Criminal Procedure
Theory and Practice

Second Edition

by Jefferson L. Ingram

PrenticeHall

Buy this Book

Instructor Information

 

Chapter 7 Update 7.6

Searches and Seizures: Houses, Places, Persons, and Vehicles

Carpenter v. United States

Significance of the Case: When police officers do not procure a search warrant to obtain location data and other meta data from the cell phone service provider where the data has been generated by the use of a cell phone and held by the cell phone provider, the evidence generated by the user and stored by the cell provider may not be used in court against the owner/possessor of the cell phone.

Carpenter v. United States

 ___ U.S. ___ (2018), 138 S.Ct. 2206, 201 L. Ed. 2d 507, 2018 U.S. LEXIS 3844 (2018).

Some complete citations omitted.

Facts:

Police officers arrested four men who were suspects in a series of armed robberies at RadioShack and T-Mobile stores in Detroit, Michigan and other locations.  One of the men confessed that the group of robbers and getaway drivers had committed robberies at nine different stores in Michigan and Ohio, and that they use cell phones to coordinate their illegal robbery activities. The confessing defendant gave police officers a variety of cell phone numbers that the criminal group had used.

Based on that information, prosecutors applied for court orders [not search warrants] under the federal Stored Communications Act to obtain phone records for the defendant-appellant, Timothy Carpenter. The above referenced statute allows state and federal governments to obtain disclosure of telecommunication records, so long as it offers specific and articulable facts showing that there are reasonable grounds [less than probable cause] to believe that the communication records sought are relevant in an ongoing criminal investigation. In this case, a federal magistrate issued to court orders directing MetroPCS and Sprint to disclose cell site location information for Carpenter’s cell phone at the beginning of every call and the location of the termination of every call during the four-month period that the robberies occurred. This personal cell phone meta-data allowed the government to show where Mr. Carpenter's phone, and probably where Mr. Carpenter, had been located during times when robberies were about to or had occurred.  According to the data included in the case:

The first order sought 152 days of cell-site records from MetroPCS, which produced records spanning 127 days. The second order requested seven days of CSLI from Sprint, which produced two days of records covering the period when Carpenter’s phone was “roaming” in northeastern Ohio.  Altogether the Government obtained 12,898 location points cataloging Carpenter’s movements—an average of 101 data points per day.

After Carpenter was charged with six counts of robbery and six counts of carrying a firearm during a federal crime of violence, he moved to suppress the cell phone site data provided by the cell phone companies. He contended that the seizure of his cell phone records violated his rights under the Fourth Amendment because they had been obtained in the absence of a probable cause-based warrant. After his motion to suppress was denied on the theory that he had voluntarily shared this information with his wireless carriers, and his disclosure to a third-party removed any expectation of privacy that he otherwise might have possessed, the federal government proceeded to offer proof of his involvement at his criminal trial.  The government witnesses helped to prove his presence at the robbery properties during the relevant time by presenting Carpenter’s cell phone metadata that the phone company recorded in its usual course of business.

The evidence against Carpenter, including his cell phone records and company meta data resulted in his conviction on all but one of the firearms counts and he was sentenced to more than 100 years in prison.  The Sixth Circuit Court of Appeal affirmed the convictions based on then current federal interpretations.  The Supreme Court of the United States granted certiorari to consider Carpenter’s Fourth Amendment claims related to the search and use of his cell data.

Procedural Issue:

Does a state or the federal government conduct an illegal Fourth Amendment search when it obtains historical cell phone data and records from service providers without using a warrant based on probable cause?

Held: Yes.

Rationale:

Opinion by Chief Justice Roberts.

