• Welcome to Religious Forums, a friendly forum to discuss all religions in a friendly surrounding.

    Your voice is missing! You will need to register to get access to the following site features:
    • Reply to discussions and create your own threads.
    • Our modern chat room. No add-ons or extensions required, just login and start chatting!
    • Access to private conversations with other members.

    We hope to see you as a part of our community soon!

Should the Court Force Criminals to Use Burner Phones?

Nous

Well-Known Member
Premium Member
Actually, even though that question can hardly be avoided here, my primary question is too long for the title: What are our reasonable expectations of privacy regarding data that businesses create about us for legitimate purposes? These questions arise from Carpenter v. US (Sixth Circuit opinion), which the Court will entertain this term.

In 2011, Detroit police arrested four men suspected in a string of armed robberies of Radio Shack and T-Mobile stores in Michigan and Ohio. One of the suspects confessed to 8 such robberies, and gave details of a substantial operation consisting of 15 other men who served as getaway drivers, lookouts, etc. The confessor fingered Timothy Carpenter and his half-brother Timothy Sanders as the masterminds of this operation, claiming that the two of them often supplied the guns, and that Carpenter would usually sit in a stolen car across the street from the target store, and use his cellphone to signal the robbers to enter the store and perpetrate the robberies. (Later at trial, 7 of the other suspects testified similarly.) Upon arrest, the confessor gave the FBI his cellphone number and the numbers of the other alleged participants. The FBI applied for a court order to obtain from the wireless carriers the transactional data for these phone numbers, including the cell-site location information (CSLI). CSLI identifies to which cell tower and from which direction a phone connected when a call was sent and ended (some CSLI includes tower switching information, but this was not sought in this case). The court granted the request pursuant to the Stored Communications Act, 18 USC § 2703, which provides in relevant part:

18 USC § 2703 - Required disclosure of customer communications or records

(d) Requirements for Court Order.—

A court order for disclosure under subsection (b) or (c) may be issued by any court that is a court of competent jurisdiction and shall issue only if the governmental entity offers specific and articulable facts showing that there are reasonable grounds to believe that the contents of a wire or electronic communication, or the records or other information sought, are relevant and material to an ongoing criminal investigation.​

The CSLI showed that Carpenter had used his phone within 0.5-2 miles of the stores at the time of 4 of the robberies. Carpenter and Sanders moved to suppress the CSLI evidence on grounds that obtaining it constituted a Fourth Amendment search requiring a warrant supported by probable cause. The district court denied the motion; the defendants were convicted of 6 counts of armed robbery (inter alia), and appealed. The Sixth Circuit affirmed the district court's judgment to allow the evidence.

The Circuit court's rationale is straightforward, premised first and foremost on the “third party” doctrine wherein information one has knowingly or voluntarily shared with a third party (including a business) does not command Fourth Amendment protection, while information for which one has a reasonable expectation of privacy requires a warrant supported by probable cause. Thus, a search warrant is required to inspect the contents of packages and letters sent by USPS or commercial carriers, but not for the government to obtain readily available information such as a recipient's name, address, or other features of the item such as weight and size: Ex parte Jackson (1878). In Katz v. US (1967) -- in which the reasonable expectation standard was first articulated in a concurrence by Justice Harlan -- the Court held that the FBI's warrantless bugging device attached to the outside of a phone booth that recorded Katz's conversations in which he transmitted illegal gambling wagers was an unconstitutional invasion of his privacy. In contrast, Smith v. Maryland (1979) involved the warrantless installation of a pen register--a device, attached at the telephone company's switching facility, that tracked the numbers dialed from the defendant's phone--which the Court found was not a Fourth Amendment search, since such information is freely available to and required by the phone company in order to connect the calls. Similarly, in US v. Miller (1976), the Court did not find a Fourth Amendment violation when a grand jury acquired by subpoenas duces tecum the bank records of a man under criminal investigation. The Sixth Circuit has unproblematically held that obtaining the content of emails requires a warrant based on probable cause, but routing information and IP addresses are not constitutionally protected, because such information, like addresses on pieces of mail, are and must be available to service providers: US v. Warshak (2010).

