www. NYLJ.com Thursday, May 5, 2016 Volume 255—NO. 86 Corporate Crime Implications of the DOJ and Apple Legal Fight That Wasn’t O ne of the most compelling legal stories of 2016 has been the legal fight between the U.S. Department of Justice and Apple about whether Apple should be (or can be) compelled to help the DOJ access information stored on an iPhone that belonged to one of the perpetrators of the December 2015 mass shooting in San Bernardino. The stakes were high for both parties. The DOJ is frustrated by its inability to decode encrypted communications. And Apple, like many other technology companies, promotes privacy as a core corporate value. Both sides quickly “dug in” for a lengthy court fight that many believed would wind up in the U.S. Supreme Court. But one day before a scheduled federal court hearing in March, the DOJ unexpectedly withdrew its motion. The DOJ disclosed that it had made a “onetime payment” to an unnamed “outside party” who had identified a potential weakness in the iPhone’s operating system, which could allow the Federal Bureau of Investigation to bypass the iPhone’s encryption. Shortly thereafSteven M. Witzel is a partner of Fried, Frank, Harris, Shriver & Jacobson. Joshua D. Roth is an associate at the firm. Harrison D. Polans, a law clerk, assisted in the preparation of this column. ter, the Washington Post reported that the FBI had paid one or more “grey hat” hackers to “crack” the iPhone’s encryption. This column provides an overview of the facts surrounding the DOJ’s legal fight with Apple and the relevant legal considerations, and examines the legal framework under the Computer Very little is publicly known about how the FBI ultimately unlocked the shooter’s iPhone. Some commentators have speculated that the FBI used the information provided by the “grey hat” hacker(s) to build hardware that allowed it to “crack” the iPhone’s passcode. Fraud and Abuse Act (the CFAA) that governs hacking. We conclude that courts should more closely supervise the government when it engages in such activities. Among other things, we argue that courts should take into consideration the potential privacy and cybersecurity interests of uninvolved third parties (e.g., other iPhone users) before authorizing the government to hack into protected systems in order to execute duly authorized search warrants. By Steven M. Witzel And Joshua D. Roth Background on the Legal Fight Between the DOJ and Apple. In December 2015, two shooters killed 14 people and injured 22 more at the Inland Regional Center in San Bernardino, California. While the shooters reportedly swore allegiance to ISIS and expressed radical views on social media, very little is known about their motives and whether they were acting in coordination with others in the United States or abroad. To investigate those questions and others, the FBI attempted to gain access to information that was stored on an iPhone that belonged to one of the shooters, Syed Rizwan Farook, which was recovered from his car pursuant to a search warrant that also authorized the FBI to search the contents of the iPhone.1 Farook’s iPhone was “locked” and encrypted. Accordingly, the FBI asked Apple, the creator of the iPhone, to voluntarily help unlock the device without triggering a security feature that would erase all of the information stored on the device after a certain number of unsuccessful attempts to enter the passcode. Because the information stored on the iPhone had not been backed up to the iCloud (Apple’s free “cloud” based storage solution), Apple did not have access to the information at issue, and thus could not simply turn it over to Thursday, May 5, 2016 the FBI.2 Apple’s inability to access the information at issue from its own servers distinguished this case from the thousands of information requests that companies like Apple receive from law enforcement authorities every year and typically comply with without objection.3 Apple ultimately declined to help the FBI, citing its policy against undermining the security features of its products.4 In response, the DOJ filed a motion in the Central District of California pursuant to the All Writs Act, seeking an order compelling Apple to help the FBI unlock Farook’s iPhone.5 The All Writs Act was enacted in its original form in 1789, and permits federal courts to “issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law.”6 The DOJ invoked the All Writs Act against