Chapter 7
Update 7.6 |
Searches and Seizures: Houses, Places, Persons, and Vehicles
Carpenter v. United States
|
Significance of the Case: When police officers
do not procure a search warrant to obtain location data and other meta data
from the cell phone service provider where the data has been generated by the
use of a cell phone and held by the cell phone provider, the evidence
generated by the user and stored by the cell provider may not be used in court
against the owner/possessor of the cell phone.
Carpenter v. United States
___
U.S. ___ (2018), 138 S.Ct. 2206, 201 L. Ed. 2d 507, 2018 U.S. LEXIS 3844
(2018).
Some complete citations omitted.
Facts:
Police officers arrested four men who were suspects in a series of armed
robberies at RadioShack and T-Mobile stores in Detroit, Michigan and other
locations. One of the men
confessed that the group of robbers and getaway drivers had committed
robberies at nine different stores in Michigan and Ohio, and that they use
cell phones to coordinate their illegal robbery activities. The confessing
defendant gave police officers a variety of cell phone numbers that the
criminal group had used.
Based on that information, prosecutors applied for court orders [not
search warrants] under the federal Stored Communications Act to
obtain phone records for the defendant-appellant, Timothy Carpenter. The
above referenced statute allows state and federal governments to obtain
disclosure of telecommunication records, so long as it offers specific and
articulable facts showing that there are reasonable grounds [less
than probable cause] to believe that the communication records
sought are relevant in an ongoing criminal investigation. In this case, a
federal magistrate issued to court orders directing MetroPCS and Sprint to
disclose cell site location information for Carpenter’s cell phone at the
beginning of every call and the location of the termination of every call
during the four-month period that the robberies occurred. This personal cell
phone meta-data allowed the government to show where Mr. Carpenter's phone,
and probably where Mr. Carpenter, had been located during times when
robberies were about to or had occurred.
According to the data included in the case:
The first order sought 152 days of cell-site records from MetroPCS, which
produced records spanning 127 days. The second order requested seven
days of CSLI from Sprint, which produced two days of records covering the
period when Carpenter’s phone was “roaming” in northeastern Ohio.
Altogether the Government obtained 12,898 location points cataloging
Carpenter’s movements—an average of 101 data points per day.
After Carpenter was charged with six counts of robbery and six counts of
carrying a firearm during a federal crime of violence, he moved to suppress
the cell phone site data provided by the cell phone companies. He contended
that the seizure of his cell phone records violated his rights under the
Fourth Amendment because they had been obtained in the absence of a probable
cause-based warrant. After his motion to suppress was denied on the theory
that he had voluntarily shared this information with his wireless carriers,
and his disclosure to a third-party removed any expectation of privacy that
he otherwise might have possessed, the federal government proceeded to offer
proof of his involvement at his criminal trial.
The government witnesses helped to prove his presence at the robbery
properties during the relevant time by presenting Carpenter’s cell phone
metadata that the phone company recorded in its usual course of business.
The evidence against Carpenter, including his cell phone records and company
meta data resulted in his conviction on all but one of the firearms counts
and he was sentenced to more than 100 years in prison.
The Sixth Circuit Court of Appeal affirmed the convictions based on
then current federal interpretations.
The Supreme Court of the United States granted certiorari to consider
Carpenter’s Fourth Amendment claims related to the search and use of his
cell data.
Procedural Issue:
Does a state or the federal government conduct an illegal Fourth Amendment
search when it obtains historical cell phone data and records from service
providers without using a warrant based on probable cause?
Held: Yes.
Rationale:
Opinion by Chief Justice Roberts.
* * *
I
A
* * *
Cell phones continuously scan their environment looking for the best signal,
which generally comes from the closest cell site. Most modern devices, such
as smartphones, tap into the wireless network several times a minute
whenever their signal is on, even if the owner is not using one of the
phone’s features. Each time the phone connects to a cell site, it generates
a time-stamped record known as cell-site location information (CSLI). The
precision of this information depends on the size of the geographic area
covered by the cell site. The greater the concentration of cell sites, the
smaller the coverage area. As data usage from cell phones has increased,
wireless carriers have installed more cell sites to handle the traffic. That
has led to increasingly compact coverage areas, especially in urban areas.
