Encryption: Balancing the Needs of Law Enforcement and the Fourth Amendment

Similar documents
CRIMINAL INVESTIGATIONS AND TECHNOLOGY: PROTECTING DATA AND RIGHTS

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4%

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4%

Case 5:16-cm SP Document Filed 03/15/16 Page 1 of 5 Page ID #:2806. Exhibit HH

Encryption & FBI vs Apple. Sophie Park & Shanelle Roman

Know Your Rights ELECTRONIC FRONTIER FOUNDATION. Protecting Rights and Defending Freedom on the Electronic Frontier eff.org

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

Course Security Services. Unit IV U.S. Constitution and Constitutional Issues

Business Law Chapter 9 Handout

Prepare. Activity Options Choose 1 (or more if you have time!) Anticipate. Instruct. Close

Weekly Geopolitical Report

Apple Inc. vs FBI A Jurisprudential Approach to the case of San Bernardino

Assessing the Supreme Court's ruling on giving ID to police

THE WRIT TO REFUSE. The Writ to Refuse 429

You ve Got Rights! STEP BY STEP

Emerging Technology and the Fourth Amendment

Sneak and Peak Search Warrants

Bill of Rights THE FIRST TEN AMENDMENTS

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES

THE THIRD AND FOURTH AMENDMENTS

Chapter 1: Computer Forensics and Investigations as a Profession

Privacy The Fourth Amendment and Government Systems CSC 301 Spring 2018 Howard Rosenthal

Global View Assessments Fall 2016

You ve Got Rights Workshop icivics, Inc.

Q. What do the Law Commission and the Ministry of Justice recommend?

No IN THE DAVID LEON RILEY, On Petition for a Writ of Certiorari to the California Court of Appeal, Fourth District

You ve Got Rights! We Defeated the British Now What? More and More Rights. Name:

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE

Panel 2: National Data Governance in a Global Economy

US Supreme Court. Texas Supreme Court and Court of Criminal Appeals. 5th Circuit Court of Appeals. 14 State Appellate Courts

In this article we are going to provide a brief look at the ten amendments that comprise the Bill of Rights.

Do Lawyers Dream of Digital Sheep? way of life. One of the most important civil areas that require being ahead of the curve to secure our

Suppose you disagreed with a new law.

Fourth Amendment United States Constitution

The Bill of Rights. Part One: Read the Expert Information and highlight the main ideas and supporting details.

Hands on the Bill of Rights

HIIBEL V. SIXTH JUDICIAL DISTICT COURT OF NEVADA: IDENTIFICATION AND ANONYMITY POST-9/11

Privacy And? Surveillance

Investigatory Powers Bill

Case 8:13-cr PWG Document 203 Filed 07/28/14 Page 1 of 8. IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF MARYLAND Southern Division

The Bill of Rights determines how you must be treated by the government. It outlines your rights as an American.

The Supreme Court, Civil Liberties, and Civil Rights

U.S. Department of Justice

EXAM TTM2 Information security, advanced. Technical Tools/Aid: None Duration: (3 hours) Contact person: Svein Willassen, ph.

Fourth Court of Appeals San Antonio, Texas

CRS Report for Congress

Electronic Privacy Information Center September 24, 2001

Chapter 20: Civil Liberties: Protecting Individual Rights Section 2

COMMON GROUND BETWEEN COMPANY AND CIVIL SOCIETY SURVEILLANCE REFORM PRINCIPLES

A Guide to the Bill of Rights

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security.

Computer Search and Seizure

Know Your Rights When Interacting With the Police

Case 3:16-mc RS Document 84 Filed 08/14/17 Page 1 of 9 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA I.

WIRETAPPING, SURVEILLANCE AND

1 June Introduction

Day 7 - The Bill of Rights: A Transcription

Texas Law Review Online Volume 97

SOCIAL NETWORKING PRE-READING 1. 2 Name three popular social networking sites in your country. Complete the text with the words in the box.

- WHAT CAN THE POLICE SEARCH YOUR HOME?

Top 10 Tips for Responding to Search Warrants: Before, During, and After

THE FEDERAL CORNER. Tim (The Magician) Henry Gets an Unbelievable Result In a Child Pornography Case You Won t Believe It!

