ORDER DENYING MOTION TO SUPPRESS BY DEFENDANTS CARLOS POWELL (D-l), ERIC POWELL (D-2), EARNEST PROGE (D-5), TOBIAS PROGE (D-6), TAMIKA TURNER (D-8), MARGARITA DE VALLEJO (D-10), BENNY WHIG-HAM (D-ll), AND DONALD WILSON (D-12) (docket no. 7h)
TABLE OF CONTENTS
INTRODUCTION...............................................................764
LEGAL STANDARD............................................................764
BACKGROUND................................................................765
DISCUSSION..................................................................765
I.Standing 765
II. Real-Time Cell-Site Location-Data Warrants....................... 766
A. Technical Background........................................ 767
B. Legal Standards............................................. 768
1. History of Real-Time Cell-Site Location-Data Authorization. 768
2. Statutory Authorities..................................... 768
a. Pen Registers and Trap-and-Trace.................... 769
b. Stored Communications Act.......................... 769
c. Tracking Devices under 18 U.S.C. § 3117 ............... 769
d. Wiretaps............................................ 769
3. Judicial Precedent...................................... 770
a. Cases in Which Probable Cause Is Required............. 770
b. Cases Holding That Less Than Probable Cause Is Required......................................... 771
4. United States v. Skinner................................. 773
a. Skinner Distinguished............................... 773
C. Conclusion and Findings of Law.............................. 775
1. Fourth Amendment Implications.......................... 775
2. Statutory Analysis...................................... 777
3. Probable Cause Showing for Real-Time Cell-Phone Tracking 778
4. Limitations of the Standard.............................. 780
D. Probable Cause for the March 11, 2010 Warrant................ 780
1. Summary of the March 11, 2010 Donovan Affidavit.......... 781
2. Probable Cause Analysis................................. 782
3. Good Faith Exception................................... 783
III. Warrantless Use of GPS Tracking Devices/Traffic Stops 784
A. GPS tracking device........................... 785
1. Technical Background...................... 785
2. GPS Tracker Installation and Re-Installation.. 785
3. Constitutionality of the GPS tracker.......... 786
B. The Traffic Stops.............................. 787
1. Legal Standards........................... 787
2. Analysis.................................. 788
a. Whigham Traffic Stop .................. 788
b. Valle Traffic Stop...................... 789
e. Proge Traffic Stop ..................... 790
d. de Vallejo Traffic Stop.................. 790
IV. Warrants Issued for the Search of Nine Detroit Properties 791
CONCLUSION 793
ORDER 793
INTRODUCTION
This is a criminal drug prosecution. Defendants are charged with various drug dealing, firearms, and money laundering offenses. 21 U.S.C. §§ 841(a)(1) and 846; 18 U.S.C. §§ 924(c)(1) and 1956. The government contends that the defendants operated a large scale drug trafficking ring in Detroit and, among other things, imported large quantities of cocaine and heroin into the city.
In April 2012, eight of the fourteen defendants filed a Motion to Suppress Evidence and Request for an Evidentiary Hearing. See Mot. to Supress, ECF No. 74; see also Notices of Joinder/Concurrence, ECF Nos. 81, 87, 88, 94. The Court held a hearing on the motion on December 18, 2012. On January 4, 2013, the Court issued an order (1) making a preliminary finding that defendants Carlos Powell and Eric Powell had standing to contest admission of the evidence challenged in the motion; (2) denying the motion as to the challenged pen-register and trap-and-trace evidence; and (3) ordering an evidentiary hearing regarding federal agents’ use of a GPS tracking device without a warrant during the investigation. See Order Denying in Part Mot. to Suppress (“Order”), ECF No. 167. The Court conducted the evidentiary hearing on January 17, 2013 and February 12, 2013. For the reasons stated at the hearing and explained below, the Court will deny the remainder of the motion to suppress in full.
