
the
Constitution
$
1
(July
24,
2000),
available
at
http://www.fbi.gov/congress/congress00/kerr072400.htm (July 24, 2000) [hereinafter Kerr House
Statement].
4. Overview of PGP, at http://www.pgpi.org/doc/overview/ (last visited Feb. 10, 2002). Pretty
Good Privacy (PGP) is free for download at http://www.pgpi.org. Id. PGP is used primarily for
encryption of e-mails, however it can be used to encrypt disk partitions and secure phone calls. Id.
5.
John E. Theuman, J.D., Annotation, Constitutionality Of Secret Video Surveillance, 91
A.L.R.5th 585, § 2 (2001).
6. Manton M. Grier, Jr., The Software Formerly Known As "Carnivore": When Does E-Mail
Surveillance Encroach Upon A Reasonable Expectation of Privacy?, 52 S.C. L. REV. 875, 875 (2001).
7. Jane Black, Needed: Wiretap Laws for a Wired World, BUSINESSWEEK ONLINE (Aug. 23,
2001), availableat http://www.businessweek.com/bwdaily/dnflash/aug200l/nf20010823-686.htm.
Sullivan, FBI Software Cracks Encryption Wall (Nov. 20, 2001), at
8. Bob
http://www.msnbc.com/news/660096.asp#BODY.
9.
10.
11.
Theuman, supra note 5, § 2.
United States v. Scarfo, 180 F. Supp. 2d 572 (D.N.J. 2001).
Title III is the common term for wiretapping statutes located at 18 U.S.C. §§ 2510-22.:
WAYNE R. LAFAVE ET AL., CRIMINAL PROCEDURE § 4.2(a) (3d ed. 2000).
12.
Scarfo, 180 F. Supp. 2d at 581.
SPYING ON THE MOB
No. 1]
13
that using the KLS constituted a general search
in violation of the
4
requirement.
Fourth Amendment's particularity
This note begins with a short discussion concerning criminal use of
technology in modern society and the constabulary's response in
developing tools to combat this high-tech criminal activity. I then offer a
brief discussion of Fourth Amendment law implicated by use of the KLS
in law enforcement, including traditional search warrants, Title III, and
non-audio video surveillance.
In the analysis section, I discuss
constitutional and other legal implications associated with the application
of the KLS to gather evidence in light of previous legislative and judicial
decisions. Finally, I propose possible judicial and legislative solutions to
better protect privacy interests while preserving law enforcement's
ability to fight crime.
II.
CRIMINAL ACTIVITY AND STRONG CRYPTOGRAPHY
A. Criminal Use of Technology
The use of the Internet and computers is growing rapidly and is
paralleled by the exploitation of networks, computers "and databases to
commit crimes and to harm the safety, security, and privacy of others."' 5
"[T]errorists, spies, hackers, and dangerous criminals are increasingly
using computers ... to carry out their heinous acts."' 6 Criminals can use
computers to 1) transmit child pornography; 2) steal customer
information, including credit card and social security numbers, from
businesses; 3) commit large-scale frauds; 4) and plan terrorist strikes
around the world.17 One tool criminals use to safeguard their data and
communications is encryption. 8 Encryption gives Internet users a
heightened degree of privacy in Internet communications and a data
storage capacity unequaled in the physical world. 9 One of the most
common encryption methods used is Pretty Good Privacy (PGP). PGP
13.
14.
Id. at 577-78.
U.S. CONST. amend. IV.
15. Kerr House Statement, supra note 3.
16. Statement for the Record of Donald M. Kerr, Assistant Director Laboratory Division
Federal Bureau of Investigations on Carnivore Diagnostic Tool, Before the United States Senate. The
Committee
on
the
Judiciary
2
(Sept.
6,
2000),
available
at
http://www.fbi.gov/congress/congress00/kerr090600.htm [hereinafter Kerr Senate Statement]..
17. Kerr House Statement, supra note 3. Suspected shoe-bomber Richard Reid left data on his
laptop connecting him to Al Qaeda and sent e-mails from Internet cafes. Ben Taylor, Shoe Bomber
Link to Al Qaeda Terror Trail, DAILY MAIL, Feb. 4, 2002, available at 2002 WL 3310294. "Ramzi
Yousef, the mastermind of the World Trade Center bombing, stored detailed plans to destroy United
States airliners on encrypted files on his laptop computer." Kerr Senate Statement, supra note 16.
18.
Edward L. Allen, CriminalsAre Tech-Savvy, USA TODAY, Aug. 30, 2001. at 12A. In United
States v. Scarfo, Nicodemo Scarfo, Jr. encrypted his gambling files using Pretty Good Privacy (PGP).
180 F. Supp 2d at 581 (D.N.J. 2001).
19. Orin S. Kerr, The Fourth Amendment In Cyberspace: Can Encryption Create A "Reasonable
Expectation of Privacy?," 33 CONN. L. REV. 503, 503 (2001).
JOURNAL OF LAW, TECHNOLOGY & POLICY
[Vol. 2002
uses a two key system with a passphrase to encrypt plain text into
ciphertext, and to decrypt the ciphertext back to plain text. ° PGP is such
a strong cryptography that it has been said, ". . . even a billion computers
doing a billion checks a second
... [could] not decipher the result...
2
before the end of the universe." '
B. Strong Cryptography - Pretty Good Privacy
"Cryptography is the science of using mathematics to encrypt and
decrypt data. 2' 2 Two types of cryptography exist: conventional
cryptography and strong cryptography.2 3 Conventional cryptography,
also known as secret-key or symmetric-key encryption, utilizes one key
for both encryption and decryption. 4
PGP and other strong
cryptography methods used today utilize a two-key, or public-key,
system consisting of a public key, a private key and a passphrase Plain
text is encrypted into ciphertext, a mathematical algorithm, using the
public key. 26 The public key is shared with those who wish to send
encrypted data.27 Plain text can only be encrypted with the public key; it
cannot be decrypted. 28 To decrypt the ciphertext the corresponding
private key is needed. 29 Although they are related, the private key
cannot feasibly be mathematically deduced from the public key.3" Data,
which can be encrypted by anyone, can only be decrypted by the
possessor of the private key, thus ensuring the ability of one recipient to
maintain secure communications with multiple senders." This allows
20. How PGP Works, at http://www.pgpi.org/doc/pgpintro/
(last visited Feb. 10, 2002).
Ciphertext is the encrypted version of the readable plain text. Id.
21. Id. Experts estimate that it would take several million years for a supercomputer to break an
Internet communication encrypted with a 128-bit key. Kerr. supra note 19. at 530 (citing BRUCE
SCHNEIER, APPLIED CRYPTOGRAPHY, 153 (2d ed. 1996)).
22. How PGP Works, supra note 20.
23. Id.
24. Id. Conventional cryptography is most useful for data that isn't going anywhere. Id.
However, if one wants to transmit data using conventional cryptography, privacy requires that both
the sender and recipient keep the key secret. Id.
25. ld.Keys are values that a cryptographic algorithm uses to produce a specific ciphertext. Id.
They are basically really large numbers made of zeros and ones. See Kerr, supra note 19, at 530. The
length of a key represents the level of encryption where for example a 256-bit key contains a
combination of 256 zeros and ones and has 11,579,000,000,000,000,000,000,000,000,000,000,000,000
possible key combinations. Id.
