########## | ########## | ### | THE DOCUMENT CASE ####### | ####### | A collection of briefs, judgments ### | white papers, rulings, and references of ########## | moment to the issues of law and order on ########## | The Electronic Frontier | ########## | ########## | ### | Document #: 3 ####### | Title: Constitutional, legal, and ethical ####### | considerations for dealing with electronic ### | files in the age of cyberspace ### | Archived/Published to the Net: August 7, 1991 ### | | ########## | ########## | Anonymous ftp archive maintained by ### | Mike Godwin and Chris Davis at ####### | The Electronic Frontier Foundation (eff.org) ####### | ### | These documents are in the DOCS subdirectory ### | of the ftp directory. Related files may be ### | found in the EFF and SJG subdirectories. FEDERAL ENFORCEMENT 1991 Georgetown University Law Center Washington, D.C. May 16-17, 1991 CONSTITUTIONAL, LEGAL, AND ETHICAL CONSIDERATIONS FOR DEALING WITH ELECTRONIC FILES IN THE AGE OF CYBERSPACE Harvey A. Silverglate and Thomas C. Viles (FN1) Introduction -- The Reach of Cybernetic Technology. Without pause over the past decade, computers have transformed the physical organization of work in virtually every office in the nation. Businesses and law firms are spurning the use of paper to deliver and store information; instead, they have become dependent upon the use of computers and electronic systems for these functions. Now it is common to draft, revise, and edit all documents -- from briefs, to business proposals, to contracts -- without ever generating a paper "hard" copy until the document is ready for signature and submission. Furthermore, now it is possible for the personnel of a company or law firm to conduct all of their in-house discussions on a computer network which transmits and receives electronic mail ("e-mail"). E-mail can be used for written messages of great import as well as trivial asides and gossip. All such messages can be stored for later retrieval. Using networks and e-mail in tandem, teams of people in different offices can create, edit and complete lengthy written projects, literally without ever speaking to each other, or ever looking at paper copy. Communications between the office workplace and the outside world also can be conducted through the use of "networks" of computer systems. For example, the home office of a company can communicate with all of its affiliates and subsidiaries by the transmission of written messages between their respective computers ("nodes", in computer argot). In this way, all operations which can be performed simultaneously within one office, can be performed with equal facility among many offices, linked by the computer networks. Such systems also enable the attorney to stay in close contact with a client when it is necessary to work together on a project which requires close attention to detail. Computers and computer networks also promise to substantially and rapidly transform civil society. There exists a variety of computer networks, which enable academic institutions and scholars, to conduct global conferences on matters of common interest. Through e-mail and electronic bulletin boards, scholars and researchers can share experimental data and resources. See "Common Electronic Policy," The Economist, Feb. 16, 1991, at 24. Recently, the volume of academic message traffic in the United States has been increasing by 30-40% per month. Id. This session of Congress is considering a bill, introduced by Sen. Albert Gore, to spend over $1 billion in computer research, of which $400 million would be dedicated to the construction of a new National Research and Education Network (NREN), capable of handling computer traffic many times faster than the networks currently in existence -- analogous to a new electronic interstate highway system. See id.; Leccese, "Hackers under Attack: Crackdown Raises Questions about New Forms of Speech," Boston Phoenix, Sept. 7, 1990, at 8, 18. It is estimated that the entire project will cost $200 billion to complete. Leccese, supra, at 22. There also are smaller networks, too numerous to mention, which are not affiliated with any company, university, government agency, or other established entity. These independent networks function as forums for people all over the world to communicate with one another about matters of interest, from the sublime to the ridiculous. The largest computer networks in the United States, InterNet and UseNet, are each actually made up of 2,000 smaller networks. See, e.g., "Common Electronic Policy," supra, at 24; Costikyan, "Closing the Net," Reason, Jan. 1991, at 22. InterNet reportedly carries the electromagnetic impulses created by over 500 billion keystrokes per month. Leccese, supra, at 9. Approximately 5,000 bulletin boards operate over the networks. Costikyan, supra, at 22. One notable example of the use of computer networks for purely expressive purposes is the Whole Earth 'Lectronic Link ("WELL"), which provides political activists, small businessmen, rock and roll fans, and hundreds of other groupings of people (including lawyers) a forum in which to discuss matters of common interest. The WELL is a "node" capable of running hundreds of different multi-party conversations (or "conferences") simultaneously. Like an electronic town meeting, groups of people can communicate together on a multiplicity of bulletin boards, or users can send each other private messages by e-mail. (FN2) Other networks, utilizing more modest equipment, can maintain only one or two bulletin boards at a time. Everyone with a personal computer and access to a phoneline can participate in any of these open networks -- and, with only a little extra equipment, can start a new bulletin board. Searches and Seizures Involving Cybernetic Machines. Over the past 15 months, the following incidents have come to our attention: *On January 24, 1990, a handful of Secret Service agents, accompanied by two employees of the local telephone company, seized the equipment of a twenty year old man living with his mother in New York. From his bedroom, they seized a Commodore 128 computer, 200 floppy disks, a telephone answering machine, cassette-playing radio, and all of his musical cassette tapes. Apparently, the Secret Service was searching for evidence of alleged "computer crimes." See Dibbell, "On Line and Out of Bounds", Village Voice, July 24, 1990, at 27; Jahnke, "The Cops Come to Cyberspace," Boston Magazine, November 1990, at 140; J. Barlow, Crime and Puzzlement 8P9 (1990) According to some reports, this raid (and a few other raids which were carried out simultaneously) marked the beginning of the so-called "Operation Sun Devil," described as a "two-year Secret Service investigation which involved 150 federal agents, numerous local and state law enforcement agencies, and the combined security resources" of numerous private telecommunications companies.