LEGAL STANDARD
The Fourth Amendment provides that “[t]he right of the people to be secure ... against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” U.S. Const, amend. IV. The Amendment protects “people — and not simply ‘areas’ — against unreasonable searches and seizures.” Katz v. United States,
BACKGROUND
On April 15, 2012, defendants Carlos Powell (D-l), Eric Powell (D-2), Earnest Proge (D-5), and Benny Whigham (D-ll) filed a Motion to Suppress and Request for an Evidentiary Hearing. Following the motion, co-defendants Margarita de Vallejo (D-10), Tobias Proge (D — 6), Tamika Turner (D-8), and Donald Wilson (D-12) filed notices of joinder and concurrence. See Notices of Joinder/Concurrence.
Defendants challenge the admission of the following the evidence:
(1) Pen-register and trap-and-trace data acquired via orders issued over a nine-month period, for cellular telephones used by Carlos Powell, Eric Powell, and Juan Valle. The Court denied Defendants’ motion to suppress this evidence on January 4, 2013. Order at 13.
(2) Real-time cell-site location data acquired via Criminal Rule 41 search warrants issued between March 11, 2010 and October 5, 2010, for six cellular telephones. See Fed.R.Crim.P. 41.
(3) Location data acquired over a period of several months through the warrantless use of a GPS tracking device affixed to vehicles owned and operated by Carlos Powell and Eric Powell.
(4) Evidence seized during the warrant-less search of vehicles belonging to Benny Whigham, Juan Valle, Earnest Proge, and Margarita de Vallejo, incident to traffic stops.
(5) Evidence seized during the search of nine properties in the Detroit metro area, pursuant to search warrants.
DISCUSSION
I. Standing
Fourth Amendment rights “may not be vicariously asserted.” United
Because of the “omnibus” nature of the motion to suppress, which was filed collectively by eight defendants and challenges dozens of searches and seizures of many different (moving and non-moving) defendants’ properties, the Court initially questioned whether each moving defendant had standing to challenge the searches at issue. The government argued that, because the cell phones, vehicles, and properties in dispute were not the co-property of all Defendants, only a few of the defendants — those with direct privacy interests in the things searched — have the ability to challenge the evidence at issue.
In its January 4, 2013 Order, the Court analyzed the standing question at some length. The Court concluded that Defendants do not challenge each search directly as unconstitutional. Rather, Defendants directly challenge the cell phone location and vehicletracking searches as unconstitutional, and then argue that evidence seized in every subsequent search was the “fruit” of those initial unconstitutional searches, and therefore inadmissible. Because Carlos and Eric Powell owned the cell phones and vehicles at issue, the Court concluded that they have standing to challenge all the searches at issue in the motion, either directly or derivatively. Order at 7 (citing Wong Sun v. U.S.,
At the January 17, 2013 hearing, the government raised an additional argument that, with respect to the GPS tracking device affixed to Eric Powell’s truck, Powell was the truck’s sole owner and operator, and therefore the only defendant with standing to challenge the search. See Hr’g Tr., Jan. 17, 2013 at 6 (“Hr’g I”), ECF No. 176. The Court offered the opportunity for additional written argument on the issue, and, after examining two letters from counsel and various exhibits, the Court, for the reasons stated on the record at the February 12, 2013 hearing, found that Carlos Powell also has standing to challenge the search of the truck, and resolved the procedural questions relevant to the issue. See Hr’g Tr., Feb. 12, 2013 (“Hr’g II”), (No ECF Citation yet available).
The Court will now address the motion to suppress with respect to each remaining category of evidence: (1) the cell-site location data; (2) the location data derived from the use of a GPS tracking device; (3) evidence seized during traffic stops of Whigham, Valle, Proge, and de Vallejo’s vehicles; and (4) evidence seized during the search of nine properties in the Detroit area.