Apple to facilitate the search of Farook’s iPhone, which the court had already authorized pursuant to a search warrant. The DOJ argued that “based on the authority given to the courts under the All Writs Act, courts have issued orders, similar to the one the government is seeking here, that require a manufacturer to assist in accessing a cell phone’s files so that a warrant may be executed as originally contemplated.”7 The DOJ further argued that Apple’s assistance was essential: iPhones will only run software cryptographically signed by Apple, and because Apple restricts access to the code of the software that creates these obstacles, there is no other party that has the ability to assist the government in preventing these [security] features from obstructing the search ordered by the court pursuant to the warrant.8 On Feb. 16, 2016, Magistrate Judge Sheri Pym granted the DOJ’s motion and ordered Apple to help the FBI unlock the shooter’s iPhone. Specifically, the order required Apple to provide “reasonable technical assistance” to (1) “bypass or disable the auto-erase function whether or not it has been enabled,” (2) “enable the FBI to submit passcodes to [the iPhone] for testing electronically via the physical device port, Bluetooth, Wi-Fi, or other protocol available,” and (3) “ensure that when the FBI submits passcodes to [the iPhone], software running on the device will not purposefully introduce any additional delay between passcode attempts beyond what is incurred by Apple hardware.”9 Apple vigorously resisted the court’s order, arguing that it was being told “to build a backdoor to the iPhone,” which could endanger the privacy of all iPhone owners, create a dangerous precedent, and “undermine the very freedoms and liberty our government is meant to protect.”10 Apple also warned that, once created, a tool to unlock the iPhone “could be used over and over again, on any number of devices” by anyone with knowledge of how it worked, including “sophisticated hackers and cybercriminals.”11 Apple further criticized the DOJ’s invocation of the All Writs Act, stating that “the government’s boundless interpretation of the [Act]” makes it “hard to conceive of any limits the government’s order could obtain in the future.”12 Notwithstanding the court’s order, Apple continued to refuse to help the FBI. As a result, three days after the court ruled, the DOJ filed a motion to compel Apple to comply with the court’s order.13 Apple responded by filing a motion to vacate the court’s February 16 order, arguing that the All Writs Act did not provide a basis for relief and that the order violated Apple’s First and Fifth Amendment rights.14 Specifically, Apple stated: no court has ever authorized what the government now seeks, no law supports such unlimited and sweeping use of the judicial process, and the Constitution forbids it … . Such an order will inflict significant harm—to civil liberties, society, and national security— and would preempt decisions that should be left to the people through laws passed by Congress and signed by the President.15 On March 21, one day before a scheduled court hearing on these issues, the DOJ unexpectedly asked the court to adjourn the hearing because “an outside party demonstrated to the FBI a possible method for unlocking [the shooter’s] iPhone” without Apple’s assistance.16 The DOJ, however, cautioned that “[t]esting is required to determine whether it is a viable method that will not compromise data on [the shooter’s] iPhone,” and requested that the court adjourn the hearing to allow it to test the proposed solution.17 Early reports speculated that the FBI had hired a digital forensics firm in Israel, Cellebrite Mobile Synchronization, to unlock the iPhone.18 However, on April 12, 2016, The Washington Post, quickly followed by a number of other media outlets, reported that the FBI had hired at least one professional “grey hat” hacker, who reportedly identified a flaw in the iPhone’s software known as a “zero day exploit,” and then sold that information to the FBI for a “one-time fee”19 believed to be in excess of $1 million.20 Very little is publicly known about how the FBI ultimately unlocked the shooter’s iPhone. Some commentators have speculated that the FBI used the information provided by the “grey hat” hacker(s) to build hardware that allowed it to “crack” the iPhone’s passcode.21 But regardless of how the FBI managed to unlock the iPhone, the