Fourth Straight Federal Court Rules Publicly Shared P2P Data Has No Privacy Rights
November 14, 2013 9:12 AM
comment(s) - last by
If you chose to open your data to the public, it is "open and obvious" to law enforcement
In one episode of the long-running reality TV show cops, an officer approaches a person whose car is parked in the street. The sleeping man awakens and the officer asks if he has taken drugs. The man denies that of course. And the cop asks him if he's sure, and says "Then what's that?"
The camera pans down, and sitting on his lap is a bag of powdered drugs. The groggy suspect looks down and his face suddenly transforms into a look of shocked recollection as if to say "how did I forget THAT was there?" "Oh SH-T!" he exclaims.
I. Open and Obvious for the Digital Age
This textbook example of open and obvious illustrates in the offline world the kinds of cases in which a police officer can search your property and person without warrant.
In the digital case, despite the mess of technically ignorant and overreaching laws, one bright point is that a relatively reasonably "open and obvious" analogy is being adopted for law enforcement. Federal courts in the 11th Circuit, 10th Circuit, 8th Circuit, and now 2nd Circuit (namely, the
U.S. District Court for the District of Vermont
) have ruled that the Fourth Amendment protection against warrantless searches does not apply to digital content made publicly available by a suspect.
While cybercrime requires courts to develop a level of tech savvy, many principles of offline law enforcement can still be reasonably applied. [Image Source: TechieNews]
Namely, the case in question deals with Derek Thomas, Douglas Neale, and Stephan Leiker -- a trio that stands accused of sharing child pornography via publicly available torrents.
The lawyers for the defendants in the case sought a relatively creative, although questionable defense claiming that law enforcement officers' search
violated their Fourth Amendment rights
by inspecting "private" files on their clients' computers. They asked a federal judge to suppress that evidence -- which in turn could allow the suppression other evidence potentially found after investigators obtained warrants based on the probable cause incited by these shared files.
II. Evidence is Admissible if Collected From Publicly Available Materials
In the end, the defense never quite explained how files made publicly available from torrents could constitute anything but an open and obvious piece of digital property. Predictably
District Court Judge Christina Reiss
denied the motion ruling that the suspects had given up their right to privacy when they made their information publicly available to the internet.
USDC Chief Judge Christina Reiss presides over her court. [Image Source: Burlington Freepress]
Defendants conveyed certain information to the public when they used peer-to-peer file sharing software and made certain files available for sharin
Because there is no evidence that law enforcement's use of automated software reached information on Defendants' computers that was not made available for sharing by the public, Defendants' motions to suppress on the basis of a warrantless search in violation of the Fourth Amendment must be DENIED.
The investigators used a piece of software by TLO plc dubbed the Child Protection System (CPS), which searches public torrent hosting sites for terms that might relate to child pornography. Once a positive hit has been verified the tool investigates the site where the torrent was posted (as most major torrent sites like
The Pirate Bay
remove such links, child pornography torrents are typically hosted by individuals actively involved in criminal child pornography) and records the "IP address, the files' hash values, the actual file names, date and time of response, and other computer detail" according to a blog by Sophos plc.
BitTorrent is the
world's most popular means of filesharing
, with the death of older proprietary P2P networks (
such as Limewire
) due to legal issues. BitTorrent is estimated to account for 3.35 percent of total global internet traffic and is used by over 150 million people. Unfortunately,
a small minority exploits the popular filesharing protocol
to distribute abusive content, such as videos of murder, rape, or child abuse.
BitTorrent downloads are controlled by trackers which are downloaded along with other file metadata by a user. This metadata typically includes the file's cryptographic hash (which uniquely identifies it) and a brief description, including keywords.
The investigators in the Vermont case used a piece of software by TLO plc dubbed the
Child Protection System
(CPS), which searches public torrent hosting sites for terms that might relate to child pornography. The Judge in the case offers a fairly sound technical description of the tool, stating:
This software is designed to replace the searches that were previously done manually by law enforcement and the public. The software reports information that is discoverable by the general public using publicly available P2P software.
She rejected the defense's complaints that the tool was automated and proprietary as she pointed out that a manual search -- no matter how time-consuming -- would have yielded identical results.
III. Automated Tools are a Valid Means of Fighting Child Pornography
From a technical standpoint CPS and similar tools first scan large blocks of IPs or alternative crawl indexed lists of web addresses via indexed content sources like Google Inc.'s (
) search. When torrents are encountered, the metadata is inspected for the keyword terms denoting illegal content.
Investigators then inspect the file to determine that it's indeed illegal content, not a false positive. Once confirmed, the tool downloads the torrent and proceeds to ping the users listed by the tracker to see if they have a shared file mashing the hash, as per the standard BitTorrent protocol. After collecting these IPs, the tool then logs off without downloading the file.
Be aware of what you share. Sharing is caring, but if you share something publicly, you reveal that you possess that thing. If that thing happens to be illegal, you may be in trouble. [Image Source: KSWP]
In this case each of the suspects was verified to be openly sharing files whose hash exactly matched the confirmed file depicting child pornography. Subsequently search warrants were obtained and more child pornography was found on the suspects' computers.
The outcome is "the same as probably 50 other cases",
John Wesley Hall
, a criminal defense lawyer, who maintains the
blog. He notes:
The only thing that's surprising to me is that people still raise that issue. It's a settled issue beyond peradventure as far as I'm concerned.
