Getting It Wrong on Cell Phone Searches

 

The Supreme Court last week added another layer of confusion to the vexed law of unreasonable searches and seizures regarding law-enforcement use of cell phone data to ferret out criminal activity. In Carpenter v. United States, Chief Justice John Roberts, speaking for a five-member majority (including the four liberal justices—Ginsburg, Breyer, Kagan, and Sotomayor), ruled that information collected on Timothy Carpenter’s whereabouts, pursuant to the Stored Communications Act (SCA), was inadmissible. The SCA allows law enforcement to access certain telephone company records under a court order when it “offers specific and articulable facts showing that there are reasonable grounds to believe” that the records sought “are relevant and material to an ongoing criminal investigation.” Notwithstanding the SCA, police can now access historical cell-site location information (CSLI) only if they first obtain a warrant by meeting the higher standard of probable cause under the Fourth Amendment.

Carpenter is incorrect.


The facts of the case are as follows: In 2011, the police arrested four men suspected of robbing a Radio Shack and T-Mobile store in and around Detroit. These suspects confessed that they had participated in a number of local robberies, and gave the police the cell phone numbers of some of their other confederates, including Carpenter. Pursuant to the SCA, the police then obtained two orders from Federal Magistrate Judges commanding the men’s cell phone carrier, Metro PCS, to supply CSLI data, which is generated routinely and accurately in order to maintain and operate the networks efficiently. The police obtained about 130 days of data, which placed Carpenter near the sites of each robbery at the time of occurrence. This information helped secure Carpenter’s conviction.

To understand the SCA practice, let’s first put aside the Fourth Amendment to ask whether the police conduct was welcome or objectionable. That judgment in turn depends upon the trade-off between the intrusiveness of the police search and the reliability of the evidence obtained. On any view, Carpenter was worlds apart from the famous 1765 English case of Entick v. Carrington, where the Crown’s officers ransacked plaintiff Entick’s premises in a vain effort to find evidence of his seditious libel. This massive intrusion was done for no good reason. Entick’s trespass action for damages was rightly allowed against the invaders to redress the wrong. The modern remedy of excluding the evidence from trial was useless because no prosecution was ever brought.

Carpenter lies at the opposite extreme, as the collected information was clearly relevant to the criminal investigation. Its reliability was unimpeachable because the phone company prepared the information on all customers for its proper business purposes. And the intrusion on privacy was minimal, because the government neither listened to the phone call or accessed the private data stored on Carpenter’s cell phone. To anyone unversed in the niceties of constitutional law, using this evidence seems properly admissible, as Judge Raymond Kethledge held in the Court of Appeals for the Sixth Circuit.

How, then, did the Chief Justice go astray? By parsing the Fourth Amendment in ways that defy common sense. Let’s look at the text of the amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

The first question, logically enough, is whether the effort to track down Carpenter’s movements constitutes a search covered by the Fourth Amendment. The answer becomes clear once we reject any tight linkage between a physical trespass on the one hand and a search on the other. Thus I can walk through your land without permission and not perform any search. Or I can shine a searchlight through your window and perform a search—i.e. the conscious collection of information—without a trespass. By this standard, CSLI is a search, as is tailing Carpenter day and night. But is that search reasonable? The Chief Justice said no unless probable cause is shown, at which point a warrant is needed except in cases of emergencies. The Fourth Amendment’s text, however, uses the terms “reasonable” in opposition to the phrase “probable cause.” Yet the Chief Justice treats them as synonymous.

Why? Because today’s new high-powered technology allows government to conduct far more comprehensive and accurate searches than ever before. In his dissent, Justice Anthony Kennedy disputed that contention by insisting that the new technology was not as accurate as the Chief Justice claimed. But his odd response takes us in exactly the wrong direction. Courts routinely exclude evidence that is more prejudicial than probative under Rule 403 of the Federal Rules of Evidence. It would be bizarre to condemn this search as unreasonable because it uses mechanical means to track location to the inch when, unlike human investigations, it poses no risk of erroneous or fabricated evidence falsely putting Carpenter at the scene of the crime. Also, the court order under the SCA ensures that the government has good reason to access this evidence, thereby preventing the police from simply accessing data on random persons. Carpenter reveals no abuse that the Fourth Amendment needs to check. It is the just the sort of procedure we want the police to follow.

