|
ECPA :: Mobile Phones |
|
© Cybertelecom ::Fourth Amendment
"The Fourth Amendment guarantees "[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures." U.S. Const. amend. IV. Cell phones plainly qualify as "effects" under the meaning of the Fourth Amendment. See Oliver v. United States, 466 U.S. 170, 177 n.7 (1984) ("The Framers would have understood the term `effects' to be limited to personal, rather than real, property.")." [Telephone Information NDCA 2015]
Compare: Derived From: 1985 ECPA Report Chapter 2 "Defendants have occasionally-and unsuccessfully-invoked Kyllo in cases in which the government used cell tower information or an electronic device to locate a cell phone. For example, in United States v. Bermudez, 2006 WL 3197181 (S.D. Ind. June 30, 2006), aff'd 509 F.3d 820 (7th Cir. 2007), the court rejected a Kyllo challenge to the use of an electronic device to locate a cell phone because cell phones are used to transmit signals to parties outside a home. In rejecting the defendant's Kyllo argument, the court explained that "the cell phone signals were knowingly exposed to a third-party, to wit, the cell phone company." Id. at *13."
Expectation of Privacy (Katz) Location Information
Derived From: Telephone Information NDCA 2015:
Neither the U.S. Supreme Court nor the Ninth Circuit has squarely addressed whether cell phone users possess a reasonable expectation of privacy in the CSLI, historical or otherwise, associated with their cell phones. The closest the Ninth Circuit has come was to issue a warning several years back in an unpublished decision: "The government's use at trial of [defendant's] cell site location information raises important and troublesome privacy questions not yet addressed by this court."United States v. Reyes, 435 F. App'x 596, 598 (9th Cir. 2011). In the absence of any binding authority, the Court ventures into this "troublesome" area of Fourth Amendment law as a matter of first impression.
Fortunately, the U.S. Supreme Court's cases on electronic surveillance prove instructive. In United States v. Knotts, the U.S. Supreme Court first applied the Katz test to electronic surveillance, holding that the Fourth Amendment was not violated when the government used a beeper to track a vehicle's movements on public roads. 460 U.S. 276, 277 (1983). The beeper tracking in Knotts did not implicate the Fourth Amendment because "[a] person travelling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements from one place to another." Id. at 281. The Knotts Court, however, left open the possibility that advances in surveillance technology would require it to reevaluate its decision. See id. at 283-84 (explaining that "if such dragnet type law enforcement practices as respondent envisions should eventually occur, there will be time enough then to determine whether different constitutional principles may be applicable").
The following year, in United States v. Karo, the U.S. Supreme Court cabined Knotts to surveillance in public places. 468 U.S. 705, 714 (1984). In Karo, the police placed a beeper in a container belonging to the defendant and monitored the beeper's location electronically, including while it was inside a private residence. Id. at 708-10. Tracking the beeper inside the home, the Karo Court explained, "reveal[ed] a critical fact about the interior of the premises that the Government is extremely interested in knowing and that it could not have otherwise obtained without a warrant." Id. at 715. As a result, the Karo Court held that monitoring the beeper inside the home "violate[d] the Fourth Amendment rights of those who have a justifiable interest in the privacy of the residence," even though the officers could not have known, when they planted the tracking device, that it would end up inside a house. Id. at 714-15; see also Kyllo,533 U.S. at 34 (holding that the government engages in a search in violation of the Fourth Amendment by using a thermal imager to detect heat signatures emanating from inside a house that would be invisible to the naked eye).
Most recently, in United States v. Jones, five Justices of the U.S. Supreme Court concluded that prolonged electronic location monitoring by the government, even when limited to public places, infringes on a legitimate expectation of privacy in violation of the Fourth Amendment. 132 S. Ct. 945, 955 (2012) (Sotomayor, J., concurring); id. at 965 (Alito, J., joined by Ginsburg, Breyer, & Kagan, JJ., concurring in the judgment). In Jones, the government installed a GPS tracking device on the defendant's car and used it to monitor the car's location — on public roads — for twenty-eight days. Id. at 948 (majority opinion). The majority opinion held that the government violated the Fourth Amendment by the physical trespass of placing the tracking device on the vehicle without the defendant's consent. Id. at 949. The majority therefore did not need to address whether the government's location tracking also violated the defendant's reasonable expectation of privacy. Id. at 950-51. The majority explicitly noted, however, that "[s]ituations involving merely the transmission of electronic signals without trespass would remain subject to Katz analysis." Id. at 953.
The five Justices who did engage in a Katz analysis concluded that the government's actions in tracking the car's location over twenty-eight days violated the Fourth Amendment. Jones, 132 S. Ct. at 955 (Sotomayor, J., concurring); id. at 964 (Alito, J., concurring in the judgment). Although the government tracked the car only as it traveled in plain sight on public streets and highways, Justice Alito, joined by Justices Ginsburg, Breyer, and Kagan, concluded that the GPS monitoring "involved a degree of intrusion that a reasonable person would not have anticipated."Id. at 964 (Alito, J., concurring in the judgment). Consequently, those four Justices found that "the use of longer term GPS monitoring in investigations of most offenses impinges on expectations of privacy." Id. Notably, this conclusion did not depend on the type of technology used to track the car in Jones. Rather, the four Justices emphasized the proliferation of modern devices that track people's movements, noting that cell phones were "perhaps [the] most significant" among these. Id. at 963.
Justice Sotomayor agreed with her four colleagues that prolonged electronic surveillance would violate the Fourth Amendment. Jones, 132 S. Ct. at 955 (Sotomayor, J., concurring).[4] She added, however, that "even short-term monitoring" raises concerns under Katz because "GPS monitoring generates a precise, comprehensive record of a person's public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations."Id. Justice Sotomayor was particularly concerned with "the existence of a reasonable societal expectation of privacy in the sum of one's public movements." Id. at 956 (emphasis added). In particular, she wondered "whether people reasonably expect that their movements will be recorded and aggregated in a manner that enables the Government to ascertain, more or less at will, their political and religious beliefs, sexual habits, and so on." Id.; see also CIA v. Sims, 471 U.S. 159, 178 (1985) (finding it within the CIA director's discretion not to disclose "superficially innocuous information" that might reveal an intelligence source's identity because "what may seem trivial to the uninformed, may appear of great moment to one who has a broad view of the scene and may put the questioned item of information in its proper context" (brackets and internal quotation marks omitted)). When governmental actions intrude upon someone's privacy to that degree, Justice Sotomayor concluded, a warrant is required. Jones, 132 S. Ct. at 955 (Sotomayor, J., concurring).
Two years later, the U.S. Supreme Court cited Justice Sotomayor's concurrence in Jones with approval in holding that police must obtain a warrant to search the contents of an arrestee's cell phone. Riley v. California, 134 S. Ct. 2473, 2490 (2014). Prior to Riley, the U.S. Supreme Court had adopted a categorical rule that, under the longstanding search-incident-to-arrest exception to the warrant requirement, the police need not obtain a warrant before searching "personal property immediately associated with the person of the arrestee." Id. at 2484 (ellipsis omitted) (quoting United States v. Chadwick, 433 U.S. 1, 15 (1977)); see also United States v. Robinson, 414 U.S. 218, 235 (1973). In holding that a warrant was required to search the contents of an arrestee's cell phone, the Riley Court found that "[c]ell phones differ in both a quantitative and a qualitative sense from other objects that might be kept on an arrestee's person." 134 S. Ct. at 2489. In addition to "their immense storage capacity" and "pervasiveness" in American society, cell phones were further distinguished from conventional items an arrestee might be carrying in that "[d]ata on a cell phone can also reveal where a person has been." Id. at 2489-90. Relying on Justice Sotomayor's concurrence in Jones, the Riley Court explained its concern: "Historic location information is a standard feature on many smart phones and can reconstruct someone's specific movements down to the minute, not only around town but also within a particular building." Id. at 2490.
Based on the preceding U.S. Supreme Court cases, the following principles are manifest: (1) an individual's expectation of privacy is at its pinnacle when government surveillance intrudes on the home; (2) long-term electronic surveillance by the government implicates an individual's expectation of privacy; and (3) location data generated by cell phones, which are ubiquitous in this day and age, can reveal a wealth of private information about an individual. Applying those principles to the information sought here by the government, the Court finds that individuals have an expectation of privacy in the historical CSLI associated with their cell phones, and that such an expectation is one that society is willing to recognize as reasonable.See Katz, 389 U.S. at 360-61 (Harlan, J., concurring).