26. How PGP Works. supra note 20. A session key is created and the file is then encrypted with
the session key which itself is encrypted with the public key. Id.
27. Id. A particular user gives his public key to all with whom he communicates. d.
28.
Id.
29. Id. The private key is kept secret to a specific user and is not shared with anyone, unlike
conventional cryptography. Id. The private key is used to decrypt the encrypted session key and the
session key is used to decrypt the data. id.
30. Id. The public and private keys are mathematically related, and given enough time and
computing power, the private key could be derived from the public key. Id. The user needs to
consider the resources of those who may try to "crack" his encryption when choosing the size of the
key. Id. A very large key could take years to decipher, but it takes longer to encrypt the data. Id.
31.
Id.
No. 11
SPYING ON THE MOB
secure data to be transmitted over the Internet or any other data channel
in which the secure data is encrypted by the sender so that only the
recipient can decrypt it. This eliminates the need for sharing passwords
and decreases possible security breaches associated with conventional
cryptography.32 Public and private keys are kept on the computer in
encrypted form (keyrings).33 Because the private key can be long and
complicated, it is encrypted on the recipient's machine using a
passphrase or secret key.34 The passphrase can be any one of a number
of combinations of uppercase and lowercase letters, numbers, and
punctuation marks.35 A passphrase is generally longer than a password
so it is less susceptible to dictionary attacks and other standard codebreaking attempts. 36 The advent of two-key encryption has enabled
criminals to encrypt and transfer files without divulging their passwords
or passphrases to others who might eventually share that information
with law enforcement personnel.
III.
HIGH-TECH LAW ENFORCEMENT
TOOLS
EMPLOYED BY THE
FEDERAL BUREAU OF INVESTIGATIONS
"In recent years, the FBI has encountered an increasing number of
criminal investigations in which the criminals use the Internet to
communicate with each other or to communicate with their victims."37
Because many Internet Service Providers (ISPs) lacked the ability to
filter communications to identify a particular subject's messages while
excluding all others, the FBI developed a diagnostic tool known as
Carnivore." Carnivore allows the FBI to intercept and collect specific
data at an ISP pursuant to a federal wiretap order.39 The data collected is
necessarily narrow to comply with stringent restrictions under federal
wiretapping laws." Some privacy advocates question whether Carnivore
only gathers data authorized under the wiretap order or whether it
unnecessarily encroaches upon an individual's reasonable expectation of
privacy.4 The events of September 11, 2001, have prompted the CIA to
seek authorization for the interception of all e-mails sent from overseas
32. Id.
33. Id. Public and private keys are kept in separate files known as keyrings. Id. All public keys
are kept in the public keyring and private keys are stored in a separate private keyring. Id.
34. Id.
35. Id.
36. Id. A passphrase is longer than a password, which makes it less susceptible to programs
utilized to crack passwords. Id. A passphrase should consist of many words with upper and lower case
letters, numerics, and punctuation and it should be difficult for you to forget but hard for others to
figure out. Id.
37. Carnivore, supra note 2.
38. Id.
39. Id.
40. Id.
Because what is collected is encompassed by the definition of "electronic
communications" in the wiretapping statutes, federal authorities must comply with the applicable
statutory requirements. 18 U.S.C. §§ 2510-22 (2001).
41. Grier. supra note 6. at 375.
JOURNAL OF LAW, TECHNOLOGY & POLICY
[Vol. 2002
to the United States.42 However, interception of data is fruitless if the
sender and recipient utilize strong cryptography such as PGP, described
above.
Due to the difficulty of decrypting ciphertext files, the government
has countered these encryption techniques with a Keystroke Logger
System (KLS).43 Although the precise technical specifications are
unavailable," the KLS records keystrokes entered into a computer
keyboard when the computer's modem or other communication devices
are not in use.45 The KLS consists of a combination of firmware,
software and/or hardware, and is embedded into the host computer to
The KLS program examines each keystroke
conceal its existence.'
individually, and if no communications device is being used
simultaneously, the keystroke is recorded. This eliminates the possibility
of recording information that is being transmitted through or in route to
a modem or other communication device.47 This system has allowed the
government to utilize traditional search warrants,48 thereby avoiding
more stringent wiretapping statute requirements. 9 Each component of
the KLS produces an "output," all of which are combined to produce the
composite output of the KLS.5 °
Because of the secrecy required in gathering data, installation of the
KLS must be done surreptitiously. 5 Secret installation, however, is not
without risks. To install the system onto a suspect's computer, the FBI
must enter the premises by breaking and entering pursuant to a valid
warrant. The suspect may be in the premises or return while the officers
are installing the KLS, making this mode of gathering evidence
inherently more dangerous than traditional search warrants.
To avoid the risks associated with installing the KLS onto a
suspect's computer, the FBI is developing a software version of the KLS
known as Magic Lantern, which utilizes a computer virus for remote
installation on a suspect's machine to obtain the suspect's password or
42. Jeremy Campbell, Less Power To The CIA People, EVENING STANDARD- LONDON, Jan. 22,
2002, available at 2002 WL 11331577.
43. Jonathan Krim, High-Tech FBI Tactics Raise Privacy Questions,WASH. POST, Aug. 14, 2001,
at Al, available at 2001 WL 23186852.
44. The FBI has successfully kept the technical details secret pursuant to the Classified
Information Procedures Act. United States v. Scarfo, 180 F. Supp. 2d 572, at 575-76, 580-81 (D.N.J
Dec. 26,2001).
45. Id. at 582.
46. Id. at 577
47. Id. at 582.
48. See Order Granting Application for Surreptitious Entry, United States v. Scarfo, Criminal
No. 00-404 (D.N.J. May 8, 1999), availableat http:llwww2.epic.org/cryptolscarfo/order_5-99.pdf.
49. 18 U.S.C. §§ 2510-2522 (1994).
50. Affidavit of Randall Murch at 5, United States v. Scarfo, 180 F. Supp. 2d 572 (D.N.J. Dec. 26,
2001), available at http://www.epic.org/crypro/scarfo/murch-aff.pdf Murch Aff. [hereinafter Murch
Aff.]
51. Leo A. Dawson, Jr. Affidavit in Support of Application for Surreptitious Entry 1 62, at 33,
United States v. Scarfo, 180 F. Supp. 2d 572 (D.N.J. Dec. 26, 2001), availableat http://www2.epic.org/
crypto/scarfo/affidavit_5_99.pdf.
No. 1]
SPYING ON THE MOB
passphrase 2 This program could be e-mailed to the suspect by relatives
or friends or installed through network vulnerabilities in the computer
system, thereby eliminating the need for a physical break-in and the
dangers associated therewith." Like the KLS, Magic Lantern records
keystrokes typed on the computer, but it is also capable of e-mailing an
output data file back to law enforcement personnel.54 However, Magic
Lantern inherently runs the risk that anti-virus software will identify and
destroy the virus, rendering the Magic Lantern ineffective. Although it is
rumored that some anti-virus software developers in the security
software industry will assist the FBI, "[m]ajor anti-virus software
companies have vehemently denied any knowledge... saying they would
not do anything to compromise the security of their customers."55
Sophos Anti-Virus Inc. of Wakefield, Massachusetts, has assured its
customers that they rate higher than the FBI so no such loophole would
be left in their software to accommodate the government program.56
Although the KLS and Magic Lantern law enforcement tools are
fairly recent developments, hardware and software versions of 5a7
keystroke logging system are commercially available on the Internet.