* * *

I

A

* * *

Cell phones continuously scan their environment looking for the best signal, which generally comes from the closest cell site. Most modern devices, such as smartphones, tap into the wireless network several times a minute whenever their signal is on, even if the owner is not using one of the phone’s features. Each time the phone connects to a cell site, it generates a time-stamped record known as cell-site location information (CSLI). The precision of this information depends on the size of the geographic area covered by the cell site. The greater the concentration of cell sites, the smaller the coverage area. As data usage from cell phones has increased, wireless carriers have installed more cell sites to handle the traffic. That has led to increasingly compact coverage areas, especially in urban areas.

Wireless carriers collect and store CSLI for their own business purposes, including finding weak spots in their network and applying “roaming” charges when another carrier routes data through their cell sites. In addition, wireless carriers often sell aggregated location records to data brokers, without individual identifying information of the sort at issue here. While carriers have long retained CSLI for the start and end of incoming calls, in recent years phone companies have also collected location information from the transmission of text messages and routine data connections. Accordingly, modern cell phones generate increasingly vast amounts of increasingly precise CSLI.

II

* * *

For much of our history, Fourth Amendment search doctrine was “tied to common-law trespass” and focused on whether the Government “obtains information by physically intruding on a constitutionally protected area.” United States v. Jones, 565 U. S. 400, 405, 406, n. 3, (2012). More recently, the Court has recognized that “property rights are not the sole measure of Fourth Amendment violations.” Soldal v. Cook County, 506 U. S. 56, 64, (1992). In Katz v. United States, 389 U. S. 347, 351 (1967), we established that “the Fourth Amendment protects people, not places,” and expanded our conception of the Amendment to protect certain expectations of privacy as well. When an individual “seeks to preserve something as private,” and his expectation of privacy is “one that society is prepared to recognize as reasonable,” we have held that official intrusion into that private sphere generally qualifies as a search and requires a warrant supported by probable cause. Smith [v. Maryland], 442 U. S. [735], at 740. [At the time, the use of a pen register was held not to constitute a search.  Statutory law has changes somewhat since then.]

 Although no single rubric definitively resolves which expectations of privacy are entitled to protection, the analysis is informed by historical understandings “of what was deemed an unreasonable search and seizure when [the Fourth Amendment] was adopted.” Carroll v. United States, 267 U. S. 132, 149 (1925). On this score, our cases have recognized some basic guideposts. First, that the Amendment seeks to secure “the privacies of life” against “arbitrary power.” Boyd v. United States, 116 U. S. 616, 630 (1886). Second, and relatedly, that a central aim of the Framers was “to place obstacles in the way of a too permeating police surveillance.” United States v. Di Re, 332 U. S. 581, 595 (1948).

We have kept this attention to Founding-era understandings in mind when applying the Fourth Amendment to innovations in surveillance tools. As technology has enhanced the Government’s capacity to encroach upon areas normally guarded from inquisitive eyes, this Court has sought to “preservation of that degree of privacy against government that existed when the Fourth Amendment was adopted.” Kyllo v. United States, 533 U. S. 27, 34 (2001). For that reason, we rejected in Kyllo a “mechanical interpretation” of the Fourth Amendment and held that use of a thermal imager to detect heat radiating from the side of the defendant’s home was a search. Because any other conclusion would leave homeowners “at the mercy of advancing technology,” we determined that the Government—absent a warrant—could not capitalize on such new sense-enhancing technology to explore what was happening within the home.

 Likewise in Riley, the Court recognized the “immense storage capacity” of modern cell phones in holding that police officers must generally obtain a warrant before searching the contents of a phone. 573 U. S., at ___. We explained that while the general rule allowing warrantless searches incident to arrest “strikes the appropriate balance in the context of physical objects, neither of its rationales has much force with respect to” the vast store of sensitive information on a cell phone. Id., at ___.

 B

The case before us involves the Government’s acquisition of wireless carrier cell-site records revealing the location of Carpenter’s cell phone whenever it made or received calls. This sort of digital data—personal location information maintained by a third party—does not fit neatly under existing precedents. Instead, requests for cell-site records lie at the intersection of two lines of cases, both of which inform our understanding of the privacy interests at stake.

