Reasonable Searches in the Digital Age

 

This past week, the United States Supreme Court heard oral argument in Carpenter v. United States, a case that goes to the heart of the government’s power to track private individual behavior without a warrant. Timothy Carpenter and his henchmen had engaged in a series of armed robberies in Michigan and Ohio that led to his conviction for up to 116 years in prison. In his opinion, Judge Raymond Kethledge of the Sixth Circuit correctly observed that the Fourth Amendment’s protection against unreasonable searches and seizures “has long recognized a distinction between the content of a communication and the information necessary to convey it. Content, per this distinction, is protected under the Fourth Amendment, but routing information is not.”

Accordingly, Kethledge let the government introduce into evidence the business records from the defendants’ wireless carriers that placed the defendants at or near the scene of several violent robberies. Alone, that evidence could never support a conviction for armed robbery, but its value lies in contravening the defendants’ alibi that they were elsewhere at the time.

Kethledge’s analysis received a rocky reception at the Supreme Court, as both liberal and conservative’s fretted about the invasions of privacy from such extended surveillance. A puzzled Justice Stephen Breyer professed astonishment by observing: “This is an open box. We know not where to go.” In contrast, Justice Elena Kagan had a more pointed objection. She noted that in United States v. Jones (2012), the Court reversed a conviction for narcotics trafficking because the government had conducted an illegal search by attaching a GPS tracking device to the defendant’s wife’s car without a warrant. According to the majority in that case, attaching the GPS amounted to a common law trespass, which Justice Antonin Scalia held justified suppressing that evidence. To Kagan, the government had to explain how using phone company records differed from using the GPS system, when both give exhaustive and accurate information about the defendant’s whereabouts.

In claiming that Jones governs Carpenter, she sought to update the Fourth Amendment in an age of digital searches. Her underlying claim was that the government’s action violated the defendant’s “reasonable expectation of privacy,” which was first announced in the key 1967 Supreme Court decision of Katz v. United States. Katz held that evidence the government had collected by attaching “an electronic listening and recording device to the outside of the public telephone booth from which [the defendant] had placed his calls” was inadmissible. Even without the trespass, the collection of information from private conversations without a warrant was held illegal.

After Katz, the challenge has been to define a reasonable expectation of privacy. On this point, Kagan rightly notes the equivalence between trespassory and nontrespassory searches, from which she then draws exactly the wrong conclusion. It’s Jones that is wrong, not Carpenter. Social expectations matter, but the trespass does not. The correct approach in both cases is to push the Kethledge line by allowing the government to track a defendant with both GPS and phone data, so long as it can examine the content of any seized information only after it establishes the probable cause needed for a warrant.

Let’s start with the simple observation that the government has long been allowed to use visual surveillance to track the whereabouts of a person, without suspicion and without the probable cause needed to obtain a search warrant. Since the Supreme Court’s critical 1968 decision in Terry v. Ohio, that suspicion justifies a police officer stopping and frisking a potential target, and the information acquired or any weapon seized may be either introduced into evidence or serve as the basis for a warrant to conduct a more intrusive search.

As Justice Scalia noted in Jones, the government decided to track Jones only after it had developed reasonable suspicion that he was engaged in criminal activity. None of the surveillance tactics used to develop this suspicion required a search warrant. The police used ordinary visual surveillance, which they do every time they watch people scurry to and fro on public streets. They also used a hidden camera located outside of Jones’ nightclub. Finally, they used a “pen register,” which recorded phone calls that he had made to other people. In the 1979 case of Smith v. Maryland, Maryland had, without a warrant, requested a phone company to install a special pen register that allowed it to record all the phone numbers dialed from the home of the accused. At trial in Smith, the defendant sought to suppress the use of those numbers as well as “all fruits derived from” the use of the pen register. The court rejected the request on the ground that the accused did not have a “legitimate expectation of privacy” in this information.

The use of that phrase sounds conclusory, no matter how often it is invoked. Nonetheless, the good logic behind the phrase calls attention to the inevitable tradeoff between individual privacy and law enforcement. To shield information of this sort would give criminals enormous leeway. But using it to track down the movements of criminal suspects does much to curtail illegal behavior, with minimal personal intrusion. From behind a social veil of ignorance, we all benefit more from allowing these limited searches notwithstanding the infringement on privacy they entail. The line between content and routing is clear in practice, and recognizing this difference strikes a sensible balance that makes routing searches reasonable, with or without the trespass.

