Professional Documents
Culture Documents
t2
r r r r
Explain the legal foundation and reasons for pretrial motions regarding
evidence.
ldentify the limitations on expectations of privacy. Explain the major anticrime laws and amendments impacting discovery and use ofe-evidence.
lntroduction
rules and laws are changed t9 bring Qem up to date with new technolI' ogy. crimes. threats. and evidence. Rules are regulations that govern legal c.onduct, procedures, and praclices. I aws are regulations that govern the conduct of the people of a society or nation. These rules and laws directly impact investigative procedures and the admissibility of evidence. Investigators who do not understand them run the risk of compromising cases, convicting innocent people, or letting guilty people go free. You need to know what constitutes a legal search, what laws govern obtaining e-evidence and securing it so that the chain of evidence is not compromised, what telecommunications may lawfully be intercepted or examined after they have been received and what privacy rights employees and other individuals have. Consider the need to understand rules and laws in these cases. Before seizing a computer or other hardware, one needs to consider whether the Fourth Amendment requires a search warrant.
pederal
408
CHAPTER
l2 | Federal
Before accessing stored electronic communications, one needs to consider the requirements of the Electronic Communication Privacy Act. To conduct real-time electronic surveillance, a wiretap order may be needed from a judge. In this chapter, you learn about due process of the law, federal rules of evidence and procedure, and anticrime laws. These laws are important to know because even cases that center on physical evidence and eyewitness testimony may require collecting e-evidence to guide or corroborate the physical evidence.
learn about the authority granted to investigators under privacy laws and the limitations those laws impose to protect civil rights. Many of these laws are highly controversial and subject to heated debates. At the same time, crimes are increasingly computer-technology-dependent. These forces will drive changes in privacy laws as the privacy versus security battles play out. This chapter also provides the framework for understanding the ethical challenges and demands of giving testimony in court that are covered in the next chapter. You
will
d-;rpfum
f*
www.low.cornell. edul
/frcrmp/.
ruleslfrcp/.
e{
of Evidence
Federal Rules of Procedure Regulate production
Law
4O9
covery of "electronically stored information" contained on the computer itself became routine. This change raised issues about e-evidence-how it could be authenticated, proved to be reliable, and determined to be admissible in criminal or civil proceedings. This section reviews the current and evolving status of laws pertaining to the processes of authentication, reliability, and admissibility. It also discusses the requirements for laying a proper foundation for e-evidence
and serving as an expert witness.
The rederal Rules of civil Procedure were adopted in 193g. Until 1970, rules had developed to deal only with physical or tangible evidence. Specifically, the law of criminal procedure has evolved to regulate the mechanisms common to the investigation of physical crimes, namely the collection of physical evidence and eyewitness testimony-and not e-evidence (Kerr, 2005)_ So the rules you learn about are expected to change. Rules 26 and34 regulate the production of evidence. Then an amendment in Rule 34(a) took effect that made electronic data subject to discovery, while also providing protections (in the form ofexceptions to the rule) for the party whose electronic data was being searched. For decades, this amendment had no striking impact because only computer hard-copy printouts were routine in legal matters. A far-reaching impact did not begin until the late-1990s when the dis-
www.uscourls.gov/rules/newrules6.htm l#cvO8O4.
lESl). These rule chonges offect Rules ond Form 35. The rules hove been sent to congress ond will become effective on December 1,2006, unless Congress octs to chonge or defer the omendments. The omendments ore ovoiloble on the U.S-. courts' web site qt:
On April 12,. 2006, the U.S. Supreme Court opproved the proposed omendments to the Federol Rules of Civil procedure. These rules concern the discovery of "electronicolly stored informotion" ,l6,26,33,34,37,45,
yqy. lowyers ond courts o[prooch e-discovery. ln porticulor, Rule l6(b)(5) reguires the disciosure of e-discoveiy during the initiol pretriol confeience. Discovery requests would'hove tI be more specificolly toilored becouse' of ihe huge volume of
ond further
4tO
CHAPTER
e-evidence. This discussion should be specific regording the subiect motter, time periods, ond identificotion of persons or groups from whom discovery moy be sought. And the porties need to negotiote how the documents will be produced very eorly in the cose. lt could toke lowyers months to negotiote ihe formot in which documents would be produced-imoges, TIFF, PDF, or notive formot-ond whot metodoto would be included (Hsieh, 2006). For exomple, in Louren Corp. v. Cenlury Geophysicol Corp., the plointiff sought to inspect the defendont's computers for evidence to supporl its cloim thot the defendont hod unlowfully used the plointiff's licensed softwqre. lt took the porties ond the court over o yeor to resolve vorious discovery disputes. The court finolly compelled inspection of the computers, Proposed omended Rule 34(b) would ollow the requesting porty to "specify the form in which eleclronicolly stored informotion is to be produced." Specific informotion on these pending rules ond the stotus of other omendments con be found by selecting the "Pending Rules Amendments Awoiting Finol Action" hyperlink in the upper left corner of the Web poge www.uscourts.gov/rules/ #1udiciolo9o5. Also see www. uscou rts. gov/ru les/com menf 2OO5 /CVAu gO4. pdf . Another proposed chonge to Rule 26(b)(2)(B) would require o court order for e-evidence thot is "not reosonobly occessible becouse of undue burden or cost." This rule moy leod to lengthy discussions obout whot is or is not reosonobly occessible becouse it shifts the cost burden to the requesting porty.