 The first set of cases addresses a person’s expectation of privacy in his physical location and movements. In United States v. Knotts, 460 U. S. 276 (1983), we considered the Government’s use of a “beeper” to aid in tracking a vehicle through traffic. Police officers in that case planted a beeper in a container of chloroform before it was purchased by one of Knotts’s co-conspirators. The officers (with intermittent aerial assistance) then followed the automobile carrying the container from Minneapolis to Knotts’s cabin in Wisconsin, relying on the beeper’s signal to help keep the vehicle in view. The Court concluded that the “augment[ed]” visual surveillance did not constitute a search because “[a] person traveling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements from one place to another.” Id., at 281, 282. Since the movements of the vehicle and its final destination had been “voluntarily conveyed to anyone who wanted to look,” Knotts could not assert a privacy interest in the information obtained. Id., at 281.

 This Court in Knotts, however, was careful to distinguish between the rudimentary tracking facilitated by the beeper and more sweeping modes of surveillance. The Court emphasized the “limited use which the government made of the signals from this particular beeper” during a discrete “automotive journey.” Id., at 284, 285. Significantly, the Court reserved the question whether “different constitutional principles may be applicable” if “twenty-four hour surveillance of any citizen of this country [were] possible.” Id., at 283-284.

 Three decades later, the Court considered more sophisticated surveillance of the sort envisioned in Knotts and found that different principles did indeed apply. In United States v. Jones, FBI agents installed a GPS tracking device on Jones’s vehicle and remotely monitored the vehicle’s movements for 28 days. The Court decided the case based on the Government’s physical trespass of the vehicle. 565 U. S., at 404-405. At the same time, five Justices agreed that related privacy concerns would be raised by, for example, “surreptitiously activating a stolen vehicle detection system” in Jones’s car to track Jones himself, or conducting GPS tracking of his cell phone. Id., at 426, 428, (Alito, J., concurring in judgment); id., at 415, (Sotomayor, J., concurring).  Since GPS monitoring of a vehicle tracks “every movement” a person makes in that vehicle, the concurring Justices concluded that “longer term GPS monitoring in investigations of most offenses impinges on expectations of privacy”—regardless whether those movements were disclosed to the public at large. Id., at 430.

 In a second set of decisions, the Court has drawn a line between what a person keeps to himself and what he shares with others. We have previously held that “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” Smith, 442 U. S., at 743-744. That remains true “even if the information is revealed on the assumption that it will be used only for a limited purpose.” United States v. Miller, 425 U. S. 435, 443, (1976). As a result, the Government is typically free to obtain such information from the recipient without triggering Fourth Amendment protections.

 This third-party doctrine largely traces its roots to Miller. While investigating Miller for tax evasion, the Government subpoenaed his banks, seeking several months of canceled checks, deposit slips, and monthly statements. The Court rejected a Fourth Amendment challenge to the records collection. For one, Miller could “assert neither ownership nor possession” of the documents; they were “business records of the banks.” Id., at 440. For another, the nature of those records confirmed Miller’s limited expectation of privacy, because the checks were “not confidential communications but negotiable instruments to be used in commercial transactions,” and the bank statements contained information “exposed to [bank] employees in the ordinary course of business.” Id., at 442. The Court thus concluded that Miller had “take[n] the risk, in revealing his affairs to another, that the information [would] be conveyed by that person to the Government.” Id., at 443.

 Three years later, Smith applied the same principles in the context of information conveyed to a telephone company. The Court ruled that the Government’s use of a pen register—a device that recorded the outgoing phone numbers dialed on a landline telephone—was not a search. Noting the pen register’s “limited capabilities,” the Court “doubt[ed] that people in general entertain any actual expectation of privacy in the numbers they dial.” 442 U. S., at 742. Telephone subscribers know, after all, that the numbers are used by the telephone company “for a variety of legitimate business purposes,” including routing calls. Id., at 743. And at any rate, the Court explained, such an expectation “is not one that society is prepared to recognize as reasonable.” Ibid. When Smith placed a call, he “voluntarily conveyed” the dialed numbers to the phone company by “expos[ing] that information to its equipment in the ordinary course of business.” Id., at 744. Once again, we held that the defendant “assumed the risk” that the company’s records “would be divulged to police.” Id., at 745.