Wireless carriers collect and store CSLI for their own business purposes,
including finding weak spots in their network and applying “roaming” charges
when another carrier routes data through their cell sites. In addition,
wireless carriers often sell aggregated location records to data brokers,
without individual identifying information of the sort at issue here. While
carriers have long retained CSLI for the start and end of incoming calls, in
recent years phone companies have also collected location information from
the transmission of text messages and routine data connections. Accordingly,
modern cell phones generate increasingly vast amounts of increasingly
precise CSLI.
II
* * *
For much of our history, Fourth Amendment search doctrine was “tied to
common-law trespass” and focused on whether the Government “obtains
information by physically intruding on a constitutionally protected area.”
United States v. Jones, 565 U. S. 400, 405, 406, n. 3, (2012). More
recently, the Court has recognized that “property rights are not the sole
measure of Fourth Amendment violations.” Soldal v. Cook County, 506 U. S.
56, 64, (1992). In Katz v. United States, 389 U. S. 347, 351 (1967), we
established that “the Fourth Amendment protects people, not places,” and
expanded our conception of the Amendment to protect certain expectations of
privacy as well. When an individual “seeks to preserve something as
private,” and his expectation of privacy is “one that society is prepared to
recognize as reasonable,” we have held that official intrusion into that
private sphere generally qualifies as a search and requires a warrant
supported by probable cause. Smith [v. Maryland], 442 U. S. [735], at 740. [At
the time, the use of a pen register was held not to constitute a search.
Statutory law has changes somewhat since then.]
Although no single rubric definitively resolves which expectations of
privacy are entitled to protection, the analysis is informed by historical
understandings “of what was deemed an unreasonable search and seizure when
[the Fourth Amendment] was adopted.” Carroll v. United States, 267 U. S.
132, 149 (1925). On this score, our cases have recognized some basic
guideposts. First, that the Amendment seeks to secure “the privacies of
life” against “arbitrary power.” Boyd v. United States, 116 U. S. 616, 630
(1886). Second, and relatedly, that a central aim of the Framers was “to
place obstacles in the way of a too permeating police surveillance.” United
States v. Di Re, 332 U. S. 581, 595 (1948).
We have kept this attention to Founding-era understandings in mind when
applying the Fourth Amendment to innovations in surveillance tools. As
technology has enhanced the Government’s capacity to encroach upon areas
normally guarded from inquisitive eyes, this Court has sought to
“preservation of that degree of privacy against government that existed when
the Fourth Amendment was adopted.” Kyllo v. United States, 533 U. S. 27, 34
(2001). For that reason, we rejected in Kyllo a “mechanical interpretation”
of the Fourth Amendment and held that use of a thermal imager to detect heat
radiating from the side of the defendant’s home was a search. Because any
other conclusion would leave homeowners “at the mercy of advancing
technology,” we determined that the Government—absent a warrant—could not
capitalize on such new sense-enhancing technology to explore what was
happening within the home.
Likewise in Riley, the Court recognized the “immense storage
capacity” of modern cell phones in holding that police officers must
generally obtain a warrant before searching the contents of a phone. 573 U.
S., at ___. We explained that while the general rule allowing warrantless
searches incident to arrest “strikes the appropriate balance in the context
of physical objects, neither of its rationales has much force with respect
to” the vast store of sensitive information on a cell phone. Id., at ___.
B
The case before us involves the Government’s acquisition of wireless carrier
cell-site records revealing the location of Carpenter’s cell phone whenever
it made or received calls. This sort of digital data—personal location
information maintained by a third party—does not fit neatly under existing
precedents. Instead, requests for cell-site records lie at the intersection
of two lines of cases, both of which inform our understanding of the privacy
interests at stake.
The first set of cases addresses a person’s expectation of privacy in
his physical location and movements. In United States v. Knotts, 460 U. S.
