Online Criminal Investigations: The USA Patriot Act, ECPA, and Beyond Mark Eckenwiler Computer Crime and Intellectual Property Section U.S. Department of Justice 1 The Computer Crime and Intellectual Property Section Founded in 1991 as Computer Crime Unit Current staff of 30 attorneys Mission of CCIPS – – – – – Combat computer crime and IP crimes Develop enforcement policy Train agents and prosecutors Promote international cooperation Propose and comment on federal legislation 2 Overview The origins of ECPA (The Electronic Communications Privacy Act of 1986) Substance of the statute – real-time monitoring – stored information How USA Patriot changed (or didn’t change) things 3 Why You Might Care About ECPA Comprehensive privacy framework for communications providers Regulates conduct between – different users – provider and customer – government and provider Civil and criminal penalties for violations Note: state laws may impose additional restrictions/obligations 4 Why ECPA Matters to Law Enforcement As people take their lives online, crime follows; no different from the real world Online records are often the key to investigating and prosecuting criminal activity – “cyber” crimes (network intrusions) – traditional crimes (threats, fraud, etc.) ECPA says how and when government can (and cannot) obtain those records 5 Scope of the 1968 Wiretap Act Protected two kinds of communications – “oral” and “wire” – criminal penalties and civil remedies – extensive procedural rules for court orders to conduct eavesdropping By mid-1980s, emerging technologies created areas of uncertainty in statute as to – wireless telephones – non-voice transmissions (e.g., e-mail) 6 Concerns Addressed in ECPA (Enacted in 1986) Added protection for “electronic” (nonvoice!) communications to Title III In addition, created a new companion chapter to regulate privacy of – stored communications – non-content information about subscribers (e.g., transactional information) Also: new pen register/trap & trace statutes – for prospective collection of telephone calling records 7 Changes 1986-2000 A variety of tweaks & technical amendments – cordless phones – CALEA 8 Sweeping New Surveillance Powers Under USA Patriot Act: A List 9 Changes 2001 (USA Patriot) Structure of ECPA/Title III/Pen-Trap remains the same No major expansion of authority Many changes simply codify existing practice or harmonize parallel provisions of statute In the following slides, a postfixed asterisk (*) indicates USA Patriot changes to prior law 10 Substantive Provisions of ECPA Or, Everything you know is wrong 11 Title III/ECPA & The Courts: A Love Affair “famous (if not infamous) for its lack of clarity” – Steve Jackson Games v. United States Secret Service, 36 F.3d 457, 462 (5th Cir. 1994) “fraught with trip wires” – Forsyth v. Barr, 19 F.3d 1527, 1543 (5th Cir. 1994) “a fog of inclusions and exclusions” – Briggs v. American Air Filter, 630 F.2d 414, 415 (5th Cir. 1980) 12 The Major Categories Real-time interception (content) Real-time traffic data (non-content) Stored data (content) Subscriber records (non-content) 13 The Matrix Acquisition in Real Time Historical Information Contents of Communications Other Records (Subscriber and Transactional Data) 14 Interception of Communications The default rule under § 2511(1): do not – eavesdrop – use or disclose intercepted contents Applies to oral/wire/electronic comms. 15 Penalties Criminal penalties (five-year felony) [§ 2511(4)] » exception for first offense, wireless comms. Civil damages of $10,000 per violation* plus attorney’s fees – USA Patriot added new language specifically imposing liability on government agents Statutory suppression 16 Relevance to Computer Networks Makes it illegal to install an unauthorized packet sniffer In numerous federal prosecutions, defendants have pled guilty to Title III violations for such conduct 17 Exceptions to the General Prohibition Publicly accessible system [§ 2511(2)(g)(i)] – open IRC channel/chat room Consent of a party System provider privileges “Computer trespasser” monitoring* Court-authorized intercepts 18 Consent of a Party Parallels the Fourth Amendment exception May be implied through – login banner – terms of service Such implied consent may give an ISP authority to pass information to law enforcement and other officials 19 System Operator Privileges Provider may monitor private real-time communications to protect its rights or property [§ 2511(2)(a)(i)] – e.g., logging every keystroke typed by a suspected intruder – phone companies more restricted than ISPs Under same subsection, a provider may also “intercept” communications if inherently necessary to providing the service 20 “Computer Trespasser” Monitoring (USA Patriot)* Problem to be solved: what rules allow government monitoring of a network intruder? – consent of system owner as a party? – “rights or property” monitoring? – consent of the intruder via login banner? Because none of these is entirely satisfactory, new exception