II. Real-Time Cell-Site Location-Data Warrants
Defendants challenge search warrants authorizing' collection of real-time cell-site location data from six cellular telephones owned by Carlos Powell, Eric Powell, and Juan Valle. The collection of real-time cell-site location data gives the government the ability to learn and follow the actual
A. Technical Background
Every cellular telephone is capable of being located in one of two ways: by cell-site tracking, or by GPS signal locating. The first, cell-site tracking, exploits a cell phone’s need to connect to a cellular network. To function, a cell phone must be in contact with a cell tower to transmit calls, text messages, and the like. A cell phone, once activated, will automatically search for the closest cell tower. Once the phone locates a tower, it submits a unique identifier — its “registration” information — to the tower so that any outgoing and incoming calls can be routed through the correct tower. This search and submission of information occurs every several seconds. If a signal to or from a tower changes strength, or the cell phone moves, the cell phone may.switch its registry to a different tower. See Timothy Stapleton, Note, The Electronic Communications Privacy Act and Cell Location Data, 73 Brook. L.Rev. 383, 387 (2007). This fact, combined with the fact that in a typical urban environment, a cell phone will be in range of and submit information to several cell towers simultaneously, makes it possible to calculate a cell phone’s location within anywhere from several blocks to a few feet using the mathematical process of “multilateration.”
More recently, most “smart” phones now come equipped with GPS locators, often for mapping applications, that can identify a phone’s location by using a built-in GPS device. By obtaining the GPS device’s information, an even more precise record of the cell phone’s location may be obtained without resorting to “multilateration” calculations'. See Susan Freiwald, Cell Phone Location Data and the Fourth Amendment: A Question of Law, Not Fact, 70 Md. L.Rev. 681, 713 (2011). In both the “cell-site location” or “GPS location” situations, the government can either track a person in real-time using live registration or GPS data, known as “prospective” records; or compile a list of a person’s recent movements with their cell phone, known as “historic” records. See Stapleton, supra, at 388. In either case, if a cell phone is not turned on, it cannot transmit any data.
For the purposes of the remainder of this opinion and order, the Court will refer to cellphone location data gathered in real
B. Legal Standards
Defendants challenge all of the search warrants for cell-site and GPS location data, but their primary challenge is to the March 11, 2010 warrant authorizing collection of real-time cell-site location data for the phone number (313) 529-5848, subscribed to by Carlos Powell. Defendants argue that the warrant was not supported by probable cause, and the subsequent warrants are the “fruit of the poisonous tree” of that original warrant.
Before discussing the March 11, 2010 warrant application, the Court will consider the antecedent question of what legal standard applies to a government application to obtain real-time cell-site location data, and what showing, if any, the government must make to acquire the data. As set forth below, the Court concludes that the government must establish probable cause for long-term, real-time tracking of an individual via his cell phone, and that a specific showing must be made to establish probable cause for such tracking.
1. History of ReaL-Time Cell-Site Location Data Authorization
The act of tracking an individual’s movements in real time is neither new, nor dependent on modern technology. The tried-and-true method of simply following a suspect on foot stretches back many years; real-time tracking of John Dillinger’s associates in the 1930s occurred when FBI agents sat in cars and restaurants following their quarry. Thirty years ago, long before cell phones became common, the Supreme Court held in United States v. Knotts,
2. Statutory Authorities
The government may lawfully acquire many different types of data from electronic devices like cell phones, from as little as a phone’s subscriber information to as much as the contents of conversations between two people. Currently, federal statutes authorize four means of collecting such data: pen-register and trap- and-trace devices, access to stored communications, the use of tracking devices, and real-time communication intercepts (a.k.a.“wiretaps”). Wiretapping authority was first authorized as part of the Omnibus Crime Control and Safe Streets Act of 1968, P.L. 90-351, 82 Stat. 197; the remaining authorizations are part of the Electronic Communications Privacy Act
a.Pen Registers and Trap-and-Trace
Pen-register and trap-and-trace orders are the most easily obtainable. As discussed in the Court’s January 4 Order, a pen-register/trap-and-trace (“pen/trap”) order captures the incoming and outgoing numbers dialed by a phone (or other such non-communication-content data transmitted by electronic devices). To obtain this information, the government need only certify that “the information likely to be obtained by [ ] installation [of a pen register or trap and trace device] and [its] use is relevant to an ongoing criminal investigation.” See 18 U.S.C. §§ 3122(b)(2) and 3123(a)(1); see also Michigan Bell Tel. Co. v. United States, 565 F.2d 385, 388 (6th Cir.1977).
