MEMORANDUM & ORDER
This matter comes before the court as an application for two orders directing Verizon Wireless, a cell-phone service provider, to disclose recorded information of cell-site-location records for one of its customers pursuant to 18 U.S.C. § 2703(c)(1), (d) (the “Stored Communications Act” or “SCA”). (See Gov’t Letter Appl. (Docket Entry # 5).) An identical application was denied on constitutional grounds by Magistrate Judge James Orenstein on December 23, 2010,
I. BACKGROUND
On December 22, 2010, in a sealed application, the Government sought an order pursuant to the SCA. (Sealed Appl. (Docket Entry # 1).) The proposed sealed order directs Verizon Wireless to “disclose recorded information identifying the base station towers and sectors that received transmissions” (“cell-site-locations” or “cell-site-location records”) from the target cell phone at the “beginning and the end of calls or text message transmissions ... for the period from September 1, 2010 until” the day the court issued the proposed order. (Id.) Thus, the proposed order seeks cell-site-location records for a period of at least 113 days. (See Mag Order (Docket Entry # 2) at 1.) The Government represented that the phone at issue was registered to and used by an individual who was the target of a criminal investigation. (Sealed Appl. at 1, 5.)
On December 23, 2010, Judge Orenstein denied the Government’s application “without prejudice to the government’s right to seek similar relief by means of an application for a search warrant pursuant to Federal Rule of Criminal Procedure 41 on the basis of a showing of probable cause.” (Mag. Order at 1.) Judge Orenstein concluded that, while the SCA permits the relief sought, “granting the government’s application would violate the Fourth Amendment.” (Id.) Judge Orenstein’s decision in this case incorporated his reasoning in In the Matter of an Application of United States for an Order Authorizing the Release of Historical Cell-Site Information,
Following this denial, the Government resubmitted its application for an order to this court on January 11, 2011. (Gov’t Letter Appl.) While the court has previously approved similar applications, see In the Matter of an Application of the United States for an Order Authorizing the Use of Two Pen Register and Trap and Trace Devices (“In re E.D.N.Y.”),
II. INTRODUCTION
The vast majority of Americans own cell phones. Many Americans have abandoned
Cell phones work by communicating with cell-sites operated by cell-phone service providers. Each cell-site operates at a certain location and covers a certain range of distance. The number of cell-sites that must be placed within a particular area, and thus the distance between cell-sites, is determined by several factors, including population density.
If a user’s cell phone has communicated with a particular cell-site, this strongly suggests that the user has physically been within the particular cell-site’s geographical range. By technical and practical necessity, cell-phone service providers keep historical records of which cell-sites each of their users’ cell phones have communicated.
The implication of these facts is that cellular service providers have records of the geographic location of almost every American at almost every time of day and night. And under current statutes and law enforcement practices, these records can be obtained without a search warrant and its requisite showing of probable cause.
What does this mean for ordinary Americans? That at all times, our physical movements are being monitored and recorded, and once the Government can make a showing of less-than-probable-cause, it may obtain these records of our movements, study the map our lives, and learn the many things we reveal about ourselves through our physical presence.
Despite the SCA, this court considers whether the Fourth Amendment to the United States Constitution requires a warrant and a showing of probable cause before the Government may obtain the cell-site-location records requested here.
III. LEGAL STANDARD
A. Stored Communications Act
The SCA permits the Government to obtain an order seeking the cell-site-location records requested here. 18 U.S.C. §§ 2703(c)(1), (d); see also In re E.D.N.Y.,
The Fourth Amendment guarantees that “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” U.S. Const, amend. IV. “A search conducted without a warrant is ‘per se unreasonable under the Fourth Amendment — subject only to a few specifically established and well-delineated exceptions.’ ” Maynard,
Whether Government action constitutes a search depends upon whether “the person invoking its protection can claim a ‘justifiable,’ a ‘reasonable,’ or a ‘legitimate expectation of privacy’ that has been invaded by government action.” Smith v. Maryland,
The Katz test applies to all searches, including searches pertaining to the home, which are at the core of the Fourth Amendment. See Kyllo,
C. Constitutionality of Electronic Surveillance of Location
Electronic surveillance of an individual’s location as he travels in public has traditionally not been construed as a Fourth Amendment search, although electronic surveillance of his location within his home has been. See Knotts,
In Knotts, the Supreme Court addressed the constitutionality of electronic surveillance of an individual’s location.
