In re: Under Seal

Filing 36

AMICUS CURIAE/INTERVENOR BRIEF by Kurt Opsahl for Amicus Curiae Electronic Frontier Foundation in electronic and paper format. Type of Brief: Amicus Curiae. Method of Filing Paper Copies: mail. Date Paper Copies Mailed, Dispatched, or Delivered to Court: 10/25/2013. [999226267] [13-4625, 13-4626] Kurt Opsahl

Download PDF
Case Nos. 13-4625, 13-4626 _____________________________________________________________ IN THE UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT IN RE: UNDER SEAL ____________________________________________________ UNITED STATES OF AMERICA Plaintiff-Appellee, v. UNDER SEAL 1; UNDER SEAL 2, Parties-In-Interest-Appellants _____________________________________________________________ On Appeal from the United States District Court for the Eastern District of Virginia The Honorable Claude M. Hinton Case Nos. 13-SW-00522-CMH-1; 13-DM-00022-DMH-1 ______________________________________________________________ BRIEF OF AMICUS CURIAE ELECTRONIC FRONTIER FOUNDATION IN SUPPORT OF APPELLANT _____________________________________________________________ Kurt Opsahl kurt@eff.org Jennifer Lynch Hanni Fakhoury ELECTRONIC FRONTIER FOUNDATION 815 Eddy Street San Francisco, California 94109 (415) 436-9333 Counsel for Amicus Curiae ELECTRONIC FRONTIER FOUNDATION DISCLOSURE OF CORPORATE AFFILIATIONS AND OTHER ENTITIES WITH A DIRECT FINANCIAL INTEREST IN LITIGATION Pursuant to Rule 26.1 of the Federal Rules of Appellate Procedure, amicus curiae Electronic Frontier Foundation states that it does not have a parent corporation, and that no publicly held corporation owns 10% or more of the stock of amicus. Dated: October 24, 2013 Respectfully submitted, /s/ Kurt Opsahl Kurt Opsahl Jennifer Lynch Hanni Fakhoury ELECTRONIC FRONTIER FOUNDATION 815 Eddy Street San Francisco, CA 94109 Telephone: (415) 436-9333 Counsel for Amicus Curiae ELECTRONIC FRONTIER FOUNDATION   i TABLE OF CONTENTS CORPORATE DISCLOSURE STATEMENT ..........................................................i STATEMENT OF INTEREST ................................................................................. 1 INTRODUCTION ..................................................................................................... 1 ARGUMENT ............................................................................................................ 3 I. Permitting the Government to Obtain a Private Encryption Key Compromises the Security of All Internet Users. ................................. 3 A. B. The Public Key Infrastructure System Protects Encrypted Internet Communications Regardless of How Private Keys Are Compromised.............................................................................. 7 C. II. A Private Key Protects the Communications and Other Security-Sensitive Information of All Users of a Service. ......... 4 Because Security of the HTTPS Protocol is Critical to the Growth of the Internet, Breach of a Private Key is a Catastrophic Security Event ....................................................... 8 The Orders Authorizing Disclosure of the Private Key Violate the Fourth Amendment ............................................................................. 10 A. B. Lavabit’s Customers Have an Expectation of Privacy in their Communications, and Lavabit Can Assert that Privacy Interest on their Behalf .......................................................................... 12 C. Because the Search Warrant Contained No Limiting Principles, It Was an Illegal “General Warrant.” ....................................... 14 D.   Private Keys are Protected by the Fourth Amendment. ........... 10 The Fourth Amendment Protects Private Keys from Disclosure Pursuant to a Grand Jury Subpoena. ......................................... 18 ii 1. The Invasion of Privacy Wrought by Disclosure of a Private Key Precludes Use of a Grand Jury Subpoena .. 19 2. The Subpoena Was Unreasonable Because it Was Arbitrarily Excessive and Compliance Was Oppressive. ..................................................................... 22 CONCLUSION ....................................................................................................... 26 CERTIFICATE OF COMPLIANCE ...................................................................... 27 CERTIFICATE OF SERVICE ................................................................................ 28   iii TABLE OF AUTHORITIES Federal Cases Berger v. New York, 388 U.S. 41 (1967) ....................................................................................... 15 City of Ontario v. Quon, 560 U.S. 746 (2010) ....................................................................................... 1 Coolidge v. New Hampshire, 403 U.S. 443 (1971) ............................................................................... 14, 15 Davis v. Gracey, 111 F.3d 1472 (10th Cir. 1997) .................................................................... 16 Ex parte Jackson, 96 U.S. 727 (1877) ....................................................................................... 13 Fisher v. United States, 425 U.S. 391 (1976) ..................................................................................... 20 Florida v. Jardines, 133 S. Ct. 1409 (2013) ................................................................................. 11 Hale v. Henkel, 201 U.S. 43 (1906) ................................................................................. 19, 23 In re Appeal of Application for Search Warrant, 71 A.3d 1158 (Vt. 2012) .................................................................... 1, 15, 18 In re Application of the U.S. Authorizing the Use of a Pen Register/Trap and Trace Device on an Elec. Mail Account, No. 1:13-EC-297 (E.D. Va. July 31, 2013) .................................................. 17 In re Subpoena Duces Tecum, 228 F.3d 341 (4th Cir. 2000) ................................................................. passim   Katz v. United States, 389 U.S. 347 (1967) ................................................................... 11, 14, 20, 21   iv Kyllo v. United States, 533 U.S. 27 (2001) ....................................................................................... 10 Marron v. United States, 275 U.S. 192 (1927) ..................................................................................... 15 Maryland v. Garrison, 480 U.S. 79 (1987) ....................................................................................... 15 Oklahoma Press Publ’g Co. v. Walling, 327 U.S. 186 (1946) ..................................................................................... 22 Rakas v. Illinois, 439 U.S. 128 (1978) ..................................................................................... 13 SEC v. Jerry T. O’Brien, Inc., 467 U.S. 735 (1984) ..................................................................................... 21 See v. City of Seattle, 387 U.S. 541 (1967) ..................................................................................... 22 Steagald v. United States, 451 U.S. 204 (1981) ..................................................................................... 12 Trulock v. Freeh, 275 F.3d 391 (4th Cir. 2001) ........................................................................ 12 United States v. Bennett, 409 F.2d 888 (2d Cir. 1969) ................................................................... 