Here, as in Jones, the government seeks permission to track the movement of individuals — without a warrant — over an extended period of time and by electronic means. CSLI, like GPS, can provide the government with a "comprehensive record of a person's public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations." Riley, 134 S. Ct. at 2490 (quoting Jones, 132 S. Ct. at 955 (Sotomayor, J., concurring)). With the proliferation of smaller and smaller base stations such as microcells, picocells, and femtocells — which cover a very specific area, such as one floor of a building, the waiting room of an office, or a single home, see Blaze Testimony at 43-44 — the government is able to use historical CSLI to track an individual's past whereabouts with ever increasing precision. See Riley, 134 S. Ct. at 2490 (explaining that a cell phone's "[h]istoric location information . . . can reconstruct someone's specific movements down to the minute, not only around town but also within a particular building"). At oral argument, the government agreed that in some instances CSLI could locate an individual within her home, Hr'g Tr. at 30:15-20, 31:16-32:4, and did not dispute that CSLI will become more precise as the number of cell towers continues to multiply, id. at 32:5-9. This admission is of constitutional significance because rules adopted under the Fourth Amendment "must take account of more sophisticated systems that are already in use or in development." Kyllo, 533 U.S. at 36.
In fact, the information the government seeks here is arguably more invasive of an individual's expectation of privacy than the GPS device attached to the defendant's car in Jones. This is so for two reasons. First, as the government conceded at the hearing, over the course of sixty days an individual will invariably enter constitutionally protected areas, such as private residences. Hr'g Tr. at 18:15-24. Tracking a person's movements inside the home matters for Fourth Amendment purposes because "private residences are places in which the individual normally expects privacy free of governmental intrusion not authorized by a warrant, and that expectation is plainly one that society is prepared to recognize as justifiable." Karo,468 U.S. at 714; see also Kyllo, 533 U.S. at 31 ("At the very core of the Fourth Amendment stands the right of a man to retreat into his own home and there be free from unreasonable governmental intrusion." (internal quotation marks omitted)). As one court put it, "Because cellular telephone users tend to keep their phone on their person or very close by, placing a particular cellular telephone within a home is essentially the corollary of locating the user within the home." See In re Application of U.S. for an Order Authorizing Disclosure of Location Info. of a Specified Wireless Tel., 849 F. Supp. 2d 526, 541 (D. Md. 2011).Second, the government conceded at oral argument that, compared to GPS tracking of a car, the government will "get more information, more data points, on the cell phone" via historical CSLI. Hr'g Tr. at 29:8-9; see also id. at 29:19-21 ("But, yes, of course the person has the phone more than they have their car, most people at least do, so it gives [the government] more data."). Cell phones generate far more location data because, unlike the vehicle in Jones, cell phones typically accompany the user wherever she goes. See Wessler Decl. ¶¶ 8-10 (describing a Sixth Circuit case,United States v. Carpenter, where the government obtained 23,034 cell site location data points for one defendant over a period of eighty-eight days). Indeed, according to a survey cited by the U.S. Supreme Court in Riley, "nearly three-quarters of smart phone users report being within five feet of their phones most of the time, with 12% admitting that they even use their phones in the shower." 134 S. Ct. at 2490 (citing Harris Interactive, 2013 Mobile Consumer Habits Study (June 2013).
In finding a reasonable expectation of privacy in historical CSLI, the Court notes its agreement with another judge in this district. In United States v. Cooper, No. 13-CR-00693-SI-1, 2015 WL 881578, at *8 (N.D. Cal. Mar. 2, 2015), Judge Illston observed that "many, if not most, will find their cell phone quite literally attached to their hip throughout the day." "All the while," Judge Illston continued, "these phones connect to cell towers, and thereby transmit enormous amounts of data, detailing the phone-owner's physical location any time he or she places or receives a call or text." Id."However, there is no indication to the user that making [a] call will also locate the [user]." Id. (internal quotation marks omitted) (quoting Third Circuit Opinion, 620 F.3d at 317). This Court agrees further with Judge Illston that an individual's "reasonable expectation of privacy in his or her location is especially acute when the call is made from a constitutionally protected area, such as inside a home." Id. Judge Illston's reasoning is all the more compelling when one considers that historical CSLI is also generated by passive activities such as automatic pinging, continuously running applications ("apps"), and the receipt of calls and text messages. Moreover, over a sixty-day period, as the government concedes, the government would inevitably obtain CSLI generated from inside the home. Hr'g Tr. at 18:15-24.
Furthermore, the Public Defender and amici point to evidence that individuals harbor a subjective expectation of privacy in the historical CSLI associated with their cell phones. For example, EFF informs the Court that in a 2014 survey, the Pew Research Center ("Pew") found that 82% of American adults consider details of their physical location over time to be sensitive information. EFF Br. at 2 (citing Pew Research Ctr., Public Perceptions of Privacy and Security in the Post-Snowden Era 32 (2014)). This figure is higher than the percentage of individuals surveyed who consider their relationship history, religious or political views, or the content of their text messages to be sensitive. Id. at 2-3. In a 2012 survey, Pew found that smartphone owners typically take precautions to protect access to their mobile data, with nearly one-third of them responding that they had turned off the location tracking feature on their phone due to concerns over who might access that information. See Jan Lauren Boyles et al., Pew Research Internet & Am. Life Project, Privacy and Data Management on Mobile Devices 3-4, 8 (2012). Further, a 2013 survey conducted on behalf of the Internet company TRUSTe found that 69% of American smart phone users did not like the idea of being tracked. David Deasy, TRUSTe Study Reveals Smartphone Users More Concerned About Mobile Privacy Than Brand or Screen Size, TRUSTe Blog (Sept. 5, 2013), . The government does not dispute this evidence, which the Court properly considers. See Riley, 134 S. Ct. at 2490 (relying on survey data demonstrating the ubiquity of cell phones).
This survey data is all the more salient because cell phone users who take affirmative measures to protect their location information may still generate CSLI that the government can obtain. EFF cites Pew surveys from 2012 showing that 30% of all smart phone owners turned off location tracking on their phones while "46% of teenagers turned location services off." EFF Br. at 3. Turning off location services, however, does not preclude CSLI from being generated. As the ACLU explains, "many smartphones include a location privacy setting that, when enabled, prevents applications from accessing the phone's location. But this setting has no impact upon carriers' ability to learn the cell sector in use." ACLU Br. at 13. In other words, even though a user may demonstrate a subjective expectation of privacy by disabling an app's location identification features, that user's cell phone will still generate CSLI whenever the phone makes or receives a call, sends or receives a text, sends or receives data, or merely "checks in" with a nearby cell tower.
What is more, society's expectation of privacy in historical CSLI is evidenced by the myriad state statutes and cases suggesting that cell phone users "can claim a justifiable, a reasonable, or a legitimate expectation of privacy" in this kind of information. Knotts, 460 U.S. at 280 (internal quotation marks omitted). Although state law is not dispositive of the issue, "the recognition of a privacy right by numerous states may provide insight into broad societal expectations of privacy."Cooper, 2015 WL 881578, at *8 (quoting United States v. Velasquez, No. CR 08-0730 WHA, 2010 WL 4286276, at *5 (N.D. Cal. Oct. 22, 2010)). In California, for instance, where this Court sits, it has been the law for more than three decades that police need a warrant to obtain telephone records. See People v. Blair, 25 Cal. 3d 640, 654-55 (1979); see also People v. Chapman, 36 Cal. 3d 98, 107 (1984) ("This court held [in Blair] that under the California Constitution, [telephone] records are protected from warrantless disclosure."), disapproved of on other grounds by People v. Palmer, 24 Cal. 4th 856 (2001). As Blair involved nothing more than "a list of telephone calls" made from the defendant's California hotel room, see Blair, 25 Cal. 3d at 653, there is little doubt that the California Supreme Court's holding applies with full force to the government's application here, which seeks historical CSLI generated by a target cell phone's every call, text, or data connection, in addition to any telephone numbers dialed or texted.
Outside of California, the high courts of Florida, Massachusetts and New Jersey have all recognized a reasonable expectation of privacy in CSLI. See Tracey v. State, 152 So. 3d 504, 525-26 (Fla. 2014) (prospective CSLI); Commonwealth v. Augustine, 4 N.E.3d 846, 850 (Mass. 2014) (historical CSLI); State v. Earls, 70 A.3d 630, 644 (N.J. 2013) (prospective CSLI). The high courts of Massachusetts and New Jersey found a reasonable expectation of privacy under their respective state constitutions, while the Florida Supreme Court based its ruling on the federal Fourth Amendment. In reaching its decision, the Florida Supreme Court explained that "because cell phones are indispensable to so many people and are normally carried on one's person, cell phone tracking can easily invade the right to privacy in one's home or other private areas, a matter that the government cannot always anticipate and one which, when it occurs, is clearly a Fourth Amendment violation." Tracey,152 So. 3d at 524. Relying on Justice Sotomayor's concurrence in Jones, the Florida Supreme Court found that "owners of cell phones or cars equipped with GPS capability do not contemplate that the devices will be used to enable covert surveillance of their movements." Id. (citing Jones, 132 S. Ct. at 956 at n.* (Sotomayor, J., concurring)). On that basis, the Tracey Court held that the defendant "had a subjective expectation of privacy in the location signals transmitted solely to enable the private and personal use of his cell phone," and that "such a subjective expectation of privacy of location as signaled by one's cell phone — even on public roads — is an expectation of privacy that society is now prepared to recognize as objectively reasonable." Id. at 525-26 (citing Katz, 389 U.S. at 360-61 (Harlan, J., concurring)).