276 (1983), we considered the Government’s use of a “beeper” to aid in
tracking a vehicle through traffic. Police officers in that case planted a
beeper in a container of chloroform before it was purchased by one of
Knotts’s co-conspirators. The officers (with intermittent aerial assistance)
then followed the automobile carrying the container from Minneapolis to
Knotts’s cabin in Wisconsin, relying on the beeper’s signal to help keep the
vehicle in view. The Court concluded that the “augment[ed]” visual
surveillance did not constitute a search because “[a] person traveling in an
automobile on public thoroughfares has no reasonable expectation of privacy
in his movements from one place to another.” Id., at 281, 282. Since the
movements of the vehicle and its final destination had been “voluntarily
conveyed to anyone who wanted to look,” Knotts could not assert a privacy
interest in the information obtained. Id., at 281.
This Court in Knotts, however, was careful to distinguish between the
rudimentary tracking facilitated by the beeper and more sweeping modes of
surveillance. The Court emphasized the “limited use which the government
made of the signals from this particular beeper” during a discrete
“automotive journey.” Id., at 284, 285. Significantly, the Court reserved
the question whether “different constitutional principles may be applicable”
if “twenty-four hour surveillance of any citizen of this country [were]
possible.” Id., at 283-284.
Three decades later, the Court considered more sophisticated
surveillance of the sort envisioned in Knotts and found that different
principles did indeed apply. In United States v. Jones, FBI agents installed
a GPS tracking device on Jones’s vehicle and remotely monitored the
vehicle’s movements for 28 days. The Court decided the case based on the
Government’s physical trespass of the vehicle. 565 U. S., at 404-405. At the
same time, five Justices agreed that related privacy concerns would be
raised by, for example, “surreptitiously activating a stolen vehicle
detection system” in Jones’s car to track Jones himself, or conducting GPS
tracking of his cell phone. Id., at 426, 428, (Alito, J., concurring in
judgment); id., at 415, (Sotomayor, J., concurring).
Since GPS monitoring of a vehicle tracks “every movement” a person
makes in that vehicle, the concurring Justices concluded that “longer term
GPS monitoring in investigations of most offenses impinges on expectations
of privacy”—regardless whether those movements were disclosed to the public
at large. Id., at 430.
In a second set of decisions, the Court has drawn a line between what
a person keeps to himself and what he shares with others. We have previously
held that “a person has no legitimate expectation of privacy in information
he voluntarily turns over to third parties.” Smith, 442 U. S., at 743-744.
That remains true “even if the information is revealed on the assumption
that it will be used only for a limited purpose.” United States v. Miller,
425 U. S. 435, 443, (1976). As a result, the Government is typically free to
obtain such information from the recipient without triggering Fourth
Amendment protections.
This third-party doctrine largely traces its roots to Miller. While
investigating Miller for tax evasion, the Government subpoenaed his banks,
seeking several months of canceled checks, deposit slips, and monthly
statements. The Court rejected a Fourth Amendment challenge to the records
collection. For one, Miller could “assert neither ownership nor possession”
of the documents; they were “business records of the banks.” Id., at 440.
For another, the nature of those records confirmed Miller’s limited
expectation of privacy, because the checks were “not confidential
communications but negotiable instruments to be used in commercial
transactions,” and the bank statements contained information “exposed to
[bank] employees in the ordinary course of business.” Id., at 442. The Court
thus concluded that Miller had “take[n] the risk, in revealing his affairs
to another, that the information [would] be conveyed by that person to the
Government.” Id., at 443.
Three years later, Smith applied the same principles in the context
of information conveyed to a telephone company. The Court ruled that the
Government’s use of a pen register—a device that recorded the outgoing phone
numbers dialed on a landline telephone—was not a search. Noting the pen
register’s “limited capabilities,” the Court “doubt[ed] that people in
general entertain any actual expectation of privacy in the numbers they
dial.” 442 U. S., at 742. Telephone subscribers know, after all, that the
numbers are used by the telephone company “for a variety of legitimate
business purposes,” including routing calls. Id., at 743. And at any rate,
the Court explained, such an expectation “is not one that society is
prepared to recognize as reasonable.” Ibid. When Smith placed a call, he
“voluntarily conveyed” the dialed numbers to the phone company by
“expos[ing] that information to its equipment in the ordinary course of
business.” Id., at 744. Once again, we held that the defendant “assumed the
risk” that the company’s records “would be divulged to police.” Id., at 745.
