Archive for the ‘Fourth Amendment’ Category

Federal Judge Rules Unlicensed Dogs Aren’t Protected By Fourth … – Reason (blog)

Benjamin Beytekin/picture alliance / Benjamin Beyt/NewscomA federal judge ruled Wednesday that a Michigan woman has no basis to sue the Detroit Police Department (DPD) for shooting her three dogs because they were not properly licensed.

U.S. District Court Judge George Caram Steeh dismissed a federal civil rights lawsuit filed by Detroit resident Nikita Smith last last year after a marijuana raid by Detroit police left her three dogs shot to death.

The ruling is the first time a federal court has considered the question of whether an unlicensed petin violation of city or state codeis protected property under the Fourth Amendment. Federal courts have established that pets are protected from unreasonable seizures (read: killing) by police, but the city of Detroit argued in a motion in March that Smith's dogs, because they were unlicensed, were "contraband" for the purposes of the Fourth Amendment, meaning she had no legitimate property interest in them and therefore no basis to sue the officers or department.

In his Wednesday opinion Steeh agreed.

"The Court is aware that this conclusion may not sit well with dog owners and animal lovers in general," the judge wrote. "The reason for any unease stems from the fact that while pet owners consider their pets to be family members, the law considers pets to be property."

"The requirements of the Michigan Dog Law and the Detroit City Code, including that all dogs be current with their rabies vaccines, exist to safeguard the public from dangerous animals," he continued. "When a person owns a dog that is unlicensed, in the eyes of the law it is no different than owning any other type of illegal property or contraband. Without any legitimate possessory interest in the dogs, there can be no violation of the Fourth Amendment."

And without any Fourth Amendment violation, Steeh continued, there is no basis for a civil rights claim against the city. Steeh also ruled that Smith's suit would have been dismissed even if she had a cognizable property interest in the dogs, finding that the animals presented an imminent threat to the officers.

Smith's lawsuit characterized the Detroit police officers who raided her house as a "dog death squad." She claimed officers shot one of her pets through a closed bathroom door. Graphic photos from the raid on Smith's house showed the dog lying dead in a blood-soaked bathroom.

Smith's case is only one of several lawsuits that have been filed against the DPD for dog shootings over the past two years. The city of Detroit settled one of those suits for $100,000 after dash cam video showed an officer shooting a man's dog while it was chained to a fence. It was also one of three lawsuits against DPD for shooting dogs during marijuana raids. The most recent was filed in June after DPD officers allegedly shot a couple's dogs while the animals were behind a backyard fence.

A Reason investigation last year found the DPD's Major Violators Unit, which conducts drug raids in the city, has a track record of leaving dead dogs in its wake. One officer had shot 39 dogs over the course of his career before the raid on Smith's house, according to public records.

That officer is now up to 73 kills, according to the most recent records obtained by Reason.

Two other officers involved in the Smith raid testified during the trial that they had shot "fewer than 20" and "at least 19" dogs over the course of their careers.

The court's opinion notes that the "police officers conducting the search had not received any specific training on how to handle animal encounters during raids."

The ruling also noted that Detroit police supervisors found that the shooting of Smith's dogs by officers were all justified. "However, as in many other cases, the ratifying officers did so without speaking to the officers about what had transpired," the court wrote.

Reason's review of "destruction of animal" reports filed by Detroit police officers did not find a single instance where a supervisor found that a dog shooting was unjustified.

Detroit police obtained a search warrant for Smith's residence after receiving a tip that marijuana was being sold out of it. Police confiscated 25 grams of marijuana as a result of the raid, and Smith was charged with a misdemeanor.

However, the case against her was later dismissed when officers failed to appear at her court hearing.

Neither an attorney for Smith nor the Detroit Police Department were immediately available for comment.

Here is the original post:
Federal Judge Rules Unlicensed Dogs Aren't Protected By Fourth ... - Reason (blog)

Symposium: Will the Fourth Amendment protect 21st-century data? The court confronts the third-party doctrine – SCOTUSblog (blog)

Posted Wed, August 2nd, 2017 12:21 pm by Jennifer Lynch

Jennifer Lynch is a senior staff attorney for the Electronic Frontier Foundation, which filed an amicus brief in support of Timothy Carpenters petition for certiorari in Carpenter v. United States.

