1024px-EAS_Hall_SIT-300x200Starting this month, I have been teaching an innovative new class about computer crime and high-tech government surveillance at the Stevens Institute of Technology in Hoboken. The course covers legal developments over the last two decades that have shaped how the government investigates computer crimes, such as computer hacking and the distribution of child pornography, as well as conventional crimes like drug trafficking and fraud that have become more efficient by using new information technologies. The course syllabus can be found here.

The topics we will cover come directly from our hands-on work for clients at the Law Office of Zachary Margulis-Ohnuma over the past couple of years. They include:

  • border agents’ authority to search computer devices at the United States border without a search warrant or suspicion,

Last week, President Trump signed legislation that expands criminal liability for people who own or operate online platforms that “promote or facilitate” not only sex trafficking, but virtually any consensual sex work. The new law, which amends Section 230 of the Communications Decency Act (“CDA”), is commonly referred to as the “Allow States and Victims to Fight Online Sex Trafficking Act (“FOSTA”), or by its Senate name, the “Stop Enabling Sex Traffickers Act (SESTA).”

The FOSTA-SESTA amendment to the CDA is fairly short, but raises questions about how it will be enforced by prosecutors and plaintiffs’ attorneys granted a private right of action under the law. Under the new law:

  1. Anyone who “owns, manages, or operates” an online platform or “conspires or attempts to do

Two huge illicit markets operating on the Dark Web, AlphaBay and Hansa, were shut down today after being infiltrated by the government for the past several weeks. The sites had claimed up to 200,000 users, 40,000 vendors and 350,000 listings for illegal drugs, stolen credit card information, hacked computer code, counterfeit goods and other illegal items. A Canadian citizen based in Thailand was arrested last month in connection with AlphaBay.

The Dark Web consists of websites accessible only though the Tor network, an easy-to-use, technically sophisticated way to communicate anonymously over the internet. The technology, much to the dismay of governments around the world, has become popular with political dissidents as well as criminals hiding their activities from law enforcement. The Dark Web is home to numerous high-traffic online marketplaces with few limits on what can be bought or sold. These businesses conduct transactions in BitCoin, Ethereum and other cryptocurrencies.

According to the Department of Justice press releasee, AlphaBay users bought and sold “deadly illegal drugs, stolen and fraudulent identification documents and access devices, counterfeit goods, malware and other computer hacking tools, firearms, and toxic chemicals throughout the world.”

The conviction of Ross Ulbricht, the mastermind behind the Silk Road marketplace on the Dark Web, has given the Second Circuit a chance to explore how to apply the Fourth Amendment to the search and seizure of stored digital information.

The government seized and searched Mr. Ulbricht’s laptop. Ulbricht, backed by the National Association of Criminal Defense Lawyers, argued on appeal that the search violated what is known as the “particularity” requirement of the Fourth Amendment. Under the Fourth Amendment, all warrants must be supported by probable cause and “particularly describ[e] the place to be searched, and the persons or things to be seized.” The Framers adopted the requirement that a warrant describe in a particular manner both the place to be searched and what the government intends to seize as evidence of a crime to prevent “general warrants.” A general warrant is a warrant that grants government agents discretion to search any and all property owned by a criminal suspect in an unrestrained and exploratory manner. By contrast, the Fourth Amendment demands that agents tell the court, before searching a suspect’s property, where they plan to search, what they plan to seize, and how the place to be searched and the things to be seized relate to the charged conduct.

Systems with digital information present special challenges for agents attempting to describe the target of their search and for courts attempting to fashion warrants that don’t authorize agents to rummage through wholly irrelevant digital files. The appeals court in U.S. v. Ulbricht recognized that hard drives typically contain a wide range of highly sensitive information, such as “tax records, diaries, personal photographs, electronic books, electronic media, and medical data, records of internet searches, [and] banking and shopping information.” Second, as a practical matter, it is difficult—if not impossible in most cases—for the government to separate sensitive, private, or irrelevant information from information that is targeted before they conduct an examination of a digital device. Often, agents must seize a suspect’s entire computer system, or gain access to a suspect’s entire email account, before they can determine if it contains evidence relevant to their investigation.

Super Lawyers
Top 100 Trial Lawyers
NACDL
Super Lawyers
The National Trial Lawyers