b.Stored Communications Act
Acquisition of stored electronic communications (including stored internet communications and cell-phone subscriber records) is governed by the Stored Communications Act (“SCA”). See 18 U.S.C. §§ 2701-2712. The SCA generally prohibits providers of electronic communication services or remote computing services from disclosing information to the government, and provides three ways for the government to obtain records. For records and communications created less than 180 days before the date of application, the government must obtain a search warrant to retrieve the information. See 18 U.S.C. § 2703(a). For older records and communications, the government must obtain a court order based on “specific and articulable facts” that provide “reasonable grounds to believe that the contents of a wire or electronic communication, or the records or other information sought, are relevant and material to an ongoing criminal- investigation.” See 18 U.S.C. § 2703(d); Warshak v. United States,
c.Tracking Devices under 18 U.S.C. § 8117
A “tracking device” is an “electronic or mechanical device which permits the tracking of the movement of a person or object.” 18 U.S.C. § 3117(b). The beepers discussed in Knotts are one example. See Knotts,
d.Wiretaps
Finally, the authority to use wiretaps— government interception of real-time communications, such as the voices on a call or the text in an instant message — is codified at 18 U.S.C. §§ 2510-2522, also known as “Title III” for its place in the 1968 Act. See United States v. Alfano,
3. Judicial Precedent
Federal courts considering issues involving real-time cell-site location data usually follow one of two approaches. The majority of jurisdictions require the government to make a probable-cause showing to obtain real-time cell-site location data. While some courts also require the same showing for historic cell-site location data, most other courts find that historical location data are “stored communications” and may be obtained on a lesser “relevant to an ongoing criminal investigation” showing. The minority of jurisdictions do not accord any protection to cell-site information, or they authorize the use of such information on a showing of less than probable cause. And, finally, some jurisdictions have not addressed the issue,
a. Cases in Which Probable Cause Is Required
Of the courts that have addressed the issue, a significant majority have required the government to make a showing of probable cause before obtaining real-time cell-site information. One of the first major decisions to address the issue of cell-site location information was In re Authorizing the Use of a Pen Register,
The court granted the government’s motion for reconsideration of its original decision. See In re Application of the U.S. for an Order (1) Authorizing the Use of a Pen Register & a Trap & Trace Device,
Notably, the court did not specifically hold that Fourth Amendment protections apply to cell-site information, see id. at 323, or that the probable-cause standard would necessarily suffice in the future, and the court declined to address whether a “super-warrant” requirement for the information was appropriate. See id. at 322. The procedural posture of the case obviated any requirement for the court to directly decide the extent of the privacy interests at stake; the court merely considered an application to obtain data, and therefore considered the issues before any information was gathered.
Five years later, the same court extended Fourth Amendment protection to historic cell-site information. In re Application of the United States for Historical Cell Site Data,
Several other jurisdictions agree that cell-site information may not be obtained by the government absent some showing of probable cause. See, e.g., In re Application of the United States for an Order Authorizing the Disclosure of Prospective Cell Site Information, No. 06-MISC-004,
b. Cases Holding That Less Than Probable Cause Is Required
A minority of jurisdictions either do not recognize any protection for cell-site information, or authorize the release of information on a showing of less than probable cause. See, e.g., People v. Hall, 14 Misc.3d
Although courts finding probable cause usually reject the theory that the disclosure of cell-phone information by a third party, such as a phone company, voids any privacy protection, at least a few courts taking the minority approach have employed the theory. See, e.g., United States v. Dye, No. 1:10-CR-221,
Similarly, the district court in United States v. Suarez-Blanca, No. 1:07-CR-0023-MHS/AJB,
