MEMORANDUM OPINION AND ORDER
The issue before the Court is the government’s authority to prospectively acquire precise location information derived from cellular and Global Positioning System (“GPS”) technology (collectively “location data”) to aid in the apprehension of the subject of an arrest warrant. The government has reported no attempts of the subject to flee and the requested location data does not otherwise constitute evidence of any crime. The government argues its entitlement to prospective location data under these circumstances pursuant to the Fourth Amendment, Rule 41 of the Federal Rules of Criminal Procedure, the Stored Communications Act, -the All Writs Act, and the inherent authority of the court. In so doing, the government asks to use location data in a new way — not to collect evidence of a crime, but solely to locate a charged defendant. To some, this use would appear reasonable, even commendable and efficient. To others, this use of location data by law enforcement would appear chillingly invasive and unnecessary in the apprehension of defendants. In any event, there is no precedent for use of location data solely to apprehend a defendant in the absence of evidence of flight to avoid prosecution. The government did not submit, and the court did not find, any sufficient authority for this use of location technology. In light of legitimate privacy concerns and the absence of any emergency or extraordinary considerations here, the Court concludes that approval of use of location data for this purpose is best considered deliberately in the legislature, or in the appellate courts. Accordingly, the Court DENIES the underlying warrant applications, but sets forth its guidance on the showing necessary for law enforcement access to prospective location data to aid in the execution of an arrest warrant.
I. BACKGROUND
A. Procedural History
On June 3, 2010, pursuant to Federal Rule of Criminal Procedure 41 (“Rule 41”) and the Stored Communications Act, 18 U.S.C. § 2703(c)(1)(A), the United States (“government”) applied for “authoriz[ation] ... to ascertain the physical location of
On June 4, 2010, the government submitted another application seeking identical information as its first application, but further stated that the subject cell phone was pre-equipped with a GPS enabled chip and that the subject’s wireless service provider maintains a “Precision Locate Service”
Although the government in its first application invoked Rule 41 and the Stored Communications Act, the government’s second application cited as authority the All Writs Act, 28 U.S.C. § 1651(a). (Id. at ¶ 4). Specifically, the government noted:
The Court has authority pursuant to the All Writs Act, 28 U.S.C. § 1651, to order disclosure of GPS Coordinates on a showing of probable cause to believe that a federal fugitive is using a specified wireless telephone. Under 28 U.S.C. § 1651(a), such disclosure is of appropriate aid to the Court’s extant jurisdiction over an open arrest warrant because it assists agents to find the fugitive so that the warrant can be executed and he can be brought before the Court.
(Id.) (emphasis added). In support of its application, the government stated that:
On [XXXX], Special Agent [XXXX] of [XXX] called [defendant] on cellular telephone number [XXXXXX-XXXX], which he answered and indicated he was on the “west coast.” She asked if he was in [XXXX] and he said, “Yes.” [De*532 fendant] had previously given this cellular telephone number to SA [XXXX] as a means to contact him.
(Id.). The government referred to defendant as a “federal fugitive” and “the subject fugitive,” but alleged no facts to support defendant’s fugitive status. (Id.). There was no indication that defendant was aware of the charge or arrest warrant, and the government did not so allege. (ECF No. 15, 17-18). Other than the government’s applications under review here, there were no reported efforts on the part of law enforcement to apprehend and arrest the defendant. See (ECF No. 6, 1). The Court again denied the government’s application.
Notwithstanding the Court’s denial of location data, the government arrested the defendant a few days thereafter. (Id.). While the government is correct that apprehension of defendant moots its applications, the issues presented will certainly arise again, most likely in urgent situations that do not allow an opportunity for deliberate consideration. Because of the importance of these largely-unexplored issues, the Court writes this opinion. Although the government’s applications have been sealed, this opinion will not be sealed as it concerns matters of constitutional and statutory interpretation which do not hinge on the particulars of the underlying-investigation and charge. The issues explored herein involve the balance between privacy rights and law enforcement interests, and the role of judicial oversight. These particular issues present a matter of first impression in the Fourth Circuit, as well as many others.
B. Technological Background
At the outset, a basic review of GPS and cellular location technology is essential to understanding the nature of the government’s request — highly-precise, real-time GPS and cell-site location information, on demand at any time during a 30-day period and the privacy interests it implicates. Given that the Court did not take evidence on the relevant technology, this background discussion relies primarily on uncontroverted government and industry publications.
The government’s request for “E911 Phase II data” is a reference to location information that meets accuracy requirements mandated by the Federal Communication Commission’s Enhanced 9-1-1 (“E-911”) regulations, which require cellular service providers to upgrade their systems to identify more precisely the longitude and latitude of mobile units making emergency 911 calls. E-911 Phase II regulations mandate that cellular telephone carriers have the ability to provide, within six minutes of a valid request from a public safety answering point, the latitude and longitude of a cellular telephone caller to within 50 to 300 meters depending on the type of technology used. See 47 C.F.R. 20.18(h) (2011) (establishing accuracy and reliability standards of 100 meters for 67
The Global Positioning System or “GPS” is a space-based radionavigation utility owned and operated by the United States that provides highly-accurate positioning, navigation, and timing services worldwide to any device equipped with a GPS satellite receiver. See GPS.gov, The Global Positioning System, http://www.gps.gov/ systems/gps/ (last visited Jul. 5, 2011). To determine the location of a cellular telephone using GPS, special hardware in the user’s handset calculates the longitude and latitude of the cellular telephone in real time based upon the relative strength of signals from multiple satellites. ECPA Reform and the Revolution in Location Based Technologies and Services: Hearing Before the Subcomm. on the Constitution, Civil Rights, and Civil Liberties of the H. Comm, on the Judiciary, 111th Cong. 20, 21 (2010) (statement of Matt Blaze, Associate Professor, University of Pennsylvania) (“Blaze Testimony”).
Current GPS technology typically achieves spatial resolution within ten meters, or approximately 33 feet. Id. at 21; see also The Collection and Use of Location Information for Commercial Purposes: Hearing Before the Subcomm. on Commerce, Trade and Consumer Protection and Subcomm. on Communications, Technology, and the Internet of the H. Comm, on Energy and Commerce, 111th Cong. 4 (2010) (statement of John B. Morris, General Counsel and Director of CDT’s Internet Standards, Technology & Policy Project, Center for Democracy and Technology) (stating that GPS produces high-precision locations on the order of meters or tens of meters). High-quality GPS receivers, however, are capable of achieving horizontal accuracy of 3 meters or better and vertical accuracy of 5 meters or better 95 percent of the time. U.S. Dept. Of Defense, Global Positioning System Standard Positioning Service Performance Standard V (4th ed. Sept. 2008). Use of GPS in combination with augmentation systems enables real-time positioning within a few centimeters. See GPS.gov, Augmentation Systems, http://www.gps. gov/systems/augmentations/ (last visited Apr. 21, 2011) (explaining that a GPS augmentation is any system that aids GPS by providing accuracy, integrity, availability, or any other improvement to positioning, navigation, and timing that is not inherently part of GPS itself).
Despite the superior accuracy of GPS location technology, however, it is not without limitations. Cellular telephone users may be able to disable GPS functionality and GPS may not work reliably in the event that the receiver’s view of satellites is obstructed. Blaze Testimony at 22; see also ECPA Reform and the Revolution in Location Based Technologies and Services: Hearing Before the Subcomm. on the Constitution, Civil Rights, and Civil Liberties of the H. Comm, on the Judiciary, 111th Cong. 41 (2010) (statement of Michael Amarosa, Senior Vice President for Public Affairs, TruePosition) (“GPS devices can be deactivated — that is, the ability to locate them disabled — by the user”).
In the event that GPS location data is not available, the government’s request
Due to advances in technology and the proliferation of cellular infrastructure, cell-site location data can place a particular cellular telephone within a range approaching the accuracy of GPS. Id. at 23-27 (explaining that depending upon a variety of factors the accuracy of cell-site location data may range from miles in diameter to individual floors and rooms within buildings); see also In re Application of the United States for Historical Cell Site Data,
Cellular service providers typically do not maintain records of the GPS coordinates of cellular telephones operating on their network, but the provider may generate such location data at any time by sending a signal directing the built-in satellite receiver in a particular cellular telephone to calculate its location and transmit the location data back to the service provider. This process, known as “pinging,” is undetectable to the cellular telephone user. In the underlying applications, the government seeks an order directing Sprint Nex
Here, the government seeks more than the records generated in the ordinary course of provision of cellular service, i.e., the cell site used by a target phone at the beginning and end of a call and the cell site detected at routine, intermittent registration. Rather, the government requested an order requiring the carrier “at any times specified by the agents” to acquire the GPS coordinates of the subject cellular telephone, thus asking for the creation of a record that would not otherwise be generated in the ordinary provision of service. Moreover, the government asked for an order for a period not to exceed 30 days, which would allow essentially continuous monitoring of the precise location of the user for a month. Thus, the issue is whether the request for highly-accurate, prospective and real-time location data of the cell phone of a non-fugitive defendant for as long as 30 days on an essentially continuous basis is permissible under the Fourth Amendment, Rule 41, the Stored Communications Act, the All Writs Act, or the inherent authority of the Court.
II. ANALYSIS
A. Government’s Arguments and Defense Response
The government bases its entitlement to prospective location data under the Fourth Amendment on essentially two, alternative arguments. First, the government argues that the underlying arrest warrant provides the necessary authority for access to the location data under the Fourth Amendment and interpretive Supreme Court decisions, particularly Payton v. New York,
Having taken the stance that its request does not offend, and indeed is consistent with, the Fourth Amendment, the government presents various statutory grounds for access to this prospective location data. In its first application, the government argues that the requested warrant is authorized under Rule 41 and the Stored Communications Act. In its second application, the government, apparently recognizing the absence of clear statutory authority, argues that issuance of a search warrant for prospective location data under the circumstances presented is proper under the Court’s inherent power and the All Writs Act.
The Federal Public Defender argues that an arrest warrant does not authorize access to location data for the subject of the arrest warrant and that the Fourth Amendment prohibits use of a search warrant to access prospective location data where the information does not constitute evidence of a crime. Thus, the argument goes, governmental assertions of authority under the Stored Communications Act, Rule 41, the All Writs Act, or the Court’s inherent authority are futile, as the warrant does not comport with the Fourth Amendment.
