S - fd.org
Transcription
S - fd.org
Facebook, MySpace, The Joys/Dangers of Internet Social Networks and How to Use Them as Litigation Tools Kelly Scribner, Assistant National Litigation Support Administrator, Office of Defender Services, Training Branch, Oakland, CA Alex Roberts, National Litigation Support Paralegal, Office of Defender Services, Training Branch, Oakland, CA & Lou Newberger, Chief Federal Public Defender, Southern District of West Virginia • • • • U.S. v. Voneida, 2009 WL 2038633 (2009) U.S. v. Scheuerman, 2009 CAAF LEXIS 812, 7-8 (C.A.A.F. 2009) U.S. v. Drew, 259 F.R.D. 449 (CDCA 2009) U.S. v. Suarez, 2010 WL 4226524 (2010) Social Search Sites • pipl.com • wink.com • yoname.com • zabasearch.com • archive.org/web/wegb.php search.org/programs/hightech/isp/ Contains a variety of ISPs and similar information services, specifically contacts at the legal departments for law enforcement service of subpoena, court orders, and search warrants U.S. Department of Justice Criminal Division Washington, D.C. 20530 CRM-200900732F MAR 3 2010 Mr. James Tucker Mr. Shane Witnov Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94110 Dear Messrs Tucker and Witnov: This is an interim response to your request dated October 6, 2009 for access to records concerning "use of social networking websites (including, but not limited to Facebook, MySpace, Twitter, Flickr and other online social media) for investigative (criminal or otherwise) or data gathering purposes created since January 2003, including, but not limited to: 1) documents that contain information on the use of "fake identities" to "trick" users "into accepting a [government] official as friend" or otherwise provide information to he government as described in the Boston Globe article quoted above; 2) guides, manuals, policy statements, memoranda, presentations, or other materials explaining how government agents should collect information on social networking websites: 3) guides, manuals, policy statements, memoranda, presentations, or other materials, detailing how or when government agents may collect information through social networking websites; 4) guides, manuals, policy statements, memoranda, presentations and other materials detailing what procedures government agents must follow to collect information through socialnetworking websites; 5) guides, manuals, policy statements, memorandum, presentations, agreements (both formal and informal) with social-networking companies, or other materials relating to privileged user access by the Criminal Division to the social networking websites; 6) guides, manuals, memoranda, presentations or other materials for using any visualization programs, data analysis programs or tools used to analyze data gathered from social networks; 7) contracts, requests for proposals, or purchase orders for any visualization programs, data analysis programs or tools used to analyze data gathered from social networks. 8) guides, manuals, policy statements, memoranda, presentations, or other materials describing how information collected from social-networking websites is retained in government databases or shared with other government agencies." While processing your request, we located one record totaling 33 pages. After careful review of this document we determined to release this item in part. We are withholding portions of the record pursuant to the exemption in 5 U.S.C. 552(b)(6)which permits the withholding of personnel and medical files and similar files the disclosure of which would constitute a clearly unwarranted invasion of personal privacy. The withheld material consists of work telephone numbers and e-mail addresses of DOJ attorneys. We will continue to search for any additional documents that may be responsive to your request. We estimate that it make take approximately fourteen days to complete the processing of your request. Although your FOIA request is the subject of litigation, I am nonetheless required by regulation to inform you that you that you have a right to an to an administrative appeal of this partial denial of your request. Your appeal should be addressed to: The Office of Information Policy, United States Department of Justice, 1425 New York Ave., NW, Suite 11050, Washington, DC 20530-0001. Both the envelope and the letter should be clearly marked with the legend "FOIA Appeal." Department regulations provide that such appeals must be received by the Office of Information Policy within sixty days of the date of this letter. Sincerely, Rena Y. Kim, Chief Freedom of Information/Privacy Act Unit Office of Enforcement Operations Criminal Division Obtaining and Using Evidence from Social Networking Sites Facebook, MySpace, Linkedln, and More John Lynch Deputy Chief, Computer Crime Computer Crime & Intellectual Property Section Jenny Ellickson Trial Attorney Computer Crime & Intellectual Property Section AGENDA SSSSSS^' Introduction to Social Networking Sites Overview of Key Social Networking Sites Additional Legal and Practical Issues Overview of Key Social Networking Sites Additional Legal and Practical Issues li, Compe urt Crime& Intellectual Property Section Introduction to Social Networking OF ONLINE SOCIAL NETWORKS 1997 SixDegrees.com 2003 Friendster, Linkedln 2004 MySpace 2005 Facebook 2008 Twitter li, Computer Crime & Intellectual Property Section Introduction to Social Networking POPULAR SOCIAL NETWORKS Worldwide: Facebook U.S. and Canada: MySpace, Linkedln, Twitter Europe: MySpace, Twitter, Hi5, V Kontakte Latin America: Hi5, Orkut, Tagged Asia: QQ, Friendster, Xiaonei, Orkut, Mixi, Hi5 Middle East and Africa: Maktoob, Hi5 li, Computer Crime & Intellectual Property Section LDM SM Cyworld £ Facetaook SI Friendsfer., IS' 19 Hi£ B Hyves'-i^ ^• Iwivsfr-**"' H Lide S Makloob B Mixi • MySpace • Nasza-klssa S Odnoklassniki @ One • Orkut • QQ Sky rock " V Kontakte 11 Wtetch H Zing wmvitcosix % .MB ft? O-if Creaiod on Many Eyas (http-.ffmaay»cy«s.eom'!<S)fBM Image c o u r t e s y Vincenzo Cosenza fwww.vincos.it), data based on Alexa and Google Trends li, Computer Crime & Intellectual Property Section Introduction to Social Networking POPULARITY IN THE UNITED STATES Most-visited websites in the U-S. (August 2009) 1. Google 2. Yahoo 3. Facebook 4. YouTube 5. MySpace •• • 13. Twitter • • • 27. Linkedln Source: Alexa.com - August 12, 2009 list of Top 100 websites in United States. li, Computer Crime & Intellectual Property Section Introduction to Social Networking THE BASICS Most • • • • • social-networking sites allow users to: Create personal profiles Write status updates or blog entries Post photographs, videos, and audio clips Send and receive private messages Link to the pages of others (i.e., "friends") How • • • can LE obtain data from these sites? Some info may be public UseijECPA to get info from providers 0 Undercover operations? ( ? li, Computer Crime & Intellectual Property Section Introduction to Social Networking UTILITY IN CRIMINAL CASES Evidence from social-networking sites can \ J Reveal personal communications Establish motives and personal relationships Provide location information Prove and disprove alibis Establish crime or criminal enterprise Also: instrumentalities or fruits of crime. AGENDA Introduction to Social Networking Additional Legal and Practical Issues Overview of Key Social Networking Sites FACEBOOK Founded in 2004, primarily catering to students Now over 250m active members worldwide Over 10b photos in Oct 2008; adds over 1b monthly Applications run on Facebook platform True names encouraged but not guaranteed Privacy model is highly granular; present different information to different groups or individual users Messaging includes mail, real-time chat, "wall" Now used in private background checks Koobface - virus/worm vector li, Computer Crime & Intellectual Property Section I Overview of Key Social Networking Sites FACEBOOK Demi Moore J Faeebook - Microsoft Internet Explorer provided by Criminal Division {¡^jjjjf Rie ft-vi.iâj gdit Viäw http://www.faceboo(c.com,'d£mirnoore Favorites Tocfs tm ±L ideJp Qh Convert • J5?Se/ect v D " # ~ £>Ea3« v ©Tfiols ^ icebookto connectwrth Demi Moore. Demi Moore WaH Info Photos YouTube Box fío t e s Just fvBJIS Demi M o o r e Is checking out the S p r e a d * trailer Apple - Movie Trailers - Spread SPRGADfcz ¡resh. f i i a i r&tv i*:*. i i th« frsii di'ipgyg y&jt '.