DOJ subsequently withdrew its motion against Apple because it no longer needed Apple’s assistance.22 In the weeks since the DOJ withdrew its motion, there has been much discussion about whether the FBI would Thursday, May 5, 2016 and should disclose the security vulnerability that it used to unlock the shooter’s iPhone to Apple.23 Apple has indicated that it will not seek to compel the government to disclose the vulnerability, asserting that it is “confident” that the vulnerability will have a “short shelf life” and that it will likely be fixed through the company’s regular product development process.24 The FBI, for its part, stated on April 26 that it does not plan to share details of the vulnerability with Apple. And FBI Director James Comey recently asserted that the FBI may be able avoid the relevant White House review process for such decisions entirely depending on how much the FBI understands about the security vulnerability at issue.25 That White House process, known as the Vulnerabilities Equities Process (the VEP), was adopted in 2010 and established an interagency Equities Review Board, which provides recommendations regarding the disclosure of information about vulnerabilities that the government discovers.26 Without saying so directly, Director Comey may have been suggesting that the FBI simply purchased a “tool” without fully understanding the underlying security vulnerability, and as such has nothing to disclose. A Word (or Three) About Hackers. Hackers are typically classified into three groups based on their tactics and motivations. For example, “white hat” hackers search for security weaknesses in computer systems, typically with permission from the systems’ owners, and disclose those vulnerabilities to the owners, so they can be patched.27 “Black hat” hackers, by contrast, compromise computer systems for personal gain by obtaining information and then exploiting it themselves or selling it to third parties. They are the stereotypical criminal hackers who engage in malicious activities and attract much of the media’s attention.28 “Grey hat” hackers, the kind reportedly utilized by the FBI to access the shooter’s iPhone, “operat[e] on the fringe of civil and criminal liability to report security vulnerabilities.”29 Unlike “white hat” hackers, “grey hat” hackers are not authorized to search for security vulnerabilities, and they often disclose security flaws publically. But unlike “black hat” hackers, “grey hat” hackers do not sell security vulnerabilities to criminals, but rather seek to sell their discoveries to governments or to the system owners themselves.30 Government Sanctioned Hacking and the Computer Fraud and Abuse Act. The CFAA is the primary federal cyber security and anti-hacking law. It prohibits, among other computer-related acts, “access[ing]” and “obtain[ing] information” from any “protected computer”31 “without authorization” or “exceed[ing] authorized access.”32 The CFAA carries stiff penalties, including jail time, and has been subject to varying interpretations by courts. However, courts uniformly agree that the CFAA applies where an individual hacks into a computer system or device to which he or she does not have authorized access.33 While very little is known about how the “grey hat” hacker(s) managed to bypass Apple’s security features, it seems likely that the hacker(s) violated the CFAA in the process. Of course, from a practical perspective, the “grey hat” hacker(s) who helped the FBI were never at risk of being prosecuted under the CFAA because they were assisting the FBI (at least after the fact). But it is noteworthy that the DOJ encouraged and financially rewarded the type of activity that it would have prosecuted under different circumstances. Notably, the CFAA has a broad exception for hacking that can be characterized as “lawfully authorized” intelligence and law enforcement activity.34 This exception allows the government to engage in conduct that would otherwise violate the CFAA. The exception relies on boilerplate language used in the “savings clauses” of various criminal statutes.35 It is unclear, however, what constitutes “lawfully authorized” activity because no court has ever interpreted this provision in the context of the CFAA or any other statute.36 But regardless of the scope of this exception, it arguably applies to accessing (and assisting the government in accessing) electronic information pursuant to a