IV. The Devil is in the Details -- So Tread Lightly
A couple of key points to note to put the ruling in context follow.
been established by some responsible, tech-literate federal judges
that an internet protocol (IP) address
does not uniquely identify a person or user
. If this were the only evidence against a plaintiff, then the defense would have a much stronger argument. But unfortunately for the defense, their clients' seized computers contained pornographic files. Barring signs of tampering, that's about as conclusive a law enforcement finding as can be.
While activity on an IP does not clearly imply guilt by a specific person, it is a fair reason for probable cause. [Sen. Collins]
The distinction between initial suspicion and confirmation that the suspect has illegal materials is important as some law enforcement officers have
behaved inexcusably during the warranted search phase
in past cases, manhandling homeowners, only to finding the illegal content was
downloaded by a cybersquatter
who was piggybacking on their network. In such cases, the warrant and search seemed reasonable, but the execution proved troubling, as the officers actions seemed indicative of a false assumption of guilt that was by no means justified by mere IP verification.
Some might say, "secure your networks", but it's important to remember that
many forms of popular network encryption are easily crackable
. Thus it's inexcusable to assume that a user with an average degree of tech savvy can completely secure their wireless networks from advanced users. That makes the "innocent until proven guilty" paradigm all the more important.
Second, there's a big difference between a public law enforcement entity collecting records of users who share criminal content and a private entity collecting information on users who share copyrighted content. In the latter case the typical goals is to collect a list of internet subscribers
to try to extort money from
There's a massive difference between responsible law enforcement and extortion schemes designed around unproven allegations of copyright infringement. [Image Source: Sodahead]
The latter tactics are highly questionable, as the private enforcement groups involved typically make little to no effort to verify that the person receiving the threats (the network owner) actually engaged in the content. Further they
a few rare occurrences
) take their targets to court, so there's no real due process.
Further, such efforts often operate under the false premise that making available is akin to sharing. Making available simply means you have the content. The Vermont case gets this correct, as the men were charged with the
of child pornography. If a file is illegal, often you shouldn't be in possession of it.
But the offense is possessing the file, not sharing it as it's impossible to determine in most cases whether a user's data was access via filesharing, much less how many users a certain user ultimately shared pieces of a file with. As copyright extortion typically focuses on the act of sharing to balloon the amount of damages is sought, it's typically founded on a fallacious and technically ignorant premise.
Last, but not least there is clearly a distinction between
encrypted, unshared data
-- which is not open or obvious -- and unencrypted, publicly shared data. Hopefully law enforcement and the courts recognize and respect that distinction.
This article is over a month old, voting and posting comments is disabled
11/14/2013 5:59:21 PM
Apple-Tracker should use this in their defence,
After all they just did automated harvesting of publicly available data same as here.
"My sex life is pretty good" -- Steve Jobs' random musings during the 2010 D8 conference
Owner of Lavabit Faces $10K Fine For Protecting His Users From Federal Spying
November 13, 2013, 12:14 PM
Texas Aims to Become the First State With Strong Email Privacy Protections
May 29, 2013, 4:30 PM
Another Judge Rules IP Addresses Can't be Used to Identify People
May 5, 2012, 10:26 PM
Congress Plugs Anti-Piracy Legislation By Day, Pirates Porn by Night
December 29, 2011, 10:41 AM
RIAA Scores $105M USD from Limewire, May Give Nothing to Artists
May 13, 2011, 11:24 AM
Amazon, HBO Team up to Bring HBO Content to Prime Members
April 23, 2014, 11:36 AM
U.S. Wants to Reduce Tension Over Internet Net Neutrality
April 22, 2014, 2:07 PM
AT&T Announces Plans to Expand Ultra-Fast Fiber Internet Network to 100 Cities
April 22, 2014, 9:36 AM
AT&T Takes First Steps in Launching Its Own Online Video Service
April 22, 2014, 9:25 AM
Netflix Opposes Comcast/Time Warner Deal, Says It's Anti-Competitive
April 22, 2014, 8:52 AM
Quick Note: Netflix to Raise Streaming Prices Later This Year for New Customers
April 21, 2014, 11:09 PM
Most Popular Articles
A Bug's Life: Female Cave Bugs Have Penises, Penetrate Males for Three Days
April 17, 2014, 7:20 PM
HTC Hires Former Samsung Marketing Chief Who Developed "Galaxy" Brand
April 18, 2014, 6:00 PM
NASA Finds "Habitable Zone" Planet Sized Similar to Earth
April 18, 2014, 3:13 PM
Mounties Arrest 19-Year-Old Who Delayed Canada's Tax Filing w/ Heartbleed
April 17, 2014, 3:24 PM
Thanks to Government Crackdown, Chinese "Porn Cop" Has Watched 600K Adult Videos
April 21, 2014, 12:00 PM
Latest Blog Posts
Facebook Aims to Provide Internet to "Every Person in the World" with Drones, Satellites
Apr 1, 2014, 10:20 AM
Retail Mobile Sites Experience Outages in Light of Simplexity's Bankruptcy
Mar 14, 2014, 8:48 AM
Tesla vs. BMW: Who Has the Safer EV?
Feb 1, 2014, 2:56 PM
Justice Leaks Details of Next HTC One Two Flagship Phone
Dec 5, 2013, 4:04 PM
Global Cyber Espionage Concerns Reveal Growing Cyber Armies
Nov 29, 2013, 11:04 AM
More Blog Posts
Copyright 2014 DailyTech LLC. -
Terms, Conditions & Privacy Information