Lead Opinion
Affirmed by published opinion. Judge MOTZ wrote the majority opinion, in which Chief Judge TRAXLER and Judges WILKINSON, NIEMEYER, KING, GREGORY, SHEDD, DUNCAN, AGEE, KEENAN, DIAZ and HARRIS joined. Judge WILKINSON wrote a separate concurring opinion. Judge WYNN wrote a dissenting opinion in which Judges FLOYD and THACKER joined.
ON REHEARING EN BANC
In United States v. Graham,
A majority of the panel held that, although the Government acted in good faith in doing so, it had violated Defendants’ Fourth Amendment rights when it obtained the CSLI without a warrant. The majority directed that henceforth the Government must secure a warrant supported by probable cause before obtaining these records from cell phone providers. The Government moved for rehearing en banc, which we granted, vacating the panel opinion. See United States v. Graham,
The Supreme Court may in the future limit, or even eliminate, the third-party doctrine. Congress may act to require a warrant for CSLI. But without a change in controlling law, we cannot conclude that the Government violated the Fourth Amendment in this case.
I.
The Fourth Amendment ensures that “[t]he right of the people to be secure in their persons, houses, papers, and effects,- against unreasonable searches and seizures, shall not be violated.” U.S. Const, amend. IV. Broadly, “a Fourth Amendment search occurs when the government violates a subjective expectation of privacy that society recognizes as reasonable.” Kyllo v. United States,
In assessing whether such a search has occurred, “it is important to begin by specifying precisely the nature of the state activity that is challenged.” Smith,
Moreover, to obtain the CSLI from Sprint/Nextel, the Government had to apply to a federal court for an order directing the company to disclose the records. The Stored Communications Act (SCA or the Act) provides that, to gain access to even these non-content records, the Government must demonstrate either probable cause for a warrant or “specific and articu-lable facts showing that there are reasonable grounds to believe that ... the records ... are relevant and material to an ongoing criminal investigation” for a court order. 18 U.S.C. § 2703(c), (d) (2012). The Government followed the second route and Defendants do not contend that in doing so it failed to meet the requirements of the Act. What Defendants do contend is that in permitting the Government to obtain the Sprint/Nextel records in this way, the Act violates the Fourth Amendment. According to Defendants, the statute permits the Government to unconstitutionally collect their private information.
This argument ignores the nature of the governmental activity here, which critically distinguishes this case from those in which the government did unconstitutionally collect private information. In United States v. Karo,
On the basis of these cases, Defendants contend that the government always invades an individual’s reasonable expectation of privacy when it employs technological devices to track an individual’s moves. Perhaps so. But that question is not before us. No government tracking is at issue here. Rather, the question before us is whether the government invades an individual’s reasonable expectation of privacy when it obtains, from a third party, the third party’s records, which permit the government to deduce location information. Karo, Kyllo, and Jones, all of which involve direct government surveillance activity, tell us nothing about the answer to that question.
Applying the third-party doctrine to the facts of this case, we hold that Defendants did not have a reasonable expectation of privacy in the historical CSLI. The Supreme Court’s reasoning in Smith controls. There, the defendant challenged the government’s use of a pen register — a device that could record the outgoing phone numbers dialed from his home telephone. Id. at 737,
Here, as in Smith, Defendants unquestionably “exposed” the information at issue to the phone company’s “equipment in the ordinary course of business.” Id. Each time Defendants made or received a call, or sent or received a text message — activities well within the “ordinary course” of cell phone ownership — Sprint/Nextel generated a record of the cell towers used. The CSLI that Sprint/Nextel recorded was necessary to route Defendants’ cell phone calls and texts, just as the dialed numbers recorded by the pen register in Smith were necessary to route the defendant’s landline calls. Having “exposed” the CSLI to Sprint/Nextel, Defendants here, like the defendant in Smith, “assumed the risk”
This holding accords with that of every other federal appellate court that has considered the Fourth Amendment question before us. Not one has adopted the Defendants’ theory.
Three of our sister courts have expressly held, as we do today, that individuals do not have- a reasonable expectation of privacy in historical CSLI records that the government obtains from cell phone service providers through a § 2703(d) order. See United States v. Carpenter,
Moreover, even in the absence of binding circuit precedent, the vast majority of federal district court judges have reached the same conclusion.
II.
Despite the lack of support for their position, Defendants insist that the third-party doctrine does not apply here. They argue that “[a] cell phone user does not even possess the CSLI to voluntarily convey,” and that even assuming users do convey such information, “revealing this information is compelled, not voluntary.”
A.
Defendants maintain that cell phone users do not convey CSLI to phone providers, voluntarily or otherwise. We reject ■ that contention. With respect to the nature of CSLI, there can be little question that cell phone users “convey” CSLI to their service providers. After all, if they do not, then who does?