This case presents an issue at the intersection of the law on arrests and searches: whether this “search” should be considered under the second clause of the Fourth Amendment (the “warrant” clause) or as a “reasonable” search in execution of an arrest warrant under the first clause of the Fourth Amendment — an exception to the procedures and requirements of the warrant clause. This case also reveals the dearth of analysis and authority on this issue. The Court has concluded that current Fourth Amendment jurisprudence neither sanctions access to location data on the basis of an arrest warrant alone, nor authorizes use of a search warrant to obtain information to aid in the apprehension of the subject of an arrest warrant where there is no evidence of flight to avoid prosecution and the requested information does not otherwise constitute evidence of a crime. Additionally, the Stored Communications Act (also, of course, subject to the Fourth Amendment) does not authorize use of a warrant for that purpose. While Rule 41(c)(4) authorizes use of a warrant to search for a “person to be arrested,” that rule (and Fourth Amendment principles) requires probable cause that the defendant will be found in a specifically identified location. Fed.R.Crim.P. 41(c)(4). Thus, Rule 41 does not authorize use of a warrant for the purpose sought. Finally, exercise of judicial authority under the All Writs Act or the Court’s inherent authority is likewise subject to Fourth Amendment constraints. Review of pertinent case law demonstrates that the courts have not sanctioned use of a warrant or other order for location data or other extraordinary information to aid in the apprehension of the subject of a warrant in the absence of evidence of flight.
This ruling does not, of course, foreclose use of a search warrant to obtain prospective location data in circumstances where the Fourth Amendment is satisfied. While the Court disagrees that the Stored Communications Act provides independent authority for access to prospective location data under these circumstances, the Court finds that the government may obtain pro
However, if the government seeks to use a particular cellular telephone as a tracking device to aid in execution of an arrest warrant, the government must obtain a tracking device warrant pursuant to Rule 41(b) and in accord with 18 U.S.C. § 3117. As set forth more fully below, this Court requires a showing of probable cause that: 1) a valid arrest warrant has issued for the user of the subject cellular telephone; 2) the subject cellular telephone is in the possession of the subject of the arrest warrant; and 3) the subject of the arrest warrant is a fugitive, that is, is or could be charged with violation of 18 U.S.C. § 1073. Moreover, the time period of the warrant must be measured by its purpose, that is, only until the defendant is located, to prevent inappropriate use of the warrant as an investigative tool.
Having summarized its conclusions, the Court discusses each of the government’s asserted bases for entitlement in turn.
B. Asserted Sources of the Government’s Entitlement to Location Data
1. Fourth Amendment
a. Protected Status of Information Sought Under the Fourth Amendment
The government and Federal Public Defender agree that this matter is at heart a question of Fourth Amendment interpretation. (ECF No. 8, 1-2; ECF No. 10, 2). Specifically, the Fourth Amendment provides that:
The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
U.S. Const, amend. IV. Rooted in early British constitutionalism and the American colonial experience of unchecked monarchic power, the Fourth Amendment protects individual privacy by establishing a right to be secure against unreasonable searches and seizures by the government. See Chimel v. California,
In Katz v. United States, the Court famously noted that the Fourth Amendment “protects people, not places,”
b. An Individual Has a Reasonable Expectation of Privacy in His Location and Movement
The government’s request for real-time location data implicates at least two distinct privacy interests: the subject’s right to privacy in his location and his right to privacy in his movement.
The government conceded at the hearing that the subject has a reasonable expectation of privacy while physically present within a non-public place, and that the government would infringe upon that privacy interest by asking the wireless carrier to “ping” the subject’s cell phone essentially on a continuous basis while he is in a constitutionally-protected location.
i. An Individual Has a Reasonable Expectation of Privacy in His Location
The Supreme Court has maintained a distinction between areas where a person can be publicly viewed and areas that could not be observed “from the outside” using traditional investigatory techniques. For example, a person has no reasonable expectation of privacy in his movements on public highways during a discrete journey. United States v. Knotts,
While location data has been described as “a proxy for [the suspect’s] physical location” because the cell phone provides similar information as that traditionally generated by physical surveillance or tracking techniques, United States v. Forest,
Coordinates expressed in longitude and latitude allow us to locate places on the Earth quite precisely — to within inches. Nationalatlas.gov, Article: Latitude and Longitude, http://www.nationalatlas.gov/ artieles/mapping/aJiatlong.html (last visited Jul. 19, 2011). GPS technology typically generates location data accurate within a range of approximately ten meters, Blaze Testimony at 21, or within a few centimeters when used in combination with augmentation systems, Gps.gov, Augmentation Systems, http://www.gps.gov/systems/ augmentations/ (last visited Jul. 19, 2011). Thus, location data generated by GPS and expressed as longitude and latitude coordinates will identify a point on a map that, in many cases, represents the location of a particular GPS-enabled cellular telephone within a radius of ten meters or significantly less.
Given that the average home size in the United States in 2009 was approximately 743 square meters, it is clear that GPS location data with the high degree of accuracy described above would likely place a cellular telephone inside a residence, at least where law enforcement have information regarding the coordinates of the home. U.S. Census Bureau, Median and
Because cellular telephone users tend to keep their phone on their person or very close by, placing a particular cellular telephone within a home is essentially the corollary of locating the user within the home. See Pew Research Center, Cell Phones and American Adults, available at http://pewinternet.org/Reports/2010/CellPhones-and-AmericanAdults.aspx (reporting that 65 percent of adults with cell phones report sleeping with their cell phone on or right next to their bed). In addition, cell phone users typically carry their phone on their person when conducting daily activities. See In re United States for an Order Directing a Provider of Electronic Communication Service to Disclose Records to the Government,
The Court recognizes that a determination that, based on GPS location data, a cellular telephone user is within a particular physical place may require some inference, but notes the Supreme Court’s admonition in Kyllo v. United States that “the novel proposition that inference insulates a search is blatantly contrary to United States v. Karo,
Thus, as the majority of other courts that have examined this issue have found, the Fourth Amendment requires
ii. An Individual Has a Reasonable Expectation of Privacy in His Movements
The scope of the government’s request here — unlimited location data at any time on demand during a thirty-day period— also implicates the subject’s reasonable expectation of privacy in his movement. See United States v. Maynard,
While Knotts held that “[a] person traveling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements from one place to another,”
Several district courts have since declined to adopt the D.C. Circuit’s reasoning in Maynard. See United States v. Sparks,
Given that a person has a reasonable expectation of privacy in his aggregate movement over a prolonged period of time, the government’s request to ping the subject’s cell phone on unlimited occasions during a thirty-day period constitutes a Fourth Amendment search.
Having established that the defendant has a reasonable expectation of privacy in his location and his movement, the Court considers the government’s argument that a search warrant for real-time location data is not necessary, as a matter of law, where an arrest warrant based upon probable cause has issued,
c. The Subject of an Arrest Warrant Maintains a Reasonable Expectation of Privacy in His Location and Movements
The government contends that where a valid arrest warrant has been issued for the cell phone user, government officials are entitled to “do what it takes to find and arrest the person.” (ECF No. 15, 8).
For support, the government relies upon the Supreme Court’s decision in Payton v. New York,
Going into the home is one of the most protected areas in the Fourth Amendment — ... And yet in Payton, the Supreme Court says an arrest warrant is good enough to go into the target’s home.
I think it follows that other lesser interests are also going to be subject or appropriate under an arrest warrant for the Government to get the information it needs to effectuate the arrest warrant.
Id.
Payton and its progeny may be read as affording less procedural protection to the privacy rights of an un-apprehended defendant in his location — that is, that law enforcement is not required to obtain prospective judicial approval through a search warrant. However, the case law does not clearly establish that there is a lesser bur
In Payton, the Supreme Court held that a routine felony arrest made during a warrantless and nonconsensual entry into a suspect’s home violates the Fourth Amendment.
Thus, Payton does not deny that an entry into the home of the subject of an arrest warrant is a “search” (or an invasion of a reasonable expectation of privacy), but merely concludes that it is a constitutionally reasonable one. However, this narrow exception to the Fourth Amendment search warrant requirement does not negate the subject’s expectation of privacy in his own home, much less in any other location. Rather than granting police unlimited authority to enter a suspect’s home when armed with a valid arrest warrant, as would presumably be appropriate if the arrest warrant deprived the suspect of any reasonable expectation of privacy, the Payton Court mandated that police have a “reasonable belief’ that the suspect both lives at the place to be searched and is present within the place to be searched at the time of arrest. Id. at 602-03,
One year after its decision in Payton, the Supreme Court delineated additional limitations on law enforcement’s authority in execution of an arrest warrant in Steagald v. United States,
Although Steagald focused on the privacy interests of third-party residents rather than persons for whom an arrest warrant has issued, the Court made clear that an arrest warrant does not give law enforcement officers authoxity to enter any dwelling where they believe a suspect may be found. The Steagald Court recognized that “[a] contrary conclusion' — that the police, acting alone and in the absence of exigent circumstances, may decide when there is sufficient justification for searching the home of a third party for the subject of an arrest warrant — would create a significant potential for abuse.” Id. at 215,
Finally, the Supreme Coxn't in Steagald did not share the government’s view of the expansive meaning of Payton. The Supreme Court in Steagald characterized its ruling in Payton as “authorizing] a limited invasion of that person’s privacy interest when it is necessary to arrest him in his home.” Id. at 214,
In addition to Steagald, the Supreme Court has cited Payton 78 times since rendering its decision in 1980. None of these cases involves a remotely similar fact situation as here and none expand the Payton holding as a doctrinal matter. The
The Supreme Court has cited Payton only occasionally for the proposition that an arrest warrant provides authority to infringe upon the expectation of the privacy of the subject in his home or elsewhere, and, in none of those cases can be viewed as a significant expansion of Payton. See, e.g., Maryland v. Buie,
Finally, several cases clearly demonstrate the Supreme Court’s reluctance to approve police conduct unnecessary to the execution of an arrest warrant. See Wilson v. Layne,
In Wilson v. Layne, the Court found that media presence during the execution of an arrest warrant in a private home violated the Fourth Amendment.
Since the Supreme Court’s decisions in Payton and Steagald, five courts of appeals, not including the Court of Appeals for the Fourth Circuit, have concluded that law enforcement officers do not need a search warrant to effectuate an arrest in a third-party residence where they have a valid arrest warrant coupled with a reasonable belief that the suspect is inside. See United States v. Jackson,
These cases advance the notion that the subject of an arrest warrant has lesser procedural rights, that is, a search warrant need not be obtained on probable cause prior to entry, whether to his own home or to that of a third party. Steagald and subsequent case law also advance the notion that even where law enforcement officers apprehend the subject of an arrest warrant in a third-party residence without first obtaining a search warrant, “a suspect retains a sufficient expectation of privacy to challenge a search where the police lack a reasonable belief that the person to be arrested may be found in the place to be searched.” United States v. Jackson,
The constitutionality of a search under either the authority of an arrest warrant under Payton, or a search warrant under Fourth Amendment jurisprudence, is predicated on a probable cause demonstration that the subject of the arrest is in a particular place. While the government has adopted the reasonable belief or probable cause standard, that is, that there is “probable cause to believe that a federal fugitive is using a specified wireless telephone,” (EOF No. 2, 3), it has not asked the Court for authority to go into a particular place. Instead, the government essentially seeks to “look” with technology into every place where the subject of the warrant might be found in order to locate him and then to track him up to 30 days.