Nor does that balance change when we move from the pen register to comprehensive data collection. The intrusions today are more frequent but they are no more severe. Indeed, the possibility of abuse is less given that there is no need for any special government request. Most critical, using this information allows for better and more directed searches, which reduce the risk of invading the privacy of innocent third parties. And the social gains from these limited searches can be tremendous, when the apprehension of armed robbers weighs on the other side. Here it is always understood that the government needs to have some suspicion to track this data, so that random searches of these connections should not normally be allowed. In addition, the information so collected can only be used in connection with a particular investigation, but otherwise has to remain outside the reach of law enforcement officials.

Once these two limitations on data collection and use are acknowledged, the decisive answer to Justice Kagan is that Carpenter should be affirmed and Jones overruled. Trespass or not, the GPS device did not allow the government to record any conversations or observe any activities by the car’s occupants. Why then attach a device that lets the government cut down on its surveillance costs on the one hand and increase the accuracy of its search on the other? The new technology allows for better authentication of records in controlling police abuse, issuing warrants, and in trying cases. The cash savings could then allow for more extensive criminal investigations subject to the same safeguards. Note, moreover, the law enforcement disaster if Carpenter goes the way of Jones. It would mean surveillance cameras and pen registers would be off limits for tracking terrorists and violent crimes. In addition, the so-called “fruit of the poisonous tree” derived from these limited searches could be inadmissible as well, even if obtained by a warrant. The minimal privacy intrusion is a small price to pay for the increase in overall safety.

Nothing on this view disturbs the 2014 Supreme Court decision in Riley v. California, which forbade the police from searching the digital information contained on the cell phone of an arrested person without a warrant in the absence of the “exigent circumstances” that sometimes justifies a search incident to an arrest. Instead, the correct procedure allows the government to retain possession of the cell phone without search until it accumulates enough probable cause for a search warrant.

Similarly, admitting the tracking evidence in Carpenter does not fortify the so-called “third-party doctrine” announced in the 1976 Supreme Court decision of United States v. Miller, which held that the Fourth Amendment does not protect confidential information that a defendant turns over to someone else for safekeeping such as checks and other bank records. But these government searches do not just track location. It is a non-sequitur to say that the government can examine any information when private people have voluntarily conveyed it to third parties. All explicit social expectations rightly run the other way. The rule in Riley works well here. The government can take custody of the documents until it can get a warrant. But following Riley in no way requires that the law should encourage people to form dangerous expectations, such as that the government cannot track their movements by the best means available prior to the commission of a crime. What matters in these cases is the types of information the government seeks—location or content.

Katz was right to downplay the absence of a trespass. Jones was wrong to play it up. Judge Kethledge got Carpenter right. The Supreme Court should follow his lead.

© 2017 by the Board of Trustees of Leland Stanford Junior University

Published in Law
Like this post? Want to comment? Join Ricochet’s community of conservatives and be part of the conversation. Join Ricochet for Free.

There are 12 comments.

Become a member to join the conversation. Or sign in if you're already a member.
  1. Robert McReynolds Member
    Robert McReynolds
    @

    Might it be time to update this standard for the digital age? I mean, sure looking at the outside of an envelope is fine and dandy if you are a cop, but that envelope does not say in what mailbox it was placed. In the digital age, metadata is the thing used to track movement because of how the cell phone has to communicate to the cell towers. With this, approximating location is very near perfect. So now one might argue that metadata is as important as the content itself. Also, the difference between this and the old days of using the pay phone system is that the cell phone is a personal, portable device, so even though you are walking down the sidewalk, should an expectation of privacy in both content and movement not be present? If a cop is standing next to you while you have your conversation about an illegal act, then I see no problem with the cop detaining you. But if the cop has to go to the service provider to track down where you were at a given time without a warrant, then I see huge problems here.

    • #1
  2. Robert McReynolds Member
    Robert McReynolds
    @

    Regarding Terry v. Ohio, I asked in my Crim Law class this semester if the cop could have accomplished his goal–preventing an armed robbery of a convenience store–by going into the store as a show of force protection rather than the arbitrary “I suspect something and therefore I am in my right to act” standard that Terry established? The suspected armed robbery would possibly have been thwarted and the rights of individuals would still be intact.