Six more states have legislated privacy protections for historical CSLI. Colorado, Maine, Minnesota, Montana, Tennessee, and Utah have passed statutes expressly requiring law enforcement to apply for a search warrant to obtain this data. See Colo. Rev. Stat. § 16-3-303.5(2); Me. Rev. Stat. tit. 16, § 648; Minn. Stat. §§ 626A.28(3)(d), 626A.42(2); Mont. Code Ann. § 46-5-110(1)(a); Tenn. Code Ann. § 39-13-610(b); Utah Code Ann. § 77-23c-102(1)(a). In Utah, for example, "a government entity may not obtain the location information . . . of an electronic device without a search warrant issued by a court upon probable cause," subject to a handful of exceptions. Utah Code Ann. § 77-23c-102(1)(a). At least six additional states — Illinois, Indiana, Maryland, Virginia, Washington, and Wisconsin — have passed laws requiring police to obtain a search warrant to track a cell phone in real time. See 725 Ill. Comp. Stat. 168/10; Ind. Code § 35-33-5-12; Md. Code Ann., Crim. Proc. § 1-203.1; Va. Code Ann. 19.2-56.2; Wash. Rev. Code 9.73.260; Wis. Stat. § 968.373(2). Indiana, for instance, generally bars government tracking of cell phones in real time unless law enforcement "has obtained an order issued by a court based upon a finding of probable cause to use the tracking instrument." Ind. Code § 35-33-5-12(a).
For all the foregoing reasons, the Court concludes that cell phone users have an expectation of privacy in the historical CSLI associated with their cell phones, and that society is prepared to recognize that expectation as objectively reasonable. Cell phone users do not expect that law enforcement will be able to track their movements 24/7 for a sixty-day period simply because the users keep their cell phones turned on. That expectation, the Court finds, is eminently reasonable.Fourth Amendment :: Exception :: Exigent Circumstances
Exigent circumstances justify search
- United States v. Young, 2006 WL 1302667, at *13 (N.D.W.Va. May 9, 2006) (exigent circumstances justified searching a cell phone for text messages where the cell phone had an option for automatically deleting text messages after one day).
- United States v. Parada, 289 F. Supp. 2d 1291 (D. Kan. 2003), a court reached the same result for a cell phone, although the court's analysis may have been based in part on a misunderstanding of how cell phones function. The court held that exigent circumstances justified the search of a cell phone because the phone had limited memory and subsequent calls could overwrite previously stored numbers, whether the phone was on or off. See id. at 1303-04.
Exigent circumstances do not justify a search
- In United States v. Morales-Ortiz, 376 F. Supp. 2d 1131, 1142 (D.N.M. 2004), the court held that exigent circumstances did not justify a search of the names and numbers held within a cell phone's address book. The court distinguished a search of the cell phone's address book records from the search of the incoming call log approved in Parada.
- United States v. Wall, 2008 WL 5381412, at *3-4 (S.D. Fla. Dec. 22, 2008) (noting that cell phones store text messages until they are deleted by the user and therefore rejecting argument that exigent circumstances justified search of seized cell phone);
- David, 756 F. Supp at 1392 n.2 (dismissing as lame the government's argument that exigent circumstances supported search of a battery-operated computer because the agent did not know how much longer the computer's batteries would live);
- United States v. Reyes, 922 F. Supp. 818, 835-36 (S.D.N.Y. 1996) (exigent circumstances could not justify search of a pager because the government agent unlawfully created the exigency by turning on the pager).
ECPA Exception :: Protection of Network :: Cloned Phones
this exception has been used by mobile telephone companies who are dealing with theft of service and cloned mobile phones. United States v. Pervaz, 118 F.3d 1, 5 (1st Cir. 1997)
Stored Communications Act
A cell phone does not constitute a "facility" under the SCA and therefore the SCA does not apply to data stored in a personal cell phone. Garcia v. City of Laredo, Court of Appeals, 5th Circuit 2012: [Shefts CDIll 2013 (server which syncs and backs-up emails does not constitute a facility through which ECS is provided)]
The Eleventh Circuit's decision in United States v. Steiger provides useful guidance. 318 F.3d 1039, 1049 (11th Cir. 2003). In Steiger, when a hacker accessed an individual's computer and obtained information saved to his hard drive, the court held such conduct was beyond the reach of the SCA. Id. The court found that "the SCA clearly applies . . . to information stored with a phone company, Internet Service Provider (ISP), or electronic bulletin board system," but does not, however, "appear to apply to the source's hacking into Steiger's computer to download images and identifying information stored on his hard-drive." Id. It noted that "the SCA may apply to the extent the source accessed and retrieved any information stored with Steiger's Internet service provider." Id. (emphasis added).
A number of district courts that have considered this question have also concluded that "the relevant `facilities' that the SCA is designed to protect are not computers that enable the use of an electronic communication service, but instead are facilities that are operated by electronic communication service providers and used to store and maintain electronic storage." Freedom Banc Mortg. Servs., Inc. v. O'Harra, No. 2:11-cv-01073, 2012 WL 3862209, at *9 (S. D. Ohio Sept. 5, 2012) (emphasis added). Recently, the Northern District of California held that a class of iPhone plaintiffs had no claim under the SCA because their iPhones did not "constitute `facilit[ies] through which an electronic communication service is provided.'" In re iPhone Application Litig., 844 F. Supp. 2d 1040, 1057-58 (N.D. Cal. 2012).[5]
Thus these courts agree that a "home computer of an end user is not protected by the SCA." Kerr, supra, at 1215 (footnote omitted). As explained by Orin Kerr in his widely cited law review article, the words of the statute were carefully chosen: "[T]he statute envisions aprovider (the ISP or other network service provider) and a user (the individual with an account with the provider), with the user's communications in the possession of the provider." Id. at 1215 n.47 (emphasis added) (citation omitted).
This reading of the statute is consistent with legislative history, as "Sen. Rep. No. 99-541 (1986)'s entire discussion of [the SCA] deals only with facilities operated by electronic communications services such as `electronic bulletin boards' and `computer mail facilit[ies],' and the risk that communications temporarily stored in these facilities could be accessed by hackers. It makes no mention of individual users' computers . . . ." In re DoubleClick Inc. Privacy Litig., 154 F. Supp. 2d 497, 512 (S.D.N.Y. 2001) (quoting S. REP. No. 99-541, at 36,reprinted in 1986 U.S.C.C.A.N. 3555, 3590).
Trap & Trace :: Mobile Phones
How Cell Site Location Information is Collected
Derived From: In Re Application For Telephone Information Needed For A Criminal Investigation, Case No. 15-XR-90304-HRL-1(LHK) (NDCA July 29, 2015) (citations omitted)
"Cell phones operate through the use of radio waves. To facilitate cell phone use, cellular service providers maintain a network of radio base stations — also known as cell towers — throughout their coverage areas. Most cell towers have multiple cell sectors (or "cell sites") facing in different directions. A cell site, in turn, is a specific portion of the cell tower containing a wireless antenna, which detects the radio signal emanating from a cell phone and connects the cell phone to the local cellular network or Internet. For instance, if a cell tower has three antennas, each corresponding cell site would service an area within a 120-degree arc.
"Whenever a cell phone makes or receives a call, sends or receives a text message, or otherwise sends or receives data, the phone connects via radio waves to an antenna on the closest cell tower, generating cell site location information (CSLI.) The resulting CSLI includes the precise location of the cell tower and cell site serving the subject cell phone during each voice call, text message, or data connection. If a cell phone moves away from the cell tower with which it started a call and closer to another cell tower, the phone connects seamlessly to that next tower.
"Significantly, CSLI may be generated in the absence of user interaction with the cell phone. For example, CSLI may still be generated during an incoming phone call that is not answered. Additionally, most modern smartphones have applications that continually run in the background, sending and receiving data without a user having to interact with the cell phone.
"Indeed, cell phones, when turned on and not in airplane mode, are always scanning their network's cellular environment. In so doing, cell phones periodically identify themselves to the closest cell tower — i.e., the one with the strongest radio signal — as they move throughout their network's coverage area. This process, known as "registration" or "pinging," facilitates the making and receiving of calls, the sending and receiving of text messages, and the sending and receiving of cell phone data. Pinging is automatic and occurs whenever the phone is on, without the user's input or control. A cell phone that is switched on will ping the nearest tower every seven to nine minutes. At oral argument, the Court was informed that at least some cellular service providers keep track of the CSLI generated by registration "pings.".
