Lead Opinion
On Petition to Transfer from the Indiana Court of Appeals, No. 15A01-1509-CR-1519
Cell phones—once figments of science fiction—now live in most Americans’ pockets and purses. These devices are double-edged swords, increasing convenience at the expense of privacy. Each time they make or receive calls, they leave a trail of digital crumbs known as historical cell-site location information (CSLI)—business records kept by service providers identifying which cell towers routed which communications. That CSLI is the focus of this case, which tests search-and-seizure protections under the Federal and Indiana Constitutions.
Here, in an effort to locate Marcus Zan-ders—an armed-robbery suspect at large—police asked his cell-phone service provider, Sprint, to provide historical CSLI. At Zanders’s trial, the State presented that CSLI, along with a detective’s explanatory testimony. Following his convictions on four robbery-related counts, Zanders appealed arguing that obtaining the CSLI violated his Federal and State Constitutional rights, and that the detective improperly testified as an expert witness. We disagree.
Under federal precedent, the Fourth Amendment does not require police to obtain a search warrant to gather information an individual has voluntarily relinquished to a third party. We hold that this rule,, .the “third-party doctrine,” applies here, so Zanders had no reasonable expectation of privacy in Sprint’s historical CSLI. And under Indiana precedent, Article 1, Section 11 .of our State Constitution does not prohibit police from taking reasonable actions—like obtaining minimally intrusive historical CSLI from a service
Facts and Procedural History
On the evening of January 31, 2015, a masked man walked into Whitey’s Liquor Store in Lawrenceburg and pointed a handgun at the cashier’s face. The gunman grabbed cash, Newport cigarettes, and two bottles of Patron Tequila before disappearing into the night.
Six days later, on February 6, a similar robbery happened at J & J Liquor Store in nearby Dillsboro. Around 9:00 p.m., J & J’s phone rang—someone with an Ohio number asking what time they closed. A half-hour later, a masked gunman barged in, took cash and 1800 Tequila, and sped off in a red Pontiac G6.
The next morning, police plugged that Ohio number into Facebook’s search engine and the top result was Marcus Zan-ders’s publicly accessible profile. That profile featured a flurry of multimedia posts from the day after each robbery. On the morning after the Whitey’s robbery, for example, Zanders posted a picture of a Patron bottle. And on the morning after the J & J robbery, Zanders posted several pictures of cash and a video tour of his Mother’s aрai-tment. The tour began with a bottle of 1800 Tequila in the kitchen and ended with a pile of cash in a bedroom.
Based on this Facebook information, Indiana police began to search for Zanders and asked Ohio police for assistance. At 1:57 p.m. the same day, an Indiana detective faxed a request to Zanders’s cell-service provider, Sprint, seeking historical CSLI business records identifying which cell towers handled Zanders’s calls for the past thirty days. But just two minutes later—at 1:59 p.m.—the search was over: Ohio officers located Zanders driving a red Pontiac in Cincinnati. They arrested him for diiving with a suspended license and found a cell phone in his pocket that had the Ohio number used to call J & J.
Indiana detectives promptly traveled to Ohio to interview Zanders. Zanders told them that his mother owned the red Pontiac G6, that he smoked Newport cigarettes and enjoyed Patron Tequila, and that he had his cell phone the entire day of February 6. When asked about some of his Face-book posts, Zanders claimed that the cash in the pictures was his mother’s rent money and his casino winnings. Zanders also said he had never been to Indiana and, after learning he was being accused of armed robbery, he terminated the interview.
Police then obtained and executed search warrants for Zanders’s mother’s and brother’s apartments. In the searches, police found luggage and a shoe box containing cash, clothing mаtching what the robber wore, a handgun, Newport cigarettes with an Indiana tax stamp, a box of Patron Tequila, and a bottle of 1800 Tequila with a price tag identical to those used by J & J.
The State charged Zanders with two counts of robbery with a deadly weapon and two counts of unlawful possession of a firearm by a serious violent felon. The State also filed a habitual offender enhancement.
At Zanders’s jury trial, Sprint’s historical CSLI was admitted into evidence over Zanders’s objection. The State also introduced testimony from Detective Carl Piec-zonka, who had analyzed the CSLI. Detective Pieczonka explained that Sprint collects CSLI when a cell phone makes or receives a call. He elaborated that Sprint identifies the particular towers, and even
The jury convicted Zanders on all four counts, and he pleaded guilty to the habitual offender charge. The court imposed an aggregate sentence of sixty-one years.
Zanders appealed, arguing that (1) the trial court abused its discretion in denying his motion for mistrial based on a witness’s improper in-court identification, (2) police obtained the CSLI in violation of his federal and Indiana constitutional rights, and (3) Detective Pieczonka improperly testified about the CSLI as an expert witness.