Perhaps Defendants believe that because a service provider generates a record of CSLI, the provider just conveys CSLI to itself. But before the provider can create such a record, it must receive information indicating that a cell phone user is relying on a particular cell tower. The provider only receives that information when a cell phone user’s phone exchanges signals with the nearest available cell tower. A cell phone user therefore “conveys” the location of the cell towers his phone connects with to his provider whenever he uses the provider’s network.
Logic compels this conclusion. When an individual purchases a cell phone and chooses a service provider, he expects the provider will, at a minimum, route outgoing and incoming calls and text messages. As most cell phone users know all too well, proximity to a cell tower is necessary to complete these tasks. Anyone who has stepped outside to “get a signal,” or has warned a caller of a potential loss of service before entering an elevator, understands, on some level, that location matters. See In re Application (Fifth Circuit),
A cell phone user voluntarily enters an arrangement with his service provider in which he knows that he must maintain proximity to the provider’s cell towers in order for his phone to function. See Carpenter,
To be sure, some cell phone users may not recognize, in the moment, that they are “conveying” CSLI to their service provider. See In re Application (Third Circuit),
Thus, this would be a different case if SprinVNextel had misused its access to Defendants’ phones and secretly recorded, at the Government’s behest, information unnecessary to the provision of cell service. Defendants did not assume that risk when they made calls or sent messages. But like the defendant in Smith,
B.
In their efforts to avoid the third-party doctrine, Defendants attempt to redefine it. They maintain that the third-party doctrine does not apply to historical CSLI because a cell phone user does not “actively ehoose[ ] to share” his location information. Defendants’ Br. at 30. Such a rule is nowhere to be found in either Miller or Smith. Moreover, this purported requirement cannot be squared with the myriad of federal cases that permit the government to acquire third-party records, even when individuals do not “actively choose to share” the information contained in those records.
For example, courts have attached no constitutional significance to the distinction between records of incoming versus outgoing phone calls. The technology the police used in Smith — a pen register — recorded only the numbers dialed by a suspect’s phone. It did not (and could not) record any information about incoming calls. To capture that information, police routinely use a “trap and trace” device. If Defendants were correct that the third-party doctrine applies just when an individual “actively chooses to share” information, then any effort to acquire records of incoming phone calls would constitute a search protected by the Fourth Amendment. After all, the phone customer never “actively chooses to share” with the phone company the numbers from incoming telephone calls. Only the user on the other end of the line, who actually dials the numbers, does so.
But federal courts have not required a warrant supported by probable cause to obtain such information. Rather, they routinely permit the government to install “trap and trace” devices without demonstrating probable cause. See, e.g., United States v. Reed,
Moreover, outside the «context of phone records, we have held that third-party information relating to the sending and routing of electronic communications does not receive Fourth Amendment protection. United States v. Bynum,
Similarly, the Ninth Circuit has held that “e-mail and Internet users have no expectation of privacy in ... the IP addresses of the websites they visit.” United States v. Forrester,
Of course, computer users do “actively choose to share” some of the information discussed in the above cases, like the “to” address in an email and the subscriber information conveyed when signing up for Internet service. But users do not “actively choose to share” other pieces of information, like an IP address or the amount of data transmitted to their account. Internet service providers automatically generate that information. See Christie,
C.
In another attempt to avoid the third-party doctrine, Defendants rely on a factual argument long rejected by the Supreme Court and a series of cases involving the content of communications to support their assertion that historical CSLI is protected by the Fourth Amendment.
First, Defendants emphasize that cell phone use is so ubiquitous in our society today that individuals must risk producing CSLI or “opt out of modern society.” Defendants’ En Banc Br. at 11. Defendants
But the dissenting justices in Miller and Smith unsuccessfully advanced nearly identical concerns. Dissenting in Miller, Justice Brennan contended that “the disclosure by individuals or business firms of their financial affairs to a bank is not entirely volitional, since it is impossible to participate in the economic life of contemporary society without maintaining a bank account.”
Second, Defendants rely on cases that afford Fourth Amendment protection to the content of communications to suggest that CSLI warrants the same protection. See Ex parte Jackson,
The Supreme Court has thus forged a clear distinction between the contents of communications and the non-content information that enables communications providers to transmit the content.
Defendants disagree with this conclusion. They contend that CSLI should be treated “as content” because it “reeord[s] a
Defendants’ attempts to blur this clear distinction
III.
Technology has enabled cell phone companies, like Sprint/Nextel, to collect a vast amount of information about their customers. The quantity of data at issue in this case — seven months’ worth of cell phone records, spanning nearly 30,000 calls and texts for each defendant — unquestionably implicates weighty privacy interests.
