Holes in the Constitution: The feds and the global spyware industry | Napolitano

  • Oops!
    Something went wrong.
    Please try again later.

In his famous dissent in Olmstead v. United States, Supreme Court Justice Louis Brandeis in 1928 called the right to be left alone the most comprehensive of rights and the right most valued by civilized men. He was referring to the right to be left alone from the government — a right that today we call privacy.

Olmstead was involved in bootlegging, and the feds tapped his phones without any search warrants. The Supreme Court, which had never recognized the right to privacy, permitted the use of the overheard conversations as evidence in his criminal trial.

Two generations later, in Griswold v. Connecticut, a case involving the sale of contraceptives in violation of state law, Brandeis’ dissent was embraced by the court’s majority. How odd that it took 175 years for the court to recognize that the Fourth Amendment — which was written to keep all government out of our bodies, homes, papers and effects — protects the fundamental right to privacy.

Yet, there is a difference between recognizing a right and preventing the government from violating it. The court’s instrument of prevention is known as the exclusionary rule. Courts are required to exclude from use at trial all evidence obtained by the government in violation of a recognized right.

In the early days of this rule, prosecutors argued that the criminal should not go free merely because the constable has erred. The counterargument — which on paper prevailed — is that a fundamental liberty is meaningless if the cost of government violation does not exceed the gain.

The reason I say that this pro-liberty view prevailed “on paper” is because the feds — whose appetite for surveillance is insatiable — have found ways around it. The government continues to cut holes in the Fourth Amendment, and it has gleefully jumped through them.

When the government gets caught spying without a warrant, it argues that the right to privacy only exists to protect criminal prosecutions from being infected by illegally obtained evidence. Thus, this argument goes, if the feds violate your right to privacy by capturing the contents of your mobile device without a warrant, but they don’t use what they captured in a criminal prosecution against you, then there is no harm, and so no foul.

Sadly, some courts have bought this totalitarian nonsense. The successful employment of this argument has created a culture in law enforcement to surveil first and worry about the Fourth Amendment later.

Much of this stems from the Patriot Act of 2001, which unconstitutionally permits one federal agent to authorize another to obtain evidence from a custodian of records. The instrument of doing so is called a National Security Letter — not a search warrant issued by a judge and not a subpoena voted on by a grand jury, but permission from an FBI boss.

In July 2021, when President Joe Biden discovered that the FBI was using Trump-era software called zero click to download the contents of mobile devices and desktops without search warrants, he put a stop to it. Last week, The New York Times reported that the feds have not stopped.

Zero click enables the user of this Israeli-developed software to enter a mobile device or desktop and use it as a tracking and listening device while downloading its contents, without tricking the owner of the device into clicking on to a link.

Not to be deterred by Biden’s order, the feds have acquired more Israeli-developed software that tracks the user’s internet habits and develops a link tailor-made to attract the user, which, when clicked on, puts the feds inside the device and enables them to track, listen and download.

All this is done without the user’s knowledge and without a search warrant. Question: What does federal law call entering someone else’s computer without consent or a search warrant? Answer: Computer hacking, which is a felony.

Now back to the exclusionary rule. It is only an effective deterrent if the government attempts to offer evidence at trial that it obtained illegally. The feds may be indifferent to the Constitution they have sworn to uphold, and the Constitution may be nearly useless as an instrument to protect personal liberty, but the feds are not going to reveal their sources and methods in a public courtroom.

FILE - This Aug. 25, 2016 file photo, shows the logo of the Israeli NSO Group on a building where they had offices in Herzliya, Israel. NSO Group, an Israeli spyware company that has been accused of helping authoritarian governments stifle dissent said it has adopted "a new human rights policy" to ensure its software is not misused. The NSO Group said Tuesday, Sept. 10, 2019 that it would institute a series of oversight measures to ensure adherence and would henceforth evaluate potential clients' "past human rights performance." (AP Photo/Daniella Cheslow, File)

Thus, their use of evidence obtained in violation of the right to privacy, in violation of the Fourth Amendment, is often masked. This masking occurs by constructing a fictitious path to the evidence by a team other than those who did the hacking.

Stated differently, the feds who do the computer hackings are not the same persons who do the prosecutions. The former is a dirty team. The latter is a clean team. Together, they constitute a conspiracy to violate the civil liberties of those whom they have targeted with their software.

When FBI Director Christopher Wray was asked about this recently in public testimony before the Senate Intelligence Committee, he stated that the FBI was just experimenting with this software to see how it worked. Who would believe that?

FBI Director Christopher Wray testifies during a hearing of the Appropriations Subcommittee for Commerce, Justice, Science, and Related Agencies, on Capitol Hill, Tuesday, May 7, 2019 in Washington. (AP Photo/Alex Brandon)
FBI Director Christopher Wray testifies during a hearing of the Appropriations Subcommittee for Commerce, Justice, Science, and Related Agencies, on Capitol Hill, Tuesday, May 7, 2019 in Washington. (AP Photo/Alex Brandon)

Wray is an example of the government’s duplicity. The Biden administration not only stopped the feds from using zero click; it prevented the Israeli manufacturer of it from selling any of its products to American purchasers. The administration claimed it was protecting journalists and dissidents from government spying.

What about protecting all persons in America from government spying?

The Fourth Amendment protects all persons — not just Americans, not just journalists and dissidents, not just good people — from all government, not just law enforcement.

Today, the government not only hacks into our computers; it lies about it and then lies about its lying. Hacking by the feds is more than just a crime. It is a direct assault on the liberties that we have hired the feds to protect. Only the aggressive prosecution of those who do this will deter it.

Andrew P. Napolitano, a former New Jersey Superior Court Judge, has published nine books on the U.S. Constitution.

Andrew P. Napolitano
Andrew P. Napolitano

This article originally appeared on New Jersey Herald: The feds and the global spyware industry