ORDER DENYING DEFENDANT GRADO’S MOTION TO SUPPRESS CELL SITE AND SIMULATED CELL SITE EVIDENCE
[Doc. No. 1002]
Presently before the Court is the motion of Defendant Miguel Grado (“Defendant” or “Defendant Grado”) to suppress cell site and simulated cell site evidence. [Doc. No. 1002, Def.’s Mot.] For the following reasons, the Court DENIES the motion.
BACKGROUND
This case involves charges of conspiracy, racketeering, illegal drug distribution, extortion, and money laundering in connection with the Mexican Mafia prison gang and several affiliated Sureño street gangs operating in northern San Diego county. Defendant Grado filed the present motion to suppress on April 8, 2013. [Id.] Defendant Grado seeks to suppress cell site and simulated cell site evidence which he believes was obtained by the Government in violation of Title III of the Electronic Communications Privacy Act of 1986 (“ECPA”) and the Fourth Amendment. [Id. at 1-2.] The Government filed a response in opposition to the motion on May 3, 2013. [Doc. No. 1033.] Defendant Rudy Espudo (“Defendant Espudo”) subsequently filed a reply memorandum. [Doc. No. 1056, Def.’s Reply.]
On April 30, 2013, Defendant Grado had a change of plea hearing before Magistrate Judge Skomal, where all pending motions were withdrawn as to Defendant Grado only. [Doc. No. 1024.] On May 23, 2013, Defendant Espudo had a change of plea hearing before this Court, where all pending motions were withdrawn. [Doc. No.
DISCUSSION
The Fourth Amendment protects the “right of people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.” U.S. Const. amend. IV. In order to invoke the protections of the Fourth Amendment, an individual must have “a justifiable, a reasonable, or a legitimate expectation of privacy that has been invaded by government action.” Smith v. Maryland,
Federal Rule of Criminal Procedure 41 “is the codified expression of Fourth Amendment law.” In re App. of U.S. for an Order Authorizing Disclosure of Location Info, of a Specified Wireless Tel.,
ECPA outlines an elaborate statutory scheme which governs electronic surveillance. Pub. L. No. 99-508, 100. Stat. 1848 (1986). ECPA addresses various areas of electronic surveillance including wire taps, tracking devices, stored wire and electronic communications, transactional records, pen registers, and trap and trace devices. Id.; see also 2011 D. Md. Application,
A portion of Title I of ECPA concerns mobile tracking devices which may move across district lines. Pub. L. No. 99-508, Title I, § 108(a), 100 Stat. 1858 (Oct. 21, 1986) (codified at 18 U.S.C. § 3117); 18 U.S.C. § 3117(a). Title I of ECPA defines the term tracking device as “an electronic or mechanical device which permits the tracking of the movement of a person or object.” 18 U.S.C. § 3117(b); see also In re App. for Pen Register and Trap/Trace Device with Cell Site Location Authority,
The Stored Communications Act (“SCA”), Title II of ECPA, covers the government’s requests for access to stored records. The SCA permits a governmental entity to “require a provider of electronic communication service or remote computing service to disclose a record or other information pertaining to a subscriber to or a customer of such service (not including the contents of communications) only when the governmental entity ... obtains a court order for such disclosure.” 18 U.S.C. § 2703(c)(1)(B). The SCA mandates that a court order may only issue “if the governmental entity offers specific and articulable facts showing that there are reasonable grounds to believe that the contents of a wire or electronic communication, or the records or other information sought, are relevant and material to an
Title III of ECPA covers pen registers and trap and trace devices. Pub. L. No. 99-508, 100 Stat. 1848, 1873 (1986) (codified as amended at 18 U.S.C. §§ 3121-27) (“Pen/Trap Statute). A pen register is “a device or process which records or decodes dialing, routing, addressing, or signaling information transmitted by an instrument or facility from which a wire or electronic communication is transmitted .... ” 18 U.S.C. § 3127(3). A trap and trace device is “a device or process which captures the incoming electronic or other impulses which identify the originating number or other dialing, routing, addressing, and signaling information reasonably likely to identify the source of a wire or electronic communication.” 18 U.S.C. § 3127(4). To install a pen register or trap and trace device, the government only needs to certify “that the information likely to be obtained [from a pen register] is relevant to an ongoing criminal investigation ” being conducted by a law enforcement agency. 18 U.S.C. § 3122(b) (emphasis added). This standard is also significantly lower than probable cause.