Although one cannot purchase a version that is transmitted by a
computer virus, most of the other functions performed by the KLS and
Magic Lantern systems are currently available.
IV.
OVERVIEW: UNITED STATES V. SCARFO AND RELATED LAW
A. Background: United States v. Scarfo
Nicodemo Scarfo, a New Jersey mob boss and son of the notorious
and now imprisoned Nicodemo Scarfo, Sr. ("Little Nicky"), used PGP to
encrypt computer records of alleged illegal gambling operations." In
January of 1999, pursuant to a search warrant, the FBI seized Scarfo's
52. Sullivan, supra note 8.
53. Jovi Tanada Yam, [email protected] Worst Tech Product of 2001?, Bus. WORLD (PHILIPPINES),
Dec. 27, 2001, available at 2001 WL 31372969.
54. Id.
55. Id. The anti-virus industry has many serious concerns that programs such as Magic Lantern
could be a tool for hackers as well as for the government. William Jackson, Industry Balks at FBI
Plans for a Back Door, GOVT COMPUTER NEWS, Jan. 7,2002, available at 2002 WL 9596476.
56. See Yam, supra note 53.
57. Investigator 4 by WinWhatWhere.com has the "ability to invisibly monitor and record all
computer activity including keystrokes...." WinWhatWhere Investigator, at
http://www.winwhatwhere.conw3i4/index.htm (last visited Aug. 30, 2002). KeyGhost.com sells
hardware including connectors and keyboards that contain flash ROM that store keystrokes for future
downloads.
KeyGhost KeyLogger: Tiny hardware key loggers record keystrokes at
http://www.keyghost.com (last visited Aug. 30, 2002). KeyLogger.com sells a software version similar
to Magic Lantern. KeyLogger.com Software Products, at http://www.keylogger.com/products.htm
(last visited Aug. 30, 2002). KeyLogger.com also offers a StealthMail Program, "an e-mail 'robot'
which sends out e-mails at pre-set time intervals with any file attachment." Id.
58. Dawson Aff., supra note 51 4, at 3, 1 28, at 30.
JOURNAL OF LAW, TECHNOLOGY & POLICY
[Vol. 2002
computer from his place of business.59 They recovered a "Factors" file
which was encrypted using the PGP program.6" After failing in their
attempts to decrypt the file, the FBI developed the Keystroke Logger
System.6 In May of 2000, the government sought and obtained a warrant
for surreptitious entry into the business operated by Scarfo to install the
KLS on his computer. 62 The warrant was for a thirty-day period, and
allowed entry and reentry as often as possible to recover data and
perform maintenance on the KLS. 63 The officers entered the business
four times and recovered twenty-seven pages of text, including Scarfo's
passphrase, which was suspiciously the very last thing recorded by the
KLS. 6 The passphrase was used to decrypt data, which revealed a record
of gambling and loansharking operations maintained by Scarfo. 65 Based
on that information, in June 2000, a three-count indictment was returned
by a federal grand jury, which led to the arrest of Nicodemo Scarfo and
Frank Paolercio.66 Scarfo filed a motion for discovery requesting the
technical details of the KLS. 67 The judge ordered the government to file
a report outlining the technical details of the KLS. 68 The government
invoked the Classified Information Procedures Act,69 claiming that
disclosure of the technical specifications of the KLS would cause
identifiable damage to the national security of the United States. y° The
court then required the government to give an unclassified summary of
After reviewing all of the motions and
how the KLS operates.71
affidavits and holding an ex parte in camera hearing concerning the
technical details of the KLS, the court denied Scarfo's motion to suppress
the data collected by the KLS and denied Scarfo's motion for discovery
of the more detailed technical specifications of the KLS. y2 The court,
however did allow Scarfo discovery of the unclassified summary of how
59. Id.
60. 1d.
61. 1d.
62. See Order Granting Application for Surreptitious Entry, supra note 48.
63. Id.
64. Supplemental Brief of Defendant Nicodemo S. Scarfo, Memorandum of Law in Support of
Defendant's Position in Regard to Discovery, United States v. Scarfo, 180 F. Supp. 2d 572 (D.N.J.
2001) (No. 00-00-404). at http:llwww.epic.orglcryptolscarfolsup-suppress.mot.pdf.
65. Robert Rudolph, Lawmen Explain, In General, How They Cracked Scarfo Code, THE STARLEDGER (Newark. N.J.), Oct. 11, 2001, availableat 2001 WL 28898087.
66. Id.
67. Defendant's Motion for Discovery at 2, United States v. Scarfo. 180 F. Supp. 2d 572 (D.N.J.
2001) (Criminal No. 00-404), availableat http://www2.epic.org/crypto/scarfo/def disc mot.pdf.
68. Court Order Requiring Government to Disclose Details of KLS at 5. United States v. Scarfo,
available at
No.
00-404),
(Criminal
2001)
(D.N.J.
2d
572
F.
Supp.
180
http://www2.epic.org/crypto/scarfo/order_8_7_.01.pdf.
69. Pub. L. No. 96-456, 94 Stat. 2025. amended by Pub. L. No. 100-690, 102 Stat. 4396 (1988).
70. Affidavit of Neil Gallagher in Support of KLS Classification at 3, United States v. Scarfo, 180
available at
No. 00-404),
(Criminal
26. 2001)
Dec.
572
(D.N.J.
F.
Supp. 2d
http://www.epic.org/crypto/scarfo/gov-afLcipa.pdf.
71. Court Order Requiring Government to Disclose Details of KLSsupra note 68, at 4-5.
72. United States v. Scarfo. 180 F. Supp. 2d 572, 583 (D.N.J. Dec. 26. 2001). The court did allow
the defendants motion for discovery for other requested items including the unclassified summary of
the operation of the KLS. Id.
No. 1]
SPYING ON THE MOB
the KLS operates. Ultimately, Nicodemo Scarfo pled guilty, ending his
legal battle and delaying an adjudication of the issue by a federal
appellate court.7"
B. The "Keystroke Logging System" and TraditionalSearch Warrants
The use of KLS potentially implicates two important warrant
requirements under the Fourth Amendment: (1) the things to be seized
are to be particularly described; and (2) the warrant shall be limited
reasonably in time, place, and scope of execution, including notification,
when reasonable, to the occupant of the premises to be searched.
The particularity requirement stems from the Constitution, which
states "It]he right of the people to be secure ... against unreasonable
searches and seizures, shall not be violated, and no Warrants shall
issue ...[without] particularly describing the place to be searched, and
the persons or things to be seized."74 The Supreme Court has stated,
"[t]he requirement that warrants shall particularly describe the things to
be seized makes general searches under them impossible and prevents
the seizure of one thing under a warrant describing another."75 A
general warrant authorizes a general exploratory rummaging through a
person's belongings.76 "[N]othing is left to the discretion of the officers
executing the warrant."77 Additionally, states generally require the
police to give notice of their authority and purpose prior to executing a
8
search warrant. In Wilson v. Arkansas,"
a unanimous Court held "that
the common-law principle of announcement ... is an element of the
reasonableness inquiry under the Fourth Amendment."
