{"id":1261,"date":"2012-11-30T01:44:47","date_gmt":"2012-11-30T01:44:47","guid":{"rendered":"http:\/\/ncjolt.org\/?p=1261"},"modified":"2020-06-04T20:54:04","modified_gmt":"2020-06-04T20:54:04","slug":"locating-unauthorized-internet-users-without-a-warrant","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/locating-unauthorized-internet-users-without-a-warrant\/","title":{"rendered":"Locating Unauthorized Internet Users Without a Warrant"},"content":{"rendered":"<p>Wednesday, November 28, 2012, by Cara Richards<br \/>\nA federal court in\u00a0Pittsburgh\u00a0has ruled that the government can track internet users to their location without a search <a href=\"http:\/\/blogs.wsj.com\/law\/2012\/11\/21\/court-police-can-locate-wireless-internet-moochers-without-a-warrant\/\">warrant<\/a>. The court reasoned, in <em>United States v. Stanley<\/em>, that internet\u00a0users have no\u00a0reasonable expectation of privacy in their IP address nor can they expect privacy protection for the information they provide to their\u00a0Internet\u00a0service <a href=\"http:\/\/blogs.wsj.com\/law\/2012\/11\/21\/court-police-can-locate-wireless-internet-moochers-without-a-warrant\/\">providers<\/a>. Judge Joy Conti of the Western District of Pennsylvania found that the defendant did not have a reasonable expectation of privacy because in connecting to the unauthorized wireless network he was voluntarily sending a signal to a third <a href=\"http:\/\/jolt.law.harvard.edu\/digest\/\">party<\/a>.<br \/>\nAfter tracking a child pornography suspect to an IP address of a Comcast subscriber, Pennsylvania State Police discovered that the suspect was actually a neighbor mooching off of an unsecured wireless <a href=\"http:\/\/jolt.law.harvard.edu\/digest\/\">network<\/a> in a home across the street.\u00a0 After receiving permission from the actual Comcast internet subscriber, police used software, called Moocherhunter, and an antenna to identify the apartment containing the suspect\u2019s computer and then obtained a search <a href=\"http:\/\/blogs.wsj.com\/law\/2012\/11\/21\/court-police-can-locate-wireless-internet-moochers-without-a-warrant\/\">warrant<\/a> to search the apartment. The Moocherhunter program allowed the police to measure the distance between the wireless router and the devices connected to <a href=\"http:\/\/blogs.wsj.com\/law\/2012\/11\/21\/court-police-can-locate-wireless-internet-moochers-without-a-warrant\/\">it<\/a>, leading the police to the suspect. The suspect was then indicted in November 2011 for possession of child <a href=\"http:\/\/blogs.wsj.com\/law\/2012\/11\/21\/court-police-can-locate-wireless-internet-moochers-without-a-warrant\/\">pornography<\/a>. The defendant moved to suppress the evidence against him on the grounds that the police efforts constituted a warrantless <a href=\"http:\/\/blogs.wsj.com\/law\/2012\/11\/21\/court-police-can-locate-wireless-internet-moochers-without-a-warrant\/\">search<\/a>. The defendant argued that Moocherhunter is a technology that is not in general public use and was used to discover that a computer was located inside of his home, constituting a violation of his Fourth Amendment <a href=\"http:\/\/www.volokh.com\/2012\/11\/19\/united-states-v-stanley-and-the-fourth-amendment-implications-of-using-moocherhunter-to-locate-the-user-of-an-unsecured-wireless-network\/\">rights<\/a>.<br \/>\nIn deciding the case the district court addressed the Fourth Amendment question: Does tracing the location of a user of an unsecured wireless network constitute a Fourth Amendment <a href=\"http:\/\/www.volokh.com\/2012\/11\/19\/united-states-v-stanley-and-the-fourth-amendment-implications-of-using-moocherhunter-to-locate-the-user-of-an-unsecured-wireless-network\/\">search<\/a>? The court was the first to tackle this <a href=\"http:\/\/blogs.wsj.com\/law\/2012\/11\/21\/court-police-can-locate-wireless-internet-moochers-without-a-warrant\/\">issue<\/a>. In the opinion, Judge Conti cited a Supreme Court case that held that the police did not need a search warrant for a device that recorded the telephone numbers dialed by a criminal suspect because the suspect had no expectation of privacy in the numbers he dialed. He voluntarily provided the information to a third party, the telephone <a href=\"http:\/\/blogs.wsj.com\/law\/2012\/11\/21\/court-police-can-locate-wireless-internet-moochers-without-a-warrant\/\">company<\/a>. Professor Kerr, a law professor at George Washington University, suggested that a case involving a wireless internet user may be <a href=\"http:\/\/blogs.wsj.com\/law\/2012\/11\/21\/court-police-can-locate-wireless-internet-moochers-without-a-warrant\/\">different<\/a> though because wireless internet users may not know that they are conveying information to third parties. Nevertheless, Judge Conti found that the wireless internet user did not have a reasonable expectation of privacy because in connecting to the unauthorized wireless network he was voluntarily sending a signal to a third <a href=\"http:\/\/jolt.law.harvard.edu\/digest\/\">party<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wednesday, November 28, 2012, by Cara Richards A federal court in\u00a0Pittsburgh\u00a0has ruled that the government can track internet users to their location without a search warrant. The court reasoned, in United States v. Stanley, that internet\u00a0users have no\u00a0reasonable expectation of privacy in their IP address nor can they expect privacy protection for the information they <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/locating-unauthorized-internet-users-without-a-warrant\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/1261"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=1261"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/1261\/revisions"}],"predecessor-version":[{"id":7649,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/1261\/revisions\/7649"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=1261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=1261"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=1261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}