UNITED STATES of America v. Binyamin STIMLER, Appellant in No. 15-4053 United States of America v. Jay Goldstein a/k/a Yaakov Jay Goldstein, Appellant in No. 15-4094 United States of America v. Mendel Epstein, Appellant in No. 15-4095
Nos. 15-4053, 15-4094 & 15-4095
United States Court of Appeals, Third Circuit.
July 7, 2017
864 F.3d 253
CONCLUSION
We have reviewed Tannerite‘s other arguments and have determined that they are meritless. Accordingly, the district court‘s judgment is AFFIRMED.
Argued on January 25, 2017
(Opinion filed: July 7, 2017)
Aidan P. O‘Connor, Esq. (Argued), Pashman Stein Walder Hayden, P.C., 21 Main Street, Court Plaza South, Suite 200, Hackensack, NJ 07601, Counsel for Appellant Goldstein
Laura K. Gasiorowski, Esq., Robert G. Stahl, Esq., Stahl Farella, 220 St. Paul Street, Westfield, NJ 07090, Peter Goldberger, Esq., (Argued), 50 Rittenhouse Place, Ardmore, PA 19003, Counsel for Appellant Epstein
Mark E. Coyne, Esq., Office of United States Attorney, 970 Broad Street, Room 700, Newark, NJ 07102, Norman Gross, Esq. (Argued), Glenn J. Moramarco, Esq. (Argued), Office of United States Attorney, Camden Federal Building & Courthouse, 401 Market Street, Camden, NJ 08101, Counsel for Appellee
Before: CHAGARES, RESTREPO and ROTH, Circuit Judges
AMENDED OPINION
ROTH, Circuit Judge
Binyamin Stimler, Jay Goldstein, and Mendel Epstein are Orthodox Jewish rabbis who were charged with various kidnapping-related offenses, stemming from their involvement in a scheme through which they, along with others,1 sought to assist Orthodox Jewish women to obtain divorces from recalcitrant husbands. After a jury trial, all three defendants were convicted of conspiracy to commit kidnapping. The defendants now appeal various rulings made by the District Court before, during, and after trial. Because we find no merit in any of the defendants’ arguments, we will affirm all three convictions.
I2
In the Orthodox Jewish tradition, a married woman cannot obtain a religious divorce until her husband provides her with a contract called a “get” (pluralized as “gittin“), which must, in turn, be signed by an “eid,” or witness. A woman who attempts to leave her husband without obtaining a get becomes an “agunah” (pluralized as “agunot“), which subjects her to severe social ostracism within the Orthodox Jewish community. Agunot may seek relief in a “beth din,” a rabbinical court presided over by a panel of three rabbis. The beth din may then issue “psak kefiah,” or contempt orders authorizing sanctions, which include, but are not limited to, the use of force against a husband to secure a get. To assist an agunah to obtain a get is a “mitzvah,” or religious commandment of the Orthodox Jewish faith. Starting in at least 2009, Stimler, Epstein, and Goldstein
In 2013, the FBI learned of the kidnapping ring and began investigating the rabbis. As part of this investigation, an FBI agent posed as an agunah and approached Epstein. The agent met with Epstein at his home in New Jersey. Epstein suggested, that kidnapping would be appropriate in the agent‘s “situation,” promising that “what we‘re doing is basically gonna be kidnapping a guy for a couple of hours and beatin’ him up and torturing him . . . .”3 One month after this meeting, Epstein and Goldstein found a potential location for the kidnapping. Epstein then convened a beth din at which he, Goldstein, and a third rabbi presided. Together, the rabbis issued a psak kefiah authorizing the use of force against the agent‘s “husband.” Epstein and the agent subsequently planned the details, including the date, location, and manner of the kidnapping of the “husband.” On the day of the kidnapping, a team of rabbis and “tough guys” assembled at the agreed-upon location. Goldstein and Stimler arrived in disguise and Stimler conducted counter-surveillance of the area.
Once the kidnapping team had assembled, the FBI arrested them. Epstein and Stimler were each charged with one substantive kidnapping count, one count of attempted kidnapping, and one count of conspiracy to commit kidnapping. Goldstein was charged with two substantive kidnapping counts, one count of attempted kidnapping, and one count of conspiracy.