Laying a Proper Foundation for E-Evidence In 1975, the Federal Rules of Evidence were adopted. They govern
the
admissibility of evidence, including electronic records or data. Some of these rules are referred to as exclusionary rulesbecause they specify the types of evidence that are excluded-and thus cannot be presented at trial. In establishing admissibility, many rules of evidence concentrate first on the evidence's relevancy. After evidence is found to be relevant, then it must survive several tests based on the rules of evidence in order to be admissible. Figure l2.l shows that relevant evidence which has not been excluded is admissible evidence.
Exclusionary Rules Exclusionary rules are specific Federal Rules of Evidence that test whether evidence will be admissibte. Some ol these rules test whether there is a specific rule that bars the admissibility of
/tl (lF
Law 4t t
FIGURE 12.1 Relevant evidence that has not been excluded is admissible evidence.
evidence, such as hearsay or privilege. Even if there is a specific rule that bars its admissibility, there may be exceptions to the rule, such as the business rule exception to the hearsay rule. Exclusionary rules pertain to the following:
r r r r r
s.elevancy. The evidence has a logical and varuable connection to an issue of the case.
opinion of expert. Qualified experts may testify under certain conditions even though they were not eyewitnesses.
Hearsay. Rule against using "out of court" statement offered to prove
truth.
These rules as they apply to e-evidence are described in Table 12.1. The Legal Information Institute (LII) of Cornell University publishes the eleven articles of the Federal Rules of Evidence at www.law.cornell.edu/rules/fre/. This is a free service provided by the LII. As the Rules listed in Table 12.1 describe, evidence may be inadmissible if it falls into a category that makes it inadmissible, such as hearsay or privilege; or it is irrelevant, prejudicial, misleading, or causes delays that substantially outweigh its probative value. Evidence has probative value if it is sufficiently useful to prove something important.
412
TABLE
t2'l
Preliminary questions concerning the qualification of an expert witness or the admissibility of evidence are decided by the court. Relevant evidence means evidence that can make some fact or issue more probable or less probable than it would be without the evidence.
except as otherwise provided by the Constitution of the United States, by Acl of Congress, by these rules, or by other rules of the Supreme Court. Evidence that is not relevant is not admissible' Even if it is relevant, evidence may be excluded if its Probative value is substantially outweighed by the danger of unfair prejudice, confusion of the issues, misleading the jury, unnecessary delay, or waste of time. This rule broadly governs the admissibility of expert testimony. lt outlines what is necessary to be qualified as an expert' A witness is qualified as an expert by
Rule 403. Exclusion of Relevant Evidence on Grounds of Prejudice, Confusion, orWaste of Time
knowledge, skill, experience, training, or education. Under Rule 702, the test is: lf scientific, technical, or other specialized jury knowledge will help lhe trier of fact ( a or judge) understand the evidence, quatified expertmay testify if (1) the testimony is based upon sufficient facts or data, (2)1he testimony is the product of reliable principles and methods, and (3)the witness has applied the principles and methods reliably to the facts o{ the case'
Testimony in the form of an opinion-that is not inadmissible for some other reason-is allowed because the opinion is an issue for the trier of fact to decide'
6{
Law
4t3
Hearsay is not admissible except as provided by these rules or by other rules of the Supreme Court. Business records that are made during the ordinary course of business are admissible. Conversely, business records that are made for use in a civil or criminal case are not admissible.
#nmrsxmd
s t Pre n ti ce-H o l's cyb ro ry o t www.to I ki ustice.c om for o comprehensive directory of Web sites ,.eloteJ t; forensics, ond other criminol iustice topics.
/ cybrary.osp
ffi;
"rijen.i,
Hearsay Evidence Hearsay Rule 802 can block admissibility unless some exception applies to the evidence. For example, if the author of an electronic record is not available to verify the truth of the matter, the electronic record would be hearsay. As such, it would be inadmissible unless it fit into one of the exceptions to the hearsay rule. Electronic records that are business records made during the ordinary course of business are admissible under the business records exception rule in Rule 803(6). Therefore, business records, which are
hearsay, can be admitted as evidence because they are an exception to hearsay. The reason for their exception is that their regular use in the business of a company ensures a high degree ofaccuracy so additional verification is not needed.
