The Fourth Amendment Needs Some Judicial Tinkering In The High-Tech Arena
Lindsay Marie writes at FEE about Ross Ulbricht and the Silk Road case:
On June 28, 2018, the Supreme Court (Court) denied a petition by Silk Road founder Ross Ulbricht that would have forced the Court to address where government surveillance and the Fourth Amendment intersect online.34-year old Ulbricht, who is currently serving a double life sentence for a non-violent crime petitioned the Court to review his case; specifically, whether the evidence used to arrest and convict him was seized constitutionally or not.
The evidence in question was obtained through warrantless government surveillance of the wireless router in his private home. The Court's refusal to review Ulbricht's case affirms an outdated legal precedent that essentially nullifies the Fourth Amendment in the age of the Internet.
Warrantless government surveillance of the wireless router in his private home.
Okay, so you're no kind of kingpin. But the police can want to "get" someone for all sorts of reasons -- like as a pawn to "get" somebody else.
This affects all of us.
The government used a "pen register" -- sans warrant -- to spy on Ulbricht's communications:
A pen register records outgoing data from devices such as telephones, computers, and email accounts. Conversely, a trap and trace device collects the incoming data. Together, they are known as a "pen/trap." Authorization under the ECPA does not require probable cause, just merely the belief that the information "likely to be obtained" would be "relevant" to an ongoing investigation. The government obtained the authorization, and they remotely and secretly applied a pen/trap to the wireless router in Ulbricht's living room.The pen/trap that was secured without a warrant or showing probable cause allowed the government to isolate and identify the Media Access Control (MAC) address of Ulbricht's laptop. Using that MAC address, the government once again sought another pen/trap, this time to be applied to Ulbricht's laptop. Once again, the government was awarded the authorization without showing probable cause and without a warrant. Two weeks later, the government's constant warrantless surveillance produced enough evidence to secure an arrest warrant for Ulbricht. Although Ulbricht was just the founder of the website and not one of the individuals creating accounts to buy and sell drugs, the government charged him with numerous counts of drug trafficking and other related offenses.
Ulbricht's legal team motioned for the suppression of the evidence collected via the pen/traps as it was obtained without probable cause and without a warrant. The district court denied the motion based on a legal precedent called the third-party doctrine set in the late 1970's in Smith v. Maryland. In Smith, the Court looked at if government conducted surveillance on Smith's landline telephone through a pen register, that was obtained without a warrant, violated his Fourth Amendment rights. The Court held that since Smith voluntarily shared information with a third party, the telephone company, by dialing phone numbers, that he had no expectation of privacy.
This is just insane. And should be of concern to all of us.
The Court's decision doesn't just leave Ulbricht in prison; it also leaves in place the third-party doctrine as the legal precedent for cases involving warrantless government surveillance and the internet. Until the Court decides to take up a similar case, there will likely not be an "expectation of privacy" regarding information given to a third-party such as an internet service provider. If there is no "expectation of privacy", Americans' personal internet activity which is sent from the wireless routers in their private homes to their laptops, cell phones, tablets, and other connected devices, will not be protected from warrantless government surveillance and thus, can be used as evidence to arrest, charge, and convict them.








The government and private entities have the right to conduct warrantless public surveilance of anyone. The information they they need a warrant to collect is that information which the courts have established as a violation of the right to privacy.
What Ulbrict actually did that was criminal, and whether it should be, is another matter entirely.
I suspect going after the feds ability to collect data via a pen register would also invalidate most of the prosecutions for internet child pron.
Isab at July 26, 2018 5:40 AM
Agree with Isab - the guy is serving a double life sentence for setting up a website - that seems like the real travesty here.
Petition for clemency -
https://www.change.org/p/freerosspetition-we-seek-potus-s-clemency-for-ross-ulbricht-serving-double-life-for-a-website-realdonaldtrump-free-ross
Snoopy at July 26, 2018 6:33 AM
Warrantless government surveillance of the wireless router in his private home.
Other than the fact that his wireless signal was reaching the public street[*], you have a point. Just like the constabulary does not need a warrant to poke thru your trash once you've set it out on the street for pickup.
If you're concerned with your privacy, don't use wireless unless it requires AES encryption. Do use a wired network. Do use encryption. Do use a VPN. Do use a shredder for your sensitive snail mail.
Is that overkill? perhaps. Will you be called a terrorist or a right wing extremist by the very people who want to peek at your data? you bet. Is it better to have layers of defense? I think so.
[*] unless his home was far enough away from public right of way to not be electronically visible from the street
I R A Darth Aggie at July 26, 2018 6:56 AM
IRA your * is pretty much impossible. I have a friend who I gave the old satellite dish off the top of my house. With that he was able to connect to the wireless router in his apartment from several miles away.
Ben at July 26, 2018 9:52 AM
Ah, the ol' Pringles can trick. Forgot about that one. They could even fly a smallish drone overhead for the same purpose.
So, again, use AES encryption between your wireless devices, or construct a Faraday cage around your house, or at least parts of it you don't want leaking. So far as I know, AES is secure, but then the implementation may be insecure.
I R A Darth Aggie at July 26, 2018 10:22 AM
As this isnt illegal, whats to stop spys from doing it to government officials?
lujlp at July 26, 2018 11:55 AM
You can Lujlp. Government officials who have classified data on a wireless network are already committing a crime. At least if your name isn't Clinton. So stealing state secrets and such shouldn't be an issue. If you are on public property and they are using unsecured hardware then that is on them. Just don't break anything. You may be liable at that point.
Ben at July 26, 2018 12:32 PM
"Other than the fact that his wireless signal was reaching the public street[*], you have a point."
That principle has already been breached, though. Back in the day, it was a legal principle that it was legal for anyone to intercept any radio transmission. There were limits on disclosing the contents of intercepted transmissions, but monitoring itself was legal in all cases. However, in the early '90s, Congress passed a law that carves out an exception for cell phones. It is illegal to monitor a cell phone transmission even if you don't disclose what you intercepted. So being that one carve-out already exists, there is nothing in principle that would stop Congress from creating another one for wireless networks.
Cousin Dave at July 27, 2018 8:31 AM
So theoretically you could use your cell phone as a wifi hot spot generator to prevent warrant less rifling of your data flow?
lujlp at July 27, 2018 9:31 AM
Leave a comment