(FN3) Barlow, supra, at 9; see also "Crime of the Century," Personal Computer World, Mar. 1991, at 187; Zachary, "Group to Defend Civil Rights of Hackers Founded by Computer Industry Pioneer," Wall Street Journal, July 11, 1990, at B4; Schatz, "Foundation to Defend PC Users," Washington Post, July 11, 1990, at B8; Edelman, "Kapor for the Defense in Computer Field," Boston Globe, July 11, 1990, at 33; "Kapor Forms Group to Aid Hackers," USA Today, July 11, 1990, at 2B. *On March 1, 1990 the Secret Service raided the offices of Steve Jackson Games, a small Austin start-up company which designed and manufactured fantasy role-playing books and games. The Secret Service seized the company's three computer systems, two laser printers, miscellaneous hardware, papers, back-up disks, and a single pocket calculator. The company's plans and galleys for a new role-playing game, GURPS Cyberpunk(FN4), also were seized, after an agent opined that the game was a handbook for computer crime. (The format of Steve Jackson's games is similar to that of "Dungeons and Dragons"; GURPS Cyberpunk consists of a lengthy instruction book plus general information about the game. In fact, all of the company's games consist solely of printed matter. The company was not in the business of manufacturing any software.) The Secret Service apparently suspected that an employee of Steve Jackson Games had participated in unlawful activity on the employee's own home computer system. At no time was the owner or any other employee of Steve Jackson Games considered a suspect. Because the seizure of the computers thoroughly disrupted Steve Jackson's business, half of the company's employees had to be laid off. It was months before the company was even able to gain access to its equipment, which held the manuscript for the about-to-be-published GURPS Cyberpunk game. Some of the seized equipment ran a bulletin board which was maintained for the purpose of swapping new role-playing game ideas with similarly interested people elsewhere in the United States. The board, which users gave the tongue-in-cheek title of "The Illuminati," ceased to operate. See Levy, "Search and Destroy: What Happened when the Secret Service Visited Steve Jackson Games," MacWorld, March 1991, at 51, 52; Costikyan, "Closing the Net," Reason, Jan. 1991, at 22P24; Lewis, "Can Invaders Be Stopped but Civil Liberties Upheld?," New York Times, Sept. 9, 1990, at 12; Zachary, supra, at B4; O'Connor, "$275,000 Donated for Hackers," San Jose Mercury News, July 11, 1990, at 1F; "Computer Foundation Planned," San Francisco Chronicle, July 11, 1990, at C4; Edelman, supra, at 39; "Kapor Forms Group to Aid Hackers," supra, at 2B. *On the day of the Steve Jackson Games raid, the employee's home was searched. His computer equipment, software, a quantity of TV cable wire, and telephone parts were seized and carted away. Also seized was an arcade version of Pac Man. To date, the employee has not been charged with any crime. See Lewis, supra, at 12; Dibbell, supra, at 30. *Two years ago, a computer hobbyist running a small bulletin board service out of Lockport, Illinois, discovered that his bulletin board had been used to transmit a telephone company document. He promptly notified the telephone company, and cooperated fully and voluntarily with law enforcement authorities in the investigation of what he had reported. He probably regrets that now, for the Secret Service agents, armed with a warrant, later seized all of the man's computer equipment, in order to secure evidence in their investigation of the transfer of telephone codes. Because of the seizure, his bulletin board was shut down. See, e.g., Costikyan, supra, at 24; Leccese, supra, at 21; Goldstein, Special Issue, "2600 magazine's commentary on Operation Sun Devil," 1 Computer Underground Digest #1.10 (May 17, 1990) (available on the WELL, April 12, 1991); J. Barlow, supra, at 11-12. *A college student in Missouri published a computer magazine entitled Phrack, which he distributed over the networks to about 1,300 people. He found a phone company document on a publicly accessible computer bulletin board, and he reprinted it in his magazine. Although the government never alleged that he was involved in taking the document, his computer system was seized, and he was charged with interstate transportation of stolen property. The computer seizure, ostensibly occasioned by his republication of a stolen document, effectively restrained him from publishing any more issues of Phrack.(FN5) Charges against the young man later were quietly dropped, when it was discovered that the "stolen property" -- the phone company document -- was available from the phone company itself, and that it cost somewhat less that $20. But the entire episode must have dampened his zeal to publish, for the magazine no longer appears. See "Crime of the Century," supra, at 188; Costikyan, supra, at 23-25; Levy, supra, at 52, 54; "United States v. Zod," The Economist, Sept. 7, 1990, at 23; Leccese, supra, at 20; J. Barlow, supra, at 10-11; Zachary, supra, at B4; Edelman, supra, at 39; "Kapor Forms Group to Aid Hackers," supra, at 2B; "Computer Foundation Planned," supra, at C4; O'Connor, supra, at 8F; Markoff, "U.S. Drops Computer Case against Student," New York Times, July 28, 1990, at 9. *On May 8, 1990(FN6), as part of "Operation Sun Devil," another bulletin board, called "RIPCO," was raided. All of the equipment necessary to run the bulletin board was seized. The RIPCO board had operated since 1983, and it had accumulated extensive text files which were accessible to its 600 users. No arrests were made, nor have any charges been filed against the operators. But the board was shut down. See, e.g., Thomas & Meyer, "Update on Ripco BBS and Dr. Ripco," 1 Computer Underground Digest, #1.26, (Aug. 2, 1990) (available on the WELL, Apr. 12, 1991). *Also frequent are instances where computers are seized incident to an unrelated arrest. For example, on February 28, 1991, following an arrest on charges of rape and battery, the Massachusetts state and local police seized the suspect's computer equipment. The suspect reportedly operated a 650-subscriber bulletin board called "BEN," which is described as "geared largely to a gay/leather/S&M crowd." It is not clear what the board's seizure is supposed to have accomplished, but the board is now shut down, and the identities and messages of its users are in the hands of the police. See Boyce, "Police Confiscate SM Files," Gay Community News, Mar. 11-17, 1991, at 3.(FN7) The Gulf between Law Enforcement Procedure and the Constitution. This small sampling of cases demonstrates the unequivocal determination of the government to conduct investigative seizures of entire computer systems, even when only a few files may be relevant to an investigation or prosecution. Such seizures can have immediate and catastrophic effects on computer users who have no connection to the conduct being investigated. Offices cease to function; businesses can no longer operate or service customers; bulletin boards and other forums are shut down. As discussed below, it is no exaggeration to compare such searches and seizures to the writs of assistance and general warrants which the Constitution's framers found so odious, and which the Fourth Amendment was designed to prevent. Law enforcement agencies explain this practice by referring to problems inherent in searching not only computers but any other storage system: The searching officers cannot know precisely which part of the system contains the data they seek. Furthermore, with the right sort of elegant technology, computer files can be deleted at the push of a button. According to this view, prudence suggests that the computer search will be futile, unless the entire system is seized and removed, so that the contents can be examined at leisure. That means, of course, the government's leisure, not the user's. It is cold comfort that the Fourth Amendment tolerates searches of the property of people not suspected of criminal conduct, and that it even permits searches in entirely noncriminal contexts.