Motions to Suppress Evidence euestions of admissibility and motions to suppress evidence are handled before trial. A judge may hold a hearing to determine whether or not evidence is admissible. In those cases, the jury never hears of the evidence. A motion by a lawyer for such a hearing before trial is called a motion in limine (pronounced lim-in-nay). courts prefer this approach
414
Criminal Codes
because it limits the jury's exposure to inadmissible evidence, which might influence jury members regardless of attempts to ignore it (Eichhorn, 1989).
Federal Rule 702 Test for Admissibility Evidence is not the only thing that is subject to tests of admissibility. A forensic examiner's qualifications can be challenged or the tools or methodologies used in a forensic investigation can be objected to. These challenges or objections are heard outside the presence ofthe jury during a pretrial hearing under Federal Rule 702 (as defined in Table 12.1). From 1923 to 1993, the test for admissibility of expert witness testimony and methodologies was based on the 1923 ruling in Fryte v. United States (1923). The Frye test, as it came to be known, requires that the scientific principle upon which the work is based is "sufficiently established to have gained general acceptance in the parlicular field in which it belongs." using Ftye, a judge had to test the admissibility of expert testimony before allowing it in court. In part because ofthe problems caused by the "general acceptance" criteria, the Frye test that Rule 702had been relying on was replaced (superceded) by the Daubert test in 1993. In 1993,the Supreme Court issued an opinion in the case of Daubert v. Merrell Dow Pharmaceuticals that abandoned the earlier Frye standard in federal cases and set a new standard. A judge must take into account the following:
1. Whether the theory or technique can be and has been tested 2. Whether it has been subjected to peer review and publication
3. 4. 5.
The known or potential error The general acceptance of the theory in the scientific community Whether the proffered testimony is based upon the expert's special skill
The Daubert test is primarily a question of relevance, or "fit," of the evidence. The Supreme Court holds that in order for testimony to be used it must be sufficiently tied to the facts ofthe case to help understand an issue being disputed (Norberg, 2006). For the full text of the Daubert test, visit the Supreme
up ctlhtmU
92
-l02.ZS.html.
Authenticating E-Mail Messages and other E-Evidence A physical document can be authenticated by either direct evidence or
circumstantial evidence. Examples of circumstantial evidence would be the paper document's appearance, content, or substance. The same circumstantial evidence the courts use to authenticate physical documents applies to e-mail
messages.
In order to authenticate an e-mail message, Rule 901 requires that the person (proponent) who introduces the message provide "evidence sufficient to iupport a finding that the fe-mail message] is what its proponent claims."
6(
proofthat:
or"
Process of the
Law
415
The reliability of e-evidence itself and the reliability of the methods and
procedures used must be established too. Rule 901 generally can be satisfied by
2. Qualified computer operators were employed. 3. Proper procedures were followed in connection with the input and output
of information.
4. A reliable software program and hardware were used. 5. The equipment was programmed and operated correctly. 6. The exhibit is properly identified as the output in question.
Proof must be provided for all six of these issues or for all issues that apply to the handling of the evidence. It is not a surprise that opposing counsel will challenge the authentication of the e-evidence. In fact, evidence should be challenged to ensure that it accurately and fully represents the truth.
circumstantial E-Mail Evidence Authenticates other E-Mail A good of example of how e-mail messages can be authenticated to meet Rule 901 is in united states v. siddiqui (Robins, 2003). rn. siddiqui, the defendant was convicted of fraud, making false statements, and obstruciing a federal investigation in connection with an award he had applied for from the National Science Foundation (NSF). The issue of the case was that the defendant, Siddiqui, had
falsified documents (letters recommending him for the NSF award) in the names of two other individuals; and the defendant had then urged those two individuals to support the falsified documents. E-mail messages between Siddiqui and the two individuals containing incriminating information were recovered and used
as e-evidence.
Siddiqui appealed. He challenged the district court's decision to admit into evidence several e-mail messages between himself and the two individuals. The court held that the appearance, contents, substance, internal patterns, and other circumstances of these e-mail messages authenticated them. The Eleventh Circuit pointed to the following facts:
1. The e-mail messages reflected an e-mail address that included a variation of the defendant's name and a uniform resource locator (URL) for
the defendant's employer.
one in another e-mail message that was introduced into evidence by the defendant as an e-mail message from the defendant to one of the two other individuals.
the author knew the details of the defendant's conduct in connection with the NSF award.
416
CHAPTER
l2l
4.
One of the e-mail messages referred to a visit the defendant had made to a particular event attended by the defendant and by the recipient ofthe
message.