US v. Jones (2012) and Riley v. California (2014) are the primary case law on which Carpenter's arguments rely. Jones pertains to an episode that essentially amounts to police misconduct. The District of Columbia PD obtained a warrant to attach a GPS device to a vehicle registered to Jones' wife but which Jones possessed (at least sometimes). The warrant authorized installation of the device in DC and within 10 days. Agents installed the device on the 11th day and in Maryland. The vehicle was tracked for 28 days. Subsequently Jones was indicted on drug trafficking conspiracy charges. The district court suppressed the GPS data obtained while the vehicle was parked at Jones' residence, but admitted all other data on the basis that Jones had no reasonable expectation of privacy while driving on public streets (consistent with US v. Knotts (1983)). Jones was convicted, appealed, and the Circuit court threw out the conviction. The Supreme Court affirmed in a decision that was unanimous in judgment but with competing rationales. Justice Scalia's majority opinion reached back to the ancient roots of the Fourth Amendment's concept of a “search,” which is bound up with the common-law doctrine of trespass to chattels. The opinion asserts, “The Government physically occupied private property for the purpose of obtaining information.” Justice Alito's concurrence, joined by Justices Ginsburg, Breyer and Kagan, upbraids this reasoning in favor of the reasonable expectation of privacy standard. Nevertheless, the majority apparently concluded that locating the Fourth Amendment violation in the trespass that occurred more readily justified the exclusion of all the GPS data, including that obtained when Jones was driving on public streets.

In any case, the rationale of the majority opinion in Jones is certainly inapplicable to the situation in Carpenter--the FBI did not physically occupy or trespass on any property belonging to Carpenter. Alito's concurrence doesn't seem very germane to Carpenter either. According to Harlan's formulation of the reasonable expectation of privacy, the first requirement is that the person asserting it must “have exhibited an actual (subjective) expectation of privacy”. There is no indication that Carpenter exhibited any such expectation of privacy for his CSLI logs, and there is little reason to conclude that he should have. After all, as readily available online, the big name wireless companies (e.g., Verizon, AT&T, Sprint) specifically state in their contracts that they collect such CSLI data and provide it to governmental agencies when lawfully ordered. The average reasonable person cannot plausibly deny knowing that location data are an integral aspect of the business of wireless carriers. Roaming charges depend on the service providers having location data.

Riley combined two independent cases where individuals were legitimately arrested, whereupon police seized their cellphones, accessed information from the phones, and charged the persons with additional offenses on the basis of this information. A unanimous Court held, “The police generally may not, without a warrant, search digital information on a cell phone seized from an individual who has been arrested.” The purpose of warrantless searches of the person or effects of an arrestee is to ensure officer and public safety and to prevent the destruction of evidence. This case and holding seems to have little relevance to Carpenter. Carpenter's brief does not seem to get around to making a direct connection between the cases.

The brief for Carpenter repeatedly references the Telecommunications Act, especially the term used in 47 USC § 222(c), “customer proprietary network information”. Carpenter's brief claims that this term in the context of the statute denotes such propositions as: “Federal law grants individuals a proprietary interest in their CSLI records by prohibiting service providers from disclosing that information without 'express prior authorization of the customer.' 47 USC § 222(f).” But the statute doesn't actually declare any such grant of “proprietary interest,” and, moreover, § 222(c)(1) stipulates an explicit exception for the privacy requirements of telecommunications carriers: “Except as provided by law . . .” a service provider may not disclose “individually identifiable customer proprietary network information . . .”--one such law being 18 USC § 2703(d) (above). Thus, unless the Court were to find that 18 USC § 2703(d) is facially unconstitutional (which Carpenter doesn't urge), then petitioner's argument and claims about 47 USC § 222 are simply irrelevant.
 

Nous

Well-Known Member
Premium Member
Seemingly the most confounding wrinkle pertaining to § 2703(d) is the fact that it's hard to say whether or not there been a split among the Circuits. There has possibly been a split in statutory construction, as indicated by the decision of a Third Circuit panel in In re Application of the U.S. for an Order Directing a Provider of Electronic Communication Service to Disclose Records to the Government (2010). Note the wording of the statute: “A court order for disclosure . . . may be issued by any court that is a court of competent jurisdiction and shall issue only if the governmental entity offers specific and articulable facts . . .” The words “may be issued” are paradigmatic of endowing a court or other body with discretion in whether to do the thing or not. A magistrate judge in Pennsylvania, upon the government's application for CSLI data, refused to issue the order on the grounds that the statute does not require her to issue an order, and she therefore cited Federal Rules of Criminal Procedure 41(d), which requires a judge to issue a search warrant “if there is probable cause to search for and seize a person or property or to install and use a tracking device.” She deemed that cellphones meet the simple definition of “mobile tracking devices” given in 18 USC § 3117 (b). One has to admire her cleverness. Two other magistrate judges in that district signed her order, which is simply unheard of.

The Third Circuit's majority opinion noted other statutes written similarly as § 2703(d) where uncontroversially the word “may” is not interpreted as requiring, and, further, where “only if . . .” describes a necessary but not sufficient condition. One can formulate all manner of lucid sentences in such a way: “Anyone may post messages on RF, and shall post messages only if s/he registers as a member first.” That sentence obviously doesn't mean that anyone must post messages on RF. It doesn't mean that someone must post messages on RF if s/he first registers as a member. “Shall post messages only if . . .” merely specifies a bare naked minimal condition for posting.