Outrage at the amount of information the Government obtained, rather than concern for any legal principle, seems to be at the heart of Defendants’ arguments. Thus they repeatedly emphasize the amount of CSLI obtained here and rely on authority suggesting that the government can obtain a limited amount of CSLI without a warrant. In response, the panel majority expressly held that the government can acquire some amount of CSLI “before its inspection rises to the level of a Fourth
Defendants’ answer appears to rest on a misunderstanding of the analysis embraced in the two concurring opinions in Jones. There, the concurring justices recognized a line between “short-term monitoring of a person’s movements on public streets,” which would not infringe a reasonable expectation of privacy, and “longer term GPS monitoring,” which would. Jones,
In considering the legality of the government surveillance at issue in Jones, Justice Alito looked to what a hypothetical law enforcement officer, engaged in visual surveillance, could reasonably have learned about the defendant. He concluded that four weeks of GPS monitoring by the government constituted a Fourth Amendment “search” because “society’s expectation” had always been “that law enforcement agents and others would not — and indeed, in the main, simply could not — secretly monitor and catalogue” an individual’s movements in public for very long. Id. at 964 (Alito, J., concurring in the judgment) (emphasis added). In other words, direct surveillance by the government using technological means may, at some point, be limited by the government’s capacity to accomplish such surveillance by physical means.
However, society has no analogous expectations about the capacity of third parties to maintain business records. Indeed, we expect that our banks, doctors, credit card companies, and countless other third parties will record and keep information about our relationships with them, and will do so for the entirety of those relationships — be it several weeks or many years. Third parties can even retain their records about us after our relationships with them end; it is their prerogative, and many business-related reasons exist for doing so. This is true even when, in the aggregate, these records reveal sensitive information similar to what could be revealed by direct surveillance. For this reason, Justice Ali-to’s concern in Jones is simply inapposite to the third-party doctrine and to the instant case.
Here, Defendants voluntarily disclosed all the CSLI at issue to Sprint/Nextel. And the very act of disclosure negated any reasonable expectation of privacy, regardless of how frequently that disclosure occurred or how long the third party
We recognize the appeal — if we were writing on a clean slate — in holding that individuals always have a reasonable expectation of privacy in large quantities of location information, even if they have shared that information with a phone company. But the third-party doctrine does not afford us that option. Intrinsic to the doctrine is an assumption that the quantity of information an individual shares with a third party does not affect whether that individual has a reasonable expectation of privacy.
Although third parties have access to much more information now than they did when the Supreme Court decided Smith, the Court was certainly then aware of the privacy implications of the third-party doctrine. Justice Stewart warned the Smith majority that “broadcast[ing] to the world a list of the local or long distance numbers” a person has called could “reveal the most intimate details of [that] person’s life.” Smith,
Of course, in the face of rapidly advancing technology, courts must “assure!] preservation of that degree of privacy against government that existed when the Fourth Amendment was adopted.” Kyllo,
Moreover, application of the third-party doctrine does not render privacy an unavoidable casualty of technological progress' — Congress remains free to require greater privacy protection if it believes that desirable. The legislative branch is far better positioned to respond to changes in technology than are the courts. See Jones,
The very statute at issue here, the Stored Communications Act (SCA), demonstrates that Congress can — and does— make these judgments. The SCA requires the government to meet a higher burden when acquiring “the contents of a wire or electronic communication” from “a provider of electronic communication service” than when obtaining “a record ... pertaining to a subscriber ... or customer” from the provider. 18 U.S.C. § 2703(a), (c) (emphasis added). It requires the executive to obtain judicial approval, as the Government did here, before acquiring even non-content information. Id. § 2703(c), (d). And the SCA is part of a broader statute, the Electronic Communications Privacy Act of 1986 (ECPA), which Congress enacted in the wake of Smith. See Pub. L. No. 99-508, 100 Stat. 1848. In the ECPA, Congress responded directly to the holding in Smith by requiring the government to obtain a court order (albeit not one supported by probable cause) before installing a pen register or “trap and trace” device. See 18 U.S.C. § 3121(a) (2012). Although Congress could undoubtedly do more, it has not been asleep at the switch.
Ultimately, of course, the Supreme Court may decide to revisit the third-party doctrine. Justice Sotomayor has suggested that the doctrine is “ill suited to the digital age, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks.” Jones,
The landscape would be different “if our Fourth Amendment jurisprudence cease[d] to treat secrecy as a prerequisite for privacy.” Id. But unless and until the Supreme Court so holds, we are bound by the contours of the third-party doctrine as articulated by the Court. See, e.g., Agostini v. Felton,
IV.
For the reasons set forth above, we affirm in all respects the judgment of the district court.