The
announcement
requirement
serves several purposes, including
decreasing the potential for violence due to an unannounced breaking
and entering, protecting privacy by minimizing the chance of entry into
the wrong premises, and preventing physical destruction of property by
giving the occupant opportunity and time to admit the police."
However, in cases where there is a risk of evidence destruction or
physical harm to the police, the announcement requirement is
superceded"'
Traditional search warrants are normally executed at a specified
time and place in search of particular items. Police then seize items they
73. George A. Chidi, Jr., Mobster Nailed by FBI Keystroke Logger Pleads Guilty. IDG NEws
SERV., Mar. 1, 2002 at http://www.idg.net/idgns/2002/03/01/MobsterNailedByFBIKeystrokeLogger.
shtml.
74. U.S. CONST. amend. IV.
75. Marron v. United States, 275 U.S. 192. 196 (1927).
76. Coolidge v. New Hampshire, 403 U.S. 443, 467 (1971).
77. Marron, 275 U.S. at 196.
78. 514 U.S. 927, 930 (1998).
79. LAFAVE, supra note 11, § 3.4(h).
80. See Richards v. Wisconsin, 520 U.S. 385, 388 (1997) (recommending that exceptions to
knock-and-announce rule be determined on a case-by-case basis, and rejecting a blanket exception for
felony drug cases).
JOURNAL OF LAW, TECHNOLOGY & POLICY
[Vol. 2002
are searching for and any other illegal items in plain view. At the time of
a search, previously disposed or destroyed items- old mail, letters, or
hand-written notes - are not subject to seizure. Use of the KLS, in
contrast, is the equivalent of a continual search of one's personal items
over a specified period of time; even previously "deleted" letters or
typed notes are still capable of being seized per se. The KLS seizes
information that would not have been available under a traditional
search warrant if the suspect had destroyed physical papers or other
evidence prior to execution of the warrant. However, the KLS is limited
in time, place, and scope, in the sense that it only records keystrokes on a
particular computer for a particular time period authorized by the
warrant.
C. Olmstead and Title III
In Olmstead v. United States,81 the Supreme Court held that the
interception of messages on telephone lines was not a search within the
meaning of the Fourth Amendment because no houses were searched,
and because phone messages are intangible things which cannot be
seized. Concerned about intrusive, unwarranted invasions of privacy,
Congress enacted the Federal Communications Act of 1934,82 providing
that "no person not being authorized by the sender shall intercept any
communication and divulge the existence, contents, substance, purport,
effect, or meaning of such intercepted communication to any person."83
Through the passage of time it became clear that the fears expressed by
Justice Brandeis, dissenting in Olmstead, were becoming realities. 4
More sophisticated means of electronic surveillance were developed and
put into use.85 In 1967 the Supreme Court retreated from their original
position in Olmstead. In Berger v. New York,8 6 the Court held that a
state eavesdropping statute violated the Fourth Amendment. In Katz v.
United States,87 the Supreme Court held that use of recording devices to
intercept conversations from a public telephone booth was a violation of
the Fourth Amendment because it violated the defendant's "reasonable
expectation of privacy." These decisions made it clear that electronic
eavesdropping and wiretapping are also subject to the limitations of the
Fourth Amendment.88 A year later Congress amended the wiretapping
laws by enacting Title 11189 of the Omnibus Crime Control and Safe
81.
82.
277 U.S. 438 (1928).
48 Stat. 1103 (codified in 47 U.S.C. § 605 (2001)).
84.
85.
86.
87.
See Olmstead, 277 U.S. at 473-74 (Brandeis, J., dissenting).
LAFAVE, supra note 11,§ 4.1(c).
388 U.S. 41 (1967).
389 U.S. 347, 361 (1967) (Harlan, J.,
concurring).
88.
89.
LAFAVE, supra note 11, § 4.1(c).
Title III is the common name used for this legislation and subsequent legislation covering
83.
LAFAVE, supra note 11, § 4.1(b).
wiretapping. See id. at § 4.2(a).
No. 11
SPYING ON THE MOB
Streets Act. 90
However, this Act only protected oral or wire
communications of aural transfers.91 In 1986 Congress further amended
92
Title III with the Electronic Communications Privacy Act (ECPA).
"The principal purpose of the ECPA amendments was to extend to
'electronic communications' similar protections against unauthorized
interceptions that Title III had been providing for 'oral' and 'wire'
communications via common carrier transmissions."9 3 In November of
2001 Congress again amended sections of Title III to help prevent
terrorist activities against the United States.94 The 2001 amendments will
not be discussed in this paper because they primarily pertain to the
gathering of information relating to foreign intelligence and the national
security of the United States. Today's wiretapping laws embody an
evolution beginning with Olmstead and ends at a point that extends
beyond the traditional protections offered by the Fourth Amendment.
Title III warrants, which seek interception of oral or wire
communications, require authorization of a high-level Department of
Justice (DOJ) official prior to application by the local United States
Attorney's office.95 Title III warrants seek interception of electronic
communications and require the authorization of a government attorney
before the warrant application can be made to the judge.96 Unlike
traditional search warrants,9" Title III warrants cannot be issued by a
federal magistrate judge; they can only be issued by a federal district
court judge and certain authorized state judges.98 Interception of
communications is limited to situations where such interception may
provide, or has provided, evidence of certain delineated offenses.99
Applications for wiretapping authorization must show probable cause
and state with specificity and particularity details of the offense that has
been or will be committed, description of the nature and location of the
facility where the interception will take place, type of communications to
be intercepted, the identity of the person(s), if known, committing the
offense and whose communications are being intercepted."° Thus, the
90. Pub. L. No. 90-351,82 Stat. 197 (1968).
91. Id.
92. Pub. L. No. 99-508, 100 Stat. 1848 (1986).
93. Brown v. Waddell, 50 F.3d 285, 289 (4th Cir. 1995).
94. Uniting And Strengthening America By Providing Appropriate Tools Required To Intercept
And Obstruct Terrorism (USA PATRIOT) Act of 2001, Pub. L. No. 107-56, 115 Stat. 272 (2001).
95. 18 U.S.C. § 2516,2518 (2000).
96. 18 U.S.C. § 2516.
97. Traditional search warrants must be issued by a "neutral and detached magistrate."
Coolidge v. New Hampshire, 403 U.S. 443, 449 (1971). Under the Fourth Amendment the magistrate
does not necessarily need to be a lawyer or a judge, but "must meet two tests. He must be neutral and
detached, and he must be capable of determining whether probable cause exists for the requested
arrest or search." Shadwick v. City of Tampa, 407 U.S. 345, 350 (1970).
98. 18 U.S.C. § 2510(9).
99. 18 U.S.C. § 2516.
