13.07.2015 Views

Vol 7 No 1 - Roger Williams University School of Law

Vol 7 No 1 - Roger Williams University School of Law

Vol 7 No 1 - Roger Williams University School of Law

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Amendment protections.50Substantial evidence <strong>of</strong> this protective approach makes itplausible that Internet users have an actual expectation <strong>of</strong> privacyin URL information being intercepted by Carnivore. In fact, manyprivacy groups are concerned about the potential <strong>of</strong> Carnivore toreceive and record such information.51 For example, ElectronicPrivacy Information Center (EPIC) filed a Freedom <strong>of</strong> Informationlawsuit against the FBI in July 2000, requesting release <strong>of</strong>Carnivore’s capacity to view such information.52 The organizationwas successful in obtaining over 2,000 Carnivore relateddocuments from the Justice Department.53 However, finding theprovided information inconclusive, EPIC filed a motion in theDistrict <strong>of</strong> Columbia in August, 2001 requesting the deposition <strong>of</strong>several FBI <strong>of</strong>ficials in order to acquire further informationregarding the device’s ability to retrieve such data.54 Also, privates<strong>of</strong>tware companies, in response at least in part to Carnivore’sability to intercept URL information, have developed URLblocking s<strong>of</strong>tware to prevent such access.55 Similarly, many suchcompanies have developed, or are in the process <strong>of</strong> developing lessinvasive surveillance devices, emphasizing a less intrusiveprocedure and enhancing privacy protections.56Alternatively, it would seem that a strong argument couldreasonably be made in favor <strong>of</strong> a traditional application <strong>of</strong> theCourt’s reasoning in Smith and Miller with respect to Internetaddressing information. Although, very few courts haveaddressed the applicability <strong>of</strong> such reasoning to the Internetforum, the courts seem to agree that a traditional approach isappropriate. Proponents <strong>of</strong> this position state that, like telephone50. See Randolph S. Sergent, A Fourth Amendment Model for Computer Networksand Data Privacy, 81 Va. L. Rev. 1181, 1201 (1995) (discussing how individuals do notassume the risk that the content <strong>of</strong> their telephone conversations will be disclosed by athird party (e.g. telephone company)).51. See Michael J. Miller, The Ever-Expanding Browser, PC Magazine, Oct. 3,2000, at 7.52. See Maria Mosquera, Privacy Group Wants Speedier Carnivore Disclosure,Techweb News, Aug. 18, 2000.53. See Epic Wants A Closer Look At ‘Carnivore’, Nat’l J. Tech. Daily, Aug. 13,2001.54. See id.55. See Accelerated Networks Introduces Secure Multiservice Broadband Access;DSLcon, Bus. Wire, Sept. 19, 2000.56. See Ann Harrison, Don’t Like Carnivore? How About Altivore? Open SourceCode Version <strong>of</strong> E Mail Sniffer in the Works, Computerworld, Sept. 25, 2000, at 12.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!