During its preparation for trial, the government applied for a court order, pursuant to Section 2703(d) of the Stored Communications Act (SCA), compelling AT & T to turn over historic cell site location information (CSLI) generated by Goldstein‘s phone. CSLI is generated every time a cell phone user sends or receives a call or text message; when the call or message is routed through the nearest cell tower, the user‘s service provider generates and retains a record identifying the particular tower through which the communication was routed.4 In more densely populated areas, cell towers are able to triangulate an individual‘s approximate location based on the individual‘s distance from the three nearest towers. Thus, while less precise than traditional GPS systems, historic CSLI records can nonetheless generate a rough profile of an individual‘s approximate movements based on the phone calls that individual makes over a period of time. The order for such records, covering a total of 57 days of Goldstein‘s location history, was issued by a magistrate judge on October 30, 2014.
II
The defendants filed numerous pretrial motions before the District Court; we consider only the three which are relevant to this appeal. First, Goldstein moved to suppress the CSLI obtained pursuant to the SCA, arguing that cell phone users have a reasonable expectation of privacy in such metadata, implicating the
Third, the defendants sought to introduce evidence of their religious beliefs and, more broadly, of Orthodox Jewish law in order to negate the motive element of the kidnapping statute, or, in the alternative, to demonstrate consent on the part of the husbands. The District Court refused to admit such evidence, finding that it was irrelevant both to motive and to the affirmative defense of consent. In the alternative, the District Court held that the evidence would be unduly prejudicial under Rule 403 of the Federal Rules of Evidence, as it “would carry a significant potential for jury nullification.”9
At trial, the government introduced a variety of evidence against the defendants. As relevant here, the government introduced testimony from FBI agents placing Stimler and Goldstein at the site of the proposed kidnapping in a disguise. The agents stated that Stimler performed counter-surveillance at the site. The government also introduced the statements made about Goldstein by another rabbi at a beth din convened to determine the validity of a get obtained from one of the prior kidnappings. After both the government and the defense rested, the judge instructed the jury as to the elements of each charged offense and sequestered the jury for deliberations. On the fourth day of deliberations, the jury sent a question to the judge, inquiring whether failure to intervene could make an individual liable for kidnapping. The judge wrote back that, having interpreted the question to refer only to the substantive kidnapping counts, the answer was no. The defendants objected to this response, arguing that it implied that failure to intervene could support a conviction for the attempt and conspiracy charges.
All three defendants were convicted. Stimler was sentenced to 39 months incarceration, Goldstein to 96 months, and Epstein to 120 months. They appealed. We consolidated the appeals for disposition.
III10
This appeal presents eight issues, not all of which apply to every defendant. As
A.
We first address whether the District Court erred in denying Goldstein‘s11 motion to suppress the CSLI evidence. Because the parties agree as to all the relevant facts and dispute only the legal implications thereof, our review is plenary.12 Section 2703 of the SCA authorizes the government to “require a provider of electronic communication service . . . to disclose a record or other information pertaining to a subscriber to or customer of such service . . . when the governmental entity . . . obtains a court order for such disclosure . . . .”13 Such a court order “shall issue only if the governmental entity offers specific and articulable facts showing that there are reasonable grounds to believe” that the records “are relevant and material to an ongoing criminal investigation.”14 Notably, this “reasonable grounds” requirement is a lesser burden than the “probable cause” requirement of the
Recognizing that the SCA permits precisely what the government here did, Goldstein argues that the SCA violates the
We do not decide these questions on a blank slate. Both parties agree that our
Pursuant to our Internal Operating Procedures, “the holding of a panel in a precedential opinion is binding on subsequent panels.”19 Thus, as a general matter, we remain obliged to follow our precedent absent en banc reconsideration. A narrow exception to this rule exists, however, where intervening legal developments have undercut the decisional rationale of our precedent.20 We have described this as an exacting standard; we generally will not decline to follow our precedent unless it “no longer has any vitality”21 or is “patently inconsistent”22 with subsequent legal developments. Because In re Application has not been overturned by this Court sitting en banc, we will continue to follow it in its entirety unless the government demonstrates that intervening legal developments have undermined In re Application‘s rejection of the third-party doctrine or Goldstein can demonstrate that intervening changes in the law have created a reasonable expectation of privacy in CSLI. We conclude that neither the government nor Goldstein have met their respective burdens.
1.