    • #2
  3. KingOfSwaziland Inactive
    KingOfSwaziland
    @KingOfSwaziland

    Apparently it’s just toooooooo much to ask that the government GET A DAMN WARRANT in order to obtain every nano-scrap of information about it’s serf… er subjec… er citizens.

    Epstein writes as if the choice is between the govt. wandering blind and stupid when it comes to criminal investigations and them having free access to every digital scrap you’ve ever made, everywhere you have ever been (including by them trespassing on your property), a truly obscene amount of data.

    The ignored third way is that the govt. do what they should be doing and GETTING A DAMN WARRANT.

    • #3
  4. genferei Member
    genferei
    @genferei

    I wonder if there really is a bright line between location and content. After all, the location is (or may well be) encoded in data sent by (or stored in) the phone. Is it such a step from geo-location to relative movement? Then we know where the suspect was, how fast she was moving, and in which direction. A simple tail could have told us the same thing. Then we move to heart-rate and body temperature. Again, not content, per se, and something that theoretically could have been gathered by a particularly acute human observer. But so could the movements of the lips and the vibrations of the vocal chords – potentially gathered by the movement sensor rather than the microphone. And…

    Anyway, the whole analysis depends on citizens being able to trust the government. The tiny fraction of government devoted to the suppression of armed robbery is to be wholeheartedly supported. The rest, not so much. But this is surely a matter where Congress, not the Courts, should be developing appropriate checks and balances. (Although we know what sort of checks and balances – bank ones – appeal to legislators…)

    • #4
  5. Robert McReynolds Member
    Robert McReynolds
    @

    genferei (View Comment):
    I wonder if there really is a bright line between location and content. After all, the location is (or may well be) encoded in data sent by (or stored in) the phone. Is it such a step from geo-location to relative movement? Then we know where the suspect was, how fast she was moving, and in which direction. A simple tail could have told us the same thing. Then we move to heart-rate and body temperature. Again, not content, per se, and something that theoretically could have been gathered by a particularly acute human observer. But so could the movements of the lips and the vibrations of the vocal chords – potentially gathered by the movement sensor rather than the microphone. And…

    Anyway, the whole analysis depends on citizens being able to trust the government. The tiny fraction of government devoted to the suppression of armed robbery is to be wholeheartedly supported. The rest, not so much. But this is surely a matter where Congress, not the Courts, should be developing appropriate checks and balances. (Although we know what sort of checks and balances – bank ones – appeal to legislators…)

    Why? This tiny fraction is just as prone to corruption–if not more so–than the rest of government. There is nothing saintly behind putting on a badge such that once the person dons it, he/she all of a sudden becomes the paragon virtue. It’s bad when a lowly zoning official abuses their power. You give that zoning official the full force of the government, put a badge and a side arm on them, and then have the judges say that pretty much anything you do will be supported by us, and you have just created an authoritarian police state. No, if the cops want to fight crime and uphold the rights of the individual, then they need to stop looking for short cuts, stop trying to be pre-emptive, and start using real investigative techniques that require them to not be lazy.

    • #5
  6. genferei Member
    genferei
    @genferei

    Robert McReynolds (View Comment):

    Anyway, the whole analysis depends on citizens being able to trust the government. The tiny fraction of government devoted to the suppression of armed robbery is to be wholeheartedly supported.

    Why? This tiny fraction is just as prone to corruption–if not more so–than the rest of government. There is nothing saintly behind putting on a badge such that once the person dons it, he/she all of a sudden becomes the paragon virtue.

    Ah – I meant “devoted” in the saintly, personal devotion, sense, not the ‘allocated by the state’ sense.

    • #6
  7. Hank Rhody, Roustabout Contributor
    Hank Rhody, Roustabout
    @HankRhody

    Richard Epstein: To shield information of this sort would give criminals enormous leeway. But using it to track down the movements of criminal suspects does much to curtail illegal behavior, with minimal personal intrusion.

    Define “minimal personal intrusion.” It’s use in this context seems to be begging the question.

    Richard Epstein: Indeed, the possibility of abuse is less given that there is no need for any special government request.

    You’re going to have to explain that one to me. Request implies that someone else has to look at and approve or deny said search. I don’t see how involving one less person in the process makes it less prone to abuse.

    Richard Epstein: Here it is always understood that the government needs to have some suspicion to track this data, so that random searches of these connections should not normally be allowed. In addition, the information so collected can only be used in connection with a particular investigation, but otherwise has to remain outside the reach of law enforcement officials.