"As the number of cell phones has increased, the number of cell towers — and thus cell sites — has increased accordingly:
A sector can handle only a limited number of simultaneous call connections given the amount of radio spectrum "bandwidth" allocated to the wireless carrier. As the density of cellular users grows in a given area, the only way for a carrier to accommodate more customers is to divide the coverage area into smaller and smaller sectors, each served by its own base station and antenna. New services, such as 3G and LTE/4G Internet create additional pressure on the available spectrum bandwidth, usually requiring, again, that the area covered by each sector be made smaller and smaller.
Blaze Testimony at 54. Densely populated urban areas therefore have more cell towers covering smaller geographic locations. For example, within three miles of the San Jose Federal Courthouse, there are 199 towers (with applications for three more currently pending) and 652 separate antennas. Within just one mile of the Federal Courthouse in New York City, there are 118 towers and 1,086 antennas. [Compare "These towers can be up to 10 or more miles apart in rural areas and may be up to a half-mile or more apart even in urban areas." In re Application of United States, 405 F. Supp. 2d 435, 449 (S.D.N.Y. 2005)]
"In addition to the large, three-sided cell towers, smaller and smaller base stations are becoming increasingly common. Examples include microcells, picocells, and femtocells, all of which cover a very specific area, such as one floor of a building, the waiting room of an office, or a single home. This proliferation of base stations to cover smaller areas means that "knowing the identity of the base station (or sector ID) that handled a call is tantamount to knowing a phone's location to within a relatively small geographic area . . . sometimes effectively identifying individual floors and rooms within buildings." Although the ability of cellular service providers to track a cell phone's location within an area covered by a particular cell site might vary, it has become ever more possible for the government to use CSLI to calculate a cell phone user's "locations with a precision that approaches that of GPS."
"CSLI has gotten more precise over the years. The fact is new tools and techniques are continually being developed to track CSLI with greater precision. Cellular service providers, for instance, can triangulate the location of a cell phone within an area served by a particular cell site based on the strength, angle, and timing of that cell phone's signal measured across multiple cell site locations.
"Lastly, the volume of location data generated by an individuals' cell phone can be immense. For example, in United States v. Carpenter, a case now pending in the Sixth Circuit and arising out of the greater Detroit area, the government obtained 127 days of CSLI for one defendant, Timothy Carpenter, and 88 days of CSLI for another, Timothy Sanders. See United States v. Carpenter, No. 14-1572 (6th Cir. filed May 7, 2014). Carpenter's data include 6,449 separate call records for which CSLI was logged, comprising 12,898 cell site location data points. Sanders's records reveal 11,517 calls for which location information was logged, comprising 23,034 cell site location data points. Carpenter and Sanders, respectively, placed or received an average of 50.8 and 130.9 calls per day for which location data was recorded and later obtained by the government. For Carpenter, that amounts to an average of 102 location points per day, or one location point every 14 minutes. For Sanders, it amounts to an average of 262 location points per day, or one location point every six minutes."
The Pen/Trap Statute and Cell-Site Information
Historical Information
"An application for historical CSLI is governed by the Stored Communications Act ("SCA"), 18 U.S.C. § 2701 et seq., which was enacted in 1986 as Title II of the Electronic Communications Privacy Act ("ECPA"). The SCA covers the disclosure of communication information by providers of electronic communications, including cellular service providers. [T]he government seeks what is referred to in § 2703(c) as "a record or other information pertaining to a subscriber to or customer of [a provider of electronic communication service]," a term that expressly excludes the contents of communications. 18 U.S.C. § 2703(c)(1). Although the SCA makes no mention of historical CSLI, there is no dispute that the historical CSLI sought by the government qualifies as a stored "record or other information pertaining to a subscriber . . . or customer," and therefore falls within the scope of § 2703(c)(1). "
"In submitting its request to Judge Lloyd in this case, ... the government sought a court order under § 2703(d), as authorized by § 2703(c)(1)(B). The "specific and articulable facts" standard set forth in § 2703(d) requires a showing that is less than probable cause. See, e.g., United States v. Davis, 785 F.3d 498, 505 (11th Cir. 2015) (explaining that "[§ 2703(d)'s] statutory standard is less than the probable cause standard for a search warrant"); In re U.S. for Historical Cell Site Data ("Fifth Circuit Opinion"), 724 F.3d 600, 606 (5th Cir. 2013) ("The `specific and articulable facts' standard is a lesser showing than the probable cause standard that is required by the Fourth Amendment to obtain a warrant."); In re Application of U.S. for an Order Directing a Provider of Elec. Commc'n Serv. to Disclose Records to Gov't ("Third Circuit Opinion"), 620 F.3d 304, 315 (3d Cir. 2010) (explaining that the § 2703(d) standard is "less stringent than probable cause")." [In re Telephone Info NDCA 2015]
DOJ's View: Prospective Information
Derived From: Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations Computer Crime and Intellectual Property Section, Criminal Division, DOJ, p 158 (2009) (Remember: This is a rendition of the state of the law from law enforcement and reflects their views)
In most districts, investigators may obtain prospective cell-site information through an application that satisfies both the Pen/Trap statute and 18 U.S.C. § 2703(d). The rationale behind this "hybrid" use of the Pen/Trap statute and § 2703(d) is as follows. Cell-site data is "dialing, routing, addressing, or signaling information," and therefore 18 U.S.C. § 3121(a) requires the government to obtain a pen/trap order to acquire this information. However, the Communications Assistance for Law Enforcement Act of 1994 ("CALEA") precludes the government from relying "solely" on the authority of the Pen/ Trap statute to obtain cell-site data for a cell phone subscriber. 47 U.S.C. § 1002(a). Thus, some additional authority is required to obtain prospective cellsite information. Section 2703(d) provides this authority because it authorizes the government to use a court order to obtain all non-content information pertaining to a customer or subscriber of an electronic communication service.
"When seeking a hybrid order for prospective cell-site information, prosecutors must satisfy the requirements of both the Pen/Trap statute and 18 U.S.C. § 2703(d). This application should contain:
(i) a government attorney's affirmation "that the information likely to be obtained is relevant to an ongoing criminal investigation," 18 U.S.C. § 3122, and
(ii) a further demonstration by the government attorney of "specific and articulable facts showing that there are reasonable grounds to believe that the contents of a wire or electronic communication, or the records or other information sought, are relevant and material to an ongoing criminal investigation." 18 U.S.C. § 2703(d).
Hybrid orders otherwise generally follow the procedures for pen/trap orders.
"District courts and magistrate judges have split on whether hybrid orders may be used to compel disclosure of prospective cell-site information.
Hybrid Orders
- In re Application of United States, 2008 WL 5082506 (E.D.N.Y. 2008) (upholding hybrid orders for cell-site information),
- In re Application of United States, 460 F. Supp. 2d. 448, 462 (S.D.N.Y. 2006) (same),
- In re Application of United States, 433 F. Supp. 2d 804, 806 (S.D. Tex. 2006) (same),
Rejecting Hybrid Orders
- In re Application of United States, 416 F. Supp. 2d 390, 396-97 (D. Md. 2006) (rejecting hybrid orders, required the government to obtain a warrant to compel disclosure of prospective cell-site information),
- In re Application of United States, 396 F. Supp. 2d 294, 327 (E.D.N.Y. 2005) (same).
Most of these courts have not held that a warrant is constitutionally required to obtain prospective cell-site information. Instead, they have held that as a matter of statutory construction, the Pen/Trap statute and 18 U.S.C. § 2703(d) cannot be used to obtain prospective cellsite information, and that Rule 41 can be used because it "governs any matter in which the government seeks judicial authorization to engage in certain investigative activities." In re Application of United States, 396 F. Supp. 2d at 322. []
Third Party Doctrine
Derived From: In re Telephone Info NDCA 2015
"Cell phone users, by contrast, do not "voluntarily convey" their location to the cellular service provider in the manner contemplated by Miller and Smith. This is especially true when historical CSLI is generated just because the cell phone is on, such as when cell phone apps are sending and receiving data in the background or when the cell phone is "pinging" a nearby cell tower. As the government's FBI special agent explained, "CSLI for a cellular telephone may still be generated in the absence of user interaction with a cellular telephone." Luna Decl. ¶ 3B. "For example," the special agent continued, CSLI may be generated by "applications that continually run in the background that send and receive data (e.g. email applications)." Id. At oral argument, the government confirmed that its § 2703(d) application authorizes the government to obtain historical CSLI generated by such activities. See Hr'g Tr. at 51:4-5.