In 1994, Congress passed the Communications Assistance of Law Enforcement Act (“CALEA”), which explicitly prohibits service providers from disclosing the physical location of the subscriber when the government seeks the information only on the basis of the Pen/Trap Statute. 47 U.S.C. §§ 1001-1002. Section 1002 provides, in relevant part, as follows:
a telecommunications carrier shall ensure that its equipment, facilities, or services that provide a customer or subscriber with the ability to originate, terminate, or direct communications are capable of—
(2) expeditiously isolating and enabling the government, pursuant to a court order or other lawful authorization, to access call-identifying information that is reasonably available to the carrier—
(A) before, during, or immediately after the transmission of a wire or electronic communication (or at such later time as may be acceptable to the government); and
(B) in a manner that allows it to be associated with the communication to which it pertains, except that, with regard to information acquired solely pursuant to the authority for pen registers and trap and trace devices (as defined in section 3127 of Title 18), such call-identifying information shall not include any information that may disclose the physical location of the subscriber (except to the extent that the location may be determined from the telephone number) ...
47 U.S.C. § 1002(a)(2) (emphasis added).
I. Motion to Suppress Cell Site Location Data
Defendants’ argue that the cell site location data acquired by the Government in the present case must be suppressed because it was obtained in violation of Title III of ECPA and the Fourth Amendment. Defendant Grado first argues that the Government was required to obtain a warrant issued on the basis of probable cause before acquiring cell site location data. [Id. at 5-7.] Defendant Grado also contends that “[w]hen the government is seeking cell site location information, they are actually seeking tracking device information.” [Id. at 7.]
The Court first addresses whether Defendants’ motion pertains to historical and/or real-time cell site location data, as this was initially a matter of some confusion amongst the parties and the Court.
Cell site data in the present case refers to the physical location of the single primary cell site/sector at call origination and call termination for each incoming and outgoing call. [See, e.g., Doc. No. 1033-1, App. for Pen Register at 8; Doc. No. 1033-1, Order for Pen Register at 22-23.] As commonly used, “historical” cell site data refers to the acquisition of cell site data for a period retrospective to the date of the order, whereas “prospective” or “real-time” cell site data refers the acquisition of data for a period of time going forward from the date of the order.
The Government’s opposition to Defendant Grado’s motion focuses on its argument that it is not required to make a showing of probable cause prior to acquiring historical cell site location data. [Doc. No. 1033, Govt’s Opp. at 2-7.] Defendants’ reply brief highlights the fact that the Government’s opposition brief did not specifically address the portion of the motion seeking to suppress real-time cell site location data. [Doc. No. 1056, Def.’s Reply.]
Although in its opposition to Defendants’ motion, the Government presents arguments regarding historical cell site data [See, e.g., Doc. No. 1033, Govt’s Opp. at 3 (“Precedent ... overwhelmingly support the position that no search occurs in the production of historical cell-site records as occurred in this case.”) ], the Government did not actually obtain historical cell site data in this case. In fact, the Government acknowledged in its response to the Court’s request for supplemental briefing regarding historical cell site location data [Doc. No. 1154] that it did not seek and thus did not obtain an order authorizing the acquisition of historical data. [Doc. No. 1160, Govt’s Supp. Br.] During oral argument, the Government further clarified that it only obtained cell site location for periods of 60-days going forward. The Government also explained that it referred to the location data it obtained as “historical” because it was maintained by the cell phone provider, however briefly, before it was sent to the Government. Despite the Government’s arguments to the contrary, the Court will refer to location data for forward-looking periods of time as “prospective” or “real-time,” in accordance with the relevant case law. Because the
Using a combination of statutory and Fourth Amendment analysis, the majority of federal courts examining the requirements for the acquisition of real-time cell site location data mandate that the government make a showing of probable cause. See, e.g., In re App. of U.S. for an Order Authorizing Disclosure of Location Information,
B. Statutory Analysis
The Government contends that it may obtain cell site location data upon a showing of “specific and articulable facts” under the SCA. [Id. at 2-3.] The Government argues that the SCA not only applies to historical cell site data, but also to real-time cell site data, because even real-time cell site data are business records generated and stored by cell phone companies. [Id. at 3.] At oral argument on July 3, 2013, the Government contended that even real-time cell site location data is an historical record, as it is stored and maintained by the cell phone provider before it sends the data to the Government.