This summer, the Supreme Court granted certiorari in Carpenter v. United States, a case that offers the court another chance to address just how far the Fourth Amendments protections against warrantless searches and seizures extend to cover information generated by the modern technologies we rely on every day.

In Carpenter, the FBI accessed location data linked to Timothy Carpenters and his co-defendants cell phones in its attempt to place the suspects at the sites of several robberies. But the data the FBI asked for and received werent limited to the days and times of the known robberies they also included months of records that could reveal everywhere the defendants were every time they made or received a phone call. And the FBI got all of this information without a warrant.

The specific data at issue in the case are called cell-site-location information, or CSLI. These data, maintained by wireless carriers, are records of the cell towers our phones connect to every time they try to send and receive calls, texts, emails and any other information. The records generated hundreds and sometimes thousands of times per day include the precise GPS coordinates of each tower as well as the day and time the phone tried to connect to it. While this all may sound complicated, the important point is that, in cases like this one, the government argues that CSLI is really just a proxy for where the phone and, by extension, the phones owner is or has been.

Police ask for these records a lot in 2016, Verizon and AT&T alone received about 125,000 requests for CSLI and each request may involve months of information on multiple people. No federal statutes place any specific restrictions on how much data the police can ask for at any one time, and the standard required to obtain access whether there are specific and articulable facts showing that there are reasonable grounds to believe the data are relevant and material to an ongoing criminal investigation is much lower than probable cause. As a result, cases like this one, in which the government obtained 88 days and 127 days worth of location information for each defendant, appear to be the norm. (In another cert petition filed this past term, Graham v. United States, the police accessed 221 days of CSLI for each defendant.)

In Carpenter, the Supreme Court will address whether access to this information is a search under the Fourth Amendment and whether that search requires a warrant. The issues raised in this case are important because location information like CSLI shows where we are and where we have been. And where we travel can reveal very sensitive details about our lives. As Justice Sonia Sotomayor noted in her concurring opinion in United States v. Jones, location information can provide the government with a precise, comprehensive record of a persons public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations. Or, as the lower court in Jones put it, [a] person who knows all of anothers travels can deduce whether he is a weekly church goer, a heavy drinker, a regular at the gym, an unfaithful husband, an outpatient receiving medical treatment, an associate of particular individuals or political groupsand not just one such fact about a person, but all such facts.

Despite the sensitive nature of location data and the volume of information collected in Carpenter and other cases, five federal appellate courts, in deeply divided opinions, have held that historical CSLI isnt protected by the Fourth Amendment in large part because the information is collected and stored by third-party service providers. The courts have relied on a legal principle called the third-party doctrine, which was developed in two 1970s Supreme Court cases, Smith v. Maryland and United States v. Miller. This principle holds that information you voluntarily share with someone else whether that someone else is your bank (such as deposit and withdrawal information) or the phone company (the numbers you dial on your phone) isnt protected by the Fourth Amendment because you cant expect that third party to keep the information secret. By sharing that information with a third party, you have assumed the risk that it will be shared with others.

The Electronic Frontier Foundation and many others have argued that its time for the Supreme Court to revisit this outdated doctrine. As Sotomayor noted in Jones, the third-party doctrine is ill suited to the digital age. This is because, as she also noted, we live in an era in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks. We use cellphones to stay in touch with friends and family on the go, store data in the cloud to be able to access it anywhere later, rely on GPS mapping technologies to find our way about town, and wear activity trackers to try to improve our health. Its impossible to use any of these technologies without sharing data with third parties.

This dilemma highlights a key weakness in this line of the Supreme Courts Fourth Amendment jurisprudence: Assuming that it is unreasonable to expect privacy when we share something with others makes secrecy a prerequisite for privacy. But Justice Thurgood Marshall recognized in his dissent in Smith years ago that [p]rivacy is not a discrete commodity, possessed absolutely or not at all. That an individual discloses information to a third party for one purpose does not mean he believes he has relinquished all privacy interests in that information. Nor is it clear that such a belief would be good for society. To maintain secrecy as a prerequisite for Fourth Amendment safeguards would mean that information once protected in the non-digital world would lose that protection today.

