|
State Wiretap Laws: The Title III Gorilla in Correctional Computer Monitoring? |
By Art Bowker, Cybercrime Specialist |
Published: 01/31/2011 |
Community corrections agencies are increasing being asked to manage cyber-risk. Some prohibit all computer or Internet use. Others conduct periodic computer searches. Many are relying on computer monitoring software to do the lion’s share of the risk management. So how does wiretap laws pertain to community corrections computer monitoring? Lets see! Title III in this article collectively refers to wiretap laws at the federal and state level. Kerr writes this in regards to the federal statute: “The basic structure of the Wiretap Act is surprising simple. The statue envisions that an individual is exchanging communication with another person or machine. The state makes it a crime for someone who is not a party to the communication to use an interrupting device to intentionally access the private communication in “real time.” (pg. 451) How does this relate to computer monitoring then? In O’Brien v. O’Brien, Case No. 5D03-3484, (2005) a Florida appellate court ruled that computer monitoring by a spouse was governed by the state’s wiretap statute, which was patterned after the federal law (18 U.S.C. § 2501). In this case the spouse used software to capture chats, instant messages, and web browsing by her husband, without his knowledge. The software eventually captured the husband’s communication with his girlfriend, who also was unaware of the monitoring. The appellate court ruled in part that …. “spy-ware installed by the wife intercepted the electronic communication contemporaneously with transmission, copied it, and routed the copy to a file in the computer’s hard drive, the electronic communications were intercepted in violation of the Florida Act.” Some community corrections officers are deploying similar monitoring software, particularly on sex offenders’ computers. The installation is usually through a supervision condition authority. Additionally, the offender and all household members who may use the computer are always fully aware that the monitoring software is present. Progressive agencies also place electronic consent banners at the start up of the operating system and place hard copy warning stickers letting all who may use the system know they have no expectation of privacy if they use the computer. Federal law provides a minimum level of privacy protection with the wiretap statute. Some states have greater protections. The federal Title III law and states with similar laws provide for some exceptions to a wire tap. Several exceptions are germane here. The first is commonly known as consent. There are two kinds of consent. The first is one party consent, which is contained in the federal law and 38 state statutes. Under one party consent if one person knows about the inception (monitoring) and agrees, the monitoring can occur. In a correctional setting, the offender knows as well as all who use the system, that the computer is being monitored. This is established by the use of the banner and/or hard copy notices. Additionally under federal law there is also an exception for a person acting under “color of law” to intercept a wire, oral, or electronic communication with consent of one party to the communication. The other type of consent is called two party. This means that both parties to the communication have to consent to the monitoring. There are twelve states that have two party consent (CA, CN, FL, IL, MD, MA, MI, MO, NV, NH, PA, and WA, Reporters Committee for Free Press). Some two party states, such as Florida, allow an exception to law enforcement with one party consent, when…. “the purpose of such interception is to obtain evidence of a criminal act.” (FL 934.03(1)(c)). The purpose of correctional computer monitoring is to insure compliance not necessarily to obtain evidence of a criminal act. For instance, monitoring may used to insure a sex offender is not viewing adult pornography, which would be a treatment issue and not a criminal act. Two party consent can therefore be an important consideration if computer monitoring is occurring. The offender and their household’s consent means little when they communicate via the computer with someone who is not aware the monitoring is taking place. The third party person they may communicate with can’t see the warning banner or the stickers. Lets see how this plays out.
Some monitoring software alleviates this problem by limiting monitoring to only the offender’s usage. One company actually uses a biometric device to ensure only the offender is being monitored. But the offender’s communications are still obviously being monitored. It is hard to imagine why a sex offender would be allowed in a chat room, but use of e-mail is another matter. The offender’s exchange of e-mail with someone else could also create the same consent issues to monitoring in a two party state. Now the second exception to wire taps is the issuance of a court order. Under federal law there are specific time constraints and judicial oversight of the entire process. Additionally, there are specific requirements to get a wiretap order issued. They include a finding of probable cause that the following exists: ” a) there is probable cause that an individual is committing or about to commit a specific crime; there is the belief that particular communications concerning that offense will be obtained through such interception; and c) normal investigative procedures have been tried and have failed or reasonably appear to be unlikely to succeed if tried or to be too dangerous.” Even a supervision condition for monitoring software, ordered by a Court is hard to imagine being the same. There is no probable cause to believe the offender is committing or about to commit a new crime. Additionally, a periodic computer search can be used to find the evidence so a normal investigative procedure could be used. Finally, computer monitoring on an offender can literally be on the entire term of supervision, which is often years in duration as opposed to days or months common in wiretap orders. It is possible that monitoring software might follow what has occurred with probation searches. Specifically, in United States v. Knights, 122 S.Ct.587 (2002), the Supreme Court “…held warrant-less search of a probationer’s apartment, supported by reasonable suspicion and authorized by a condition of his probation, was reasonable within the meaning of the Fourth Amendment.” Does this mean an appellate Court could carve out some kind of exception for computer monitoring for probation/paroles because they have an reduced expectation of privacy? What about the order’s impact on others inside and outside of the offender’s home who may be involved in communications with the offender’s monitored computer? By the way, what is the down side of breaking a wiretap law? How does possible criminal and/or civil penalties grab you? Clearly some thought has to go into computer monitoring in states with two party consent issues. At a minimum agency’s should do the following: Know thoroughly what computer monitoring they are using can do and can not do. Some important considerations are:
References Electronic Surveillance Laws, Accessed fromhttp://www.ncsl.org/default.aspx?tabid=13492 Florida State 934.03: Interception and disclosure of wire, oral, or electronic communications prohibited. Accessed from The 2010 Florida Statutes Kerr, Orin (2006) Computer Crime Law, Thompson, St. Paul O’Brien v. O’Brien, Case No. 5D03-3484, (2005). Accessed from Opinions 5D03-3484.pdf Reporters Committee for Free Press “Can We Tape?” Accessed from http://www.rcfp.org/taping/ United States v. Knights, 122 S.Ct.587 (2002) 18 U.S.C. Chapter 119, Wire and Electronic Communications Interception and Interception of Oral Communications. Accessed from http://www.justice.gov Visit "The Three C's (Computers, Crime & Corrections)" blog by Art Bowker Other articles by Bowker: |
Comments:
Login to let us know what you think
MARKETPLACE search vendors | advanced search
IN CASE YOU MISSED IT
|
Online Random Chat With Strangers for FREE! Anonymous, Safe and Without Registration. Chat with cool people all over the world. Talk with strangers around the world. free online chat rooms
techservicesc.com