We begin with the government‘s contention that individuals voluntarily convey CSLI to their cell service providers. The government attempts to sidestep In re Application by characterizing its rejection of the third-party doctrine as dictum. However, the government placed the issue of the third-party doctrine squarely before us in In re Application by arguing that the doctrine prevented CSLI from ever implicating
The government suggests, nevertheless, that this Court “should join all of its sister circuits” in applying the third-party doctrine to CSLI,26 apparently arguing that the subsequent decisions of other circuits may constitute intervening legal authority allowing departure from our precedent. We have never so held, and we decline to do so now. To the contrary, in declining to follow our decisions, we have recognized intervening authority only from the Supreme Court of the United States, Congress, or administrative agencies.27 Accordingly, we continue to adhere to our view, espoused in In re Application, that the third-party doctrine does not apply because cell phone users do not voluntarily disclose CSLI to their service providers simply by signing a service contract.28
2.
We next address whether intervening changes in law undermine In re Application‘s holding that CSLI does not implicate an individual‘s reasonable expectation of privacy. Goldstein argues that the Supreme Court‘s subsequent decisions in Riley v. California29 and United States v. Jones30 render the underpinnings of In re Application untenable, and warrant a departure from our precedent. In Goldstein‘s view, Riley and Jones, taken together, strongly imply that an individual has a reasonable expectation of privacy in his or her aggregated movements over a period of time, particularly where cell phones are involved.
We are not persuaded by Goldstein‘s readings of Riley and Jones. In Riley, the Supreme Court held that officers’ warrantless search of data stored on an individual‘s cell phone ran afoul of the
Goldstein‘s argument finds better support in the statements of the concurring opinions of Jones, in which the Supreme Court held that warrantless placement of a GPS tracker on an individual‘s car for 28 days, and the resulting aggregated movement history, violated the
We do not believe that either concurrence in Jones has undercut In re Application in any meaningful way because of the different technologies at issue. Jones dealt with GPS tracking, not historic CSLI. In re Application expressly considered the differential accuracy of CSLI and GPS, holding that CSLI is less intrusive on individuals’ privacy rights than GPS tracking. Jones made no suggestion that this holding was erroneous.
Goldstein admits the inexact nature of CSLI. He concedes that the tower which transmits the signal is generally, but not always, the tower closest to the cell phone.
Goldstein‘s reading of Jones suffers from another flaw; four of the five justices, who engaged in an analysis of whether individuals have a reasonable expectation of privacy in their movements, expressly limited their consideration to areas in which Congress has not provided statutory protection. Justice Alito‘s concurrence noted that “[i]n circumstances involving dramatic technological change, the best solution to privacy concerns may be legislative.”41 This, he explained, is because “[a] legislative body is well situated to gauge changing public attitudes, to draw detailed lines, and to balance privacy and public safety in a comprehensive way.”42 Citing to the wiretapping statute as an example, Justice Alito stated that, where Congress strikes a particular balance between digital age privacy rights and government investigative interests, “regulation . . . has been governed primarily by statute and not by case law.”43 Justice Alito expressly warned against judicial creation of new privacy interests, cautioning that “judges are apt to confuse their own expectations of privacy with those of the hypothetical reasonable person. . . .”44
Here, Congress has expressly weighed the privacy rights in digital information against government interest in passing the SCA.45 Justice Alito‘s concurrence suggests that we should be wary of revisiting this balance that Congress has struck.46
Accordingly, Goldstein‘s readings of Jones and Riley do not persuade us to reconsider our own precedent, nor do we see any independent reason to do so. While the rapidly evolving nature of CSLI may one day give us a reason to reconsider the distinction between GPS and CSLI, we decline to do so today. We continue to adhere to our view of In re Application: the
3.
Goldstein argues, in the alternative, that the government failed to meet the “reasonable grounds” standard of the SCA. As noted above, the “reasonable grounds” standard is a lesser burden than that of probable cause, and “in essence is a reasonable suspicion standard.”48 We thus look to the totality of the circumstances to determine whether the government had a “particularized and objective basis” for believing that the CSLI would assist its investigation, mindful of the fact that agents are entitled “to draw on their own experience and specialized training to make inferences from and deductions about the cumulative information available to them. . . .”49
In light of this threshold, we find that the government‘s application was more than satisfactory. The government presented information about the kidnapping ring, the charged kidnappings, and the alleged involvement of each defendant. In addition, the government stated that another coconspirator had implicated the defendants in his statements to agents.50 The government then explained that its request was limited to CSLI records “during the time periods when the alleged kidnappings and attempted kidnappings occurred” in order to “identify the location of the alleged participants. . . .”51 Collectively, this information provided the government with reasonable grounds to believe that the records would be relevant to their investigation.52
Accordingly, we will affirm the District Court‘s order denying suppression of the CSLI records obtained pursuant to the SCA.