100. 18 U.S.C. § 2518(1). The application must also "state the applicant's authority to make such
application.., the identity of the ... officer making the application.., the officer authorizing the
application ... a full and complete statement as to whether or not other investigative procedures have
JOURNAL OF LAW, TECHNOLOGY & POLICY
[Vol. 2002
criminal wiretapping statutes "focus on gathering hard evidence" and not
Court orders have a thirty-day
on gathering general intelligence.'
maximum surveillance period and interceptions must terminate sooner if
the objectives are met. 11 2 Judges "may require reports to be made...
showing what progress has been made toward achievement of the
authorized objective and the need for continued interception.., at such
' 3 If extensions are necessary, they
intervals as the judge may require. 'lu
are allowed up to a maximum of an additional thirty days."~
The additional limitations and constraints imposed by Title III
evidence a Congressional intent to grant greater protections where
invasions of personal privacy are so intrusive. Advances in technology
have given society more efficient ways of communication, including
cellular, satellite, and Internet communications. These new methods of
communication are not entirely secure; each has vulnerabilities that
allow for intrusion. Much of what once was sent by regular mail is now
sent via e-mail, and yet an equivalent means to the Carnivore system
does not exist for intercepting mail sent through the United States Postal
Service. Despite these advances in technology to date, the statutory
exclusionary rule applicable to interception of oral and wire
communications has not been extended to electronic communications.""
Thus, any evidence obtained under a warrant seeking interception of
electronic communications that complies with the requirement of Title
III will not result in suppression of that evidence.
D. Video Surveillance
Video surveillance has been used more readily in the past decade by
law enforcement and private businesses that seek to protect themselves
from employee or customer misconduct." However, video surveillance
is considered far more intrusive than conventional investigative
techniques. 7 Because of its intrusive nature, the use of secret video
surveillance has often been challenged as a violation of the Fourth
Amendment's prohibition against unreasonable searches and seizures.
been tried and failed or why they reasonably appear to be unlikely to succeed if tried or to be too
dangerous ...a statement of the period of time for which the interception is required to be
a full and complete statement of facts concerning all previous applications...
maintained ...
involving any of the same persons, facilities, or places specified in the application, and the action taken
by the judge on each such application[.]" § 2518(1).
101. Carnivore, supra note 2.
102. 18 U.S.C. § 2518(5).
103. 18 U.S.C. § 2518(6).
104. 18 U.S.C. § 2518(5).
105. § 2515. Incorporation of electronic communications into the statutory exclusionary rule was
debated in the House of Representatives in H.R. 5018, The Electronic Communications Privacy Act of
2000. but inclusion was ultimately rejected. Summary of H.R. 5018, The Electronic Communications
Privacy Act of 2000. CENTER FOR DEMOCRACY & TECHNOLOGY- CYBER SECURITY DIVISION, Sept.
17, 2000. available at http://www.cdt.org/security/000927hr5018.shtml.
106.
107.
Theuman, supra note 5, § 2.
Id.
No. 1.]
SPYING ON THE MOB
The following discussion is applicable to silent video surveillance only, as
any video surveillance recording video and sound would require
compliance with Title III due to the interception of oral communications
and aural transfers."'
Courts generally reject the argument that use of secret video
surveillance is unconstitutional per se."' Courts vary as to what is
required for issuance of a warrant authorizing secret video surveillance,
however. Although secret video surveillance is not unconstitutional per
se, the Fourth Amendment's warrant requirement still applies to video
surveillance.""
Under certain circumstances, some courts allow
warrantless video surveillance."' Where a warrant is required, many
courts impose more stringent requirements, borrowing Title III's
provisions relating to the Fourth Amendment's particularity and
minimization requirements due to the increased invasion of privacy
imposed by the use of video surveillance." 2
For secret video surveillance, Torres and Biasucci borrow four
provisions of Title III: 1) the issuing judge must be satisfied that "normal
investigative procedures have been tried and have failed or reasonably
appear to be unlikely to succeed if tried or to be too dangerous;""' 3 2) the
warrant must contain "a particular description of the type of
communication sought to be intercepted, and a statement of the
particular offense to which it relates;"" 4 3) the period of interception
must not be "longer than necessary to achieve the objective of the
authorization, or in any event longer than thirty days" (extensions
permissible);" 5 and 4) the warrant must require the interception "be
conducted in such a way as to minimize the interception of
not otherwise subject to interception under [Title
communications
111].5511 6
108. 18 U.S.C. § 2510(2).
109. United States v. Torres. 751 F.2d 875 (7th Cir. 1984). See also United States v. Andonian.
735 F. Supp. 1469 (C.D. Cal. 1990).
110. United States v. Falls, 34 F.3d 674, 683 (8th Cir. 1994).
111. United States v. Cox, 836 F. Supp. 1189 (D. Md. 1993) (holding consensual video surveillance
did not violate the Fourth Amendment). See also State v. Clemmons, 81 Wash. App. 1003 (Div. 1996),
available at 1996 WL 146721 (holding that persons subjected to video surveillance had no reasonable
expectation of privacy).
112. Torres, 751 F.2d at 883-84. See also United States v. Biasucci, 786 F.2d 504, 507-12 (2d Cir.
1986).
113. 18 U.S.C. § 2518(3)(c).
114. 18 U.S.C. § 2518(4)(c).
115. 18 U.S.C. § 2518(5).
116. Id.
JOURNAL OF LAW, TECHNOLOGY & POLICY
[Vol. 2002
V. DISCUSSION
A. The "Keystroke Logger System" and the Classified Information
ProceduresAct
Federal law enforcement encompasses numerous organizations,
including the Federal Bureau of Investigation, Central Intelligence
Agency, National Security Agency, Immigration and Naturalization
Service, Drug Enforcement Agency, and the Bureau of Alcohol,
Tobacco, and Firearms. As one might expect, criminal investigations can
overlap from one organization to another. Methods employed to fight
crime and gather evidence are also shared among departments. Many
groups, especially those operating internationally, use sensitive tools and
clandestine procedures to gather evidence and information.
Full
disclosure of such operations could jeopardize the safety and well-being
of men and women serving the United States abroad. When secret
operations and techniques are employed in domestic law enforcement
operations, however, disclosure of the methods employed and their
function is essential in determining whether a suspect's constitutional
rights have been violated.
In Scarfo's case, the Federal District Court for the District of New
Jersey found that operating the KLS while the computer's modem and
communications devices were inactive rendered Title III inapplicable. 17
The Court, however, did not allow the defendants' motion for discovery
of the technical details of the KLS. "8 The government's refusal to
release the technical details fails to ensure that no electronic
communications are being intercepted." 9 Even assuming electronic
communications are being intercepted, under the law as it exists today,
they would not be subject to the statutory exclusionary rule. 2 ° In Kyllo
v. United States, 2' the Supreme Court extensively reviewed the
technology involved and determined that its application to the defendant
violated the Fourth Amendment.
Nicodemo S. Scarfo and Frank Paolercio were denied the
opportunity to discover how the KLS operated.12 ' The government
successfully argued that it has the right to keep information classified 23
117. United Stated v. Scarfo, 180 F. Supp. 2d 572, 582 (D.N.J. Dec. 26, 2001).
118. Id.
119. Id.
120. 18 U.S.C. § 2515 ("Whenever any wire or oral communication has been intercepted, no part
of the contents of such communication and no evidence derived therefrom may be received in
evidence in any trial, hearing, or other proceeding .... ).