The Circuit panel (rightly) found that CSLI is not information originating from a “tracking device”. Thus § 2703(d) does not require probable cause. The panel vacated the MJ's order denying the government's application for CSLI, and remanded. The panel majority agreed that the statute allows the option of requiring probable cause for a warrant:

Because the statute as presently written gives the MJ the option to require a warrant showing probable cause, we are unwilling to remove that option although it is an option to be used sparingly because Congress also included the option of a § 2703(d) order. However, should the MJ conclude that a warrant is required rather than a § 2703(d) order, on remand it is imperative that the MJ make fact findings and give a full explanation that balances the Government’s need (not merely desire) for the information with the privacy interests of cell phone users.​

The opinion had already noted that the statutory language suggesting that the government may obtain records by either a warrant requiring probable cause or a court order under § 2703(d) led to the consequence that, “There is an inherent contradiction in the statute or at least an underlying omission. A warrant requires probable cause, but there is no such explicit requirement for securing a § 2703(d) order. We respectfully suggest that if Congress intended to circumscribe the discretion it gave to magistrates under § 2703(d) then Congress, as the representative of the people, would have so provided.”

Judge Tashima concurred in judgment and “most of the reasoning of the majority opinion,” but points out the apparent incongruity when “the majority suggests that Congress did not intend to circumscribe a magistrate’s discretion in determining whether or not to issue a court order, while at the same time acknowledging that '[o]rders of a magistrate judge must be supported by reasons that are consistent with the standard applicable under the statute at issue.'” The “standard applicable under the statute at issue” is not probable cause for a warrant but “reasonable grounds” based on specific and articulable facts showing that there are reasonable grounds to believe that the [records] are relevant and material to an ongoing criminal investigation.” The statute obviously does not elucidate any threshold for when a judge may refuse to accept the “reasonable grounds” criteria and instead insist on probable cause for a warrant. The majority opinion's requirement of a “balancing test” between the government's need for information and the privacy interests of cellphone users would seem virtually impossible to construct.

The US sought an en banc hearing of the panel's ruling, but to no avail.

So how does the Third Circuit's decision relate to Carpenter's case? It doesn't necessarily. Even if the Court were to find that judges may reject the statute's “reasonable grounds” standard in favor of probable cause for a warrant, Carpenter cannot and does not argue that the judge who issued the order for his CSLI records abused his/her discretion in doing so. That judge obviously decided to accept the facts the FBI presented and issued the order.

Nevertheless, this is an issue that the Court needs to resolve. The brief for the US doesn't argue one way or the other on the matter, merely stating that the government may obtain such information pertaining to a subscriber “either through a warrant or through a court order”. I would wager that one of the Justices will grill the Solicitor General on this issue during orals. To leave it hanging impugns equal protection guarantees, where one person's CSLI is obtained on the basis of “reasonable grounds” while the higher standard of probable cause is required for the next person. Congress couldn't have intended to formulate such a law.

Justice Sotomayor's concurrence in Jones is enlightening on several fronts. As you can see, she joined Scalia's majority opinion that links Fourth Amendment searches to trespass, and wrote her own concurrence cogently explaining her maneuver, and splitting the difference between the trespass basis and the reasonable expectation of privacy rationale.

Even though her comments arise in the context of GPS tracking, her concurrence expresses more general views apparently shared by lots of well-intentioned people who seem to envision something worse than Orwellian: the fear of the government monitoring everyone's every move and storing these mountains of data for future nefarious purposes. Sotomayor questions the viability in the digital age of both the reasonable expectation standard and the third-party doctrine, though she doesn't propose any other standard. She ironically quotes a New York Court of Appeals ruling, People v. Weaver (2009), in which the court found on grounds of reasonable expectation of privacy that attaching a GPS and downloading the data on a suspected criminal without a warrant is unconstitutional: “Disclosed in [GPS] data . . . will be trips the indisputably private nature of which takes little imagination to conjure: trips to the psychiatrist, the plastic surgeon, the abortion clinic, the AIDS treatment center, the strip club, the criminal defense attorney, the by-the-hour motel, the union meeting, the mosque, synagogue or church, the gay bar and on and on.” She quickly goes on to warn of the dangers of “the Government, in its unfettered discretion, choos[ing] to track” anyone, and asks “whether people reasonably expect that their movements will be recorded and aggregated in a manner that enables the Government to ascertain, more or less at will, their political and religious beliefs, sexual habits, and so on.” However, the first problem with such warnings and phrasing, at least in the case of authorities acquiring CSLI, is that the government doesn't have “unfettered discretion” to do so. The Stored Communications Act prohibits government agents acquiring, “more or less at will,” CSLI and other records. The SCA requires that government entities seeking such data go before a court and attest to “specific and articulable facts showing that there are reasonable grounds to believe that the contents of a wire or electronic communication, or the records or other information sought, are relevant and material to an ongoing criminal investigation.” The Telecommunications Act prohibits disclosure of such data except by express authorization by the customer or “except as provided by law”.