B.
We next turn to the arguments raised by all three defendants that various aspects of the prosecution violated RFRA. Because the motion implicates the proper scope of RFRA, we exercise plenary review.53 RFRA proscribes government conduct which “substantially burden[s] a person‘s exercise of religion” unless the government can demonstrate, inter alia, that the burden is the “least restrictive means of furthering [a] compelling government interest.”54 This proscription extends to the government‘s criminal prosecutions under laws of general applicability; a defendant “may raise RFRA as a shield in the hopes of beat-
1.
We agree with the District Court‘s holding that the defendants failed to satisfy their burden of establishing that the government substantially burdened their religious beliefs by prosecuting them for kidnapping. While the government‘s decision to prosecute the defendants undoubtedly constituted a burden on their sincerely held religious beliefs, the District Court properly analyzed whether the burden was “substantial” by looking to acceptable alternative means of religious practice that remained available to the defendants.58 Here, none of the defendants argue that they are unable to participate in the mitzvah of liberating agunot without engaging in kidnapping; as the District Court noted, “it is unclear whether all nonviolent methods were exhausted before the alleged kidnappings took place here.”59 The defendants do not challenge this determination on appeal. As the defendants have failed to demonstrate that the prose-
cution was a “substantial” burden, we will affirm the District Court‘s holding that prosecution under the federal kidnapping statute did not violate RFRA.
Moreover, even if the defendants had demonstrated that the government‘s actions constituted a substantial burden on their religious exercise, we would nonetheless affirm the District Court‘s determination that the government has a compelling interest in uniform application of laws about violent crimes and that no other effective means of such uniformity existed. The Supreme Court has advised that the government‘s interest in preventing serious crimes “is both legitimate and compelling.”60 The defendants fail to cite, nor can we identify, any cases in which any court has allowed RFRA to shield individuals in the commission of violent crimes.
Accordingly, we will affirm the District Court‘s denial of the motion to dismiss the indictment.
2.
We turn next to the argument raised only by Stimler that his joinder with Epstein and Goldstein constituted an independent RFRA violation. No court appears to have answered the question of whether RFRA imposes further limits on the government‘s ability to structure a prosecution. The Supreme Court has noted that RFRA requires only that an individual face “serious disciplinary action”61 for act-
C.
All three defendants challenge the District Court‘s decision under Rules 402 and 403 of the Federal Rules of Evidence to bar admission of evidence about Orthodox Jewish marital law and the religious motivations for the kidnappings, arguing that such evidence was relevant to negating the specific intent required for conviction. Alternatively, the defendants argue that evidence of Orthodox Jewish laws about marital duties would be relevant to showing that the husbands consented to the kidnappings. We review a district court‘s exclusion of evidence for an abuse of discretion, but review de novo its interpretation of the Federal Rules of Evidence.62
In relevant part, the federal kidnapping statute requires that the kidnapping be committed “for ransom or reward or otherwise . . . .”63 The District Court properly read this language as encompassing a broad set of potential motives, including the religious benefit of performing a mitzvah, while reasoning, however, “that religious motivation simply cannot negate the intent to commit a crime.”64 We agree that a religious benefit can constitute a “benefit” under the statute.
We will also affirm the District Court‘s determination that the evidence of religious practices was not relevant to the affirmative defense of consent. The defendants argue that, by practicing Orthodox Judaism and signing a marriage contract, the husbands consented to any use of force authorized by any beth din. The District Court properly rejected this argument, reasoning that “[w]hile consent can be a defense to kidnapping, it has to be specific and cannot be prospective in nature.”65 The defendants do not argue that the religious evidence would demonstrate that the husbands gave specific consent to their particular kidnappings; accordingly, we agree that the religious evidence was not relevant to the affirmative defense.
We further agree with the District Court that any marginal relevance that the religious evidence may have had was substantially outweighed by the prejudicial impact it would have had on the trial. Suggesting that the defendants acted for a religious purpose might have given rise to the potential for jury nullification, which we have held is substantially prejudicial.66
D.