The fact that a person is in his or her home at any particular time would usually not be especially revelatory. While the fact of a person’s location at random times in other locations might be highly revelatory of private matters, location data over a prolonged period of time has the potential of revealing intimate details of a person’s life. As Chief Judge Kozinski observed in his dissent from the denial of rehearing en banc in Pinedar-Moreno,
By tracking and recording the movements of millions of individuals the government can use computers to detect patterns and develop suspicions. It can also learn a great deal about us because where we go says much about who we are. Are Winston and Julia’s cell phones together near a hotel a bit too often? Was Syme’s OnStar near an STD clinic? Were Jones, Aaronson and Rutherford at that protest outside the*551 White House? The FBI need no longer deploy agents to infiltrate groups it considers subversive; it can figure out where the groups hold meetings and ask the phone company for a list of cell phones near those locations.
Pineda-Moreno,
What difference, if any, is there, in terms of a citizen’s rights to privacy against his government, between a warrant allowing the search of a particular place for the subject of an arrest warrant and allowing the search of everywhere to locate the particular place where the subject of a search warrant is? If the order is narrowly drawn and faithfully executed, there would arguably be no greater intrusion of third parties’ privacy than a search of the suspect’s home or other locations under Payton and its progeny, in the furtherance of the legitimate government interest in expeditiously bringing a charged defendant before the Court. An order for location data at one point in time does not appear to invade the privacy of others any more than a search warrant for a third party’s home. That is, execution of a traditional search warrant may invade the privacy of persons living in or present at the searched premises at the time of the search. However, a search warrant for location data may invade the privacy of persons not as readily identifiable as persons in a traditional search in the suspect’s home, such as persons on the lease of the apartment or employees working at an office where the subject has been located.
By contrast, the search sought here does arguably infringe upon the privacy rights of the subject of the arrest warrant more than a Payton search would and certainly does provide more information. A Payton search informs the government as to whether the subject of the arrest warrant is in his home or in another place that the government had probable cause to believe he is. However, the search anticipated here informs the government on an almost continuous basis where the subject is, at places where the government lacked probable cause to believe he was, and with persons about whom the government may have no knowledge.
A warrant such as the government requested here only superficially bears the indicia of the colonial writs, which were the impetus for the Fourth Amendment. The Fourth Amendment was a reaction in part to the colonial experience with primarily two English writs: the general writ of assistance and the general warrant. “[It] was primarily designed to end the abuse of general exploratory searches.” Phillip A. Hubbart, Making Sense of Search and Seizure Law: A Fourth Amendment Handbook, 21-49 (2005). The general writ of assistance “granted the named customs official general exploratory search powers based on no proof of wrongdoing.” Id. at 30. Similarly, the general warrant “was not based on any sworn proof of wrongdoing, did not particularly describe the place to be searched or things [or people] to be seized, and authorized the messengers to search and seize as their whims dictated.” Id. at 40. “The general objectionable feature of both warrants [general warrant and writ of assistance] was that they provided no judicial check on the determination of the executing officials that the evidence justified an intrusion in any particular home.” Steagald,
The odious nature of these writs, of course, was due in main part to the disruption and intrusiveness of searches unjustified by any probable cause as to a particular place as to innocent citizens. By comparison, this virtual search of all locations to identify the actual location of the arrest warrant subject does not affect
Certainly, the Supreme Court’s approval of a “limited” intrusion into the home of a subject of an arrest warrant (and lower courts’ approval of intrusion into third party residences on probable cause or reasonable belief) without a prior warrant cannot reasonably be interpreted to endorse other infringements of privacy, that is, the constitutional right to location and movement privacy. The government’s arguments, if credited, would allow law enforcement to obtain location data on any subject of an arrest warrant, whether charged with a misdemeanor or a felony, without any demonstration of any attempt on the part of the subject to avoid prosecution.
Ultimately, the Supreme Court may expand Payton and endorse a variant of the government’s view, that is, that armed with an arrest warrant, law enforcement can take certain reasonable actions to execute the arrest warrant, such as access to location data for a short period of time, without obtaining a search warrant subject only to challenge after the fact. Indeed, this judge has concluded that it is likely that the Supreme Court would sanction this search under Payton, but perhaps with prior judicial approval in light of the powerful nature of the electronic surveillance tool. However, it is premature— indeed reckless — to forecast and effect such an expansion of law enforcement authority given the evolving nature and complexity of both Fourth Amendment law and technology.
This judge will not take that leap in the absence of any direct precedent or sufficient doctrinal foundation, especially in the face of considerable legislative and public concern and discussion about the invasion of privacy that this new and evolving location technology permits. Congress has repeatedly expressed concern about the privacy of location data. When Congress passed the Wireless Communication and Public Safety Act of 1999, inter alia, for the purpose of facilitating nationwide deployment of the enhanced 9-1-1 technology the government seeks to use in its investigation, the legislature expressly provided for privacy of customer information. See P.L. No. 106-81(2), § 5, 113 Stat. 1288 (Oct. 26,1999) (codified at 47 U.S.C. § 222) (stating that “[t]he purpose of [the Wireless Safety Act of 1999] is to encourage and facilitate the prompt deployment throughout the United States of a seamless, ubiquitous, and reliable end-to-end infrastructure for communications, including wireless communications, to meet the Nation’s public safety and other communications needs”). In doing so, Congress specifically included protection for the privacy of location information pertaining to cell phone users:
(f) Authority to Use Location Information. For purposes of subsection (c)(1) of this section, without the express prior authorization of the customer, a customer shall not be considered to have approved the use or disclosure of or access to—*553 (1) Call location information concerning the user of the commercial mobile service ...
47 U.S.C. § 222(f). Accord In re Application for Pen Register & Trap/Trace Device with Cell Site Location Authority,
Earlier, in 1994 when Congress passed the “Communications Assistance for Law Enforcement Act” (“CALEA”), it declared that orders for pen register and trap and trace devices shall not include “any information that may disclose the physical location of the subscriber ...” 47 U.S.C. § 1002(a)(2)(B).
Indeed, Sprint Nextel — the cellular service provider for the subject of the government’s applications here — provides in its standard privacy policy that, although it routinely collects personal information pertaining to customers, including the location of their devices on the network, it only shares this information with third parties under certain limited circumstances. Sprint, Sprint Nextel Privacy Policy, http://www.sprint.com/legal/privacy.html (last visited Feb. 1, 2011).
In addition, there has been an explosion of articles in the press on GPS and cell site tracking by law enforcement. Chief Judge Kozinski’s recent dissent in Pineda-Moreno highlights the controversy and concerns about “the tidal wave of technological assaults on our privacy.” Pineda-Moreno,
In the last year there has been considerable congressional investigation regarding the privacy of location data and other electronic information and, in particular, in response to media coverage of law enforcement use of electronic surveillance and calls for examination and reform of the Electronic Communications Privacy Act (“ECPA”). Written when communication was mostly done over land-line phones, it is generally agreed that ECPA has not kept pace with rapidly evolving technology. Steve Titch, TITCH: Block Big Brother’s Internet Snoops, The Washington Times (May 26, 2011, 7: 20 PM), http://www. washingtontimes.com/news/2011/may/26/ block-big-brothers-internet-snoops/ (last visited July 21, 2011). Because ECPA was not enacted with this specific technology in mind, it has been criticized as providing only confusing guidelines, with the situation exacerbated by federal courts’ conflicting decisions on the constitutionality of these and other related requests. Gina Stevens, Alison M. Smith, & Jordan Segall, Legal Standard for Disclosure of Cellr-Site Information (CSI) and Geolocation Information, Congressional Research Service (Jun. 29, 2010).
Congress has held six hearings since 2010 on the technology and law of electronic surveillance, including several with a particular focus on ECPA.
*555 How do current advances in location technology test traditional standards of the ECPA of 1986? More generally, in what ways have these and other technologies potentially subverted one of the original and central goals of ECPA, which was to preserve a fair balance between the privacy expectations of citizens and the legitimate needs of law enforcement?
Id. at 2 (internal quotations omitted).
In apparent response to this very issue, three bills that would amend ECPA have been introduced in Congress during a one-month interval between May and June of 2011.
On June 15, 2011, Senators A1 Franken (D-MN) and Richard Blumenthal (D-CT) introduced the Location Privacy Act of 2011 (“Franken Bill”), seeking to close perceived loopholes in federal law by requiring any company that may obtain a customer’s location information from a mobile device to get that customer’s express consent before collecting his or her location data or sharing his or her location data with third parties. S. 1223, 112th Cong. (2011); The Location Privacy Protection Act of 2011 Bill Summary, Senator Franken’s Website (Jun. 15, 2011), http:// franken.senate.gov/files/docs/110614_The_ Location_Privacy_Protection _Act_of_2011_One_pager.pdf. While this bill notably applies only to non-governmental entities, it underscores the shortcomings of ECPA as well as congressional concern about the privacy implications of location data.
Also on June 15, 2011, Senator Ron Wyden (D-OR) and Representative Jason Chaffetz (R-UT) introduced the Geolocational Privacy and Surveillance or “GPS” Act (“Wyden Bill”), a bill seeking to address the growing concern that there are no clear rules governing how law enforcement, commercial entities and private citizens can access, use and sell location data. H.R. 2168, 112th Cong. (2011); Wyden, Chaffetz Introduce Geolocation Privacy and Surveillance (“GPS”) Act, Senator Wyden’s Website (Jun. 15, 2011), http:// wyden.senate.gov/issues/issue/?id=b29a 3450-f722-4571-96f0-83c8ededc332 # sections. The Wyden Bill specifically requires a warrant for the acquisition of geolocation information, subject to a list of exceptions, namely emergency situations.
These bills do not establish a different proof for location data depending on law enforcement purpose in acquisition. The bills clearly do not recognize any Payton exception to the warrant requirement where location data is sought to effect an arrest.
In opposition to the bill, the DOJ has argued that using electronic data to track a person’s movements is akin to human surveillance (i.e., following a person walking down the street), which is legal, and should be treated the same. Id. Senator Wyden wrote that “tracking an individual’s movements on [a] twenty-four hour basis for an extended period of time [as made possible by electronic tracking] is qualitatively different than visually observing that person during a single trip, and can reveal significantly more information about their activities and pattern of life.” Id. In addition, “tracking an individual with a GPS device or by tracking their cell phone is much cheaper and easier than tracking them with a surveillance team, so the re-
source barriers that act as a check against abuse of visual surveillance techniques do not always apply to geolocation tracking and other electronic surveillance methods.” Id.