1. Business Records
At oral argument, the Government summarily argued that real-time cell site location data is a business record because the data is initially transferred to the cell phone provider, even if only for a few seconds, before being transmitted to the Government. As a result, the Government contended that there is no cognizable difference between historical and real-time cell site location data. However, the issue is not as straightforward as the Government implies.
The SCA states that “[a] governmental entity may require a provider of electronic communication service or remote computing service to disclose a record or other information pertaining to a subscriber to or customer of such service (not including the contents of communications).... ” Although, it does not define the term “record,” the language of the SCA makes clear that the record must pertain to a subscriber’s electronic communication service. ECPA, of which the SCA is a part, defines the term “electronic communication service” as “any service which provides to users thereof the ability to send or receive wire or electronic communications.” 18 U.S.C. § 2510(15).
Despite that real-time cell site location data may constitute information relating
Even more compelling is the structural argument against allowing access to prospective cell site data under the SCA. Unlike other titles of the ECPA, which regulate methods of real-time surveillance, the SCA regulates access to records and communications in storage. As implied by its full title (“Stored Wire and Electronic Communications and Transactional Records Access”), the entire focus of the SCA is to describe the circumstances under which the government can compel disclosure of existing communications and transaction records in the hands of third party service providers. Nothing in the SCA contemplates a new form of ongoing surveillance in which-law enforcement uses co-opted service provider facilities.
Unlike wiretap and pen/trap orders, which are inherently prospective in nature, § 2703(d) orders are inherently retrospective. This distinction is most clearly seen in the duration periods which Congress mandated for wiretap and pen/trap orders. Wiretap orders authorize a maximum surveillance period of 30 days which begins to run no later than 10 days after the order is entered. 18 U.S.C. § 2518(5). Pen/trap orders authorize the installation and use of a pen register for a period “not to exceed sixty days.” 18 U.S.C. § 3123(c)(1). By contrast, Congress imposed no duration period whatsoever for § 2703(d) orders. Likewise, Congress expressly provided that both wiretap orders and pen/trap orders may be ex ended by the court for limited periods of time. 18 U.S.C. §§ 2518(5), 3123(c)(2). There is no similar provision for extending § 2703(d) orders. Pen/trap results are ordinarily required to be furnished to law enforcement “at reasonable intervals during regular business hours for the duration of the order.” 18 U.S.C. § 3124. The wiretap statute authorizes periodic reports to the court concerning the progress of the surveillance. 18 U.S.C. § 2518(6). Again, nothing resembling such ongoing reporting requirements exists in the SCA.
Another notable omission from § 2703(d) is sealing of court records. Wiretap orders and pen/trap orders are automatically sealed, reflecting the need to keep the ongoing surveillance under wraps. 18 U.S.C. §§ 2518(8)(b), 3123(d)(1). The SCA does not mention sealing. Pen/trap orders must also direct that the service providers not disclose the existence of the order to third parties until otherwise ordered by the court. 18 U.S.C. § 3123(d)(2). Section 2705(b) of the SCA authorizes the court to enter a similar non-disclosure order, but only upon a showing of possible adverse consequences, such as “seriously jeopardizing an investigation or unduly delaying a trial.” 18 U.S.C. § 2705(b)(l-5).