Other courts draw a sharp distinction between historical and prospective cell-site information and grant access to the former through the SCA. See United States v. Graham,
In many of the above cases, the government advanced a “hybrid theory” for why a showing of less than probable cause is required to obtain cell-site information. The “hybrid theory” combines the authorities of the SCA with the pen-register statute to authorize cellsite location data by reasoning that, although 47 U.S.C. § 1002(a)(2) prevents collection of location data via the pen / trap statute alone, the term “solely” implies that the government may acquire data when combined with an
4. United States v. Skinner
On August 14, 2012, the United States Court of Appeals for the Sixth Circuit issued United States v. Skinner,
In reaching its decision, the Sixth Circuit relied directly on Knotts’ holding that “[a] person traveling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements from one place to another.” Id. at 778 (citing Knotts,
The Sixth Circuit also relied on its decision in United States v. Forest, in which the court determined that DEA agents’ actions of dialing a suspect’s telephone number and then quickly hanging up in order to obtain location data from the suspect’s phone was not a search under the Fourth Amendment. Forest,
Finally, the court distinguished United States v. Jones, the Supreme Court’s recent decision addressing use of GPS tracking devices, noting that “the DEA agents only tracked Skinner’s cell phone for three days,” in contrast to the “intensive monitoring over a 28-day period” that took place in Jones. Id. at 780 (quoting Jones,
a. Skinner Distinguished
Although Skinner’s facts resemble the case here — both cases involve a major drug trafficking investigation and real-time cell-site location data tracking — Skinner is distinguishable for two key reasons.
First, Skinner is clearly different from this case with respect to the duration of the government’s tracking. In Skinner, the DEA tracked the defendant for three days. In this case, the government secured tracking data for multiple cell phones over the course of half a year, from
Second, Skinner relied on the Knotts and Forest line of cases and their rationales to find that use of a tracking device on a public thoroughfare was permissible. Skinner’s holding applied to “tracking] a known number that was voluntarily used while traveling on public thoroughfares ...” Id. at 781 (emphasis added) (also stating “the monitoring of the location of the contraband-carrying vehicle as it crossed the country is no more of a comprehensively invasive search than if the car was identified in Arizona and then tracked visually ... as the vehicles progressed”). This basis for distinguishing the instant case from Skinner is related to the first. It is true that the functional impact on privacy of a police officer following a suspect on a highway in an unmarked police car, or using cell-phone technology to do the same, is minimal. And it appears that the agents in Skinner collected cell-site location data only while the suspect was on public thoroughfares. Here, however, real-time cell-site location data was collected for more than half a year. The government concedes, and DEA Special Agent Edward Donovan’s testimony and the affidavits on file confirm, that the cell phones were tracked for a significant amount of time during the investigation. See June 17 Donovan Aff. at ¶ 64, ECF No. 74-7; Hr’g I at 33. Given the duration and intensity of the tracking, it cannot be reasonably argued that only public-thoroughfare data was collected. The government certainly collected cell-site data emanating from within the defendants’ homes or from another place in which the defendants had a legitimate expectation of privacy.
At this point, the analogy between cellphone tracking and visual surveillance breaks down. In United States v. Karo,
had a DEA agent thought it useful ... to verify that the ether was actually in the house and had he done so surreptitiously and without a warrant, there is little doubt that he would have engaged in an unreasonable search within the meaning of the Fourth Amendment. For purposes of the Amendment, the result is the same where, without a warrant, the Government surreptitiously employs an electronic device to obtain information that it could not have obtained by observation from outside the curtilage of the house.
Id. at 715,
Based on these distinctions, the Court finds that the issues in Skinner are distin
C. Conclusion and Findings of Law
After a careful review of the statutes and decisions set forth above, the Court makes the following findings.