TRANSPARENCY REPORTING FOR BEGINNERS: MEMO #1 *DRAFT* 2/26/14 A SURVEY OF

United States Court of Appeals

Case 2:16-mj JS Document 53 Filed 03/10/17 Page 1 of 14 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA

OFFICE OF BOB BARR Member of Congress,

The GPS Tracking Case Fourth Amendment United States Constitution

Case 4:16-cv Document 1 Filed in TXSD on 12/28/16 Page 1 of 18

Case 2:15-mj CMR Document 52 Filed 09/06/17 Page 1 of 5 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA

Counter-terrorism Laws, Offences and Other Provisions

Recent Developments in Cyberlaw: 2018

United States Constitutional Law: Theory, Practice, and Interpretation

When a Government Investigator

LESSON PLAN: You Be The Judge!

Chapter 4: Civil Liberties

Constitutional Law - Search and Seizure - Hot Pursuit

Why the Federal Government Should Have a Privacy Policy Office

Policing: Legal Aspects

Fourth Amendment United States Constitution

OFFICE OF THE CITY ATTORNEY

Task 3: Read a part of the Supreme Court s opinion in New Jersey v. T.L.O.

Five Days of Giftmas 2018 Sweepstakes

I Have Rights?! Name: Rights Activity p.1

NAPO WASHINGTON REPORT

TEXARKANA, TEXAS POLICE DEPARTMENT GENERAL ORDERS MANUAL. TPCA Best Practices Recognition Program Reference Searches Without a Warrant

The Amendments. Constitution Unit

Class #10: The Extraterritorial Fourth Amendment. Professor Emily Berman Thursday, September 25, 2014

A brief outline of The EVIDENCE project

In George Orwell s 1984, the entire book is about a time in Oceania when a group has

Case 3:16-cv Document 1 Filed 04/19/16 Page 1 of 8

1900 M Street, NW, Ste. 250, Washington, D.C

LEGAL TERMS OF USE. Ownership of Terms of Use

is not a given, it s not present in many countries around the world and it is not something any

MSHA Document Requests During Investigations

The Five Freedoms: 1. Religion 2. Assembly 3. Press 4. Petition 5. Speech RAPPS

UNITED STATES DISTRICT COURT DISTRICT OF ARIZONA

Methods of Proposal. Method 1 By 2/3 vote in both the House and the Senate. [most common method of proposing an amendment]

Forensics and Bill of Rights. Elkins

BUSINESS LAW. Chapter 8 Criminal Law and Cyber Crimes

ADDITIONAL DEVELOPMENTS-CONSTITUTIONAL LAW

Transcription:

1050 17 th Street, N.W. Suite 1150 Washington, DC 20036 Free Markets. Real Solutions. 202.525.5717 www.rstreet.org Statement for the Record Before: Reps. Ted Poe, Pete Olson and Blake Farenthold April 11, 2016 Baker Institute, Rice University Mike Godwin Director of Innovation Policy and General Counsel R Street Institute Encryption: Balancing the Needs of Law Enforcement and the Fourth Amendment My name is Mike Godwin and I m director of innovation policy and general counsel for the R Street Institute, a free-market publicpolicy think tank based in Washington. I m also a native Houstonian, and I like to think my commitment to liberty on the internet has grown out of my strong Texas roots. I want to thank the Congressmen for giving me the opportunity to come back to Houston to talk about encryption and the Constitution. As we all know, encryption and digital-security measures have been in the news a lot lately, thanks to the recent disagreements between the FBI and Apple I want to stress at the outset that, for the most part, neither Apple nor anybody else who disagreed with the FBI s insistence that Apple help hack their own digital security in the San Bernardino terrorist case believes that particular case represents a Fourth Amendment issue. The owner of the iphone in that case was not the suspect, but the suspect s employer. That employer gave consent for the phone's search. So there s no Fourth Amendment issue with regard to that particular phone.

2 E n c r y p t i o n a n d t h e F o u r t h A m e n d m e n t But the larger issues raised by the case do implicate the Fourth Amendment. Speaking as a constitutional lawyer, I naturally want to talk about what those implications are. Please forgive me in advance I may talk about other amendments today as well, but we re here to talk about the Fourth Amendment: The right of the people to be secure in their persons, houses, papers and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. These days, I often hear the argument that the Fourth Amendment is just about warrants and the requirement that they be particular, and not so-called general warrants. But let s diagram the Fourth Amendment, as my Houston Independent School District teachers required me to do with a lot of sentences when I grew up here. The Fourth Amendment turns out to be two independent provisions. The first provision, which is about security and reasonableness, is arguably more important than the second, which is just about warrants. Given the breadth of the first part of the Fourth Amendment which uses words like secure and unreasonable that are meant to be understood broadly we can reasonably guess that what the FBI wants now is something the Fourth Amendment's authors never contemplated. Should our government mandate the kind of profound, extensive backdoor access to every aspect of our personal lives that would be made possible when companies are compelled to hack our security for the FBI? Should we give our police secret keys that unlock everything we might say or do on our smartphones? And here, I m not just talking about Apple, Facebook and Google,

