Wednesday, February 17, 2010

Wi-fi Privacy, Dogs and Apartments

This is a follow-up to my last post, which, of course, was a follow-up to the earlier post I did on U.S. v. Ahrndt. (And I anticipate that this will be my last wi-fi privacy post for a bit.)


In this post, I’m going to extrapolate a bit on the 4th Amendment. In so doing, I’ll probably refer back to the facts and holding in U.S. v. Ahrndt; since I won’t repeat them here, you should check that post (“Wi-fi Privacy?) for those details. Amendment principles I talked about in that last post.


The Ahrndt court held that Ahrndt didn’t have a 4th Amendment reasonable expectation of privacy in files available for sharing via an unsecured wireless network. The Ahrndt judge said there definitely is a “lower [4th Amendment] expectation of privacy in unsecured wireless networks”, but also factored the file-sharing aspect of the case into his holding that it wasn’t a search for a law enforcement officer to check out some of those files, using Ahrndt’s unsecured wireless network.


In my last post, I extrapolated a bit from the Ahrndt case, explaining that, IMHO, there’s a good argument that if you don’t secure your wireless network any signals that leak out of your residence into the area surrounding it aren’t protected by the 4th Amendment. As I noted in my last post, I can see an argument that the signals have moved outside the 4th Amendment bubble of privacy that encompasses your home (and here, I’m assuming a free-standing house) and into “open fields”, where they lose 4th Amendment protection.


As I explained in my last post, the open fields argument is based on the principle the Supreme Court applies when someone argues that police trespassing on land around their home violated a 4th Amendment expectation of privacy. Under that principle – the open fields doctrine – a free-standing house is divided into two zones for 4th Amendment purposes: the home itself and the bubble of space immediately around it (known as the curtilage) are protected by the 4th Amendment’s guarantees of privacy; the area outside the home and outside the curtilage is considered "open fields" and is therefore not protected. The area outside the curtilage is considered open fields even if you live in a suburb where your yard isn’t exactly expansive, i.e., isn’t the equivalent of the ranches at issue in the two Supreme Court cases I talked about in my last post.


As far as I’m concerned, the open fields-curtilage analysis doesn’t make sense anywhere, let alone when it comes to suburban homes. There is, though, another area where it becomes even more problematic: apartments. To illustrate what I mean, I’m going to use a case involving a drug dog and marijuana.


The case is Fitzgerald v. State, 384 Md. 484, 864 A.2d 1009 (Maryland Supreme Court 2004), and here is how it arose:

In February 2002, an anonymous source informed Detective Leeza Grim of the Howard County Police Department . . . that [Matthew] Fitzgerald and his girlfriend Allison Mancini lived in an apartment at 3131 Normandy Woods Drive in Ellicott City. . . . The source stated that Fitzgerald and Mancini drove a white pick-up truck and sold a high quality grade marijuana called `Kind Bud.’ Grim's subsequent investigation confirmed that the couple lived in the building and the car was registered to Alicia Joy Mancini, apparently Allison’s relative. Grim also learned Fitzgerald had a juvenile record of 1998 arrests for distribution of marijuana near a school and for three first-degree burglaries. . . .

Grim met with Officer Larry Brian of the Police Department's K-9 unit on March 19. Brian then visited Fitzgerald and Mancini's apartment building accompanied by Alex, Brian's certified drug detecting dog. . . . Brian and Alex entered the building through unlocked glass doors leading to a vestibule with a stairwell and mailboxes. Brian led Alex to scan apartment doors A, B, C, and D. Alex `alerted’ at apartment A, indicating the presence of narcotics. Apartment A was Fitzgerald and Mancini's apartment. Sniffs of the other three apartments did not result in alerts. Alex repeated the sniffs with the identical outcome. Finally, on March 20, the anonymous source contacted Grim again and asserted that Fitzgerald and Mancini continued to sell `Kind Bud’ marijuana

The next day, District Court Judge Ellinghaus-Jones issued a search warrant for Fitzgerald and Mancini's apartment based on Grim's affidavit. The warrant was executed on April 2, 2002. Grim seized substantial amounts of marijuana and other evidence of marijuana use and distribution. Fitzgerald and Mancini were arrested and charged with possession of marijuana with intent to distribute and related offenses.

Fitzgerald v. State, supra. (If you’re wondering what Alex did to alert, Officer Brian said “he sits there in that area, and what . . . he'll sit and he looks at me and that is his indication to me that he smells the presence of a narcotic.’” Fitzgerald v. State, supra.)