Knotts explicitly left unresolved whether electronic surveillance of movements in public for an extended period can constitute a search, even though electronic surveillance of movements in public from one place to another does not. Knotts,
Shortly after Knotts, the Supreme Court considered “whether the monitoring of a beeper in a private residence, a location not open to visual surveillance, violates the Fourth Amendment rights of those who have a justifiable interest in the privacy of the residence.” Karo,
The Court of Appeals for the District of Columbia Circuit has since addressed the constitutionally of continual surveillance left unresolved by Knotts. Maynard,
The Maynard court noted two important distinctions between the short-term surveillance in Knotts and the prolonged surveillance at issue in Maynard. First, the court concluded that while the individual in Katz did not have a reasonable expectation of privacy over his location while traveling from one place to another, the individual in Maynard had a reasonable expectation of privacy over the totality of his movements over the course of a month. The court reasoned that the totality of one’s movements over an extended time period is not actually exposed to the public “because the likelihood a stranger would observe all those movements is not just remote, it is essentially nil.” Maynard,
The whole of one’s movements over the course of a month is not constructively exposed to the public because, like a rap sheet, that whole reveals far more than the individual movements it comprises. The difference is not one of degree but of kind, for no single journey reveals the habits and patterns that mark the distinction between a day in the life and a way of life, nor the departure from a routine that, like the dog that did not bark in the Sherlock Holmes story, may reveal even more....
... Prolonged surveillance reveals types of information not revealed by short-term surveillance, such as what a person does repeatedly, what he does not do, and what he does ensemble. These types of information can each reveal more about a person than does any individual trip viewed in isolation. Repeated visits to a church, a gym, a bar, or a bookie tell a story not told by any single visit, as does one’s not visiting any of these places over the course of a month. The sequence of a person’s movements can reveal still more; a single trip to a gynecologist’s office tells little about a woman, but that trip followed a few weeks later by a visit to a baby supply store tells a different story. A person who knows all of another’s travels can deduce whether he is a weekly church goer, a heavy drinker, a regular at the gym, an unfaithful husband, an outpatient receiving medical treatment, an associate of particular individuals or political groups — and not just one such fact about a person, but all such facts.
Id. at 561-62. Finally, the court concluded that society recognizes an individual’s “expectation of privacy in his movements over the course of a month as reasonable, and the use of the GPS device to monitor those movements defeated that reasonable expectation.” Id. at 563.
Here, the Government has requested what is essentially at least 113 days of constant surveillance of an individual, (Sealed Appl.) Following Maynard’s persuasive reasoning, this court concludes
In fact, cell-site-location records present even greater constitutional concerns than the tracking at issue in Maynard. Even United States Courts of Appeals that have approved the form of electronic tracking at issue in Maynard. have noted that mass electronic surveillance presents greater constitutional concerns. For example, in United States v. Marquez,
It is imaginable that a police unit could undertake “wholesale surveillance” by attaching such devices to thousands of random cars and then analyzing the volumes of data produced for suspicious patterns of activity. Such an effort, if it ever occurred, would raise different concerns than the ones present here. In this case, there was nothing random or arbitrary about the installation and use of the device.
Marquez,
We, like the Seventh Circuit, believe that should the government someday decide to institute programs of mass surveillance of vehicular movements, it will be time enough to decide whether the Fourth Amendment should be interpreted to treat such surveillance as a search.
