Source Code, RoundUp and the 4th Amendment by Susan Brenner

On February 24, 2011, a federal grand jury charged Jeremy Brashear a grand jury with “distributing, receiving, and possessing material constituting or containing child pornography, in violation of 18 U.S. Code § 2252A(a).”U.S. v. Brashear, 2013 WL 6065326 (U.S. District Court for the Middle District of Pennsylvania 2012).After being indicted, he filed various motions, including one to suppress certain evidence, which the District Court Judge denied.U.S. v. Brashear, supra. Most recently, and most relevant for the purposes of this blog post, Brashear had a subpoena duces tecum issued to obtain certain evidence he believed would be useful in his defense.U.S. v. Brashear, supra. To understand why he got the subpoena, it is necessary to understand how the case arose: In 2010, Trooper Matt Powell of the Pennsylvania State Police in Indiana, Pennsylvania, conducted an investigation of peer-to-peer file sharing programs that may have contained child pornography. . . . Peer-to-peer file sharing networks enable computer users to share digital files between different network users. . . . Trooper Powell used a program called Roundup 1.4.1 (`RoundUp’) to search files available for sharing in the Gnutella peer-to-peer file sharing network. . . . RoundUp is a modified version of the file sharing software PHEX. . . . RoundUp utilizes a database of `hash values’ from files known to contain child pornography. . . .This database enables law enforcement to identify files with hash values that match the hash values of known child pornography. . . . RoundUp only identifies computer files that are available for downloading from a folder shared with the Gnutella network. . . . Trooper Powell alerted Corporal Thomas Trusal to his findings. . . . Accordingly, Corporal Trusal obtained a subpoena ordering Comcast to provide subscriber and billing information for this IP address. . . .Based upon an aggregate of investigative materials, including the identification of the registered account holder, Corporal Trusal secured a search warrant for 1651 Kaiser Avenue, South Williamsport, Pennsylvania, 17702. . . . Brashear resided in a trailer on the property of the 1651 Kaiser Avenue residence. As a result of information obtained through the execution of the search warrant, Brashear was arrested. . . . Law enforcement eventually secured an additional search

warrant for Brashear's trailer and laptop. . . . This search revealed child pornography. ... U.S. v. Brashear, supra. That brings us to the motion at issue in this opinion: On July 25, 2013, Brashear filed an ex parte motion . . . for the issuance and service of a subpoena to compel the Pennsylvania State Police (`PSP’) to provide the source code for RoundUp. Defense counsel explained that he already obtained the PHEX source code and sought access to the RoundUp source code to compare the two. U.S. v. Brashear, supra. The District Court Judge granted Brashear’s motion on July 26, 2013. . . .On September 23, 2013, Brashear filed a motion . . . to continue trial and jury selection. In support, he averred that, as of that date, the PSP had not produced the required source code. On October 17, 2013, the government filed a motion to quash the subpoena. . . . The government alleges that compliance would be unreasonable and oppressive under Federal Rule of Criminal Procedure 17(c)(2). ... U.S. v. Brashear, supra. The judge began his analysis of the issue by noting Brashear was alleging that his subpoena is necessary to determine whether the use of the RoundUp program violated [his] 4th Amendment rights. . . . The government asserts that Brashear is attempting to improperly use Rule 17 as a discovery vehicle, that the source code is subject to the law enforcement privilege, and that the information sought is irrelevant because the use of RoundUp did not violate Brashear's 4th Amendment rights. . . . U.S. v. Brashear, supra. The District Court Judge then explained that the issuance of a subpoena is governed by Federal Rule of Criminal Procedure 17. To obtain a subpoena under Rule 17, the moving party must establish the following: (1) that the documents are evidentiary and relevant; (2) that they are not otherwise procurable reasonably in advance of trial by exercise of due diligence;

