By Jake Edge
November 7, 2007
An interesting look at the arguments
made by the US Government in a email privacy case serve as yet another
reminder that email is not private. For both technical and, now,
potentially legal reasons, email that you send is not protected from prying
eyes. Even for jurisdictions that have a bit more regard for privacy than
the US does, the cleartext nature of email communication should be enough
incentive to use encryption, at least on sensitive emails. But, even among
highly technical users, email encryption is quite rare.
In the article, attorney Mark Rasch describes what privacy is, from a
constitutional standpoint, as well as the test the US Supreme Court used to
determine privacy rights. "Constitutional privacy" simply governs whether
the government is required to get a warrant before using a particular
piece of evidence against a defendant, which is a bit different than the
usual definition. In the current case, the government seeks to introduce
email that it gathered without a warrant – its claim is that none is
required.
The case that essentially created privacy rights in the US was a 1963 case
involving payphone privacy and the Supreme Court decided on a two question
test to determine whether there was a privacy right or not. Those questions
boil down to whether the person believed what they were doing was private and
whether society as a whole would agree. In the current case, the government
is arguing that because the terms of service (TOS) of an ISP allow the ISP to
monitor email, anyone using that service has no reasonable expectation of
privacy. Thus, a subpoena, rather than a warrant, is all that is required to
use the defendant's email against him.
A subpoena is much easier to get, with much less specificity about what
kind of evidence is being sought. A prosecutor could subpoena someone's
entire stored email archive from an ISP, but a warrant would need to
indicate what kind of evidence, for which alleged crimes, was being
sought. Email that was evidence of a different crime would not be
admissible. At least in theory.
This would appear to be an end run around the Electronic Communications Privacy
Act (ECPA), which was passed to specifically protect electronic
communications in the same way that telephone calls are protected. The
current administration's assault on telephone privacy notwithstanding, ECPA
clearly extends the wiretapping laws and warrant requirements into the
realm of internet communications. A regulation
passed by Congress can add additional privacy safeguards, beyond what the
Supreme Court decided, as long as the safeguards are not unconstitutional
themselves. How the Justice Department intends to circumvent ECPA is not
clear, but hopefully the defendant's lawyers and the judge won't ignore it
as well as the Justice Department has. A decision in the case is still
pending.
Perhaps the most chilling portion of the government's argument is that it
didn't even need a subpoena; that the email could be introduced as evidence
no matter how it was acquired. Their argument once again rests on
the TOS that folks agree to with their email providers (ISPs or on-line
services like GMail), which, because it gives the provider the right to
look at the email, makes email inherently non-private. So the government
can collect it in secret rooms at AT&T and use it as they see fit. That's
not quite how they put it in their arguments, but that is the upshot.
With luck, the courts will see things just a tad differently, especially in
light of ECPA. This will hopefully leave us with only the technical side of
email privacy to deal with. For that, there are plenty of tools available,
they just don't seem to see much use.
Most modern mail user agents have some kind of encryption capability,
usually in the form of an OpenPGP (RFC 2440)
compliant message handler. This open encryption standard has been around
for a long time, is well-supported, and not too terribly difficult to use.
So why do the vast majority of emails go out unencrypted?
There are a number of reasons, probably. For one thing, the vast majority
of email is spam these days; encryption probably lessens their impact,
though it may help them avoid spam filters in the future. Of the rest,
most of what is sent as email probably doesn't seem to require much in the
way of privacy. Some of it is going to public mailing lists, others are
reminding the spouse to get milk on the way home, and the rest is one of
several bad jokes that have now been forwarded enough times that the
indentation level puts the actual text on a monitor next door. But, seriously, it is
only a small subset of email that needs encryption.
Even that small subset is probably not encrypted, at least in the author's
experience. Certainly the Tor
eavesdropping exercise indicated that even governments tend not to use
encryption for at least some of their diplomatic traffic. It almost
certainly comes down to convenience; dealing with keys, key exchanges, and
key management is more trouble than it is worth. Unfortunately, there is
no silver bullet solution to that problem; in order to have good
encryption, you must have good keys.
Encrypted email should be fairly private, but it is certainly not
bulletproof. Because it is so rarely used today, sending encrypted email
might attract unwanted attention from entities monitoring internet
traffic. But, as long as both parties maintain the secrecy of their keys,
possibly under the threat of imprisonment for contempt of court, there is
no known method for decrypting the message in a reasonable timeframe
(key-length and cipher-strength dependent, of course). If we really want
privacy for our emails, encryption is the right path.
(
Log in to post comments)