AFFIRMED
Notes
. We reinstate the affirmance of Defendants’ convictions and sentences and adopt the panel opinion with respect to all issues not addressed in this opinion. We note that, after en banc oral argument, Defendants moved to file supplemental briefing on a new claim, based on Johnson v. United States, - U.S. -,
. As the Sixth Circuit explained, “[c]arriers necessarily track their customers' phones across different cell-site sectors to connect and maintain their customers' calls," and keep CSLI records "to find weak spots in their network and to determine whether roaming charges apply, among other purposes.” United States v. Carpenter,
. Contrary to Defendants’ suggestion, and unlike the information in Karo and Jones, the CSLI obtained here does not enable the government to "place an individual" at home or at other private locations. The historical CSLI at issue here does not provide location information anywhere near that specific. Rather, the record evidence establishes that each of the cell sites at issue here covers an area with a radius of up to two miles, and each data point of CSLI corresponds to a roughly 120-degree sector of a cell site's coverage area. That means the CSLI could only determine the four-square-mile area within which a person used his cell phone. Although we do not think the applicability of the Fourth Amendment hinges on the precision of CSLI, it is premature to equate CSLI with the surveillance information obtained in Karo and Jones.
.Like these instances of government surveillance, when the government uses cell-site simulators (often called "stingrays”) to direct
. Defendants argue that "[t]he government, not the cellular service providers, surveilled [them].” Defendants' En Banc Br. at 7. This is assertedly so because (1) the Communications Assistance For Law Enforcement Act, 47 U.S.C. § 1002 (2012) (CALEA), requires service providers to have the capacity to allow law enforcement to access CSLI, and (2) service providers use CSLI in the aggregate, while law enforcement analyzes individuals' CSLI to infer their location. Neither argument is sound. Miller involved a federal statute that similarly required a service provider (there, a bank) to create and maintain customer records, and the Supreme Court expressly held that the statute did not affect the applicability of the third-party doctrine. See Miller,
. See, e.g., United States v. Wheeler, No. 15-216, - F.Supp.3d -, -,
. Three of the state cases interpret broader state constitutional protections than the Fourth Amendment. See Commonwealth v. Augustine,
. Defendants also emphasize the "highly private” nature of location information. Defendants’ En Banc Br. at'13. But to the extent they do so to argue that the third-party doctrine does not apply to CSLI, they are mistaken. The third-party doctrine clearly covers information that is also considered "highly private,” like financial records, Miller,
. If it were otherwise, courts would frequently need to parse business records for indicia of what an individual knew he conveyed to a third party. For example, when a person hands his credit card to the cashier at a grocery store, he may not pause to consider that he is also “conveying" to his credit card company the date and time of his purchase or the store's street address. But he would hardly be able to use that as an excuse to claim an expectation of privacy if those pieces of information appear in the credit card company's resulting records of the transaction. Cf. United States v. Phibbs,
Our dissenting colleagues similarly argue that the third-party doctrine requires specific “knowledge” on the part of the phone user about what information is being conveyed at the time. Because phone users usually do not "know[]” their own CSLI, the dissent argues, they cannot convey it. But the dissent cannot have it both ways: Accepting its premise as true for purposes of argument, we fail to see how a phone user could have a reasonable expectation of privacy in something he does not know. Indeed, the dissent rightly questions "whether anyone could credibly assert the infringement of a legitimate expectation of
. Our dissenting colleagues posit that perhaps records of incoming calls have just not been challenged in court. They have been. See, e.g., In re Application of F.B.I., No. BR 14-01,
. Nor has this court ever suggested that other information typically contained in phone records — the date, time, and duration of each call, for example — merits constitutional protection. Yet a phone customer never "actively chooses to share” this information either. Rather, this information is passively generated and recorded by the phone company without overt intervention that might be detected by the target user. If individuals "voluntarily convey,” all of this information to their phone companies, we see no basis for drawing the line at the CSLI at issue here. We note that this case deals with only 2010- and 2011-era historical CSLI, generated by texts and phone calls made and received by a cell phone.
. In addition to being firmly grounded in the case law, the contenl/non-content distinction makes good doctrinal sense. The intended recipient of the content of communication is not the third party who transmits it, but the person called, written, emailed, or texted. The routing and addressing information, by contrast, is intended for the third parties who facilitate such transmissions.
