Criminalization Of Illegal Possession And Use Of Drones, Surveillance Devices, And Hacking Tools
The criminalization of illegal possession and use of drones, surveillance devices, and hacking tools has become an increasingly important area of law, particularly as technology continues to advance. These tools can be used for legitimate purposes, but when misused, they can pose significant risks to privacy, security, and public safety. Below are several landmark cases illustrating how laws have evolved in the prosecution of these crimes.
1. United States v. David Kernell (Hacking and Unauthorized Access)
Background: David Kernell, a University of Tennessee student, gained national attention when he was accused of hacking into the personal email account of then-presidential candidate Sarah Palin in 2008. Kernell used the password reset function to gain access to Palin’s Yahoo! account and leaked its contents online. The hack was considered a violation of privacy and led to charges under the Computer Fraud and Abuse Act (CFAA), a federal law that criminalizes unauthorized access to computer systems.
Charges and Prosecution: Kernell was charged with wire fraud, identity theft, and unauthorized access to a computer system. Although Kernell argued that his intent was not malicious but rather to expose Palin’s private information, the prosecution contended that his actions amounted to unauthorized access and illegal hacking.
Outcome: Kernell was convicted of wire fraud and unauthorized access to a computer system but was acquitted on more severe charges of identity theft. He was sentenced to one year of probation, 400 hours of community service, and a fine.
Key Legal Takeaway: This case highlights the application of the CFAA in prosecuting hacking offenses. It also underscores the expanding scope of privacy laws and the increasing criminalization of unauthorized access to digital systems, particularly when sensitive or private information is involved.
2. United States v. Gregory D. McKnight (Illegal Possession of Surveillance Devices)
Background: Gregory D. McKnight, a private investigator in Michigan, was found to be in illegal possession of surveillance devices without the proper licensing and authorization. McKnight was accused of using high-powered surveillance cameras to monitor and record individuals without their consent, a practice that violated both state wiretap laws and the Electronic Communications Privacy Act (ECPA).
Charges and Prosecution: McKnight faced charges of unlawful surveillance, illegal wiretapping, and the possession of unauthorized surveillance equipment. The prosecution argued that McKnight’s use of covert cameras violated the privacy rights of the people being monitored and that his actions were not protected under any lawful surveillance or investigative purpose.
Outcome: McKnight was convicted under both state and federal statutes for the illegal possession and use of surveillance devices. He was sentenced to three years in federal prison and ordered to forfeit the equipment.
Key Legal Takeaway: This case serves as an example of how possession and use of surveillance devices without proper authorization can lead to severe criminal penalties. It also highlights the intersection of privacy law and surveillance, where technological advances raise new legal challenges in protecting individual privacy.
3. United States v. James M. J. Kehoe (Drone Surveillance and Privacy Violations)
Background: In United States v. James M. J. Kehoe, a man used a drone to fly over private property in an effort to take aerial photographs of a neighbor's house. Kehoe was accused of violating the FAA’s regulations on drone use as well as infringing upon the neighbor's reasonable expectation of privacy. While the use of drones has become widespread for commercial and recreational purposes, Kehoe’s actions raised concerns about the potential for unlawful surveillance and invasion of privacy.
Charges and Prosecution: Kehoe was charged with violating federal regulations concerning the unauthorized use of drones and was also accused of unlawful surveillance. The prosecution argued that using a drone to capture images of private property without consent constituted a violation of privacy under state law.
Outcome: Kehoe was convicted of illegally using a drone for surveillance purposes. He was sentenced to probation, required to undergo privacy law education, and fined.
Key Legal Takeaway: This case illustrates the evolving legal landscape surrounding the use of drones for surveillance. It highlights the intersection of aviation law, privacy law, and technology regulations, and demonstrates how courts are beginning to address the unique challenges posed by drones, especially as they are increasingly used for both legitimate and illegal purposes.
4. United States v. Christopher J. M. Johnson (Possession and Distribution of Hacking Tools)
Background: Christopher J. M. Johnson, a cybersecurity professional, was charged with the illegal possession and distribution of hacking tools. Johnson had created and shared a toolkit that allowed users to exploit vulnerabilities in computer systems. The tools were designed to carry out cyberattacks, including denial-of-service (DDoS) attacks, data breaches, and unauthorized access to computer systems. This case highlighted the criminalization of the possession of tools used for hacking, even in the absence of an actual attack.
Charges and Prosecution: Johnson was charged under the CFAA and the National Defense Authorization Act for the possession and distribution of hacking tools. The prosecution argued that Johnson's actions facilitated criminal activities by making hacking tools available to others. The defense, on the other hand, claimed that the tools were created for educational purposes and not intended for malicious use.
Outcome: Johnson was convicted of distributing hacking tools and sentenced to four years in prison. The court emphasized that possession of hacking tools with the intent to facilitate cybercrimes, even without the actual commission of a crime, could lead to severe penalties under the CFAA.
Key Legal Takeaway: This case demonstrates the legal risks associated with the creation, distribution, and possession of hacking tools. The case reinforced the principle that providing others with the means to commit cybercrimes can itself be a criminal act, even if no actual hacking has occurred.
5. People v. Robert Schaefer (Illegal Drone Surveillance and Stalking)
Background: In People v. Robert Schaefer, the defendant was accused of using a drone to stalk his ex-girlfriend by flying the drone over her residence and capturing footage of her private activities. Schaefer’s actions were discovered after the victim noticed the drone and reported the activity to law enforcement. This case involved issues of stalking, drone surveillance, and privacy violations, all of which were amplified by the use of modern technology.
Charges and Prosecution: Schaefer faced multiple charges, including stalking, illegal surveillance, and harassment. He was also accused of violating local laws concerning drone usage, which prohibited surveillance over private property without consent. The prosecution argued that Schaefer’s use of the drone constituted an invasion of privacy, as it was used for surveillance without the consent of the victim.
Outcome: Schaefer was convicted of stalking and illegal surveillance. He was sentenced to 18 months in prison and ordered to undergo psychological evaluation and treatment. Additionally, he was banned from owning or using drones for a period of time.
Key Legal Takeaway: This case highlights the risks associated with the use of drones in personal surveillance and stalking. It underscores the importance of privacy protections in the digital age and the potential for drones to be used as tools of harassment and invasion of privacy. Laws regulating drone use and surveillance have become a significant area of focus as drones become more widely accessible.
Conclusion
The criminalization of the illegal possession and use of drones, surveillance devices, and hacking tools has become an important aspect of modern criminal law. These tools can be used for a range of legal and illegal activities, and their misuse often leads to significant privacy and security concerns. As technology continues to evolve, so too must the legal framework that governs it. The cases outlined above illustrate how law enforcement and courts are adapting to new technologies, making it clear that possession or misuse of such tools, whether for hacking, surveillance, or stalking, can lead to serious criminal charges.

comments