6. The e-mail
messages occurred during the same time period in which the recipients spoke to the defendant by telephone and had conversations consistent in content with the e-mail messages.
This case presents several important lessons for computer forensics investigators. It illustrates the larger and more comprehensive role of e-mail evidence in a case. E-mail messages not directly on point may be relevant to the case as the proof needed to authenticate other e-mail. The content of e-mail messages may relate to other documents of the author, or have a style that is consistent with other communication patterns. The issue of style is equally critical when e-mail has been planted or forged. E-mail forgers may not be aware of distinctive writing styles or rules of evidence and, out of habit, use their own writing style'
ln o sexuol horossment cose brought by on occountont ogoinst her monoger, the monoger produced on +moil messoge ollegedly sent to him by thl occountont, which she denied hoving sent. The comPony ot which both employees worked required personnel to shore computers' Employees were olso required to'reveol their e-moil posswords, so thot if on employee *or ouiof the office, colleogues could hove occess to e-moil messoges on thot employee's computer. The computer forensics investigotor concluded thot, bosed on these policies, it wos not possible to verify whether or not the occountont hod sent emoil. The occountont produced e-moil she hod sent to the monoger ond thot he hod sent to her over o yeor's time. The grommor, sentence structure, punctu-otion, ond other style feotures in thJdisputed e-moil messoge cleorly differed from other e-moil sent by the occountont ond supported her cloim thot she hod
not sent the disputed +moil. The controdictory evidence kiggered -o wider seorch of e-moil of the monoger ond informotion technology stoff.
Circumstantial Evidence Authenticates Chat Room Session Circumstantial evidence was used to authenticate e-evidence in the tJnited States v. Simpson case. The case involved a hard-copy printout of an online chat room
session that Simpson had participated in. The government was able to authenticate
6(
printout of a chat room session between a detective and the defendant Simpson. Even though Simpson did not use his full name in the chat room when communicating with the detective, he provided his first initial and last name. The initial and
a
Anticrime
Laws 417
last name were the same as the defendant's, and the e-mail address belonged to the defendant. Pages found near a computer in Simpson's home contained the name,
street address, e-mail address, and telephone number that the detective had given to the individual in the chat room session.
When considered all together, the circumstantial evidence was sufficient to authenticate the communication as one that occurred in a chat room session
between Simpson and the detective.
This case illustrates how different types of evidence can be used for authentication. It also reaffirms the importance of detailed documentation of materials found near a computer, as was discussed in prior chapters. Next, we will examine the anticrime and privacy laws.
iby others.
Anticrime Laws
congress responds to changing technology and high-tech crimes by amending existing laws if possible or by issuing new laws (statutes). The most authoritative federal statutes affecting computer forensics are the Electronic Communications Privacy Act (ECPA), the Federal wiretap Statute, the pen/Trap Statute, the cFAA, and the usA PATRIoT Act. The ECpA extended the wiretap Statute to include authority over digital transmissions over computer networks. A highly contentious response by president George w Bush as part of his war against terroflsm was the use of warrantless electronic surveillance. The order
was issued without the consent of Congress and violates the Fourth Amendment.
4t
W
Congress
Congress made the ECPA the primary law by which to address claims of privacy violations in the communications field. This law's goal is to balance privacy rights with law enforcement needs-while protecting Fourth Amendment rights against unreasonable search and seizure whenever possible. The authority given to law enforcement by the ECPA has sparked fierce opposition by privacy advocates. The full text of the ECPA is available at
www.usiia.org/le gis/ecpa.html.
The belief that a person has a reasonable expectation of privacy under all circumstances is wrong. People try to hide their crimes by claiming that they expected privacy. By law, privacy expectations depend on several factors. For example, if circumstances show that a computer user had no reasonable expectation ofprivacy, then police do not need a search warrant to obtain information (Nimsger, 2003). Users of computer equipment owned by an employer, company, or government agency fall into this category. Companies and government agencies can specify explicitly in their acceptable use policies (AUP) that employees have no right to privacy or privacy expectations when they use company equipment for e-mail or the Internet. In the case of tlS. v. Simons (2000), a government employee working for the Central Intelligence Agency (CIA) was suspected of using his office
computer to download pornography. Without getting a warrant, the CIA remotely accessed Simons'computer and found files containing photos of child pornography, which is a federal crime. Simons tried to suppress the photos by claiming a FourthAmendment violation of his expectation of privacy. However, the CIA had an AUP that allowed it to "periodically audit, inspect, and/or monitor . . . users' Internet access." The Court determined that because of this AUP' Simons had no reasonable expectation of privacy and that no warrant was required for the search-making his files admissible.