20, 21 United States v. Calandra, 414 U.S. 338 (1974) ......................................................................... 19, 20, 21 United States v. Chadwick, 433 U.S. 1 (1977) ......................................................................................... 11 United States v. Christie, 717 F.3d 1156 (10th Cir. 2013) .................................................................... 16   v United States v. Clark, 638 F.3d 89 (2d Cir. 2011) ........................................................................... 16 United States v. Comprehensive Drug Testing, 621 F.3d 1162 (9th Cir. 2010) ................................................................ 16, 18 United States v. Dionisio, 410 U.S. 1 (1973) ......................................................................................... 21 United States v. Forrester, 512 F.3d 500 (9th Cir. 2008) ........................................................................ 12 United States v. Golden Valley Elec. Ass’n, 689 F.3d 1108 (9th Cir. 2012) ...................................................................... 14 United States v. Horowitz, 806 F.2d 1222 (4th Cir. 1986) ...................................................................... 13 United States v. Jacobsen, 466 U.S. 109 (1984) ..................................................................................... 11 United States v. Jones, 132 S. Ct. 945 (2012) ................................................................................... 11 United States v. Kow, 58 F.3d 423 (9th Cir. 1995) .......................................................................... 16 United States v. Miller, 425 U.S. 435 (1976) ..................................................................................... 21 United States v. Morton Salt Co., 338 U.S. 632 (1950) ............................................................................... 22, 24 United States v. Perez, 689 F.2d 1336 (9th Cir. 1982) ...................................................................... 13 United States v. R. Enters., Inc., 498 U.S. 292 (1991) ..................................................................................... 22   vi United States v. Reyes, 595 F.2d 275 (5th Cir. 1979) ........................................................................ 13 United States v. Rusher, 966 F.2d 868 (4th Cir. 1992) ........................................................................ 11 United States v. Stevens, 559 U.S. 460 (2010) ..................................................................................... 18 United States v. U.S. Dist. Court for E. Dist. of Mich., S. Div., 407 U.S. 297 (1972) ............................................................................... 13, 15 United States v. Warshak, 631 F.3d 266 (6th Cir. 2010) .............................................................. 1, 13, 20 United States v. Williams, 592 F.3d 511 (4th Cir. 2010) ........................................................................ 15 Warshak v. United States, 490 F.3d 455 (6th Cir. 2007) vacated en banc on other grounds, 532 F.3d 521 (6th Cir. 2008) ............... 21 Zurcher v. Stanford Daily, 436 U.S. 547 (1978) ..................................................................................... 14 Federal Statutes 18 U.S.C. § 2706 .................................................................................................... 25 18 U.S.C. § 3124 .................................................................................................... 25 47 U.S.C. § 1008 .................................................................................................... 25   Federal Rules Federal Rule of Criminal Procedure 17 .................................................................. 22     Constitutional Provisions U.S. Const. amend. IV ..................................................................................... passim   vii   Other Authorities Adrian Gropper, The Dog’s OAuth, The Healthcare Blog, (Jan. 18, 2010) ............ 9   Forward Security: Perfect Forward Secrecy, Wikipedia .......................................... 6   Google Chrome Website Settings ............................................................................ 8   Kashmir Hill, GoDaddy Pulls Lavabit’s Security Creds Because The FBI Got Ahold Of Its Encryption Keys, Forbes (Oct. 9, 2013) ....................... 7, 24   Public Key Infrastructure, Wikipedia ....................................................................... 7   Public-key Cryptography, Wikipedia ....................................................................... 4   Technologists’ Comment to the Director of National Intelligence Review Group on Intelligence and Communications Technology (Oct. 4, 2013) ...... 9   Ted Samson, Study Finds High Rate of Password Reuse Among Users, InfoWorld (Feb. 10, 2011) ............................................................................. 6   The Faces of Facebook ............................................................................................. 5   Trustis HMRC Set Certificate Service: Obligations of Subscribers, Trustis-Set ..... 7   Verizon, AT&T get most bucks from feds for wiretaps, CBS News (July 11, 2013) ............................................................................................. 25     viii STATEMENT OF INTEREST   The Electronic Frontier Foundation (“EFF”) is a member-supported civil liberties organization working to protect free speech and privacy rights in the online world. With more than 24,000 dues-paying members nationwide, EFF represents the interests of technology users in both court cases and in broader policy debates surrounding the application of law in the digital age. As part of its mission, EFF has often served as counsel or amicus in cases involving digital searches and seizures, and expectations of privacy in electronic communications. See, e.g., City of Ontario v. Quon, 560 U.S. 746 (2010); United States v. Warshak, 631 F.3d 266 (6th Cir. 2010); In re Search Warrant, 71 A.3d 1158 (Vt. 2012). Pursuant to Federal Rule of Appellate Procedure 29(c)(5), no one, except for undersigned counsel, has authored the brief in whole or in part, or contributed money towards the preparation of this brief. Neither Counsel for appellant Lavabit nor appellee the United States of America oppose the filing of this brief. INTRODUCTION Encrypted online communications form the backbone of the modern Internet. Without an encrypted connection, people would be at risk when they manage finances over the Web, purchase books online, transfer medical information between doctors or send and receive private communications.   