Broadcasting Expectations: an Unprotected Wireless Network Takes on Constitutional Dimensions
Citation | Vol. 7 No. 1 |
Publication year | 2011 |
Abstract
Table of Contents
Introduction......................................................................................2
I. Fourth Amendment Framework: An Emphasis On Reasonableness.........................................................................3
II. District Court Finds No Reasonable Expectation of Privacy in Unsecured Wireless Networks................................4
III. Implications for Privacy in secured and Unsecured Wireless Networks....................................................................6
A. Expectation of Privacy in Wireless Communications.........6
B. Password Protection.............................................................7
C. Distinguishing
D. Restrictions on Unauthorized Network Access...................9
E. Reduced Privacy Expectations in File-Sharing Networks .10
Conclusion.....................................................................................11
Introduction
Defendant John Henry Ahrndt, on trial for transportation and possession of child pornography, challenged the admissibility of key evidence based on the fact that the materials were discovered on his computer through his home wireless network by a police officer without a warrant.(fn1) In the first case of its kind, the U.S. District Court for the District of oregon found that Ahrndt could not have had a reasonable expectation of privacy in files he shared openly on an unsecured wireless network, preventing his claim that the officer violated the Fourth Amendment.(fn2)
This Article discusses the extent of protections against searches and seizures under the Fourth Amendment, discusses the new issues raised by the
I. Fourth Amendment Framework: An Emphasis On Reasonableness
The Fourth Amendment provides citizens with the right to be secure from unreasonable government searches and seizures of their persons, houses, papers and effects.(fn3) The Amendment provides no protection against searches performed by private citizens,(fn4) and it has been established that invasions of a defendant's privacy by governmental agents subsequent to invasions by a private party are tested by the degree to which they exceed the scope of the private search.(fn5)
The United States Supreme Court decision in
In applying this standard to specific situations, the Supreme Court has taken a case-by-case approach. However, some trends emerge from an analysis of the relevant cases. For example, the Court has recognized that developments in technology have served to decrease reasonable expectations of privacy.(fn9)
In
To continue reading
Request your trial