 III

 The question we confront today is how to apply the Fourth Amendment to a new phenomenon: the ability to chronicle a person’s past movements through the record of his cell phone signals. Such tracking partakes of many of the qualities of the GPS monitoring we considered in Jones. Much like GPS tracking of a vehicle, cell phone location information is detailed, encyclopedic, and effortlessly compiled.

 At the same time, the fact that the individual continuously reveals his location to his wireless carrier implicates the third-party principle of Smith and Miller. But while the third-party doctrine applies to telephone numbers and bank records, it is not clear whether its logic extends to the qualitatively different category of cell-site  records. After all, when Smith was decided in 1979, few could have imagined a society in which a phone goes wherever its owner goes, conveying to the wireless carrier not just dialed digits, but a detailed and comprehensive record of the person’s movements.

 We decline to extend Smith and Miller to cover these novel circumstances.  Given the unique nature of cell phone location records, the fact that the information is held by a third party does not by itself overcome the user’s claim to Fourth Amendment protection. Whether the Government employs its own surveillance technology as in Jones or leverages the technology of a wireless carrier, we hold that an individual maintains a legitimate expectation of privacy in the record of his physical movements as captured through CSLI. The location information obtained from Carpenter’s wireless carriers was the product of a search.

 A

 A person does not surrender all Fourth Amendment protection by venturing into the public sphere. To the contrary, “what [one] seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected.” Katz, 389 U. S., at 351-352. A majority of this Court has already recognized that individuals have a reasonable expectation of privacy in the whole of their physical movements. Jones, 565 U. S., at 430. Prior to the digital age, law enforcement might have pursued a suspect for a brief stretch, but doing so “for any extended period of time was difficult and costly and therefore rarely undertaken.” Id., at 429, (opinion of Alito, J.). For that reason, “society’s expectation has been that law enforcement agents and others would not—and indeed, in the main, simply could not—secretly monitor and catalogue every single movement of an individual’s car for a very long period.” Id., at 430.

 Allowing government access to cell-site records contravenes that expectation. Although such records are generated for commercial purposes, that distinction does not negate Carpenter’s anticipation of privacy in his physical location. Mapping a cell phone’s location over the course of 127 days provides an all-encompassing record of the holder’s whereabouts. As with GPS information, the time-stamped data provides an intimate window into a person’s life, revealing not only his particular movements, but through them his “familial, political, professional, religious, and sexual associations.” Id., at 415, (opinion of Sotomayor, J.). These location records “hold for many Americans the ‘privacies of life.’” Riley, 573 U. S., at ___, (quoting Boyd, 116 U. S., at 630. And like GPS monitoring, cell phone tracking is remarkably easy, cheap, and efficient compared to traditional investigative tools. With just the click of a button, the Government can access each carrier’s deep repository of historical location information at practically no expense.

 In fact, historical cell-site records present even greater privacy concerns than the GPS monitoring of a vehicle we considered in Jones. Unlike the bugged container in Knotts or the car in Jones, a cell phone—almost a “feature of human anatomy,” Riley, 573 U. S., at ___, —tracks nearly exactly the movements of its owner. While individuals regularly leave their vehicles, they compulsively carry cell phones with them all the time. A cell phone faithfully follows its owner beyond public thoroughfares and into private residences, doctor’s offices, political headquarters, and other potentially revealing locales. See id., at ___, 134 S. Ct. 2473, (noting that “nearly three-quarters of smart phone users report being within five feet of their phones most of the time, with 12% admitting that they even use their phones in the shower”); contrast Cardwell v. Lewis, 417 U. S. 583, 590, (1974) (plurality opinion) (“A car has little capacity for escaping public scrutiny.”). Accordingly, when the Government tracks the location of a cell phone it achieves near perfect surveillance, as if it had attached an ankle monitor to the phone’s user.