1 To help enable the Internet to become an engine of free expression, innovation and commerce, in the 1990s the pioneering browser company Netscape introduced a protocol with two keys; a public key that anyone can use to encrypt communications to a service provider and a private key that only the service provider could use to decrypt the messages. The new security of this encrypted “Hypertext Transfer Protocol Secure” (HTTPS) allowed ecommerce to thrive and helped bring about the information economy. The private key is the service provider’s crown jewel, opening the door to every user’s online interactions with the website. The security depends on the secrecy of the key—once it is compromised, the security model is shattered. What happened here demonstrates that this is not merely hypothetical, but real. By forcing Lavabit to turn over its private keys, the government not only disrupted the security model on which the Internet depends, it also violated the Fourth Amendment. Lavabit has a reasonable expectation of privacy in its private key—both to protect its own communications and to protect the communications of its 400,000 customers. The government interfered with Lavabit’s possessory interest in the key, in the process destroying its business and threatening to expose the private communications of its customers. The warrant, which the government ultimately obtained after attempting to seize the key with less stringent process, had no   2 limitations or protections for these innocent customers, casually destroying their privacy as collateral damage. Seeking Lavabit’s private key to access the communications of one customer fails the minimization and particularity requirements of the Fourth Amendment and turns the warrant at issue here into a general warrant—no different than a warrant to search all houses in a city to find the papers of one suspect. Nor was the government empowered to side-step the Fourth Amendment’s requirements through a grand jury subpoena. Such subpoenas contain none of the protections of a warrant. All searches and seizures must be reasonable, yet the grand jury subpoena issued here was unreasonable because it violated the expectations of Lavabit and its users and oppressive because compliance with the subpoena was fatal to Lavabit’s business. Accordingly, this Court should reverse the district court’s order. ARGUMENT I. Permitting the Government to Obtain a Private Encryption Key Compromises the Security of All Internet Users. Relying on several different disclosure orders, the government has sought to obtain a private encryption key from Lavabit. This is like trying to hit a nail with a wrecking ball; disclosing the private encryption key will not only allow the government to access the information of the single Lavabit customer who is the target of its investigation, it will allow the government to access all of Lavabit’s   3 400,000 customers’ communications, Lavabit’s own communications, and will, most importantly, compromise the security of the HTTPS protocol, on which the growth of innovation, expression, commerce and business on the Internet depends. A. A Private Key Protects the Communications and Other SecuritySensitive Information of All Users of a Service. Private encryption keys like the one sought by the government in this case form the backbone for the industry-standard HTTPS protocol that secures communications online. HTTPS relies on the mathematics of asymmetric cryptography to encrypt communications between a user’s computer and computers controlled by the service provider. While these computer-to-computer communications protected with encryption may include the content of user communications like email and chat, they encompass a much wider data set and often include many other types of sensitive information, such as passwords that users enter to log into services, security tokens in URLs used as authentication or access control mechanisms, or sensitive banking transaction or credit card information. Asymmetric cryptography secures communications using two keys— a “public key,” which is held by a service provider and is made widely available, and a “private key,” which is kept secret.1 These keys can be represented by a                                                                                                                 1 For more on the technology, see Public-key Cryptography, Wikipedia, http://en.wikipedia.org/wiki/Public-key_cryptography (last visited Oct. 23, 2013).   4 string of alphanumeric characters, and the data of the private key is often stored in a small digital file under the control of the service provider. The security of the HTTPS protocol relies on private keys being kept private and secure by the service provider, and providers take this security very seriously. As the key is thought generally to be too difficult to guess or “crack” even by parties with tremendous computational resources,2 the security of the key hinges on whether another party is able to obtain a copy of it. In industry-standard deployments of HTTPS, a single private key is used to secure the communications of all users of a service.3 For example, Facebook has a                                                                                                                 2 The fact that keys cannot be uncovered with a brute force attack by even very powerful attackers may seem unintuitive, but this is widely believed to be the case based on how the mathematics of asymmetric cryptography work. Whether a key can be brute force attacked in this fashion depends on the key length, and there have been no demonstrated successful recoveries of RSA 1024 bit keys. Still, out of a theoretical concern that this key length may not be long enough to guard against attackers with tremendous resources, service providers have already begun to phase these out in favor of 2048 bit keys. Lavabit uses a 2048 bit key, thought to be uncrackable for the foreseeable future. 3 The validity period is governed by entities known as “Certificate Authorities,” and the validity is established via a mechanism known as “digital certificates.” Certificate authorities typically only give out these certificates for validity periods of at least one year. For example, Facebook’s certificate is valid from April 11th, 2013 until March 5th, 2016. This information is available by looking at the certificate presented when visiting “facebook.com.” For a view into the policies of Verisign, a Certificate Authority, regarding certificate lifespan, see https://securitycenter.verisign.com/contents_VRSN_US/HTML/pop_validityPerio d.htm (last visited Oct. 23, 2013).   5 single private key that protects the communications of over 1.26 billion users.4 When a private key has been discovered or disclosed to another party, all users’ past and future communications are compromised for the duration that the key was active.5 In the case of Facebook, having the private key used by the company would give unfettered access to the personal information of almost 20% of all of the human beings on the planet obtained through the Facebook site for three years.6 Moreover, a private key not only protects the electronic communications of a given communication service. It also protects passwords, credit card information, and other sensitive information like a user’s search engine query terms. Many people re-use passwords,7 so access to one site’s key will allow access to all users’ passwords on the site, which in turn can lead to access to many other online services.                                                                                                                 4 See The Faces of Facebook, http://app.thefacesoffacebook.com/ (last visited Oct. 23, 2013) (estimating the current number of Facebook users). 5 Some deployments of HTTPS use a technology called Perfect Forward Secrecy (“PFS”). For HTTPS deployments that use PFS, the key can only be used to read future communications, and cannot retroactively be used to decrypt past sessions for users that have been collected. PFS is rarely used in practice. For a discussion of PFS, see Forward Security: Perfect Forward Secrecy, Wikipedia, http://en.wikipedia.org/wiki/Forward_secrecy#Perfect_Forward_Secrecy (last visited Oct. 23, 2013). 