United States v. Lavabit, LLC.

749 F.3d 276
CourtCourt of Appeals for the Fourth Circuit
DecidedApril 16, 2014
DocketNos. 13-4625, 13-4626
StatusPublished
Cited by227 cases

This text of 749 F.3d 276 (United States v. Lavabit, LLC.) is published on Counsel Stack Legal Research, covering Court of Appeals for the Fourth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Lavabit, LLC., 749 F.3d 276 (4th Cir. 2014).

Opinion

Affirmed by published opinion. Judge AGEE wrote the opinion, in which Judge NIEMEYER and Judge GREGORY joined.

AGEE, Circuit Judge:

Lavabit LLC is a limited liability company that provided email service. Ladar Levison is the company’s sole and managing member.1

In 2013, the United States sought to obtain certain information about a target2 in a criminal investigation. To further that goal, the Government obtained court orders under both the Pen/Trap Statute, 18 U.S.C. §§ 3123-27, and the Stored Communications Act, 18 U.S.C. §§ 2701-12, requiring Lavabit to turn over particular information related to the target. When Lavabit and Levison failed to comply with those orders, the district court held them in contempt and imposed monetary sanctions. Lavabit and Levison now appeal the sanctions.

For the reasons below, we affirm the judgment of the district court.

I.

A.

This case concerns the encryption processes that Lavabit used while providing its email service. Encryption describes the process through which readable data, often called “plaintext,” is converted into “ciphertext,” an unreadable jumble of letters and numbers. Decryption describes the reverse process of changing ciphertext back into plaintext. Both processes employ mathematical algorithms involving “keys,” which facilitate the change of plain-text into ciphertext and back again.

Lavabit employed two stages of encryption for its paid subscribers: storage encryption and transport encryption. Storage encryption protects emails and other data that rests on Lavabit’s servers. Theoretically, no person other than the email user could access the data once it was so encrypted. By using storage encryption, Lavabit held a unique market position in the email industry, as many providers do not encrypt stored data.

[280]*280Although Lavabit’s use of storage encryption was novel, this case primarily concerns Lavabit’s second stage of encryption, transport encryption. This more common form of encryption protects data as it moves in transit between the client and the server, creating a protected transmission channel for internet communications. Transport encryption protects not just email contents, but also usernames, passwords, and other sensitive information as it moves. Without this type of encryption, internet communications move exposed en route to their destination, allowing outsiders to “listen in.” Transport encryption also authenticates — that is, it helps ensure that email clients and servers are who they say they are, which in turn prevents unauthorized parties from exploiting the data channel.

Like many online companies, Lavabit used an industry-standard protocol called SSL (short for “Secure Sockets Layer”) to encrypt and decrypt its transmitted data. SSL relies on public-key or asymmetric encryption, in which two separate but related keys are used to encrypt and decrypt the protected data. One key is made public, while the other remains private. In Lavabit’s process, email users would have access to Lavabit’s public keys, but Lava-bit would retain its protected, private keys. This technology relies on complex algorithms, but the basic idea is akin to a self-locking padlock: if Alice wants to send a secured box to Bob, she can lock the box with a padlock (the public key) and Bob will open it with his own key (the private key). Anyone can lock the padlock, but only the key-holder can unlock it.3

The security advantage that SSL offers disappears if a third party comes to possess the private key. For example, a third party holding a private key could read the encrypted communications tied to that key as they were transmitted. In some circumstances, a third party might also use the key to decrypt past communications (although some available technologies can thwart that ability). And, with the private key in hand, the third party could impersonate the server and launch a man-in-the-middle attack.

When a private key becomes anything less than private, more than one user may be compromised. Like some other email providers, Lavabit used a single set of SSL keys for all its various subscribers for technological and financial reasons. Lava-bit in particular employed only five key-pairs, one for each of the mail protocols that it supported.4 As a result, exposing one key-pair could affect all of Lavabit’s estimated 400,000-plus email users.

B.

With this technical background in mind, we turn to the case before us.

1.

On June 28, 2013, the Government sought and obtained an order (“the Pen/ [281]*281Trap Order”) from a magistrate judge authorizing the placement of a pen register and trace-and-trap device on Lavabit’s system. This “pen/trap” device is intended to allow the Government to collect certain information, on a real-time basis, related to the specific investigatory target’s Lavabit email account.5 In accordance with the Pen/Trap Statute, 18 U.S.C. §§ 3121-27, the Pen/Trap Order permitted the Government to “capture all non-content dialing, routing, addressing, and signaling information ... sent from or sent to” the target’s account. (J.A. 10.) In other words, the Pen/Trap Order authorized the Government to collect metadata6 relating to the target’s account, but did not allow the capture of the contents of the target’s emails. The Pen/Trap Order further required Lavabit to “furnish [to the Government] ... all information, facilities, and technical assistance necessary to accomplish the installation and use of the pen/ trap device unobtrusively and with minimum interference.” (J.A. 11.)

On the same day that the Pen/Trap Order issued, FBI agents met with Levison, who indicated that he did not intend to comply with the order. Levison informed the agents that he could not provide the requested information because the target-user “had enabled Lavabit’s encryption services,” presumably referring to Lava-bit’s storage encryption. (J.A. 7.) But, at the same time, Levison led the Government to believe that he “had the technical capability to decrypt the [target’s] information.” (J.A. 6.) Nevertheless, Levison insisted that he would not exercise that ability because “Lavabit did not want to ‘defeat [its] own system.’ ” (J.A. 6.)

In view of Levison’s response, the Government obtained an additional order that day compelling Lavabit to comply with the Pen/Trap Order. This “June 28 Order,” again issued by a magistrate judge, instructed Lavabit to “provide the [FBI] with unencrypted data pursuant to the [Pen/Trap] Order” and reiterated that La-vabit was to provide “any information, facilities, or technical assistance ... under the control of Lavabit ... [that was] needed to provide the FBI with the unencrypted data.” (J.A. 9.) Further, the June 28 Order put Lavabit and Levison on notice that any “[failure to comply” could result in “any penalty within the power of the Court, including the possibility of criminal contempt of Court.” (J.A. 9.)

2.

Over the next eleven days, the Government attempted to talk with Levison about implementing the Pen/Trap Order.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
749 F.3d 276, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-lavabit-llc-ca4-2014.