1. Fourth Amendment Implications
First, the public-thoroughfare distinction employed in Knotts and Skinner does not fully address all legal issues presented when, as here, the government seeks to acquire realtime cell-site location data for prospective periods as long as thirty-to-forty-five days or more — tracking for a period of time long enough to monitor an individual in a protected area. Skinner explicitly stated that Jones does not limit or overrule Knotts or Karo. Skinner,
The Court’s concern here was addressed by the Supreme Court in Kyllo v. United States,
Kyllo raised another issue implicated by real-time cell-site tracking warrants. In Kyllo, the Court rejected the argument that the government could restrict its thermal searches to non-“intimate” details based on the practical observation that “[n]o police officer would be able to know in advance whether his through-the-wall surveillance picks up ‘intimate’ details— and thus would be unable to know in ad
Special Agent Donovan stated that the same day that he secured the warrant here, he began to “chase” the phone by pinging it and receiving location information. Hr’g I at 87. Although the information led Donovan to a suspect driving a truck, he could not have known in advance that the phone would not instead have been pinged in a suspect’s bedroom. See also In re Application of United States for an Order Authorizing Disclosure of Location Information,
The Court’s Fourth Amendment concerns also overlap with those expressed by the D.C. Circuit in Maynard, and in the Jones concurrences. See Maynard,
For these reasons, the Court finds that when the government requests authorization to engage in long-term, real-time tracking of an individual’s movements via his or her cell phone, the situation reaches
2. Statutory Analysis
It is also apparent that the statutory authority relevant to pen-register/trap- and-trace devices, stored communications, tracking devices, and wiretaps is not applicable to cellphone tracking.
First, the information sought here is clearly location data and the government therefore cannot acquire it solely on the authority of the pen/trap statute, 47 U.S.C. § 1002(a)(2). See generally In re Application of U.S. for Order,
Moreover, a cell phone is not a “tracking device” as defined by 18 U.S.C. § 3117. First, a cell phone is not a government-owned-and-installed device. Instead, it is a personal communications device that an individual purchases and owns. The statutory language of § 3117 specifically contemplates government installation: “[i]f a court is empowered to issue a warrant or other order for the installation of a mobile tracking device ...” 18 U.S.C. § 3117(a); see generally In re Application of the United States for an Order ...,
Third, there is cause for a firm distinction between historic location data, and live, realtime location data that enables real-time location monitoring. See, e.g., In re Applications of United States for Orders Pursuant to Title 18, U.S. Code Section 2703(d),
Finally, real-time cell-site location data are also not “communications” subject to Title Ill’s heightened procedures for intercepting communications via wiretap. While information regarding an individual’s location is a “communication” in some sense of the term, so are the numbers dialed in and out of a telephone. In either case, however, that location information is not the “content” of actual communications intended to be protected by Title III wiretapping authority. See generally In re Application for Pen Register and Trap/ Trace Device with Cell Site Location Authority,
3. Probable Cause Showing for RealrTime Cell-Phone Tracking
In the absence of a definitive statutory niche for prospective cell-phone tracking, and in light of the considerable, and distinctive, privacy concerns raised by long-term, real-time cell-site tracking discussed above, scrutiny of the appropriate probable-cause showing in these cases is called for. The Court concludes that a specific showing is required to establish probable cause when the government seeks a warrant for long-term real-time tracking of an individual via a cell phone. Such a showing should include facts supporting, at least, the following:
First, that the actual location of the person the government intends to track via the cell phone is relevant to the investigation of the ongoing crime, or evidence sought. That is, if the government intends to track an individual over a long period of time, and cannot show that the individual will be, for example, in public, non-protected locations for the duration of the tracking, then the warrant application should set forth facts that warrant intrusion into protected locations that the individual may frequent. In other words, the government should set forth a probable-cause basis for following the individual into protected areas via the individual’s personal cell phone.
