Bette Midler's mega hit, and 1991 Grammy "Song of the Year" told of a God that saw all "from a distance."1 Arguably, the recent revelations about the NSA's metadata surveillance program2 may indicate that the federal government's surveillance radius is a smaller, but, perhaps, terrestrial attempt to meet a comparable level of scrutiny? The program has attracted widespread criticism, perhaps because its deployment was done without reference to "individualized suspicion."3 Nevertheless, the criminal use of the Internet is ever-expanding with an increasing stealth capacity, so it is no wonder that it is a commonly held belief that a robust, technologically advanced, and ready law enforcement capability is required to successfully counter future challenges by criminal organizations as well as sophisticated lone wolves. Law enforcement's capabilities must, of course, be balanced against constitutional parameters of the right to privacy.4 Another chapter in this continually evolving balancing act is the judiciary's response to law enforcement's use of Internet surveillance, and the applicable standard of individualized suspicion, which will be discussed in this article.
IP Adresses
An IP (Internet Protocol) address is a number assigned to each device that is connected to the Internet. Although most devices do not have their own, permanent ("static") addresses, in general an IP address for a device connected to the Internet is unique in the sense that no two devices have the same IP address at the same time.5 As one court has stated: "[T]here undoubtedly exists the possibility of mischief and mistake with IP addresses…. [P]roxy servers can be used to mask IP addresses, and [ ]knowledgeable users can 'spoof' the IP addresses of others."6 Moreover, wireless networks may be secured or unsecured. An unsecured network permits any user to connect to it through various access points and those users would then be operating under a veil from the particular IP address of the wireless network, making it more difficult to identify the true user and determine his or her Internet surfing history.7 This is but the tip of the challenges facing law enforcement in identifying criminal use of the Internet. Specific data about a suspect's Internet surfing has been critical evidence in various prosecutions across the country. Accordingly, issues concerning the specific manner and type of judicial authorization required for law enforcement to monitor a suspect's IP usage, including email addresses have been resonating nationwide.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.
For questions call 1-877-256-2472 or contact us at [email protected]