We next turn to the argument, raised by Epstein and Goldstein, that the District Court erred in three respects in charging the jury. First, they argue that the District Court failed to include the jurisdictional element of the kidnapping offense in the conspiracy instruction. Second, they contend that the District Court erred in refusing to charge the jury that kidnapping requires the victim to be held for an appreciable period of time. Finally, the defendants claim that the District Court‘s instruction as to motive constituted a constructive amendment of the indictment inasmuch as it did not include the specific religious motives charged in the indictment. Because the defendants did not object in the District Court, our review is for plain error.
A district judge‘s failure to instruct the jury as to a necessary element of the offense “ordinarily constitutes plain error”67 unless the instructions as a whole make clear to the jury all necessary elements of the offense.68 In determining whether there has been a plain error in jury instructions, we “consider the totality of the instructions . . . , not focusing on a particular paragraph in isolation.”69 Finally, even if the instructions omitted a neces-sary element in a way that would confuse the jury, we may nonetheless affirm if “no reasonable jury could find that the element was not present.”70
We see no merit in the claim that the District Court failed to make clear the interstate commerce element in instructing the jury on the conspiracy charge. While the conspiracy charge included no explicit jurisdictional requirement, it did state that the jury would have to find that the defendants conspired to engage in “kidnapping, as alleged in the indictment.”71 The parties agree that the District Court included this element in the instructions as to the substantive kidnapping counts and in the indictment. We therefore conclude that the instructions as a whole made clear that the conspiracy charge required the jury to find a conspiracy to commit a kidnapping that would cross state lines.
We similarly decline to find error in the District Court‘s decision to not include a temporal element in the kidnapping instruction. Seizing on just one line in Chatwin v. United States, the defendants argue that federal kidnapping requires holding the victim “for an appreciable period.”72 We do not believe that the Supreme Court intended to create a new limit on kidnapping liability—one not found anywhere in the statutory text—in one line of dictum. Further, as the government properly notes, we have upheld jury instructions that do not refer to any temporal limit on kidnapping liability even after
Finally, the District Court did not constructively amend the indictment because, in instructing the jury, it actually did include the specific motive charged in the indictment. The defendants assert that the indictment alleged that the defendants’ motive was “to threaten and coerce Jewish husbands to give gets to their wives.”75 The District Court expressly stated in its instructions that “[t]he indictment alleges the defendants had a purpose of holding the individual victims to coerce them into giving a get to the victim‘s wife.”76 In light of this instruction, and the entirety of the evidence produced at trial, we cannot say that there is any substantial likelihood that the jury may have convicted the defendant for an offense differing from the offense the indictment . . . actually charged.”77
Accordingly, we reject the defendants’ challenges to the District Court‘s jury instructions.
E.
Stimler and Goldstein next argue that the District Court improperly responded to a question from the jury on the third day of deliberations. The jury asked the District Court whether “element #1 of kidnapping“—the “seizes, confines, inveigles, decoys, kidnaps, abducts, or carries away and holds” requirement—could be satisfied “[i]f you know that someone is being confined against their will and . . . do not intervene. . . .”78 The District Court responded that it “interpreted [the] question as referring to the kidnapping counts, counts 2 and 3. If that is accurate, then the answer to [the] question is no.”79 The court further told the jury that if they were “inquiring about any other count, please so indicate, so that I may more fully consider [the] question and answer appropriately.”80 Stimler objected to this response, asserting that it suggested that the conspiracy count could be satisfied by failure to intervene. Because Stimler properly objected to the response, we conduct plenary review.81 If we determine that the response was improper, we nonetheless may affirm if the error was harmless.82
We do not agree that the District Court‘s response improperly suggested that liability could be found upon a failure to intervene. The District Court expressly stated that it was speaking only to the substantive kidnapping counts, and sug-
F.
