{"id":3845,"date":"2021-04-28T08:04:19","date_gmt":"2021-04-28T12:04:19","guid":{"rendered":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/glj-online\/109-online\/the-fourth-amendment-and-the-dark-web-how-to-embrace-a-digital-jurisprudence-that-protects-individual-liberties\/"},"modified":"2025-05-12T11:13:35","modified_gmt":"2025-05-12T15:13:35","slug":"the-fourth-amendment-and-the-dark-web-how-to-embrace-a-digital-jurisprudence-that-protects-individual-liberties","status":"publish","type":"page","link":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/submit\/glj-online\/109-online\/the-fourth-amendment-and-the-dark-web-how-to-embrace-a-digital-jurisprudence-that-protects-individual-liberties\/","title":{"rendered":"The Fourth Amendment and the Dark Web: How to Embrace a Digital Jurisprudence that Protects Individual Liberties"},"content":{"rendered":"<p><em>A tip in February 2015 set off a chain of remarkable events that eventually led the Federal Bureau of Investigation (FBI) to a child pornography website on the dark web named \u201cPlaypen.\u201d However, the FBI did not shut down the website right away. Instead, the FBI operated the website for two weeks to identify website users. Law enforcement eventually applied for a warrant in the Eastern District of Virginia to use the Network Investigative Technique (NIT) to identify Playpen\u2019s users and administrators. The NIT can be thought of as a form of malware because it gains access to a suspect\u2019s computer without his or her consent. Specifically, the NIT collects the target computer\u2019s \u201cHost Name,\u201d operating system, IP address, and \u201cMedia Access Control\u201d address as well as other information. This was a risky and controversial plan because it required the government to operate a child pornography website. To obtain a warrant, law enforcement prepared an affidavit documenting its basis for probable cause and the urgent need to identify some of the 150,000 users exploiting children on the website. However, the application did not\u2014and could not\u2014state with particularity the places to be searched because it was unknown where the users of Playpen were located due to their use of Tor, an anonymizing software.<\/em><\/p>\n<p><em>The court issued a search warrant, and law enforcement sent malware using the NIT to a user\u2019s computer when the user accessed the Playpen website. The malware caused the user\u2019s computer to send identifying information to federal agents in the Eastern District of Virginia. After the NIT warrant was issued, the FBI obtained over 9,000 IP addresses across 120 countries from users logging in to Playpen. As a result of this sting, over 200 users were criminally charged, and forty-nine American children were rescued from exploitation. Because suspects were discovered outside the Eastern District of Virginia, however, courts have debated whether the magistrate judge exceeded his authority by issuing a warrant outside his jurisdiction.\u00a0<\/em><\/p>\n<p><em>\u00a0To remedy this debate, the drafters of the Federal Rules of Criminal Procedure (FRCP) modified Rule 41 to explicitly allow future digital out-of-district searches under certain circumstances. The drafters gave one overriding reason for this modification: they worried about a \u201csituation [where] the warrant sufficiently describes the computer to be searched, but the district within which the computer is located is unknown.\u201d Of importance for this Note, the drafters explicitly stated that \u201c[t]he proposed amendment does not address constitutional questions that may be raised by warrants for remote electronic searches, such as the specificity of description that the Fourth Amendment may require in a warrant for remotely searching electronic storage media or seizing or copying electronically stored information.\u201d This Note will specifically address the constitutional question the drafters declined to answer and endeavor to ensure that individual liberty is balanced with the need to seek justice for those who use the dark web maliciously.\u00a0<\/em><\/p>\n<p><strong>Continue reading <a href=\"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-content\/uploads\/sites\/26\/2021\/04\/Hightower_The-Fourth-Amendment-and-the-Dark-Web.pdf\"><em>The Fourth Amendment and the Dark Web: How to Embrace a Digital Jurisprudence that Protects Individual Liberties<\/em><\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A tip in February 2015 set off a chain of remarkable events that eventually led the Federal Bureau of Investigation (FBI) to a child pornography website on the dark web [&hellip;]<\/p>\n","protected":false},"author":5086,"featured_media":0,"parent":1718,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"abstract.php","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-3845","page","type-page","status-publish","hentry"],"acf":[],"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/3845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/users\/5086"}],"replies":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/comments?post=3845"}],"version-history":[{"count":3,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/3845\/revisions"}],"predecessor-version":[{"id":3849,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/3845\/revisions\/3849"}],"up":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/1718"}],"wp:attachment":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/media?parent=3845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}