A split panel of the Court of Appeals reversed. Zanders v. State,
We granted the State’s petition to transfer, thereby vacating the Court of Appeals opinion. Ind. Appellate Rule 58(A).
Standard of Review
Zanders’s first argument—that obtaining this historical CSLI without a warrant violated both the Federal and Indiana Constitutions—raises questions of law we review de novo. McIlquham v. State,
Discussion and Decision
I. Police Did Not Violate the Federal or Indiana Constitutions by Gathering Historical Active Cell-Site Location Information without a Warrant.
Zanders argues that police violated his Fourth Amendment and Article 1, Section 11 rights by obtaining historical CSLI from Sprint without a search warrant. The State counters that neither Constitution required a warrant under these circumstances. Specifically, it argues that the Fourth Amendment allowed police to ask a third party for information Zanders had
We begin by providing some background about CSLI. In general, cell-service providers gather two types of CSLI: network-based (from the towers handling the phone’s calls) and handset-based (from the phone itself). Zachary Ross, Note, Bridging the Cellular Divide: A Search for Consensus Regarding Law Enforcement Access to Historical Cell Data, 35 Cardozo L. Rev. 1185, 1193-94 (2014). These sources provide different kinds of location data, but neither reveals the content of communications. See id. at 1192-94.
The first type of CSLI—network-based—may take several different forms. R. Craig Curtis et al., Using Technology the Fоunders Never Dreamed of: Cell Phones as Tracking Devices and the Fourth Amendment, 4 U. Denv. Crim. L. Rev. 61, 63 (2014). For example, it may be either historical or real-time—historical when it shows past tower locations, and real-time when it shows current tower locations. Jonathan Bard, Note, Unpacking the Dirtbox: Confronting Cell Phone Location Tracking with the Fourth Amendment, 57 B.C. L. Rev. 731, 746 (2016). It may also be either active-or passive. Active CSLI logs tower locations when calls or texts are sent or received, while passive CSLI logs tower locations as the phone connects with them automatically every few seconds. Ross, supra, at 1191. Network-based CSLI may also be enhanced or manufactured through methods like “triangulation” and “pinging.” Triangulation is when service providers use multiple towers to calculate a phone’s location. Id. at 1194-95. And pinging is when providers affirmatively send signals to a phone in real-time, instead of waiting for the phone to make or receive a call. Cal Cumpstone, Note, Game of Phones: The Fourth Amendment Implications of Real-Time Cell Phone Tracking, 65 Clev. St. L. Rev. 77, 86 (2016).
By contrast, handset-based CSLI (also known as GPS data) tends to be more accurate because it uses satellites to locate the phone itself. Ross, supra, at 1192-93. This CSLI can typically pinpoint the phone’s location within thirty-three feet. Id. at 1193.
This case involves only historical, active, network-based CSLI—revealing only the towers that routed Zanders’s calls, not the content of his communications or any high-resolution location data. We leave other types of data—GPS, pinging, triangulation, passive, real-time, and so on—for another day. With that limited scope in mind, we turn first to the Fourth Amendment.
A. No “search” occurred under the Fourth Amendment when police gathered historical active CSLI that Zan-ders had already voluntarily relinquished to Sprint.
The Fourth Amendment guarantees the “right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.... ” U.S. Const, amend. IV. But not every police action is a “search.” A “search,” according to the United States Supreme Court, occurs only when the government either (1) commits “common-law trespass” or (2) violatеs a “reasonable expectation of privacy.” United States v. Jones,
1. The third-party doctrine is well-settled United States Supreme Court precedent, and most federal circuits addressing the issue apply the doctrine to CSLI.
En route to our conclusion that this was not a “search,” we look first to" the two seminal United States Supreme Court cases applying the third-party doctrine to business documents: United States v. Miller,
The same logic held sway three years later in Smith.
Phone technology, of course, has exploded in the decades since Smith, and the United States Supreme Court has not yet clarified whether the third-party doctrine applies to historical CSLI.
The four circuits applying the third-party doctrine—the Fourth, Fifth, Sixth, and Eleventh—reason that cell-phone users generally know that their phones must connect with towers to make and receive calls, and that service providers archive those connections for billing purposes. See United States v. Graham,
The minority position—including the Third Circuit and dissenting judges from other circuits—offers three main reasons why the third-party doctrine should not apply to historical CSLI. The position first asserts that cell users are likely unaware that historical CSLI is collected, so they cannot voluntarily share it “in any meaningful way.” In re Application of U.S. for an Order Directing a Provider of Elec. Commc’n Serv. to Disclose Records to the Gov’t,
Though we appreciate both sides of that federal split, we align with the majority position and apply the third-party doctrine to this particular request for historical active CSLI, finding that Zanders conveyed it to Sprint voluntarily. Like the telephone user in Smith and the bank customer in Miller, cell users like Zanders are presumed to know certain publicly available facts. We note two of them.