Alon Scott hod shredded documents into strips 5/32 of on inch wide to destroy the evidence they contoined of his income tox evqsion. Government ogents retrieved those strips from the trosh in front of Scott's home ond then reossembled them into documentory evidence thot helped prove Scott's crime. After he wos chorged with o crime, Scott orgued thot he hod creoted o reosonoble expectotion of privocy in the dlcuments by shredding them, so thot reconstructing them without o worront violoted his Fourth Amendment rights (Kerr, 2001).
61(
Anticrlme
Laws 419
According to the First Circuit court, Scott's cose reveoled "o foiled ottempt of secrecy by reoson of underestimotion of police resourcefulness, not invosion of constitutionolly protected privocy.,, The use of technology-the shiedder-to destroy the poper does not provide constitutionol protection. As o result, ogents did not need o worront to reconstruct Scott's shredded documents ond return them to o reodoble form. The government's reconstruction of Scott's communicotions did not violote his reosonoble expectotion of privocy becouse he hod no foundotion for thot expectotion. ln terms of e-eviden.c?, o .person who encrypts incriminofing electronic documents ond then deletes them, ossuming they won't bE deciphered by outhorities, connot moke o vqlid cloim-thot he hod on expectotion of privocy.
Courts'Interpretation of FourthAmendment protection In the 19g0s, the Supreme court considered whether the Fourth Amendment required the government to obtain a search warrant before conducting a field test on white powder that agents had seized from the defendant. The purpose of the field test was to determine whether the powder contained cocaine. The defendant argued that the chemical field test violated his reasonable expectation that the contents of the white powder would remain a secret (private), and thus violated his Fourlh Amendment "reasonable expectation of privacy." In an opinion by Justice Stevens, the Supreme Courl disagreed with that logic by stating:
Jacobsen, The concept oJ'an interest in privacy that society is prepared to recognize as reasonable is, by its very natLrre, critically dffirent .fiom the mere expectation, however well justified, that certain facts will not come to the attention of the authorities....A chemical test that merely discloses whether or not a particular substance is cocaine does not compromise any legitimate interest in privucy.
Because cocaine was illegal contraband the defendant had no right to possess it and no extraconstitutional right to stop the government from conducting the test to identify it. The defendant's expectation that the identity of the illegal
a series ol courl cases were triggered by defendants' claiming that their right to Fourlh Amendment protection had been violated. For example , in United States v.
powder would remain a secret did not establish a constitutionally recognizable reasonable expectation of privacy.
42O
Griminal Codes
be
Act also expanded the list of criminal activities for which wiretaps can
ordered. Wiretaps are ordered when terrorist bombings, hijackings, or other violent crimes are susPected. The Federal Wiretap Statute provides,
,'Immecliately upon the expiration of the period [covered by the wiremade available to the judge tap orderJ . . . recordings shall be isstring such order and sealed under his directions. . . . The presence of the seal ... or a satisfactory explanationfor the absence thereof,
shall be a prerequisite .for the use or disclosure of the contents " of the intercept. [18 U-5.C. 2518(B)(a)]
This provision of the statute requires that the recordings captured during the time of the wiretap be given to the judge within a reasonable amount of time-or the contents of those recordings are inadmissible. The judge must, in effect, "seal the evidence" to prevent tampering as part ofthe chain ofcustody' This period of time is not specified in the statute. Defense attorneys had tried to get wiretaps thrown out by claiming that there was a delay getting the recordings to the judge. o'service provider exemption" to find In some cases, coults have used the that any company furnishing computer hardware and software may access its employees' .-1nult files. For example, in Bohach v. City of Reno (1996), a federal court rejected privacy claims under the ECPA raised by two police officers in Reno, Nevada. Officer John Bohach had sent messages to other
members of the department over the departmenth Alphapage messaging system. Several months later, an internal affairs investigation was being conducted based on the contents of those messages. Bohach and another officer filed a lawsuit against the City of Reno claiming that the department's accessing and retrieving the old messages violated the federal wiretap statutes. The court disagreed. The court reasoned that because the nature of the Alphapage messages wefe essentially e-mail, the officers could not have ."u.onubly believed them to be private. Also, the court cited a department order informing employees that their messages would be "logged on the network" and that sending certain types of messages was prohibited. The court found that the city was a "service provider" as defined under the ECPA and was "free to access the stored message as it pleased." Therefore, the court found that the city had not violated the ECPA.
61(
Apulsation of the dial on a line to which the pen register is attached records on a paper tape dashes equal to the number dialed. The paper tape then becomes a permanent and complete record of outgoing calls and the numbers called on the particular line. Immediately aftei the number is dialed, but before the call is answered, the pen register mechanically and automatically disconnects. There is no recording or monitoring or tn"
conversation.