Some third-party cases at the Supreme Court and federal appellate courts have recognized that sharing information with others doesnt always equal blanket disclosure to all. The court has held that patients have a reasonable expectation of privacy in diagnostic test results, even when the hospital maintains the records (Ferguson v. City of Charleston); passengers retain an expectation of privacy in luggage placed in an overhead bin despite the possibility of external inspection by others (Bond v. United States); and hotel guests are entitled to constitutional protections even though they provide implied or express permission for third parties to access their rooms (Stoner v. California). And at least one lower court, the U.S. Court of Appeals for the 6th Circuit, in United States v. Warshak, has ruled that people have an expectation of privacy in email content, even if they use a third party service provider to transmit that email.

Thus, the main challenge for the Supreme Court in Carpenter will be to figure out how to reset the parameters of the third-party doctrine for the digital age or do away with it altogether.

One thing is clear: These thorny issues are not going away. How the Supreme Court decides this case will have important ramifications for the future especially for the internet of things, where sensors and devices in our homes, on our cars, and throughout our world will constantly collect, generate, and share data about us with little to no volition on our part. Choosing to participate in society in the 21st century will require use of these technologies; it shouldnt require us to relinquish our constitutional rights.

Posted in Carpenter v. U.S., Summer symposium on Carpenter v. United States, Featured, Merits Cases

Recommended Citation: Jennifer Lynch, Symposium: Will the Fourth Amendment protect 21st-century data? The court confronts the third-party doctrine, SCOTUSblog (Aug. 2, 2017, 12:21 PM), http://www.scotusblog.com/2017/08/symposium-will-fourth-amendment-protect-21st-century-data-court-confronts-third-party-doctrine/

Excerpt from:
Symposium: Will the Fourth Amendment protect 21st-century data? The court confronts the third-party doctrine - SCOTUSblog (blog)

Symposium: Justices poised to consider, or reconsider, Fourth Amendment doctrines as they assess the scope of … – SCOTUSblog (blog)

John Castellano is Deputy Executive Assistant District Attorney and Chief Appellate Attorney in the office of Richard A. Brown, District Attorney of Queens County, New York.

The Supreme Courts grant of certiorari in United States v. Carpenter highlights the clash between established Fourth Amendment doctrines and what many argue are the heightened privacy concerns of a digital era. The court will consider the scope of the Fourth Amendments protection of information contained in a cellular carriers records that reflects the location of cell towers used to complete customers phone calls and convey their texts. At stake will be at least two traditional notions underlying the courts Fourth Amendment jurisprudence. The first is the general understanding that information voluntarily exposed to others is not protected by the Fourth Amendment, and the second is the more specific third-party doctrine, which holds that government access to information collected by a private business in order to provide a service to a customer does not constitute a search.

In this case, the government obtained court orders under Section 2703 of the Stored Communications Act for a total of 127 days of historical cell-site information regarding phones used by defendant Timothy Carpenter, who had been named by an accomplice as the mastermind of a string of nine commercial burglaries committed in and around Detroit. As the governments expert testified, the records provided the location of cell towers that handled the defendants calls and texts, and indicated that the defendants phone was within one-half to two miles of the specified tower and within a one-third or one-sixth radial wedge, or sector, of the tower. The U.S. Court of Appeals for the 6th Circuit applied the third-party doctrine to hold that the Fourth Amendment did not protect this information, because the records obtained were those of the cellphone provider and reflected information collected by the provider in order to provide a service to the defendant. The court of appeals also noted that cellphone customers generally understand that when they use their cellphones for calls or texts, they are employing nearby cell towers and thus providing information to the carrier, including their general whereabouts.

The issue may not be so clear cut for some members of the Supreme Court, however. In a 2011 concurrence in United States v. Jones, Justice Sonia Sotomayor wrote that, although the third-party doctrine was not at issue in that case, it might in the future be necessary to reconsider the premise that an individual has no reasonable expectation of privacy in information voluntarily disclosed to third parties. This approach is ill suited to the digital age, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks. And Justice Samuel Alito, writing for himself and three other members of the court, noted in Jones that long-term monitoring of specific GPS-location data could impinge on expectations of privacy, but suggested that legislative solutions might be best suited to balance these concerns with public safety in an era of dramatic technological change.