"In addition, the government's FBI special agent informed the Court that a cell phone "is always scanning its network's cellular environment." Luna Decl. ¶ 3B. In so doing, a cell phone periodically identifies itself to the closest cell tower — not necessarily the closest cell tower geographically, but the one with the strongest radio signal — as it moves through its network's coverage area. Id.; Blaze Testimony at 50. This process, known as "registration" or "pinging," facilitates the making and receiving of calls, the sending and receiving of text messages, and the sending and receiving of cell phone data. See id. Pinging nearby cell towers is automatic and occurs whenever the phone is on, without the user's input or control. DHS Lesson Plan at 9. This sort of pinging happens every seven to nine minutes. Id. When "investigators desire to map the physical movement of a subject" through historical CSLI, they may do so by obtaining "[a] record of subject phone pings" from cellular service providers.Id. at 10. It is not clear that every cellular service provider records CSLI generated by such pings, see id., but the Court was informed at oral argument that Sprint, one of the cellular service providers listed in the government's application, does so, seeHr'g Tr. at 4:19-5:6. Although Sprint is not the service provider for any of the target cell phones, the government concedes that the instant application allows the government to obtain historical CSLI from Sprint if the target cell phones were to roam onto Sprint's network[5] or if one of the targets were to switch from Verizon or AT&T to Sprint during the sixty-day period but keep the same phone number pursuant to local number portability. See Schenk Decl. ¶ 1a; App. ¶ 2 & n.2.
"In Miller and Smith, the individual knew with certainty the information that was being conveyed and the third party to which the conveyance was made. Cell phone users, on the other hand, enjoy far less certainty with respect to CSLI. CSLI, in contrast to deposit slips or digits on a telephone, is neither tangible nor visible to a cell phone user. When the telephone user in Smith received his monthly bill from the phone company, the numbers he dialed would appear. See 442 U.S. at 742. The CSLI generated by a user's cell phone makes no such appearance. See Larsen Decl. ¶ 3c. Rather, because CSLI is generated automatically whenever a cell tower detects radio waves from a cell phone, a cell phone user typically does not know that her phone is communicating with a cell tower, much less the specific cell tower with which her phone is communicating. See Hr'g Tr. at 16:7-9. It may be, as the government explained, that a cell phone connects to "many towers" during the length of a call, id. at 3:9, and the tower to which a cell phone connects is not necessarily the closest one geographically, id. at 31:21-22. Moreover, when an app on the user's phone is continually running in the background, see Luna Decl. ¶ 3B, she may not be aware that the cell phone in her pocket is generating CSLI in the first place.
"Roaming poses an additional problem. As stated previously, roaming occurs when there is a gap in the network of a cell phone's provider and, as a result, the cell phone must connect to the cell tower of a different provider. See Larsen Decl. ¶¶ 2c, 4d (discussing roaming). Typically, a cell phone user does not know when her phone is roaming onto another provider's network, much less the name of the other provider on whose network her phone is roaming. As a result, cell phone users, unlike a bank depositor or telephone dialer, will often not know the identity of the third party to which they are supposedly conveying information. Unlike her counterparts in Miller orSmith, a cell phone user therefore has less reason to suspect that she is disclosing information to a third party, especially since she may not even know that the information is being disclosed or who the third party is.
"In light of the foregoing, the Court concludes that historical CSLI generated via continuously operating apps or automatic pinging does not amount to a voluntary conveyance of the user's location twenty-four hours a day for sixty days. Such data, it is clear, may be generated with far less intent, awareness, or affirmative conduct on the part of the user than what was at issue in Miller and Smith. Unlike the depositor in Miller who affirmatively conveyed checks and deposit slips to the bank, or the telephone user in Smith who affirmatively dialed the numbers recorded by the pen register, a cell phone user may generate historical CSLI simply because her phone is on and without committing any affirmative act or knowledge that CSLI is being generated. Smith, for example, never contemplated the disclosure of information while the landline telephone was not even in use.
"This sort of passive generation of CSLI does not amount to a voluntary conveyance under the third-party doctrine. The Ninth Circuit has distinguished information "passively conveyed through third party equipment" from information "voluntarily turned over" to a third party, the latter of which is governed by the third-party doctrine. United States v. Forrester, 512 F.3d 500, 510 (9th Cir. 2008). In the same vein, the Sixth Circuit found Smith distinguishable where federal law enforcement had dialed the defendant's cell phone without allowing it to ring and used the resulting CSLI to track his movements. United States v. Forest, 355 F.3d 942, 947 (6th Cir. 2004), judgment vacated on other grounds sub nom. Garner v. United States, 543 U.S. 1100 (2005). In that instance, the Sixth Circuit agreed, the defendant "did not voluntarily convey his cell site data to anyone." Id. (internal quotation marks omitted).
"Other courts have taken a similar view. The Third Circuit, for example, rejected the government's argument that Miller and Smith precluded magistrate judges from requiring a warrant supported by probable cause to obtain historical CSLI. Third Circuit Opinion, 620 F.3d at 317-18. "A cell phone customer," the Third Circuit explained, "has not `voluntarily' shared his location information with a cellular provider in any meaningful way."[6] Id. at 317. Likewise, the Florida Supreme Court, citing the Third Circuit's opinion, concluded that the third-party doctrine did not control: "Simply because the cell phone user knows or should know that his cell phone gives off signals that enable the service provider to detect its location for call routing purposes, and which enable cell phone applications to operate for navigation, weather reporting, and other purposes, does not mean that the user is consenting to use of that location information by third parties for any other unrelated purposes."Tracey, 152 So. 3d at 522. One court, moreover, found it "difficult to understand how the user `voluntarily' expose[s] [CSLI] to a third party" where the government seeks "information — essentially, continuous pinging — that is not collected as a necessary part of cellular phone service, nor generated by the customer in placing or receiving a call." In re Application, 849 F. Supp. 2d at 539 n.6.
"Furthermore, the mere fact that historical CSLI is a record maintained by a cellular service provider, and not kept by the user, does not defeat the user's expectation of privacy in what that information reveals — namely, the user's location at any moment her cell phone communicates with a cell tower. As the Ninth Circuit has explained, "it is clear that neither ownership nor possession is a necessary or sufficient determinant of the legitimacy of one's expectation of privacy." DeMassa v. Nunez,770 F.2d 1505, 1507 (9th Cir. 1985).
Indeed, in Ferguson v. City of Charleston, 532 U.S. 67, 76-78 (2001), the U.S. Supreme Court held that law enforcement needed a warrant to obtain drug testing results from the urine of pregnant women, even though the results were kept by a third party state hospital. The Ferguso"Court so held because "[t]he reasonable expectation of privacy enjoyed by the typical patient undergoing diagnostic tests in a hospital is that the results of those tests will not be shared with nonmedical personnel without her consent."[7] Id. at 78. Similarly, here, a cell phone user's reasonable expectation of privacy in her location at virtually all times is not destroyed simply because law enforcement would have to obtain the records of her whereabouts from a third party. See United States v. Warshak, 631 F.3d 266, 285-86 (6th Cir. 2010)(finding a reasonable expectation of privacy in the content of e-mails stored by a third-party service provider); cf. United States v. Jacobsen, 466 U.S. 109, 114 (1984) (recognizing "a legitimate expectation of privacy" in "[l]etters and other sealed packages" even though they may be entrusted to third-party mail carriers while in transit); Stoner v. California, 376 U.S. 483, 487-88, 490 (1964) (rejecting the argument that "the search of [a] hotel room, although conducted without the petitioner's consent, was lawful because it was conducted with the consent of the hotel clerk," because a hotel guest's Fourth Amendment rights cannot be "left to depend on the unfettered discretion" of a third party clerk).
"Importantly, the Court is not holding that Miller and Smith are no longer good law. Only the U.S. Supreme Court may do so.[8] The Court instead finds that Miller and Smith do not control the analysis here because the generation of historical CSLI via continually running apps or routine pinging is not a voluntary conveyance by the cell phone user in the way those cases demand. Where, as here, an individual has not voluntarily conveyed information to a third party, her expectation of privacy in that information is not defeated under the third-party doctrine. See, e.g., Third Circuit Opinion, 620 F.3d at 317-18; Tracey, 152 So. 3d at 522.
b. The Factual Record Before the Fifth and Eleventh Circuits Did Not Include Continually Running Apps and Automatic Pinging
This conclusion is not at odds with the decisions of the Fifth and Eleventh Circuits because the factual record in those cases was materially different. Both cases involved technology from 2010 and were expressly limited to instances where a cell phone user was either making or receiving a call. The Fifth Circuit, for example, held that Smith controlled the analysis because a cell phone user "understands that his cell phone must send a signal to a nearby cell tower in order to wirelessly connect his call," and therefore "voluntarily conveys his cell site data each time he makes a call." Fifth Circuit Opinion, 724 F.3d at 612-14.
Similarly, the Eleventh Circuit en banc held that the "longstanding third-party doctrine plainly controls the disposition of this case" because "[c]ell phone users voluntarily convey cell tower location information to telephone companies in the course of making and receiving calls on their cell phones." Davis, 785 F.3d at 512 & n.12. "Just as in Smith," the Eleventh Circuit continued, "users could not complete their calls without necessarily exposing this information to the equipment of third-party service providers." Id. at 512 n.12.