At this point, a question arises: just when is a warrant required? Here it is instructive to compare Carpenter with the 2014 Supreme Court decision in Riley v. California, where the police examined the extensive contents of the cell phone they seized from Riley incident to a lawful arrest. In that case, the Chief Justice rightly excluded that information because sifting through reams of private data is substantially more invasive the following someone’s public movements. Moreover, California’s reasons for accessing all this data look like the proverbial fishing expedition barred by the Fourth Amendment. Now the trade-off between the private and public interests flip over, so that probable cause should be required before examining any of the data stored on the phone. Accordingly, the government can retain the phone long enough to see if it can get a warrant to look at the contents.

Unfortunately, in arguing Carpenter, the government did not offer the right analysis. Instead, it invoked what is commonly called “the third-party doctrine” to insist that Carpenter had no “reasonable expectation of privacy” because he had voluntarily turned over that data to a third party, namely the phone company. On its view, the government does not even have to show reasonable grounds for the search: sharing the data counts as a complete waiver of all Fourth Amendment rights. As I have long argued, and Justice Neil Gorsuch explicitly accepted in his dissent, the government’s argument distorts the notions of consent and assumption of risk. It is perfectly common for people to turn over information to third parties on the express or implied condition that those third parties will keep it confidential. It is therefore preposterous to give the government unfettered access to that information. Such a rule would mean that any information stored in the cloud could be accessed by the government on demand—sheer constitutional overkill.

The source of this confusion lies in the slippery phrase “reasonable expectations of privacy.” Those words were first used, innocently enough, in the 1967 Supreme Court case of Katz v. United States, where they were employed to block the government from connecting a tap to the outside of the phone booth in which the accused was making betting calls. Unlink the definition of a search from that of a trespass, and this fancy phrase becomes a needless distraction. It is possible to search by hearing as well as by seeing.

Make that correction and the two landmark Supreme Court third-party doctrine cases fall neatly into place. In Smith v. Maryland (1979), the government was allowed to introduce evidence obtained by a pen register that simply recorded all outgoing telephone numbers without listening to the call. The Chief Justice in Carpenter makes a futile effort to distinguish Smith on the grounds that CSLI is more intrusive, without explaining why it remains permissible for a squad of police officers to tail Carpenter’s movement without any court authorization at all. The Fourth Amendment does not mandate higher expenditures for more suspect results. Given Smith, the investigative protocol followed in Carpenter should be embraced with open arms. The exact opposite conclusion applies to United States v. Miller (1976), which let the government introduce bank records and checks to convict the defendant for “possessing an unregistered still” used for making illegal liquor. Here, the content of these records should have been off limits until the government could establish probable cause.

It is odd for the Chief Justice to go out of his way to tolerate a government search that is likely to lead to real abuse, while blocking well-conceived access of routine, non-confidential business records for no good reason at all. It is all too easy to claim that changed technological circumstances require scrapping old doctrines. But in this, as in so many other areas, that hasty conclusion is wrong. Get the conceptual foundations right the first time, and the resulting doctrine will prove more durable and sensible than the Chief Justice’s confused Carpenter decision. It is time for the Court to redo Fourth Amendment law from the ground up.

© 2018 by the Board of Trustees of Leland Stanford Junior University

Published in Law
Like this post? Want to comment? Join Ricochet’s community of conservatives and be part of the conversation. Join Ricochet for Free.

There are 6 comments.

Become a member to join the conversation. Or sign in if you're already a member.
  1. Stad Coolidge
    Stad
    @Stad

    Whew!  This is the exhaustive legal analysis we’ve come to expect from half of the Law Talk duo.  This statement though, bothers me:

    “How, then, did the Chief Justice go astray? By parsing the Fourth Amendment in ways that defy common sense.”

    I’m reminded of the Obamacare ruling, where a fee is a tax is a fee is a tax, depending on who’s looking at it and why.  If Justice Roberts is borderline unreliable on key rulings, then we desperately need conservative replacements for Ginsberg, Kennedy, and Breyer.

    • #1
  2. Hank Rhody, Possibly Mad Contributor
    Hank Rhody, Possibly Mad
    @HankRhody

    Richard Epstein: And the intrusion on privacy was minimal, because the government neither listened to the phone call or accessed the private data stored on Carpenter’s cell phone.

    Why?

    Someone seeing you in public is a minimum intrusion on privacy. Someone following you everywhere you go in public is a stalker.