added Note: amendment sunsets on 12/31/05 21 “Computer Trespasser” Defined New 18 U.S.C. 2510(21): – person who accesses “without authorization” – definition continues: “and thus has no reasonable expectation of privacy…” Excludes users who have “an existing contractual relationship” with provider – Congress worried about TOS violations as grounds for warrantless surveillance – there is an opportunity to gain consent from such users – without it, possible constitutional problems 22 Limits of the New “Computer Trespasser” Exception Interception under this exception has several prerequisites – – – – consent of the owner under color of law relevant to an official investigation, and cannot acquire communications other than those to/from the trespasser 23 Court-Authorized Monitoring Requires a kind of “super-warrant” – § 2518 Good for 30 days maximum Necessity, minimization requirements Only available for specified offenses Ten-day reporting Sealing 24 Types of Electronic Communications Intercepts Cloned pagers “Keystroking” – common in network intrusion cases “Cloning” an e-mail account 25 The Matrix Acquisition in Real Time Contents of Communications Historical Information Title III order or consent, generally Other Records (Subscriber and Transactional Data) 26 The Matrix Acquisition in Real Time Contents of Communications Historical Information Title III order or consent, generally Other Records (Subscriber and Transactional Data) 27 Real-Time Collection of Non-Content Records Governed by the pen register/trap and trace statute (originally enacted in 1986) Like the Wiretap Act, begins with a general prohibition – criminal penalties for violations Exceptions for – provider self-protection – consent of customer (think “Caller ID”) – court order 28 How Things (Didn’t) Change As a Result of USA Patriot Pre-USA Patriot, language was focused on telephone records – the term “pen register” means a device which records or decodes electronic or other impulses which identify the numbers dialed or otherwise transmitted on the telephone line to which such device is attached (18 U.S.C. 3127(3)) New statute: Technology-neutral language Amendments codify years of practice, orders routinely issued by courts 29 Pen Register/Trap and Trace Old statute very telephone-oriented – “numbers dialed” – “telephone line” Updated statute is technology neutral – confirms that the same rules apply to, e.g., Internet communications Retains historical (and constitutional) distinction between content & non-content Codifies longstanding practice under prior statute (e.g., Kopp) 30 What Can A Pen/Trap Device Collect? Plainly included – telephone source/destination numbers – most e-mail header information – source and destination IP address and port » Kopp case (2000) Plainly excluded: – subject line of e-mails – content of a downloaded file 31 The Device Formerly Known As “Carnivore” USA Patriot mandates additional judicial oversight Where law enforcement uses its own device on a public provider’s computer network pursuant to a pen/trap order (3123(a)(3)), agents must file detailed report with the authorizing court – e.g., date and time of installation and removal; information collected 32 New Penalties for Government Misconduct New section 2712 creates explicit civil and administrative sanctions for violations of – – – – wiretap statute ECPA (stored records) pen/trap statute FISA (Foreign Intelligence Surveillance Act) Minimum $10,000 civil damages Mandatory 2-level administrative review for intentional violations by federal officers 33 The Matrix Acquisition in Real Time Contents of Communications Title III order or consent, generally Other Records (Subscriber and Transactional Data) Pen register/trap and trace order or consent Historical Information 34 Stored Communications and Subscriber Records 18 U.S.C., Chapter 121 35 Objectives of Chapter 121 Regulate privacy of communications held by electronic middlemen – Congress sought to set the bar higher than subpoena in some case – put e-mail on a par with postal letter Not applicable to materials in the possession of the sender/recipient 36 Dichotomies ‘R’ Us Permissive disclosure vs. mandatory – “may” vs. “must” Content of communications vs. non-content – content » unopened e-mail vs. opened e-mail – non-content » transactional records vs. subscriber information Basic rule: content receives more protection 37 Criminal Violations 18 USC § 2701 prohibition – Illegal to access without or in excess of authorization – a facility through which electronic communication services are provided – and thereby obtain, alter, or prevent access to a wire or electronic communication; – while in electronic storage Misdemeanor, absent aggravating factors 38 Other Enforcement Mechanisms Civil remedies – $1,000 per violation – attorney’s fees – punitive damages 39 Subscriber Content and the System Provider Any provider may freely read stored email/files of its customers – Bohach v. City of Reno, 932 F. Supp. 1232 (D. Nev. 