Neither circuit, however, had occasion to address whether a cell phone user voluntarily conveys her location to a cellular service provider when the historical CSLI is generated by continuously operating apps or automatic pinging. The Fifth Circuit's decision only contemplated instances where the cell phone user "makes a call." Fifth Circuit Opinion, 724 F.3d at 614. The Fifth Circuit may have limited its analysis in this way because, according to the government there, "cell phone service providers do not create cell site records when a phone is in an idle state." Id. at 602 n.1. This is contrary to the factual record here, which indicates that "CSLI for a cellular telephone may still be generated in the absence of user interaction with a cellular telephone." Luna Decl. ¶ 3B. "For example," the government's FBI special agent explained, "CSLI may still be generated" by "applications that continually run in the background that send and receive data (e.g. email applications)." Id.
The Fifth Circuit's analysis may also have been so limited because the government's application for historical CSLI was filed in 2010. Fifth Circuit Opinion, 724 F.3d at 602. In fact, before the Fifth Circuit, the government argued that CSLI was "not sufficiently accurate to reveal when someone is in a private location such as a home." Id. at 609. Here, by contrast, the government explained at oral argument that CSLI from a femtocell could be used to locate an individual at her home. Hr'g Tr. at 31:16-32:4. This distinction has constitutional significance because femtocells, like the beeper inKaro, can "reveal a critical fact about the interior of the premises that the Government is extremely interested in knowing and that it could not have otherwise obtained without a warrant."[9] 468 U.S. at 715.
The Eleventh Circuit's decision was equally limited by its facts. The en banc panel inDavis cabined its voluntariness analysis to making or receiving phone calls because the cellular provider at issue there did not record "any cell tower location information for when the cell phone was turned on but not being used to make or receive a call."[10] 785 F.3d at 503. Judge Adalberto Jordan emphasized this point in his concurrence: "Finally, it is important to reiterate that the cell site information was generated from calls Mr. Davis made and received on his cellphone, and was not the result of his merely having his cellphone turned on. There was, in other words, no passive tracking based on Mr. Davis' mere possession of a cellphone, and I do not read the Court's opinion as addressing such a situation." Id. at 524 (Jordan, J., concurring).
Further, the Eleventh Circuit, just like the Fifth Circuit, "limit[ed] its decision to the world (and technology) as we knew it in 2010." Davis, 785 F.3d at 521 (Jordan, J., concurring); see also id. at 502 (majority opinion) (explaining that the government sought historical CSLI "for the period from August 1, 2010 through October 6, 2010). Indeed, the court in Davis expressly declined to consider "newer technology," such as "femtocells," that had developed since 2010. Id. at 503 n.7 (majority opinion). This Court, in contrast, must consider the state of the technology as it exists in June 2015 as well as going forward. See Kyllo, 533 U.S. at 35-36 (rejecting "a mechanical interpretation of the Fourth Amendment" because courts "must take account of more sophisticated systems that are already in use or in development"). That technology includes femtocells, which the government says can be used to locate an individual within her home. See Hr'g Tr. at 29:22-33:25 (government discussion of femtocell technology).It is clear, then, that the factual record before this Court is distinct. It is not the case here that "the signal [to a cell tower] only happens when a user makes or receives a call." Davis, 785 F.3d at 498 (emphasis added). Rather, historical CSLI is also generated by continuously operating apps and by frequent pinging. Luna Decl. ¶ 3B. Critically, the government here does not disclaim its purported right to obtain without a warrant historical CSLI generated by such passive activities. This is true even though, as explained above, the government's application "does not seek" CSLI "that might be available when the [target cell phones] are turned `on' but a call is not in progress." App. ¶ 3. Because the government broadly defines "call" to include any call, text message, or data transfer, see Hr'g Tr. at 50:22-52:5, the government's application could very well obtain historical CSLI generated by "applications that continually run in the background that send and receive data," Luna Decl. ¶ 3B.
Nor is it the case here that "[u]sers are aware that cell phones do not work when they are outside the range of the provider company's cell tower network." Davis, 785 F.3d at 511 (emphasis added). Whatever the factual record may have been before the Fifth and Eleventh Circuits, the record here establishes that a user's cell phone works — and generates CSLI — when the user is outside the range of her provider's cell tower network but roams onto the network of another provider. See Larsen Decl. ¶¶ 2c, 4d (describing roaming on Verizon and AT&T networks). It is only when a cell phone cannot connect to the network of any provider that the cell phone will not generate CSLI. Neither the Fifth Circuit nor the Eleventh Circuit addressed roaming or considered whether roaming impacts the voluntary conveyance analysis.
These twin factual distinctions — (1) that historical CSLI may be generated by continually running apps and automatic pinging; and (2) that historical CSLI may be recorded and turned over to the government by any number of cellular service providers other than the cell phone user's — are essential to the Court's finding of no voluntary conveyance. As the Fifth Circuit and the Eleventh Circuit had no occasion to consider them, those decisions do not undermine the Court's conclusion that the third-party doctrine does not govern the facts here.
c. Passive Receipt of Calls and Texts Is Not A Voluntary Conveyance Either
The Court has established that the generation of historical CSLI via continually running apps or routine pinging is not a voluntary conveyance by the cell phone user in the way Miller and Smith demand. This showing, on its own, is sufficient for the Court to conclude that the third-party doctrine does not defeat a cell phone user's reasonable expectation of privacy in the historical CSLI associated with her cell phone.
Nonetheless, the Court also finds that the passive receipt of calls and text messages does not amount to a voluntary conveyance under the meaning of Miller and Smith.In Miller, the bank patron affirmatively conveyed checks and deposit slips to the bank. 425 U.S. at 437. In Smith, the telephone user affirmatively dialed the numbers recorded by the pen register. 442 U.S. at 737, 742. Here, by contrast, a cell phone user who receives an unwanted or unanswered call or an unwanted text generates historical CSLI without the commission of any similar affirmative act. As the government's FBI special agent explained, "CSLI for a cellular telephone may still be generated in the absence of user interaction with a cellular telephone." Luna Decl. ¶ 3B. As one example, the special agent stated that "CSLI may still be generated during an incoming voice call that is not answered." Id. When an unanswered call goes to voicemail, it may be hours before the cell phone user even realizes that she has been called. The historical CSLI, however, will generate as soon as that call was received.
At the hearing the government appeared to recognize that generation of CSLI via passive receipt of calls or texts involves less affirmative conduct than what was at issue in Miller and Smith: "It certainly feels like it's a different affirmative act by the person holding the phone if they can be called and, as a result, all this data is created, as opposed to them making the affirmative act of calling." Hr'g Tr. at 39:16-19. The government agreed with the Court, moreover, that "there's nothing to prevent . . . the creation, potentially, of cell site information by the government if [the government] really wanted to know where someone was at a given moment." Id. at 55:7-9. As the government acknowledged, "We all know how to create cell site location information." Id. at 55:11-12. Such a "ruse," as the government calls it, id. at 55:14, is far from fantasy. In Forest, for example, the Sixth Circuit found Smithdistinguishable where federal law enforcement repeatedly dialed the defendant's cell phone and used the resulting CSLI to track his whereabouts. 355 F.3d at 947. In that case, the Sixth Circuit found that the defendant's receipt of government calls was not voluntary. Id.
The Third Circuit, in finding that Miller and Smith did not foreclose magistrate judges from demanding a warrant supported by probable cause to obtain historical CSLI, concluded likewise that mere receipt of phone calls is not a voluntary conveyance:
A cell phone customer has not "voluntarily" shared his location information with a cellular provider in any meaningful way. As the EFF notes, it is unlikely that cell phone customers are aware that their cell phone providers collect and store historical location information. Therefore, when a cell phone user makes a call, the only information that is voluntarily and knowingly conveyed to the phone company is the number that is dialed and there is no indication to the user that making that call will also locate the caller; when a cell phone user receives a call, he hasn't voluntarily exposed anything at all.Third Circuit Opinion, 620 F.3d at 317-18 (emphasis added) (brackets and internal quotation marks omitted). It is one thing to say that cell phone users voluntarily convey the numbers they dial to the cellular service provider so that a call may be connected. Smith, though involving a home landline telephone, says as much. From that premise, however, it does not follow that cell phone users also voluntarily convey their location merely by possessing a cell phone that is capable of receiving calls and texts without warning and at any time of day. Other district courts have taken the same view. See, e.g., Cooper, 2015 WL 881578, at *8 (agreeing with the Third Circuit that "when a cell phone user receives a call, he hasn't voluntarily exposed anything at all" (internal quotation marks omitted)).