(FN8) People who are the victims of such a seizure are naturally outraged. Where the object of the seizure is a bulletin board, potentially thousands of users are deprived of a forum in which to communicate, and their words (recorded in the computer system housing the bulletin board) now are open to government scrutiny. The seizure of a small business's computer system, especially one involved in sales or research and development, effectively destroys the business. In larger companies, when the investigation into the operations of one department or subsidiary leads to a computer seizure, the operations of the entire company can be crippled or frozen. And, of course, the seizure of one or two pieces of computer equipment in a law office effectively can constitute the seizure of all of the office's client and billing files. The practice of conducting these searches and seizures represents the immense gulf that exists between law enforcement personnel and magistrates, on the one hand, and sophisticated computer users, on the other. As Mitchell Kapor and Michael Godwin point out in "Civil Liberties Implications of Computer Searches and Seizures: Some Proposed Guidelines for Magistrates who Issue Search Warrants," law enforcement personnel who conduct computer seizures seem to focus exclusively on what *could* go wrong in a computer-related situation.(FN9) The appropriate question under the Fourth Amendment, which every magistrate should ask before issuing a warrant, is not what could go wrong, but instead for what adverse events probable cause has been shown. It may be useful for prosecutors to know that "the data in the storage device or media can be erased, replaced with other data, hidden, encrypted, modified, misnamed, misrepresented, physically destroyed, or otherwise made unusable." But this does not mean that the magistrate should always find probable cause to believe that a particular computer owner or operator has done so, and then authorize a highly intrusive and disruptive seizure of a BBS [computer bulletin board system] so that investigators can do a low-level search for hidden or encrypted data. Reprinted in Proceedings: Fourth Annual Virus & Security Conference 426, 428 (1991), quoting D. Parker, Computer Crime: Criminal Justice Resource Manual, at 68 (1989). What seems to have happened is that prosecutors and law enforcement agents, in their zeal to avoid even the possibility that evidence might be lost, have gone overboard and undertaken general searches. As noted, the seizure of an entire computer system is equivalent to seizing all of a person's hard copy files, or (in the case of a bulletin board system or desktop publisher) seizing an entire printing press. Writs of Assistance, General Searches, and the Fourth Amendment. Even people of the so-called "framer's intent" school of constitutional interpretation must concede that such seizures go too far. "The use by government of the power of search and seizure as an adjunct to a system for the suppression of objectionable publications is not new." Marcus v. Search Warrant, 367 U.S. 717, 724 (1961). The Writs of Assistance, which the British Crown issued to authorize searches for, and seizures of, unlicensed publications, were an abomination to the American colonists. See generally Stanford v. Texas, 379 U.S. 476, 481-82 (1965). James Otis described the general search warrants used to enforce as "the worst instrument of arbitrary power, the most destructive of English liberty, and the fundamental principles of law, that ever was found in an English law book." Id. at 481, citing Boyd v. United States, 116 U.S. 616, 625 (1886). The Writs authorized the search of anyone connected with an unlawful or unlicensed publication, and the seizure of all of the papers and documents of such people. The Fourth Amendment has roots in the cases of Wilkes v. Wood, 19 How. St. Tr. 1153 (1763), and Entick v. Carrington, 19 How. St. Tr. 1029 (1765), in which free-thinking pamphleteers were arrested, and all of their books and papers seized, because of their alleged publication of seditious libels. The Wilkes case ended in liberty's favor, when the Court of Common Pleas ordered the Secretary of State to pay Wilkes damages. The Entick case resulted in Lord Camden's declaration that the power to issue Writs of Assistance, and to conduct general searches, was an unlawful offense to civilized notions of justice. In Lord Camden's words, this power so assumed by the Secretary of State is an execution upon all of the party's papers, in the first instance. His house is rifled; his most valuable secrets are taken out of his possession, before the paper for which he is charged is found to be criminal by any competent jurisdiction, and before he is convicted either of writing, publishing, or being concerned in the paper. 19 How. St. Tr. at 1064, quoted in Stanford, supra, 379 U.S. 484. Parliament later acted legislatively to declare general warrants to be unlawful. Stanford, supra, 379 U.S. at 484, citing 16 Hansard's Parliamentary History of England, at 207. The Fourth Amendment was adopted a generation after Wilkes and Entick, while the memory of the Crown's unrestrained searches of colonial businesses for statutory violations was fresh. The amendment provides that all warrants shall "particularly describ[e] the place to be searched, and the ... things to be seized." In view of the Fourth Amendment's history, and its explicit language, it is beyond serious dispute that the Constitution prohibits wide-ranging exploratory searches. Neither can the police rummage through a person's belongings sua sponte, nor can a magistrate issue a warrant permitting a general and unlimited search. E.g., Steagald v. United States, 451 U.S. 204, 220 (1980); Lo-Ji Sales, Inc. v. New York, 442 U.S. 319, 325-26 (1979); see also Marshall v. Barlow's, Inc., 436 U.S. 307, 312-13 (1978); Roaden v. Kentucky, 413 U.S. 496 (1973); Coolidge v. New Hampshire, 403 U.S. 443, 467 (1971)("[T]he specific evil is the 'general warrant' abhorred by the colonists, and the problem is not that of an intrusion per se, but of a general, explanatory rummaging in a person's belongings."); Stanford, supra, 379 U.S. at 485-86; Marcus, supra, 367 U.S. at 728-29. Instead, the Fourth Amendment plainly directs that a search shall be lawful only when it is directed to particular items for which probable cause is demonstrable. The courts recognize that the First and Fourth Amendments grew from the same historical source, for the struggle for press freedom was energized by the struggle against the license to print, and against the prior restraints imposed by the Crown to enforce the license. In the