Fitzgerald moved to suppress the evidence obtained as a result of the execution of the warrant, claiming “a canine sniff of an apartment’s exterior is a search under the 4th Amendment.” Fitzgerald v. State, supra. This argument has two aspects: whether the area outside an apartment door is curtilage; and whether a dog triggers the Supreme Court’s decision in Kyllo v. U.S., 533 U.S. 27 (2001). We’ll start with the curtilage issue and then get to Kyllo.


A few courts have indicated that an officer’s having a drug detection dog like Alex sniff the immediate exterior of a home, e.g., a front door, is a 4th Amendment search because the dog and the officer are within the curtilage of the home. State v. Rabb, 920 So.2d 1175 (Florida Court of Appeals 2006). Most courts, though, have reached the opposite conclusion as long as the officer and the dog were standing on a part of the curtilage – such as the area outside a front door – that is open to use by guests, delivery people and even total strangers. State v. Jardines, 9 So.3d 1 (Florida Court of Appeals 2008).


Courts distinguish an officer's presence (with or without a dog) on a public area of the curtilage from cases in which courts have held that an officer’s walking onto a non-public area of the curtilage (e.g., the side of the home) and peering through a window to see what’s inside is a 4th Amendment search because the officer is within the bubble of 4th Amendment protection that surrounds the home. State v. Carter, 569 N.W.2d 169 (Minnesota Supreme Court 1997).


Most courts have held that an officer’s walking a drug dog down an apartment hallway so the dog can detect odors emanating from the apartment doors isn’t a 4th Amendment search, because the officer isn’t on the curtilage of a home. Some courts have analogized apartment hallways to public sidewalks; the Fitzgerald court held it wasn’t a search to have Alex sniff Fitzgerald’s apartment door because Alex and Brian were in “the apartment building’s common area and hallways were accessible to the public through . . . unlocked glass doors.” Fitzgerald v. State, supra.


I know signals from unsecured wireless networks leak outside houses, so I’m going to assume they also leak outside apartments. If those assumptions are valid, they inferentially indicate that a law enforcement officer walking down the hallway of an apartment carrying a laptop can detect unsecured wireless signals seeping into the hallway, just as the odor of marijuana leaked from Fitzgerald’s apartment into his hallway. If an officer were to do this, would that then constitute a 4th Amendment search or would the result be the same as in the dog sniff cases?


This is where Kyllo comes in: As I explained in my post on the case, in Kyllo the Supreme Court held that it is a 4th Amendment search for an officer, even standing outside a home’s curtilage, to use “technology not in general public use” to detect information from inside the home that he could not otherwise obtain except by actually entering the home. What happens if we factor Kyllo into the scenario I outlined above?


Lots of defendants have argued that the use of drug detection dogs like Alex is a search under Kyllo, but so far they’ve lost. One issue that arises there is whether a drug dog is “technology”. Courts seem to have consistently held that a drug dog isn't "technology," perhaps because a dog isn't mechanical or electrical technology. (I say a dog can be technology because technology can be biological as well as mechanical, but I haven’t seen that argument made yet.) The "isn't-technology" argument won’t arise here because the laptop the officer’s using (I’m using a laptop for a reason; it could be any appropriate technology) is definitely technology.


No one’s sure what the Kyllo Court meant by “not in general public use,” but I think it’s pretty clear that a laptop, even one capable of detecting wireless signals, is in general public use. Not everyone has one, but lots and lots of people do, and all that's needed to acquire one is to buy it (or maybe borrow it). If a laptop is in general public use, I don’t see why an officer couldn’t use a laptop (or any other technology that’s in general public usage) to detect wireless signals leaking into an apartment hallway without violating a 4th Amendment expectation of privacy (at least, under the law as it now stands). If apartment hallways are open to the public, then, according to some courts, what the officer is doing is indistinguishable from his carrying the laptop down a public sidewalk (or driving along a street with it in his car).


If that works, then the laptop can be used in a fashion analogous to the way officers use drug dogs: In the Fitzgerald case, the officer used the dog to get information to establish probable cause for a warrant to search the apartment. I assume the laptop’s detecting wireless signals (and, perhaps, files available for sharing) could be used in much the same way: If using the laptop (like using a drug dog) isn’t a 4th Amendment search, the officer can walk down the hallway with the laptop (or whatever technology) without getting a warrant or having probable cause or any level of 4th Amendment suspicion. The information, if any, obtained by the walk could then be used to get a search warrant, just as it was in the Fitzgerald case.


I'm not arguing that this should be the outcome under the 4th Amendment. I'm just speculating as to what happens if we extrapolate the result in cases like Fitzgerald to leaking wi-fi signals.