(3) that the party cannot properly prepare for trial without such production and inspection in advance of trial and that the failure to obtain such inspection may tend unreasonably to delay the trial; and (4) that the application is made in good faith and is not intended as a general “fishing expedition.” U.S. v. Nixon, 418 U.S. 683 (1974). The court must reconsider the Nixon standard when disposing of a motion to quash. U.S. v. Beckford, 964 F.Supp. 1010 (U.S. District Court for the Eastern District of Virginia 1997).’ U.S. v. Brashear, supra. He then took up Brashear’s argument, and ultimately found that “the source code for RoundUp is not relevant because its use did not violate Brashear's 4th Amendment rights”. U.S. v. Brashear, supra.The judge explained that the source code for the RoundUp program is not relevant because investigating the use of a peer-to-peer file sharing program does not violate the 4th Amendment's protection against unreasonable searches. The 4th Amendment provides that `[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated.’ U.S. Constitution, amendment iv. A typical 4th Amendment analysis begins with analyzing whether the defendant possesses a reasonable expectation ofprivacy in the object being searched. Katz v. U.S., 389 U.S. 347 (1967); Kyllo v. U.S., 533 U.S. 27 (2001). Numerous cases have held that there is no reasonable expectation of privacy in files made available to the public through peer-to-peer file sharing programs. See, e.g., U.S. v. Stults, 575 F.3d 834 (U.S. Court of Appeals for the 8th Circuit 2009); U.S. v. Ganoe, 538 F.3d 1117 (U.S. Court of Appeals for the 9th Circuit 2008); U.S. v. Perrine, 518 F.3d 1196 (U.S.Court of Appeals for the 10th Circuit 2008). U.S. v. Brashear, supra. For Katz and P2P file-sharing, see this prior post.For thoughts on Kyllo and P2P file-sharing, see this other prior post. The judge also noted that Brashear wishes to compare the modified source code for RoundUp with the original PHEX source code, but there is no need. The RoundUp program only accesses files shared through the file sharing network. . . . By sharing files with the network, Brashear essentially shared those files with the public. He had no reasonable expectation of privacy over the files shared with Gnutella and, therefore, the use of the RoundUp program could not have violated his 4th Amendment rights. U.S. v. Brashear, supra. He also pointed out that Brashear argued, in response, that in U.S. v. Jones, 132 S.Ct. 945 (2012), the use of the RoundUp program constituted a physical trespass of

Brashear's `effect’ -- the computer -- and was therefore an unreasonable search.In Jones, the Court addressed whether the warrantless installation of a GPS tracking device to the defendant's motor vehicle violated his Fourth Amendment rights. . . . The Court concluded that the defendant's `4th Amendment rights do not rise or fall with the Katz formulation’ concerning the defendant's reasonable expectation of privacy. U.S. v. Jones, supra. Instead, the Court found that the defendant's motor vehicle was an `effect’ and the warrantless physical trespass of that `effect’ to obtain information or evidence constituted an unreasonable search under the 4th Amendment. U.S. v. Jones, supra. However, the Court noted that `[s]ituations involving merely the transmission of electronic signals without trespass would remain subject to [the] Katz analysis.’ U.S. v. Jones, supra (emphasis in original). U.S. v. Brashear, supra. As Wikipedia notes, the 4th Amendment says, in pertinent part, that the “right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated”.Wikipedia (quoting 4th Amendment) (emphasis added).In order to be protected under the 4th Amendment, a place or an item must fall within one of those four categories, i.e., must be a person, a house (or something analogous), papers (or something analogous) or an “effect”. The judge concluded his analysis of Brashear’s argument by explaining that [s]everal courts have rejected the application of Jones to the investigation of file sharing programs. See Russell v. U.S., 2013 WL 5651358 (U.S. District Court for the Eastern District of Missouri 2013); U.S. v. Nolan, 2012 WL 1192183 (U.S. District Court for the Eastern District of Missouri 2012); U.S. v. Brooks, 2012 WL 6562947 (U.S. District Court for the Eastern District of New York 2012); State v. Lemasters, 2013 WL 3463219 (Ohio Court of Appeals 2013)The court concurs with the rationale of these decisions. The investigation of a file sharing program does not involve any physical trespass onto a constitutionally protected area. Trooper Powell did not physically enter Brashear's home or access his computer. Instead, Trooper Powell simply used a program that identified child pornography available on a public peer-to-peer file sharing program. This investigation involves `the transmission of electronic signals without trespass’ and does not implicate Brashear's 4th Amendment rights under Jones. U.S. v. Brashear, supra. For these and other reasons, the judge granted the prosecution’s motion to quash the subpoena.U.S. v. Brashear, supra.