^¿yto3 Sfe c-r pricks* In Los Ang^feo. Co*i fir*toy - ~Tur«yv«iyWe" abwat e $cnj«iUG y ^hc. s'mm WW»! si orite tc- I e x a c i i y as hs ... V h* •Atìit foii yjnt 25 at i:2£pm 06 ring, Jasmynr Richard and 1,927 oHierslte this, i p VI&v a8 437 comments Demi M o o r e Pis help get the word out 1 In a Americans is at risk of hunger. Join a community that cares. Go to v^w.faceb0ok.com/kelioggcares and become a FAN to hefp end US hunger. Watch the video befow that w e crested with all ofYOUH Let m e know how you like i t . >, mm s u a H »foLbwlrflVideo, prrijced in KataJyst h pas tramp with I b? Ocfiii Mra % fca-tees umwm «la! tófoppard directed b ¿Y people inoied ÍÚ ^--J h-.r---'^ Os îPiiïs Hcorri posted <m the» «unteti« T«itte finde aw ^(ibotì. iiïi!"-",fea prend supplì«; -.vi . Please did. gis veik-.v K^Hoac sbo tap assoit tHs irirsíH» orne bi dont**toíwéri» í ditïèriîyre. © Internet | Protected Mods Off 100% li, Computer Crime & Intellectual Property Section Overview of Key Social Networking Sites FACEBOOK Computer Crime & Intellectual Property Section Overview of Key Social Networking Sites FACEBOOK who oi< rjcci>L?ok m"""""" i r i n d t h i. ugi't-aitr \ou Tntia v. il al ..„„»A-,. -»•'*•">« <r, b<- 3 Who Cart See This? & Who Can Find You m1 Facebook? Friends 0 Everyone on Facebook ti Q Friends of Friends fne-sis arid Friend s -h !':' is: '2i S' C Hi'- this. O Only Friends @ Friends of Friends p frssiEts csii see £j!%friendE eas see this, KS-T S-tìii til O Some Friends o C"-OnlyhFriendsc-"." ics- m Choose. specific fri6."r ¡is vvho tjw 56« tinsm © Only Me Or«fy v»a -and seisci-gd mstworte <w* »«» this. Networks / j ; m m '•¿a »1 Networks All of Vly Networks Some of My Networks.«, None of My Networks f~ N one of MTNetyrorks"^" " j f f i f Cancel utt is available outside of.Föteboök* n 3J Ml ü 11 u ^ © Except These People É • Type the name of a friend or friend list.. Cancel li, Computer Crime & Intellectual Property Section Overview of Key Social Networking Sites GETTING INFO FROM FACEBOOK Data is organized by user ID or group ID Standard data productions (per LE guide): Neoprint, Photoprint, User Contact Info, Group Contact Info, IP Logs HOWEVER, Facebook has other data available. Often cooperative with emergency requests. 7 li, Computer Crime & Intellectual Property Section Overview of Key Social Networking Sites MYSPACE Founded 2003, now owned by Fox Interactive Media 2006: Most popular SN; passed by Facebook in 2008 Currently tens of millions of active users monthly True names less encouraged than Facebook Messaging through messages, chat, friend updates Application platform rolled out early 2008 Young user base, history of child safety concerns Privacy is currently less granular than Facebook li, Computer Crime & Intellectual Property Section Overview of Key Social Networking Sites MYSPACE i ^ p . T o p Model i http://www.my5pace.corn/glamazoril. File Edit View Convert tì? •»• <&. Home Favorites look *', co I El IwiOmi H1. fi 'I Help Select 0} Top Model Michelle (Michelle Fairplay) | M|ySpace Browse Psnote Find friends locai Huste Video Games Ë3 ' # ' & E a g e - i i | Tools-r Login Unter Model Michelle Sign Up w w w. myspace.comptamazcn1 Send Message evi Favorite bands MiitansiresiGo checkthem out\maz'mg? Mood: amorous @ st c-:1B PM Jul 2<vlsw msts Addita Friends C§> Add Comment Miche e Fairpiay 23 ( F mate Virgin a, US Last ' «gm: 2M1/2ÖQ9 Status and Mood MfchEle Fairplay My new Favorite bandH Miilionairesi Go checfcthem oat..amazing! Mood: amorous @ it Fit Jul 24 Michelle Fairplay rvs lost a 1/2 Inch off my hips" Mood: exhausted (§) at!:02PlSJr:ri5 Michelle Fairplay is eating Special K and working out.. Hood: taijhied© il ¡»:«i ,=tf Ji! ts Michete Fairplay Is getting ready to sign a contract that could change my life?. Hello Shanghai ChlnaS Mood: accomplished it 12:« Jsi 5 Just Got Pakl Lets Get Laid \:MlUJOMMR6S. (cai us I Michelle Fairplay maybe packing her bags 3con...giggle... I.lood: accomplished© at ii:24 B.< Jul 7 Interests General # Internet | Protected Mode: Off <3UOO?< 0 li, Computer Crime & Intellectual Property Section Overview of Key Social Networking Sites MYSPACE Izzybelle lust Am> Sometime &LAÖ*VA1AN.A Acc^ber W Isabelle Wonders Jl j,%B[if*e tei! JÉ* wm b.EX >" FCJOH & rraz,trice ^ Ii «CG trico Laura GaLaV% i W ^ a jennifer babygirl nieve li, Computer Crime & Intellectual Property Section Overview of Key Social Networking Sites GETTING INFO FROM MYSPACE Many profiles have public content. Data is organized by FriendID -f see LE guide. MySpace requires a search warrant for private messages/bulletins less than 181 days old • Also considers friend lists to be stored content' Data retention times User info and stored files - indefinitely 5 ^ IP logs, info for deleted accounts - 1 year J / li, Computer Crime & Intellectual Property Section Market leader in "micro-blogging" Began in mid-2006 as "status message" service Ubiquity and ease of updating, but limited space Breaking news, real-time updates: USAir, Iran Most multimedia handled by 3d party links Simplified privacy model: updates public or private Direct messages are private; sender can delete Short URLs used to serve malicious links and code li, Computer Crime & Intellectual Property Section Overview of Key Social Networking Sites TWITTER mUE&J ""—-fe•• ¿ J a l f : Edit ^Convert S <& • ' ~ ~ ¿¿£ .li . .: h t t p : / / t w i t t e r . c o m / d i a b l o c o d y ~s3fa&aaB!B £ile . View * § — Favorites Jools ¡iiiinnnrr Help Select I Q Brook Busey (diablocody) o n T w î t t e r ® fH - S ' # - © P a g e ' # T o o l s - Verified Account Hame Brook Busey Bio Blame it on the a-a-a-aalcohol. 130 90=507 fcisovjincf folinv.'e-rs # u n popularsto res 1,595 I KÄwfsaas (rosi -.-ä' -b Halved Foods #ynpopularstores 7 iriniMe ircf-i RT @seraflnowicz I love the Transformer who changes into a hotel lobby - Receptfcon 11 irfeutes sts irctvi '.vsf@fceUyoxforo @lotiisvirtel I think kids should be taught the True Alphabet: R,S,T,N,L and E. I endorse this sentiment heartily. RT @tainnwiison fart noise stout 1 heur agj Han -'««b View All.. © PS . S fwa of äisb i~cod>'j -U-c-st? Potatoes, Tabasco and Dos Equis for ray hangover. stout» m;ars. fern .v' e-D @ Internet | Protected Mode Off «(.100% - li, Computer Crime & Intellectual Property Section Overview of Key Social Networking Sites GETTING INFO FROM TWITTER The good news • Most Twitter content is public • Private messages kept until user deletes them The bad news • No contact phone number • Only retain last login IP ^ • Will not preserve data without legal process • Stated policy of producing data only in \ response to legal process (i.e., no 2702) J • No Law Enforcement Guide \ li, Computer Crime & Intellectual Property Section Overview of Key Social Networking Sites LINKEDIN Business-focused with enforced limits to interaction Profiles focused on education and work experience Use for criminal communications appears limited But can be used to identify experts Can check background of defense experts Privacy model similar to Facebook Profile information is not checked for reliability li, Computer Crime & Intellectual Property Section Overview of Key Social Networking Sites LINKEDIN j n V J i y K I http://wvwY,linlc£din.com/in/b3rackob3m3?PHPSESSID=3acd0526a08c81agfc560b34Q T 1 ^^SmH.îiI ¡na—ì File Edit View r~T*mriri.rrt." r. -n-irrn-r-mmi " Favorites Tools SwnÀ/.-i -""nil i'r •••••—.iirr ¡.