This legislation, both proposed and enacted, demonstrates recognition of the dangerously intrusive nature of cell phones as tracking devices and confines them to use in the most basic, core function of government: to ferret out crime and provide a safe society for its citizens. See id. (opining that “[although perhaps not conclusive evidence of nationwide “societal understandings,” Jacobsen,
Against this backdrop of intense congressional inquiry and public concern, it is especially inappropriate to sanction an expansion of law enforcement acquisition of location data on a wishful but unsupported view of Payton.
So, having found neither precedential nor doctrinal support for the government’s reliance on the arrest warrant alone as authority for its location data request, the Court considers whether this is a permissible search under the Fourth Amendment and Rule 41.
d. There is no Clear Authority Under the Fourth Amendment for a Search Warrant for Location Data to Aid in Apprehension of a Subject of an Arrest Warrant Absent Flight
At the outset, it should be clear what the government is seeking (and not seeking) under the Fourth Amendment and Rule 41. The government is not seeking a warrant to search for the defendant in a particular place. As discussed infra, that, of course, would be permissible on probable cause. Nor is the government seeking a warrant to seize the defendant; the arrest warrant already authorizes the government to do that. The government is seeking a warrant for location data from the defendant’s cell phone for as long as 30 days on a showing of reasonable belief that the cell phone belongs to him and is in his possession. (ECF No. 15, 20).
Having found that the government’s request constitutes an invasion into a constitutionally-protected area of privacy and that under current law the arrest warrant alone does not authorize acquisition of location data, the Court now examines whether the government has satisfied the constitutional requirements to conduct such a search for location data under the Fourth Amendment.
In all areas in which a person has a reasonable expectation of privacy, he is protected from “unreasonable searches and seizures.” U.S. Const, amend. IV. The Fourth Amendment does not require that a warrant be obtained for all searches, however. United States v. Rabinowitz,
The government does not contend explicitly that the search for and seizure of location information is “reasonable” under the first clause of the amendment, or that
The Court as a rule examines “criminal” searches under the Warrant Clause and “civil” searches under the Reasonableness Clause. Fabio Arcila, Jr., In the Trenches: Searches and the Misunderstood Common Law History of Suspicion and Probable Cause, 10 U. Pa. J. Const. L. 1, 10 (2007); Cong. Research Serv., The Constitution of the United States of America.- Analysis and Interpretation, S. Doc. No. 108-17 at 1286 (2d Sess.2004) (“analysis and Interpretation”). While the “special needs” doctrine applies in some law enforcement-related circumstances, its applicability requires the existence of circumstances “beyond the normal needs for law enforcement.” Chandler v. Miller,
It may well be that the Supreme Court will extend Payton to find that a search warrant is unnecessary under these circumstances and that the privacy rights of the subject of the arrest warrant may be adequately assured after-the-fact by application of the exclusionary rule or civil remedies, where available.
Interestingly, testimony in the May 5, 2010 congressional hearing framed the exact issue faced here. In responding to a proposal that the law clearly establishes that “location information regarding a mobile communications device [can be obtained] only with a warrant issued based on a showing of probable cause,” Professor Orin Kerr asked:
... [P]robable cause of what? Is that probable cause to believe the person tracked is guilty of a crime? Or is it probable cause to believe the evidence of location information obtained would itself he evidence of a crime?
The difference is important. In the case of a search warrant, “probable cause” generally refers to probable cause to believe that the information to be obtained is itself evidence of a crime. But cell phone location information will itself be evidence of crime only in specific kinds of cases. For example, such information normally will not be evidence of a crime if investigators want to obtain the present location of someone who committed a past crime.
To see this, imagine the police have probable cause to arrest a criminal for a crime committed last week. The police want to locate the suspect in order to arrest him. In that case, the police will not have probable cause to believe that the location of the criminal’s cell phone is itself evidence of a crime. The suspect’s location a week after the crime occurred does not give the police any information indicating that the suspect did or did not commit the crime. But if the police have probable cause to arrest someone, and they know his cell-phone number, I would think the law should allow the government some way of locating the suspect pursuant to an appropriate court order. A requirement that location information be obtainable only based on probable cause to believe that the location information is itself evidence of a crime would not seem to allow that.
Electronic Communication Privacy Act Reform: Hearing Before the Subcomm. on the Constitution, Civil Rights, and Civil Liberties of the H. Comm, on the Judiciary, 111th Cong. 39-40 (2010) (statement of Orin Kerr, Professor, George Washington Univ. Law School) (“Kerr Testimony”) (emphasis in original; bolding added). While Professor Kerr appears to believe that law enforcement should be able to use location data in aid of the apprehension of a defendant, he acknowledged that “probable cause” under current Fourth Amendment jurisprudence “generally refers to probable cause to believe that the information to be obtained is itself evidence of a crime.” Id. As discussed below, this Court agrees.
The government’s contrary definition of probable cause relies almost exclusively on its reading of Warden v. Hayden,
As both parties correctly recognize, Hayden is a landmark ease that rejects, for purposes of the warrant requirement, any distinction between “mere evidence” and instrumentalities, fruits, or contraband of crime. (ECF No. 8; ECF No. 10, 2). Specifically, Hayden held that the Fourth Amendment equally governs searches for “mere evidence” and searches for instrumentalities, fruits, or contraband of crime. Hayden,
Moreover, the government admitted at the hearing it was unable to provide any explicit substantive support for its reading of Hayden in factually apposite cases, treatises or law reviews.
In short, the government has not overcome this longstanding principle of law. The Fourth Amendment’s standard of probable cause for searches and seizures has a firmly embedded nexus component. See Dumbra v. United States,
Generally, arrest warrants require designation or description of the person to be arrested with no reference to the places that may be searched in effecting the arrest. Search warrants, on the other hand, require a specific description of the place to be searched as well as the property sought with no reference to persons sought. This means that if the object of the search is a person, neither arrest nor search warrant rules fit. There is thus no established procedure that complies with the constitutional mandate that “no Warrants shall issue, but upon probable cause ... and particularly describing the place to be searched, and the persons ... to be seized.”
Daniel L. Rotenberg & Lois B. Tanzer, Searching for the Person to Be Seized, 35 Ohio St. L.J. 56, 57-58 (1974).
Shortly thereafter, the Criminal Rules were amended to add clause (4) to then Rule 41(b) allowing a warrant to search for and seize a person for whose arrest there is probable cause. As noted in Wright, King, & Klein, “At the time the 1979 amendment was being formulated, there was uncertainty whether a warrant was needed to enter private premises to make an arrest.” 3A Federal Prac. & Proc.Crim. § 664.1 (3d ed.2009). After Steagald, the treatise continued “it may be that there will be few circumstances in which this holding will be applicable but it was wise that the amendment did provide a procedure for those circumstances.” Id. Statutory law at the time also suggested plenary authority of law enforcement to search private dwellings, solely on the basis of an arrest warrant. See 18 U.S.C. § 2236 (1970).
[Wjhoever, being an officer, agent or employee of the United States or any department or agency thereof, engaged in the enforcement of any' law of the United States searches any private dwelling used and occupied as such dwelling without a warrant directing such search ... shall be fined ... or imprisoned .... This section shall not apply to any person a) serving a warrant of arrest; or b) arresting or attempting to arrest a person ...
Thus, the use of a search warrant to apprehend a person for whose arrest there was probable cause was codified. See Orders of the Supreme Court of the United States Adopting and Amending Rules, Order of April 30, 1979 (approving amendments to Rule 41 and transmitting them to Congress in accordance with 18 U.S.C. §§ 3771, 3772).
To be clear, no one is questioning the use of a search warrant to apprehend a criminal defendant where the government can present probable cause that the defendant is in a particular place. Rather, the government’s request here is for broad information concerning defendant’s ongoing location. Unlike in investigations of ongoing crimes, the government here alleges no relationship whatsoever between defendant’s ongoing movements and his crime. Cf. United States v. Garcia-Villalba,
As Professor Kerr queried in his congressional testimony:
But if the police have probable cause to arrest someone, and they know his cellphone number, I would think the law should allow the government some way of locating the suspect pursuant to an appropriate court order. A requirement that location information be obtainable only based on probable cause to believe that the location information is itself evidence of a crime would not seem to allow that.
Kerr Testimony at 39-40 (emphasis added). While Professor Kerr identified this issue, he did not provide any solution in constitutional jurisprudence. Nor has any lawmaker in any of the pending legislative proposals discussed earlier suggested a constitutional or statutory clarification or fix to allow this use of location data; the “Wyden Bill” and the “Leahy Bill” establish unequivocally that prospective, real time location data can only be acquired through a warrant.
In any event, case law does not provide a way forward — a firm constitutional basis for issuance of a warrant here. Thus, a warrant is unavailable where there is no evidence of flight.
Our analysis could, of course, stop here. The government’s other authorities — Rule 41, the Stored Communications Act, the inherent authority of the Court, and the All Writs Act — are subservient to the Fourth Amendment. However, the Court will discuss the government’s other arguments for its entitlement to a warrant and provide guidance as to the circumstances under which a warrant may issue for the subject of an arrest warrant.
Recognizing that Rule 41 governs all search warrants, the government makes several, alternative arguments as to how its request squares with the terms of the rule, and more generally contends that its request is “consistent with Rule 41.” (ECF No. 6, 5; ECF No. 10, 4-5). The government argues that the four categories of warrants provided for in Rule 41(c) are not intended to be exclusive, and that law enforcement may conduct searches or seizures that do not fall within the itemized categories without violating the Fourth Amendment. (ECF No. 6, 5). The government therefore urges the Court to read the Rule 41(c) categories “broadly” and “flexibly.” (Id. at 5-6; ECF No. 10, 4-5). In its last submission to the Court, the government asserts without supporting authority that Rule 41(c)(4) “authorizes a search for a person to be arrested” and “[although the location information sought in this case is not itself a person to be arrested, it properly falls within the scope of a search warrant for a person to be arrested ...” (ECF No. 10, 5). Alternatively, the government contends, because Rule 41 does not “specifically address” a warrant for the requested information, the Court has inherent authority to issue the search warrant and the All Writs Act vests the Court with adequate authority to take steps to “effectuate an arrest warrant.” (ECF No. 6, 4-5; ECF No. 10, 6-8).
The search warrant standard codified in the Federal Rules of Criminal Procedure is rooted in the Fourth Amendment, and is intended to articulate and implement Fourth Amendment principles, not to expand or change the Fourth Amendment parameters. The Rules were adopted in 1944 to collect and streamline existing practices and procedures that were fundamentally sound, but haphazard, located in many cases and not set out in one written document, and confusing in form. See James J. Robinson, The Proposed Federal Rules of Criminal Procedure, 27 J. AM. J. SOC. 38, 39 (1943); Lester B. Orfield, The Preliminary Draft of the Federal Rules of Criminal Procedure, 22 Tex. L.Rev. 37, 42 (1943). The Federal Rules of Criminal Procedure established uniform procedures to which all federal courts were thereafter required to adhere. Fed. R.Crim. P. 1(a)(1).
