Back to www.cdt.org                    
  IMAGE MAP
Join CDT's Action Network!

Join With CDT in Making an Impact on Internet Policy!



Wiretap Overview

Overview Government Surveillance of Telephones and the Internet


Search & Seizure
The Dept. of Justice has written a manual on the rules for seizing evidence stored in computers. "Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations"
Carnivore
Carnivore is a computer program designed by the FBI to intercept Internet communications.

CDT's Carnivore Reference Page


CALEA
The Communications Assistance for Law Enforcement Act of 1994 (CALEA) was supposed to preserve law enforcement surveillance capabilities in the face of technological chage, but the FBI has been trying to use it to claim control over the design of the telephone network to enhance its surveillance powers.

CDT's CALEA Reference Page


Roving Wiretaps
A roving wiretap order allows the government to tap any phone lines that a suspect may use.

-Congress Passes "Roving Wiretaps," Expands Surveillance Authority
-E-RIGHTS Bill (S. 854) tightens standard for roving taps


Echelon
Echelon is a secretive international surveillance system that operates outside of the normal limitations of the Constitution.

International Monitoring by US government


FIDNet
FIDNet is a comprehensive monitoring system intended to protect government computers, but it raises serious privacy concerns.

CDT's FIDNet Reference Page


CESA
CESA was a bill proposed by the Clinton Administration that would allow the government to seize decryption keys without notice to the user.

CDT's CESA Reference Page


Articles

   
Response to Sept. 11, 2001 Terrorist Attacks
  The Honorable Patrick Leahy
433 Senate Russell Building
Washington, DC 20510

The Honorable James Sensenbrenner
2332 Rayburn House Office Bldg.
Washington, DC 20515

The Honorable Orin Hatch
104 Senate Hart Building
Washington, DC 20510

The Honorable John Conyers
2426 Rayburn House Office Bldg.
Washington, DC 20515

Re: Sneak and Peek Search Warrants on Anti-Terrorism Legislation

Dear Members of Congress:

The House and Senate anti-terrorism bills (H.R. 2975 and S. 1510) contain a "delayed notice" provision, section 213, that will greatly expand the government's authority to conduct covert searches. This means that law enforcement agencies can enter a person's home or office, search through the person's possessions, in some cases seize physical objects or electronic information, without the person knowing that law enforcement agents were there. This is a significant change from the way searches have been conducted historically and will diminish privacy protections guaranteed by the Fourth Amendment. We believe this to be an unwise change. We are especially concerned that this very significant change in the conduct of searches governed by the Fourth Amendment is being considered in the context of emergency legislation to respond to the terrorist attack, without either the House or Senate holding hearings to thoroughly consider the ramifications of this change. Furthermore, this provision is not limited to crimes of terrorism, but would apply in all federal criminal cases. Lastly, unlike other provisions of H.R. 2975 that expand the government's power to search, this provision does not sunset in a few years.

As a general rule, covert physical searches for physical evidence are illegal. Rule 41(d) of the Federal Rules of Criminal Procedure specifically requires that the officer conducting the search "shall leave a copy and receipt at the place from which the property was taken." Title 18 of the United States Code only authorizes delayed notice for searches of oral and wire communications (see 18 U.S.C. 2510 et seq.). Nothing in the criminal code permits secret searches for physical evidence. Furthermore, the Supreme Court has traditionally held that an officer must knock and announce his presence before serving a search warrant, absent exigent circumstances. See Richardson v. Wisconsin, 520 U.S. 385 (1997).

The Department of Justice claims that the provision in the anti-terrorism legislation will codify the already existing practice of conducting covert searches. It is true that the FBI sometimes conducts covert searches, but that fact, in and of itself is disturbing given its lack of legal authority to do so. The Department of Justice seeks this provision precisely because FBI agents do not have the authority to do what they are doing.