•i'.Vir.iü»snTiiiii iiri'n^riiirlii;i'iiÎM\rrnïïi^TT7iT7TT:iiiVifafiiLim'miTïîmîiyinnnnrTi^tiiVH'inTr^ —rrm- p Help % Convert - Q Select • Current Past President at United States of America US Senator at US Senate (tL-D) Senior Lecturer in Law at University of Chicago Law School State Senator at Illinois State Senate Education Connections Industry Websites Harvard University Columbia University in the City of New York Occidental College (p?l 500+connections Government Administration • White House website • Join Barsens Linkedln Group . MyRSSfeed © • Public profile powered by: y » Page » Linked | | | Create a public profile: Sign In or Join How View Barack Obama's full profile: • See who you and Barack Obama know In common • Get introduced to Barack Obama • Contact Baractc O&ama directly View Full Profile. j Name Search: Search for people you knowfrom over 40 million professionals already on Linkedln. Done @ Internet | Protected Mode: Off Tools • -!l Introduction to Social Networking Overview of Key Social Networking Sites Social networking sites increasingly adopting federated identity schemes o OpenID, Facebook Connect Facebook, MySpace, Yahoo!, and Google actas1 iderrtityja^ mode Example: A user can log in to a Facebook account using Google credentials o After a link is established between two accounts, Google will check and vouch for identity of its user o Authentication information split from activity information o In turn, a Facebook login may be used to authenticate to sjtesjusiag "Facebook Connect" / If^ttn^tion^ is necessary, must determine identit provider - not simply the domain. - Computer Crime & Intellectual Property Section a Introduction to Social Networking TERMS OF SERVICE I PRIVACY POLICIES Social networks have extensive terms of service and privacy policies J o Most permit^^^e LE ^^ o All specify exceptions to respond to legal process and protect service against fraud/damage ^ can failure to follow TOS render access unauthorized under 1030? U.S. v: Drew- o Employment policy cases tend to say yes o But concerns that transforms TOS into private criminal code for site misconduct li, Computer Crime & Intellectual Property Section Legal and Practical Issues DOES THEPPA APPLY? Growth of social networks raises questions of breadth of PPA o Is Facebook/Twitter a "similar form of communication" to a newspaper, book, broadcast? (Ashton Kutcher? CNNbrk? Iran?) o No easy answers, but look to intent to \ <? communicate news to sizable audience o In many cases, Guest v. Le/s rule will be sufficient; CCIPS can help with analysis Congress continues to examine media shield li, Computer Crime & Intellectual Property Section Legal and Practical Issues UNDERCOVER OPERATIONS n\ Why go undercover on Facebook, MySpace, etc? • Communicate with suspects/targets • Gain access to non-public info • Map social relationships/networks Undercover operations after U.S. v. Drew If agents violate terms of service, is thaiV-x "otherwise illegal activity"? li, Computer Crime & Intellectual Property Section Legal and Practical Issues WITNESSES & SOCIAL NETWORKS \ Many witnesses have social-networking pages V • Valuable source of info on defense witnesses • Potential pitfalls for government witnesses Knowledge is power • Research all witnesses on social-networking sites • Discovery obligations? Advise your witnesses: • Not to discuss cases on social-networking sites • To think carefully about what they post J li, Computer Crime & Intellectual Property Section Legal and Practical Issues OTHER COURTROOM ISSUES Social networking and the courtroom can be a dangerous combination • Use caution in "friending" judges, defense counsel • Warn jurors about social-networking sites Social networking + mobile devices = real-time updates on courtroom events li, Computer Crime & Intellectual Property Section C C I P S Duty Line: 2 0 2 - 5 1 4 - 1 0 2 6 John Lynch B6 Jenny Ellickson Q- DEPRECATED The author's user ID. The author of the tweet. This embedded object can get out of sync. Number of tweets this user has. Whether this user has geo enabled (http://bit.ly/4pFY77). The geo tag on this tweet in GeoJSON (http://bit.ly/b8L1Cp). The tweet's unique ID. These IDs are roughly sorted & developers should treat them as opaque (http://bit.ly/dCkppc). Text of the tweet. Consecutive duplicate tweets are rejected. 140 character max (http://bit.ly/4ud3he). {"id"=>12296272736, "text"=> "An early look at Annotations: http://groups.google.com/group/twitter-api-announce/browse_thread/thread/fa5da2608865453", Tweet's "created_at"=>"Fri Apr 16 17:55:46 +0000 2010", creation "in_reply_to_user_id"=>nil, date. The ID of an existing tweet that "in_reply_to_screen_name"=>nil, this tweet is in reply to. Won't "in_reply_to_status_id"=>nil be set unless the author of the The screen name & "favorited"=>false, referenced tweet is mentioned. user ID of replied to Truncated to 140 "truncated"=>false, tweet author. characters. Only "user"=> The author's possible from SMS. {"id"=>6253282, user name. The author's "screen_name"=>"twitterapi", biography. The author's "name"=>"Twitter API", screen name. "description"=> "The Real Twitter API. I tweet about API changes, service issues and happily answer questions about Twitter and our API. Don't get an answer? It's on my website.", The author's "url"=>"http://apiwiki.twitter.com", URL. "location"=>"San Francisco, CA", The author's "location". This is a free-form text field, and "profile_background_color"=>"c1dfee", there are no guarantees on whether it can be geocoded. "profile_background_image_url"=> "http://a3.twimg.com/profile_background_images/59931895/twitterapi-background-new.png", Rendering information "profile_background_tile"=>false, for the author. Colors "profile_image_url"=>"http://a3.twimg.com/profile_images/689684365/api_normal.png", are encoded in hex "profile_link_color"=>"0000ff", values (RGB). "profile_sidebar_border_color"=>"87bc44", The creation date "profile_sidebar_fill_color"=>"e0ff92", for this account. Whether this account has "profile_text_color"=>"000000", contributors enabled "created_at"=>"Wed May 23 06:01:13 +0000 2007", (http://bit.ly/50npuu). "contributors_enabled"=>true, Number of "favourites_count"=>1, favorites this Number of "statuses_count"=>1628, user has. users this user "friends_count"=>13, is following. The timezone and offset "time_zone"=>"Pacific Time (US & Canada)", (in seconds) for this user. "utc_offset"=>-28800, "lang"=>"en", The user's selected "protected"=>false, language. "followers_count"=>100581, "geo_enabled"=>true, Whether this user is protected "notifications"=>false, DEPRECATED or not. If the user is protected, Number of "following"=>true, in this context then this tweet is not visible followers for "verified"=>true}, Whether this user except to "friends". this user. "contributors"=>[3191321], has a verified badge. "geo"=>nil, "coordinates"=>nil, DEPRECATED The contributors' (if any) user "place"=> The place ID IDs (http://bit.ly/50npuu). {"id"=>"2b6ff8c22edd9576", "url"=>"http://api.twitter.com/1/geo/id/2b6ff8c22edd9576.json", The URL to fetch a detailed "name"=>"SoMa", The printable names of this place polygon for this place "full_name"=>"SoMa, San Francisco", "place_type"=>"neighborhood", The type of this "country_code"=>"US", place - can be a "country"=>"The United States of America", The place associated with this "neighborhood" "bounding_box"=> Tweet (http://bit.ly/b8L1Cp). or "city" {"coordinates"=> [[[-122.42284884, 37.76893497], [-122.3964, 37.76893497], The country this place is in [-122.3964, 37.78752897], [-122.42284884, 37.78752897]]], "type"=>"Polygon"}}, "source"=>"web"} The application The bounding that sent this box for this Map of a Twitter Status Object tweet place Raffi Krikorian <[email protected]> 18 April 2010 THE PHILADELPHIA BAR ASSOCIATION PROFESSIONAL GUIDANCE COMMITTEE Opinion 2009-02 (March 2009) The inquirer deposed an 18 year old woman (the “witness”). The witness is not a party to the litigation, nor is she represented. Her testimony is helpful to the party adverse to the inquirer’s client. During the course of the deposition, the witness revealed that she has “Facebook” and “Myspace” accounts. Having such accounts permits a user like the witness to create personal “pages” on which he or she posts information on any topic, sometimes including highly personal information. Access to the pages of the user is limited to persons who obtain the user’s permission, which permission is obtained after the user is approached on line by the person seeking access. The user can grant access to his or her page with almost no information about the person seeking access, or can ask for detailed information about the person seeking access before deciding whether to allow access. The inquirer believes that the pages maintained by the witness may contain information relevant to the matter in which the witness was deposed, and that could be used to impeach the witness’s testimony should she testify at trial. The inquirer did not ask the witness to reveal the contents of her pages, either by permitting access to them on line or otherwise. He has, however, either himself or through agents, visited Facebook and Myspace and attempted to access both accounts. When that was done, it was found that access to the pages can be obtained only by the witness’s permission, as discussed in detail above. The inquirer states that based on what he saw in trying to access the pages, he has determined that the witness tends to allow access to anyone who asks (although it is not clear how he could know that), and states that he does not know if the witness would allow access to him if he asked her directly to do so. The inquirer proposes