Pineda-Moreno I,
new technologies enable, as the old (because of expense) do not, wholesale surveillance .... It would be premature to rule that such a program of mass surveillance could not possibly raise a question under the Fourth Amendment— that it could not be a search because it would merely be an efficient alternative to hiring another 10 million police officers to tail every vehicle on the nation’s roads.... Technological progress poses a threat to privacy by enabling an extent of surveillance that in earlier times would have been prohibitively expensive. Whether and what kind of restrictions should, in the name of the Constitution, be placed on such surveillance when used in routine criminal enforcement are momentous issues that fortunately we need not try to resolve in this case.
Garcia,
D. Third-Party-Disclosure Doctrine
While the court concludes that cellphone users have a reasonable expectation of privacy in their long-term cell-site-location records, the court must consider whether cell-phone users nonetheless destroy this expectation of privacy by communicating their location information to the cell-phone service provider by carrying and using a cell phone.
Under the Fourth Amendment, a “person has no legitimate expectation of privacy in information he voluntarily turns over to third parties,” Smith,
Courts have applied the third-party-disclosure doctrine to a broad array of factual circumstances. See, e.g., id. (holding that disclosure of phone numbers by dialing them to the phone company eliminates any legitimate expectation of privacy against the phone company revealing such numbers to the Government); United States v. Miller,
In Smith v. Maryland, the Court addressed a scenario that is factually similar to the search of cell-site-location records at issue here. The Court held that the Government did not conduct a Fourth Amendment search when it installed a pen register device with a phone service provider to collect phone numbers dialed by the target home phone. Smith,
[a]ll telephone users realize that they must convey phone numbers to the telephone company, since it is through telephone company switching equipment that their calls are completed. All subscribers realize, moreover, that the phone company has facilities for making permanent records of the numbers they dial, for they see a list of their long-distance (toll) calls on their monthly bills. In fact, pen registers and similar devices are routinely used by telephone companies for the purposes of checking billing operations, detecting fraud and preventing violations of law.
Id. at 742,
Pursuant to the third-party-disclosure doctrine, it could be argued that an individual “voluntarily” conveys his cellphone’s location to a third party — his service provider — by turning his phone on and making and receiving calls and text messages. As such, several district court and magistrate judges have concluded that cell-phone users have no reasonable expectation of privacy in their cell-site-location records. See, e.g., In re Application of United States for an Order for Disclosure of Telecommunications Records and Authorizing the Use of a Pen Register and Trap and Trace (“In re Application: S.D.N.Y.”),
Some other courts have concluded, unpersuasively, that eell-site-loeation records should be treated differently than the dialing of phone numbers in Smith due to differences in how “knowingly” or “voluntarily” the information is conveyed. For example, the Court of Appeals for the Third Circuit stated that
[a] cell phone customer has not ‘voluntarily’ shared his location information with a cellular provider in any meaningful way ... [because] it is unlikely that cell phone customers are aware that their cell phone providers collect and store historical location information. Therefore, when a cell phone user makes a call, the only information that is voluntarily and knowingly conveyed to the phone company is the number that is dialed and there is no indication to the user that making that call will also locate the caller; when a cell phone user receives a call, he hasn’t voluntarily exposed anything at all.
In the Matter of Application of the United States for an Order Directing a Provider of Electronic Communication Service to Disclose Records to the Government,
Providing a more fulsome, albeit hyper-technical, distinction between phone-number and cell-site-location records, Magistrate Judge Stephen Wm. Smith of the Southern District of Texas has emphasized the difference between the methods through which phone numbers and cell-site-location records are conveyed to the service providers:
Unlike the bank records in Miller or the phone numbers dialed in Smith, cell site data is neither tangible nor visible to a cell phone user. When a user turns on the phone and makes a call, she is not required to enter her own zip code, area code, or other location identifier. None of the digits pressed reveal her own location. Cell site data is generated automatically by the network, conveyed to the provider not by human hands, but by invisible radio signal. Thus, unlike in Miller or Smith, where the information at issue was unquestionably conveyed by the defendant to a third party, a cell*122 phone user may well have no reason to suspect that her location was exposed to anyone. The assumption of risk theory espoused by Miller or Smith necessarily entails a knowing or voluntary act of disclosure; the Government has cited no case (and the court has found none) where unknowing, inadvertent disclosure of information by a defendant thereby precluded Fourth Amendment protection of that information.