Like the rules of criminal procedure generally, Rule 41 was incepted to codify and clarify search and seizure practice and procedure as it existed in 1944 and before. Thus, the rule adopted the existing statutory warrant procedure which, in turn, had been based on existing law. See Advisory Comm, on Rules of Criminal Procedure, Minutes of Meetings of Advisory Committee on Rules on Criminal Procedure 883 (Feb. 23, 1943) available at http://www. uscourts.gov/uscourts/RulesAndPolicies/ rules/Minutes/CR02-1943-min-Part3.pdf. pdf; Advisory Comm, on Rules of Criminal
Rule 41 generally governs all searches and seizures, but by its terms does not override other statutes that govern searches and seizures related to specific government investigation schemes, such as searches and seizures related to customs duties. Fed. R.Crim. P. 41(a)(1) (noting that Rule 41 “does not modify any statute regulating search or seizure, or the issuance and execution of a search warrant in special circumstances”); Fed. R.Crim. P. 41 Advisory Committee’s Note, 1944 Adoption, Note to Subdivision (g) (“While Rule 41 supersedes the general provisions of 18 U.S.C. ... relating to search warrants, it does not supersede, but preserves, all other statutory provisions permitting searches and seizures in specific situations.”).
Thus, where another statute specifically governs a search, seizure, or issuance and execution of a search warrant in special circumstances, Rule 41 yields to all substantive provisions of that statute. See, e.g., United States v. Berkos,
a. Rule 41(c)(1)
Rule 41(c)(1) requires, as does the Fourth Amendment, that the government establish probable cause that its search for information be narrowly tailored to reveal “evidence of a crime.” See Fed. R.Crim. P. 41(c)(1). A defendant’s ongoing location or his pattern of travel can constitute “evidence of a crime” sufficient to meet Rule 41(c)(1) when, for example, he is suspected of involvement in a drug trafficking crime. See, e.g., Garcia-Villalba, 585 F.3d at 1234 (recognizing that a defendant’s physical movements from place to place established sufficient nexus); Rojas,
The government initially alleged, without any supporting facts, that the defendant was a “fugitive,” but withdrew that assertion at the hearing. (ECF No. 15, 17-18). Although the government no longer contends the subject was a “fugitive,” it is important to note that an unsupported allegation of fugitive status does not alone constitute justification for a warrant. See In re Application for the Installation and Use of a Pen Register,
Although some courts have declined to apply the seldom-prosecuted § 1073 to fugitive federal defendants, see, e.g., United States v. Noone,
However, where, as here, a defendant is charged with a discrete crime that is not continuing in nature and that would not result in the defendant’s likely possession of tangible or intangible items related to his commission of that crime, Rule 41(c)(1) does not authorize a search warrant. See, e.g., Walters,
b. Rule 41(c)(4)
Rule 41(c)(4) permits issuance of a warrant supported by probable cause that the search will reveal “a person to be arrested or a person who is unlawfully restrained.” Fed. R.Crim. P. 41(c)(4). Although the government admits that its search in this case would not reveal a literal person, it nonetheless suggests that its request for location data “properly falls within the scope of a search for a person to be arrested,” if the Court accepts a broad construction of the Rule. (ECF No. 10, 5). The Court acknowledges the at least superficial logic of this expanded reading. However, having found that the Fourth Amendment does not sanction issuance of a warrant under these circumstances and having further concluded that Rule 41 must be read consistently with the Fourth Amendment, reliance on Rule 41(c)(4) does not advance the government’s case. Moreover, the government has not identified any language in the rule, its legislative history, or case law that aids its position. Thus, the Court declines to adopt the government’s expansive reading of Rule 41(c)(4) in the context of the warrant application at issue in this matter.
As discussed earlier in section (l)(d), the rule was changed because in 1979 “there was uncertainty whether a warrant was needed to enter a private premises to make an arrest.” 3A Federal Practice & Procedure, Crim. § 664.1 (3d ed.2009).
The notes of the Advisory Committee on the Federal Rules of Criminal Procedure’s rationale for amending Rule 41 to include subsection (c)(4) in 1979 are additionally informative:
“This amendment to Rule 41 is intended to make it possible for a search warrant to issue to search for a person under two circumstances: (i) when there is probable cause to arrest that person; or (ii) when that person is being unlawfully restrained. There may be instances in which a search warrant would be required to conduct a search in either of these circumstances. Even when a search warrant would not be required to enter a place to search for a person, a procedure for obtaining a warrant should be available so that law enforcement officers will be encouraged to resort to the preferred alternative of acquiring “an objective predetermination of probable cause,” Katz v. United*569 States,389 U.S. 347 ,88 S.Ct. 507 ,19 L.Ed.2d 576 (1967), in this instance, that the person sought is at the place to be searched.”
Fed. R.Crim. P. 41(c)(4), Advisory Committee’s Note, 1979 Adoption.
Thus, this amendment to Rule 41 was clearly not intended to be a break from the requirement of probable cause to believe that the subject of the search is in a particular place. Rather, the amendment provided a procedure for law enforcement to present its case to a “neutral magistrate” for search of a particular location while protecting the privacy rights of third parties.
The Fifth Circuit, interpreting the Advisory Committee Notes, found that
[T]he provision was intended to cover two distinct situations not applicable to the case at hand: (1) where an individual for whom probable cause for arrest exists, but is “hiding out” with someone else; and (2) in searching for a kidnap victim believed to be held captive in a given place.
Given the narrow intent behind this rule, and the coverage of arrest warrants in Fed.R.Crim.P. 4 and 9, we do not read Rule 41 to extend to arrest situations.
United States v. Hultgren,
Based on .the foregoing analysis, the Court agrees that Rule 41(c)(4) authorizes the Court to issue a warrant to search for a person where there is probable cause to arrest the person and there is probable cause to believe that he is hiding in a particular place. Walters,
In sum, under the federal rules it is proper for the government to get a search warrant for evidence of a crime including, for example, location data pertaining to a suspected drug dealer. See Fed. R.Crim. P. 41(c)(1). In addition, it is proper for the government to get a warrant to search for the subject of an arrest warrant where it can demonstrate probable cause to believe that the subject of the arrest warrant is in a particular place. See Fed. R. Crv P. 41(c)(4). Notwithstanding, there seems to be no authority supporting the issuance of a search warrant to obtain information about the location of the subject of an arrest warrant solely to aid in that person’s apprehension under the rubric of Rule 41(c)(l)-(4). However, as discussed below, the government’s application is, in fact, a request for a tracking device, which necessarily must be considered under Fed. R. Cr. P. 41(f)(2). This rule quite obvious
3. Inherent Authority
The government also argues that a federal court retains inherent authority to issue warrants consistent with the Fourth Amendment, without regard to the terms of Rule 41. (ECF No. 6, 4).
The Federal Public Defender does not deny that the federal court has inherent authority to issue search warrants. (ECF No. 8, 1-2). However, the Court can only issue warrants which comply with the Fourth- Amendment and, as discussed above, warrant authority has historically been jealously limited to use in connection with criminal conduct. None of the government’s authorities in support of the exercise of inherent authority here represent a deviation from this overwhelming, historical and precedential view of the permissible use of a search warrant. See (ECF No. 6, 4-6).
The government relies heavily on United States v. N.Y. Telephone Co.,
The government’s other authorities are similarly distinguishable. The courts in United States v. Torres,
The government’s first application sought a search warrant under the combined authority of Rule 41 and 18 U.S.C. § 2703(c)(1)(A). Specifically, the government alleges that 18 U.S.C. § 2703(c)(1)(A), a provision enacted as part of the Electronic Communications Privacy Act of 1986, entitles it to a warrant for the requested information. (ECF No. 10, 5-6). Section 2703(c)(1)(A) of Title 18 provides that “[a] governmental entity may require a provider of electronic communication ... to disclose a record or other information pertaining to a subscriber to or customer of such service (not including the contents of communications) when it obtains a warrant issued using the procedures described in the Federal Rules of Criminal Procedure.” 18 U.S.C. § 2703(c)(1)(A). The government argues based upon this statutory language that this Court has
“jurisdiction to issue a search warrant here ... because (1) the telecommunications service provider is a provider of electronic communication service; (2) the location information sought pertains to a customer of the service; and (3) the location information sought is not the contents of communications. Section 2703(c)(1)(A) thus constitutes an explicit statutory authorization for the United States to obtain the location information it sought in this case”
(ECF No. 10, 5-6) (internal citations omitted). The government’s argument fails as a matter of constitutional law and a matter of statutory interpretation. A brief review of the legislation on electronic communications and records is helpful to understanding the fallacy of the government’s argument here.
In 1968, Congress enacted the Omnibus Crime Control and Safe Streets Act to provide comprehensive authorization for government interception, under carefully subscribed circumstances, of wire or oral conversations. S.Rep. No. 99-541, reprinted in 1986 U.S.C.C.A.N. 3555, 3556 (Oct. 17, 1986) (citing the Omnibus Crime Control and Safe Streets Act of 1968). This Act, which included Title Ill’s wiretap provisions, quickly became “hopelessly out of date.” Id. In 1986, Congress enacted the Electronic Communications Privacy Act (“ECPA”) which amended Title 18 of the United States Code to “protect against unauthorized interception of electronic communications,” and to “update and clarify Federal privacy protections and standards in light of dramatic changes in new computer and telecommunications technologies.” Pub.L. No. 99-508, 100 Stat. 1848 (99th Cong.1986); S.Rep. No. 99-541, reprinted in 1986 U.S.C.C.A.N. 3555, 3555 (Oct. 17, 1986). Of particular note, ECPA amended Title III to “bring it in line with technological developments and changes in the structure of the telecommunications industry,” and added sections to address access to stored wire and electronic communications and transactional records, as well as pen registers and trap and trace devices. Id.‘
Following adoption of the ECPA, courts have recognized that,
In re Application of the United States for an Order Authorizing Monitoring of Geo-
The Wiretap Act and ECPA apply only to the extent information is transferred via wire, oral, or electronic communication. Thus, these Acts now go beyond protecting only wire or oral communication to also cover any electronic communication, which includes “any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photooptical system that affects interstate or foreign commerce.” 18 U.S.C. § 2510(12). Thus, the electronic communications category covers cellular telephone service. In re Application of the United States for an Order For Disclosure of Telecommunications Records and Authorizing the Use of a Pen Register and Trap and Trace,
The government contends that the information it seeks constitutes “records or other information pertaining to a subscriber” that it may request from a carrier by obtaining a warrant under § 2703(c)(1)(A). The statute offers no definition nor explanation of what constitutes “records” or “information pertaining to a subscriber.” The kind of location information that is most commonly sought under § 2703 is cell site data — information that is automatically collected by cell sites as a user’s handset “checks in” or “registers” with the network.