to ask a third person, someone whose name the witness will not recognize, to go to the Facebook and Myspace websites, contact the witness and seek to “friend” her, to obtain access to the information on the pages. The third person would state only truthful information, for example, his or her true name, but would not reveal that he or she is affiliated with the lawyer or the true purpose for which he or she is seeking access, namely, to provide the information posted on the pages to a lawyer for possible use antagonistic to the witness. If the witness allows access, the third person would then provide the information posted on the pages to the inquirer who would evaluate it for possible use in the litigation. ©2009 The Philadelphia Bar Association All Rights Reserved 1 The inquirer asks the Committee’s view as to whether the proposed course of conduct is permissible under the Rules of Professional Conduct, and whether he may use the information obtained from the pages if access is allowed. Several Pennsylvania Rules of Professional Conduct (the “Rules”) are implicated in this inquiry. Rule 5.3. Responsibilities Regarding Nonlawyer Assistants provides in part that, With respect to a nonlawyer employed or retained by or associated with a lawyer:… (c) a lawyer shall be responsible for conduct of such a person that would be a violation of the Rules of Professional Conduct if engaged in by a lawyer if: (1) the lawyer orders or, with the knowledge of the specific conduct, ratifies the conduct involved; … Since the proposed course of conduct involves a third person, the first issue that must be addressed is the degree to which the lawyer is responsible under the Rules for the conduct of that third person. The fact that the actual interaction with the witness would be undertaken by a third party who, the committee assumes, is not a lawyer does not insulate the inquirer from ethical responsibility for the conduct. The Committee cannot say that the lawyer is literally “ordering” the conduct that would be done by the third person. That might depend on whether the inquirer’s relationship with the third person is such that he might require such conduct. But the inquirer plainly is procuring the conduct, and, if it were undertaken, would be ratifying it with full knowledge of its propriety or lack thereof, as evidenced by the fact that he wisely is seeking guidance from this Committee. Therefore, he is responsible for the conduct under the Rules even if he is not himself engaging in the actual conduct that may violate a rule. (Of course, if the third party is also a lawyer in the inquirer’s firm, then that lawyer’s conduct would itself be subject to the Rules, and the inquirer would also be responsible for the third party’s conduct under Rule 5.1, dealing with Responsibilities of Partners, Managers and Supervisory Lawyers.) Rule 8.4. Misconduct provides in part that, It is professional misconduct for a lawyer to: (a) violate or attempt to violate the Rules of Professional Conduct, knowingly assist or induce another to do so, or do so through the acts of another; … (c) engage in conduct involving dishonesty, fraud, deceit or misrepresentation; … ©2009 The Philadelphia Bar Association All Rights Reserved 2 Turning to the ethical substance of the inquiry, the Committee believes that the proposed course of conduct contemplated by the inquirer would violate Rule 8.4(c) because the planned communication by the third party with the witness is deceptive. It omits a highly material fact, namely, that the third party who asks to be allowed access to the witness’s pages is doing so only because he or she is intent on obtaining information and sharing it with a lawyer for use in a lawsuit to impeach the testimony of the witness. The omission would purposefully conceal that fact from the witness for the purpose of inducing the witness to allow access, when she may not do so if she knew the third person was associated with the inquirer and the true purpose of the access was to obtain information for the purpose of impeaching her testimony. The fact that the inquirer asserts he does not know if the witness would permit access to him if he simply asked in forthright fashion does not remove the deception. The inquirer could test that by simply asking the witness forthrightly for access. That would not be deceptive and would of course be permissible. Plainly, the reason for not doing so is that the inquirer is not sure that she will allow access and wants to adopt an approach that will deal with her possible refusal by deceiving her from the outset. In short, in the Committee’s view, the possibility that the deception might not be necessary to obtain access does not excuse it. The possibility or even the certainty that the witness would permit access to her pages to a person not associated with the inquirer who provided no more identifying information than would be provided by the third person associated with the lawyer does not change the Committee’s conclusion. Even if, by allowing virtually all would-be “friends” onto her FaceBook and MySpace pages, the witness is exposing herself to risks like that in this case, excusing the deceit on that basis would be improper. Deception is deception, regardless of the victim’s wariness in her interactions on the internet and susceptibility to being deceived. The fact that access to the pages may readily be obtained by others who either are or are not deceiving the witness, and that the witness is perhaps insufficiently wary of deceit by unknown internet users, does not mean that deception at the direction of the inquirer is ethical. The inquirer has suggested that his proposed conduct is similar to the common -and ethical -- practice of videotaping the public conduct of a plaintiff in a personal injury case to show that he or she is capable of performing physical acts he claims his injury prevents. The Committee disagrees. In the video situation, the videographer simply follows the subject and films him as he presents himself to the public. The videographer does not have to ask to enter a private area to make the video. If he did, then similar issues would be confronted, as for example, if the videographer took a hidden camera and gained access to the inside of a house to make a video by presenting himself as a utility worker. ©2009 The Philadelphia Bar Association All Rights Reserved 3 Rule 4.1. Truthfulness in Statements to Others provides in part that, In the course of representing a client a lawyer shall not knowingly: (a) make a false statement of material fact or law to a third person; … The Committee believes that in addition to violating Rule 8.4c, the proposed conduct constitutes the making of a false statement of material fact to the witness and therefore violates Rule 4.1 as well. Furthermore, since the violative conduct would be done through the acts of another third party, this would also be a violation of Rule 8.4a. 1 The Committee is aware that there is controversy regarding the ethical propriety of a lawyer engaging in certain kinds of investigative conduct that might be thought to be deceitful. For example, the New York Lawyers’ Association Committee on Professional Ethics, in its Formal Opinion No. 737 (May, 2007), approved the use of deception, but limited such use to investigation of civil right or intellectual property right violations where the lawyer believes a violation is taking place or is imminent, other means are not available to obtain evidence and rights of third parties are not violated. 