6 See U.S. and World Population Clock, http://www.census.gov/popclock/ (last visited Oct. 23, 2013) (providing an estimate of current world population). 7 See, e.g., Ted Samson, Study Finds High Rate of Password Reuse Among Users, InfoWorld (Feb. 10, 2011), http://www.infoworld.com/t/data-security/study-findshigh-rate-password-reuse-among-users-188 (last visited Oct. 23, 2013).   6 B. The Public Key Infrastructure System Protects Encrypted Internet Communications Regardless of How Private Keys Are Compromised. Given the tremendous importance of private keys, there is complex infrastructure in place to govern their use and revocation, known as public key infrastructure (or “PKI”).8 The PKI system is designed in part to minimize the chances that users’ communications will be compromised through the turning over of a private key. Critical entities, known as Certificate Authorities, issue and manage security credentials for Internet companies. Their role in part is to ensure that private keys remain only in the hands of the intended recipients. To protect their users, browsers verify that a Certificate Authority has vouched for a given website before loading a secure page on that website. Companies are sometimes under contractual obligations with Certificate Authorities to not disclose their private key,9 and those authorities are charged with immediately revoking a key when there is any evidence of a security breach. There is no exception for government access, and as soon as it became public that                                                                                                                 8 For a more detailed discussion of PKI, see Public Key Infrastructure, Wikipedia, http://en.wikipedia.org/wiki/Public-key_infrastructure (last visited Oct. 23, 2013). 9 For an example of how Certificate Authorities can put companies under an obligation to notify, see Trustis HMRC Set Certificate Service: Obligations of Subscribers, Trustis-Set, http://www.trustis.com/pki/HMRCSET/policy/pds.html (last visited Oct. 23, 2013) (“Immediately notify the Registration Authority of a suspected or known compromise of Certificate security in accordance with the procedures laid down in the Trustis HMRC SET Issuing Authority Certificate Policy.”).   7 Lavabit’s key had been compromised through the disclosure order issued in this case, the Certificate Authority GoDaddy revoked the company’s key.10 Once a Certificate Authority has revoked a company’s key, its secure site becomes effectively unavailable to users, sharply impacting its ability to conduct commerce on the Internet. C. Because Security of the HTTPS Protocol Is Critical to the Growth of the Internet, Breach of a Private Key is Catastrophic Security Event. HTTPS is used by service providers of all sorts, from banks and social networks to email providers, to protect everything from passwords and credit card information to the content of user communications. Part of the advantage of HTTPS is that users do not need any sort of special or technical knowledge to benefit from this encryption; people who browse the Internet routinely and automatically use the HTTPS protocol and may sometimes notice visual indicators in their browsers that signify that a particular connection is secure.11 The security of the HTTPS protocol is of vital importance for the protection of users and the growth of commerce and business on the Internet. Industries such                                                                                                                 10 See Kashmir Hill, GoDaddy Pulls Lavabit’s Security Creds Because The FBI Got Ahold Of Its Encryption Keys, Forbes (Oct. 9, 2013), http://www.forbes.com/sites/kashmirhill/2013/10/09/godaddy-pulls-lavabitssecurity-creds-because-the-government-got-ahold-of-its-encryption-keys/. 11 For a description of what these indicators look like in the Chrome browser, for example, see Google Chrome Website Settings, https://support.google.com/chrome/answer/95617?hl=en (last visited Oct. 23, 2013).   8 as health care, which have been slow to rely on the Internet given security risks, are beginning to view the Internet as a place where secure transactions can occur.12 Security experts and technologists have therefore highlighted how critical it is to avoid the chilling effect that would result from the diminished security of HTTPS.13 For all of these reasons, the breach of a private key compromises the security of the HTTPS protocol as a whole and should be considered a catastrophic security event, one that has the potential to have a profound effect on not only the security of HTTPS, but on the United States economy as well. Service providers with an interest in protecting users will choose legal jurisdictions based in part on statutory or case-law-developed rules governing lawful access to key material. This may push such providers to move their businesses to jurisdictions that afford more protections for privacy and security.                                                                                                                 12 The rise of the health care industry using online security mechanisms is a multifaceted topic. But, for example, proposed standards for distributing Electronic Health Records use an Internet-based open authentication protocol that relies on HTTPS. See, e.g., Adrian Gropper, The Dog’s OAuth, The Healthcare Blog, (Jan. 18, 2010) http://thehealthcareblog.com/blog/2010/01/18/the-dogsoauth/. 13 See Technologists’ Comment to the Director of National Intelligence Review Group on Intelligence and Communications Technology (Oct. 4, 2013) https://www.eff.org/files/2013/10/05/nsa-review-panel-tech-comment.pdf (“This comes at a critical time in the evolution of Internet security: new industries like health care are just starting to put more trust into the security of online systems. It would be disastrous if the NSA’s efforts undermined this growing trust in online security.”).   9 Moreover, if it becomes clear that the government can routinely access private keys, HTTPS will be considered much less secure, and new security mechanisms will be developed to ensure that bulk access to user communications is not possible. Thus, given the importance of private keys to the security infrastructure of the Internet, and the power that comes with access to these keys, ensuring that there are strong protections against compelled disclosure of private keys is critical to the security of HTTPS. The Fourth Amendment to the U.S. Constitution provides one such protection, but as explained below, both the search warrant and the subpoena used to obtain Lavabit’s private key fell outside constitutional boundaries of what the Fourth Amendment permits. II. The Orders Authorizing Disclosure of the Private Key Violate the Fourth Amendment. Lavabit is in the unusual position of defending against the disclosure of a single “document”—its private encryption key—via a “blizzard” of different court orders. Appellant’s Opening Brief (“AOB”) at 8. But neither the search warrant, nor the pen/trap order, nor the subpoena issued to Lavabit could compel disclosure of the key consistent with the Fourth Amendment. A. Private Keys are Protected by the Fourth Amendment. The Fourth Amendment protects people from “unreasonable searches and seizures” of their “persons, houses, papers and effects.” U.S. Const. amend. IV. A   10 “Fourth Amendment search occurs when the government violates a subjective expectation of privacy that society recognizes as reasonable.” Kyllo v. United States, 533 U.S. 27, 33 (2001) (citing Katz v. United States, 389 U.S. 347, 361 (1967) (Harlan J., concurring)). 