    Why? I’m darn well not going to understood such things until I see it in black and white in the constitution, and even then I’m not going to trust it as far as I can kick an FBI agent.

    • #7
  8. Hank Rhody, Roustabout Contributor
    Hank Rhody, Roustabout
    @HankRhody

    Richard Epstein: Nor does that balance change when we move from the pen register to comprehensive data collection.

    Why not?

    The thing about the pen register in Smith, they had to know who they wanted to track. Even if, as a legal matter, they didn’t need a warrant to get that information, as a practical matter someone had to know Smith’s name, and care enough to want to gather that information.

    In the digital age the marginal cost to track one more citizen is so close to zero as to make no difference. The mere existence of such a database lends itself to abuse. Even if it doesn’t, the possibility that the panopticon has blackmail material on you might be enough to change your actions.

    But we’re getting  ahead of ourselves. “Abuse” isn’t the problem. The problem is that, in a republic ran by the consent of the governed, somehow we’re settling this question at three to four steps removed from any consent. Who the heck told the government they can track my location data without a warrant? I sure didn’t.

    • #8
  9. Robert McReynolds Member
    Robert McReynolds
    @

    Hank Rhody, Roustabout (View Comment):

    Richard Epstein: Nor does that balance change when we move from the pen register to comprehensive data collection.

    Why not?

    The thing about the pen register in Smith, they had to know who they wanted to track. Even if, as a legal matter, they didn’t need a warrant to get that information, as a practical matter someone had to know Smith’s name, and care enough to want to gather that information.

    In the digital age the marginal cost to track one more citizen is so close to zero as to make no difference. The mere existence of such a database lends itself to abuse. Even if it doesn’t, the possibility that the panopticon has blackmail material on you might be enough to change your actions.

    But we’re getting ahead of ourselves. “Abuse” isn’t the problem. The problem is that, in a republic ran by the consent of the governed, somehow we’re settling this question at three to four steps removed from any consent. Who the heck told the government they can track my location data without a warrant? I sure didn’t.

    Right I think that is the whole point here: who the hell said that the general government–or any government–has the authorization to track you simply because you carry a digital device in your pocket? Owning technology should not give cops the “probable cause” to just start tracking you and collecting information of any kind about you, whether it be metadata or content.

    • #9
  10. The Reticulator Member
    The Reticulator
    @TheReticulator

    Hank Rhody, Roustabout (View Comment):
    But we’re getting ahead of ourselves. “Abuse” isn’t the problem. The problem is that, in a republic ran by the consent of the governed, somehow we’re settling this question at three to four steps removed from any consent. Who the heck told the government they can track my location data without a warrant? I sure didn’t.

    I think the potential for abuse is the problem, whether or not the people who are governed consent to it.

    • #10
  11. Hank Rhody, Roustabout Contributor
    Hank Rhody, Roustabout
    @HankRhody

    The Reticulator (View Comment):

    Hank Rhody, Roustabout (View Comment):
    But we’re getting ahead of ourselves. “Abuse” isn’t the problem. The problem is that, in a republic ran by the consent of the governed, somehow we’re settling this question at three to four steps removed from any consent. Who the heck told the government they can track my location data without a warrant? I sure didn’t.

    I think the potential for abuse is the problem, whether or not the people who are governed consent to it.

    I’ve got to disagree with you there. Either the people rule the government or the government rules the people. Whether or not a particular proposal is a good idea doesn’t enter into it until that question is settled.

    • #11
  12. The Reticulator Member
    The Reticulator
    @TheReticulator

    Hank Rhody, Roustabout (View Comment):

    The Reticulator (View Comment):

    Hank Rhody, Roustabout (View Comment):
    But we’re getting ahead of ourselves. “Abuse” isn’t the problem. The problem is that, in a republic ran by the consent of the governed, somehow we’re settling this question at three to four steps removed from any consent. Who the heck told the government they can track my location data without a warrant? I sure didn’t.

    I think the potential for abuse is the problem, whether or not the people who are governed consent to it.

    I’ve got to disagree with you there. Either the people rule the government or the government rules the people. Whether or not a particular proposal is a good idea doesn’t enter into it until that question is settled.

    Now we’ve got two things to disagree about, because I don’t think it’s so binary as either/or.

    • #12
Become a member to join the conversation. Or sign in if you're already a member.