1 The Committee also considered the possibility that the proposed conduct would violate Rule 4.3, Dealing with Unrepresented person, which provides in part that (a) In dealing on behalf of a client with a person who is not represented by counsel, a lawyer shall not state or imply that the lawyer is disinterested . . . (c) When the lawyer knows or reasonably should know that the unrepresented person misunderstands the lawyer’s role in the matter the lawyer should make reasonable efforts to correct the misunderstanding. Since the witness here is unrepresented this rule addresses the interactions between her and the inquirer. However, the Committee does not believe that this rule is implicated by this proposed course of conduct. Rule 4.3 was intended to deal with situations where the unrepresented person with whom a lawyer is dealing knows he or she is dealing with a lawyer, but is under a misapprehension as to the lawyer’s role or lack of disinterestedness. In such settings, the rule obligates the lawyer to insure that unrepresented parties are not misled on those matters. One might argue that the proposed course here would violate this rule because it is designed to induce the unrepresented person to think that the third person with whom she was dealing is not a lawyer at all (or lawyer’s representative), let alone the lawyer’s role or his lack of disinterestedness. However, the Committee believes that the predominating issue here is the deception discussed above, and that that issue is properly addressed under Rule 8.4. ©2009 The Philadelphia Bar Association All Rights Reserved 4 Elsewhere, some states have seemingly endorsed the absolute reach of Rule 8.4. In People v. Pautler, 47 P. 3d 1175 (Colo. 2002), for example, the Colorado Supreme Court held that no deception whatever is allowed, saying, “Even noble motive does not warrant departure from the rules of Professional Conduct. . . We reaffirm that members of our profession must adhere to the highest moral and ethical standards. Those standards apply regardless of motive. Purposeful deception by an attorney licensed in our state is intolerable, even when undertaken as a part of attempting to secure the surrender of a murder suspect. . . . Until a sufficiently compelling scenario presents itself and convinces us our interpretation of Colo. RPC 8.4(c) is too rigid, we stand resolute against any suggestion that licensed attorneys in our state may deceive or lie or misrepresent, regardless of their reasons for doing so. “ The opinion can be found at http://www.cobar.org/opinions/opinion.cfm?opinionid=627&courtid=2 The Oregon Supreme Court in In Re Gatti, 8 P3d 966 (Ore 2000), ruled that no deception at all is permissible, by a private or a government lawyer, even rejecting proposed carve-outs for government or civil rights investigations, stating, “The Bar contends that whether there is or ought to be a prosecutorial or some other exception to the disciplinary rules is not an issue in this case. Technically, the Bar is correct. However, the issue lies at the heart of this case, and to ignore it here would be to leave unresolved a matter that is vexing to the Bar, government lawyers, and lawyers in the private practice of law. A clear answer from this court regarding exceptions to the disciplinary rules is in order. As members of the Bar ourselves -- some of whom have prior experience as government lawyers and some of whom have prior experience in private practice -- this court is aware that there are circumstances in which misrepresentations, often in the form of false statements of fact by those who investigate violations of the law, are useful means for uncovering unlawful and unfair practices, and that lawyers in both the public and private sectors have relied on such tactics. However, . . . [f]aithful adherence to the wording of [the analog of Pennsylvania’s Rule 8.4], and this court's case law does not permit recognition of an exception for any lawyer to engage in dishonesty, fraud, deceit, misrepresentation, or false statements. In our view, this court should not create an exception to the rules by judicial decree.“ The opinion can be found at http://www.publications.ojd.state.or.us/S45801.htm Following the Gatti ruling, Oregon’s Rule 8.4 was changed. It now provides: “(a) It is professional misconduct for a lawyer to: . . . (3) engage in conduct involving dishonesty, fraud, deceit or misrepresentation that reflects adversely on the lawyer’s fitness to practice law. ©2009 The Philadelphia Bar Association All Rights Reserved 5 (b) Notwithstanding paragraphs (a)(1), (3) and (4) and Rule 3.3(a)(1), it shall not be professional misconduct for a lawyer to advise clients or others about or to supervise lawful covert activity in the investigation of violations of civil or criminal law or constitutional rights, provided the lawyer's conduct is otherwise in compliance with these Rules of Professional Conduct. ‘Covert activity,’ as used in this rule, means an effort to obtain information on unlawful activity through the use of misrepresentations or other subterfuge. ‘Covert activity’ may be commenced by a lawyer or involve a lawyer as an advisor or supervisor only when the lawyer in good faith believes there is a reasonable possibility that unlawful activity has taken place, is taking place or will take place in the foreseeable future. “ Iowa has retained the old Rule 8.4, but adopted a comment interpreting the Rule to permit the kind of exception allowed by Oregon. The Committee also refers the reader to two law review articles collecting other authorities on the issue. See Deception in Undercover Investigations: Conduct Based v. Status Based Ethical Analysis, 32 Seattle Univ. L. Rev.123 (2008), and Ethical Responsibilities of Lawyers for Deception by Undercover Investigators and Discrimination Testers: An Analysis of the Provisions Prohibiting Misrepresentation under Model Rules of Professional Conduct, 8 Georgetown Journal of Legal Ethics 791 (Summer 1995). Finally, the inquirer also requested the Committee’s opinion as to whether or not, if he obtained the information in the manner described, he could use it in the litigation. The Committee believes that issue is beyond the scope of its charge. If the inquirer disregards the views of the Committee and obtains the information, or if he obtains it in any other fashion, the question of whether or not the evidence would be usable either by him or by subsequent counsel in the case is a matter of substantive and evidentiary law to be addressed by the court. CAVEAT: The foregoing opinion is advisory only and is based upon the facts set forth above. The opinion is not binding upon the Disciplinary Board of the Supreme Court of Pennsylvania or any other Court. It carries only such weight as an appropriate reviewing authority may choose to give it. ©2009 The Philadelphia Bar Association All Rights Reserved 6 Attachment Proposed Model Jury Instructions The Use of Electronic Technology to Conduct Research on or Communicate about a Case Prepared by the Judicial Conference Committee on Court Administration and Case Management December 2009 Before Trial: You, as jurors, must decide this case based solely on the evidence presented here within the four walls of this courtroom. This means that during the trial you must not conduct any independent research about this case, the matters in the case, and the individuals or corporations involved in the case. In other words, you should not consult dictionaries or reference materials, search the internet, websites, blogs, or use any other electronic tools to obtain information about this case or to help you decide the case. Please do not try to find out information from any source outside the confines of this courtroom. Until you retire to deliberate, you may not discuss this case with anyone, even your fellow jurors. After you retire to deliberate, you may begin discussing the case with your fellow jurors, but you cannot discuss the case with anyone else until you have returned a verdict and the case is at an end. I hope that for all of you this case is interesting and noteworthy. I know that many of you use cell phones, Blackberries, the internet and other tools of technology. You also must not talk to anyone about this case or use these tools to communicate electronically with anyone about the case. This includes your family and friends. You may not communicate with anyone about the case on your cell phone, through e-mail, Blackberry, iPhone, text messaging, or on Twitter, through any blog or website, through any internet chat room, or by way of any other social networking websites, including Facebook, My Space, LinkedIn, and YouTube. At the Close of the Case: During your deliberations, you must not communicate with or provide any information to anyone by any means about this case. You may not use any electronic device or media, such as a telephone, cell phone, smart phone, iPhone, Blackberry or computer; the internet, any internet service, or any text or instant messaging service; or any internet chat room, blog, or website such as Facebook, My Space, LinkedIn, YouTube or Twitter, to communicate to anyone any information about this case or to conduct any research about this case until I accept your verdict. NEW CLIENT SOCIAL MEDIA CHECKLIST G Does clt have mobile device (ie. cell phone, iphone, blackberry, etc.) # Does clt use mobile device to send text messages # Does