Anttcrtme
Laws 421
The pen register and trap and trace statute, or the pen/Trap statute, governs the collection of noncontent traffic information associated with communications, such as the phone numbers dialed by a particular telephone. Rather than the strict probable cause necessary for wiretapi ,pen register orders require only certification from a law enforcement officer that "the information likely lo be obtained is relevant to an ongoing criminal investigation.'. If the application for installation of a penltrap device contains these elements, the court will authorize it. This statute was enacted as part of ECpA. Section 216 updates the Pen/Trap Statute in three ways:
1. The amendments clarify that law enforcement may use pen/trap orders to trace communications on the Internet and other computer
networks.
2. Penltrap orders issued by federal courts now have nationwide effect. 3. Law enforcement authorities must file a special report with the court
whenever they use apenltrap order to install their own monitoring device on computers belonging to a public provider.
usc
Title lB of the CFAA deals with "crimes and criminal procedure.,, Section 1030 of ritle l8 deals with "Fraud and related activity in connection with computers." Under lB usc $1030, the government does not
have to prove that an individual who accessed a federal interest computer network unauthorized had intended to damage it, only that he intended to
access it.
422
CHAPTER t
There ore two sources of outhority for federol wiretops within the United Stotes. ,l968. The first outhority is the Federol Wiretop Act, or Title lll, of ,l986 by the ECPA. li.sets procedures for court It wos exponded in outhorizoiion of reohime surveillonce of electronic communicotions, including voice, e-moil, fox, ond lnternet, in criminol investigotions. Before u"sing o wiretop, on offidovit must be submitted to o iudge thot there is pro-boble couse to believe thot o crime hos been, is being, or is obout to be committed. Bosed on the offidovit, the iucige then issues the wiretop or denies it. Under extreme circumstonces, o iudge's order moy not be necessory. 'The second outhority is the Foreign lntelligence Surveillonce Act (FISA) of 1978. FISA ollows wiretop[ing in the United Stotes bosed on proboble couse thot the person is o member of o foreign terrorist group or on ogent of o foreign power.. For U.S. citizens ond permoient'resident o-liens, proboble couse thot the person is engoged in criminol octivities is needed. For others, suspicion of criminol octivity is not required for the wiretop. The USA PATRIOT Act ollows Prosecutors to use FISA for the pripor" of gothering evidence in criminol investigotions of notionol security crimes.
Section 225 o[ the oct is relevont to computer forensics investigotors. lt gives immunity from civil lowsuits to ony person who provides technicol ossistonce in obtoining electronic informotion pursuont to o court order or
to or through a pfo-
tected computer. The act included new guidance relating to computer crime and e-evidence. The Field Guidance on New Authorities that Relate to Computer Crime and Electronic Evidence Enacted in the \JSA Patriot Act of 2001 provides the authority to do several things. Authorizations include:
1. Intercepting voice communications in computer hacking investigations 2. Allowing law enforcement to trace communications on the Internet and
I
other computer networks within the pen and trap statute (pen/trap statute)
i
I i
6(
Crime and Electronic Evidence Enacted in the uSA patriot Act of 2001 at wwn'.usdoj.gov/criminal/cybercrime/patriotAct.htm. The guide develops and supports cybersecurity forensic capabilities. visit www.cybercrime.gov/ PatriotAct.htm for the latest provisions of the law.
The law raised the maximum penalty for hackers who damaged protected computers. See the Field Guidance on New Authorities That Relate to Computer
Anticrime
Laws 423
#egnrfexd,&6rfd*mmre,{#? ##r#y;rf,$rf*
-e e
The l99B^_Digitol Millennium copyright Act permits music componies to force lsPs to turn over the nomes -of suspected music pirotes upon subpoeno from ony U.s. District Court clerk's offi." ond *ithort o iudge's signoture.
ln United sfofes v. Forest ond Gorner, the U.S. Court of Appeols for the sixth circuit (Jonuory 27, 2oo4l reiected o defendont's efforts to exclude evidence thot hod been obtoined by federol ogents who used cell'site dala. Agents used doto from the defendon'i's cellulor telep.hong service provider to trock his movements ofter the ogents lost visuol contoct. The court reiected his orguments, which he hId bosed on Title lll of the omnibus Crime control ond Sofe streets Act of l96g ond Fourth Amendment. Drug Enforcement Agency (DEA) ogents secured court orders giving them outhority to inteicepithe defend"ont's cellulor pl.onq colls. lt o-lso required the cellulor service provider to disclose oll subscriber informotion relevont to the investigoiion. While conducting surveillonce of the defendont o,id o codefendont, the..ogents lost trock of them. The ogents then dioled the defendont's cell phone s.everql times ond used t[e provider's computer doto to determine which cell tronsmission towers were being ,,hit,, by thol ph9le. The cell-site doto reveoled the defendont's ge"nerol locotion ond helped cotch him. on oppeol of his conviction, the defendont orgued thot the ceilsite doto ond resulting evidence should hove Leen suppressed becouse. they .turned his phone into o trocking device-ond thot violoted his rights under both Title lll ond the Four'ih Amendmenr.