Goldstein and Epstein next challenge the admission of certain statements made by alleged co-conspirators, arguing that the statements were inadmissible hearsay under the Federal Rules of Evidence and violated the Confrontation Clause. While we “review a nonconstitutional challenge to the admission of hearsay for abuse of discretion,” we “exercise plenary review over Confrontation Clause challenges.”83 In distinguishing when to review admission of evidence under the Confrontation Clause from when to review under the Federal Rules of Evidence, the touchstone of our inquiry is “whether the contested statement by an out-of-court declarant qualifies as testimonial. . . .”84 “[W]here nontestimonial hearsay is concerned, the Confrontation Clause has no role to play in determining the admissibility of a declarant‘s statement.”85 A statement is testimonial only if it meets two requirements: (1) it is a “solemn declaration or affirmation made for the purpose of
establishing or proving some fact;”86 and (2) it was made primarily for the purpose of “prov[ing] past events potentially relevant to later criminal prosecution.”87 If the contested statement is testimonial, we next must determine “if the defendant had a prior opportunity to cross-examine [the declarant].”88
The statements at issue were testified to by Aryeh Ralbag. At trial, Ralbag described the statements made before a beth din which was convened when the alleged victim of one of the charged kidnappings had challenged the validity of the get he signed. Ralbag and two other rabbis presided at the beth din, and four witnesses—including Goldstein and Stimler—testified that Goldstein and Stimler had served as eid in procuring the contested get.89
We have no trouble concluding that these statements were not testimonial within the meaning of the Sixth Amendment. It is clear that none of the individuals at the beth din—all of whom were charged as part of the conspiracy—would have reasonably believed that they were making statements for the purpose of assisting a criminal prosecution. Accordingly, the Confrontation Clause is inapplicable to defendants’ challenge, and we only analyze whether the statements were inadmissible
gittin were clearly made during the course and in furtherance of the conspiracy, regardless of when they were occurred.95 We thus find no error, constitutional or otherwise, in the District Court‘s decision to admit the statements made at the beth din.
Even if we were to assume that the statements were improperly admitted, however, we would nonetheless affirm because any error was harmless.96 As noted, Ralbag testified as to statements made by four witnesses, including Goldstein and Stimler. The defendants do not challenge the admission of the statements they themselves made, which largely paralleled those of the other two witnesses; the statements of the other two witnesses, therefore, were largely duplicative, and any error in their admission was harmless.97
Accordingly, we conclude that the District Court properly admitted the evidence.
G.
Stimler next challenges the sufficiency of the evidence against him. We
Stimler has failed to meet this burden. The government presented uncontested evidence that Stimler was present at the site of the proposed kidnapping, and wore a disguise. The government next introduced evidence that Stimler performed counter-surveillance by walking around the warehouse with a flashlight. On appeal, Stimler presents an alternative explanation of these facts. Simply disagreeing with the jury‘s interpretation of the facts, however, is insufficient. We believe that the jury made a reasonable inference in finding that Stimler knew of the conspiracy and took affirmative steps to help carry it out. We therefore affirm his conviction.
H.
Finally, all three defendants challenge the FBI‘s sting operation as conduct so outrageous that it violated due process. This claim is procedurally barred, as the defendants failed to make the argument in the District Court, despite full knowledge of the scope of the government‘s investigation. Nor do the defendants identify any new information that supports their claim of outrageous government conduct. We have made clear that such failure waives challenges to allegedly outrageous government conduct.101
Moreover, even if this argument had been preserved, we would see no merit to it. In reviewing claims of outrageous government conduct, we “repeatedly have noted that we are ‘extremely hesitant to find law enforcement conduct so offensive that it violates the Due Process Clause.’ ”102 We have rejected the argument that the government‘s invitation to engage in criminal activity rises to this level where, as here, the defendants used their own knowledge and connections to set up and carry out the unlawful conduct.103 We have suggested that “the supply of ingredients” to commit a crime would be insufficient to meet this standard.104 Given that Epstein first suggested the use of violence, and that the defendants assembled the kidnapping team, chose a location, and acquired their own tools, we see no due process violation here.
IV.
In our legal system, “liberty and social stability demand a religious tolerance that respects the religious views of all citizens. . . .”105 Respect for religious beliefs
RESTREPO, Circuit Judge, concurring in part and concurring in the judgment.
