Vol 7 No 1 - Roger Williams University School of Law
Vol 7 No 1 - Roger Williams University School of Law Vol 7 No 1 - Roger Williams University School of Law
FBI facility for subsequent examination by FBI agents.107Similar to the Internet pen register function, advocates ofgreater privacy protections on the Internet are worried that thisprocedure may also present a danger of a general warrant.108Those promoting this position believe there is a risk that atransmission could contain the specified “key word or phrase” butnot be relevant to the government’s investigation.109 For example,if a key word such as “drugs” is authorized, the FBI might collectand review a target suspect’s communication consisting ofanything from a request submitted to a website concerning newdrugs available for AIDS patients, to cures for the common cold.The IITRI report seems to concede this possibility. It states thatwhile the system is designed to, and can, perform fine-tunedsearches, it is also capable of broad sweeps.110 Incorrectlyconfigured, Carnivore can record any traffic it monitors.111 Thereport goes on to state that this possibility may be increased dueto the lack of adequate audit trail provisions or safeguards againstcommon configuration errors.112However, like the pen register function, the relaxedminimization requirements applied by the judiciary to moretraditional wiretap investigations are likely to be similarly appliedto Internet taps. Therefore, the FBI’s erroneous collection andstorage of target suspect material not relevant to the surveillanceis probably constitutionally permissible.Upon analysis, it appears that the FBI’s implementation andutilization of Carnivore is in compliance with Constitutionalprinciples, at least so far as these principles are currentlyinterpreted. The next stage of the legal analysis addresseswhether or not the application of Carnivore complies with federalstatutory wiretap laws.III. FEDERAL STATUTORY ANALYSISThe legitimacy of the Carnivore surveillance system can alsobe analyzed in a statutory context. The focal points of such an107. See Hearings 2, supra note 22.108. See Carnivore’s Controversy, supra note 6.109. See id.110. See Brian Krebs, Study Calls For Stronger Audit Trail In FBI’s Carnivore,Newsbytes, Nov. 21, 2000.111. See id.112. See id.
analysis are the privacy protections included in such provisionsthat add to the constitutional minimum. Once these addedsafeguards are determined, an assessment of how the judiciary islikely to interpret and apply such provisions must be made. Thefollowing presents a commensurate examination of the federalstatutory provisions applicable to Carnivore, as well as theprobable judicial opinion as to Carnivore’s compliance with suchrequirements.In 1968, one year after Katz, Congress passed Title III of theOmnibus Crime Control and Safe Streets Act.113 This actpermitted non-consensual wire or oral eavesdropping by thegovernment as long as the surveillance was done pursuant to therequirements delineated in the act.114 In 1986, Congressamended Title III by passing the Electronic CommunicationsPrivacy Act (EPCA).115The ECPA was intended to enhance Title III by establishingdefinitive rules for electronic surveillance.116 In drafting theECPA, Congress included certain privacy “protections” thatunderlie the essential purpose of the statute. These protectionscan be grouped into three categories.117 First, any attemptedelectronic surveillance is subject to stringent ex parte judicialreview. Second, those conducting the electronic surveillance mustminimize the interception of non-pertinent information during thesurveillance. Third, the conduct of and results derived from anauthorized electronic surveillance may be subject to a stringentadversarial review after the surveillance has been completed.118An analysis will show that these protections, althoughembodied in the language of the ECPA, have been significantlydiminished through judicial interpretation and action. Thus, theutilization of Carnivore, arguably an extremely invasiveinvestigative tool, is likely to be in full compliance with the federalstatutory requirements of the ECPA.Ex Parte Judicial Review113. 18 U.S.C. § 2510 (1994 & Supp. V 1999).114. See id.115. See Christopher Slobogin, Criminal Procedure: Regulation of PoliceInvestigation 190 (2d ed. 1998).116. 18 U.S.C. § 2518 (1986).117. See Dempsey, supra note 46, at 85.118. See id.
- Page 226 and 227: Transactions Act).
- Page 228 and 229: acts of copyright infringement.7 Un
- Page 230 and 231: these rights.I. ISP LIABILITY FOR T
- Page 232 and 233: Cubby, the court in Stratton Oakmon
- Page 234 and 235: liability for third-party content.5
- Page 236 and 237: network and removed the edition of
- Page 238 and 239: subscribers’ conversations.84 Fur
- Page 240 and 241: holder.92 Contributory liability ap
- Page 242 and 243: and Klemesrud on the counts of dire
- Page 244 and 245: eport, the White Paper on Intellect
- Page 246 and 247: imposed ISP liability both in insta
- Page 248 and 249: any infringing material either upon
- Page 250 and 251: provider liability, the European Co
- Page 252 and 253: of a defamatory statement.While saf
- Page 254 and 255: defamation.184 One case that illust
- Page 256 and 257: material that appears questionable
- Page 258 and 259: FBI’s Carnivore: Is the Governmen
- Page 260 and 261: and the legal limits of government
- Page 262 and 263: II. CONSTITUTIONAL ANALYSISA. Const
- Page 264 and 265: application developed in Katz v. Un
- Page 266 and 267: Amendment protections.50Substantial
- Page 268 and 269: communicating over the Internet pos
- Page 270 and 271: court will likely, as it has often
- Page 272 and 273: unconstitutional.81 Although CALEA
- Page 274 and 275: data attributable to the target sus
- Page 278 and 279: EPCA Section 2518 provides that upo
- Page 280 and 281: The FBI has stated that its use of
- Page 282 and 283: provision,143 but judging from the
FBI facility for subsequent examination by FBI agents.107Similar to the Internet pen register function, advocates <strong>of</strong>greater privacy protections on the Internet are worried that thisprocedure may also present a danger <strong>of</strong> a general warrant.108Those promoting this position believe there is a risk that atransmission could contain the specified “key word or phrase” butnot be relevant to the government’s investigation.109 For example,if a key word such as “drugs” is authorized, the FBI might collectand review a target suspect’s communication consisting <strong>of</strong>anything from a request submitted to a website concerning newdrugs available for AIDS patients, to cures for the common cold.The IITRI report seems to concede this possibility. It states thatwhile the system is designed to, and can, perform fine-tunedsearches, it is also capable <strong>of</strong> broad sweeps.110 Incorrectlyconfigured, Carnivore can record any traffic it monitors.111 Thereport goes on to state that this possibility may be increased dueto the lack <strong>of</strong> adequate audit trail provisions or safeguards againstcommon configuration errors.112However, like the pen register function, the relaxedminimization requirements applied by the judiciary to moretraditional wiretap investigations are likely to be similarly appliedto Internet taps. Therefore, the FBI’s erroneous collection andstorage <strong>of</strong> target suspect material not relevant to the surveillanceis probably constitutionally permissible.Upon analysis, it appears that the FBI’s implementation andutilization <strong>of</strong> Carnivore is in compliance with Constitutionalprinciples, at least so far as these principles are currentlyinterpreted. The next stage <strong>of</strong> the legal analysis addresseswhether or not the application <strong>of</strong> Carnivore complies with federalstatutory wiretap laws.III. FEDERAL STATUTORY ANALYSISThe legitimacy <strong>of</strong> the Carnivore surveillance system can alsobe analyzed in a statutory context. The focal points <strong>of</strong> such an107. See Hearings 2, supra note 22.108. See Carnivore’s Controversy, supra note 6.109. See id.110. See Brian Krebs, Study Calls For Stronger Audit Trail In FBI’s Carnivore,Newsbytes, <strong>No</strong>v. 21, 2000.111. See id.112. See id.