It is true that, in a sense, a person’s location is in some way always relevant to his potential participation in a crime. And, a person does not have a general privacy interest in his location. But before the government may use an individual’s cell phone to track him into areas in which an individual does have a reasonable expectation of privacy, the government should show more than that the person is suspected of a crime; the government should show that the person’s location in the protected area is in some way relevant to the ongoing investigation of criminal activity. See generally United States v. Frazier,
Second, the government should show that the specific cell phone, as well as the person to be tracked, is relevant to the investigation. That is, the government must show there is a nexus between the cell phone, the suspect, and the information sought. See generally United States v. Carpenter,
In sum, because “the belief that the items sought will be found at the location to be searched must be supported by less than prima facie proof but more than mere suspicion,” to establish probable cause for long-term, real-time, cell-site tracking, the government should have to demonstrate a nexus between a suspect and the phone, the phone and the criminal activity, as well as the criminal activity and suspect’s location in protected areas, rather than merely probable cause that the person is engaged in criminal activity. See generally United States v. Williams,
This standard obviously does not deal a serious blow to the government’s ability to obtain real-time cell-site location data. Although specific, the showings required are nowhere near as stringent as those for a Title III wiretap, which require agents to state that “normal investigative procedures have been tried and failed or reasonably appear to be unlikely to succeed if tried or to be too dangerous” by including “a full and complete statement as to whether or not other investigative procedures have been tried and failed or why they reasonably appear to be unlikely to succeed if tried or to be too dangerous.” United States v. Poulsen,
Of course, any warrant requirement exacts some costs on the ability of police to investigate crimes. But “[a]n essential purpose of a warrant requirement is to protect privacy interests by assuring citizens subject to a search or seizure that such intrusions are not the random or arbitrary acts of government agents.” United States v. Rohrig,
It is true that other courts usually do not require the showing discussed here and no authoritative court has stated plainly that such a showing is required. It is also true that in certain cases, there is no practical difference between obtaining a warrant to use technology to track a suspect and simply using traditional means to do it; the government can often detail DEA agents to follow suspects on highways for a few hours almost as easily as they can track a cell phone. But the same technology and grant of authority, without more care, can also permit the government to conduct near-limitless around-the-clock surveillance of a person’s location, subject only to the limitation of where the suspect may not have taken a cell phone. As discussed with concern in Skinner and Jones, such monitoring “generates a precise, comprehensive record of a person’s public movements that reflects a wealth of detail about her familial, political, professional, religious, and sexual associations.” Jones,
4. Limitations of the Standard
The cell-phone tracking standard is meant to be read in harmony with the Sixth Circuit’s holding in Skinner. Specifically, if the government seeks to track an individual for a short period of time only, with no foreseeable intrusion into protected areas, the probable-cause showing discussed here would not apply and Skinner would plainly govern. If, for example, the tracking was to be done for a limited purpose on public thoroughfares — like in Skinner, with foreknowledge a suspect was taking a two day cross-country trip — the specific Fourth Amendment concerns addressed here would not be raised. But if the tracking the government seeks to undertake is similar to the “intensive 28-day” monitoring the Sixth Circuit itself distinguished, then the more detailed showing required to meet the cell-phone tracking standard should be made.
Applying the cell-phone tracking standard to this case, the Court finds, as discussed next, that the government did not make the necessary probable-cause showing in the March 11, 2010 warrant application.
D. Probable Cause for the March 11, 2010 Warrant
To obtain the real-time cell-site location data for the challenged phones, the government obtained the previously mentioned Criminal Rule 41 probable-cause warrant for each phone. Strictly speaking, Defendants challenge all of the search warrants for cell-site and GPS location data, but their primary argument is that the first March 11, 2010 search warrant was not supported by probable cause and the remaining warrants are the “fruit of
For a warrant to issue, a magistrate judge must find probable cause such that there is a “fair probability ... that contraband or evidence of a crime will be found in a particular place.” United States v. Gardiner,
1. Summary of the March 11, 2010 Donovan Affidavit
Defendants first challenge the probable-cause basis for the search warrant for cellphone number (313) 529-5848, subscribed to by Carlos Powell. DEA Special Agent Edward Donovan prepared the affidavit in support of the March 11, 2010 application. See March 11, 2011 Search Warrant App., EOF No. 106-1. Magistrate Judge Donald Scheer approved the application.
In the affidavit, Donovan stated the following: He and other DEA agents were investigating a large-scale drug-trafficking ring between Arizona, Illinois, and Michigan. During the course of the investigation, Ted Morawa was arrested and indicted in federal district court in Arizona. Mar. 11 Donovan Aff. at ¶ 7. Morawa agreed to cooperate and proffered that part of the drug trafficking ring involved him delivering or causing to be delivered over 200 kilograms of cocaine and over 100 kilograms of heroin to an individual in Detroit, Michigan then only known as “50,” and subsequently identified by Morawa as Defendant Carlos Powell. Based on Morawa’s direct statements and proffers, and evidence supporting the veracity of Morawa’s statements in the form of intercepted communications, money seizures, and drug seizures, Donovan believed Morawa to be a credible source. Id. at ¶¶ 8, 10.