Supreme Court's words, The struggle for the freedom of the press was primarily directed against the power of the licensor ... And the liberty of the press became initially a right to publish "without a license what formerly could be published only with one." While this freedom from previous restraint upon publication cannot be regarded as exhausting the guaranty of liberty, the prevention of that restraint was a leading purpose in the adoption of that constitutional provision. Lovell v. City of Griffin, 303 U.S. 444, 452 (1938). The Supreme Court commands that special care be taken when authorizing or reviewing a search involving any entity engaged in the publication or dissemination of ideas. "Freedom of the press" long has been interpreted broadly to protect not only newspapers publishers and pamphleteers, e.g., Lovell, supra, 303 U.S. at 452, but also motion pictures, Roaden, supra, 413 U.S. 496; Joseph Burstyn, Inc. v. Wilson, 343 U.S. 495, 502 (1952); United States v. Paramount Pictures, Inc., 334 U.S. 131, 166 (1948), and even computer bulletin boards, Legi-Tech v. Keiper, 766 F.2d 728, 734-35 (2d Cir. 1985), from prior restraints and general searches. In order to avoid prior restraints on speech, the particularity requirement of the Fourth Amendment "is to be accorded the most scrupulous exactitude when the `things [to be seized]' are books, and the basis for their seizure is the ideas which they contain." Stanford, supra, 379 U.S.at 485, citing Marcus, supra, 367 U.S. 717; A Quantity of Copies of Books v. Kansas, 378 U.S. 205 (1964). The Need for Heightened Awareness and New Limiting Rules. The seizure of a computer's hard drive is the functional equivalent of the seizure of all of the files in a small to medium size law office, or all of the records of a small to medium size business. After the seizure is accomplished, law enforcement personnel are able to read virtually every word that had been printed in an attorney's files, or to control the continued life of a business. It is critical that rules and protocols be developed so that the scope of computer searches and seizures are minimized. Law enforcement professionals and attorneys must begin to realize that just because it is convenient to seize a computer system (because the system can consist of no more than a half dozen pieces of equipment), it is not necessarily constitutional. Such seizures are tantamount to the general searches and seizures which were generally regarded as the patent abuses of tyranny when the Constitution was drafted. Judges and magistrates who issue computer search warrants must become more sensitive to the constitutional problems posed by authorizing the seizure of entire computer systems. Because such warrants are tantamount to the Writs of Assistance (which even the English courts under George III condemned a generation before the United States Constitution was adopted) the courts should be especially aware not only of Fourth Amendment interests, but also of the First Amendment interests, when a bulletin board or network equipment is seized. The Constitution imposes "special restraints upon searches for and seizures of material arguably protected by the First Amendment." Lo-Ji Sales, supra, 442 U.S. at 326 n.5.(FN10) We all need to think more critically when dealing with the notion that, unless entire computer systems are seized, electronic data will be altered or destroyed. Magistrates should also require that parties seeking a warrant similarly should demonstrate the probability that the owner of the system is capable and willing to obliterate data within the system during the short interval between presentation of the warrant and commencement of the search. To seize an entire computer system for the sake of a couple of documents contained therein is inefficient, overly intrusive, and potentially disastrous for the owner of the system. A better course would be to have agents sophisticated in the use of computer equipment search the system on-site, and to copy onto a disk the documents which motivated the application for a warrant in the first place. Before authorizing the seizure of entire computer systems, magistrates should require that the applicant demonstrate probable cause for the belief that the entire system is either completely dedicated to illegal activity, or permeated with evidence of unlawful conduct. Wherever possible, the warrant should authorize the seizure only of the relevant documents; if the documents cannot be identified, then just the disks or tapes containing the relevant documents should be taken. Too often there have been cases where a computer operator's entire collection of disks has been seized. There is no difference between this and ransacking a library. Law enforcement professionals and magistrates also should be aware of the fact that, where there are no disks, and the document to be seized is likely to be found in the computer's central data storage (or "hard disk"), the document easily can be copied onto a portable (or "floppy") disk. The need to show authenticity should not justify the seizure of a computer when disk or tape copies can be made. A document thus retrieved still would be admissible evidence under Rule 1001(1), which defines "writings" and "recordings" broadly to include "letters, words, or numbers, or theirequivalent, set down by . . . magnetic impulse, mechanical or electronic recording, or other form of data compilation."(FN11) It is technologically possible that a computer system is rigged with a "booby trap or degausser," which is designed to obliterate data in a computer when there has been unauthorized tampering. This possibility can be invoked to justify all sorts of Fourth Amendment mischief, including wholesale seizure and "no-knock" warrants. In fact, it is highly unlikely that a computer system would be fitted with a such booby trap, and this factor should not be regarded as common, but as highly exceptional as the "Mission: Impossible" tape which self-destructs in five seconds. When an officer posits a potential booby trap to justify a highly intrusive and disruptive search and seizure, the courts should be prepared to impose a heavy burden of proof on law enforcement officials who claim that such devices are in place; law enforcement officials should be prepared to meet such a burden. It is worth noting, however, that in certain situations the computer system itself is the means or instrumentality of a crime. Using a network, software can be stolen, funds can be embezzled, and various wire frauds can occur. See, e.g., J. McEwen, Dedicated Computer Crime Units 1-5 (National Institute of Justice, 1989). But it is critical that magistrates and law enforcement officials distinguish investigations where the computer itself has been used to commit a crime, and where the computer system merely is a channel of communication, like a telephone. To seize a computer, because information related to a crime was merely communicated through it, is tantamount to seizing telephones because two co-conspirators spoke to each other over it. Proof of the crime can be gotten by less intrusive means, and innocent third parties still may need to use those telephones. Law Enforcement and the Particularity