The Fifth Circuit did not directly address receipt of phone calls, despite quoting from the Third Circuit's opinion. See Fifth Circuit Opinion, 724 F.3d at 613-14 (discussing voluntary conveyance when a cell phone user "makes a call" only). For its part, the Eleventh Circuit opted to combine making and receiving calls in its analysis. See Davis, 785 F.3d at 512 n.12 ("Cell phone users voluntarily convey cell tower location information to telephone companies in the course of making and receiving calls on their cell phones. Just as in Smith, users could not complete their calls without necessarily exposing this information to the equipment of third-party service providers." (emphasis added)). Neither opinion, as indicated above, addressed receipt of text messages. See supra note 10.
For the reasons stated above, the Court finds that the Third Circuit has the better of the argument: "when a cell phone user receives a call [or text], he hasn't voluntarily exposed anything at all." Third Circuit Opinion, 620 F.3d at 317-18 (internal quotation marks omitted). Unlike the bank depositor in Miller or the telephone dialer in Smith, a cell phone user receiving an unanswered call or an unsolicited text has committed no affirmative act. She has done nothing more than leave her phone on.
Accordingly, the Court finds that Miller and Smith do not control the analysis here for the additional reason that the generation of historical CSLI via passive receipt of phone calls and text messages is not a voluntary conveyance by the cell phone user in the way those cases require. Where, as here, an individual has not voluntarily conveyed information to a third party, her expectation of privacy in that information is not defeated under the third-party doctrine. See, e.g., Third Circuit Opinion, 620 F.3d at 317-18; Tracey, 152 So. 3d at 522.
d. Discarding or Turning Off Cell Phones Is Not a Viable Alternative
Faced with the Court's concerns over the acquisition of historical CSLI generated by passive conduct, the government offered an alternative: people need not carry a cell phone in the first place or they may keep it turned off. Hr'g Tr. at 17:11-18:13. This cannot be right. Individuals cannot be compelled to choose between maintaining their Fourth Amendment right to privacy in their location and using a device that has become so integral to functioning in today's society that the U.S. Supreme Court once quipped "the proverbial visitor from Mars might conclude [it was] an important feature of human anatomy." Riley, 134 S. Ct. at 2484.
For many, cell phones are not a luxury good; they are an essential part of living in modern society. As the U.S. Supreme Court stated in City of Ontario v. Quon, 560 U.S. 746, 760 (2010), "Cell phone and text message communications are so pervasive that some persons may consider them to be essential means or necessary instruments for self-expression, even self-identification." As the U.S. Supreme Court explained in Riley, "it is the person who is not carrying a cell phone, with all that it contains, who is the exception." 134 S. Ct. at 2490. In fact, "more than 90% of American adults . . . own a cell phone," id., and "there are now more cell phones than people in the United States," Shane Miller, Drawing the Line: The Legality of Using Wiretaps to Investigate Insider Trading, 13 U. Pitt. J. Tech. L. Pol'y 1, 2 (2013). Further, according to a poll cited in Riley, "nearly three-quarters of smart phone users report being within five feet of their phones most of the time, with 12% admitting that they even use their phones in the shower." Riley, 134 S. Ct. at 2490. Considering the ubiquity of cell phones, and the important role they play in today's world, it is untenable to force individuals to disconnect from society just so they can avoid having their movements subsequently tracked by the government.
Consequently, the Court agrees wholeheartedly with the Florida Supreme Court: "Requiring a cell phone user to turn off the cell phone just to assure privacy from governmental intrusion that can reveal a detailed and intimate picture of the user's life places an unreasonable burden on the user to forego [sic] necessary use of his cell phone, a device now considered essential by much of the populace." Tracey, 152 So. 3d at 523; see also In re U.S. for an Order Authorizing the Release of Historical Cell-Site Info., 809 F. Supp. 2d 113, 127 (E.D.N.Y. 2011) ("The fiction that the vast majority of the American population consents to warrantless government access to the records of a significant share of their movements by `choosing' to carry a cell phone must be rejected."); Patrick E. Corbett, The Fourth Amendment and Cell Site Location Information: What Should We Do While We Wait for the Supremes?, 8 Fed. Cts. L. Rev. 215, 226-27 (2015) (questioning whether requiring users to switch their cell phones off to avoid being tracked is a "viable option" given "the desire (and often need) to stay connected and informed"). In this regard, the Court takes heed of Judge Robin S. Rosenbaum's concurrence in Davis: "In our time, unless a person is willing to live `off the grid,' it is nearly impossible to avoid disclosing the most personal of information to third-party service providers on a constant basis, just to navigate daily life. And the thought that the government should be able to access such information without the basic protection that a warrant offers is nothing less than chilling." 785 F.3d at 525 (Rosenbaum, J., concurring).
e. Conclusion
For these reasons, the Court concludes that the third-party doctrine established inMiller and Smith does not defeat cell phone users' reasonable expectation of privacy in the historical CSLI associated with their cell phones. The government therefore conducts a "search" within the meaning of the Fourth Amendment when it asks cellular service providers to release that information pursuant to 18 U.S.C. § 2703.Consent
Derived From: In re Telephone Info NDCA 2015
"Where, as here, "a search is undertaken by law enforcement officials to discover evidence of criminal wrongdoing," the Fourth Amendment "generally requires the obtaining of a judicial warrant." Riley, 134 S. Ct. at 2482 (internal quotation marks omitted). "In the absence of a warrant," the U.S. Supreme Court has held, "a search is reasonable only if it falls within a specific exception to the warrant requirement."Id.; see also Karo, 468 U.S. at 717 ("Warrantless searches are presumptively unreasonable, though the Court has recognized a few limited exceptions to this general rule.").
The only exception to the warrant requirement advanced by the government here is consent. It is well established that the government need not obtain a warrant when it has the consent of the individual whose person or property is to be searched. See Karo, 468 U.S. at 717 (recognizing consent as one of the "limited exceptions" to the Fourth Amendment's warrant requirement). "Consent searches are part of the standard investigatory techniques of law enforcement agencies" and are "a constitutionally permissible and wholly legitimate aspect of effective police activity."Fernandez v. California, 134 S. Ct. 1126, 1132 (2014).
The question here, then, is whether cell phone users have consented to the government's acquisition of the historical CSLI associated with their cell phones. Undoubtedly, this question bears some relation to the issue of voluntariness discussed in Part III.B.2, supra. The Court's focus here, however, will be on the privacy policies issued by the cellular service providers of the target cell phones identified in the government's application: Verizon and AT&T. The mere existence of a privacy policy, the Court notes, does not dispose of the consent inquiry for Fourth Amendment purposes. In City of Ontario v. Quon, for example, the U.S. Supreme Court assumed that a police officer "had a reasonable expectation of privacy in the text messages sent on the pager provided to him by the City," even though the department "made it clear that pager messages were not considered private" and "[t]he City's Computer Policy stated that `users should have no expectation of privacy or confidentiality when using' City computers," including pagers. 560 U.S. at 758, 760(brackets omitted).
Of primary concern to the Court is the fact that subscribers of Verizon and AT&T cannot possibly have consented to the government's acquisition of CSLI generated by their cell phones but collected by an entirely different provider. There are at least two reasons why another provider might have collected historical CSLI for a Verizon or AT&T subscriber that the government has targeted. First, a provider other than Verizon or AT&T might have collected CSLI generated by a target cell phone if a target user switched providers during the sixty-day period but kept the same phone number pursuant to local number portability. App. ¶ 2 n.2. Second, a provider other than Verizon or AT&T might have collected CSLI generated by one of the target cell phones if a target cell phone connected with the cell tower of that other provider over the course of the sixty-day period, an action known as roaming. Larsen Decl. ¶ 2c. As stated above, roaming occurs when there is a gap in the network of a cell phone's provider and, as a result, the cell phone connects to the cell tower of a different provider.
As to roaming, which neither the Fifth Circuit nor the Eleventh Circuit addressed, the record before this Court indicates that "Verizon does retain CSLI for phone numbers belonging to other providers when those phones connect to Verizon towers." Larsen Decl. ¶ 2c. The same is true for AT&T, which "can determine whether [a] number [that is not an AT&T number] roamed on its system or called one of its customers and, if so, it can provide details of that usage, including CSLI."[11] Id. ¶ 4d. A cell phone user, however, will rarely know when she is roaming onto another provider's network of cell towers, and she will almost certainly not know the name of the other provider on whose network she is roaming. Even though the Court assumes that cell phone users have read the privacy policies of their own cellular service providers, users almost certainly do not read the privacy policies of every provider on whose towers their cell phones might roam. It cannot be, therefore, that the privacy policy of a user's cellular service provider offers a basis for that user to consent to the government's acquisition of CSLI from a separate provider.
What is more, the government says that, based on the language of the application, it "need not seek a new application" in order to obtain historical CSLI associated with a target cell phone from any of the dozens of other cellular service providers listed in the application. Schenk Decl. ¶ 1a. This is true whether the government's basis for requesting historical CSLI from a separate provider is local number portability or roaming. See id.; App. ¶ 2 & n.2. The government's application therefore authorizes the government to obtain CSLI from a plethora of other cellular service providers, such as Cellular One, Sprint, and T-Mobile, to whom the target cell phone users could not possibly have provided their consent.