424
CHAPTER t Z I
ln on opinion by Judge Ronold Lee Gilmon, the court found thot the cell-site doto cleorlydoes-not foll within Title lll's definitions of orol communicotion or wire communicotion, ond thot the only other siotutory cotegory thot the doto might fit into is electronic communicotion. The court oiini"d out, howev"r,lhot even ossuming thot cell-site doto does meet ih. d"finltion of electronic communicotion, Title lll provides suppression os o remedy only for the illegol interceptions of orol or wire communicotions ond not for the illegol interception of electronic communicotions' The court reoched thl some conclusion with regord to the defendont's orgument thot the outhorities turned his cell phone into o,trocking -d^ey'1cg *iihtn the meoning of 1B U.S.C. 53l,|7. The court ruled thot S3l'lZ does not provide sJppression os o remedy-regordless of wheiher or not o phone fits the definition of o trocking. device under thot stotute. The defendont olso cloimed thotihe cell-site doto ond resulting evidence should be suppressed under the exclusionory rule of the Fourth
'
Amendment. But the court ruled thot the defendont hod no legitimote expectotion of privocy in his movements olong o public highwoy.
Sneak and Peek Provision The primary stated purposes of the USA PATRIOT Act are to "deter and punish terrorist acts in the United States and The around the world [and] to enhance law enforcement investigatory tools'"
Act changed the point at which individuals being searched-the targets-are to the be notified of that search. Prior to this Act, the target was notified when permits an investigator to physical search was being made. The PATRIOT Act delay notification (Wegm an, 2004). This notification delay has been described as a sneak und peek provision, mostly by critics of the act (Shulman,2003). Law enforcement can delay notifyingifre target for up to 90 days and then get another delay by showing some gooJ.uu... To obtain authority for delayed notification, an investigator must iho* u need for the delay, such as danger to the life or safety ofan individual, risk of flight from prosecution, witness or evidence tampering, or that immedi,,seriously jeopardize" an investigation (wegman,2004). ate notice would
for surveillance and search ofe-evidence provided by the act are: 1. Judicial supervision of telephone and Internet surveillance by law enforcement is limited. 2. Law enforcement and intelligence agencies have broad access to sensitive medical, mental health, financial, and educational records with limited judicial oversight.
6(
3.
The government has the power to conduct secret searches of individuals' homes and businesses, including monitoring books bought from bookstores or borrowed from libraries.
Anticrime
Laws 425
The USA PATRIOT Act requires that an agency that sets up surveillance using its own pen/trap device on a packet-switched public data network identify:
on individuol thon
The date and time the device was instarled and uninstalled and the duration of each time the device was accessed
modification
(Dean,2005). First reports indicated that the NSA limited monitoring to foreign calls originating in the United States or abroad and that fewer than 500 calls were being monitored at a time. But later reports indicated that the NSA was ,.data mining" millions of calls by using access to telecommunications companies, switching stations through which foreign communications traffic flows. on January 6, 2006, Morton H. Halperin, the executive director of the open Society Policy center at www.opensocietypolicycenter.org, released the memo addressing the legal issues in 'A Legal Analysis of the NSA warrantless Surveillance Program." In response, on February 6,2006, the Hon. Alberto R.
Gonzales, attorney general of the United States, released a prepared statement
at www.commondreams.org/headlines05/1216-0l.htm.) This order ignored procedures of the Foreign Intelligence Surveillance Act (FISA). The New York Times article reported that in 2002 Bush issued an executive order authorizing the NSA to track and intercept international telephone and e-mail traffic into or out of the United States when one party was believed to have ties with al Qaeda. Initially, neither Bush nor the white House confirmed nor denied that the president had ignored the law. In his radio broadcast on Decembe r 17 , 2005 , Bush admitted that the New york Times was correct. Many legal scholars have argued that by issuing the warrantless wiretapping in violation of FISA and bypassing congress, the president committed an impeachable offense. only congress can decide whether to allow such wiretaps
426
available at www.usdoj.gov/aglspeeches/2006/aSspeech-060206.htmI in which he defended the surveillance program. His defense was "Congress and prothe American people are interested in two fundamental questions: is this questions is yes." Gonzales gram necessu.y urra is it lawful. The answer to both also attacked critics by stating that "These press accounts are in almost every case, in one way or another, misinformed, confused, or wrong'" For articles on the current state of this issue, visit the National Security
Agency (1[S/) section of Findlaw news archives at news.findlaw.comflegalnews/
documents/archive-n.html.
TABLE 12.2 Definitions of the key terms in lhe Computer Fraud and Abuse
Acf (Federal Statute 18 U.S.C. $1030).