1996) (pager messages) A non-public provider may also freely disclose that information – for example, an employer 40 Public Providers and Permissive Disclosure General rule: a public provider (e.g., an ISP) may not freely disclose customer content to others [18 U.S.C. § 2702] Exceptions: – consent – necessary to protect rights or property of service provider – to law enforcement if contents inadvertently obtained, pertains to the commission of a crime – imminent threat of death/serious injury* 41 Permissive Disclosure and NonContent Subscriber Information Rule is short and sweet Provider may disclose non-content records to anyone except a governmental entity New exceptions* – to protect provider’s rights/property – threat of death/serious bodily injury Pre-existing exceptions – appropriate legal process – consent of subscriber 42 Mandatory Disclosures: Legal Process Used by the Government Keep in mind the same dichotomy – content vs. non-content All governed by § 2703 Types of process – search warrant – subpoena (grand jury, administrative, etc.) 43 Government Access to Private Communications (Content) For unopened email/voicemail < 180 days old stored on a provider’s system, government must obtain a search warrant [18 U.S.C. §2703(a)] – warrant operates like a subpoena Congressional analogy: treat undelivered email like postal mail (see S. Ct. cases) 44 Government Access to Private Communications (Content) For opened e-mail/voicemail (or other stored files), government may send provider a subpoena and notify subscriber [18 U.S.C. § 2703(b)] – only applicable to public providers May delay notice 90 days (§ 2705(a)) if – destruction or tampering w/ evidence – intimidation of potential witnesses – otherwise seriously jeopardizing an investigation 45 The Matrix Contents of Communications Acquisition in Real Time Historical Information Title III order or consent, generally Warrant (for unopened messages) or consent Subpoena with notice (for files, opened messages) or consent Other Records (Subscriber and Transactional Data) Pen register/trap and trace order or consent 46 The Two Categories of Non-Content Information Subscriber information – §2703(c)(2) Transactional records – § 2703(c)(1) 47 Basic Subscriber Information Can be obtained through subpoena Provider must give government – – – – – name & address of subscriber local and LD telephone toll billing records telephone number or other account identifier type of service provided length of service rendered USA Patriot clarifies that this includes – method/means of payment (e.g., credit card number) – “temporary address” info (e.g., dynamic IP assigment records) 48 Transactional Records Not content, not basic subscriber info Everything in between – audit trails/logs – addresses of past e-mail correspondents Obtain through – warrant – section 2703(d) court order Note: prior to CALEA (10/94), a subpoena was sufficient 49 Section 2703(d) Orders “Articulable facts” order – “specific and articulable facts showing that there are reasonable grounds to believe that [the specified records] are relevant and material to an ongoing criminal investigation” Not as high a standard as probable cause But, like warrant (& unlike subpoena), requires judicial oversight & factfinding Can get non-disclosure order with it 50 The Matrix Contents of Communications Acquisition in Real Time Historical Information Title III order or consent, generally Warrant (for unopened messages) or consent Subpoena with notice (for files, opened messages) or consent; may delay notice Other Records (Subscriber and Transactional Data) Pen register/trap and trace order or consent Subpoena (for basic subscriber info only) 2703(d) “specific and articulable facts” court order (for all other noncontent records) 51 Summary: Legal Process & ECPA Warrant – required for unopened e-mail – can be used (but not required) for other info Court order under § 2703(d) – opened e-mail, unopened e-mail >180 days old, or files (with prior notice) – transactional records Subpoena – opened e-mail or files (with prior notice) – basic subscriber info 52 § 2703(f) Requests to Preserve Government can ask for anything (content or non-content) to be preserved Prospective? Government must still satisfy the usual standards if it wants to receive the preserved data 53 Summary of Notable Changes Pen register/trap and trace statute updated Enhanced disclosure by providers to protect life & limb “Computer trespasser” monitoring exception added Scope of “basic subscriber info” clarified Expanded liability for government misuse 54 Summary USA PATRIOT Act is not a sweeping expansion of surveillance authority Instead, makes narrowly tailored changes to harmonize or clarify statute Leaves intact the existing framework of privacy statutes 55 For More Information Computer Crime Section’s home page: www.cybercrime.gov – legal & policy treatises on intrusions, ECPA, USA Patriot, computer search & seizure – mailing list for news updates – requests for speakers 56