First, cell phones run on signals. Why do calls drop in parking garages and tunnels? Because the phone works only by transmitting signals to towers. See Ross, supra, at 1194. Certainly, users do not generally stop to ponder the science behind cellular-signal transmission, but they do know that calls and texts are well-nigh impossible without “bars.” In re Application of U.S. for Historical Cell Site Data,
And second, service providers keep track of those signals. Howard W. Cox, StingRay Technology and Reasonable Expectations of Privacy in thе Internet of Everything, 17 Federalist Soc’y Rev. 29, 30 n.27 (2016). How do service providers know how much to bill or which towers are overworked? In part by keeping business records detailing which towers handle which calls. Id. Thus, like the landline user in Smith, Zanders must know that by making and receiving calls he is “exposing his phone’s location] to [Sprint’s] equipment in the ordinary course of business.”
Zanders also asserts that cell phones have become a modern-day necessity and so making and receiving calls is not really a “choice.” But the dissenting justices in Miller and Smith made a virtually identical point—and it failed to garner a majority in either decision. Justice Brennan dissented in Miller because disclosing “financial affairs to a bank is not entirely volitional, sincе it is impossible to participate in the economic life of contemporary society without maintaining a bank account.”
B. Article 1, Section 11 likewise did not demand a search warrant for police to obtain this historical CSLI.
The Fourth Amendment is not the last stop in our search-and-seizure analysis. Zanders also raises the Indiana Constitution’s Article 1, Section 11
1. Because Article 1, Section 11 looks to the totality of the circumstances, it does not require the third-party doctrine.
Under Section 11, the State bears the burden of showing that police conduct was “reasonable under the totality of the circumstances.” Id. at 1001-02. This inquiry balances three factors: "1) the degree of concern, suspicion, or knowledge that a violation has occurred, 2) the degree of intrusion the method of the search or seizure imposes on the citizen’s ordinary activities, and 3) the extent of law enforcement needs.” Litсhfield v. State,
Indeed, that unique vitality comes into sharp focus here—as we hold that the third-party doctrine plays no part in our State’s search-and-seizure jurisprudence. The third-party doctrine is a creature of federal precedent, growing out of the exclusively federal reasonable-expectation-of-privacy test. See Smith,
And Indiana is hardly alone in this deсision. A growing number of states have declined to import the third-party doctrine into their state constitutional search-and-seizure protections. See People v. Blair,
So, when Hoosiers give information to third parties—like AT&T, Google, YouTube, and Facebook—this Court turns to our faithful stand-by: the Litchfield test.
2. Under Litchfield, police acted reasonably when they obtained minimally intrusive CSLI in order to prevent an armed-robbery suspect from striking again.
Though this Court has not yet applied Litchfield to CSLI, our Court of Appeals has—finding no violation. McCowan v.
Here, as in McCowan, all three Litch-field factors favor upholding the search:
First, the level of suspicion was high. When police searched Facebook for the phone number that called J & J Liquor Store, Zanders’s profile popped up, featuring a video and pictures of tequila and cash.
Next, as Zanders admits, the level of intrusion was low because police obtained the same information as in McCowan— historical CSLI. Certainly, other types of CSLI can paint an intimate picture of one’s life. GPS data and triangulated CSLI, for example, can pinpoint a phone’s location at any time. And passive-use CSLI is generated every few- seconds automatically. But the historical CSLI admitted at Zanders’s trial' was much less sophisticated. It did not locate Zanders, but only the cell towers that connected his calls. And it was not generated automatically, but only when Zanders made or received those calls.
And finally, law enforcement needs, though not as exigent as in McCowan’s missing-person search, were still urgent-preventing an armed-robbery suspect from striking again. See Masterson v. State,
We turn now to Zanders’s final argument—challenging Detective Pieczonka’s testimony about the CSLI.
II. Detective Pieczonka Explained the CSLI Evidence for the Jury Based on His Specialized Training, Giving Proper Skilled-Witness Testimony.
Zanders asserts that the trial court abused its discretion in allowing Detective Pieczonka to give expert testimony about the CSLI. The State attacks Zanders’s premise, arguing that Detective Pieczonka was not testifying as an expert, but rather as a skilled witness—and that he properly used personal knowledge to interpret Sprint’s computer-generated cell records. For the reasons explained below, we agree with the State.