Taken to ether, the presence of these provisions in other titles of the ECPA an their corresponding absence from the SCA cannot simply be dismissed as a coincidence or congressional absent*1037 mindedness. Pen registers and wiretaps are surveillance techniques for monitoring communications yet to occur, requiring prior judicial approval and continuing oversight during coming weeks and months; § 2703(d) permits access to customer transaction records currently in the hands of the service provider, relating to the customer’s past and present use of the service. Like a request for production of documents under Federal Rule of Civil Procedure-34, § 2703(d) contemplates the production of existing records, not documents that may be created at some future date related to some future communication. That is the most obvious explanation why the SCA makes no mention of surveillance periods, extensions periodic reporting, or sealing. If Congress had not intended the SCA to be retrospective in nature, it would have included the same prospective features it built into the wiretap and pen/trap statutes.
Id. at 760-61; see also 2005 E.D.N.Y Application,
Furthermore, § 2703 only authorizes a court to enter an order to turn over data that exists at the time the order is issued, and not data as it is captured. First, the language of the statute contemplates records that are already in existence through the use of the present tense. It states that a court may issue an order requiring the disclosure of records on the basis of the government’s showing that the requested items “are relevant and material to an ongoing investigation.” 2005 E.D.N.Y Application,
Finally, taking the Government’s argument that real-time cell site location data is an historical record to its logical end would lead to perverse results. For example, real-time acquisition of the contents of conversations could be described as stored in the same way that real-time cell site data is under the Government’s theory. The Government could then try to use § 2703(a), which permits it to acquire the contents of wire or electronic communications that have been in storage for 180 days or less under Rule 41, to circumvent the additional requirements of Title III. Id. at 313-14.
Accordingly, the Court declines to adopt the Government’s theory that real-time cell site location data are business records under the SCA.
2. Hybrid Theory
The “hybrid theory” is one that has been commonly put forth by the government when seeking real-time cell site location data. Although the Government in the present case contended that it obtained this data under the SCA, and did not explicitly mention the hybrid theory, the Court nevertheless considers this theory in an abundance of caution, as the hybrid theory is premised on the authority of the SCA being combined with the Pen/Trap Statute.
This theory argues for statutory authority to obtain real-time cell site location data using a combination of the SCA, 18 U.S.C. § 2701 et seq., and the Pen/Trap Statute, 18 U.S.C. § 3121 et seq., to overcome the restrictions of CALEA, 47 U.S.C. § 1001 et seq. See, e.g., 2006 S.D.N.Y. Application,
Several courts have addressed this issue of whether a combination of the Pen/Trap Statute and the SCA allow the government to obtain real-time cell site data without a showing of probable cause. Although the scope of the data sought differs slightly between the cases,
A significant majority of courts have rejected the hybrid theory and has found that real-time cell site location data is not obtainable on a showing of less than probable cause. See, e.g., In re App. of U.S. for an Order for Prospective Cell Site Loca
Under the Pen/Trap Statute, “pen register” is defined as “a device or process which records or decodes dialing, routing, addressing, or signaling information transmitted by an instrument or facility from which a wire or electronic communication is transmitted.... ” 18 U.S.C. § 3127(3). Absent any other statutory provisions, cell site data may be obtained pursuant to the Pen/Trap Statute as this data constitutes signaling information.
However, CALEA states: “[W]ith regard to information acquired solely pursuant to the authority for pen registers and trap and trace devices ... call-identifying information shall not include any information that may disclose the physical location of the subscriber.... ” 47 U.S.C. § 1002(a)(2). As cell site location data would disclose the physical location of a subscriber, CALEA clearly prohibits the government from obtaining it solely on the authority of the Pen/Trap statute. See United States v. Powell,
The hybrid theory generally attempts to overcome CALEA’s hurdle by combining the authority of the Pen/Trap Statute with the SCA, as CALEA is not a blanket prohibition on the disclosure of physical location, but only a prohibition on disclosure solely pursuant to the Pen/Trap Statute. In 2005 S.D.N.Y Application, the Magistrate Judge accepted the hybrid theory and concluded that cell site location data could be obtained by use of the SCA in conjunction with the Pen/Trap Statute. 2005 S.D.N.Y. Application,
[Sjection 2703 [SCA] is the most obvious candidate to be used in combination with the Pen Register Statute to authorize the ongoing collection of cell site information because it covers cell site information generally. Section 2703’s absence of procedural provisions that*1040 typically attach to the transmission of ongoing information is explained by the fact that the pen register is the proper ‘device’ to obtain cell-site information. Thus, the Pen Register Statute’s procedural provisions that are tied to such a device are appropriately combined with an application under section 2703 to obtain such information.