warrant. Thus, courts may be able to effectively authorize hacking that would otherwise be prohibited by the CFAA by issuing a search warrant, and without any additional scrutiny relating to the availability of the “lawfully authorized” exception to the CFAA. Court-Authorized Hacking and the Need for Enhanced Judicial Scrutiny and Oversight. Under the Fourth Amendment, courts issue search warrants upon a showing by the government that probable cause exists to believe that there is evidence of a crime in the place to be searched.37 That standard, however, does not consider the potential effects of the search on uninvolved third parties because the rights of such parties are rarely implicated. This standard becomes problematic when the government seeks to access electronic information that is protected by the same security features that are used to protect the private information of others using the same system or device. In these circumstances, the government may unintentionally put at risk information belonging to third parties. That risk is heightened in instances like the San Bernardino case where the government seeks to bypass security features for a widely used device and where those security features protect the information of countless third parties. This traditional Fourth Amendment analysis may be changing to address technological changes. On April 28, Thursday, May 5, 2016 2016, the Supreme Court adopted an amendment to Rule 41(b) of the Federal Rules of Criminal Procedure that authorizes courts to issue warrants that allow access to computers located outside their districts when the location of the data sought “has been concealed through technical means.”38 Congress has until Dec. 1, 2016 to reject the amendment before it goes into effect. Because of cybersecurity and personal data risks, we propose that courts should carefully scrutinize government requests for security bypasses, and balance the competing interests at stake. Courts should consider factors such as (1) the seriousness of the government’s underlying investigation; (2) the existence (or lack thereof) of an ongoing threat to the public interest; (3) the existence (or lack thereof) of alternative means for the government to access the information at issue; (4) the potential damage to existing cybersecurity protocols; (5) the potential impact on third parties, including the number of uninvolved people whose personal information could possibly be compromised; and (6) whether the government intends to advise the system owner about how it defeated any security features. While various others factors may also be relevant, the salient point is that courts should weigh the interests of all stakeholders before authorizing searches that implicate the potential privacy and pecuniary interests of uninvolved third parties. Applying these factors to the San Bernardino case (based on our admittedly limited visibility into the relevant facts), a court should consider (1) that the investigation pertains to a mass shooting perpetrated by individuals with possible connections to domestic and/or foreign terrorists; (2) the ongoing threat that ISIS poses to American national security interests; (3) the asserted lack of alternate ways for the government to determine the shooter’s possible connections to terrorists other than by forcing Apple to provide access to his iPhone; (4) the potential for cyber attacks and theft of valuable data by hackers who could misappropriate the iPhone’s vulnerability; (5) the potentially significant risk that that private data belonging to millions of iPhone users could be jeopardized; and (6) the fact that the government does not presently intend to advise Apple about how it managed to “unlock” the iPhone. We do not have enough information to fully evaluate the relative strengths of these “Grey hat” hackers, the kind reportedly utilized by the FBI to access the shooter’s iPhone, “operat[e] on the fringe of civil and criminal liability to report security vulnerabilities.” factors in the San Bernardino case. But we submit that they form the bases of a new paradigm under which to resolve issues involving these types of searches. Conclusion As the use of encryption and other similar types of information security features increases, courts may be increasingly called upon to decide whether and when to compel technology companies and others to help law enforcement access protected information. Because