. Related concerns about a general "erosion of privacy” with respect to cell phones rest on a similar misapprehension of this distinction. These concerns revolve around protecting the large quantity of information stored on modem cell phones and on remote servers like the "cloud.” See, e.g., Davis,
. The lack of a bright line between permissible and impermissible amounts of CSLI also stands at odds with the Supreme Court’s "general preference to provide clear guidance to law enforcement through categorical rules.” Riley v. California, - U.S. -,
. We note, though, that such a rule would be unprecedented in rendering unconstitutional — because of some later action — conduct that was undoubtedly constitutional at the time it was undertaken. See United States v. Sparks,
. For example, the Smith Court noted that, because a phone user who "had placed his calls through an operator ... could claim no legitimate expectation of privacy” in routing information exposed to that operator, "a different constitutional result” did not follow simply "because the telephone company has decided to automate.” Smith,
. Indeed, Congress has been actively considering changes to the ECPA in recent years based on advances in technology. See Jared P. Cole & Richard M. Thompson II, Congressional Research Service, Stored Communications Act: Reform of the Electronic Communications Privacy Act (ECPA), 8-10 (2015) (describing various proposed congressional amendments to the ECPA); Scott A. Fraser, Making Sense of New Technologies and Old Law: A New Proposal for Historical Cell-Site Location Jurisprudence, 52 Santa Clara L. Rev. 572, 576 (2012) (describing congressional fact-finding hearings on possible changes to the SCA). And some state legislatures have recently enacted warrant requirements for state agencies acquiring historical CSLI. See, e.g,, Utah Code Ann. § 77-23c-102 (West 2015), amended by 2016 Utah Laws H.B. 369; N.H. Rev. Stat. Ann. § 644-A:2-A:3 (West 2015). Legislatures manifestly can and are responding to changes in the intersection of privacy and technology.
Concurrence Opinion
concurring:
I am pleased to concur in Judge Motz’s fine opinion. The court rightly holds that obtaining historical cell site location information (CSLI) from a third party cell phone provider is not a search under the Fourth Amendment. Any result to the contrary would be at odds with the Supreme Court and decisions from our sister circuits. I write separately to emphasize my concern that requiring probable cause and a warrant in circumstances such as these needlessly supplants the considered efforts of Congress with an ill-considered standard of our own.
Appellants appear to think that the Framers drafted the Constitution with the judiciary alone in mind. I do not deny that the judiciary has an important, indeed critical, role to play in interpreting the Fourth Amendment. But I fear that by effectively rewriting portions of a federal statute under the guise of reasonableness review courts run the risk of boxing the democratic branches out of the constitutional dialogue. For good reason, developing constitutional meaning has always been a collaborative enterprise among the three departments of government. The present case offers a perfect example of why that is so.
I.
In enacting Title II of the Electronic Communications Privacy Act of 1986, popularly known as the Stored Communications Act (SCA), 18 U.S.C. § 2701 et seq., Congress did not behave in a flippant or haphazard fashion. Instead, it crafted a thorough statutory framework limiting the government’s ability to gather wire and electronic communication data from communications service providers (here, Sprint/Nextel). The SCA’s “comprehensive remedial scheme,” Kelley v. Fed. Bureau of Investigation,
At the heart of the SCA lies § 2703. That provision establishes a calibrated set of procedural safeguards based on the type and amount of information sought and the length of time the records are stored. For instance, “only pursuant to a warrant,” 18 U.S.C. § 2703(a), can the government obtain the contents of a communication that is in electronic storage with a service provider for 180 days or less. Alternatively, the government has a number of options for compelling the disclosure of non-content customer records, or the contents of communications in electronic storage for more than 180 days: “obtainf ] a warrant,” id. §§ 2703(b)(1)(A), (c)(1)(A), “use[] an administrative subpoena ... or trial subpoena,” id. § 2703(b)(l)(B)(i), or “obtain[ ] a court order.” Id. §§ 2703(b)(1)(B)(ii), (c)(1)(B).
I see no reason to depart from Congress’s' carefully tailored scheme. As the majority points out, the SCA in fact exceeds the constitutional floor established by the Supreme Court, whose decisions hold that the Fourth Amendment does not apply to information voluntarily conveyed to third parties. Ante at 426-27; see, e.g., Smith v. Maryland,
II.
It has long been the case that developing constitutional meaning is not a responsibility that rests solely on the shoulders of the judiciary. It has instead been “a power and duty shared by all three branches', and its shared nature suggests that it ought not be fulfilled by each branch acting independently within its sphere of authority.” Dawn E. Johnsen, Functional Departmen-talism and Nonjudicial Interpretation: Who Determines Constitutional Meaning?, 67 Law & Contemp. Probs. 105,121 (2004). Formulation of constitutional guidance, in other words, is a collaborative enterprise, “with each branch encouraged to recognize its own institutional limitations and to respect the superior competencies of the others.” Id. at 120.