Id.
Courts have examined two variants of the hybrid theory. In 2006 S.D.N.Y. Application, the district court endorsed a permutation of the hybrid theory that relied on the finding that real-time cell site location data is a stored, historical record. Id. at 459-60. As this Court has already rejected the Government’s argument that real-time cell site location data is a stored, historical record, the Court rejects the variant of the hybrid theory propounded in 2006 S.D.N.Y. Application.
A second variant of the hybrid theory does not rely on real-time cell site location data being a “record” under the SCA. This variant, addressed by the Magistrate Judge in 2005 S.D.Tex. Application,
The Court disagrees with the reasoning in 2006 S.D.N.Y. Application that the word “solely” reflects Congress’s intent to authorize acquisition of real-time cell site data using this combination of statutes, specifically, the Pen/Trap Statute and the SCA. See 2006 D.D.C. Application,
The Court begins with the first rule of statutory interpretation which counsels consulting the express language of the statute. See Williams v. Taylor,
One would assume that if Congress wanted judges to grant the disclosure of real time cell site data by importing the procedural rules and safeguards of a statute that Congress directed not be used to authorize the disclosure of prospective cell site location data (the Pen Register statute) into a statute and under a standard that Congress specifically reserved for the production of historical telephone records (the SCA), Congress could have and would have clearly said so. Congress did not. “The familiar ‘easy-to-say-so-if-that-is-what-was-meant’ rule of statutory interpretation has full force here.” Comm’r of Internal Revenue v. Beck’s Estate,129 F.2d 243 , 245 (2d Cir.1942).
2006 W.D.N.Y. Application,
Because the statutory language is far from clear, the Court consults legislative history. Heppner v. Alyeska Pipeline Serv. Co.,
During congressional deliberations on CALEA, in response to the concerns of “privacy-based” groups over the access of law enforcement to call setup information which could permit tracking of subscribers, Federal Bureau of Investigation (“FBI”) Director Louis Freeh (“Director Freeh”) explicitly stated that physical location data could not be disclosed through the use of a pen register or trap and trace device. Director Freeh stated:
The term “call setup information” is essentially the dialing information associated with any communication which identifies the origin and destination of a wire or electronic communication obtained through the use of a pen register or trap and trace device pursuant to court order. It does not include an information which might disclose the general location of a mobile facility or service, beyond that associated with the area code or exchange of the facility or service. There is no intent whatsoever, with reference to this term, to acquire anything that could properly be called “tracking” information ....
Law enforcement’s requirements set forth in the proposed legislation include an ability to acquire “call setup information.” This information relates to dialing type information — information generated by a caller which identifies the origin, duration, and destination of a wire or electronic communication, the telephone number or similar communication address. Such information is critical to law enforcement and, historically, has been acquired through use of pen register or trap and trace devices pursuant to court order.
Several privacy-based spokespersons have criticized the wording of the definition regarding this long-standing requirement, alleging that the government is seeking a new, pervasive, automated “tracking” capability. Such allegations are completely wrong.
In order to make clear that the acquisition of such information is not being sought through the use of a pen register or trap and trace device, and is not included within the term “call setup information” we are prepared to add a concluding phrase to this definition to explicitly clarify the point: except that such information (call setup information) shall not include any information that may disclose the physical location of a mobile facility or service beyond that associated with the number’s area code or exchange.