At the hearing, the government admitted that the precise location data sought here is neither ancillary information collected by service providers in the course of business nor information that is automatically generated or stored “incidental” to calls. Therefore, the requested information cannot logically be considered “records” and is nothing like the information courts have found to fall under the purview of § 2703. (ECF No. 10, 5). Regardless of the Court’s view of this argument, the argument is at best merely semantic. To 'the extent § 2703 applies to a search of an area or thing that is entitled to a reasonable expectation of privacy, the Fourth Amendment protects. To the extent Rule 41 contains substantive provisions, that substance is rooted directly in the Fourth Amendment, with which any search that would violate a reasonable expectation of privacy must comply. As the Federal Public Defender noted, “[t]he government’s reference to § 2703(c)(1)(A) adds nothing to the analysis of this issue.” (ECF No. 8,11). The Court agrees.
Rather than being a “stored record or other information,” the precise location information sought falls squarely within the definition of communications from a tracking device, despite the government’s denial of the same in this case. 18 U.S.C. § 3117 defines a tracking device as “an electronic or mechanical device which permits the tracking of the movement of a person or thing.” As such, the information is specifically excluded from coverage under the Wiretap Act and ECPA, including § 2703.
a. Tracking Devices
The government’s position, as articulated during the hearing, is that a cell phone is not a tracking device. Rather, the government contends that the tracking devices contemplated by ECPA and Rule 41 include only the legacy “bumper beepers” that existed at the time Congress enacted ECPA. The Court disagrees.
When Congress enacted ECPA in 1986, it had no reason to anticipate that cell phones would soon become capable of performing all the functions of a tracking device. Nonetheless, instead of limiting its statutory definition of tracking device to the beeper-type devices then in existence, it defined a tracking device broadly as “an electronic or mechanical device which permits the tracking of the movement of a person or object.” 18 U.S.C. § 3117(b). In the Senate Report that accompanied ECPA, the only reference to tracking devices defined “electronic tracking devices” as:
one-way radio communication devices that emit a signal on a specific radio frequency. This signal can be received by special tracking equipment, and allows the user to trace the geographical location of the transponder. Such “homing” devices are used by law enforcement personnel to keep track of the physical whereabouts of the sending unit, which might be placed in an automobile, on a person, or in some other item.
S.Rep. No. 99-541, reprinted in 1986 U.S.C.C.A.N. at 3564.
Other arguments that cell phones are not tracking devices when used to effectively track a subject are similarly unavailing. For instance, some suggest that tracking devices covered by the statute should be limited only to devices which are “installed” or “planted” without the subject’s consent or knowledge. In re Application for Pen Register Device,
The majority of courts that have examined these issues are now recognizing that advances in technology have transformed cell phones into multi-function devices that perform, in many cases, identical functions to traditional tracking devices. The logical approach embraced by these courts concludes that cell phone signals are electronic communications and cell phone providers are electronic communications service providers, except to the extent that a cell phone is being used as a tracking device, e.g., to provide location data. E.g., In re Application of the United States for an Order Authorizing Use of a Pen Register with Caller Identification Device Cell Site Location Authority on a Cellular Telephone,
*577 [a] cell phone has the ability, by the use of electronic signals, to track the movement of an object (the phone itself), and by extension, of a person. It does so by locating the position of the phone, through the process of “triangulation” that Judge Kaplan and others discuss at some length in their opinions. Therefore, a cell phone falls within the literal definition of the term “tracking device” as used in the Stored Communications Act.
In re Application of the United States for an Order Authorizing Use of a Pen Register with Caller Identification Device Cell Site Location Authority on a Cellular Telephone,
This judge now joins others who have found that cell phones, to the extent that they provide prospective, real time location information, regardless of the specificity of that location information,
[t]his is an elegant solution to the conundrum created by the application of Congress’ chosen definitions. It construes the statute in a way that makes it work in the manner that Congress clearly intended, without doing violence to its literal language. It avoids the absurd result that has caused some of my fellow jurists to dance around the Congressionally-selected definitions of the terms “tracking device” and “electronic communication.” And it quite possibly forestalls any Fourth Amendment issue that might arise from the use of [cell site location data] in violation of the Supreme Court’s pronouncement in United States v. Karo,
In re Application of the United States for an Order Authorizing Use of a Pen Register with Caller Identification Device Cell Site Location Authority on a Cellular
The Court recognizes that there is some dispute as to whether a warrant based on probable cause is required in obtaining the traditional “bumper beeper.” The Supreme Court on June 27, 2011 granted the government’s petition for certiorari in United States v. Jones,
Having already found that the information sought here is subject to a reasonable expectation of privacy, the Court further concludes the government must obtain a search warrant under Rule 41(f) to obtain location data and must establish probable cause. As § 2703 does not govern the information requested here and the government has failed to establish the grounds for a warrant, the government’s application brought under Rule 41 and 18 U.S.C. § 2703(c)(1)(A) is unavailing.
5. All Writs Act
The government’s second application sought precise location information under the All Writs Act. (ECF No. 2; ECF No. 6, 6-9). This may be the most troubling position the government has taken in pursuit of this precise location data. Essentially, the government seeks an end run around constitutional and statutory law
In support of its invocation of the All Writs Act, the government relies heavily on N.Y. Telephone Company, a case in which the United States Supreme Court found that an order requiring a phone company to provide assistance in furtherance of a properly issued pen register was authorized under the All Writs Act. United States v. N.Y. Tel. Co.,
Thus, N.Y. Telephone Company stands for the proposition that the All Writs Act enables the Court to, in the absence of other enabling authority, issue supplemental orders to effectuate valid orders or warrants issued under existing law, but only to the extent any supplemental order issued does not constitute an additional invasion of privacy. Notably, and critically different than this matter, the Supreme Court acknowledged and deferred to congressional approval of a pen register as a permissible law enforcement tool. Also notably, the government had satisfied the lower court that there was probable cause — a nexus between use of the phone for which the pen register was sought and suspected commission of an ongoing crime. N.Y. Telephone Company does not grant the Court an unbridled inherent power to infringe on an individual’s privacy rights, outside of the governing structure of the Fourth Amendment. In fact, this Court has been unable to locate a single case in which access was granted to search or seize Fourth Amendment-protected information under the All Writs Act, without satisfying the probable cause standard.
Rather, the All Writs Act empowers courts to “issue all writs necessary or
Courts generally recognize this as a gap-filling measure to issue orders necessary “to achieve ‘the rational ends of law.’” N.Y. Tel. Co.,
Courts analyze four elements when determining whether to invoke the All Writs Act. First, courts determine whether any applicable federal law governs the request. Where other federal law controls, the All Writs Act is inapplicable. See, e.g., Denedo,
Second, if no federal law governs the requested authorization, courts determine whether there is any constitutional issue
The All Writs Act does not excuse the government from its burden of establishing probable cause where constitutionally protected information is requested. See In re Application of the United States for an Order (1) Authorizing the Use of a Pen Register and a Trap and Trace Device,
Where no law occupies the space and no constitutional issues are raised, courts move to the third step: determining whether a prior order of the Court exists that a further order will aid. For example, where a pen register that is properly issued by the Court upon a showing of probable cause would be frustrated by the government’s inability to carry out the authorized search without assistance from the telephone company, the All Writs Act may authorize a secondary order to require the telephone company to provide technical assistance to the government. N.Y. Tel. Co.,
Fourth, after meeting all previous steps, the government must show that “exceptional circumstances” justify invocation of the All Writs Act. Other less intrusive means, Pa. Bureau of Corr.,
In short, the All Writs Act may authorize a search in furtherance of a prior order only where no other law applies, no Fourth Amendment right to privacy is implicated, and exceptional circumstances are present.
This is not such a situation. Here, the government requests information that implicates the Fourth Amendment’s reasonable expectation of privacy. The government’s request is covered by existing law — namely, the Fourth Amendment’s probable cause requirement, Rule 41, and ECPA — and the government makes no allegations of extraordinary circumstances that would justify deviation from that existing law. Indeed, the government does not suggest that the subject of the arrest warrant in this case has done or is likely to do anything to “frustrate the implementation” of that arrest warrant. Cf. N.Y. Tel. Co.,
Importantly, the government’s request, if granted, would infringe on different rights than those implicated by an arrest warrant, as the government seeks to obtain ongoing precise location data over an extended period of time rather than a onetime search for the subject himself, at a specific place.
The government simply cannot use the All Writs Act to circumvent the requirements of the Fourth Amendment and other statutes that already occupy the space. The All Writs Act will allow the Court to take the necessary steps to effectuate its orders, but only where all other means have been exhausted. The government has not exhausted its remedies here and has demonstrated no exceptional circumstances that would justify an extraordinary writ.
Moreover, application of the All Writs Act to government requests for location data would have the ill-advised result of effectively exempting this and future similar requests from the eongressionally-mandated reporting requirements that accompany orders and warrants established by the Rules and statutes discussed herein. An extensive congressional scheme provides courts with guidance as to the form and substance of the authorizations. See 18 U.S.C. § 2518(l)-(4) (outlining authorization application requirements, probable cause standard, form of court order, and allowances for status updates applicable to orders authorizing or approving the interception of a wire, oral, or electronic communication under 18 USCS §§ 2510 et seq.); 18 U.S.C. § 2703(c) (specifying types of authorizations (warrant, order, subpoena) required for obtaining information and requirements for each). By contrast, if a cell phone used for this purpose were classified as a tracking device, specified reporting requirements would automatically apply. See Fed.R.Crim.P. 41(f)(2). This Rule outlines reporting requirements for use of tracking devices. Id. Moreover, this Rule requires that notice be provided to the tracked person after the end of the use of the device, id., but does provide for delayed notification, id. at (f)(3). Delayed notification requires additional reporting of grants/extensions/denials of these warrants to the Administrative Office of the United States Courts. See 18 U.S.C. § 3103a(d).
As Justice Powell noted in Pa. Bureau of Corr., “[although the Act empowers federal courts to fashion extraordinary remedies when the need arises, it does not authorize them to issue ad hoc writs whenever compliance with statutory procedures appears inconvenient or less appropriate.”
III. CONCLUSION
As set forth above, the Court finds that real time, precise location data generated by a cell phone is entitled to a reasonable expectation of privacy and thus is subject to the Fourth Amendment’s protections and the procedural requirements of Rule 41. This information is not exempted from Rule 41, as the Court further finds that location data is not an “electronic communication,” cell phone providers are “electronic communications services” except to the extent a cell phone is used as a track
This Court has articulated a procedure for requesting prospective, real time location information:
When the government seeks to acquire and use real time cell site information to identify the location and movement of a phone and its possessor in real time, the court will issue a warrant upon a sworn affidavit demonstrating probable cause to believe the information will yield evidence of a crime. The court will not enter an order authorizing disclosure of real time cell site information under authority other than Rule 41, nor upon a showing of less than probable cause.