these types of requests implicate various interests outside the usual Fourth Amendment analysis, courts should consider adopting a more robust and fact-specific approach that takes into consideration and balances the additional and various interests at stake. •••••••••••••••• ••••••••••••• 1. See Government’s Ex Parte Application for Order Compelling Apple to Assist in Search, In the Matter of Search of an Apple iPhone Seized During the Execution of a Search Warrant on a Black Lexus IS300, California License Plate 35KGD203 (hereinafter Matter of Search of an iPhone), Ed No. 15-0451M, at 3 (C.D. Cal. Feb. 16, 2016), available at http://www.wired.com/wp-content/uploads/2016/02/SB-shooter-MOTION-seeking-asstiPhone.pdf. 2. FBI Director James Comey acknowledged that law enforcement authorities made a mistake early in the investigation when they failed to try to back up the information stored on the iPhone to the iCloud. Instead, the authorities attempted to change the iPhone’s password, which reportedly made it impossible to perform a backup. See Walt Mossberg, “The iCloud loophole,” THE VERGE (March 2, 2016), http://www.theverge.com/2016/3/2/11144588/waltmossberg-apple-vs-fbi-iphone-icloud-loophole. 3. See Apple, Government Information Requests (2016), available at http://www.apple.com/privacy/government-information-requests/; Apple, Report on Government Information Requests: July 1-Dec. 31, 2015 (2016), available at http://images. apple.com/legal/privacy/transparency/requests2015-H2-en.pdf. 4. See Apple, A Message to our Customers (Feb. 16, 2016), available at www.apple.com/customerletter/ (“Customers expect Apple and other technology companies to do everything in our power to protect their personal information, and at Apple we are deeply committed to safeguarding their data.”). 5. See Government’s Ex Parte Application for Order Compelling Apple to Assist in Search, supra note 1. 6. See 28 U.S.C. §1651. Federal courts may issue orders under the All Writs Act that are “necessary or appropriate to effectuate and prevent the frustration of orders [they have] previously issued” and to “achieve the ends of justice entrusted to [them].” United States v. New York Telephone Co., 434 U.S. 159, 172-73 (1977) (internal citations and quotations omitted). The All Writs Act also applies “to persons who, though not parties to the original action … are in a position to frustrate the implementation of a court order or the proper administration of justice.” Id. at 174. 7. See Government’s Ex Parte Application for Order Compelling Apple to Assist in Search, supra note 1, at 11. 8. Id. at 13. 9. See Order Compelling Apple to Assist Agents in Search, Matter of Search of an iPhone, Ed No. 15-0451M, at 2 (C.D. Cal. Feb. 16, 2016), available at https://assets.documentcloud.org/documents/2714001/SB-Shooter-Order-Compelling-Apple-Asst-iPhone.pdf. 10. See Apple, A Message to our Customers, supra note 4. 11. Id. 12. See Apple’s Motion to Vacate Order Compelling Apple to Assist Agents in Search and Opposition to Government’s Motion to Compel Assistance, Matter of Search of an iPhone, Ed No. CM 16-10, at 4 (C.D. Cal. Feb. 25, 2016), available at https://www. scribd.com/doc/300522240/Motion-to-Vacate-Briefand-Supporting-Declarations (“For example, if Apple can be forced to write code in this case to bypass security features and create new accessibility, what is to stop the government from demanding that Apple write code to turn on the microphone in aid of government surveillance, activate the video camera, surreptitiously record conversations, or turn on location services to track the phone’s user? Nothing.”). Thursday, May 5, 2016 13. See Government’s Motion to Compel Apple to Comply with this Court’s Feb. 16, 2016 Order Compelling Assistance in Search, Matter of Search of an iPhone, Ed No. CM 16-10 (C.D. Cal. Feb. 19, 2016), available at https://assets.documentcloud. org/documents/2716000/031122954861.pdf. 14. See Apple’s Motion to Vacate Order Compelling Apple to Assist Agents in Search and Opposition to Government’s Motion to Compel Assistance, supra note 12. 15. Id. at 1. 16. See Government’s Ex Parte Application for a Continuance, Matter of Search of an iPhone, at 3 (C.D. Cal. March 21, 2016). See also Jordan Novet, “Court cancels hearing after FBI found a ‘possible method’ to unlock shooter’s iPhone,” VENTUREBEAT (March 21, 2016), http://venturebeat. com/2016/03/21/u-s-attorneys-ask-to-vacate-applecourt-hearing-saying-fbi-has-found-a-possiblemethod-to-unlock-shooters-iphone/. 