clt use mobile device to access the internet # Does clt use mobile device to access any social networking sites G Is clt on Facebook or MySpace (same questions should be asked for both) # Does clt accept anyone as friend by default or are do they review requests # Does clt allow the public to see their profile and postings (what are clt’s privacy settings) # Is clt friend with anybody involved in this case # Has clt already posted or discussed anything related to the case on their page (ie. messages, links, photos, etc.) Warn clt not to discuss case on Facebook and explain why (friends may be govt snitch/Govt can use it against clt) Warn clt not to discuss case with any potential witness (may be violation of bond; potential obstruction of justice; potential threats ) Warn clt not to discuss witnesses nor make reference to witness (may be obstruction of justice; potential threats) i i i G i i i G G G G G Does clt use Twitter # Who does client follow # Who follows client # Has client tweeted about the case # Has client received any tweets about the case # Does client allow the public to follow their tweets (what are clt’s privacy settings) Advise clt re: public nature of tweets and how cannot control where/to whom they are forwarded Warn clt not to discuss case on Twitter and explain why (friends may be govt snitch/Govt can use it against clt) Warn clt not to discuss case with any potential witness (may be violation of bond; potential obstruction of justice; potential threats) Warn clt not to discuss witnesses nor make reference to witness (may be obstruction of justice; potential threats Is clt using any other social networking sites Does client have a blog Does client go to any blogs regularly and have they left comments - if so, under what user name Does client go to any chat rooms - what is their handle (user name) For all of the above, have any of their discussions been related to the case # Get details and give warnings Handbook on Conducting Research on Social-Networking Websites in California 1 Created by David Lee and Shane Witnov 2 Samuelson Law, Technology & Public Policy Clinic, UC Berkeley School of Law for The Santa Clara County Public Defender’s Office Overview Permissible In conducting research on social-networking websites, You May: 1. Use publicly-available information. own valid social-networking website 2. Use information obtained using your account. 3. Use information provided by a third-party member of a social-networking website. 4. Observe the activities of a member of a social-networking website while she browses the network. 5. Use the account of a third-party member of a social-networking website, without that member present but with her permission, to browse the website but not to contact people. 3 You Should Avoid: 1. Using the account of a member of a social-networking website to actively communicate with others without that member present. 2. Making misrepresentations on a social-networking website, when the misrepresentations are targeted at an individual in order to get information that would otherwise be unavailable. You Should NEVER: 1. Contact (email, message, or “friend” request) the victim or persons disclosed by the opposing party or other persons represented by counsel without full disclosure of your professional affiliation. 2. Create a fictitious account. Not Permissible 1 This handbook is licensed under a Creative Commons Attribution 3.0 license. You many copy, distribute, transmit, and remix this work as long as the original is attributed to the authors and the public defender’s office for which it was developed. Details of the license are at http://creativecommons.org/licenses/by/3.0/us/. Completed on December 1, 2008, the handbook reflects the laws and ethical opinions current as of that date. 2 Under the supervision of Supervising Attorney Jennifer Lynch. 3 “Avoid” means you should not use any of the listed methods except as a last resort, with careful consideration of the consequences, in consultation with the supervising attorney. Introduction Investigators are limited in their use of social-networking websites 4 for research by a number of different factors including state and federal law, the website’s terms of use, and ethical rules. 5 This handbook uses the term “investigator” broadly to include attorneys or anyone working under an attorney. 6 At times, ethical and legal restrictions are unclear and the value of the information to be obtained should be weighed against the potential consequences in consultation with the team investigating the case. Generally, a conservative approach should be adopted to ensure legal compliance, preserve the goodwill of the courts and opposing counsel, and to maintain high ethical standards. You May: 1. Use publicly-available information An investigator may always access publicly-available information. Publiclyavailable information is information on the internet that can be accessed without needing to log in. Information found through a search engine as well as information on a socialnetworking website that can be accessed without logging in is publicly-available information. For example, an investigator may use a search engine, like Google, to search for the name of a person of interest. Often, the search result will return a link to the person’s social network webpage. Viewing information returned from this type of search does not violate any ethical or legal rules. Furthermore, many profiles on MySpace are publicly accessible. An investigator could use a search engine or the MySpace search, without logging in or having an account, to find and access publicly available profiles. 2. Use information obtained using your own valid social-networking website account An investigator may create an account on a social-networking website, with accurate information, and conduct any research she wishes to on that network. An investigator may ask to join groups and access the profiles of people that are enabled by joining the group. The investigator may even ask an individual to be her “friend” (for example, on Facebook) as long as the person is not a witness disclosed by the opposing party or represented by counsel. 7 Because the social networking websites’ terms of use 4 MySpace and Facebook are two of the most widely used social-networking websites and were researched for writing this handbook. 5 See, e.g., Cal. Penal Code §1054.8, 18 U.S.C. §§ 2701-2711, MySpace Terms of Use, (June 25, 2009), http://www.myspace.com/index.cfm?fuseaction=misc.terms, Cal. Bus. & Prof. Code §§ 6068, 6106, 6128. 6 For the purposes of this handbook, attorneys and those working under them are all considered to be bound by California Rules of Professional Conduct in additional to generally applicable law. “An attorney is responsible for the work product of his employees which is performed pursuant to his direction and authority.” Crane v. State Bar, 30 Cal. 3d 117, 122-23 (1981) (finding attorney responsible for actions of his employees that violated the Rules of Professional Conduct). 7 Cal. Penal Code Section 1054.8 prohibits an investigator or lawyer from interviewing, questioning, or speaking to someone disclosed as a witness by the other side unless she first clearly identifies herself, her employer and whether she represents the defense or prosecution. California Rule of Professional Conduct 2-100 prohibits communicating “directly or indirectly about the subject of the representation with a party the member knows to be represented by another lawyer in the matter.” Making contact with an individual Handbook on Conducting Research on Social Networking Websites—2 generally require users to “not provide any false personal information,” 8 the profile should include the investigator’s current employer and job title if the investigator is going to make friend requests in their official capacity. If the person is the victim or a witness disclosed by the opposing party, the investigator may still ask to be an individual’s “friend” as long as she is careful in the “friend” request to clearly identify herself and the agency she works for and to state who she represents. 