    • #2
  3. AltarGirl Member
    AltarGirl
    @CM

    I don’t understand the Carpenter case at all and why this was even necessary.

    Wouldn’t the first hand witness accounts of the accomplices be enough reasonable suspicion to obtain a warrant in the first place? And they did take that information to a judge to get permission to get the cell phone data, it just wasn’t in the form of a warrant.

    Really, the only thing missing in that case was the legal paperwork. Would it have been that hard to get?

    I’m afraid I’m with Hank Rhody on this one… interestingly different than my position of traffic cams on privacy.

    • #3
  4. Unsk Member
    Unsk
    @Unsk

    Richard, What is your opinion of Gorsuch’s dissent. I happen to think it to be  a very enlightening thing of beauty.

    Justice Gorsuch in his dissent: (from Taylor Millard at HotAir)

    “(T)he fact that a third party has access to or possession of your papers and effects does not necessarily elimi- nate your interest in them. Ever hand a private document to a friend to be returned? Toss your keys to a valet at a restaurant? Ask your neighbor to look after your dog while you travel? You would not expect the friend to share the document with others; the valet to lend your car to his buddy; or the neighbor to put Fido up for adoption. Entrusting your stuff to others is a bailment. A bailment is the “delivery of personal property by one person (the bailor) to another (the bailee) who holds the property for a certain purpose.” Black’s Law Dictionary 169 (10th ed. 2014); J. Story, Commentaries on the Law of Bailments §2, p. 2 (1832) (“a bailment is a delivery of a thing in trust for some special object or purpose, and upon a contract, expressed or implied, to conform to the object or purpose of the trust”). A bailee normally owes a legal duty to keep the item safe, according to the terms of the parties’ contract if they have one, and according to the “implication[s] from their conduct” if they don’t…A bailee who uses the item in a different way than he’s supposed to, or against the bailor’s instructions, is liable for conversion…

    These ancient principles may help us address modern data cases too. Just because you entrust your data—in some cases, your modern-day papers and effects—to a third party may not mean you lose any Fourth Amendment interest in its contents.Whatever may be left of Smith and Miller, few doubt that e-mail should be treated much like the traditional mail it has largely supplanted— as a bailment in which the owner retains a vital and protected legal interest…

    I would look to a more traditional Fourth Amendment approach. Even if Katz may still supply one way to prove a Fourth Amendment interest, it has never been the only way. Neglecting more traditional approaches may mean failing to vindicate the full protec- tions of the Fourth Amendment.”

    • #4
  5. Mendel Inactive
    Mendel
    @Mendel

    I must admit I have almost no idea what Prof. Epstein is trying to say here. 

    My understanding is that the majority opinion said that cell tower location data is private enough that a warrant and not a court order is required. Does he think that location data is simply not that sensitive? 

    My understanding is that under the previous legal paradigm, credit card data only required a court order and not a warrant to be reviewed by investigators. And since credit card data is (or was) often used to establish a timeline of locations for a subject, I suppose there is some similarity. But I’m a) not sure I’m comfortable with police being able to seize credit card records without a warrant, and b) cell tower data paints a much more comprehensive picture of one’s whereabouts.

    • #5
  6. Mendel Inactive
    Mendel
    @Mendel

    Unsk (View Comment):
    Ever hand a private document to a friend to be returned? Toss your keys to a valet at a restaurant? Ask your neighbor to look after your dog while you travel? You would not expect the friend to share the document with others; the valet to lend your car to his buddy; or the neighbor to put Fido up for adoption. Entrusting your stuff to others is a bailment. A bailment is the “delivery of personal property by one person (the bailor) to another (the bailee) who holds the property for a certain purpose.”

    I’m not sure I completely agree with Gorsuch’s equation of cell tower data with “handing a private document to a friend”. That would be more akin to me backing up my hard drive with a cloud storage service. Or the contents of any phone calls or emails I might send across the cellular network.

    But my location data is the result of, quite literally, an ongoing conversation between me (or my device) and my service provider. In that case, the two of us are creating new information together. So from that view, it’s not “my stuff” (as Gorsuch puts it), it’s “our stuff”, and the telecom has a much different form of ownership over the data.

    I still think I should be allowed to sign a contract with the telecom that our jointly-created data will remain private and not be handed over to any authorities without a warrant. But Gorsuch still goes too far for my taste.

    • #6
Become a member to join the conversation. Or sign in if you're already a member.