14 A “seizure” for purposes of the Fourth Amendment occurs when “there is some meaningful interference with an individual’s possessory interests in that property.” United States v. Jacobsen, 466 U.S. 109, 113 (1984) (citing United States v. Chadwick, 433 U.S. 1, 13, n. 8 (1977)). “Possession” means a person has “dominion and control” over the item. United States v. Rusher, 966 F.2d 868, 878 (4th Cir. 1992). Here, both search and seizure are at issue. First, Lavabit has a reasonable expectation of privacy in the key itself. The private key was effectively a password—albeit a long, difficult to remember one—that had the potential to unlock the contents of all of its users’ electronic communications. Lavabit treated the key as private and took great steps to prevent its disclosure. Society expects and relies on the fact that service providers will protect their private keys to ensure the security of the HTTPS protocol. The Public Key Infrastructure system was set up in part to manage and enforce this.                                                                                                                 14 The U.S. Supreme Court has recently revived the pre-Katz focus on physical intrusion onto private property as another way in which the government can violate the Fourth Amendment. See Florida v. Jardines, 133 S. Ct. 1409 (2013); United States v. Jones, 132 S. Ct. 945 (2012). But as the Court recently explained in Jones, these holdings complement, but do not displace Katz’s foundational approach that looks at expectations of privacy. Jones, 132 S. Ct. at 952.   11 Moreover, the government’s attempt to obtain the key interfered with Lavabit’s possessory interest in it. Since no one knew the key but Lavabit, and since the key enabled it to have exclusive dominion and control over the files and communications effectively “locked” by the private key, the government’s efforts to obtain the key interfered with Lavabit’s exclusive “dominion and control” over the key. Lavabit would no longer be the only one able to decrypt the communications and have control and access to the communications on its servers. Thus, when the government obtained the key, it constituted a “seizure” under the Fourth Amendment. B. Lavabit’s Customers Have an Expectation of Privacy in their Communications, and Lavabit Can Assert that Privacy Interest on their Behalf. The Fourth Amendment extends to protect not only to the private key and its seizure, but also to the information the private key unlocked: an enormous database of Lavabit’s customer’s email communications. Passwords are “affirmatively intended to exclude” others from the place to be searched, Trulock v. Freeh, 275 F.3d 391, 403 (4th Cir. 2001), and here, the place unlocked by the password contained one of the most treasured pieces of private information: details of a person’s electronic communications. 15 The Fourth Amendment protects these                                                                                                                 15 The government here sought the SSL private key to get routing information about the suspect’s electronic communications and not the communications themselves. See AOB at 6. While the government has argued in other contexts   12 communications no less than the contents of letters sent through the mail. See Ex parte Jackson, 96 U.S. 727, 733 (1877); see also United States v. Warshak, 631 F.3d 266, 288 (6th Cir. 2010) (expectation of privacy in the contents of emails) (“Warshak II”); United States v. U.S. Dist. Court for E. Dist. of Mich., S. Div., 407 U.S. 297, 313 (1972) (Fourth Amendment protects “conversational privacy”). Lavabit itself can assert its customers’ privacy interest in the electronic communications they have locked away on Lavabit’s servers. See United States v. Perez, 689 F.2d 1336, 1338 (9th Cir. 1982) (per curiam) (a person or entity can have a “legitimate expectation of privacy in a place or object he does not own”) (citing United States v. Reyes, 595 F.2d 275, 278 (5th Cir. 1979)). Determining an expectation of privacy requires examining the person’s “interest in and control of the area searched” as well as its “efforts to ensure that privacy and society’s willingness to recognize his expectation as reasonable.” United States v. Horowitz, 806 F.2d 1222, 1225 (4th Cir. 1986) (citing Rakas v. Illinois, 439 U.S. 128 (1978)). Here, Lavabit not only had control of the area to be searched—its servers— but it also had an “interest” in that area. It had a business interest because its entire                                                                                                                                                                                                                                                                                                                                                                     that this routing information is not protected by the Fourth Amendment since it is information turned over to a third party, see e.g., United States v. Forrester, 512 F.3d 500, 511 (9th Cir. 2008), the fact that it sought a search warrant here means that it should be deemed to waive this argument in this case. See Steagald v. United States, 451 U.S. 204, 209 (1981) (government can “lose its right to raise factual issues” about whether a Fourth Amendment expectation of privacy exists “when it has made contrary assertions in the courts below”).   13 business model was predicated on the extraordinary steps it took to safeguard its customers’ data—steps far more aggressive than more mainstream commercial email providers. The effort Lavabit took to safeguard its customers’ privacy allows it to assert the privacy interests of its customers. See, e.g., United States v. Golden Valley Elec. Ass’n, 689 F.3d 1108, 1116 (9th Cir. 2012) (“Depending on the circumstances or the type of information, a company’s guarantee to its customers that it will safeguard the privacy of their records might suffice to justify resisting an administrative subpoena” as being unconstitutional under the Fourth Amendment). C. Because the Search Warrant Contained No Limiting Principles, It Was an Illegal “General Warrant.” Warrantless searches and seizures are “per se unreasonable under the Fourth Amendment” unless they fall within a few specific exceptions, none of which apply here. Coolidge v. New Hampshire, 403 U.S. 443, 454-55 (1971) (quoting Katz, 389 U.S. at 357)). Indeed, the government must have recognized the Fourth Amendment interests here when it ultimately decided to seek a warrant after initially trying to use a subpoena to obtain the private key. See Zurcher v. Stanford Daily, 436 U.S. 547, 562-63 (1978) (“[S]earch warrants are more difficult to obtain than subpoenas. . . . Where, in the real world, subpoenas would suffice, it can be expected that they will be employed [instead of warrants] by the rational   14 prosecutor.”). Yet the mere existence of the warrant does not end the constitutional inquiry. The Fourth Amendment requires a warrant “particularly describe[e] the place to be searched, and the persons or things to be seized.” amend. IV. U.S. Const. This requirement ensures that “those searches that are deemed necessary are as limited as possible,” as the evil of unrestrained searches “is not that of intrusion per se, but of a general, exploratory rummaging” in a protected space. Coolidge, 403 U.S. at 467 (emphasis added). Another function of the particularity requirement is to “ensure[] that the search will be carefully tailored to its justifications.” Maryland v. Garrison, 480 U.S. 79, 84 (1987). That is done by ensuring “nothing is left to the discretion of the officer executing the warrant” in determining what information can be taken under the warrant. Marron v. United States, 275 U.S. 192, 196 (1927); see also United States v. Williams, 592 F.3d 511, 519 (4th Cir. 2010). When it comes to the use of electronic surveillance to intrude into conversational privacy, the Supreme Court has held that “Fourth Amendment safeguards” must be applied. U.S. Dist. Court for E. Dist. of Mich., 407 U.S. at 313; see also Berger v. New York, 388 U.S. 41, 58 (1967) (“indiscriminate use of electronic devices . . . must be carefully circumscribed so as to prevent unauthorized invasions of the sanctity of a man’s home and the privacies of life.”)   15 (citations and quotations omitted). Courts are authorized to impose ex ante conditions on the execution of a search warrant in order to avoid the risk of a “general warrant” inherent in broad electronic searches. See, e.g., In re Appeal of Application for Search Warrant, 71 A.3d 1158, 1172 (Vt. 2012); United States v. Comprehensive Drug Testing, 621 F.3d 1162, 1176 (9th Cir. 2010) (en banc) (per curiam). Courts may also assess the reasonableness of how the government conducts an electronic search after the search has occurred. See United States v. Christie, 717 F.3d 1156, 1167 (10th Cir. 2013) (“even if courts do not specify particular search protocols up front in the warrant application process, they retain the flexibility to assess the reasonableness of the search protocols the government actually employed in its search after the fact.”). Moreover, courts have routinely invalidated warrants whose “description . . . of the place to be searched is so vague that it fails reasonably to alert executing officers to the limits of their search authority.” United States v. Clark, 638 F.3d 89, 94 (2d Cir. 2011); see also Davis v. Gracey, 111 F.3d 1472, 1479 (10th Cir. 1997) (warrants are invalid “where the language of the warrants authorized the seizure of virtually every document that one might expect to find in a . . . company’s office, including those with no connection to the criminal activity providing the probable cause for the search”) (internal quotation omitted); United   16 States v. Kow, 58 F.3d 423, 427 (9th Cir. 1995) (same where warrant “contained no limitations on what documents within each category could be seized or suggested how they related to specific criminal activity”). Judged under this standard, the warrant here fails the Fourth Amendment’s particularity requirement. It contained nothing to limit the government’s collection of information about each and every one of Lavabit’s users. The warrant itself, of course, was focused on only one Lavabit customer. But the warrant commanded surrender of any information “necessary to decrypt communications sent to or from the Lavabit e-mail account . . . including encryption keys and SSL keys.” App. 118-19.16 Seizure of the private key would permit the government to obtain the information about the suspect. However, it would also permit the government to obtain the same information on all of Lavabit’s customers, exposing them, in the process, to the potential of recurring government surveillance for as long as the key was valid in the future and as long as it had been valid in the past. The government’s oblique promise to only use the private key to decrypt records pertaining to the target17 is not a valid limitation on the warrant. Just as the                                                                                                                 16 “App.” refers to the appendix filed in connection with Lavabit’s opening brief. In the government’s opposition to Lavabit’s motion to quash the subpoena and invalidate the search warrant, it asserted federal laws would limit its authority to collect data on other Lavabit users. Resp. of the U.S. in Opp’n to Lavabit’s Mot. to Quash Subpoena and Mot. to [sic] for Unsealing of Sealed Ct. Rs. at 13-14, In re Application of the U.S. Authorizing the Use of a Pen Register/Trap and Trace Device on an Elec. Mail Account, No. 1:13-EC-297 (E.D. Va. July 31, 2013). 17   17 Supreme Court “would not uphold an unconstitutional statute merely because the Government promised to use it responsibly,” United States v. Stevens, 559 U.S. 460, 480 (2010),18 this Court should not uphold an unconstitutional search warrant merely because the government promised it would only view information about the target and no one else. Accordingly, the Stored Communications Act warrant was invalid under the Fourth Amendment. D. The Fourth Amendment Protects Private Keys from Disclosure Pursuant to a Grand Jury Subpoena. As an intermediate position before obtaining a search warrant for Lavabit’s private key, the government served Lavabit with a grand jury subpoena commanding it to disclose the key.19 The subpoena also fails under the Fourth                                                                                                                 18 A better limitation to avoid a general warrant would have been explicit minimization instructions in the warrant, similar to that suggested in Judge Kozinski’s concurring opinion in Comprehensive Drug Testing. See 621 F.3d at 1180 (Kosinzki, J., concurring). Those requirements are (1) the government must waive the “plain view” rule, and agree to only use evidence of the crime or crimes that led to obtaining the warrant; (2) the government must wall off the forensic experts who use the key to decrypt communications from the agents investigating the case; (3) the government must use a reasonable search protocol to designate what information the forensic experts can give to the investigating agents; and (4) the government must destroy or return non-responsive data. Id.; see also In re Search Warrant, 71 A.3d at 1170 (ex ante conditions like those in Comprehensive Drug Testing “acceptable mechanisms for ensuring the particularity of a search”). But as explained in more detail below, the government should have worked harder with Lavabit to obtain the records it requested before resorting to the extraordinary step of attempting to obtain the private key. 19 The government initially obtained a Pen Trap Order, which it contended required Lavabit to turn over its private key. AOB at 6-7, 14. Lavabit has already   18 Amendment because the subpoena power cannot grant the government authority to compel disclosure of Lavabit’s most “closely guarded secrets.” AOB at 5. This case presents an unprecedented use of the subpoena power. The government here claims that, with a mere subpoena, it can compel a disclosure that would in one fell swoop destroy Lavabit’s business and expose the communications of every single one of its users to government scrutiny. Were this true, there would be no limiting principle preventing the government from undermining the security of any website that relies on public key encryption—from Facebook to Google to Bank of America to Amazon—all with a single subpoena. However, the government cannot constitutionally exercise the subpoena power in this way. By invading the legitimate privacy interest of Lavabit and its customers and by effectively destroying Lavabit’s legitimate business model when it complied with the subpoena, the subpoena was unreasonably burdensome and violated the Fourth Amendment. 