III
The question we confront today is how to apply the Fourth Amendment
to a new phenomenon: the ability to chronicle a person’s past movements
through the record of his cell phone signals. Such tracking partakes of many
of the qualities of the GPS monitoring we considered in Jones. Much like GPS
tracking of a vehicle, cell phone location information is detailed,
encyclopedic, and effortlessly compiled.
At the same time, the fact that the individual continuously reveals
his location to his wireless carrier implicates the third-party principle of
Smith and Miller. But while the third-party doctrine applies to telephone
numbers and bank records, it is not clear whether its logic extends to the
qualitatively different category of cell-site
records. After all, when Smith was decided in 1979, few could have
imagined a society in which a phone goes wherever its owner goes, conveying
to the wireless carrier not just dialed digits, but a detailed and
comprehensive record of the person’s movements.
We decline to extend Smith and Miller to cover these novel
circumstances. Given the unique
nature of cell phone location records, the fact that the information is held
by a third party does not by itself overcome the user’s claim to Fourth
Amendment protection. Whether the Government employs its own surveillance
technology as in Jones or leverages the technology of a wireless carrier, we
hold that an individual maintains a legitimate expectation of privacy in the
record of his physical movements as captured through CSLI. The location
information obtained from Carpenter’s wireless carriers was the product of a
search.
A
A person does not surrender all Fourth Amendment protection by
venturing into the public sphere. To the contrary, “what [one] seeks to
preserve as private, even in an area accessible to the public, may be
constitutionally protected.” Katz, 389 U. S., at 351-352. A majority of this
Court has already recognized that individuals have a reasonable expectation
of privacy in the whole of their physical movements. Jones, 565 U. S., at
430. Prior to the digital age, law enforcement might have pursued a suspect
for a brief stretch, but doing so “for any extended period of time was
difficult and costly and therefore rarely undertaken.” Id., at 429, (opinion
of Alito, J.). For that reason, “society’s expectation has been that law
enforcement agents and others would not—and indeed, in the main, simply
could not—secretly monitor and catalogue every single movement of an
individual’s car for a very long period.” Id., at 430.
Allowing government access to cell-site records contravenes that
expectation. Although such records are generated for commercial purposes,
that distinction does not negate Carpenter’s anticipation of privacy in his
physical location. Mapping a cell phone’s location over the course of 127
days provides an all-encompassing record of the holder’s whereabouts. As
with GPS information, the time-stamped data provides an intimate window into
a person’s life, revealing not only his particular movements, but through
them his “familial, political, professional, religious, and sexual
associations.” Id., at 415, (opinion of Sotomayor, J.). These location
records “hold for many Americans the ‘privacies of life.’” Riley, 573 U. S.,
at ___, (quoting Boyd, 116 U. S., at 630. And like GPS monitoring, cell
phone tracking is remarkably easy, cheap, and efficient compared to
traditional investigative tools. With just the click of a button, the
Government can access each carrier’s deep repository of historical location
information at practically no expense.
In
fact, historical cell-site records present even greater privacy concerns
than the GPS monitoring of a vehicle we considered in Jones. Unlike the
bugged container in Knotts or the car in Jones, a cell phone—almost a
“feature of human anatomy,” Riley, 573 U. S., at ___, —tracks nearly exactly
the movements of its owner. While individuals regularly leave their
vehicles, they compulsively carry cell phones with them all the time. A cell
phone faithfully follows its owner beyond public thoroughfares and into
private residences, doctor’s offices, political headquarters, and other
potentially revealing locales. See id., at ___, 134 S. Ct. 2473, (noting
that “nearly three-quarters of smart phone users report being within five
feet of their phones most of the time, with 12% admitting that they even use
their phones in the shower”); contrast Cardwell v. Lewis, 417 U. S. 583,
590, (1974) (plurality opinion) (“A car has little capacity for escaping
public scrutiny.”). Accordingly, when the Government tracks the location of
a cell phone it achieves near perfect surveillance, as if it had attached an
ankle monitor to the phone’s user.
