The Law of the Trojan Horse
54 Pages Posted: 10 Apr 2023 Last revised: 28 Feb 2024
Date Written: March 26, 2023
Abstract
The use of malware in criminal investigations might be expanding. While “police hacking” is often publicized as used almost solely against pedophiles on the Dark Web, recent revelations from Israel on extensive police use of malware for a variety of criminal suspects might suggest that more intrusive forms of police hacking might emerge anywhere. Equipped with a wiretap warrant and malware, police forces can legally bypass encryption and directly obtain content and metadata from the device and its linked apps, turn on a suspect’s camera or microphone and essentially gain full access to the past and present of suspects. While the scope of police hacking in the U.S. is currently unknown, as this Article further argues, the legal framework that governs “search,” access to stored communications, and wiretaps could authorize such a practice much like in Israel, although it was never designed to do so. This obsolete framework to properly govern the use of malware by enforcement agencies must be updated and reconfigured.
While reflecting on Frank Easterbrook’s famous “Law of the horse” argument, this Article suggests that Trojan horses (malware) must be directly and individually regulated, especially in the realm of criminal law enforcement. This Article explores the history and legality of police hacking under the current legal framework. It then examines the impact of such practice on human rights, human liberties, and other externalities stemming from its use. It then proposes a blueprint for policymakers on how to regulate police hacking properly, not before placing an almost absolute moratorium on its use until such regulation occurs. Police hacking should be allowed in some circumstances and under a rigorous, semi-technological oversight régime, as this Article suggests, but more importantly, such policymaking is crucial to draw a clear line when it cannot be used.
Keywords: Police hacking, government hacking, lawful hacking, Malware, Wiretap warrant, NSO, Pegasus, Fourth Amendment, NIT, Network Investigative Technique
Suggested Citation: Suggested Citation