Source Code Roundup.pdf

Source Code, RoundUp and the 4th Amendment. by Susan Brenner ... IOS и Android. 4 min - Uploaded .... Main menu. Displaying Source Code Roundup.pdf.

284KB Sizes 2 Downloads 223 Views

Recommend Documents

Source Code Aplikasi.pdf
Download dan install Yii PHP Framework (www.yiiframework.com/download/). #2. testing folder requirements/ yang sudah ada dalam bawaan Yii. Pastikan ...

Reading Source Code
Abstract. Source code is, among other things, a text to be read. In this paper I argue that reading source code is a key activity in software maintenance, and that we can profitably apply experiences and reading systems from text databases to the pro

Source code aplikasi Digital Library (digilib) berbasis php _ Source ...
Source code aplikasi Digital Library (digilib) berbasis php _ Source Code Aplikasi.pdf. Source code aplikasi Digital Library (digilib) berbasis php _ Source Code ...

pdf editor source code
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. pdf editor source ...

Open Source Code Serving Endangered Languages - GitHub
ten called low-resource, under-resourced, or minority lan- guages) ... Our list is updatable more ... favorites on other social media sites, and, generally, a good.

A flexible, robust, open-source code for simulating ...
Astronomy Department, University of California, Santa Cruz, 95064, USA. a r t i c l e i n f o ... Available online 2 March 2015. Keywords: ...... This means that we are free to replace f(x) with a linearized function fL(x) that ..... Python program.

Source Code for Biology and Medicine - Semantic Scholar
Apr 16, 2013 - Non-negative matrix factorization (NMF) has been introduced as an important method for mining biological data. Though there ...... LNCS 2006, 4099:404–. 412. 20. Ding C, Li T, Peng W, Park H: Orthogonal nonnegative matrix tri-factori

PDF Lions' Commentary on UNIX with Source Code ...
The Design and Implementation of the FreeBSD Operating System · The UNIX Programming Environment ... UNIX and Linux System Administration Handbook.

Maturity of source code management – another ...
increased number of incidents in the production environment. The purpose was to depict the neglected traits of source code management (SCM) and to propose ... The source code also includes SQL scripts eg scripts performing a rollback to the last, err

Source Code Management/Version Control - CSE, IIT Bombay
Mar 3, 2005 - Control Tools. Source Code Management (SCM):. These are the problems source code management is intended to solve. Effectively it is a database for ... RCS is a software tool for UNIX systems which lets people working on the .... You can

Source Code Mp3 Player Visual Basic VB.NET.pdf
Form Player. Imports System.Runtime .... FileSystem.FileExists(kamuku) ... NET.pdf. Source Code Mp3 Player Visual Basic VB.NET.pdf. Open. Extract. Open with.

Recommending Source Code Examples via API Call ...
Popular libraries like file I/O, network, and GUI are generally used in many different ... recommendation system connects queries to code by matching them to API ...

A Plagiarism Detection System in Computer Source Code - Ijcsra.org
International Journal of Computer Science Research and Application ..... She received her M.S. degree in Algorithms and Software Products (2007), Faculty of.

Verification of Source Code Transformations by Program ... - CiteSeerX
2. Piecewise-affine expressions: Subscripts in the arrays and expressions in the .... M匮 2 a b. Fig. 2. The ADDGs of program functions in Fig. 1. Array A1 and ...

How Open Source Projects use Static Code ... - Gerardo Canfora
Abstract—Static analysis tools are often used by software devel- opers to entail ...... software company, analyzing more than 3k builds, and also tried to identify ...

php examples with source code pdf free download
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. php examples ...

How Open Source Projects use Static Code ... - Gerardo Canfora
Studies conducted by Seo et al. [31] and Beller et al. [14] focused on compilation and testing build failures, respectively. Kerzazi et al. [24] measured the impact ...

Improving Automated Source Code Summarization via ...
Jun 7, 2014 - Department of Computer Science and Engineering. University of Notre Dame ... keywords or statements from the code, and 2) build a sum- mary from this .... Therefore, in RQ2, we study the degree to which programmers emphasize these ... r

fiizxa Call Of Duty 4 Hack Source Code
Search results ... :D Follow me on Twitter: NEW Ali-A tshirts! .... Generator Codes Call Of Duty Advanced Warfare Hacks Ps4 Code Generator Call Of Duty Black ...