I join parts I, II, III(A)(1), and III(B)-(H) of the Opinion of the Court, which address the parties’ arguments concerning the application of the third party doctrine to historical cell site location information (“CSLI“); applications of the federal Religious Freedom Restoration Act,
I
“[T]he holding of a panel in a precedential opinion“—such as that in our Court‘s most recent opinion on law enforcement requests for CSLI, In re Matter of the Application of the United States for an Order Directing a Provider of Electronic Communication Service to Disclose Records to the Government, 620 F.3d 304 (3d Cir. 2010) (“In re Application“)—“is binding on subsequent panels.” Third Circuit I.O.P. 9.1. This rule exists for good reason: it maintains uniformity of law within the Circuit, and promotes predictability for litigants. However, if Supreme Court authority abrogates or calls existing Circuit precedent into question, our Court has recognized that subsequent panels may decline to follow the prior holding without reconsidering the issue en banc. George Harms Constr. Co., Inc. v. Chao, 371 F.3d 156, 161 (3d Cir. 2004); see also Reich v. D.M. Sabia Co., 90 F.3d 854, 858 (3d Cir. 1996).
This exception to our Internal Operating Procedures is narrow. When our Court has declined to follow past precedent on the basis of intervening Supreme Court authority, we typically have declined to follow only the specific portions of the prior precedent that the intervening authority has called into question or abrogated. United States v. Johnson, 587 F.3d 203, 207 n.4 (3d Cir. 2009); see also Animal Science Prods., Inc. v. China Minmetals Corp., 654 F.3d 462, 467-68 (3d Cir. 2011). I agree with the Majority that the third party doctrine holding of In re Application has not been called into question by subsequent authority. However, I take a different view on the ongoing vitality of the reasonable expectation of privacy analysis in In re Application, in light of Supreme Court opinions in United States v. Jones, 565 U.S. 400, 132 S.Ct. 945, 181 L.Ed.2d 911 (2012), and Riley v. California, 573 U.S. 373, 134 S.Ct. 2473, 189 L.Ed.2d 430 (2014).
Jones and Riley have “sufficiently undercut the decisional basis” of In re Appli-
In Jones, law enforcement officers surreptitiously placed a tracking device on the bumper of a surveillance target‘s car without a valid warrant, and collected 28 days’ worth of global positioning system (“GPS“) location data. Jones, 565 U.S. at 403. The lead opinion in Jones held that this conduct violated the
Historically, this interest has been protected in part by resource constraints facing law enforcement agencies—but those resource constraints no longer present an obstacle to this type of aggregation. In the past, obtaining aggregated location information on any individual by tracking him or her “for any extended period of time was difficult and costly and therefore rarely undertaken.” Id. at 429 (Alito, J., concurring). Constant monitoring of an individual‘s location is possible now, however, because of new technology “available at a relatively low cost.” Id. at 416 (Sotomayor, J., concurring); id. at 429 (Alito, J., concurring). Those former resource constraints, however, have shaped what the Jones shadow majority recognized as a reason-
Here, in its
The Majority declines to read the Jones concurrences as undercutting ”In re Application in any meaningful way” in part “because of the different technologies at issue.” Maj. Op. 265. To the extent that tracking an individual‘s cell phone by CSLI and tracking an individual‘s car by GPS differ, the privacy interest that protects an individual from the Government aggregating that location information (without a warrant) remains the same. If anything, the reasonable expectation of privacy in aggregated location derived from an individual‘s use of a cell phone is stronger than the reasonable expectation of privacy in aggregated location derived from that same individual‘s use of a car. Aggregating data points from cell phone location into a comprehensive record offers the Government more opportunity to infer things about an individual, because cell phones accompany individuals many places that cars do not. “Historic location information . . . can reconstruct someone‘s specific movements down to the minute, not only around town but also within a particular building.” Riley, 134 S.Ct. at 2490. Moreover, cell phones accompany individuals who travel by public transit or otherwise not by car, regular drivers who temporarily rent a different car, and those who ride in the cars of others. And regardless of how an individual moves through the world, “nearly three-quarters of smartphone users report being within five feet of their phones most of the time, with 12% admitting that they even use their phones in the shower.” Id.
The Majority also reads the Jones shadow majority as not undercutting In re Application in part because of the distinction in precision between GPS data—at issue in Jones—and the CSLI at issue here. This distinction has nearly disappeared since we decided In re Application. By the time of the events at issue in this case, CSLI had grown quite precise, particularly in more densely-populated jurisdictions.3 In cities where wireless providers have more towers to provide service for more people packed into a given area, the identifiable radius in which a subscriber would connect to one tower rather than another is substantially smaller. In explaining this concept to the jury, the Government‘s expert at trial noted that the layout of “tightly compacted towers in Brooklyn” “will reduce the coverage area
By contrast, when the In re Application court considered this issue, CSLI did “not provide information about the location of the caller closer than several hundred feet.” In re Application, 620 F.3d at 311. Since then, wireless network improvements have included the distribution of “hundreds of thousands of ‘microcells,’ ‘picocells,’ and ‘femtocells,‘” which function similarly to hotspots and create CSLI that “can in some cases be more accurate than GPS.” Stephanie K. Pell & Christopher Soghoian, Can You See Me Now?: Toward Reasonable Standards For Law Enforcement Access To Location Data That Congress Could Enact, 27 Berkeley Tech. L.J. 117, 132 (2012). Even the proliferation of traditional cell towers has resulted in smaller coverage areas and CSLI that is “far more accurate—in some cases as good as GPS.” Id. at 133.