121. 533 U.S. 27 (2001). In Ky~lo, the Court evaluated the technology involved in a FLIR
(forward looking infra red) device used by law enforcement officers to locate suspect marijuana
harvesting in personal residences, implicating the defendant. Id.
122. United States v. Scarfo, 180 F. Supp. 2d 872,580-81.
123. Id.
No. 1]
SPYING ON THE MOB
under the Classified Information Procedures Act (CIPA).'24 Without
technical specifics, though, there is no assurance that the system itself is
not intercepting keystrokes contemporaneously with modem operations.
However, the Supreme Court in Kyllo indicated that one reason they
deemed the intrusion a violation of the Fourth Amendment was that the
technology was not widely available commercially in the United States.'25
Software and hardware versions of the type the KLS used against Scarfo
are readily available on the Internet.'2 6 In Scarfo, the Court held an ex
parte in camera hearing to review the technical details of the KLS and
found that allowing disclosure would cause identifiable damage to the
national security of the United States.'27 The district court reasoned that
CIPA "strikes a balance between national security interests and a
criminal defendant's right to discovery by allowing for a summary which
meets the defendant's discovery needs."' 28 The defendants were granted
the Murch Affidavit - the unclassified summary of the KLS. 2 9 But the
Murch Affidavit was merely a statement that the KLS did not record
keystrokes while the modem was operational. 3
This was a highly
questionable proposition since the output of the KLS (which was
authorized for sixty days) was twenty-four pages of text, and the very last
thing typed was the passphrase sought by the FBI.'
The government's argument of necessity for national security
interests is refutable. In today's high-tech environment, technology
dominates the intelligence arena, any foreign nations or subjects who
suspect that the KLS is being used to spy on them will now be analyzing
their computers for aberrations in hardware, firmware or software that
would indicate the presence of the KLS. Discovery of its presence is
most likely inevitable.
Should the government be able to spy on its own citizens while
denying adversely affected citizens an opportunity to examine the
technology used to determine whether or not their constitutional rights
have been violated? When the federal government, out of concern for
national security, utilizes technology to spy, the interest in protecting the
constitutional rights of citizens adversely affected should outweigh any
national security interest. Without such a rule, the government would be
virtually unrestrained in its use of spy technology in domestic law
124. Classified Information Procedures Act, Pub. L. No. 96-456, 94 Stat. 2025 (1980), amended by
Pub. L. No. 100-690, 102 Stat. 4396 (2002).
125. Kyllo, 533 U.S. at 40.
126. See WinWhatWhere Investigator, supra note 57.
127. Scarfo, 180 F. Supp. 2d at 575.
128. Id. at 583.
129. Id.
130. Murch Aff., supra note 50, at 5-6.
131. Memorandum of Law in Support of Defendant's Position in Regard to Discovery, supra note
64. The probability of such an occurrence over a broad length of time is very low, coupled with the
low probability that the file was opened only for the sake of opening it and that nothing else was typed
along with the fact that only twenty-four pages of text were recovered over a sixty-day period. Id.
JOURNAL OF LAW, TECHNOLOGY & POLICY
[Vol. 2002
enforcement, subject only to review through ex parte in camera hearings
in which a member of the judiciary must evaluate what is often very
complex technology to determine whether a defendant's constitutional
rights have been violated. Additionally, because the defendant takes no
part in the hearing, that which is presented for evaluation by the i-udge is
solely what is set forth by the government. Such a scheme could
potentially result in an abuse of power, ultimately denying those
adversely affected the opportunity to conduct a thorough review of the
technical details to determine if their rights guaranteed by the
Constitution are violated. Adopting a rule requiring disclosure would
not dampen the effectiveness of the government's ability to protect
national security; rather, it would merely limit the government's use of
more intrusive tools in the domestic arena to those which the
government is willing to disclose to the general public. Essentially, the
government would be forced to choose only those techniques which are
not violative of the constitutional rights guaranteed to every person in
the United States. Although this could have an adverse effect on law
enforcement in the United States by enabling criminals to work around
such technology, this would not be the first instance in which criminal
elements have found ways to evade the authorities and circumvent
capture."'
B. The "Keystroke Logger System" and Title III
As discussed above, Title III warrants for electronic surveillance
have much more stringent requirements than traditional search
warrants. 33 However, Title III warrants apply only to wire, oral, or
electronic communications as they are statutorily defined. 34 Wire
communication includes only aural transfers via wire, cable, or other
similar connection between two points."5 "Oral communication" means
any oral communication by a person exhibiting an objective expectation
of privacy; yet it does not include electronic communications.'36 18
U.S.C. § 2510 defines electronic communications as, "any transfer of
signs, signals, writing, images, sounds, data, or intelligence of any nature
transmitted in whole or in part by a wire, radio, electro-magnetic,
photoelectronic or photooptical system that affects interstate or foreign
commerce, but does not include" any oral or wire communications,
communications via a tone-only paging device, any tracking device
communications, and electronic funds transfer information stored with a
132. Criminals use encryption and technology to get around current law enforcement techniques
as evidenced by United States v. Scarfo.
133. See supra notes 85-104 and accompanying text.
134. 18 U.S.C. § 2510 (2000).
135. Id. § 2510(1).
136. Id. § 2510(2).
SPYING ON THE MOB
No. 1.]
financial institution.'37 Keystrokes are neither oral communications nor
aural transfers. Therefore, if Title III is applicable, these keystrokes must
be electronic communications, requiring that they be transferred by a
In Scarfo, the government
system affecting interstate commerce.'
successfully argued that recorded keystrokes typed on a computer
without active communications does not constitute an interception of
electronic communications under Title III. 9
The government took the position in Scarfo that data collected by
the KLS does not affect interstate commerce nor is it intercepted because
the modem is inactive while the keystrokes are recorded. 4 " One could
argue this position is flawed in at least two respects. First, a user can
queue an e-mail and send it at a later time. A user may wish to type his
e-mails and messages, connect to the Internet, and then send them at
once to minimize interruption of his phone service. These e-mails would
be intercepted and recorded by the KLS because they are not
contemporaneous with modem operation. Second, many users may wish
to communicate via e-mails with attachments rather than using the
framework of the e-mail program itself. These keystrokes would also be
recorded, even though they would be later e-mailed through the Internet.
To protect e-mails or attachments typed during modem operation and to
refuse protection for e-mails typed prior to connecting to the Internet is
an unwarranted distinction that frustrates the purpose of the ECPA. 4'
However, in Scarfo, the government successfully argued that because the
data recorded by the KLS is not being transmitted contemporaneously
through a modem or other communications device, the data is not
intercepted under Title III.42 The government cites numerous cases
applying the contemporaneous interception standard set forth in United
States v. Turk.'43 However, the sources cited all reflect a situation of
In fact, one case cited by the
post-transmission interception.'"
137.
Id. § 2510(12).
138.
Id.
139. United States v. Scarfo, 180 F. Supp. 2d 572, 582 (D.N.J. Dec. 26, 2001).
140. Brief of the United States in Opposition to Defendant Scarfo's Pretrial Motions at 25-29,
United States v. Scarfo, 180 F. Supp. 2d 572 (D.N.J. Dec. 26, 2001) (No. 00-404). available at
http://www2.epic.org/crypto/scarfo/gov-brief.pdf.