Requirement. It is well established that search warrants should leave nothing to the discretion of the executing officer; indiscriminate searches are constitutionally intolerable. Indeed, any search warrant which authorizes the search and seizure of items beyond those for which probable cause has been demonstrated, is constitutionally defective. See, e.g., Lo-Ji Sales, supra, 442 U.S. 319; Voss v. Bergsgaard, 774 F.2d 402, 404-05 (10th Cir. 1985)(warrant invalid where most of it authorized rummaging through files and records for evidence pertaining to any federal crime, under the guise of a criminal conspiracy investigation). It therefore is troubling that law enforcement officers have so frequently resorted to the general seizures of computer systems, which contain a myriad of different files, when only particular files or categories of files are relevant. Even more disturbing is the apparent insouciance with which some law enforcement officers regard the seizure of entire systems of computer equipment; to some officers, the particularity clause of the Fourth Amendment is not even relevant. Illustrative is this statement by a Special Agent at the FBI Academy: [The Fourth Amendment "particularity"] provision requires that a warrant authorize only a search of a specific place for specific named items. Coupled with the probable cause requirement, this provision prevents general searches by insuring that the warrant describes a discreet, defined place to be searched, describes only items connected with criminal activity for which probable cause has been established, and describes the items so definitely that it removes from an officer executing the warrant the discretion of determining which items are covered by the warrant and which are not. It also provides a signal of when a search is at an end, that is, when all items named in the warrant have been located and seized or when all possible hiding places for items not located have been explored. Since the "place to be searched" portion of the particularity requirement has no special impact on computer searches, it will not be discussed. Sauls, "Raiding the Computer Room: Fourth Amendment Considerations (Part I), 55 FBI Law Enforcement Bulletin 25, 29 (May 1986) (emphasis added). Similarly, another Department of Justice publication sets forth, with apparent approval, the following wide-ranging language in a "sample" search warrant: In the county of Baltimore, there is now property subject to seizure, as such computers, keyboards, central processing units, external and/or internal drives, internal and/or external storage devices such as magnetic tapes and/or disks, terminals and/or video display unit and/or receiving devices and peripheral equipment such as, but not limited to, printers, automatic dialers, modems, acoustic couplers, and or [sic] direct line couplers, peripheral interface boards and connecting cables or ribbons, diaries, logs, and other records, correspondence, journals, ledgers memoranda [sic], computer software, programs and source documentation, computer logs, magnetic audio tapes and recorders used in the obtaining, maintenance, and or [sic] dissemination of information obtained from the official files and computers of the [sic] MCI Telecommunications, Inc. and other evidence of the offense. See, C. Connolly, Organizing for Computer Crime Investigation and Prosecution at 81 (National Institute of Justice, 1989). When computers are the object of the search, we see again the zeal of the special investigating judges in the Court of High Commission under King James I -- whose mission was "to inquire and search for . . . all heretical, schismatical and seditious books, libels, and writings, and all other books, pamphlets and portraitures offensive to the state or set forth without sufficient and lawful authority in that behalf . . . and their printing-presses themselves likewise to seize and so to order and dispose of them . . . as they may not have to serve or be employed for any such lawful use," Marcus, supra, 367 U.S. at 725-26, citing Pat. Roll, 9, Jac. I, Pt. 18 & Jac. II, Pt. 15. The electronic bulletin board appropriately should be viewed not as a weapon or burglary tool, but instead as a First Amendment-protected institution, like the newspaper or any public forum.(FN12) See generally, Jensen, An Electronic Soap Box:Computer Bulletin Boards and the First Amendment, 39 Fed.Communications L.J. 217, 235P43, and authorities cited therein. In all cases, consideration should be given to training technologically sophisticated law enforcement officers, and having them available to execute the computer searches. Furthermore, magistrates should consider appointing similarly knowledgeable special masters to supervise such searches. Such roles can be assumed by people who, though technically literate, are not officers of the court or law enforcement agency. See, e.g., Forro Precision, Inc. v. International Business Machines Corp., 673 F.2d 1045, 1054 (9th Cir. 1982)(police search assisted by IBM employee because warrants required that specific technical documents be identified); see also, DeMassa v. Nunez, 747 F.2d 1283, 1285 (9th Cir. 1984)(court-appointed special master supervised search of law office files, permitted seizure only of documents within scope of warrant). Of course, the court should clearly explain to any appointed special master the proper limits of the master's role in the search. See, e.g., Lo-Ji Sales, supra, 442 U.S. at 321-24. Privacy Rights of Third Parties and Statutory Provisions. In addition to the Constitution's basic guarantees, Congress and various state legislatures have enacted additional privacy protections for people who use computers, and for people whose information is stored in them. Magistrates and law enforcement officials should be cognizant of the Electronic Communications Privacy Act ("ECPA"), 18 U.S.C. 2701-2711, which protects the privacy of various electronic communications, including e-mail. See, Kapor & Godwin, supra, at 431-32. Under the ECPA, a piece of electronic mail cannot be reviewed or seized unless the law governing warrants has been strictly complied with. See 18 U.S.C. 2703(a). The language of this section seems to require that an order for the disclosure of electronic mail must particularly describe the communications to be sought; general rummaging and reviewing is not permitted. Id.(FN13) Also important is the First Amendment Privacy Protection Act ("PPA"), 42 U.S.C. 2000aa et seq., which was enacted in response to the Supreme Court's holding in Zurcher v. Stanford Daily, 436 U.S. 547 (1978). Protected under the PPA are documents and materials "possessed in connection with a purpose to disseminate to the public a newspaper, book, broadcast or similar form of public communication," 42 U.S.C. 2000aa(a), which would seem to embrace electronic bulletin boards and publicly-accessible computer networks. The PPA operates to prohibit blanket searches and seizures of such entities, unless there exists "probable cause to believe that the person possessing the materials has committed a criminal offense to which the materials relate," and such criminal offense does not consist of "the receipt, possession, communication or withholding of such materials." 