5 comments:

Loki said...

I think I may not have gotten across my objection to what the officer (and the woman) was doing. Any private citizen (which has generally included law enforcement officers) has the right to monitor unencrypted wireless broadcasts, with some restrictions (ECPA 1986).
The problem comes not from monitoring the unencrypted wireless signal (and any data already flowing over it), but from taking it a step further, and sending data *to* the access point, which then interacts not only with the computing device inside the access point, but also with the computer(s) attached to the access point, which may be in the house, or may be offsite - an expert could have a hard time telling, much less a normal law enforcement officer.

If all someone did was to monitor (or even log) the wireless signal they can receive from the street ("open fields") then no law is violated, and I wouldn't even argue that it is a 4th amendment violation. But the point at which they send a signal back *into* the house/apartment/residence/whatever,they have entered your home, and violated your privacy - especially under Kyllo, and even if it was not already an illegal action with the state.

In addition, reading the opinion itself, I find the Judge's understanding of the technology involved to be profoundly troubling - there are many incorrect statements and assumptions in the opinion that scream for attention. a few:
"Unlike cordless phone signals,
however, a wireless router signal can be received by an unauthorized user even though that user
will not usually encounter personal or confidential information. (Pg 9) - manifestly untrue, because 802.11a/b/g wireless is a hub like device - anything that is sent to any wireless device is sent to all wireless devices. The wireless devices that the data is not meant for normally ignore the that data, but they are still receive it, and any somewhat knowledgeable user can see the data.
"Information transmitted to and from the internet is invisible to the other user of a Wi-Fi signal." (pg 9) - same as the above point, this is manifestly untrue.
"In addition, most joyriders assume that using another person's unsecured wireless connection is entirely legal" (pg 9) - true or not (and with the number of news articles talking about people being arrest for leeching internet, I would doubt it is true), it is completely illegal in the State of Oregon.

The ECPA argument though was very well handled by King, and I'm surprised the defense attorney even brought it up, considering how permissive the ECPA is about unencrypted communications.


To conclude, I guess my primary object is still to the remote access of a computer that was located within his home, which is something i think the Judge completely missed, and was perhaps not addressed well enough by the defense attorney. iTunes does not randomly broadcast it's shared library content - it has to be asked to do so by a remote user. Once you get into the underlying protocol it gets even more obvious that at the point the officer (or the woman) associated her computer with the access point, both an illegal act *and* an illegal search had occurred.

(sorry for the long post - as you can tell, the misunderstanding of technology by even supposed experts is something I find to be very objectionable)

Susan Brenner said...

Not a problem, long comments are good.

I basically took what you said and went off on a tangent, so you're in no way responsible for what resulted.

As to the ECPA's relevance, I ignored it because it's a statute, and one that exceeds 4th Amendment requirements in many respects. It's also a statute I think is desperately out of date.

Anonymous said...

I am to wondering why this wasn't considered computer trespassing. If I did this, accessing the wifi router, asking the router for an IP address so I could talk to the other computers associated with the wifi router, and the owner of the wifi router noticed they would be able to report me to the police.

As mentioned above, talking to another computer connected to the same wifi router causes resources to be allocated. Resources that an outside person has no rights to use.

Even in browsing the shares made public causes computer resources to be allocated for the unauthorized person. I think this is a crime as well.

Anonymous said...

In Texas it is against the law for the police to use evidence against you that was illegally obtained or obtained in violation of the law - this specifically includes evidence that was obtained by 3rd person independant of the police and acting all on their own.

Leeching off of someone's internet is a crime. http://arstechnica.com/tech-policy/news/2007/05/michigan-man-arrested-for-using-cafes-free-wifi-from-his-car.ars

To quote the article: This is not the first time someone has been arrested for piggybacking on a WiFi connection. In 2005, a Florida man was arrested and hit with a third-degree felony for surfing an open WiFi network from his SUV. Similarly, an Illinois man was arrested in 2006 for, again, using an unsecured WiFi network from his car. He pleaded guilty to the charges and was given one year's court supervision and a $250 fine. A Washington man was also arrested in 2006 for parking outside of a coffee shop and using the open WiFi connection without purchasing anything. And just earlier this year, an Alaska man was arrested for using the WiFi network from the public library after hours to play games from—you guessed it—his car in the parking lot.

Sujit said...

Thank you sir for this post and case studies but I would like to know that why the man, who has installed unsecured wi-fi connection will not be liable for any crime, which was done by using his unsecured wi-fi. I like your blog as I also write blog on cyber crime www.urproblemmysolution.blogspot.com