In re Application of the United States for Historical Cell Site Data,
Nothing in the case law, however, supports the conclusion that any minor technical distinction between the dialing a phone number and the conveyance of cell-site-location records on a cell phone is constitutionally significant. See Smith,
As addressed below, however, the court concludes an exception to the third-party-disclosure doctrine should be applied to cumulative cell-site-location records.
E. Limitations of Third Party Disclosure Doctrine: Distinction Based upon Intrusiveness and Normative Privacy Concerns
The Supreme Court and lower appellate courts have recognized an exception to the third-party-disclosure doctrine in a subset of cases in which the content of the information communicated would be revealed through the Government’s surveillance (“content exception”). Courts have not been transparent about the foundation or contours of this content exception. Its origin, however, almost certainly lies in Ex parte Jackson,
The content exception was incorporated, by dicta, into Fourth Amendment telephonic communications case law in Smith,
Indeed, a law enforcement official could not even determine from the use of a pen register whether a communication existed. These devices do not hear sound. They disclose only the telephone numbers that have been dialed-a means of establishing communication. Neither the purport of any communication between the caller and the recipient of the call, their identities, nor whether the call was even completed is disclosed by pen registers.
Id. From these facts, the Court reasoned that, “given a pen register’s limited capabilities, therefore, petitioner’s argument that its installation and use constituted a search necessarily rests upon a claim that he had a legitimate expectation of privacy regarding the numbers he dialed on his phone.” Id. at 742,
The content exception preserves the reasonable expectation of privacy, and thus Fourth Amendment protection, for some information to which strict application of the Katz test and the third-party-disclosure doctrine would not permit. Carving this exception out of the Katz test is consistent with Supreme Court precedent, which has long recognized that the Katz test may fail to provide sufficient Fourth Amendment protections in some cases. See, e.g., Kyllo,
Situations can be imagined, of course, in which Katz’ two-pronged inquiry would provide an inadequate index of Fourth Amendment protection. For example, if the Government were suddenly to announce on nationwide television that all homes henceforth would be subject to warrantless entry, individuals thereafter might not in fact entertain any actual expectation or privacy regarding their homes, papers, and effects. Similarly, if a refugee from a totalitarian country, unaware of this Nation’s traditions, erroneously assumed that police were continuously monitoring his telephone conversations, a subjective expectation of privacy regarding the contents of his calls might be lacking as well. In such circumstances, where an individual’s subjective expectations had been “conditioned” by influences alien to well-recognized Fourth Amendment freedoms, those subjective expectations obviously could play no meaningful role in ascer*124 taming what the scope of Fourth Amendment protection was. In determining whether a “legitimate expectation of privacy” existed in such cases, a normative inquiry would be proper.
Recently, courts have applied the content exception to extend Fourth Amendment protection to new communication technologies such as email, text messaging, and internet search.
While each of these recent cases nominally applies the content exception, there is no meaningful Fourth Amendment distinction between content and other forms of information, the disclosure of which to the Government would be equally intrusive and reveal information society values as private. See Smith,
First, the case law supports applying an exception to the third-party-disclosure doctrine here because the information is disclosed to a service-provider intermediary, as it was in Smith, Warshak, Quon, and Forrester. Limiting the application of exceptions to the third-party-disclosure doctrine to cases involving disclosure to service-provider intermediaries is consistent with existing Fourth Amendment doctrine. Such a limited application would preserve the third-party-disclosure doctrine in typical cases where information is disclosed to third parties, such as consensual surveillance cases, See Smith,
F. Effects of Changing Technology on the Fourth Amendment
In order to prevent the Fourth Amendment from losing force in the face of changing technology, Fourth Amendment doctrine has evolved throughout time and must continue to do so. See, e.g., Kyllo,
The Supreme Court in Katz, after all, drastically changed existing Fourth Amendment doctrine in concluding that the phone booth user had a reasonable expectation of privacy over the contents of his conversation. Katz,
The fiction that the vast majority of the American population consents to warrant-less government access to the records of a significant share of their movements by “choosing” to carry a cell phone must be rejected. In light of drastic developments in technology, the Fourth Amendment doctrine must evolve to preserve cell-phone user’s reasonable expectation of privacy in cumulative cell-site-location records.
