51. Government Hacking.
- Author
-
Mayer, Jonathan
- Subjects
Malware -- Laws, regulations and rules -- Political aspects -- Usage ,Criminal procedure -- Laws, regulations and rules ,Government investigations -- Laws, regulations and rules -- Methods -- Remedies ,Right of privacy -- Laws, regulations and rules ,Searches and seizures -- Laws, regulations and rules -- Remedies ,Government regulation ,United States Constitution (U.S. Const. amend. 4) - Abstract
AUTHOR. Cyber Initiative Fellow, Stanford University; Assistant Professor of Computer Science and Public Affairs, Princeton University (effective March 2018); J.D., Stanford Law School; Ph.D. candidate, Stanford University Department of Computer [...], TheUnited States government hacks computer systems for law enforcement purposes. As encryption and anonymization tools become more prevalent, the government will fore-seeably increase its resort to malware. Law enforcement hacking poses novel puzzles for criminal procedure. Courts are just beginning to piece through the doctrine, and scholarship is scant. This Article provides the first comprehensive examination of how federal law regulates government malware. Part I of the Article considers whether the Fourth Amendment regulates law enforcement hacking. This issue has sharply divided district courts because, unlike a conventional computer search, hacking usually does not involve physical contact with a suspect's property. The Article provides a technical framework for analyzing government malware, then argues that a faithful application of Fourth Amendment principles compels the conclusion that government hacking is inherently a search. Part II analyzes the positive law that governs law enforcement hacking, answering fundamental criminal procedure questions about initiating a search, establishing probable cause and particularity, venue, search duration, and notice. A review of unsealed court filings demonstrates that the government has a spotty compliance record with these procedural requirements. The Article also argues for reinvigorating super-warrant procedures and applying them to law enforcement hacking. Finally, Part III uses government malware to illuminate longstanding scholarly debates about Fourth Amendment law and the structure of surveillance regulation. Law enforcement hacking sheds new light on the interbranch dynamics of surveillance, equilibrium adjustment theories for calibrating Fourth Amendment law, and the interplay between statutory and constitutional privacy protections.
- Published
- 2018