The way in which the Supreme Court resolves these issues in Carpenter will undoubtedly revolve around how the justices view the scope of the issue presented. If the question is, as some suggest, whether the Fourth Amendment does anything to regulate government access to the nearly limitless information stored by telecommunications companies and internet service providers, many of the justices are likely to be reluctant to sign on to an expansive application of traditional doctrines. But if the issue is confined to the particular type of information involved in this case, the specific privacy interests at stake, the judicial mechanism Congress provided to restrict access to the information and the legitimacy of the governments interest in the information, the outcome may well be different.

The privacy concerns raised by the specific information at stake in this case may be far less significant than those attached to other types of information a digital consumer provides to carriers or internet providers. The information obtained in Carpenters case involved only the location of towers used to convey calls and messages, and not, notably, the content of any communication. As the 6th Circuit noted, in the telecommunications context, the Supreme Court has traditionally distinguished between content-related information and information about the mechanisms used to convey the message. And, whatever the precise contours of the line between content and non-content, in this case there seems little doubt that the information was not content-related.

Moreover, unlike the specific GPS coordinates in Jones, accurate to within 100 feet, the information in Carpenter was non-specific, placing the phone as far away as two miles from the towers, and only within a one-third or one-sixth sector of the tower. Nor is the tower identified in records like those at issue in this case necessarily the closest one to the caller, because two people making calls from the same car at the same time may be employing two different towers, depending on, among other things, whether one tower has reached its capacity.

This difference in specificity between GPS data and cell-site information would appear to be significant. Rather than allowing the government to observe what businesses or residences a phone subscriber visits, and thus, as Sotomayor feared, compile a comprehensive record of a persons public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations, the records in this case identified at best a general neighborhood or group of neighborhoods, which, in an urban context, potentially covers hundreds or thousands of businesses and residences.

Nor is the privacy interest in location information, something traditionally exposed to the public and observable by the government, greater than the privacy interest in other types of documents clearly covered by the third-party doctrine. Numbers dialed from a phone, for example, which are far more specific and in many ways more revealing than the location of cell towers, fall squarely within the third-party doctrine and may be accessed without resort to any court order, as the Supreme Court held in Smith v. Maryland. According to United States v. Miller, the same is true of bank records and other financial information, which many consider to be highly personal and private.

And although some litigants and commentators have challenged the voluntariness of a cellphone customers disclosure of location information, cellphone users, as the 6th Circuit noted, generally understand that the phone company completes calls by the use of cell towers and knows what towers are being used to complete a customers calls. Moreover, all carriers provide notice of their privacy policies, which routinely include warnings that information is collected in connection with the provision of a carriers services and that this information may be provided to law enforcement.

The notion that prosecutors routinely abuse their access to this type of information, effectively tracking the whereabouts of citizens for weeks or months and for little or no reason, lacks a legitimate foundation. For one thing, the government conducts no tracking when it gains access to this type of information: The phone company collects cell-site location information for its own purposes and the government, retrospectively, views it based on a court order. For another, prosecutors do not routinely access such information. In fact, in 2016, prosecutors in Queens, New York, the 10th most populous county in the nation with 2.3 million inhabitants, obtained historical cell-cite information only 92 times, each through a court order, out of the more than 54,000 prosecutions in the county that year. And most of those orders covered periods far less extensive than those in this case. Indeed, more than half of the Queens County orders covered 10 days or less, and an additional 22 percent covered 30 days or less. Only seven orders for the entire year exceeded 90 days, and most of those were issued in pattern robbery or burglary investigations like the one in Carpenter, in which a review of records over a longer time period was warranted.

Furthermore, prosecutors access to cell-site location information is limited by judicial intervention. The Stored Communications Act requires a court order based on specific and articulable facts establishing that the information requested is relevant and material to an investigation. Both the citizens affected and the time period covered by the records can be limited in this manner. This is precisely the type of statutory mechanism that Alito suggested in his concurrence in Jones would operate to protect any perceived privacy interest at stake. Indeed, subpoenas for potentially far more personal information, like bank information, credit card statements and call detail information, can be issued in most states without any such check.