17. See Government’s Ex Parte Application for a Continuance, supra note 16 at 3. 18. See Sagi Cohen, “Report: Israeli company helping FBI crack iPhone security,” YNETNEWS (March 23, 2016), http://www.ynetnews.com/ articles/0,7340,L-4782246,00.html (“The FBI is reportedly using the services of Cellebrite in its effort to break the protection on a terrorist’s locked iPhone, according to experts in the field familiar with the case … . Cellebrite has not responded to the report. But if it is indeed the “third party” in question, it would bring the high-stakes legal showdown between the government and Apple to an abrupt end.”). 19. See Ellen Nakashima, “FBI paid professional hackers one-time fee to crack San Bernardino iPhone,” THE WASHINGTON POST (April 12, 2016), available at https://www.washingtonpost.com/ world/national-security/fbi-paid-professionalhackers-one-time-fee-to-crack-san-bernardinoiphone/2016/04/12/5397814a-00de-11e6-9d3633d198ea26c5_story.html. 20. Mark Berman and Matt Zapotosky, “The FBI paid more than $1 million to crack the San Bernardino iPhone,” THE WASHINGTON POST (April 21, 2016), available at https://www.washingtonpost. com/news/post-nation/wp/2016/04/21/the-fbi-paidmore-than-1-million-to-crack-the-san-bernardinoiphone/. A “zero-day exploit” refers to a security vulnerability that a hacker exploits before the party being breached is even aware of the issue. 21. See Kavita Iyer, “FBI reportedly paid ‘grey hat’ hackers to crack San Bernardino terrorist’s iPhone, TECHWORM (April 13, 2016), http://www.techworm.net/2016/04/fbi-reportedly-paid-grey-hathackers-crack-san-bernardino-terrorists-iphone. html. 22. See Government’s Status Report, Matter of Search of an iPhone, Ed No. CM 16-10 (C.D. Cal. March 28, 2016), available at https://assets.documentcloud.org/documents/2778267/Apple-StatusReport.pdf. 23. See Nakashima, “FBI paid professional hackers,” supra note 19. 24. See Zack Whittaker, “Apple won’t sue FBI to reveal hack used to unlock seized iPhone,” ZERO DAY NET (April 8, 2016), http://www.zdnet.com/ article/apple-wont-sue-fbi-to-discover-hack-usedto-unlock-seized-iphone/. 25. See Devlin Barnett, “FBI Plans to Keep Apple iPhone-Hacking Method Secret,” The Wall Street Journal (April 26, 2016), available at http://www. wsj.com/articles/fbi-plans-to-keep-apple-iphonehacking-method-secret-sources-say-1461694735; Eric Lichtblau and Katie Benner, “With Finality, F.B.I. Opts Not to Share iPhone-Unlocking Method,” N.Y. Times (April 27, 2016), available at http://www. nytimes.com/2016/04/28/technology/with-finalityfbi-opts-not-to-share-iphone-unlocking-method. html?_r=0. 26. See Commercial and Government Information Technology and Industrial Control Product or System Vulnerabilities Equities Policy and Process (Feb. 16, 2010), available at https://www.eff. org/files/2016/01/18/37-3_vep_2016.pdf. Although little is known about the VEP, the Obama administration has taken the position that this process should be “biased towards responsibly disclosing vulnerabilities.” See Kim Zetter, “Obama: NSA Must Reveal Bugs Like Heartbleed, Unless they Help the NSA,” WIRED (April 15, 2014), https://www. wired.com/2014/04/obama-zero-day/. According to Michael Daniel, the special assistant to President Barack Obama on cybersecurity, “disclosing vulnerabilities usually makes sense” because it provides transparency and ensures that electronic systems are secure and unable to be exploited by cybercriminals. See Lichtblau and Benner, “F.B.I. Opts Not to Share iPhone-Unlocking Method,” supra note 25. Despite the FBI’s current refusal to disclose information to Apple about the vulnerability that was used to access Farook’s iPhone, the FBI recently advised Apple about a different vulnerability pursuant to the VEP. See Joseph Menn, “Apple says FBI gave it first vulnerability tip on April 14,” REUTERS (April 26, 2016), http://www.reuters. com/article/us-apple-encryption-fbi-disclosureidUSKCN0XO00T. 27. See Chris Hoffman, “Hacker Hat Colors Explained: Black Hats, White Hats, and Gray Hats,” HOW-TO GEEK (April 20, 2014), http://www.howtogeek.com/157460/hacker-hat-colors-explainedblack-hats-white-hats-and-gray-hats/. 28. Id. 29. Cassandra Kirsch, “The Grey Hat Hacker: Reconciling Cyberspace Reality and the Law,” 41 N. KY. L. REV. 383, 386 (2014). 