This principle applies with special force where Congress has weighed in on the Fourth Amendment’s requirement of “reasonableness.” That term, of course, “is not capable of precise definition or mechanical application.” Bell v. Wolfish,
In this setting, Congress brings several cards to the table. First, it enjoys a relatively greater degree of access than courts to expert opinion generally and to the expertise of the executive branch in particular. Trial courts, of course, hear expert testimony all the time, but they are to a considerable extent at the mercy of the parties whose witnesses may be called to serve a narrow set of interests rather than the interests of the public at large. Appellate amicus briefs and arguments are helpful to be sure, but not enough, I think, to close the expertise gap or compensate for the large differences in size between congressional and judicial staffs. The more technical the issue (as the one before us surely is), the more salient the expertise differential may prove to be. It is not surprising, then, that “[tjhroughout our history ... it has been Congress that has taken the lead in ... balancing] the need for a new investigatory technique against the undesirable consequences of any intrusion on constitutionally protected interests in privacy.” Dalia v. United States,
Second, Congress is often better positioned to achieve legal consistency. Abandoning Congress’s comprehensive effort for particularized and improvised judicial standards invites confusion into what has been a relatively stable area of the law. See ante at 426-28. The SCA — which remains “the primary vehicle by which to address violations of privacy interests in the communication field,” Adams v. City of Battle Creek,
Finally, Congress imparts the considerable power of democratic legitimacy to a high stakes and highly controversial area. The emergence of advanced communication technologies has set off a race between criminal enterprises on the one hand and law enforcement efforts on the other. Modern communication devices- — • even as they abet the government’s indigenous tendencies to intrude upon our privacy — also assist criminal syndicates and terrorist cells in inflicting large-scale damage upon civilian populations. Appellants’ strict standard of probable cause and a warrant even for non-content information held by third parties thus risks an imbalance of the most dangerous sort, for it allows criminals to utilize the latest in technological development to commit crime and hamstrings the ability of law enforcement to capitalize upon those same developments to prevent crime. The fact that the appellants in this case were convicted of Hobbs Act violations and brandishing offenses cannot obscure the implications of their proposed standards for much more serious threats down the road.
In my view, striking a balance in an area rife with the potential for mass casualty
It is human nature, I recognize, to want it all. But a world of total privacy and perfect security no longer exists, if indeed it ever did. We face a future of hard tradeoffs and compromises, as life and privacy come simultaneously under siege. How sad, near the very inception of this journey, for appellants to adopt the most stringent of Fourth Amendment standards, to discard the great values of democratic compromise, and to displace altogether the legislative role.
My dissenting friend rightly lauds the function of judicial review, see Marbury v. Madison,
Not to worry, says the dissent. All it is doing is "eliminating a single line of statutory text, specifically 18 U.S.C. § 2703(c)(1)(B).” Id, But "eliminating” a critical option Congress has provided in favor of the dissent’s idea of what is best for us is the kind of constitutional club that ends the conversation and severely limits opportunities for legislative reforms and responses in what is a rapidly evolving field.
Concurrence Opinion
join, dissenting in part and concurring in the judgment:
A customer buys a cell phone. She turns it on and puts it in her pocket. With those acts, says the majority, she has “voluntarily conveyed” an unbounded set of personal location data to her service provider, all of which is unprotected by the Fourth Amendment. Here, that included 221 days’ worth of information, amounting to roughly 29,000 location-identifying data points for each Defendant.
The majority further claims that “Supreme Court precedent mandates this conclusion,” that “[ljogic compels” it. Ante, at 425, 430. But those contentions are difficult to square with the array of concurring and dissenting opinions that have already been issued by federal appellate judges on this subject.
I.
A.
' The third-party doctrine operates to bar Fourth Amendment protection only for information that has been “voluntarily conveyed” by an individual to a third party. The majority does not dispute this limitation, see ante, at 426-27, 429-30, nor could it. That phrase, or some slight variation of it, appears without exception as a necessary analytical component in each of the Supreme Court’s founding third-party doctrine cases. Smith v. Maryland,
The Supreme Court, then, has intentionally employed the “voluntary conveyance” concept in every relevant case to limit the reach of an otherwise sweeping per se rule that denies Fourth Amendment protection. It seems therefore crucial here to ask: what, precisely, did the Court mean when it chose those words, in the context of those cases?
Here is what those various defendants actually did to “voluntarily convey” information. One used his finger to dial, one by one, the numerical digits of a telephone number. Smith,
In all of these cases — the only cases that can bind us here — “voluntary conveyance” meant at least two things. First, it meant that the defendant knew he was communicating particular information. We can easily assume Miller knew how much money he was depositing, that Smith knew the numbers he was dialing, and that Hoffa, Lewis, and White knew about the misconduct they verbally described to another.
Second, “voluntary conveyance” meant that the defendant had acted in some way to submit the particular information he knew. Crucially, there was an action — depositing, dialing, speaking — corresponding to each piece of submitted information. And where many data pieces were compiled into records — financial records in Miller, phone records in Smith — there was presumptively a discrete action behind each piece of data. The Court never suggested that the simple act of signing up for a bank account, or a phone line, was enough to willingly turn over thousands of pages of personal data.
These two components of “voluntary conveyance” — -knowledge of particular information and an action submitting that information — were thus present in every “Supreme Court precedent” that can “mandate[] [our] conclusion” here. Ante, at 425. Those features also characterize the vast majority of cases where the third-party doctrine has been applied by other federal courts.
