Archive for the ‘Fourth Amendment’ Category

Volokh Conspiracy: Does obtaining leaked data from a misconfigured website violate the CFAA?

The U.S. Department of Justice is current prosecuting Ross Ulbricht for being the apparent mastermind of the illegal narcotics website Silk Road, which was run for years on a hidden website. In defending the prosecution, the U.S. Attorneys Office recently filed a very interesting brief explaining how investigators found the computer server that was hosting the Silk Road (SR) server. Although the brief is about the Fourth Amendment, it has very interesting implications for the Computer Fraud and Abuse Act, the federal computer hacking statute.

The brief explains how the FBI found the SR server:

The Internet protocol (IP) address of the SR Server (the Subject IP Address) was leaking from the site due to an apparent misconfiguration of the user login interface by the site administrator i.e., Ulbricht. FBI agents noticed the leak upon reviewing the data sent back by the Silk Road website when they logged on or attempted to log on as users of the site. A close examination of the headers in this data revealed a certain IP address not associated with the Tor network (the Subject IP Address as the source of some of the data). FBI personnel entered the Subject IP Address directly into an ordinary (non-Tor) web browser, and it brought up a screen associated with the Silk Road login interface, confirming that the IP address belonged to the SR Server.

The FBIs declaration explains that the investigating agent entered miscellaneous information into the login prompt of the Silk Road server and received an error message. A forensic analysis of the error message found that it contained an IP address not associated with Tor. That IP address was the address of the Silk Road server.

The DOJ brief argues that there was nothing unconstitutional or otherwise unlawful about obtaining the inadvertently leaked IP address from the Silk Road server:

There was nothing unconstitutional or otherwise unlawful in the FBIs detection of that leak. The Silk Road website, including its user login interface, was fully accessible to the public, and the FBI was entitled to access it as well. See United States v. Meregildo, 883 F. Supp. 2d 523, 525 (S.D.N.Y. 2012) (noting that web content accessible to the public is not protected by the Fourth Amendment and can be viewed by law enforcement agents without a warrant). The FBI was equally entitled to review the headers of the communications the Silk Road website sent back when the FBI interacted with the user login interface, which is how the Subject IP Address was found.

It does not matter that Ulbricht intended to conceal the IP address of the SR Server from public view. He failed to do so competently, and as a result the IP address was transmitted to another party which turned out to be the FBI who could lawfully take notice of it. See United States v. Borowy, 595 F.3d 1045, 1048 (9th Cir. 2010) (finding that defendant had no legitimate privacy interest in child pornography files posted on peer-sharing website, notwithstanding that defendant had made ineffectual effort to use site feature that would have prevented his files from being shared); United States v. Post , __ F. Supp. 2d __, 2014 WL 345992, at *2-*3 (S.D. Tex. Jan. 30, 2014) (finding that defendant had no legitimate privacy interest in metadata used to identify him that was embedded in file he had posted on Tor website, notwithstanding that he did not realize he was releasing that information and he intended to remain anonymous).

In short, the FBIs location of the SR Server was lawful, and nothing about the way it was accomplished taints any evidence subsequently recovered in the Governments investigation.

I wonder: Does DOJs position that there is nothing . . . unlawful about this procedure mean that DOJ concedes that it would not violate the Computer Fraud and Abuse Act, 18 U.S.C. 1030, the federal computer hacking statute?

The FBIs location of the SR server brings to mind the prosecution of my former client Andrew Auernheimer, aka weev, who readers may recall was criminally prosecuted for his role in visiting website addresses on an AT&T server that AT&T had thought and hoped would not be found by the public. Auernheimers co-conspirator found that AT&T had posted e-mail addresses on its server at IP addresses that the public was not expected to find.

See the original post here:
Volokh Conspiracy: Does obtaining leaked data from a misconfigured website violate the CFAA?

Defence asks judge in NYC to toss out bulk of evidence in Silk Road case as illegally obtained

NEW YORK, N.Y. - Lawyers for a San Francisco man charged with operating an online marketplace for illegal drugs are asking a judge to toss out most of the evidence against him, saying the Fourth Amendment protects their client from "indiscriminate rummaging" through his entire online history.

The lawyers, Joshua Dratel and Lindsay Lewis, said in court papers that the government violated the ban on illegal search and seizure when it scoured the computers, servers and websites 30-year-old Ross Ulbricht used.

They said applications for search warrants described an investigation that began in early 2013 with a server hosting the Silk Road website in a foreign country.