30. See Kim Zetter, “Hacker Lexicon: What are White Hat, Gray Hat, and Black Hat Hackers?,” WIRED (April 13, 2016), http://www.wired. com/2016/04/hacker-lexicon-white-hat-gray-hatblack-hat-hackers/. Several of the country’s most prominent technology companies, including Google, Facebook, Microsoft, Yahoo, and PayPal Holdings have adopted “bug bounty programs,” through which they offer hackers rewards for discovering and reporting security vulnerabilities. These programs provide a financial incentive for security researchers to report security vulnerabilities rather than use them to do harm. The amount of the reward depends on the vulnerability that is uncovered, but can be significant. See Nicole Perlroth, “Hacking for Security and Getting Paid for It,” N.Y. TIMES BITS (Oct. 14, 2015), http://bits.blogs. nytimes.com/2015/10/14/hacking-for-security-andgetting-paid-for-it/; Enid Burns, “Microsoft Woos Hackers with Bounties for Bugs,” E-COMMERCE TIMES (June 21, 2013), http://www.ecommercetimes.com/story/78331.html. 31. The CFAA’s definition of “protected computer” covers virtually any computer connected to the Internet. See Computer Crime & Intellectual Property Section, Department of Justice, Prosecuting Computer Crimes, at 4 (2d ed. 2010), available at https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf. 32. See 28 U.S.C. §1030(a)(2). 33. See United States v. Phillips, 377 F.3d 215, 21920 (5th Cir. 2007). 34. See 28 U.S.C. §1030(f) (“This section does not prohibit any lawfully authorized investigative, protective, or intelligence activity of a law enforcement agency of the United States, a State, or a political subdivision of a State, or of an intelligence agency of the United States”). 35. See, e.g., 17 U.S.C. §1039(d) (Digital Millennium Copyright Act (DMCA)); 18 U.S.C. §1028(e) (fraud and related activity in connection with identification documents, authentication features, and information); 18 U.S.C. §1038(d) (false information and hoaxes); 18 U.S.C. §1039(d) (fraud and related activity in connection with obtaining confidential phone records information of a covered entity); 18 U.S.C. §1367(b) (interference with the operation of a satellite); 8 U.S.C. §1324c(b) (penalties for document fraud under the Immigration and Nationality Act); 18 U.S.C. §1546(c) (fraud and misuse of visas, permits, and other documents); 18 U.S.C. §1029(f) (fraud and related activity in connection with access devices); see also Blueport Co. v. United States, 71 Fed. Cl. 768, 776 (Fed. Cl. 2006) (noting that the DMCA’s law enforcement and intelligence exception “may merely reflect a concern by Congress that the Act might be construed in such a way as to interfere with federal, state, and local law enforcement officials and their agents, and lawful intelligence activities by federal, state, and local officials or their agents.”). 36. See Orin Kerr, “Did the CIA Violate the Computer Fraud and Abuse Act by Accessing Intelligence Committee Computers?,” LAWFARE (April 12, 2014), www.lawfareblog.com/did-cia-violatecomputer-fraud-and-abuse-act-accessing-intelligence-committee-computers. 37. See Safford United School District No. 1 v. Redding, 557 U.S. 364, 370 (2009) (“Probable cause exists where the facts and circumstances … are such in themselves to warrant a man of reasonable caution in the belief that an offense has been or is being committed, and that the evidence bearing on that offense will be found in the place to be searched.”) (internal citations and quotations omitted). 38. See Ltrs. from John G. Roberts, Chief Justice, U.S. Supreme Court, to Joseph R. Biden, President, U.S. Senate, and Paul D. Ryan, Speaker, U.S. House of Representatives (April 28, 2016), available at http://www.supremecourt.gov/orders/courtorders/frcr16_8mad.pdf. See also Matt Ford, “The Supreme Court Expands FBI Hacking Powers,” THE ATLANTIC (April 29, 2016), http:// www.theatlantic.com/politics/archive/2016/04/ supreme-court-fbi-hacking/480498/; Kurt Orzeck, “High Court OKs Rule Change Expanding FBI Hacking Powers,” LAW 360 (April 28, 2016), http:// www.law360.com/whitecollar/articles/790647?nl_ pk=ace45e2f-cb8e-4521-b699-500bdbf1cb53&utm_ source=newsletter&utm_medium=email&utm_ campaign=whitecollar. Reprinted with permission from the May 5, 2016 edition of the NEW YORK LAW JOURNAL © 2016 ALM Media Properties, LLC. All rights reserved. Further duplication without permission is prohibited. For information, contact 877-257-3382 or [email protected]. # 070-05-16-06
© Copyright 2026 Paperzz