Protected
Affects domestic, interstate commerce or communications of the United States r Affects foreign commerce or communications of the United States ln effect, every computer connected to the lnternet is a
6(
Anticrime
Laws 427
r Exceeding
Authorized Access-,,Access in excess of authority" applies to anyone who has authorized access to a computer and uses that access to obtain or alter information that he is not allowed to obtain or alter.
Damage is defined as any impairment to the integrity or availability of data, a program, a system, or information. That impairment must cause:
r r
A loss to one or more persons (or companies) during any 1-year period totaling at least
$5,000 in value The modification or impairment of medical records Physical injury to any person
Damage to a government computer system used for administering justice, national defense, or national security
Loss
Loss is defined as any reasonable cost to any victim, including the cost of:
. I
r
Restoring the data, program, system, or information to its condition prior to the offense Lost revenue or other damages because of interruption of service
"lntentional conduct" means conduct by anyone who knowingly transmits a "program, information, code, or command" that causes damage to a protected computer. This applies to both insiders and outsiders. "Reckless conduct" means intentional access to a protected computer without authority that unintentionally but recklessly causes damage. This applies only to outsiders.
A troil of electronic doto from U.S. Web sites led to the convictions of more thon 22 British customers who hod bought psychedelic drugs online. Customers were identified from e-evidence collected during o U.S. DEA sting operotion-Operotion Web Tryp. The evidence led
police to oddresses ocross the UK. ' For severol yeors, psychedelic drugs known os "reseorch chemicols" hod been sold openly from U.S. Web sites. Since mony of the reseorch drugs ore too powerful psychedelicolly to cotch on with users or deolers, they ore ovoiloble only from e-commerce
sites.
The online drug trode come to the ottention of U.S. low enforcers in Morch 2004 ofter Jomes Downs, 22, died from on occidentol overdose of 2-CT-21 he ordered online. lnvestigotors troced his purchoses to o Los Vegos reseorch chemicols Web site, which imported chemicols from lobs in Chino qnd lndio. Thot yeor, the DEA shut down the Web sites ond orrested the site
operotors. ' Eoch e-commerce Web site hod thousonds of customers in the United Stotes ond Europe. Customers could order their drugs with one-click systems of poyment vio credit cord or PoyPol, ond their purchoses weie delivered the next doy by FedEx ond other corriers. Customer records ond credit cord detoils were gothered from seized computers. After investigotors hod verified the intelligence, detoils were sent to UK police forces. Reseorch chemicols ore not officiolly listed os controlled substonces under U.S. drug lows. Therefore, the Web site operotors were prosecuted under o lo* thot prohibits the possession ond..supply of chemicols "substontiolly similor" to controlled drugs' All the oferotors foce life sentences,.ond severol hove been chorged with cousing deoth or serious iniury' ln Moy ?095,operotor Dovid Linder-wos found guilty on 27 chorges, including drug-conspirocy ond money loundering. He wos sentenced to o totol of 410 yeors in prison 'ond order"d to poy bock $200,000 in. profits from the'Web site. The severity of his sentence wos reloted to the deoth of on 'lB-yeor-old New York mon who overdosed on the drug olpho-methyltryptomine (AMT) purchosed from Linder's site (McCondless, 2005).
6(
r".t
Your
Skills 429
Actual federal cases and court decisions were presented to illustrate the tough
a tegat search so as not to compromise cases, convict innocent people, or let guilty p.opl. go free. Before seizing computers, FourthAmendment r"u..h warrant requirements
In this chapter, you have learned about the Federal Rules of Evidence and procedure that directly impact investigative procedures and the admissibility of evidence.
challenges to an investigator's experience, evidence handling, hardware, and procedures. clearly, investigators need a working knowledge orwhat constitutes
Amendments to anticrime legisration, particularly the USA pATRIorAct, have given greater search and seizure authority to law officials and investigators-at the expense of privacy. The next chapter also examines ethical issues and dilemmas.
need to be met. Before accessing stored data, the requirements of the Electronic Communication Privacy Act must be considered. Conducting real-time electronic surveillance may require a wiretap order from a judge. In the next chapter, you will learn how to present testimony about evidence and methods in court or legal action.
l.
what is the fundamental principle guaranteed by the Fifth Amendment to ensure that civil and criminal cases follow federal or state rules fairly?
Due process ofthe case.
.B. Due process of the law. C. Rules of criminal evidence. D. Due protection under the law.
2. What is meant by prejudicial treatment? A. Deprived protection. B. Discrimination against minorities. C. Equal treatment. D. Unequal treatment.
3. when the
1970 amendment to Rule 34(a) made electronic data subject to discovery what type of evidence was used soon afterward in legal actions?
A. B. C. D.
Computer printouts.