In fact, when the Court requested that the government provide "the most recent privacy policies for each Telephone Service Provider listed in the government's application," ECF No. 24, the government's response illustrated the implausibility of user consent:
If in its Order for Supplemental Filings, this Court is seeking the most recent privacy policies for each Telephone Service Provider listed in the government's application, rather than the privacy policies for each Telephone Service Provider for each of the Target Devices, that request is nearly without bound, essentially requiring the privacy policies forevery service provider in the country. Therefore, if the Court, in fact, wants the privacy policies for any and all telephone service providers, the government requests additional time to comply with this request,assuming compliance is possible.
ECF No. 29 at 2 (emphases added). How is it, then, that a cell phone user has consented to government acquisition of CSLI when, to do so, she would have had to read the privacy policy of "every service provider in the country," a task the government itself admits might not even be "possible"?As for the privacy policies submitted by the government, the Court finds that they are sufficiently vague as to the nature and scope of the CSLI sought that subscribers cannot be said to have consented to that information's release to the government. Verizon's policy is especially vague. Verizon tells its subscribers, "We collect information about your use of our products, services and sites. Information such as . . . wireless location. . . ." Verizon Policy. "We may," Verizon says, "disclose information that individually identifies our customers or identifies customer devices in certain circumstances, such as: to comply with valid legal process including subpoenas, court orders or search warrant."[12] Id. Verizon's privacy policy says nothing about how or when CSLI is generated.[13] There is no mention, for instance, that every call made or received, every text sent or received, and every data connection will generate CSLI. Nor is there mention of how accurate the vaguely worded "wireless location" information might be. Additionally, far from giving its subscribers any understanding of the length of time for which their location information will be stored, Verizon's policy states only: "Personally identifiable and other sensitive records are retained only as long as reasonably necessary for business, accounting, tax or legal purposes." Id. (emphasis added). The record does not establish how long "as long as reasonably necessary" is. The Court cannot conclude that such a policy provides the basis for consent to the government's acquisition of sixty days' worth of historical CSLI.
AT&T's policy fares no better. AT&T informs its subscribers that it will collect their "location information," which includes "the whereabouts of your wireless device." AT&T Policy. "Location information," AT&T's policy continues, "is generated when your device communicates with cell towers, Wi-Fi routers or access points and/or with other technologies, including the satellites that comprise the Global Positioning System." Id. The AT&T policy tells subscribers that AT&T "automatically collect[s] information" when they "use our network," and that AT&T may provide this information to "government agencies" in order to "[c]omply with court orders." Id. The policy also contains information regarding the accuracy of the "wireless location information" that AT&T collects, explaining that AT&T "can locate your device based on the cell tower that's serving you" up to 1,000 meters in urban areas and 10,000 meters in rural areas. Id.
At no point, however, does AT&T's privacy policy give the cell phone user any indication as to how long AT&T will keep records of a subscriber's CSLI. In AT&T's letter to Congress, AT&T disclosed that it will store such data for five years. SeeACLU Br. at 2 n.5 (citing Letter from Timothy P. McKone, Executive Vice President, AT&T, to Rep. Edward J. Markey (Oct. 3, 2013)). Subscribers would not know that from the privacy policy. As the AT&T policy says nothing about how long a cell phone user's CSLI will be stored, the Court cannot conclude that such a policy provides the basis for consent to the government's acquisition of sixty days' worth of historical CSLI.
In addition, nowhere does the Verizon or AT&T privacy policy indicate the volume of location data that is likely to be collected and stored by the provider. There is no estimate, for example, of the number of location data points a typical user will generate over the course of an hour, day, week, month, or year. This omission is especially problematic considering that the sheer volume of CSLI generated by a user's cell phone can be staggering. See Wessler Decl. ¶¶ 8-10. In Davis, for instance, the government obtained the defendant's CSLI for a period of sixty-seven days. "During that time, Davis made or received 5,803 phone calls, so the prosecution had 11,606 data points about Mr. Davis's location." Davis, 785 F.3d at 533 (Martin, J., dissenting). "This averages around one location data point every five and one half minutes for those sixty-seven days, assuming Mr. Davis slept eight hours a night." Id. at 540.
In light of the foregoing, the Court cannot conclude that cell phone users generally — or in this instance — consent through the privacy policies of their cellular service providers to the government's warrantless acquisition of the historical CSLI associated with the users' cell phones. Because the government offers no other basis for its conduct to be excepted from the Fourth Amendment's warrant requirement, the Court holds that the government must, pursuant to Rule 41 of the Federal Rules of Criminal Procedure, secure a warrant supported by probable cause in order to obtain a cell phone user's historical CSLI.
This requirement does not impose an undue burden on the government. Indeed, the SCA expressly contemplates that the government may need to "obtain[] a warrant issued using the procedures described in the Federal Rules of Criminal Procedure" in order to acquire "a record or other information pertaining to a subscriber to or customer of [a provider of electronic communication service]." 18 U.S.C. § 2703(c)(1)(A). Further, although requiring a warrant for historical CSLI will surely have an impact on law enforcement practices, this requirement "is `an important working part of our machinery of government,' not merely `an inconvenience to be somehow weighed against the claims of police efficiency.'" Riley, 134 S. Ct. at 2493 (quotingCoolidge v. New Hampshire, 403 U.S. 443, 481 (1971)). It may be true that court orders for historical CSLI have served as "an investigative tool" used to establish probable cause in the past, Gov't Reply at 11, but the government is "not free from the warrant requirement merely because it is investigating criminal activity," Third Circuit Opinion, 620 F.3d at 318. "Recent technological advances," moreover, "have . . . made the process of obtaining a warrant itself more efficient." Riley, 134 S. Ct. at 2493; see also Missouri v. McNeely, 133 S. Ct. 1552, 1573 (2013) (Roberts, C.J., concurring in part and dissenting in part) (explaining that in some jurisdictions "police officers can e-mail warrant requests to judges' iPads; judges have signed such warrants and e-mailed them back to officers in less than 15 minutes").
Finally, the Court does not hold that the government may never obtain historical CSLI without a warrant supported by probable cause. It may be that "other case-specific exceptions," such as exigent circumstances, would "still justify a warrantless search" for historical CSLI. Riley, 134 S. Ct. at 2494. It may also be that historical CSLI acquired without a warrant is admissible at trial under the exclusionary rule's good faith exception. In general, however, if the government wants to obtain historical CSLI associated with a particular cell phone, the Fourth Amendment requires that the government secure a warrant before doing so.
See also
- Broadband
- Spectrum
- Special Access
- Open Internet
- Privacy
- Privacy
- CPNI
- Government Survelliance
Caselaw
- IN RE APPLICATION FOR TELEPHONE INFORMATION NEEDED FOR A CRIMINAL INVESTIGATION NEEDED FOR A CRIMINAL INVESTIGATION. Case No. 15-XR-90304-HRL-1(LHK). United States District Court, N.D. California, San Jose Division. July 29, 2015. ("Before the Court is the government's appeal of U.S. Magistrate Judge Howard R. Lloyd's denial of an application for an order pursuant to 18 U.S.C. § 2703(d) authorizing the government to obtain historical cell site location information ("CSLI") associated with [REDACTED/] target cell phones. ECF No. 4 ("Gov't Br."); ECF No. 5 ("Gov't Supp. Br.").[1] The Federal Public Defender for the Northern District of California ("Public Defender"), at the Court's invitation, filed a response. ECF No. 21 ("Opp."). With the Court's permission, the American Civil Liberties Union ("ACLU") and the Electronic Frontier Foundation ("EFF") filed amicus briefs in support of the Public Defender. ECF No. 19 ("ACLU Br."); ECF No. 20 ("EFF Br."). The government replied. ECF No. 22 ("Gov't Reply"). Having considered these written submissions, the relevant law, the record in this case, and the oral arguments presented at the June 24, 2015 hearing, the Court hereby AFFIRMS Judge Lloyd's denial of the government's application for historical CSLI.")
- United States v. Carpenter, No. 14-1572 (6th Cir. filed May 7, 2014).
Hearings
- Electronic Communications Privacy Act (ECPA) (Part II): Geolocation Privacy and Surveillance, Hearing Before the Subcomm. on Crime, Terrorism, Homeland Security, and Investigations, of the H. Comm. on the Judiciary,113th Cong. 50 (2013)
- testimony of Prof. Matt Blaze, University of Pennsylvania
Papers
- Thomas A. O'Malley, Using Historical Cell Site Analysis Evidence in Criminal Trials,U.S. Att'y Bull., Nov. 2011, at 19
- U.S. Dep't of Homeland Sec., Lesson Plan: How Cell Phones Work 9 (2010) ("DHS Lesson Plan")
- Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations Computer Crime and Intellectual Property Section, Criminal Division, DOJ (2009)