3. Use information provided by a third-party member of a social-networking website. If the client or another member of a social-networking website provides an investigator with information obtained from a social networking website, the investigator can use that information. This information could include printouts or digital copies of profile pages, communications between members, photos, or any other information accessible to the member on the social networking website. An investigator should not encourage the client or other member to engage in deception on her behalf in order to acquire information. However, as long as the investigator did not engage in or encourage the deception, she should be able to use the information without violating any ethical duties. 4. Observe the activities of a member of a social-networking website while she browses the network. An investigator may ask her client, a friendly witness, or someone else to come to her office to browse a social networking website. As long as the member gives permission, the investigator can observe and direct her browsing. The investigator may also ask the member to save or print information as she comes across it. Because the investigator is merely requesting that the member browse in a certain way, she is not impersonating anyone or engaged in deceit. This method is probably the best way to obtain information that is not publicly available since no deceit is involved. 5. Use the account of a third-party member of a social networking website, without that member present but with her permission, to browse the website but not contact people. An investigator may use the account of her client, a friendly witness, or someone else to passively browse a social-networking website when given permission by the account holder. Passively browsing means the investigator may search for and look at any profiles available to the member’s account she is borrowing. However, she should not message, email, friend request, or in any other way directly communicate with anyone one else using the borrowed account. By signing in to the social networking website, the investigator is to some degree representing herself to be a different person. Therefore, this technique should only be used if the previously discussed ones are not available. In particular, this technique may be appropriate if the client is in custody and thus unable to use the internet. on a social networking site, such as asking to be that person’s “friend” through Facebook, could be considered “speaking” to that person although there is no case law on the subject. 8 Facebook Terms of Use, (Aug. 28, 2009), http://www.facebook.com/terms.php. Handbook on Conducting Research on Social Networking Websites—3 8 You Should Avoid : 9 You Should Avoid: 1. Using the account of a member of a social-networking website to actively communicate with others without that member present An investigator should avoid using another social-networking website member’s account to directly communicate with others via email, messaging, friend requests, or any other means. Ideally, she should only observe while the owner of the account browses the network (as described above). Using someone else’s account could be considered a violation of the terms of use for many social-networking websites. 10 Furthermore, if the investigator contacts another person directly using the false identity, this may constitute deception or impersonation and be an ethical violation. 11 There are also other risks of civil and criminal penalties, albeit remote risks. 12 2. Making misrepresentations on a social-networking website, when the misrepresentations are targeted at an individual in order to get information that would otherwise be unavailable An investigator should not misrepresent herself on a social-networking website in order to get information that would otherwise be unavailable. The terms of use forbid members from misrepresenting themselves.13 Furthermore, the ethical rules binding lawyers and those working under them generally forbid misrepresentations. 14 Misrepresentations could include omitting relevant information from an investigator’s profile, especially the investigator’s current job and title. 15 Because the terms of use require users to “provide their real names and information,” 16 the profile should include the investigator’s current employer and job title if the investigator is going to make friend requests. It might be considered a misrepresentation if the investigator omitted employment information and then a person of interest accepted a friend request thinking the investigator was not involved in the legal case the member was involved in. An investigator may also be tempted to lie about her city of residence or schools to gain 9 See note 3, supra. For example, Facebook’s terms of use say “You will not provide any false personal information on Facebook . . . You will not share your password, let anyone else access your account . . . You will not transfer your account to anyone without first getting our written permission.” Facebook Terms of Use, (Aug. 28, 2009), http://www.facebook.com/terms.php. MySpace’s terms of use say “You agree not to use the account, username, email address or password of another Member at any time or to disclose your password to any third party.” MySpace Terms of Use, (June 25, 2009), http://www.myspace.com/index.cfm?fuseaction=misc.terms. 11 Cal. Bus. & Prof. Code §§ 6068, 6106, 6128 prohibit deceit and dishonesty, while requiring that lawyers only use means consistent with the truth. 12 While this may technically be a violation of the terms of use, the provisions are infrequently enforced and would likely only be a contract violation. However, there have been attempts to bring charges under the Computer Fraud and Abuse Act (18 U.S.C. § 1030) for violating terms of use although these have generally been unsuccessful. See, U.S. v. Drew, 2009 WL 2872855, (C.D. Cal. Aug. 28, 2009), available at http://www.volokh.com/files/LoriDrew.pdf. 13 Facebook’s terms of use requires that all information provided be “accurate, current and complete.” MySpace’s terms of use similarly requires that information should be accurate. 14 The California Business and Professional Code orders attorneys to use “means only as are consistent with truth.” Cal. Bus. & Prof. Code § 6068. 15 The investigator’s role as investigator is so central to her use of the social network profile, that omission could be seen as a misrepresentation under Cal. Bus. & Prof. Code § 6068. 16 Facebook Terms of Use, (Aug. 28, 2009), http://www.facebook.com/terms.php. 10 Handbook on Conducting Research on Social Networking Websites—4 access to other networks. While these may be minor misrepresentations, they are carefully targeted deceptions to gain access to information that would not otherwise be available. Targeted misrepresentations are probably unethical.17 You should NEVER: 1. Contact (email, message, or “friend” request) the victim or other persons disclosed by the opposing party or other persons represented by counsel without full disclosure of your professional affiliation California Penal Code section 1054.8 prohibits an investigator from communicating with the victim or any potential witnesses identified by the prosecution without identifying herself, the full name of her agency, and that she is working for the client. Asking someone to be your friend on a social-networking website without disclosing all of the required information in the friend request would probably be a violation of the statute. Emailing or messaging such a person is also prohibited. Furthermore, an investigator should never contact anyone who she knows is represented by counsel about the matter for which the representation was obtained. 18 However, accessing publicly-available information on a victim, disclosed witnesses, or represented party is allowed as described above. 2. Create a fictitious account An investigator should not create a fictitious account on a social-networking website using a fake name and other false information in order to gain access to other users’ information. Such behavior involves deception and is therefore unethical. 19 Furthermore, it may be a criminal violation of the website’s terms of use. 20 17 See Cal. Bus. & Prof. Code §§ 6068, 6106, 6128 for laws forbidding deception. Cal. Rules of Prof. Conduct 2-100. 19 See Cal. Bus. & Prof. Code §§ 6068, 6106, 6128 for laws forbidding deception. 20 Supra, note 11. 