141.
Brown v. Waddell, 50 F.3d 285, 289 (4th Cir. 1995).
142. Brief of the United States in Opposition to Defendant Scarfo's Pretrial Motions, supra note
140.
143. 526 F.2d 654, 659 (5th Cir. 1976) (concluding that "no new and distinct interception occurs
when the contents of a communication are revealed through the replaying of a previous recording").
144. Brief of the United States in Opposition to Defendant Scarfo's Pretrial Motions, supra note
140 (citing Steve Jackson Games, Inc. v. United States Secret Service. 36 F.3d 457 (5th Cir. 1994));
United States v. Meriwether, 917 F.2d 955 (6th Cir. 1990); United States v. Turk. 526 F.2d 654, 658 (5th
Cir. 1976); Fraser v. Nationwide Mutual Insurance, 135 F. Supp. 2d 623 (E.D. Pa. 2001): Eagle
Investment v. Tamm, 2001 WL 576133 (D. Mass. 2001); Wesley College v. Pitts. 974 F. Supp. 375, 387
(D. Del. 1997); Bohach v. Reno, 932 F. Supp. 1232 (D. Nev. 1996); United States v. Reyes, 922 F.
Supp. 818 (S.D. N.Y. 1996): Payne v. Norwest, 911 F. Supp. 1299 (D. Mont. 1995): United States v.
Moriarty, 962 F. Supp. 217 (D. Mass. 1994); Lopez v. First Union. 129 F.3d 1186 (11 th Cir. 1997).
JOURNAL OF LAW, TECHNOLOGY & POLICY
[Vol. 2002
government, Fraser v. Nationwide Mutual Ins. Co.,'4 5 is detrimental to
their argument that Title III does not apply to the KLS. In Fraser the
Court stated, "[r]etrieval of a message from storage while it is in the
'
course of transmission is 'interception' under the Wiretap Act."146
In
another case distinguished by Fraser, the Ninth Circuit held that the
contents of a secure website were "'electronic communications' in
intermediate storage that are protected from unauthorized interception
'
under the Wiretap Act."147
The Court in Konop also stated, "[a]n
electronic communication in storage is no more or less private than an
electronic communication in transmission." The KLS does not retrieve
stored data; it intercepts data as it is entered. Analogizing to Fraserand
Konop, if retrieval of intermediate storage is interception then a fortiori
retrieval of the data as it is entered prior to and for the purpose of
transmission is also interception. Queued e-mails and files meant for
immediate e-mail attachment should fall under the protections of Title
III. Data storage, however, is not subject to the statutory exclusionary
rule. Thus, if the court were to determine such queued e-mails were
"data storage," they would not be subject to exclusion, provided that the
requirements of Title III were met.'48 The KLS, as applied in Scarfo,
does not exclude this type of information, therefore Title III should be
applicable in spirit if not literally.
The definition of "electronic communications" is ambiguous as to
which term the phrase "affects interstate or foreign commerce" applies.'49
This denotation could be construed as modifying the transfer of data, the
system used to transfer data, or both. The government's position in
Scarfo reflects its desire to "have its cake and eat it too." The
government's interpretation of Title III would require the transmission
to affect interstate commerce. A literal reading of the statute, however,
suggests a more plausible interpretation requiring that the transmission
be sent by a system affecting interstate commerce. 5 ' Congress regulates
criminal activity primarily under the authority granted to them by the
Commerce Clause of the Constitution. 5 ' The government usually seeks
an expansive definition of what affects interstate commerce, when a
criminal statute is challenged on the basis that Congress has exceeded its
power granted by the Commerce Clause.'
Consider the following
145. 135 F. Supp. 2d 623 (E.D. Pa. 2001).
146. Id. at 635.
147. Konop v. Hawaiian Airlines, Inc., 236 F.3d 1035 (9th Cir. 2001), withdrawn, Konop v.
Hawaiian Airlines, Inc., 262 F.3d 972 (9th Cir. 2001).
148. See, e.g., United States v. Reyes, 922 F. Supp. 818 (S.D.N.Y. 1996).
149.
150.
See 18 U.S.C. § 2510 (12) (2000).
Id.
151. U.S. CONST. art. 1, § 8, cl. 3.
152. See United States v. Kallestad, 236 F.3d 225,227-31 (5th Cir. 2000) (holding Congress has the
power under the Commerce Clause to regulate child pornography because it is inherently a national
market and that defendant's film had traveled in interstate commerce satisfying the jurisdictional
element). See also United States v. Santiago, 238 F.3d 213, 215 (2d Cir. 2001) (affirming defendant's
conviction for possession of a firearm that has traveled in interstate commerce by a felon); United
No. 1]
SPYING ON THE MOB
scenario: in Scarfo's case a Title III warrant was successfully obtained for
use of the KLS but Nicodemo Scarfo and Frank Paolercio challenge the
constitutionality of the KLS as applied to their case as beyond the power
granted to Congress under the Commerce Clause. In this hypothetical,
there is no doubt that the government would seek to uphold the
regulation as a valid exercise of the Commerce Power. It would argue
that Scarfo's computer contains a modem, which has been connected to
the Internet at intermittent times,153 and a computer used to connect to
the Internet is without a doubt a system that affects interstate commerce.
Courts have frequently upheld federal criminal statutes using a
jurisdictional hook, requiring only that a physical object has traveled in
interstate commerce."' In such cases, the government would inevitably
argue for a broad construction of the phrase "interstate commerce".
Arguing that Scarfo's single computer has an inconsequential or minimal
and attenuated effect on interstate commerce would also fail. Applying
the principles of United States v. Lopez 55 and Wickard v. Filburn,5l 6 a
high percentage of commercial products, that travel in interstate
commerce, fall within the congressional regulation power due to the
potential aggregate effect of all like products on interstate commerce (an
argument frequently relied on to uphold federal legislation rooted in the
Commerce Clause).
In Scarfo, the government seeks to limit the
meaning of "affects interstate ... commerce"' 57 because it suits its
immediate goal. In summary, the government should not be allowed an
expansive definition of interstate commerce when defending a statute,
while also being allowed a narrow definition when seeking to avoid a
burdensome statute.
Ultimately, government compliance with the requirements of Title
III, (whether or not the intercepted communications were "electronic
communications" as that term is statutorily defined) would have
prevented the suppression of
the evidence because electronic
communications are not protected by the statutory exclusionary rule.'
States v. Nathan, 202 F.3d 230,234 (4th Cir. 2000) (affirming conviction where government only had to
prove defendant's firearm and ammunition had previously traveled in interstate commerce).
153. Memorandum of Law in Support of Defendant's Position in Regard to Discovery, supra note
64.
154. Kallestad, 236 F.3d at 225 (upholding 18 U.S.C. § 2252(a)(4)(B), which states "knowingly
possesses 1 or more books ... or other matter.., that has been mailed, or has been shipped or
transported in interstate or foreign commerce, or which was produced using materials which have
been mailed or so shipped or transported," as a constitutional exercise by Congress of the Commerce
Power); see also Santiago, 238 F.3d at 216: Nathan,202 F.3d at 234.