1. The Invasion of Privacy Wrought by Disclosure of a Private Key Precludes Use of a Grand Jury Subpoena. Despite the importance and breadth of the subpoena power, the Fourth Amendment necessarily limits it. See In re Subpoena Duces Tecum, 228 F.3d 341, 347 (4th Cir. 2000) (citing Hale v. Henkel, 201 U.S. 43, 76 (1906)). In fact, the                                                                                                                                                                                                                                                                                                                                                                     thoroughly discussed why this Order did not give the government the authority to compel disclosure of the key, AOB at 14-17, and amicus joins this argument.   19 Supreme Court has found that a grand jury is “without power to invade a legitimate privacy interest protected by the Fourth Amendment.” United States v. Calandra, 414 U.S. 338, 346 (1974) (emphasis added); In re Subpoena Duces Tecum, 228 F.3d at 349. Compelling the disclosure in this case would invade Lavabit’s own expectation of privacy in its key as well its users’ in their communications. See Warshak II, 631 F.3d at 288. The district court’s denial of Lavabit’s motion to quash was mistaken because it failed to take into account the serious invasion of privacy wrought by the subpoena. See Calandra, 414 U.S. at 346 (where a subpoena is unreasonable and invades a constitutionally protected expectation of privacy, “[j]udicial supervision is properly exercised in such cases to prevent the wrong before it occurs”). Here, as explained in more detail above, Lavabit itself has an expectation of privacy in the item sought for disclosure, the private key. Yet, the subpoena would not just require production of the key but would also directly enable an unlimited search of the communications of hundreds of thousands of Lavabit’s users. As a result, the subpoena served on Lavabit falls far outside of traditional practice. The Supreme Court has suggested that where a subpoena is aimed at a document such as a personal diary, “[s]pecial problems of privacy” arise. Fisher v. United States, 425 U.S. 391, 401 n. 7 (1976) (citing United States v. Bennett, 409 F.2d 888, 897 (2d Cir. 1969)). That is because a diary, much like the private key at   20 issue here, is a paradigmatic example of a private paper subject to a legitimate expectation of privacy. See Bennett, 409 F.2d at 897; Katz, 389 U.S. at 361 (Harlan J., concurring). Obtaining the key with a subpoena would thus be akin to an “unlimited search,” Bennett, 409 F.2d at 897, a use of the subpoena power that is disallowed under the Fourth Amendment. See Calandra, 414 U.S. at 346. Since Katz, the Supreme Court has considered and rejected several Fourth Amendment challenges to subpoenas. See, e.g., SEC v. Jerry T. O’Brien, Inc., 467 U.S. 735 (1984); United States v. Miller, 425 U.S. 435 (1976). However, these cases are not controlling because they turn on the crucial fact that the individual challenging the subpoena was deemed to not have a legitimate expectation of privacy in the documents at issue because they were business records held by a third party.20 See Miller, 425 U.S. at 446; O’Brien, 467 U.S. at 743; Warshak v. United States, 490 F.3d 455, 469 (6th Cir. 2007) (“Warshak I”) vacated en banc on other grounds, 532 F.3d 521 (6th Cir. 2008) (noting that the crucial inquiry in case of compelled disclosure of e-mails held by an ISP is whether “an e-mail user maintains a reasonable expectation of privacy in his e-mails vis-a-vis the party who is subject to compelled disclosure”).                                                                                                                 20 A similar distinction underlies the holding in United States v. Dionisio, 410 U.S. 1 (1973), where the Court found that a grand jury could subpoena individuals to appear and provide voice exemplars since individuals have no reasonable expectation of privacy in the sound of their voices. Dionisio 410 U.S. at 3, 14.   21 By contrast, Lavabit and its customers have a legitimate expectation in the privacy of the key itself and in the information unlocked by the key respectively. This expectation of privacy is entitled to full Fourth Amendment protection, and therefore, the key cannot be obtained with a mere subpoena. 2. The Subpoena Was Unreasonable Because it was Arbitrarily Excessive and Compliance Was Oppressive. In addition, the subpoena for Lavabit’s private key violated the Fourth Amendment because of its burdensome (and in fact fatal) effect on Lavabit’s email service. The Fourth Amendment requires a subpoena to be “reasonable” and forbids subpoenas that are overbroad or “arbitrarily excessive.” In re Subpoena Duces Tecum, 228 F.3d at 347, 349 (quoting United States v. Morton Salt Co., 338 U.S. 632, 653 (1950)); see also Oklahoma Press Publ’g Co. v. Walling, 327 U.S. 186, 208 (1946) (“The gist of the protection is in the requirement, expressed in terms, that the disclosure sought shall not be unreasonable.”). A subpoena is generally “reasonable” if it is “sufficiently limited in scope, relevant in purpose, and specific in directive so that compliance will not be unreasonably burdensome.” In re Subpoena Duces Tecum, 228 F.3d at 347 (quoting See v. City of Seattle, 387 U.S.   22 541, 544 (1967)) (internal quotations omitted).21 “[W]hat is reasonable depends on context.” United States v. R. Enters., Inc., 498 U.S. 292, 299 (1991). The inquiry “cannot be reduced to a formula.” Walling, 327 U.S. at 209. The district court’s refusal to quash the subpoena at issue in this case was in error because the subpoena was arbitrarily excessive and unreasonably burdensome. In a typical case, a subpoena might be judged arbitrarily excessive because it is “far too sweeping in its terms” or “not suitably specific and properly limited in its scope in respect to [its] breadth.” In re Subpoena Duces Tecum, 228 F.3d at 349 (internal quotations omitted). For example, a request for thousands of documents with which it would be practically impossible to comply could be considered unreasonable. Id. at 350. However, because this inquiry is contextspecific, even a narrow subpoena request can be unreasonable if it has an extreme effect on the recipient. Hence, a subpoena aimed at a company can be arbitrarily excessive when it “put[s] a stop to the business of that company.” Hale, 201 U.S. at 77; FCC v. Cohn, 154 F. Supp. 899, 912-13 (S.D.N.Y. 1957) (finding that an administrative subpoena that required disclosure of trade secrets in a “highly competitive industry” would be fatal to challenger’s business and therefore “unreasonable and oppressive”).                                                                                                                 