Statement of Louis J. Freeh, Director, FBI, Before the Senate Judiciary Sub-
Furthermore, Director Freeh’s statement makes clear that he did not believe CALEA relates to the SCA:
[A]s is clearly set forth in the “purpose” section of the proposed legislation, the intent of the legislation is to maintain existing, technical capabilities and to “clarify and define the responsibilities of common carriers ... to provide the assistance required to ensure that government agencies can implement court orders and lawful authorizations to intercept the content of wire and electronic communications and acquire call setup information under Chapters 119 and 206 of Title 18 and Chapter 36 of Title 50.11.[”] These chapters have nothing to do with “transactional information” under our federal electronic surveillance and privacy laws. All telecommunications “transactional” information is already protected by federal law and, is exclusively dealt with in Chapter 121 of Title 18 of the United States Code [SCA], The proposed legislation does not relate to Chapter 121 of Title 18.
Statement of Director Freeh, at *27-28 (emphasis added); see also 2005 E.D.N.Y. Application,
Furthermore, the House Report on CA-LEA, reaffirmed Direct Freeh’s statements regarding its intent to preclude location information from being obtained using the authority for pen registers and trap and trace devices:
In the eight years since the enactment of ECPA, society’s patterns of using electronic communications technology have changed dramatically.
Therefore, [CALEA] includes provisions, which FBI Director Freeh supported in his testimony, that add protections to the exercise of the government’s current surveillance authority. Specifically, the bill ... [ejxpressly provides that the authority for pen registers and trap and trace devices cannot be used to obtain tracking or location information, other than that which can be determined from the phone number. Currently in some cellular systems transactional data that could be obtained by a pen register may include location information.
H.R. Rep. 103-827 at 17, reprinted at 1994 U.S.C.C.A.N. 3489, 3497 (Oct. 4, 1994) (emphasis added).
Finally, the Court’s rejection of the hybrid theory does not impermissibly read the word “solely” out of CALEA. See 2006 S.D.N.Y.App.,
In light of Director Freeh’s testimony that location data is not obtainable under the Pen/Trap Statute and that CALEA did not relate to the SCA, the Court cannot accept the hybrid theory.
Upon review of the statutory scheme, the Court finds that an application for real-time cell site location data does not implicate any statute regulating search or seizure or special circumstances. Accordingly, the terms of Rule 41 govern in the present case. See 2005 E.D.N.Y. Application,
3. Tracking Device
In their motion, Defendants also argue that “[w]hen the government is seeking cell site location information, they are actually seeking tracking device information.” [Doc. No. 1002-1, Def’s Mot. at 7.] The Court need not address this tracking device argument as the Court has already found that a warrant based on probable cause warrant is required to obtain real-time cell site location data.
C. Fourth Amendment
Defendants also argue that the acquisition of cell site location data without a warrant requiring a showing of probable cause violated their Fourth Amendment Rights, and therefore must be suppressed. [Doc. No. 1002-1, Def’s Mot. at 5-6.] Because the Court concludes that statutory authority for obtaining real-time cell site location data on a showing of less than probable cause is lacking, the Court declines to proceed to the Fourth Amendment analysis.
D. Good Faith Exception
Even though the Court finds that Government is required to show probable cause prior to obtaining real-time cell site location data, which it did not do in the present case, the evidence may nevertheless be admissible under the good faith exception.