In re Application of the United States for an Order Authorizing Installation and Use of a Pen Register and a Caller Identification System on Telephone Numbers (Sealed),
Rule 41(b) provides that a tracking warrant may be used up to 45 days. Fed. R.Crim.P. 41(b). That would appear to be unnecessarily long in most fugitive situations. The Court shall grant a tracking warrant until the subject of the arrest warrant has been located or a reasonable number of days under the circumstances, whichever is sooner. The duration of the tracking warrant must be tailored to the purpose of the warrant, here, the apprehension of the subject of the arrest warrant. Arizona,
As requests for location information are governed by existing federal law, these requests do not present extraordinary situations that justify invocation of the All Writs Act or any other inherent power of this Court. All government requests are subject to the Fourth Amendment. Having found that the government’s request for location data fails to establish probable cause and, specifically, a nexus between the information sought and the alleged crime, the government’s applications are hereby DENIED. This denial does not frustrate or impede law enforcement’s important efforts, but rather places them within the constitutional and statutory framework which balances citizens’ rights
There is no precedent for what the government seeks: the right to obtain location data without any demonstration of the subject’s knowledge of, and attempt to avoid, an arrest warrant. While courts routinely authorize location data where there is a demonstration under Rule 41(c)(1) that a defendant is fleeing to avoid prosecution and a few courts have authorized other types of surveillance in aid of an arrest warrant under All Writs Act where diligent law enforcement techniques have failed or been frustrated, no court under any rubric has approved a warrant or order for location data on the simple showing of an outstanding arrest warrant and the possession of a cell phone by the subject of the arrest warrant. See, e.g., In the Matter of the Application of United States for an order: (1) Authorizing Use of a Pen Register and Trap and Trace Device, (2) Authorizing Release of Subscriber and Other Information, (S) Authorizing Disclosure of Location-Based Services,
The government’s arguments, if credited, would allow law enforcement to obtain location data on any subject of an arrest warrant. This would be the result whether the defendant was charged with a misdemeanor or a felony, without any demonstration of any attempt on the part of the subject to avoid prosecution, so long as law enforcement had reason to believe that the source of the location data — here a cell phone — was in the possession of the subject.
Some might say that this is an appropriate use of a new technology in the service of more efficient and effective law enforcement. Others might say it is an unnecessary use of a new technology in a society already subjected to pervasive surveillance. The Court understands the tension. Regardless of individual views, the law does not currently sanction the requested acquisition of location data in these circumstances.
Notes
. The service to which the government refers in its application is actually called "Sprint Precision Locator.”
. After denying the government's applications, the Court invited further argument and authorities from the government, appointed the Office of the Federal Public Defender to provide the defense perspective, and held a hearing. (ECF Nos. 4, 5, 7, 11, 12). The Court thanks the Office of the United States Attorney, the U.S. Department of Justice, and the Office of the Federal Public Defender for their briefing and argument.
. For a comprehensive finding of facts regarding the technology used in cellular location tracking, see In re Application of the United States for Historical Cell Site Data,
. "Real time” in this context is a term of art. "Prospective” location data includes any location information generated after the date of the court order permitting the government to obtain that information. See ECPA Reform and the Revolution in Location Based Technologies and Services: Hearing Before the Sub-comm. on the Constitution, Civil Rights, and Civil Liberties of the H. Comm, on the Judiciary, 111th Cong. 81-85 (2010) (statement of The Honorable Stephen Wm. Smith, United States Magistrate Judge, Southern District of Texas). "Real-time” location data is a subset of prospective location data which includes only information that is both generated after the court's order and is provided to the government in, or close to, "real time." Id. (explaining that prospective and real-time location data are distinguishable from "historical” location data, which encompasses only that location information that already has been created, collected, and recorded by the cellular service provider at the time the court authorizes a request for that information). The government's request for GPS and cell-site location information encompasses both prospective and real-time location data.
. Some courts and commentators have suggested that prolonged surveillance might also implicate the subject’s First Amendment rights of freedom of association. See e.g., Vivek Kothari, Autobots, Decepticons, and Panopticons: The Transformative Nature of GPS Technology and the Fourth Amendment, 6 Crim. L. Brief 37, 45 (2010) ("More than mere locations, GPS devices provide an index of known associates and associations and insight into the frequency of those associations. The attachment of a GPS device, then, implicates fundamental First Amendment freedom of association concerns.”). Notably, The Supreme Court has emphasized that the Fourth Amendment warrant requirement should be "scrupulously observed” when First Amendment concerns are presented. See Stanford v. Texas,
. While the government does not make the argument here that the subject of the arrest warrant relinquished his expectation of privacy in his location information by voluntarily sharing it with a third party, it has invoked this argument in a number of other cases. See e.g., In re Application of the United States for an Order Directing a Provider of Electronic Communication Service to Disclose Records to the Government,
It is relevant to the instant matter, however, that several courts have distinguished the unprotected telephone numbers in Smith from cell site location data. See United States v. Forest,
Finally, here the government seeks information — essentially, continuous pinging — that is not collected as a necessary part of cellular phone service, nor generated by the customer in placing or receiving a call. Under this circumstance it is difficult to understand how the user "voluntarily” exposed such information to a third party.
. A few short months after the District of Columbia Circuit's decision in Maynard, the United States Court of Appeals for the Third Circuit considered government access to historical cell site data for the first time and, while not ultimately resolving the Fourth Amendment issue, concluded that the factual record was insufficient to determine whether historical cell site records could encroach upon a citizens' reasonable expectations of privacy regarding their physical movements and locations. In re Application of the United States for an Order Directing a Provider of Electronic Communication Service to Disclose Records to the Government,
. At the hearing, the government also suggested that it was "less clear that someone [who is the subject of an arrest warrant] has an expectation of privacy in their location.”.
The notion that the subject of an arrest warrant relinquishes any reasonable expectation of privacy in his “person, houses, papers, and effects” upon a neutral magistrate’s determination of probable cause that he has committed a crime — a concept that is implicit in the government’s argument even if not explicitly stated — is clearly inconsistent with existing constitutional limitations on law enforcement. Even where law enforcement officers may permissibly enter a suspect's residence without a search warrant in order to execute an arrest warrant under Payton, their authority to search the residence is limited to recognized exceptions to the Fourth Amendment search warrant requirement. For instance, officers may search areas of the home where the subject might reasonably be hiding in order to locate him (i.e., they may search a closet, but not a shoe box). In the interest of safety, officers may also conduct a protective sweep of the home, Maryland v. Buie,
. Although the arrest warrant in Payton was for a felony, courts have held that Payton authorizes entry into a suspect’s residence to effectuate a valid misdemeanor arrest warrant. See Smith v. Tolley,
. The Supreme Court also has cited Payton as support for general Fourth Amendment concepts on a number of occasions. See, e.g., Illinois v. McArthur,
. In applying Wilson, federal circuit courts have noted that Fourth Amendment privacy rights do not turn solely on the special status of the home. See, e.g., Lauro v. Charles,
. “[T]he 'reason to believe’ standard was not defined in Payton, and since Payton, neither the Supreme Court, nor the courts of appeal have provided much illumination.” Wayne R. LaFave, Search and Seizure: A Treatise on the Fourth Amendment § 6.1 (4th ed.2004) (citing United States v. Magluta,
. In the Consumer Resources section of its official website, Sprint Nextel further emphasizes the sensitive nature of location information in its 'Consumer Privacy FAQs’. Sprint, Consumer Resources — Customer Privacy FAQS, http://newsroom.sprint.com/article_display. cfm?article_id=1472# qID9 (last visited Feb. 1, 2011). In response to the frequently asked question "How is my device location information used?,” Sprint Nextel states that,
To make wireless communications possible, wireless networks use the location of your device to deliver mobile services whenever your device is turned on ... Sprint offers unique features to its users, including a number of location-enabled services that you activate and use. To provide these services, the Sprint network must use the location information of your device to deliver your services ... You should carefully review the terms and conditions and privacy policies of third party application and service providers to understand their use of your location information. Only share your location information with those you trust. It is your responsibility to inform anyone that uses your wireless device and all of the users of other wireless devices on your account of location capabilities and the location based services that are in use for those devices.
Id.
. These six Congressional hearings include: Electronic Communications Privacy Act Reform: Hearing Before the Subcomm. on the Constitution, Civil Rights, and Civil Liberties of the H. Comm, on the Judiciary, 111th Cong. (May 5, 2010) (discussing need for reform of the ECPA in light of new communications technologies); ECPA Reform and the Revolution in Location Based Technologies and Services: Hearing Before the Subcomm. on the Constitution, Civil Rights, and Civil Liberties of the H. Comm, on the Judiciary, 111th Cong. (Jun. 24, 2010) (examining the need to update the ECPA with a particular focus on cell site information and other location based technologies); The Electronic Communications Privacy Act-Promoting Security and Protecting Privacy in the Digital Age: Hearing Before the S. Comm, on the Judiciary, 111th Cong. (Sept. 22, 2010) (examining the need to update the ECPA in light of advances in communications technologies); ECPA Reform and the Revolution in Cloud Computing: Hearing Before the Subcomm. on the Constitution, Civil Rights, and Civil Liberties of the H. Comm, on the Judiciaiy, 111th Cong. (Sept. 23, 2010) (discussing the need to update the ECPA with a particular focus on cloud computing); The Electronic Communications Privacy Act — Government Perspectives on Protecting Privacy in the Digital Age: Hearing Before the S. Comm, on the Judiciaiy, 111th Cong. (Apr. 6, 2011) (discussing how the need to update the ECPA affects the government's ability to fight crime and protect national security); Protecting Mobile Privacy — Your Smartphones, Tablets, Cell Phones and Your Privacy: Hearing Before the Hearing Before the S. Comm, on the Judiciaiy, 111th Cong. (May 10, 2011) (discussing the privacy implications of smartphones and other mobile applications).
. While there has been considerable congressional activity around ECPA reform recent months, as demonstrated by the hearings and bills discussed here, congressional concern over ECPA and location privacy is not new. For example, Representative Charles Canady introduced a bill during the 106th Congress in 2000 that sought to amend ECPA, 18 U.S.C. § 2703, to require that “a provider of mobile electronic communication service shall provide to a government entity information generated by and disclosing the current physical location of a subscriber’s equipment only if the governmental entity obtains a court order issued upon a finding that there is probable cause ...” H.R. 5018, 106th Cong. (2000) (as reported by H. Comm, on the Judiciary, Oct. 4, 2000).