The Department of Justice is correct in stating that the Second Circuit has upheld the constitutionality of this practice, provided that agents did not seize any items. See U.S. v. Villegas, 899 F2d 1324 (2nd Cir. 1990). The Ninth Circuit has also permitted the use of evidence obtained through covert searches; however, the case law is much more convoluted. The first case it considered was United States v. Freitas, 800 F.2d 1451 (9th Cir. 1986). In the case, the district court found that covert search warrants were invalid under Rule 41 and unconstitutional. However, on appeal, the Ninth Circuit held that evidence seized pursuant to the warrant could be used under the "good faith exception" in United States v. Leon, 468 U.S. 897 (1984). Subsequent cases seem to have upheld the concept of covert searches, but have usually found that the criteria necessary to support the search were not met. See United States v. Johns, 851 F.2d 1131 (9th Cir. 1988). The most that can be said conclusively about the case law on secret searches is that it is limited and confused.

However, we disagree with the courts' analysis. Other circuits have not ruled on the constitutionality of covert searches, nor has the Supreme Court. The essence of the Fourth Amendment is that searches be "reasonable" and "specific." See Berger v. New York, 388 U.S. 41 (1967). Even if the warrant complies with the constitution by specifying a particular place or items to be searched, permitting law enforcement to conduct covert searches increases the likelihood that the terms of the warrant will be violated, thus rendering the search unconstitutional.

Failure to notify a person that their home is being searched forecloses any opportunity to assert one's Fourth Amendment rights. For example, without notice, a person could not point out deficiencies in the warrant, such as that law enforcement officials are searching the wrong home or are searching outside the scope of the warrant. Nor can a person challenge the warrant in court. Although difficult to do, a person can challenge a search warrant by appearing before the court that issued it and asking for the warrant to be suppressed. It is impossible for a person to assert his or her Fourth Amendment rights if the person does not realize they are being violated.

We urge the conferees to omit this provision from the anti-terrorism bills (section 213). If the government insists that it needs this authority, it should urge Congress to hold hearings and carefully consider this provision. Sneaking the provision on to a bill that the Administration knows will pass is playing fast and loose with our Constitution. We hope that you will protect it.

Sincerely,

Laura Murphy, Director
Washington National Office
American Civil Liberties Union

Grover Norquist, President
Americans for Tax Reform

Rob Carlson
Americans for the Preservation of Information Security

Tom DeWeese, President
American Policy Center

Jerry Berman, Executive Director
Center for Democracy and Technology

David Sobel, General Counsel
Electronic Privacy Information Center

Bert Ely
Ely and Company

Paul Weyrich, President
Free Congress Foundation

Adrian Day, Editor
Global Analyst

Larry Pratt, Executive Director
Gun Owners of America

Steve Dasbach, National Director
Libertarian Party

Kathryn Serkes, President
Square One Media Network

James Landrith, Jr.
Editor and Publisher
The Multiracial Activist and
Abolitionist Examiner


Cc: Senator Ted Kenney
Senator Russ Feingold
Representative Henry Hyde
Representative Dick Armey
Representative Bobby Scott
Representative Barney Frank




Free Speech | Data Privacy | Government Surveillance | Cryptography | Domain Names | International | Bandwidth | Security | Internet Standards, Technology and Policy Project | Terrorism | Authentication | Right to Know | Spam
Navigation bar
Our Mission / Get Involved / Staff / Publications / Links / Search CDT / Jobs / Action!
Previous Headlines | Legislative Tracking | CDT's Privacy Policy
  The Center For Democracy & Technology
1634 Eye Street NW, Suite 1100
Washington, DC 20006
(v) 202.637.9800
(f) 202.637.0968
Technical concerns about this site: webmaster@cdt.org
Concerns or opinions about issues: feedback@cdt.org

Copyright © 2001 by Center for Democracy and Technology.
The content throughout this Web site that originates with CDT can be freely copied and used as long as you make no substantive changes and clearly give us credit. Details.

CDT Mission Get Involved Staff Policy Posts Resource Library Search the Site Jobs Take Action