The Supreme Courts has warned that “[t]he judiciary risks error by elaborating too fully on the Fourth Amendment implications of emerging technology before its role in society has become clear.” Quon,
IV. CONCLUSION
While the government’s monitoring of our thoughts may be the archetypical Orwellian intrusion, the government’s surveillance of our movements over a considerable time period through new technologies, such as the collection of cell-site-location records, without the protections of the Fourth Amendment, puts our country far closer to Oceania than our Constitution permits. It is time that the courts begin to address whether revolutionary changes in technology require changes to existing Fourth Amendment doctrine. Here, the court concludes only that existing Fourth Amendment doctrine must be interpreted so as to afford constitutional protection to the cumulative cell-site-location records requested here. For the foregoing reasons the Government’s motion for orders pursuant to 18 U.S.C. § 2703(c)(1) and (d) is DENIED.
SO ORDERED.
Notes
. The Katz test and the third-party-disclosure doctrine apply to searches involving the home. See, e.g., Kyllo,
. Scholars have argued that courts, including the Supreme Court in Smith, weigh the level of intrusiveness of the search in order to determine if there is a reasonable expectation of privacy. See, e.g., Renée McDonald Hutch-ins, Tied Up in Knotts? GPS Technology and the Fourth Amendment, 55 UCLA L.Rev. 209, 430-44 (2007). Under this theory, the results in Smith and Katz can be explained by the fact that the disclosure of telephone numbers was not sufficiently intrusive to constitute a Fourth Amendment search, while the recording of the contents of a phone conversation in Katz was. This content exception, thus, represents one application of the broader intrusiveness analysis. Intrusiveness analysis, therefore, can be applied 'to extend the treatment afforded in the case law to content to other highly intrusive information, such as cell-site-location records.
. In Quon v. Arch Wireless Operating Co., Inc.,
.The only case in which the Court of Appeals for the Second Circuit has addressed the reasonable expectation of privacy in email is United States v. Lifshitz,
. The Warshak court distinguished email from the bank records in Miller on two grounds: (1) “Miller involved simple business records, as opposed to the potentially unlimited variety of 'confidential communications’ at issue here”; (2) “the bank depositor in Miller conveyed information to the bank so that the bank could put the information to use ‘in the ordinary course of business.' By contrast, [the email recipient] received his emails through [the service provider], [The service provider] was an intermediary, not the intended recipient of the emails.” Id. at 288.
. In an article addressing the application of the third-party-disclosure doctrine to internet communications, Orin Kerr, has argued that while
[t]he Supreme Court has never explicitly stated why the third-party doctrine should not apply in the [phone conversation interception scenario addressed in Katz ].... [T]he key point is that the third-party doctrine has not been extended to intermediaries that merely send and receive contents without needing to access or analyze those communications. Instead, courts have widely adopted the content/non-content line or a functional equivalent in cases applying the Fourth Amendment to communications networks.
Orin S. Kerr, Applying the Fourth Amendment to the Internet: A General Approach, 62 Stan. L.Rev. 1005, 1038 (2010) (emphasis added). While this analysis partially explains courts’ application of the third-party doctrine in cases in which information is received by intermediaries, the "without needing to access or analyze those communications” caveat appears too narrow to accommodate current case law and the realities of current technology. For example, would the third-party doctrine remove the reasonable expectation of privacy over the contents of emails sent on Gmail, or similar email providers,
. While it was not necessary to its holding, the Supreme Court in City of Ontario, California v. Quon, - U.S. -,