42 U.S.C. 2000aa(a)(1). The practical effect of the PPA would seem to be to strictly limit wholesale computer seizures where the systems are used for bulletin boards or other general communications. In such situations, a seizure is appropriate only where the system's operators are directly implicated in unlawful activity. However, where the system has been used as a conduit by others who are criminally motivated, but the operator is not involved, the PPA would seem to require that no search take place, but that instead a subpoena be issued for the relevant information. It also is worth noting that the Attorney General has issued guidelines under the PPA, governing the execution of search warrants where highly confidential or personal information relating to innocent third parties might fall into the hands of law enforcement authorities. See 28 C.F.R., Part 59. Under the guidelines, federal officials should "not use search and seizure to obtain documentary materials in the possession of disinterested third parties unless reliance on alternative means would substantially jeopardize their availability. . . or usefulness," where less obtrusive means of obtaining such materials are available. 28 C.F.R. 59.1, 59.4(a)(1). Under the PPA guidelines, "documentary materials" include "materials upon which information is electronically or magnetically recorded." 28 C.F.R. 59.2(c). Sensitive to the potential for violating the privacy rights of innocent third parties, the Attorney General's guidelines impose strict controls over search warrants executed upon records in the custody of physicians, lawyers, or the clergy. 28 C.F.R. 29.4(b)(4). This heightened sensitivity to the privacy rights of innocent third parties is reasonable, and should be extended to situations where third parties other than patients, clients, and penitents are affected by the documentary search and seizure. Considering the high volume of communications which occur over many computer systems, and the potential chilling effect that the government seizure of such communications will have, magistrates and prosecutors appropriately should impose similar limiting rules for computer seizures. Ethical and Practical Considerations for Attorneys. Private defense attorneys and in-house corporate counsel also can play a useful role in controlling the unbridled search and seizure of computers. They should become aware of how vulnerable their clients' computer systems are to such searches, and of the potentially disastrous consequences which would follow the seizure of a computer system. They should be prepared to move for the return of seized computer equipment under Rule 41(e), Fed.R.Crim.P., on the ground, inter alia, that the particularity clause of the Fourth Amendment has been violated by such an overbroad search and seizure. For the same reason, if the client is indicted, computer searches and seizures provide fertile grounds for suppression motions.(FN14) Short of such disasters, however, counsel should be aware of some of the ethical problems which computer filekeeping and communications pose. Both the Constitution and the ethical precepts of the legal profession protect client secrets. Although some details of the attorney-client relationship may not be privileged -- for example, the mere fact that the relationship exists, the identity of the client, and the legal fees paid -- communications between counsel and client are absolutely privileged, and attorney work-product enjoys presumptive protection from disclosure. The Code of Professional Responsibility prohibits the attorney from revealing either "confidences" which a client has revealed for the purpose of obtaining legal services, or "secrets" of the client's affairs which, although not useful for the purpose of representation, might embarrass the client or hurt business interests. See DR 4-101(A), (B). The attorney-client privilege, limited by law to communications for the purpose of seeking or rendering legal advice, is "more limited than the ethical obligation of a lawyer to guard the confidences and the secrets of his client." EC 4-4. The code similarly imposes on the attorney the duty to exercise reasonable care to prevent employees, associates and all others from disclosing client secrets and confidences. See DR 4-101(D). The Model Rules of Professional Conduct also are protective of client confidences. Rule 1.1 enjoins the lawyer not to reveal "information relating to the representation of a client." Although this language seems to eliminate from the attorney's duties the protection of information which, though not essential to representation, may prejudice the client's non-legal interests, the Comment to Rule 1.1 seems to rehabilitate the protection of non-legal client secrets. The Comment explains that attorney-client confidentiality is necessary for the client "to communicate fully and frankly with the lawyer even as to embarrassing or legally damaging subject matter." (Emphasis added.) The Comment distinguishes Rule 1.6 from DR 4-101, and it holds that the Rule's application to information "relating to the representation" reaches morebroadly than the Code's protection of information "gained in" the relationship which the client has requested to be kept confidential. In-house counsel should be certain that confidential legal files are segregated from general corporate files. Other attorneys should make sure that their clients similarly segregate such files on separate disks. If possible, and especially when a particularly sensitive investigation is underway, in-house counsel should detach its computer system from the network upon which the rest of the company's computers operate. Clients should be instructed to store privileged information to "floppy" disks, and that such information should be erased completely from the computer's memory or "hard" disks. Counsel need to be prepared to convince a court that certain communications were made in complete confidence. See, e.g., S.E.C. v. Gulf & Western Industries, Inc., 518 F. Supp. 675 (D.D.C. 1981); In re Ampicillin Antitrust Litigation, 81 F.R.D. 377 (D.D.C. 1978). It will be harder to make this showing if it should turn out that privileged files were accessible to anyone in the corporation. Instead, the expectation of confidentiality should be clearly apparent from the demonstrable conduct of the party asserting a privilege. Gulf & Western, supra, 518 F.Supp. at 682; see also, Upjohn Co. v. United States, 449 U.S. 383, 387 (1981) (counsel should be able to show that employee was aware that communications were for the purpose of legal advice when made). Similarly, counsel should make sure that employees understand that confidential communications should not be placed over a generally accessible office computer network, and that legal communications should be removed and segregated from parts of the system which are generally accessible. Under certain circumstances, when privileged documents are left in computer files where others can view them, confidentiality may have been constructively waived. "[O]nce the privilege exists the corporate client must be diligent in its intra-corporate confidentiality." J. Gergacz, Attorney-Corporate Client Privilege 3.02[2][d][ii](1987) (FN15) There is only so much counsel can do, however, to minimize the possibility that privileged information is seized. Obviously, it would be wasteful to restructure an entire filing system in seemingly paranoid anticipation of a general search. But counsel should insure that the client takes deliberate and painstaking precautions to keep its electronically recorded confidential communications from prying eyes within the office, as well as from without. It is important to note that the law is far from settled on the issue of whether privileged materials which have been abandoned or stolen lose their protective character. Older authorities hold that all involuntary disclosures of information remove the privilege. 