So what are reasonable expectations of privacy with respect to the CSLI data that our wireless carriers generate about us (or, rather, about our phones)? Is Sotomayor right when she says that the digital age may make it necessary to reconsider the reasonable expectation/third party rule? If so, what should be the new rule? Is the Stored Communications Act a violation of the Fourth Amendment's protection of “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures . . .”? Does the SCA set the bar too low?

And is it too much to ask of criminals to just use burner phones for their criminal activities? It occurs to me that if Carpenter had used a throw-away phone for each job, without using it to call any of his usual contacts and without using his regular phone in the vicinity at the time of the robberies, at least prosecutors couldn't have used CSLI evidence against him. A ruling that one does not have a reasonable expectation of privacy for customer-identifying information such as CSLI would surely be a boon to the burner-phone industry.
 
Last edited:

YmirGF

Bodhisattva in Recovery
And is it too much to ask of criminals to just use burner phones for their criminal activities? It occurs to me that if Carpenter had used a throw-away phone for each job, without using it to call any of his usual contacts and without using his regular phone in the vicinity at the time of the robberies, at least prosecutors couldn't have used CSLI evidence against him. A ruling that one does not have a reasonable expectation of privacy for customer-identifying information such as CSLI would surely be a boon to the burner-phone industry.
What are you saying here? A you really recommending that suspected felons use burner phones in order to avoid detection because their main phone can be traced? If you are a suspect in a crime are not searches and seizures perfectly reasonable?
 

Nous

Well-Known Member
Premium Member
What are you saying here?
My last paragraph is somewhat facetious. There is about a zero percent chance that the Court will find that the Fourth Amendment is violated when the government obtains CSLI by a court order in accordance with 18 USC § 2703(d). I was merely noting that this won't really put criminals in a bind as they can continue to use burner phones and avoid having CSLI evidence used against them when caught. Indeed, I have no doubt that plenty of smart criminals long ago recognized that using their cellphones during a job creates a location record that others have access to.

A you really recommending that suspected felons use burner phones in order to avoid detection because their main phone can be traced?
If a person is suspected of a crime, it's probably too late to begin using burner phones. I would strongly suggest that suspected felons should simply forego engaging in crimes.

If you are a suspect in a crime are not searches and seizures perfectly reasonable?
Indeed, if a person is a suspect in a crime, the government may obtain CSLI data on a lesser standard than a Fourth Amendment search supported by probable cause. 18 USC § 2703(d) allows for a "reasonable grounds" standard.
 

YmirGF

Bodhisattva in Recovery
My last paragraph is somewhat facetious. There is about a zero percent chance that the Court will find that the Fourth Amendment is violated when the government obtains CSLI by a court order in accordance with 18 USC § 2703(d). I was merely noting that this won't really put criminals in a bind as they can continue to use burner phones and avoid having CSLI evidence used against them when caught. Indeed, I have no doubt that plenty of smart criminals long ago recognized that using their cellphones during a job creates a location record that others have access to.

If a person is suspected of a crime, it's probably too late to begin using burner phones. I would strongly suggest that suspected felons should simply forego engaging in crimes.

Indeed, if a person is a suspect in a crime, the government may obtain CSLI data on a lesser standard than a Fourth Amendment search supported by probable cause. 18 USC § 2703(d) allows for a "reasonable grounds" standard.
Whew. I was worried for a sec that you had become some kind of revolutionary. :)
 

Nous

Well-Known Member
Premium Member
Whew. I was worried for a sec that you had become some kind of revolutionary. :)
Yes, I guess it could be misread. I probably should use those smiley faces, but I've just never done so. I've never seen any court use them even when they're making a joke.
 

YmirGF

Bodhisattva in Recovery
Yes, I guess it could be misread. I probably should use those smiley faces, but I've just never done so. I've never seen any court use them even when they're making a joke.
I wonder how long it will be when a paper from the bench contains, "LOLz" or little emoji icons. Hehehe.
 

Nous

Well-Known Member
Premium Member
I wonder how long it will be when a paper from the bench contains, "LOLz" or little emoji icons. Hehehe.
I guess that will happen eventually, but I hope it's a long way off. I'm not really ready for it. I will have difficulty taking court decision seriously.
 
Top