Moreover, the retrospective quality of the data here gives police
access to a category of information otherwise unknowable. In the past,
attempts to reconstruct a person’s movements were limited by a dearth of
records and the frailties of recollection. With access to CSLI, the
Government can now travel back in time to retrace a person’s whereabouts,
subject only to the retention polices of the wireless carriers, which
currently maintain records for up to five years. Critically, because
location information is continually logged for all of the 400 million
devices in the United States—not just those belonging to persons who might
happen to come under investigation—this newfound tracking capacity runs
against everyone. Unlike with the GPS device in Jones, police need not even
know in advance whether they want to follow a particular individual, or
when.
Whoever the suspect turns out to be, he has effectively been tailed
every moment of every day for five years, and the police may—in the
Government’s view—call upon the results of that surveillance without regard
to the constraints of the Fourth Amendment. Only the few without cell phones
could escape this tireless and absolute surveillance.
* * *
Accordingly, when the Government accessed CSLI from the wireless
carriers, it invaded Carpenter’s reasonable expectation of privacy in the
whole of his physical movements.
B
The Government’s primary contention to the contrary is that the
third-party doctrine governs this case. In its view, cell-site records are
fair game because they are “business records” created and maintained by the
wireless carriers. The Government (along with Justice Kennedy) recognizes
that this case features new technology, but asserts that the legal question
nonetheless turns on a garden-variety request for information from a
third-party witness. Brief for United States 32-34; post, at 12-14.
The Government’s position fails to contend with the seismic shifts in
digital technology that made possible the tracking of not only Carpenter’s
location but also everyone else’s, not for a short period but for years and
years. Sprint Corporation and its competitors are not your typical
witnesses. Unlike the nosy neighbor who keeps an eye on comings and goings,
they are ever alert, and their memory is nearly infallible. There is a world
of difference between the limited types of personal information addressed in
Smith and Miller and the exhaustive chronicle of location information
casually collected by wireless carriers today. The Government thus is not
asking for a straightforward application of the third-party doctrine, but
instead a significant extension of it to a distinct category of information.
* * *
We therefore decline to extend Smith and Miller to the collection of
CSLI. Given the unique nature of cell phone location information, the fact
that the Government obtained the information from a third party does not
overcome Carpenter’s claim to Fourth Amendment protection. The Government’s
acquisition of the cell-site records was a search within the meaning of the
Fourth Amendment.
* * *
IV
Having found that the acquisition of Carpenter’s CSLI was a search, we also
conclude that the Government must generally obtain a warrant supported by
probable cause before acquiring such records. Although the “ultimate measure
of the constitutionality of a governmental search is ‘reasonableness,’” our
cases establish that warrantless searches are typically unreasonable where
“a search is undertaken by law enforcement officials to discover evidence of
criminal wrongdoing.” Vernonia School Dist. 47J v. Acton, 515 U. S. 646,
652-653 (1995). Thus, “[i]n the absence of a warrant, a search is reasonable
only if it falls within a specific exception to the warrant requirement.”
Riley, 573 U. S., at ___.
* * *
We decline to grant the state unrestricted access to a wireless
carrier’s database of physical location information. In light of the deeply
revealing nature of CSLI, its depth, breadth, and comprehensive reach, and
the inescapable and automatic nature of its collection, the fact that such
information is gathered by a third party does not make it any less deserving
of Fourth Amendment protection. The Government’s acquisition of the
cell-site records here was a search under that Amendment.
The judgment of the Court of Appeals is reversed, and the case is
remanded for further proceedings consistent with this opinion.
It is so ordered.