155. 514 U.S. 549 (1995) (establishing the modern test for valid Congressional exercise of the
Commerce Power).
156. 317 U.S. 111 (1942) (holding valid Congressional exercise of the Commerce Power
establishing limits on individual wheat farmers because of the potential aggregate effect of all wheat
farmers on interstate commerce).
157. 18 U.S.C. § 2510(12) (2000).
158. 18 U.S.C. § 2515.
JOURNAL OF LAW, TECHNOLOGY & POLICY
[Vol. 2002
C. The "Keystroke Logging System" and Video Surveillance
Non-audio video surveillance gathers visual data, whereas the KLS
gathers only digitized keystroke data. Each method is intrusive in a
different way. The KLS records the keystrokes that are representations
of knowledge that has been transferred to a computer. These can
include an individual's most intimate thoughts, recollection of events,
banking records, letters and messages of a highly personal nature. On
the other hand, video surveillance records visual depictions and
movements, which can include full nudity and acts intended only for the
privacy of the home. Despite these differences, an analogy may be
drawn between the KLS and non-audio video surveillance investigative
methods.
Title III does not expressly include either method of
investigation, thus it is more stringent requirements are not explicitly
applicable to a case involving either method. Both methods constitute an
invasion of privacy more intrusive than that imposed through execution
of a traditional search warrant. When the execution of a traditional
search warrant occurs, it is limited by time and place and by particular
items. Police then seize items they are searching for and any other illegal
items in "plain view." In contrast, video surveillance and the KLS record
ongoing activities over a period of time, and are not limited to what is
available at the time the warrant is executed. For this reason, the added
protections offered by Torres and Biasucci should be afforded to a
defendant against whom evidence obtained by the KLS is sought to be
introduced.
In Scarfo's case, although signed by a magistrate judge, the order
authorizing surreptitious entry and installation of the KLS onto Scarfo's
computer would have met the added requirements of Torres for nonaudio video surveillance.159 Normal investigative techniques failed. The
FBI previously seized Scarfo's computer and recovered the
undecipherable "Factors" file.16 ° Normal methods would have also been
unlikely to succeed in the future, for without the passphrase, no
encrypted files could be deciphered. The order included the particular
"communications" intended for interception and allowed surreptitious
entry to "leave behind software, firmware, and/or hardware equipment
which will monitor the inputted data entered on ...Scarfo's computer by
recording the key related information as they are entered[.]"'' 1 The
order listed specific criminal offenses and corresponding statutes. 62 The
authorization also limited the period of interception to that which was
159.
See Order Granting Application for Surreptitious Entry, supra note 48.
160. Dawson Aff.. supra note 51. 157, at 29.
161. Order Granting Application for Surreptitious Entry, supra note 48,at 4.
162. Id. Information was sought relating to "illegal gambling, loansharking and other
racketeering offenses, and all of which are fruits, instrumentalities and/or evidence of violations of 18
U.S.C. § 371 (conspiracy. §§ 892-94 (extortionate credit transactions). § 1955 (illegal gambling
business) and § 1962 (RICO)[.]" Id.
No. 1]
SPYING ON THE MOB
necessary to achieve the objective within a thirty-day period.163 Finally,
the order authorized recovery methods which would not capture
communications protected under Title III, minimizing the actual data
recorded.'64
VI. PROPOSED SOLUTIONS
A. Legislative Amendments
Because
KLS captures
the
all keystrokes
not typed
contemporaneously with modem operations, the system's potential for
intrusion surpasses phone taps, pen registers, trap and trace devices and
conventional audio bugs. Interception of phone conversations or e-mails
seems much less intrusive because the individual sends these
communications beyond the boundaries of his home. The KLS records
information entered into a computer inside the boundaries and sanctity
of the home. The information technology revolution has led to digital
storage in computers of data previously kept in a typed or handwritten
format. The KLS can intercept a broad range of data exceeding that
which other electronic surveillance methods can intercept, including
letters, diaries, queued e-mails and financial information, whether
communicated outside the home or not. Government investigators must
peruse all of this personal information to discern the passphrase or other
information sought. As discussed above, the KLS records much more
than conventional techniques currently within the statutory definition of
electronic communications, such as phone taps. Because of this potential
level of intrusion, the most viable solution is a modification of Title III.
Such a modification should attack the appropriate safeguards offered by
Title III to the KLS and Magic Lantern systems, whether or not they
include the statutory exclusionary rule.
B. Judicial Remedies
Considering the potential intrusiveness of the KLS and the intent of
Congress in passing the Electronic Communications Privacy Act, courts
would be justified in excluding evidence collected by the KLS as not
complying with the requirements of Title III. As Konop and Fraserhave
shown, post-transmission and pre-transmission storage is easily
distinguishable.
As Konop and Fraser also note, some storage is
necessary for the electronic communication of data.
Seizure of
keystrokes typed into an e-mail program that queues messages for
subsequent transmission is analogous to the types of pre-transmission
storage necessary for electronic communications. Courts could also
163.
164.
Id.
See id.
JOURNAL OF LAW, TECHNOLOGY & POLICY
[Vol. 2002
redefine the beginning and ending point for transmission of electronic
communications to include the entering of data likely to be transmitted
in the immediate future.
Failing to disclose the full details of the KLS restricts a person's
right to determine if the government violated his constitutional rights.
As stated above, the government should not be allowed to use high-tech
law enforcement tools in the domestic arena if they are unwilling to
disclose their methodology. Hiding behind the smokescreen of national
security gives the government an open invitation to use any and all spy
technology on persons residing in the United States. This problem is
easily remedied by restricting law enforcement to tools with disclosed
technical details in situations when the information seized is uncertain.
Of course, the FBI could obtain a warrant that satisfies the more
stringent requirements of Title III. Disclosure of the KLS technical
details would then be unnecessary, as there could have been nothing
seized that was unwarranted.
Finally, if failing the first two recommendations posed above, courts
should apply the added particularity and minimization requirements
applicable to non-audio video surveillance, as stated in Torres. The
intrusive nature of the KLS surely requires something more than a
traditional search warrant.
VII. CONCLUSION
Once again, the courts must address what Samuel D. Warren and
Louis D. Brandeis stated so eloquently in 1890:
Recent inventions and business methods call attention to the next
step which must be taken for the protection of the person, and for
securing to the individual what Judge Cooley calls the right 'to be
let alone.'.. . [N]umerous mechanical devices threaten to make
good the prediction that 'what is whispered in the closet shall be
proclaimed from the house-tops.'
... [Tihe question whether our law will recognize and protect the
right to privacy in this and in other respects must soon come before
ou[r] courts for consideration.'65
Using the KLS pursuant to a traditional search warrant does not
adequately ensure a suspect's Fourth Amendment rights are protected. I
do not propose to ban its use completely. Instead, I merely propose that
Title III be amended to balance individual civil liberties with society's
interest in preserving law and order. In the absence of such legislation, I
propose courts should reign in the constabulary's use of these invasive
techniques, which are so carefully designed to circumvent legislative
restrictions embodied in Title III.
165.
(1890).
Samuel D. Warren & Louis D. Brandeis, The Right To Privacy,4 HARV. L. REV. 193, 195-96