Moreover, the legitimate interest of law enforcement in historical cell-site location information in certain cases is very compelling, because it provides an important investigative tool when it may be difficult or impossible to show probable cause. Orders may be used, for example, to obtain the location history of homicide victims to determine their whereabouts immediately prior to their deaths, thereby aiding in the investigation of relevant events and possible causes. Similarly, when multiple legitimate suspects could have motives for committing a crime, location information may exclude some or all of these suspects. Historical cell-site information can also be used to check the reliability of information provided by informants or contained in the statements of accomplices. And, when pattern crimes are alleged, review of cell-site location data can provide critical evidence of, for example, an individuals commission of serial killings or a persons participation in pattern robberies or burglaries like the one in this case, because presence at multiple crime scenes or other relevant locations over a period of many days or weeks is not likely to be mere coincidence. In this way, a Section 2703 order provides an essential investigative tool, often used in conjunction with subpoena requests and other investigative techniques, that imposes minimal intrusions on any legitimate expectations of privacy.

The Supreme Courts decision in Carpenter will thus likely turn on how broadly the justices view the question presented in the case. Whatever the outcome, the Supreme Courts decision is likely to be merely the opening salvo in the legal debate rather than a definitive resolution of the issues raised by law-enforcement access to cell-site location information.

Posted in Carpenter v. U.S., Summer symposium on Carpenter v. United States, Featured, Merits Cases

Recommended Citation: John Castellano, Symposium: Justices poised to consider, or reconsider, Fourth Amendment doctrines as they assess the scope of privacy in a digital age, SCOTUSblog (Aug. 1, 2017, 2:49 PM), http://www.scotusblog.com/2017/08/symposium-justices-poised-consider-reconsider-fourth-amendment-doctrines-assess-scope-privacy-digital-age/

The rest is here:
Symposium: Justices poised to consider, or reconsider, Fourth Amendment doctrines as they assess the scope of ... - SCOTUSblog (blog)

Digital privacy bill still abandons probable cause for our papers – The Hill (blog)

The bipartisan ECPA Modernization Act of 2017 introduced by Sens. Patrick LeahyPatrick LeahyDigital privacy bill still abandons probable cause for our papers Overnight Tech: Driverless car bill advances in House | Bezos now world's richest person | Tech groups hail new email privacy bill Senate panel advances measure to protect medical marijuana states MORE (D-Vt.) and Mike LeeMike LeeDigital privacy bill still abandons probable cause for our papers McConnell faces questions, but no test to his leadership Overnight Cybersecurity: Senate sends Russia sanctions bill to Trump | Senators unveil email privacy bill | Russia tried to spy on Macron with Facebook MORE (R-Utah) is a welcome correction to a legislative flaw in the Fourth Amendment protections of emails stored in the cloud. Because of a law created before the cloud came to be, emails stored longer than 18 months could be accessed by government agencies without a warrant signed by a neutral judicial officer after presentation of probable cause of unlawful activity.

Citing the most basic Fourth Amendment protocols against warrantless access to emails, the bill was introduced under the premise of fixing that flaw for these older emails in the cloud. The bill, though, still leaves open probable cause-free access to emails and other papers through use of judgeless administrative subpoenas.

A rule of construction in the ECPA Modernization Act that is entirely inconsistent with the sacrosanct warrant and probable cause provisions of the Fourth Amendment is that it shall [not] limit an otherwise lawful authority of a governmental entity to use an administrative subpoena authorized by Federal or State statute.

Administrative subpoenas, also called civil investigative demands, are search writs issued by government agencies and state attorneys general or prosecutors to disgorge private papers. They may be issued without probable cause, and require no before-the-fact review by neutral judicial officers. They may be enforced in court under threat of contempt and other penalties, and courts give Chevron deference to these writs, meaning the issuers of them may in large degree determine the scope of the laws they claim to be enforcing.

In these regards, administrative subpoenas are worse than the general warrants banned by the Fourth Amendment after Americas colonial experience with the Writs of Assistance, which in fact helped foster the American Revolution. The Writs of Assistance targeted colonial merchants, but were at least issued by judges who could determine that legitimate laws were being enforced. These colonial Writs required returns before judicial officers, and government searchers were subject to legislative penalties and even private lawsuits for exceeding the scope of the judicially authorized searches. Some colonial judges even refused to issue these Writs when government officials refused to provide facts under oath.

The administrative subpoena regime abandons the requirement of probable cause both before issuance by the searchers themselves and in after-the-fact judicial hearings to enforce them. Unlike the general warrants under which judges determined the scope of the searches in advance, although leaving the persons, businesses, and places to be searched up to the discretion of the government searchers, administrative subpoenas may be issued based on flawed interpretations of the law and without independently verified facts indicating law may have been violated by the targets.