3 E n c r y p t i o n a n d t h e F o u r t h A m e n d m e n t but also about smaller companies that provide us with a range of digital-security tools we may use with our devices. These companies may not have the muscle to challenge an insistent FBI, even when they think they re in the right to provide citizens with real digital security. But the FBI, and other government agencies at the state and federal level, have argued in court and likely will continue to argue in court that the need to investigate crime or thwart terrorism requires us to give the government guaranteed access to the backdoors of our digital lives. What s more, they are asking Congress to step in and establish those rights as a matter of statutory law. This is what the anti-encryption draft legislation introduced last week by Sens. Richard Burr and Dianne Feinstein would do. We at the R Street Institute believe Congress should act now, as it has before, to secure our rights against government demands to access our every secret thought. As intimately connected as we are to our smartphones today, it s likely that we ll be even more intimately connected to whatever technologies help us in our daily lives in the future. There are people in this room today who will live to see digital technologies in their very bodies, helping them recover from injuries or illnesses. Do we really think the FBI or a federal magistrate should have the power to enable government to hack these digital devices inside us? The FBI and some other law-enforcement agencies seem to believe the Fourth Amendment grants the government a fundamental right to succeed in every investigation on which it embarks. This is wrongheaded; the amendment is supposed to operate as a limit on government power, not to grant a right to investigatory success Remember, the amendment protects: The right of the people to be secure in their persons,

4 E n c r y p t i o n a n d t h e F o u r t h A m e n d m e n t houses, papers and effects It s a right of the people, not a right belonging to the FBI, the IRS, the Securities and Exchange Commission or to local or state police. It s not a right that disappears when there s a big, important case or investigation going on. Should Congress mandate that our digital devices be made hackable and snoop-able by every government entity in this country? One reason they shouldn t is that doing so would effectively empower every other government entity in the world that might have jurisdiction over Apple, Google, Microsoft, etc. to compel the same intrusion. Why should any of us ever trust digital tools and digital commerce if our government insists that any company we buy from must be able to create burglar tools for the FBI? In the digital age, when we keep our whole lives on our computers and phones, this mandate meets every definition of unreasonable. Now, please note: I d mention briefly that other Bill of Rights protections are raised by the question of whether government should be able to compel companies to provide backdoors into the digital-security technologies that all of us use. Obviously, the First Amendment is important when it comes to encryption, because it s well-established that the freedoms of speech and association sometimes require privacy in order for each of us to exercise them. And I would argue the Second Amendment is relevant too, since both the right to keep and bear arms and the common-law right of self-defense suggest that government can t and shouldn t be able to hobble our ability to keep our digital lives and internet homesteads secure. Not many people talk about the Third Amendment it prohibits

5 E n c r y p t i o n a n d t h e F o u r t h A m e n d m e n t the forcing citizens to provide quarters in their homes for soldiers in peacetime. But maybe that s relevant too if Apple has to build its own forensics lab in California for the purpose of giving government agents a place to get access to encrypted data that starts looking quite a bit like quartering of soldiers, or at least quartering of policemen. And giving government agents a backdoor to our digital lives, looks a bit too much like the mandatory quartering of soldiers in our homes. Finally, although I could mention other constitutional rights and legal doctrines, I want to stress that Apple and others have argued that Fifth Amendment due-process requirements and prohibitions against compelled testimony apply, as well. No person or company should face a categorical mandate to declare to the world of devices that this particular software the FBiOS that the government may want is a trusted update, when its actual purpose is not to protect us but to reveal our secrets. Now, the argument from government has always been that the warrant requirements and due-process requirements in court ought to be satisfy us that we shouldn t rely on unbreakable security technologies to make our digital data, and our digital lives, secure. But their assumption here is that the primary way we vindicate our constitutional rights is to go to court and assert them, or to rely on a judge to assert them for us. But that s not the American tradition we believe in our citizens right to protect themselves. As the poet Robert Frost put it, good fences make good neighbors. We re all better off if we re allowed to use good fences rather than rely on the sheriffs and judges to be the first and only way we make sure we have good neighbors.