The reasonable expectation of privacy of an individual in an urban area in the aggregated location information of his or her CSLI is functionally indistinguishable from the reasonable expectation of privacy of that same individual in the aggregated location information of his or her GPS data. Distinguishing Jones on the basis of the greater precision of GPS ignores the current capabilities of CSLI, and indeed, the use the Government made of it in this case.
Although the Majority distinguishes Riley from the facts here by separating contents and metadata, Riley should inform our analysis of the reasonable expectation of privacy in CSLI, as well. The animating principle behind Riley is the same as the principle behind Jones: the Government may violate an individual‘s reasonable expectation of privacy when it obtains too much aggregated information without a warrant. In Riley, decided two years after Jones, the aggregation at issue merely took a different form. There, the Supreme Court recognized that the aggregation of data allowed by the increased capacity of digital storage helps law enforcement agents make inferences that intrude on an individual‘s reasonable expectation of privacy. The Court held unconstitutional a warrantless search of a cell phone, in part because the types of information stored on the cell phone in question “reveal[ed] much more in combination than any isolated record.” Riley, 134 S.Ct. at 2489.
The Riley Court rejected applications of doctrine created for older technologies that allowed for less aggregation of historically protected information. The Court distinguished call logs on modern cell phones from pen registers in part on the basis that “call logs typically contain more than just phone numbers; they include any identifying information that an individual might add.” Id. at 2493. While cataloguing the different types of data stored on cell phones that had not historically been stored on landline telephones, the Court explained that doctrines governing “qualitatively different” pre-digital counterparts do not compare well to modern technology in considering questions of criminal procedure. Id. at 2490, 2493. Allowing warrantless collection by analogy to older technologies would instead cause “a significant diminution of privacy.” Id. at 2493.
Here, technological changes since In re Application in the provision of wireless service mean that CSLI—like the phone itself, in Riley—conveys a greater quantity of information for the Government to ag-
The application also reflects the Government‘s capability to obtain data from use of a cell phone that it could not typically have obtained from an individual‘s use of a telephone, which the Riley Court regarded as a reason to require warrants for cell phone searches. Riley, 134 S.Ct. at 2489. Here, the Government requested location information for text messages, as well. Indeed, the Government‘s request to AT & T4 may stretch even more broadly than calls and texts—asking for data about each time a tower “received a radio signal,” App. 459, from a phone could conceivably encompass any time any application on a phone, even one running passively in the background, connects to the network. In re Application for Telephone Information Needed for a Criminal Investigation, 119 F.Supp.3d 1011, 1024 (N.D. Cal. 2015) (affirming a magistrate judge‘s denial of an application for CSLI under
For all of the foregoing reasons, I believe that the Government obtaining the quantity of historical CSLI it did in this case amounts to a search that, without a warrant, infringes on an individual‘s reasonable expectation of privacy and violates the
II
All of this said, I would not suppress the CSLI evidence in this case because of the good faith exception to the warrant requirement. “Searches conducted in objectively reasonable reliance on binding appellate precedent are not subject to the exclusionary rule.” United States v. Katzin, 769 F.3d 163, 172-73 (3d Cir. 2014) (en banc) (quoting Davis v. United States, 564 U.S. 229, 231, 131 S.Ct. 2419, 180 L.Ed.2d 285 (2011)). In re Application amounted
III
Despite applying the good faith exception to the warrant requirement in this instance, I believe that obtaining historical CSLI that approaches GPS-level precision, aggregated over at least the four week period the Jones shadow majority rejected—as in this case—should require a warrant supported by probable cause rather than a
For all of the foregoing reasons, I concur only as to the judgment in parts III(A)(2)-(3) of the Opinion of the Court.