When a credit card holder signs a receipt that includes the address of the vendor, the bill amount, and the time of the transaction, she both indicates her knowledge of that particular information and acts to submit it.
WTien someone types “his name, email address, telephone number, and physical address” into a form and then submits that information to a service provider in order
When an internet user types a URL— which is uniquely linked to a single IP address
It follows that knowledge of particular information and a corresponding act transmitting that information have defined “voluntary conveyance” in virtually every case espousing or applying the third-party doctrine, and certainly in every case that can bind us here. Those features describe traditional bank records and phone records, hotel bills and airline miles statements, email addresses and social media profile information. This is a description — not a redefinition — of the third-party doctrine.
B.
The foregoing discussion makes clear that CSLI is not “voluntarily conveyed” by a cell phone user, and therefore is not subject to the third-party doctrine.
First, consider how little a cell phone user likely knows about his CSLI. Unlike
Second, consider what the cell phone user does — or does not do — to transmit CSLI. As a general matter, “CSLI is purely a function and product of cellular telephone technology, created by the provider’s system network at the time that a cellular telephone call connects to a cell site.” Commonwealth v. Augustine,
II.
Because CSLI is not voluntarily conveyed to service providers, the third-party doctrine alone cannot resolve whether the government here conducted a Fourth Amendment “search.” In other words, there must be an independent evaluation of whether “the government violates a subjective expectation of privacy that society recognizes as reasonable” by acquiring large amounts of CSLI. Kyllo v. United States,
The government obtained 221 days of CSLI for each.Defendant.
In United States v. Jones, — U.S. -,
Here, we confront a locational data set that is on the whole more invasive than the one considered in Jones. Admittedly, the CSLI acquired here, which could trace an individual to a neighborhood even if not to a specific address, was less precise than the GPS tracking information in Jones. “But precision is not the only variable with legal significance.” United States v. Carpenter,
By acquiring vast quantities of Defendants’ location information, spanning months, without Defendants” consent, the government infringed their reasonable expectations of privacy and thereby engaged in a. search. Because that search was war-rantless, it violated the Fourth Amendment.
III.
Even more disquieting to me than the result the majority has reached today is the path it has chosen to reach it.
The majority does not decide, for instance, as did the Third Circuit, that the CSLI employed here was too imprecise or too discontinuous to infringe Defendants’ privacy. See In re Application (Third Circuit),
Neither does the majority hold, as the Eleventh Circuit did in the alternative, that the court order required by 18 U.S.C. § 2703(d), though less than a warrant backed by probable cause, nevertheless satisfied the Fourth Amendment’s reasonableness “touchstone.” See Davis,
What this elucidates is the extraordinary breadth of the majority’s decision today. It is not bounded by the relative precision of location data, by the frequency with which it is collected, or by the statutory safeguards Congress has thought it prudent to enact. The majority’s holding, under the guise of humble service to Supreme Court precedent, markedly advances the front-lines of the third-party doctrine. The Fourth Amendment, necessarily, is in retreat.
IV.
Only time will tell whether our society will prove capable of preserving age-old privacy protections in this increasingly networked era. But one thing is sure: this
. In accordance with the practice of my colleague, see United States v. Graham,
. Four other federal appellate courts have issued five decisions considering as a matter of first impression the applicability of the Fourth Amendment to CSLI, and those decisions generated seven concurring or dissenting opinions. See United States v. Carpenter,
. The majority argues that reading "voluntary conveyance” to require user knowledge would require courts "frequently ... to parse business records [such as credit card records] for indicia of what an individual knew he conveyed to a third party.” Ante, at 430 n. 9. That argument is a bogeyman. Courts would not need to "parse” credit card records to determine whether the cardholder at a grocery knew he was conveying "the date and time of his purchase or the store's street address,” iL any more than the Supreme Court had to “parse” Miller's bank records to determine whether he knew he was conveying the date, amount, or recipient name that appeared on the checks he himself had endorsed. That much was obvious from the nature of the record and the transactions it reflected. Where user knowledge cannot be easily ascertained in this manner, however, I would not force an ill-fitting presumption of voluntariness in order to strip Fourth Amendment protection from a defendant. See Ohio v. Robinette,
. See United States v. Forrester,
. One category of generally admitted third-party information would not be “voluntarily conveyed” under my reading of that requirement: phone records of incoming calls. See ante, at 431-32. Perhaps one reason such information is routinely admitted is that it is rarely challenged by defendants, since it is outgoing call information that tends to be incriminating, as was the case in the sole authority from this circuit cited by the majority. See United States v. Clenney,
.Indeed, it is the majority who has "improperly attempted] to redefine the third-party doctrine.” Ante, at 425; see also ante, at 429, 431. The majority recasts the Supreme Court’s "voluntary conveyance” language in a double negative, such that "the third-party doctrine does not apply when an individual in voluntarily conveys information.” Ante, at 431 (first emphasis added). The upshot of this approach is that the protections of the Fourth Amendment are limited to situations where "the government conducts surreptitious surveillance or when a third party steals private information.” Id. While the majority might prefer to preserve Fourth Amendment protection only for information that is not coercively seized, that is not the Supreme Court’s standard, and it should not be ours.