 Moreover, the retrospective quality of the data here gives police access to a category of information otherwise unknowable. In the past, attempts to reconstruct a person’s movements were limited by a dearth of records and the frailties of recollection. With access to CSLI, the Government can now travel back in time to retrace a person’s whereabouts, subject only to the retention polices of the wireless carriers, which currently maintain records for up to five years. Critically, because location information is continually logged for all of the 400 million devices in the United States—not just those belonging to persons who might happen to come under investigation—this newfound tracking capacity runs against everyone. Unlike with the GPS device in Jones, police need not even know in advance whether they want to follow a particular individual, or when.

 Whoever the suspect turns out to be, he has effectively been tailed every moment of every day for five years, and the police may—in the Government’s view—call upon the results of that surveillance without regard to the constraints of the Fourth Amendment. Only the few without cell phones could escape this tireless and absolute surveillance.

 * * *

 Accordingly, when the Government accessed CSLI from the wireless carriers, it invaded Carpenter’s reasonable expectation of privacy in the whole of his physical movements.

 B

 The Government’s primary contention to the contrary is that the third-party doctrine governs this case. In its view, cell-site records are fair game because they are “business records” created and maintained by the wireless carriers. The Government (along with Justice Kennedy) recognizes that this case features new technology, but asserts that the legal question nonetheless turns on a garden-variety request for information from a third-party witness. Brief for United States 32-34; post, at 12-14.

 The Government’s position fails to contend with the seismic shifts in digital technology that made possible the tracking of not only Carpenter’s location but also everyone else’s, not for a short period but for years and years. Sprint Corporation and its competitors are not your typical witnesses. Unlike the nosy neighbor who keeps an eye on comings and goings, they are ever alert, and their memory is nearly infallible. There is a world of difference between the limited types of personal information addressed in Smith and Miller and the exhaustive chronicle of location information casually collected by wireless carriers today. The Government thus is not asking for a straightforward application of the third-party doctrine, but instead a significant extension of it to a distinct category of information.

 * * *

 We therefore decline to extend Smith and Miller to the collection of CSLI. Given the unique nature of cell phone location information, the fact that the Government obtained the information from a third party does not overcome Carpenter’s claim to Fourth Amendment protection. The Government’s acquisition of the cell-site records was a search within the meaning of the Fourth Amendment.

 * * *

 IV

Having found that the acquisition of Carpenter’s CSLI was a search, we also conclude that the Government must generally obtain a warrant supported by probable cause before acquiring such records. Although the “ultimate measure of the constitutionality of a governmental search is ‘reasonableness,’” our cases establish that warrantless searches are typically unreasonable where “a search is undertaken by law enforcement officials to discover evidence of criminal wrongdoing.” Vernonia School Dist. 47J v. Acton, 515 U. S. 646, 652-653 (1995). Thus, “[i]n the absence of a warrant, a search is reasonable only if it falls within a specific exception to the warrant requirement.” Riley, 573 U. S., at ___.

 * * *

 We decline to grant the state unrestricted access to a wireless carrier’s database of physical location information. In light of the deeply revealing nature of CSLI, its depth, breadth, and comprehensive reach, and the inescapable and automatic nature of its collection, the fact that such information is gathered by a third party does not make it any less deserving of Fourth Amendment protection. The Government’s acquisition of the cell-site records here was a search under that Amendment.

 The judgment of the Court of Appeals is reversed, and the case is remanded for further proceedings consistent with this opinion.

 It is so ordered.

 

 


Contact Us | Website ©2008 Jefferson Ingram. Last updated March 2012. Webmaster: L. Ingram.