The exclusionary rule was adopted as a “judicially created remedy designed to safeguard Fourth Amendment rights generally through its deterrent effect. ...” United States v. Calandra, 414
Starting from the premise that the exclusionary rule is a judicially created remedy, the Supreme Court created a good faith exception to the application of the exclusionary rule in United States v. Leon,
“[T]he Supreme Court has identified at least four situations in which reliance on a warrant cannot be considered objectively reasonable, and therefore the good faith exception cannot apply: (1) when the affiant knowingly or recklessly misleads the judge with false information; (2) when the judge wholly abandons his or her neutral role; (3) when the affidavit is so lacking in indicia of probable cause that official belief in its existence is objectively unreasonable; and (4) when the warrant is so facially deficient that executing officers cannot reasonably presume it to be valid (i.e. it fails to specific the place to be searched or the things to be seized).” Luong,
In this case, the Government’s reliance on the SCA and the Magistrate Judges’ orders granting the applications was objectively reasonable. First, the Government’s reliance on the SCA was reasonable. Acts of Congress are entitled to a strong presumption of constitutionality. United States v. Watson,
The Government’s reliance on the Magistrate Judges’ orders was also objectively reasonable. The Magistrate Judges approved the Government’s applications. See Leon,
Finally, Defendants do not raise any of the exceptions to the good faith exception. On independent examination of the exceptions, the Court finds that none of them apply to the present case. Accordingly, even though the Government did not obtain a warrant based on probable cause prior to seeking real-time cell site location data, which this Court finds is required, this evidence is nonetheless admissible under the good faith exception. The Court DENIES Defendants’ motion to suppress cell site location data.
II. Motion to Suppress Simulated Cell Site Data
Defendants also seek to suppress simulated cell site evidence. [Doc. No. 1002, Def.’s Mot] In its opposition brief, the Government requests that the Court deny the motion to suppress simulated cell site evidence as moot because “no data from any attempted uses of cell-site simulators were utilized to further the investigation and no such data will be introduced at trial by the Government.” [Doc. No. 1033, Govt’s Opp. at 7-8.] In support, the Government cites a declaration by Special Agent Mathew Zeman who states that “[he is] familiar with attempts to utilize cell-site simulators .... ” and that “[n]one of these attempts produced data that was utilized to further the investigation.” [Doc. No. 1004-1, Zeman Bed. at 4, ¶ 7.] Because the Government will not introduce simulated cell site data at trial and because no data from attempted uses of cell-site simulators were used to further the investigation, the Court DENIES AS MOOT Defendants’ motion to suppress simulated cell site data.
CONCLUSION
In light of the foregoing, the Court DENIES Defendants’ motion to suppress cell site location data on the basis of the good faith exception. The Court DENIES AS MOOT Defendants’ motion to suppress simulated cell site data.
IT IS SO ORDERED.
Notes
. Courts generally use both "prospective” and "real-time” interchangeably to refer to this type of data. This Court will use "real-time” except when quoting other cases which use “prospective.”
. Some cases focus on the scope of the data sought as a factor that differentiates various applications for cell site location data. See, e.g., 2006 W.D.La. Application,
The degree of precision provided by real-time cell site location data depends on multiple variables related to the type and frequency of such data. With regard to the type of data provided, data from a single tower indicates that a cell phone was within the range "covered” by that tower, providing a location within a diameter varying from many miles in rural or suburban areas to several hundred feet in urban areas. In re Application of U.S. for an Order for Prospective Cell Site Location Info, on a Certain Cellular Tel.,
With regard to the frequency of real-time location data points, information may be limited to the initiation or termination of each call sent from or received by a phone, may consist of much more frequent periodic information produced every several seconds by normal functions of a phone whenever it is turned “on,” or may be artificially induced whenever law enforcement sends a signal to the target phone (also referred to as "pinging”). Id. at 766-67, at *3; Stapleton, supra at 389.
For example, 2005 S.D.N.Y. Application distinguishes its situation where it granted the government's application seeking data only when telephone calls are made and from only one cell tower, with other cases where the government sought more precise triangulated data. Id. at 437-38. In this section, the Court considers the statutory authority for the Government’s acquisition of real-time cell site data in this section, and not constitutional authority. Under the Court's reasoning, the scope of the data sought does not affect the statutory analysis. See In the Matter of the App. of the U.S. for Orders Authorizing the Installation and Use of Pen Registers and Caller Identification Devices on Tel. Nos. [Sealed] and [Sealed],
. The term "signaling information” was added by the USA PATRIOT Act in 2001. See Pub. L. No. 107-56, § 216(c)(2), 115 Stat. 272, 290 (2001).
