The IT Law Wiki
No edit summary
mNo edit summary
Line 1: Line 1:
'''Citation:''' United States v. Scarfo, 180 F.Supp.2d 572 (D.N.J. 2001).
+
'''Citation:''' United States v. Scarfo, 180 F.Supp.2d 572 (D.N.J. 2001). ([http://scholar.google.com/scholar_case?case=12151354094043657712&q=United+States+v.+Scarfo&hl=en&as_sdt=2002 full-text])
   
   
Line 8: Line 8:
   
 
Scarfo had challenged the use of the [[software]], since it overcame the [[encryption]] allegedly used by the defendant to hide his criminal activities and exposed the [[password]]s used to gain [[access]] to the [[encrypt]]ed [[information]]. The court held that since no “[[communications]]” were [[intercept]]ed by the [[program]] (the [[software]] was automatically [[disable]]d if the [[user]] was “[[online]]”), a [[wiretap]] order (which has more stringent requirements on law enforcement) was not required.
 
Scarfo had challenged the use of the [[software]], since it overcame the [[encryption]] allegedly used by the defendant to hide his criminal activities and exposed the [[password]]s used to gain [[access]] to the [[encrypt]]ed [[information]]. The court held that since no “[[communications]]” were [[intercept]]ed by the [[program]] (the [[software]] was automatically [[disable]]d if the [[user]] was “[[online]]”), a [[wiretap]] order (which has more stringent requirements on law enforcement) was not required.
 
 
 
[[Category:Case]]
 
[[Category:Case]]
 
[[Category:Case-U.S.-Federal]]
 
[[Category:Case-U.S.-Federal]]

Revision as of 09:03, 23 November 2009

Citation: United States v. Scarfo, 180 F.Supp.2d 572 (D.N.J. 2001). (full-text)



A New Jersey judge, in a criminal involving gambling and loansharking, held that the FBI's keylogger software that records and reports all of the keystrokes occurring on a targeted computer is legal, and needs only a search warrant to authorize installation.

Scarfo had challenged the use of the software, since it overcame the encryption allegedly used by the defendant to hide his criminal activities and exposed the passwords used to gain access to the encrypted information. The court held that since no “communications” were intercepted by the program (the software was automatically disabled if the user was “online”), a wiretap order (which has more stringent requirements on law enforcement) was not required.