. The majority "fail[s] to see how a phone user could have a reasonable expectation of privacy in something he does not know.” Ante, at 430 n. 9. I wonder: does the majority imagine that Danny Kyllo knew what levels of infrared radiation emanated from his home and were recorded with precision by the government’s thermal imaging device? See Kyllo v. United States,
.The majority does not take seriously this idea — that information might be automatically generated without user involvement. See ante, at 429 ("[T]here can be little question that cell phone users 'convey' CSLI to their service providers. After all, if they do not, then who does?”); icL ("Perhaps Defendants believe that ... the [service] provider just conveys CSLI to itself.”). But even in the era of Miller and Smith, human beings were not the only entities capable of collecting and conveying information. That is also surely the case now, and will only become increasingly relevant going forward. See, e.g., Neil M. Richards, The Dangers of Surveillance, 126 Harv. L. Rev. 1934, 1940 (2013) ("The incentives for the collection and distribution of private data are on the rise. The past fifteen years have seen the rise of an Internet in which personal computers and smartphones have been the dominant personal technologies. But the next fifteen will likely herald the 'Internet of Things,' in which networked controls, sensors, and data collectors will be increasingly built into our appliances, cars, electric power grid, and homes, enabling new conveniences but subjecting more and more . previously unobservable activity to electronic measurement, observation, and control.”); Peppet, supra note 7, at 88-89. Today, the majority saddles us with a rule that does not distinguish between information an individual himself conveys and information that computerized devices automatically record, generate, and transmit. In other words, the majority's' expansive interpretation of Miller and Smith will, with time, gather momentum— with effects increasingly destructive of privacy-
. Because CSLI is not voluntarily conveyed by cell phone users, I find it unnecessary to wade into the murky waters that separate "content” from "non-content” information. The point of the "content” designation, as recognized by the Supreme Court, is that even some information that is voluntarily conveyed to (or routed through) third parties is nevertheless protected by the Fourth Amendment. For example, even though one voluntarily conveys information by speaking into a public telephone receiver,. "the contents of [those] communications” are protected. Smith,
. This CSLI acquisition far eclipses any a federal appellate court has previously approved. Cf. Carpenter,
. That is, five Justices agreed that longer-term location monitoring could violate an individual's reasonable expectation of privacy. Although the majority opinion was grounded in a trespass-based rationale, see id. at 949, it made clear that “[sjituations involving merely the transmission of electronic signals without trespass would remain subject to [reasonable expectation of privacy] analysis,” id. at 953.
. The majority wonders "why ... only large quantities of CSLI [would] be protected by the Fourth Amendment.” Ante, at 435. That is a fair question to ask of Defendants, who maintain that even smaller amounts of CSLI can be used to peer "into the home.” Appellants’ Br. at 20. In my view, however, the CSLI utilized here was not precise enough to implicate an individual’s privacy interest in the home's interior. See United States v. Karo,
. “[A]s a general matter, warrantless searches 'are per se unreasonable under the Fourth - Amendment....' ” City of Ontario, Cal. v. Quon,
. My concurring colleague joins the majority based on his "fear that by effectively rewriting portions of a federal statute under the guise of reasonableness review courts run the risk of boxing the democratic branches out of the constitutional dialogue.” Ante, at 438. If that is truly the grounds for his concurrence, I hope my friend understands that the majority's opinion today will be the last word spoken in that "dialogue.” It is a conversation ender. Following today's decision, the judiciary will have absolutely no role in articulating what protections the Fourth Amendment requires for private information that is not either directly gathered by the government or secretively stolen by third parties. We have thus avoided "boxing out” the other branches, but only at the cost of boxing out ourselves. So much for a "collaborative enterprise among the three departments of government.” Ante, at 438. By the way, the statutory "rewriting” my colleague fears would require eliminating a single line of statutory text, specifically 18 U.S.C. § 2703(c)(1)(B). The efficiency of that modification is possible because Congress, as my colleague recognizes, provided in its "carefully tailored scheme,” ante, at 439, that the government could acquire non-content customer information by obtaining a warrant. 18 U.S.C. § 2703(c)(1)(A). One wonders whether Congress itself might have anticipated the potential for a contrary decision today. Finally, although I appreciate my colleague's civics lesson on the institutional competencies of Congress, I would remind him of one of our own: judicial review. See Marbury v. Madison,