21 Similarly, Federal Rule of Criminal Procedure 17(c)(2) allows a court to “quash or modify the subpoena if compliance would be unreasonable or oppressive.” Fed. R. Crim. P. 17(c)(2).   23 Here, as Lavabit has explained, the subpoena had a fatal effect on Lavabit’s business. AOB at 28-29. Its business model was so predicated on protecting its client’s confidences that, by being forced to disclose its private key, it was also forced to shut its business down. This was not a choice undertaken lightly. Given the Public Key Infrastructure system described above, disclosure of Lavabit’s private key was likely to be the death of its business even if Lavabit decided to keep operating. As explained above, once a private key is disclosed to a third party, it is industry standard to revoke the site’s security certificate. And that is exactly what happened to Lavabit,22 effectively shutting down the service. Faced with an oppressive, unreasonable subpoena for its private key, Lavabit presented the government with a less burdensome alternative by offering to narrow the information to be disclosed pursuant to the subpoena to only that pertaining to the target. Cf. In re Subpoena Duces Tecum, 228 F.3d at 349 (“[B]efore a court will conclude that a subpoena is ‘arbitrarily excessive,’ it may expect the person served ‘to have made reasonable efforts . . . to obtain reasonable conditions’ from the government.” (quoting Morton Salt, 338 U.S. at 653)). Lavabit also offered to provide this on a continuing basis, either daily or at the end of the authorized surveillance period. This would have given the government the records it sought                                                                                                                 22 See Kashmir Hill, GoDaddy Pulls Lavabit's Security Creds Because The FBI Got Ahold Of Its Encryption Keys, Forbes (Oct. 9, 2013), http://www.forbes.com/sites/kashmirhill/2013/10/09/godaddy-pulls-lavabitssecurity-creds-because-the-government-got-ahold-of-its-encryption-keys/.   24 on the specific target of the investigation without compromising the security of all of its users. See AOB at 8; App. 83. It also would have preserved Lavabit’s business model. It would have required Lavabit to spend time and money reconfiguring its computer architecture, but Lavabit offered to do this anyway, provided the government reimbursed the company for its costs. However, this offer was not good enough for the government, which wanted real-time access to the information, did not think Lavabit’s proposed expenses were reasonable, and most crucially, was concerned that the proposal would require it to “trust” Lavabit to turn over information. App. at 83. But none of these are valid grounds for rejecting Lavabit’s “reasonable efforts” to obtain lessintrusive subpoena conditions before resorting to the constitutionally unreasonable step of requiring it to turn over the private key. See In re Subpoena Duces Tecum, 228 F.3d at 351. The government’s desire for information Lavabit could not provide was not enough to justify a subpoena for the private key. Nor does the government’s contention that Lavabit’s claimed expenses were unreasonable have any bearing on the constitutional analysis of the subpoena.23 And, of course, the government’s                                                                                                                 23 In any case, the government could have negotiated the price of compliance with Lavabit, as it does with other providers who it must reimburse for its technical assistance in aiding government investigations. See, e.g., 18 U.S.C. § 2706 (government must reimburse provider who discloses electronic communication records); 18 U.S.C. § 3124(c) (government must reimburse provider for technical   25 need to “trust” that the recipient of a subpoena is complying is inherent in all subpoenas, particularly those requiring the production of paper records. Above all, the government’s unwillingness to consider less burdensome alternatives to the subpoena and the effect it had on Lavabit’s e-mail service shows that the subpoena was an arbitrarily excessive means to get at information on a single user. The use of such a “nuclear option” cannot possibly be considered reasonable for the purposes of the Fourth Amendment. CONCLUSION Disclosure of a private key threatens the fundamental premise of HTTPS and the security of the Internet. Ultimately it is up to the Courts to impose strict safeguards to preserve the constitutional expectation of privacy in Internet communications, determine that less intrusive alternatives are attempted first and ensure that compliance with a law enforcement request does not mean the death of a business. Because the government’s efforts to obtain Lavabit’s private key violated the Fourth Amendment, this Court should reverse the lower court’s decision finding Lavabit in contempt of court.                                                                                                                                                                                                                                                                                                                                                                     assistance in installing a pen register or trap and trace device); 47 U.S.C. § 1008(a) (authorizing reimbursement of “reasonable costs” spent by providers to modify their equipment to be capable of wiretapping); see also Verizon, AT&T get most bucks from feds for wiretaps, CBS News (July 11, 2013) http://www.cbsnews.com/8301-201_162-57593273/ (noting different prices different service providers charge the government for wiretaps).   26 Dated: October 24, 2013 Respectfully submitted, /s/ Kurt Opsahl Kurt Opsahl Jennifer Lynch Hanni Fakhoury ELECTRONIC FRONTIER FOUNDATION 815 Eddy Street San Francisco, CA 94109 Counsel for Amicus Curiae ELECTRONIC FRONTIER FOUNDATION   27   CERTIFICATE OF COMPLIANCE WITH TYPE-VOLUME LIMITATION,   TYPEFACE REQUIREMENTS AND TYPE STYLE REQUIREMENTS   PURSUANT TO FED. R. APP. P. 32(a)(7)(C)   Pursuant to Fed. R. App. P. 32(a)(7)(C), I certify as follows: 1. This Brief of Amicus Curiae In Support Of Party-of-Interest- Appellant complies with the type-volume limitation of Fed. R. App. P. 32(a)(7)(B) because this brief contains 6,573 words, excluding the parts of the brief exempted by Fed. R. App. P. 32(a)(7)(B)(iii); and 2. This brief complies with the typeface requirements of Fed. R. App. P. 32(a)(5) and the type style requirements of Fed. R. App. P. 32(a)(6) because this brief has been prepared in a proportionally spaced typeface using Microsoft Word 2011, the word processing system used to prepare the brief, in 14 point font in Times New Roman font. Dated: October 24, 2013 /s/ Kurt Opsahl Kurt Opsahl Counsel for Amicus Curiae ELECTRONIC FRONTIER FOUNDATION   28 CERTIFICATE OF SERVICE I hereby certify that I electronically filed the foregoing with the Clerk of the Court for the United States Court of Appeals for the Fourth Circuit by using the appellate CM/ECF system on October 24, 2013. I certify that all participants in the case are registered CM/ECF users and that service will be accomplished by the appellate CM/ECF system. Dated: October 24, 2013   /s/ Kurt Opsahl Kurt Opsahl Counsel for Amicus Curiae ELECTRONIC FRONTIER FOUNDATION     29

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?