8 Wigmore, Evidence, sec. 2326 (McNaughton Rev. Ed. 1961). The modern view is to the contrary. See, e.g., J. Gergacz, supra, 5.03[2][e]; Suburban Sew 'N Sweep, Inc. v. Swiss-Bernina, Inc., 91 F.R.D. 254, 260 (N.D.Ill. 1981); see also Bower v. Weisman, 669 F. Supp. 602, 606 (S.D.N.Y. 1987). But it is safe to say that it does not help a client's case to have filed confidential communications promiscuously in the company's computer network. And disclosure of communications beyond employees who "need to know" may constitute a waiver of confidentiality. See, J. Gergacz, supra, at 5.03[3], citing James Julian, Inc. v. Raytheon Co., 93 F.R.D. 138, 142 (D.Del. 1982). As John Gergacz observes, Courts which have strongly emphasized the confidentiality characterization of the waiver doctrine may be less amenable to corporate policies that do not strongly limit access by non-essential employees to the privileged communications. Even so, corporate counsel should take care in preserving the confidentiality of the privileged communications within the organization. Privileged documents should be circulated only to those corporate members who need to know. The broader the circulation list, the less distinguishable corporate treatment of confidential communications will be from general firm memos. In addition, . . . separate files should be kept for privileged communications and those that are circulated should be kept in separately marked . . . folders so as to minimize commingling of privileged documents with nonPprivileged, even within the same filing system. Finally, the corporation should have and follow a policy of authorized and unauthorized access to various files. J. Gergacz Attorney-Corporate Client Privilege, supra, 5.03[3]. Conclusion. This suggestive (but far from exhaustive) review is a plea to judges and magistrates, prosecutors and defense attorneys, in-house and independent counsel, who are or may be involved in the criminal process -- to study the constitutional, ethical, strategic, and business implications of the new computer technology more closely. Computers have essentially miniaturized the office place; but they pose the concomitant danger of the revival of the Writ of Assistance. True, computers enable us to easily store, and more easily to retrieve, a wide variety of information using a very small "file cabinet"; but one should resist the temptation to pack everything into one system. The courts and prosecutors should be sensitive to how close indiscriminate computer seizures come to the police practices which precipitated a revolution. And counsel should be sensitive to the possibility that the poorly considered use of computer technology can erode the client's constitutional rights and privileges. We should be alert to the computer's dangers as well as to its undeniable convenience and other benefits. FN1. Mr. Silverglate is a partner, and Mr. Viles an associate, at the Boston (Mass.) law firm of Silverglate & Good. The authors are counsel to the Electronic Frontier Foundation (EFF), which is described in this paper, and which is involved in a few of the matters discussed here. The authors gratefully acknowledge the help of Mitchell Kapor and Michael Godwin of EFF, as well as of associate Sharon Beckman and legal assistants Chauncey Wood and Gia Barresi of Silverglate & Good. FN2. John Perry Barlow, one of the founders of the Electronic Frontier Foundation, explains the meaning of "cyberspace" best -- it is the totality of interconnected computer networks, and the activities taking place on them: The WELL ... is an example of the latest thing in frontier villages, the computer bulletin board. In this kind of small town, Main Street is a minicomputer to which ... as many as 64 microcomputers may be connected at one time by phone lines and ... modems. In this silent world, all conversation is typed. To enter it, one forsakes both body and place and becomes a thing of words alone. You can see what your neighbors are saying (or recently said) ... . Town meetings are continuous and discussions rage on everything from sexual kinks to depreciation schedules. There are thousands of these nodes in the United States, ranging from PC clone hamlets of a few users to mainframe metros like CompuServe, with its 550,000 subscribers. They are used by corporations to transmit memoranda and spreadsheets, universities to disseminate research, and a multitude of factions, from apiarists to Zoroastrians, for purposes unique to each. Whether by one telephonic tendril or millions, they are all connected to one another. Collectively, they form what their inhabitants call the Net. It extends across the immense region of electron states, microwaves, magnetic fields, light pulses and thought which sci-fi writer William Gibson named Cyberspace. J. Barlow, Crime and Puzzlement, 2P3 (1990)(emphasis in original). For other descriptions of the range of topics open for discussion on the networks, see Walker, "American Diary: In Thrall to the Data Bank," Manchester Guardian Weekly, Mar. 24, 1991, at 24, and Leccese, supra, at 18. FN3. As of this writing, the scope of "Operation Sun Devil" is unclear. Although many wholesale seizures of computer equipment have occurred over the past year and a half, executed by teams of federal and state agents, some law enforcement officers specifically have disavowed that their particular police action was a part of "Sun Devil." For example, "[f]ederal officials said that the raid on Steve Jackson Games [see infra] was not part of Operation Sun Devil." Lewis, "Can Invaders Be Stopped but Civil Liberties Upheld?," New York Times, Sept. 9, 1990, at 12F. FN4. "GURPS" is an acronym for "Generic Universal Role-Playing System." FN5 It is instructive to compare the experience of Phrack's young publisher with the treatment accorded other well-known publishers of pilfered documents. See New York Times v. United States, 403 U.S. 713 (1971). FN6 This apparently was the climactic day for the "Sun Devil" investigations. Barlow writes: One May 8, 1990, Operation Sun Devil, heretofore an apparently random and nameless trickle of Secret Service actions, swept down on the Legion of Doom and its ilk like a bureaucratic tsunami. On that day, the Secret Service served 27 search warrants in 14 cities from Plano, Texas to New York, New York. ... In a press release following the sweep, the Secret Service boasted having shut down numerous computer bulletin boards, confiscated 40 computers, and seized 