"The wholesale collection and study of Mr. Ulbricht's entire digital history without limitation expressly sought in the warrants and granted represent the very type of indiscriminate rummaging that caused the American colonists so much consternation," according to the papers filed late Friday in federal court in Manhattan.

Ulbricht has pleaded not guilty to charges of narcotics trafficking, computer hacking, running a continuing criminal enterprise and money laundering. His trial is scheduled to begin Nov. 3.

Prosecutors say Ulbricht went by the online handle the Dread Pirate Roberts, an apparent reference to a character in the movie "The Princess Bride," and turned the underground site into a place where anonymous users could buy or sell contraband and illegal services.

Authorities say Silk Road, which had nearly 1 million registered users by July 2013, generated more than $1 billion in illicit business from January 2011 through September. Federal investigators say Silk Road users anonymously browsed through nearly 13,000 listings under such categories as cannabis, psychedelics and stimulants.

The website used Bitcoin, the tough-to-track digital currency, before it was shut down.

Ulbricht was arrested last year at a public library in San Francisco, where he lived. Authorities said he was chatting online at the time with a co-operating witness. He remains incarcerated without bail.

A prosecutor's spokeswoman declined to comment Monday.

Original post:
Defence asks judge in NYC to toss out bulk of evidence in Silk Road case as illegally obtained

YOU CAN ARREST ME NOW (cops refuse, steal phone) – Video


YOU CAN ARREST ME NOW (cops refuse, steal phone)
(07/29/2014) Butler, PA The Fourth Amendment (Amendment IV) to the United States Constitution is the part of the Bill of Rights that prohibits unreasonable searches and seizures and requires...

By: muchmusic16001

See the rest here:
YOU CAN ARREST ME NOW (cops refuse, steal phone) - Video

Suit charges Daytona Beach's rental inspection program violates civil rights

Published: Tuesday, September 2, 2014 at 6:54 p.m. Last Modified: Tuesday, September 2, 2014 at 6:54 p.m.

DAYTONA BEACH The city has been hit with a federal civil rights lawsuit alleging its 2-year-old residential rental inspection program is unconstitutional.

A lawsuit filed Tuesday in U.S. District Court accuses the city of violating local renters and landlords Fourth Amendment and 14th Amendment rights. The suit argues city inspectors should have probable cause to believe theres been a violation of law and search warrants before they enter leased homes, and that poor people and minorities are being discriminated against because they most often are renters.

The potential for perverse abuse of this power the city claims to have is stunning, said Ponte Vedra Beach attorney Andrew M. Bonderud, the plaintiffs lawyer in the legal action.

Bonderud is representing landlord Jack Aberman, who owns dozens of properties on Daytonas beachside, and three of his tenants. Aberman, a shareholder in GEA Seaside Investment Inc., hasnt allowed inspectors inside his rental homes and hes been papered to death by the city with demands to inspect, Bonderud said.

City Attorney Marie Hartman said Tuesday she hadnt read the lawsuit yet and couldnt comment. Mike Garrett, the citys chief building official, couldnt be reached for comment.

The city has long inspected large rental properties with five or more units, but it wasnt until the summer of 2012 that city commissioners OKd a program that would regularly allow an inspector into rental homes with one to four units to look for everything from broken steps to electrical hazards. The program aims to send an inspector to every rental property with four units or less throughout the city, but its starting with the beachside, where theres a large concentration of older homes that have been subdivided into apartments.

Community leaders and government officials argue overhauling the citys beachside residential rental stock is vital to reviving the area. More than 1,100 rental units have been inspected so far, and nearly half have been cited for code violations.

Those who comply and make repairs quickly are out only the $50 per unit inspection charge and another $40 for an application fee. Those who have not made themselves available for the program or who have not fixed problems are being sent to a special magistrate for hearings.

Delinquent landlords face fines or liens attached to their rental homes. Bonderud argues in his lawsuit that the special magistrate and other city officials have powers that are too broad under the city rental inspection law.

See more here:
Suit charges Daytona Beach's rental inspection program violates civil rights

Lonestar1776 at Illegal Checkpoint 80 Miles Inside Border – Standing UP & Pushing Back! pt 2/2 – Video


Lonestar1776 at Illegal Checkpoint 80 Miles Inside Border - Standing UP Pushing Back! pt 2/2
The Fourth Amendment (Amendment IV) to the United States Constitution is the part of the Bill of Rights that prohibits unreasonable searches and seizures and requires any warrant to be judicially...

By: Imagine369hz

Read more:
Lonestar1776 at Illegal Checkpoint 80 Miles Inside Border - Standing UP & Pushing Back! pt 2/2 - Video