Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Top US Court Grapples With Email Warrant Reaching Across Borders

US Supreme Court justices grappled Tuesday with the implications of a criminal warrant case involving Microsoft emails in a test for whether American justice can reach across international borders for digital evidence.

US Supreme Court justices grappled Tuesday with the implications of a criminal warrant case involving Microsoft emails in a test for whether American justice can reach across international borders for digital evidence.

Oral arguments were held at the top US court over a 2013 warrant ordering Microsoft to turn over the contents of an email account used by a suspected drug trafficker whose data is stored in a cloud computing center in Ireland.

The case been watched closely because of its implications for privacy and surveillance in the digital age, specifically how law enforcement can reach across borders to obtain digital evidence that may be scattered across the globe.

Microsoft attorney Joshua Rosenkranz told the justices the warrant represents an unauthorized “extraterritorial act.”

“These emails are stored outside the United States. They are stored in Ireland,” the lawyer said. “And the government is asking us to go and fetch them from Ireland.”

But Deputy Solicitor General Michael Dreeben, arguing for the government, said the case does not involve reaching across borders because Microsoft has access to the data in the United States.

The case represents “a basically unbroken line that when a party is before a US court and a court issues an order to that party that says produce information, that’s domestic conduct,” Dreeben added.

– Creating ‘international problems’ –

Advertisement. Scroll to continue reading.

Some justices questioned whether the US government has the authority to access such data.

“By doing so, we are trenching on the very thing that our extraterritoriality doesn’t want to do, what our jurisprudence doesn’t want to do, which is to create international problems,” Justice Sonia Sotomayor said.

The government has argued that a ruling for Microsoft could severely hamper law enforcement in seeking digital evidence that may be stored in data centers or the internet “cloud.”

Justice Samuel Alito commented that the case underlines the difficulty of establishing territorial limits in an age of cloud computing, where data can be split up and stored anywhere in the world.

“It physically exists on one or more computers somewhere, but it doesn’t have a presence anyplace in the sense that a physical object has a presence someplace,” Alito said.

“And the internet service providers can put it anywhere they want and move it around at will. The whole idea of territoriality is strained.”

Chief Justice John Roberts said Microsoft and others could effectively avoid any legal request by moving data from one country to another.

“You might gain customers if you can assure them, no matter what happens, the government won’t be able to get access to their emails,” he added. 

“The government might have a strong position… that the statute focuses on disclosure. And disclosure takes place in Washington, not in Ireland.”

The Microsoft case is especially sensitive in light of revelations by former intelligence contractor Edward Snowden, who leaked details on global US surveillance programs in 2013.

– No easy answers –

Some analysts argue the court has no easy solution, because a ruling for either side could lead to problems, either for tech firms or for law enforcement.

Daniel Castro of the Information Technology and Innovation Foundation, a Washington think tank, said the only way to resolve the standoff is with legislation to streamline the process for cross-border data requests.

“If Congress doesn’t act, then no matter how the Supreme Court decides this case, there will be negative consequences for US competitiveness,” Castro said in a statement urging Congress to move swiftly on a proposal known as the CLOUD Act.

He said that if the court rules for the government, “it will feed the growing perception around the world that the best way to protect data from the prying eyes of the US government is to store it abroad” with a non-American firm.

“On the other hand, if the court rules that search warrants cannot be used overseas, then foreign governments may try to force companies to store data inside their borders to make it impossible for US officials to execute a search warrant.

“This also damages US tech competitiveness because barriers to the free flow of information are hardening, which would impede digital innovation for everyone.”

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.