18 Handbook on Conducting Research on Social Networking Websites—5 Published on Friday, January 21, 2011 by Deeplinks Blog / EFF Social Media and Law Enforcement: Who Gets What Data and When? by Jennifer Lynch This month, we were reminded how important it is that social media companies do what they can to protect the sensitive data they hold from the prying eyes of the government. As many news outlets have reported , the US Department of Justice recently obtained a court order for records from Twitter on several of its users related to the WikiLeaks disclosures. Instead of just turning over this information, Twitter "beta-tested a spine" and notified its users of the court order, thus giving them the opportunity to challenge it in court. We have been investigating how the government seeks information from social networking sites such as Twitter and how the sites respond to these requests in our ongoing social networking Freedom of Information Act (FOIA) request , filed with the help of UC Berkeley's Samuelson Law, Technology & Public Policy Clinic . As part of our request to the Department of Justice and other federal agencies, we asked for copies of the guides the sites themselves send out to law enforcement explaining how agents can obtain information about a site's users and what kinds of information are available. The information we got back enabled us to make an unprecedented comparison of these critical documents, as most of the information was not available publicly before now. We received copies of guides from 13 companies, including Facebook, MySpace, AOL, eBay, Ning, Tagged, Craigslist and others, and for some of the companies we received several versions of the guide. We have combed through the data in these guides and, with the Samuelson Clinic's help, organized it into a comprehensive spreadsheet (in .xls and .pdf ) that compares how the companies handle requests for user information such as contact information, photos, IP logs, friend networks, buying history, and private messages. And although we didn't receive a copy of Twitter's law enforcement guide, Twitter publishes some relevant information on its site , so we have included that in our spreadsheet for comparison. The guides we received, which were dated between 2005 and 2010, show that social networking sites have struggled to develop consistent, straightforward policies to govern how and when they will provide private user information to law enforcement agencies. The guides also show how those policies (and how the companies present their policies to law enforcement) have evolved over time. For example, the 2008 version of Facebook's guide explains in detail the different types of information it collects on its users, but it does not address the legal requirements necessary to obtain this data. In contrast, the 2009 version groups this information into three categories (basic subscriber information, limited content, and remaining content) and describes, under the Electronic Communications Privacy Act (ECPA) , the different legal processes required to obtain the various data. However, the 2010 version merely says that the company "will provide records as required by law." Facebook doesn't explain why it changed its language from year to year. While the 2010 guide's language may allow the company to be flexible in responding to requests under a complicated and outdated statute, it does so through a loss of transparency into how it handles these requests. MySpace's guides also show an evolution. The September 2005 and March 2006 versions of MySpace's guides distinguish between public and private user information, requiring only a subpoena for IP logs, contact information, and private messages. The June 2006 and November 2007 versions establish several different categories of user information that require different legal processes, ranging from a subpoena for a user's name to a search warrant for access to a user's private messages. Also, in early versions of its guide, MySpace outlines that it will preserve data requested by law enforcement agents for 90 days. Law enforcement agents can then request a 90-day extension for a total preservation period of 180 days. This changed in the November 2007 guide, where MySpace said that it would "preserve the specific information identified in the request for up to 180 days and will extend the preservation as necessary at your request." The November 2007 guide also describes MySpace's Sentinel SAFE project, a previously unmentioned campaign designed to identify and remove registered sex offenders from the social network. Once MySpace matches a profile to a registered sex offender, it removes the user from the site and preserves the complete profile. Law enforcement officers who provide the appropriate legal process can then access the profile. The November 2007 guide goes even further in helping law enforcement-it details how agents can find MySpace information on a user's computer, such as through IM client logs, cookie data, cached MySpace pages, and stored login information. The guide doesn't say what prompted these substantial changes, but it is likely linked to the controversy surrounding alleged sexual predators on MySpace and the agreement MySpace made with several state attorneys general to do more to protect children. There were also more subtle differences between the guides. While the guides are written to educate law enforcement about the type of user information the companies maintain and the legal process required to get it, some, such as MySpace and Yahoo!, provide law enforcement with sample language for data request letters, subpoenas, and search warrants. The requesting law enforcement agency can then use the template created by the companies. Also, while ECPA allows companies to charge law enforcement for the time it takes to get the requested user information, only Yahoo!'s guide actually discusses this issue. The Yahoo! guide includes a fee schedule to approximate how much law enforcement will have to pay to obtain various types of user data from the company. For example, Yahoo! charges approximately $20 for basic subscriber records or "groups with a single moderator" and approximately $30-40 per user for the contents of subscriber accounts, including email. Also, where law enforcement requests deleted content, Yahoo! states it will "seek reimbursement for any engineer time incurred in connection with the request." Another difference between the guides shows up in how the companies deal with emergency requests from law enforcement. Under ECPA, the sites are allowed to disclose information without legal process when the companies believe there is a threat of death or serious physical injury. Most companies merely note that ECPA permits them to disclose this information in certain defined situations. However, some companies seem to go above and beyond the ECPA requirements. For example, MSN states that it "will respond" to these requests "outside normal business hours," and eBay and MySpace have set up a special hotline or "First Responder" service that can (in eBay's case) "return calls within 24 hours and process complaints quickly." In all the guides we received, Yahoo!'s was the only one to remind law enforcement that Yahoo! "is not required" to disclose this information. Yahoo also requires law enforcement officers to explain why normal disclosure would be insufficient and why the information Yahoo! has will help avert the threat. Facebook was the only company to make clear that its strict policies against fake accounts apply to law enforcement as well. In its 2008 and 2009 guides it notes that it will disable all accounts that provide false or misleading information, including police accounts, and in its 2010 guide it notes that it will "always disable accounts that supply false or misleading profile information or attempt to technically or socially circumvent site privacy measures." Of the guides we received, only Craigslist provides law enforcement disclosure information on its website (Twitter does too , but we didn't get a copy of its guide in response to our FOIA request). This is unfortunate. Social media sites' users should be able to see how the companies that hold their data respond to government requests for it. And, as we know, this affects a large number of real people. Twitter states that it has 175 million users . Myspace has over 100 million , and Facebook states it has 500 million . Without access to this information, it is impossible to evaluate how well these companies protect their users' data. For more information on how social media companies treat their users' data, see our spreadsheet, available in .xls and .pdf , or the individual guides here . Article printed from www.CommonDreams.org URL to article: http://www.commondreams.org/headline/2011/01/21-2