Administrative subpoenas therefore lack the separation of powers found even in the Writs of Assistance regime. The discretion of searchers under the administrative subpoena regime is therefore broader and in many ways more dangerous to the Fourth Amendment right of security than the Writs of Assistance.

The Boston Globe recently reported that the American Civil Liberties Union of Massachusetts is calling out the explosion in the use of these sanctioned fishing expedition tool[s], and how some state prosecutors have refused to disclose how many they issue. This mirrors my own experience with one state attorney general who ducked a Freedom of Information Act request about the quantity she issues, claiming attorney-client privilege among other excuses not to comply.

Administrative subpoenas are in fact impossible to reconcile with the Fourth Amendment. The very premise of the ECPA Modernization Act is that government may not violate the security of private records unless a judge has issued a warrant after hearing probable cause under oath that facts indicate a law is being broken. Government officials will exploit this expressly sanctioned loophole in the bill and subpoena emails directly from their targets in this probable cause-free administrative subpoena regime. Neither digital nor hard records will be safe from unreasonable government searches and compelled disgorgement.

Mark J. Fitzgibbons is President of Corporate Affairs at American Target Advertising, Inc.

The views expressed by this author are their own and are not the views of The Hill.

Read more here:
Digital privacy bill still abandons probable cause for our papers - The Hill (blog)

The justices return to cellphones and the Fourth Amendment: In Plain English – SCOTUSblog (blog)

In 1976, in United States v. Miller, the Supreme Court ruled that the bank records of a man accused of running an illegal whiskey-distilling operation were not obtained in violation of the Fourth Amendment, even though law-enforcement officials did not have a warrant, because the bank records contained only information voluntarily conveyed to the banks and exposed to their employees in the ordinary course of business. Three years later, in Smith v. Maryland, the justices ruled that no Fourth Amendment violation had occurred when, without a warrant and at the request of the police, the phone company installed a device to record all of the phone numbers that a robbery suspect called from his home, leading to his arrest.

These cases are often cited as examples of the third-party doctrine the idea that the Fourth Amendment does not protect records or information that someone voluntarily shares with someone or something else. But does the third-party doctrine apply the same way to cellphones, which only became commercially available a few years after the courts decisions in Miller and Smith? Justice Sonia Sotomayor, at least, has suggested that it should not: In 2012, she argued that the doctrine is ill suited to the digital age, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks. That question is at the heart of Carpenter v. United States, in which the justices will hear oral argument this fall.

The petitioner in the case, Timothy Carpenter, was accused of being the mastermind behind a series of armed robberies in Ohio and Michigan. Law-enforcement officials asked cellphone providers for the phone records for 16 phone numbers, including Carpenters, that had been given to them by one of Carpenters partners in crime. They relied on the Stored Communications Act, a 1986 law that allows phone companies to disclose records when the government provides them with specific and articulable facts showing that there are reasonable grounds to believe that records at issue are relevant and material to an ongoing criminal investigation; the government does not need to show that there is probable cause to believe that a crime has been committed. Such requests have become a common tool for police officers investigating crimes according to Carpenter, they are made in thousands of cases each year.

Investigators received several months worth of historical cell-site records, which indicate which cell towers a cellphone connected with while it was in use. Based on those records, investigators were able to determine that, over a five-month span in 2010 and 2011, Carpenters cellphone connected with cell towers in the vicinity of the robberies. After his arrest, Carpenter argued that the records should be suppressed because the government had not obtained a warrant for them. But the district court disagreed, and Carpenter was convicted and sentenced to almost 116 years in prison.

A federal appeals court upheld his convictions. Applying the Supreme Courts decision in Smith (among others), it ruled that the government was not required to obtain a warrant because Carpenter could not have expected that cellphone records maintained by his service provider would be kept private. Carpenter then asked the justices to weigh in, which they agreed to do in June.

Carpenter contends that the disclosure of his cellphone records to the federal government was a search for which the government needed a warrant. At the heart of this argument is the idea that, as Sotomayor has suggested, times have changed, and cellphones are different from the more primitive phone technology and bank records at issue in Smith and Miller. Therefore, he tells the justices, they should not mechanically apply their earlier decisions, but should instead use a more nuanced approach that accounts for both the volume and precision of the data that is now available for cellphones. And, in particular, the fact that a third party, such as Carpenters cellphone provider, has access to his cellphone records does not automatically mean that he cannot expect those records to remain private.