23,000 disks. They noted in their statement that "the conceivable criminal violations of this operation have serious implications for the health and welfare of all individuals, corporations, and United States Government agencies relying on computers and telephones to communicate." ... [T]he deliciously ironic truth is that, aside from [a] 3-page Bell South document, the hackers had neither removed nor damaged anyone's data. Operation Sun Devil, on the other hand, had "serious implications" for a number of folks who relied on "computers and telephones to communicate." They lost the equivalent of about 5.4 million pages of information. Not to mention a few computers and telephones. J. Barlow, supra, at 14. Similar numbers were reported in Leccese, "Hackers under Attack," supra, at 9. FN7. It would be impossible to exaggerate the frequency with which computer information banks containing private information of third parties are seized, ostensibly in search of criminal evidence. A greenhouse owner in Indiana, charged with aiding and abetting in the cultivation of marijuana, had his computer equipment seized. More bizarre is the story of the nonprofit California cryogenics organization, whose computer equipment and cryogenics-related bulletin board were seized and shut down, in the course of a coroner's office investigation into the whereabouts of a missing human head. The organization reportedly initiated litigation under the Electronic Communications Privacy Act, 18 U.S.C. 2701 et seq. (discussed infra), and at this writing it appears that the case was settled after some proceedings. See Meeks, "The Case of the Missing Head and the Missing BBS" (available on the WELL, Apr. 12, 1991)(story reported as originating from BIX's Microbytes newswire, no date given). FN8. See e.g., Donovan v. Dewey, 452 U.S. 595 (1981); Zurcher v. Stanford Daily, 436 U.S. 547, 554-55 (1978); United States v. Kahn, 415 U.S. 143, 157 (1974); See v. City of Seattle, 387 U.S. 541 (1967); Camara v. Municipal Court, 387 U.S. 523 (1967). FN9 See Proceedings: Fourth Annual Computer Virus & Security Conference 426P42 (1991). Kapor and Godwin are, respectively, the President and Staff Counsel of the Electronic Frontier Foundation, a civil liberties group headquartered in Cambridge, Massachusetts, dedicated to "civilizing the electronic frontier." It "aims to lobby for laws to facilitate public computer networks, and to help in the legal defense of those it considers unjustly charged with computer crimes." See Dyson, "Commentary: Hackers' Rights," Forbes, Jan. 7, 1991, at 288. As part of EFF's work, it has undertaken litigation efforts on behalf of some of the parties described above who have been subjected to computer searches and seizures (including Steve Jackson Games and the publisher of Phrack). EFF also has intervened as amicus curiae in other cases implicating the constitutional liberties of bulletin board operators. FN10. Similarly, as discussed below, courts and attorneys should be sensitive to the interests protected by the Fifth and Sixth Amendments, when the equipment to be seized potentially contains attorney-client communications and legal work-product. FN11 Furthermore, Rule 1001(3) holds that an "original" can be "any print-out or other output readable by sight [and] shown to reflect the data accurately," which has been taken from a "computer or similar device." In view of this, it would seem that the Rules of Evidence have eliminated the need for many evidentiary disputes over the admissibility of a transcribed disk (as a supposed "duplicate") in lieu of the entire "original" computer system's data storage. FN12. Plainly, the decisional law has given newspapers and books stronger and surer protection against government intrusion than it has given to the broadcast media. Compare, e.g., Minneapolis Star and Tribune v. C.I.R., 460 U.S. 575 (1983); Near v. Minnesota, 283 U.S. 697 (1931), with F.C.C. v. League of Women Voters, 468 U.S. 364 (1984); Red Lion Broadcasting v. F.C.C., 395 U.S. 367 (1969). The courts' tolerance for government interference in broadcasting finds its principal justification in the notion that "[u]nlike other modes of expression, radio inherently is not available to all. That is its unique characteristic, and that is why, unlike other modes of expression, it is subject to government regulation." National Broadcasting Co. v. United States, 319 U.S. 190, 226 (1943). The N.B.C. Court's observation may have been accurate in the 1940's but it is not so today. In the past fifty years we have witnessed a dizzying proliferation of electronic channels of communication. It would be a mistake to assume that there is a scarcity of modes of expression on the computer networks, and to consequently limit speech in those forums. See generally Peretti, "Computer Publication and the First Amendment," 3 Computer Underground Digest #3.09 (Feb. 28, 1991)(available on the WELL Apr. 12, 1991). FN13. It should be pointed out, however, that the ECPA also sets up as defenses to civil actions under the Act, "good faith reliance" on warrants or court orders. See 18 U.S.C. 2707(d)(1). FN14. Although the seizure of law office computer systems has not yet caught on in this country, it seems that it is a only a matter of time before it does. In the past decade, we have witnessed wide-ranging searches through attorneys' client files. E.g., DeMassa v. Nunez, 747 F.2d 1283 (1984). Other nations already have extended this procedure to electronic files. One example is the case of South African anti-apartheid attorney Yunus Mahomed. According to reports, his professional activities were "directly disrupted by police searches of his office and home in January and again in February 1989. On the first occasion computer disks were removed and later returned. During the second raid, the computer was removed. Mr. Mahomed obtained an injunction restraining police from tampering or retrieving information from the computer unless he is present." "Lawyer to Lawyer Network," March 1989 (appeal issued by Lawyers Committee for Human Rights). FN15. See also Baltica-Skandinavia Insurance Co. v. Booth, Potter, Seal & Co., No. 86-1967, 1987 U.S. Dist. LEXIS 9371 slip op. (E.D.Pa. Oct. 15, 1987), cited in J. Gergacz, supra, at 36 (Mar. 1989 Supp.)(court decided that document intended to remain confidential when it had been filed separately with other privileged documents, file was specially marked, and staff was instructed concerning its confidentiality); Allen v. Burns Fry, Ltd., No. 83 C 2915, 1987 U.S.Dist. LEXIS 4777, slip op. (N.D.Ill. June 8, 1987), cited in J. Gergacz, supra, at 36 (same). Generally, in cases where the client is a corporation, the courts seem to be most willing to honor the confidential nature of documents which both the attorney and client took explicit and energetic measures to guard. Compare Lois Sportswear U.S.A., Inc. v. Levi Strauss & Co., 104 F.R.D. 103 (S.D.N.Y. 1985)("Because the client's intent determines whether the communication was confidential to begin with, such intent must be negated before the confidentiality can be deemed to have been destroyed and the privilege surrendered."). Downloaded From P-80 International Information Systems 304-744-2253