In Indiana, knowledge beyond that of the average juror can qualify a witness as either an expert or a skilled witness. An expert witness, according to Indiana Evidence Rule 702(a), is one who is qualified “by knowledge, skill, experience, training, or education” to give opinions about a situation without necessarily having personal knowledge. A skilled witness, by contrast, is a person with “a degree of knowledge short of that sufficient to be declared an expert under [Indiana Evidence] Rule 702, but somewhat beyond that possessed by the ordinary jurors.” Kubsch v. State,
With respect to CSLI testimony specifically, our Court of Appeals has held that a police detective trained in cell-phone technology may explain CSLI to the jury as a skilled witness. See McCowan,
The same is true here. Like the detective in McCowan, Detective Pieczonka testified about CSLI not as an expert, but as a skilled witness, summarizing and presenting Sprint’s records for the jury. Detective Pieczonka based that summary on specialized training—consisting of several classes on cell towers, a forty-hour course with the National White Collar Crime Center, and certification as a mobile examiner.
The trial court thus did not abuse its discretion in allowing Detective Pieczonka to give skilled witness testimony.
Conclusion
Few cell-phone users are experts in cellular-signal transmission. But at even the most basic level of understanding, users know they cannot make or receive calls without transmitting signals to towers. Accordingly, the third-party doctrine compels that asking a provider for a user’s historical CSLI is not a Fourth Amendment “search.” And Article 1, Section 11 did not demand a warrant in this case because under Litchfield, the high suspicion, low intrusion, and moderately high law-enforcement needs justified the request given the totality of the circumstances. Finally, explaining the CSLI to the jury required only a skilled witness, not an expert. We therefore affirm Zan-ders’s convictions.
Rucker, J., concurs.
Notes
. We summarily affirm the Court of Appeals on the in-court identification issue. App. R. 58(A)(2).
. The United States Supreme Court is currently considering two petitions for certiorari on this issue. United States v. Carpenter,
. Even in circuits that have not yet weighed in, district courts have. In the Seventh, Eighth, Tenth, and District of Columbia Circuits, district courts have applied the third-party doctrine to CSLI. See United States v. Wheeler,
In the Second and Ninth Circuits, district courts have split. Compare United States v. Serrano, No. 13 CR. 58 KBF,
. True, cell-phone users might not voluntarily convey the "passive” CSLI that results from a phone’s automatic registration process, but the CSLI admitted at Zanders’s trial was active, not passive. Detective Pieczonka testified only about CSLI corresponding with made or received calls. And each data point in the CSLI exhibit corresponded with phone numbers.
. Though Zаnders did not specifically mention Section 11 at trial, the State does not claim waiver. And regardless, we find none— since the State extensively argued Section 11 at trial and the trial court expressly based its decision on a Section 11 case. See McDowell v. State,
, Police suspected Zanders had also committed two robberies in Kentucky.
Concurrence Opinion
concurring in part, dissenting in part.
I agree with the majority that therе is no Fourth Amendment violation and that the detective gave proper skilled-witness testimony. I further agree that Zanders’ Article 1, Section 11 argument is not waived for appellate review. However, I write separately because I disagree with the majority’s Article 1, Section 11 analysis. I would find that Zanders’ Article 1, Section 11 rights were violated.
As the majority observes, under Section 11, the State bears the burden of showing that police conduct was reasonable under the totality of circumstances. In assessing whether the State met this burden, we balance: “1) the degree of concern, suspicion, or knowledge that a violation has occurred, 2) the degree of intrusion the method of the search or seizure imposes on a citizen’s ordinary activities, and 3) the extent of law enforcement needs.” Litchfield,
The majority cities McCowan v. State,
I appreciate that the majority acknowledges that had police obtained more sophisticated cell phone records, the level of intrusion would be “higher,” but I feel that even given the limited CSLI requested here, the intrusion is high because it allows police to track the movements of private citizens who are using their phones, likely unbeknownst to them.
I am also troubled with the majority’s conclusion that law enforcement needs here were so high that the police could not obtain a warrant. As the majority observes, this is not the case where there is a missing person оr obvious exigency. Instead, we have an armed robber who has fled the State. Police had at least some information about Zanders and where he may be living. I wonder why instead of completing and faxing a request to obtain the phone records, police did not do the legwork necessary to secure a warrant. In today’s world, search warrants can be requested and, where warranted, obtained within minutes, not hours or days.
The majority cites Masterson v. State,
In sum, I believe that while here the suspicion may have been high, the intrusion was also high and the extent of law enforcement needs was low, given that police could have and should have obtained a warrant. Accordingly, I would find that the search violated Zanders’ Article 1, Section 11 rights.