But even under Smith and Miller, Carpenter continues, he would still prevail. To determine whether he can expect his records to be kept private, he contends, the justices should look at whether he voluntarily gave the records to his service provider. Here, he stresses, he did not do so in any meaningful way, because he did not affirmatively give information about his location to his service provider by either making or receiving a call. Moreover, he suggests, another factor that the justices should consider his privacy interest in the information revealed by the records weighs heavily in his favor. Most people have their phones with them all the time, he emphasizes, which means that cellphone records can show where someone was and what he was doing at any given time, even in places most notably, at home where he would expect privacy.

In a friend of the court brief, the Electronic Frontier Foundation and other privacy groups echo Carpenters arguments. In particular, the groups highlight how times have changed since the courts third-party-doctrine decisions in the 1970s. Here, they observe, the SCA gives law-enforcement officials access to much more information than just the few days worth of dialed phone numbers at issue in Smith. Moreover, the data that can be obtained under the SCA are generated simply by the act of carrying a phone that has been turned on: It is created whenever the phone tries to send and receive information, generally without forethought or conscious action by the owner.

For the federal government, this case is a straightforward one, regardless of any new technologies like cellphones that may be involved. First, the government contends, Carpenter does not have any ownership interest in the cellphone records turned over to police by his service providers. Those providers, the government reasons, simply collected the information for their own purposes, which included a desire to find weak spots in their network and to determine whether roaming charges should apply.

Second, the government adds, Carpenter does not have any reasonable expectation of privacy in the cellphone records, which only tell the government where his cellphone connected with the towers, without giving it any information about what was said in his calls a core distinction, according to the government. What Carpenters argument really boils down to, the government argues, is that law-enforcement officers could infer from his service-providers records that he was near a particular cell tower at a particular time. But, the government counters, an inference is not a search.

The federal government also pushes back against Carpenters suggestion that broader privacy concerns weigh in favor of Fourth Amendment protection for his cellphone records. Cellphone users like Carpenter know (or at least should know) how their phones work: by giving off signals that are sent to the cellphone providers through the closest tower. Therefore, the government contends, Carpenter assumed the risk that the information would be divulged to police.

Carpenters argument that cellphone records are somehow more private than the financial information that was not protected in Miller has no real support, the government tells the justices. And the information at issue in Carpenters case is more limited than in United States v. Jones, in which the Supreme Court ruled that the installation of a GPS tracking device on a suspects car, without a warrant, violated the Fourth Amendment. In Jones, the government points out, the police used the GPS device to follow the cars movements continuously for 28 days, allowing them to pinpoint the cars location to within 50 to 100 feet. Here, the government emphasizes, the only information that the government received was which tower connected with Carpenters phone when he was making the calls.

Carpenters case is not the Supreme Courts first foray into the intersection of cellphone technology and the Fourth Amendment. In 2014,the justices ruled that police must obtain a warrantto search information stored on the cellphone of someone who has been arrested. In his opinion for the court, Chief Justice John Roberts emphasized that todays phones are based on technology nearly inconceivable just a few decades ago and are now such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy. And the justices made clear that their decision did not render the information on a cellphone completely off limits to police; it just meant that police officers will normally have to get a warrant. The justices may ultimately conclude that, as the federal government argues, giving law-enforcement officials access to information about where a particular cellphone has been is not the same as allowing them to review the kind of detailed personal facts available on the phone itself. But no matter what they decide, their ruling could shed significant new light on what limits the Fourth Amendment will impose on efforts by police to benefit from the significant technological advances in the 21st century.

Posted in Carpenter v. U.S., Summer symposium on Carpenter v. United States, Plain English / Cases Made Simple, Featured, Merits Cases

Recommended Citation: Amy Howe, The justices return to cellphones and the Fourth Amendment: In Plain English, SCOTUSblog (Jul. 31, 2017, 10:57 AM), http://www.scotusblog.com/2017/07/justices-return-cellphones-fourth-amendment-plain-english/

See more here:
The justices return to cellphones and the Fourth Amendment: In Plain English - SCOTUSblog (blog)