. Demonstrating similar concern, a number of state legislatures have prohibited use of electronic tracking devices except pursuant to a search warrant. See Maynard,
. The Griffin holding — that search of a probationer’s home, pursuant to Wisconsin regulation requiring only reasonable grounds and no prior judicial approval is clearly distinguishable here, as it involved a person convicted of a crime and still under supervision. Also, the Supreme Court found impracticability: "A warrant request would interfere to an appreciable degree with the probation system, setting up a magistrate rather than the probation officer as the judge of how close a supervision the probationer requires. Moreover, the delay inherent in obtaining a warrant would make it more difficult for probation officials to respond quickly to evidence of misconduct ... and would reduce the deterrent effect that the possibility of expeditious searches would otherwise create.” Id. at 876,
. For instance, the arrestee could invoke the exclusionary rule to suppress evidence obtained by the government as a result of a defective arrest warrant or impermissible warrantless arrest. See Mapp v. Ohio,
. Indeed, the response to Hayden of the Advisory Committee on Criminal Rules is instructive on this point. The Committee did not seek to amend Rule 41 to clarify that a search warrant may be used to obtain evidence that will aid in the apprehension of a defendant. Rather, the Committee queried: "One question is whether it is desirable to amend Rule 41(b) to provide that search warrants may issue for evidence of the commission of a crime and if it is, whether this is the way to do it. [Professor Remington] said that the Department of Justice had said that it might be desirable to amend the rule to reflect the Hayden case.” Advisory Comm, on Crim. Rules, Minutes of the September 1967 Meeting of the Advisory Comm, on Crim. Rules 2 (Sept. 11-12, 1967), available at http://www. uscourts.gov/uscourts/RulesAndPolicies/rules/ Minutes/CR09-1967-min.pdf. And, indeed, Rule 41 was amended consistent with the Committee and the FPD's view of the Hayden holding. See Fed. R.Crim. P. 41, Advisory Committee’s Note, 1972 Amendments ("Subdivision (b) is also changed to ... take account of a recent Supreme Court decision (Warden v. Hayden,
. Under the Leahy Bill, the government must get a search warrant to access contemporaneous (real-time) geolocation information from an electronic communications, remote computing, or geolocation information service provider, and either a search warrant or court order, issued on a showing of specific and articulable facts that there are reasonable grounds to believe the information is relevant and material to an ongoing criminal investigation, to obtain historical geolocation information from the same providers. S. 1011, 112th Cong. (2011). Therefore, in this case, under the Leahy Bill, the government would have to show probable cause and get a search warrant to access the "real time” data it requests. The Wyden Bill similarly requires the government to get a search warrant before it can obtain location data from a “wireless communication device,” such as a cell phone. S. 1212, 112th Cong. (2011). It would require the government to get a search warrant when it wants to acquire an individual's geolocation information from a private company or monitor an individual’s movements directly, using covertly installed tracking devices or similar means. Id. Notably, this bill also prohibits unlawfully intercepted geolocation information from being used as evidence. Id.
. The government's All Writs Act argument is addressed in greater detail later in this opinion, but it bears noting here that Rule 41 does indeed address the situation at hand— the government may obtain the precise location information it seeks pursuant to a Rule 41(c)(1) warrant for information constituting evidence of a crime, as long as it meets the required probable cause standard. Here, it does not.
. While later decisions in some circuits suggest that a warrant based on probable cause may not be necessary vis a vis the subject of the arrest warrant, see infra, it is still necessary to protect the interests of third parties.
. The government is correct that there is nothing in Rule 41 which expressly prohibits a warrant for the information sought. In that sense, the government's request is not inconsistent with Rule 41; nor, of course, does Rule 41 expressly provide authority for issuance of the warrant or order it seeks. But this, of course, is the wrong focus. Rule 41 does not define the limits of constitutional permissibility. The Fourth Amendment does.
. When reporting ECPA, the Senate underscored the important purpose of this legislation:
A letter sent by first class mail is afforded a high level of protection against unauthorized opening by a combination of constitutional provisions, case law, and U.S. Postal Service statutes and regulations. Voice communications transmitted via common carrier are protected by title III of the Omnibus Crime Control and Safe Streets Act of 1968. But there are no comparable Federal statutory standards to protect the privacy and security of communications transmitted by new noncommon carrier communications services or new forms of telecommunications and computer technology. This is so, even though American citizens
This gap results in legal uncertainty. It may unnecessarily discourage potential customers from using innovative communications systems. It probably encourages unauthorized users to obtain access to communications to which they are not a party. It may discourage American businesses from developing new innovative forms of telecommunications and computer technology. The lack of clear standards may expose law enforcement officers to liability and may endanger the admissibility of evidence.
Most importantly, the law must advance with the technology to ensure the continued vitality of the fourth amendment. Privacy cannot be left to depend solely on physical protection, or it will gradually erode as technology advances. Congress must act to protect the privacy of our citizens. If we do not, we will promote the gradual erosion of this precious right.
Id. at 3559 (emphasis added).
. The Third Circuit has held that a magistrate judge has discretion to require a warrant with its underlying probable cause standard, rather than a showing of "specific and articulable facts showing that there are reasonable grounds to believe that the ... information sought ... [is] relevant and material to an ongoing criminal investigation,” before granting an order under § 2703(d) of the Stored Communications Act. In re United States for an Order Directing a Provider of Electronic Communication Service to Disclose Records to the Government,
. While this opinion mentions Title 18's pen register and trap and trace provisions in the context of the "hybrid theory” proposed by the government and accepted by some courts for provision of cell site location information, these provisions are irrelevant to the precise location information requested herein, as the provisions are limited to "dialing, routing, addressing, and signaling information utilized in the processing and transmitting of wire or electronic communications.” 18 U.S.C. § 3121(c). While the pen/trap provision could arguably be read, as some courts have done, to include stored cell site location information as "call identifying information,” e.g., In re Application of the United States for an Order: (1) Authorizing the Installation and Use of a Pen Register and Trap and Trace Device; (Z) Authorizing the Release of Subscriber and Other Information and (3) Authorizing the Disclosure of Location-Based Services, 06-MC-6 & 06-MC-7,
. The Wiretap Act establishes a higher standard for the "contents" of contemporaneous electronic communications, as opposed to “records concerning” the communication. Compare 18 U.S.C. § 2703(c)-(d) (permitting a governmental entity to obtain records or other information concerning electronic communications, not including the contents thereof, upon a warrant issued under Rule 41 that meets the probable cause standard) with 18 U.S.C. § 2518 (permitting a governmental entity to intercept electronic communications only after meeting a heightened probable cause standard). However, neither party contends that the precise location information sought by the government here is "contents” of an electronic communication that would fall within the Wiretap Act’s protections against interception. Therefore, it is unnecessary for the Court here to analyze the intricacies and protections of the Wiretap Act.
. When requesting cell site information, the government often advances a "hybrid” theory using the combined authority of 18 U.S.C. §§ 2703(d) & 3121 et seq., which it contends allows it to obtain cell site location data without establishing probable cause. (ECF No. 1, 2 n. 1). As explained by Judge Hogan of the D.C. District Court,
The "hybrid theory” posits that the Court is authorized to order the disclosure of prospective cell site data under a combination of the [Stored Communications Act] and the Pen Register Statute. The government argues that the use of the word “solely” necessarily implies that another authority may be combined with the Pen Register Statute to authorize disclosure. Most of the Magistrate Judges that have considered the hybrid theory have found it to be unavailing, holding that the Pen Register Statute and the Stored Communications Act in tandem do not" provide authority for disclosure of prospective cell site data. The first District Court to rule on the hybrid theory, however, has come out the other way, finding that this combination does allow for disclosure.
In re Application of the United States for an Order Authorizing Monitoring of Geolocation and Cell Site Data for a Sprint Spectrum Cell Phone Number, Misc. No. 06-186, 187, & 188,
. Two bills, part of the previously mentioned proposed legislation to update ECPA, strengthen the arguments that ECPA does not cover location data-rather, location data stands separate from other types of data covered by the Act. Senator Leahy's ECPA Amendments Act of 2011, "Leahy Bill," adds "geolocation information,” defined as "any information concerning the location of an electronic communications device that is in whole or in part generated by or derived from the operation or use of the electronic communications device” under the coverage of the Act, and further defines "electronic communications device” to mean "any device that enables access to or use of an electronic communications system, electronic communication service, remote computing service, or geolocation information service.” S. 1011, 112th Cong. (2011). Alternatively, Senator Wyden and Representative Chaffetz’s the Geolocational Privacy and Surveillance Act, "Wyden Bill,” provides for geolocation information by supplementing ECPA. The bill defines "geolocation information” as any information "that is not the content of a communication, concerning the location of a wireless communication device or tracking device [defined as an electronic or mechani
. Given that § 2703 does not provide authority for law enforcement access to location data under the circumstances presented here, the government's novel argument that a § 2703 warrant need not comply with Rule 41 in its entirety, but rather only with procedural provisions in the Rule, is inapposite. See (ECF No. 10, 5) (arguing that its warrant application need not correspond to the categories listed in Rule 41(c)(l)-(4)). The government maintains that the provision in § 2703(c)(1)(A) authorizing it to obtain "information pertaining to a subscriber or customer” from an electronic communication service pursuant to "a warrant issued using the procedures described in the Federal Rules of Criminal Procedure,” indicates that § 2703 incorporates only those provisions of Rule 41 that are procedural in nature, not its substantive provisions. (Id.) (citing Berkos,
. In other cases, the government has suggested that only precise location information from cell phones should be categorized as tracking information, and that category should be distinguished from prospective and real-time cell site location information. However, § 3117 does not distinguish between general and detailed tracking, and courts have rejected such a distinction. See In re U.S. for Orders Authorizing Use of Pen Registers and Caller Identification Devices on Telephone Numbers,
. Unlike historical location information, prospective location information includes any location information generated after the date of the Court order that permits the government to obtain that information. Real time location information, a subset of prospective location information, includes only information that is both generated after the Court's order and is provided to the government in, or close to, "real time.”
. Moreover, contrary to the conclusion of the Eastern District of New York, this Court does not find that classification of cell phones as tracking devices to the extent they act as tracking devices does not render § 2703(c) meaningless. Cf. In re U.S. for an Order Authorizing the Use of Two Pen Register and Trap and Trace Devices,
. Coram nobis is an ancient writ designed to correct errors of fact. Denedo,
. The prosecutor has discretion to initiate prosecution either by summons or warrant, and is not required to demonstrate anything more in terms of danger or likelihood of flight to receive an arrest warrant, rather than a summons. Fed.R.Crim.P. 4.
. The issue in this case was not use of location data to locate a defendant but the standard of proof required to acquire location data in a criminal investigation, but the procedure applies equally here.