Separately, agents of the Detroit DEA and Detroit Internal Revenue Service Criminal Investigation Division interviewed a cooperating defendant witness, the owner and operator of a jewelry store in Detroit. The cooperating defendant witness stated that defendant Carlos Powell purchased several hundreds of thousands of dollars worth of jewelry in cash from the store. Id. at ¶ 12. Donovan stated that, in his education and experience, such purchases in cash were often derived from the sale of narcotics. Id. at ¶ 13.
Donovan learned that the T-Mobile cell phone number (313) 529-5848 was subscribed to by Carlos Powell, who at the
Magistrate Judge Scheer granted the application on March 11, 2010, and ordered the cell-phone service provider to provide all assistance necessary to ascertain the physical location of the cell phone associated with the number (313) 529-5848, for a period of thirty days. The magistrate judge found probable cause to believe the information would lead to evidence of violations of the drug code, as well as the identification of such violators. See Mar. 11 Warrant, ECF No. 106-1 at 13.
2. Probable Cause Analysis
Defendants argue that the March 11 Donovan Affidavit was insufficient to provide a substantial basis for the magistrate judge to find probable cause to issue the warrant. Defendants state that the affidavit provided “even less of a showing of probable cause” than subsequent warrants which themselves were “deficient.” Supp. Mem. at 1, ECF No. 106. Defendants argue that the affidavit put forth no evidence that the (313) 529-5848 telephone was used in connection with any unlawful activity. Likewise, Defendants note that the information provided by Morawa was not dated, and therefore did not establish probable cause that Carlos Powell was engaged in illegal activity at the time the warrant was sought.
In response, the government submits that the affidavit was more than sufficient to show probable cause and that it afforded the magistrate judge a substantial basis on which to grant the warrant. The government argues that the affidavit clearly established through both informant testimony and independent verification the likelihood that Carlos Powell was a major drug trafficker in Detroit. The government also argues that the testimony established Carlos Powell as an active drug dealer, and that the information was not stale. Moreover, it argues that the DEA was entitled to rely on the search warrant under the good faith exception.
After reviewing the March 11 Donovan Affidavit, the Court concludes that the affidavit provided, under traditional probable cause analysis, a sufficient basis for the magistrate judge to find probable cause to issue the warrant. The core of the affidavit was the informant testimony, confirmed by independently verified evidence, that Carlos Powell was a major player in a drug trafficking ring in Detroit. Although the affidavit relied to some extent on hearsay, it was corroborated by independently obtained evidence that permitted Donovan to make a reasonable conclusion that Morawa’s statements were true. And, in any event, a police officer may rely on hearsay from an informant to establish probable cause, even for warrant-less searches, “so long as the informant’s statement is reasonably corroborated by other matters within the officer’s knowledge.” United States v. Helton,
The affidavit does not make a sufficient showing to establish probable cause, however, under the cell-phone tracking standard discussed above. Although it does state sufficient facts to demonstrate that Powell was involved in a large-scale drug trafficking organization, and that the cell phone to be tracked belonged to Powell, it did not set forth facts to demonstrate a nexus between the cell phone and the criminal activity, or between Powell’s location in protected areas and the criminal activity. First, although the affidavit states that Morawa communicated with Powell in furtherance of the narcotics trafficking, it does not state that Morawa and Powell communicated by cell phone, or that Morawa contacted Powell at the specific cell-phone number at issue here. Second, the affidavit sought cell-phone location data to determine Powell’s location, but it also sought to track the phone for a period of 45 days — significantly longer than reasonably necessary to determine Powell’s location. And the tracking was unquestionably long enough to trigger the concern that agents would track Powell’s location in protected areas, like his residence. The affidavit does not set forth any facts to support a finding that tracking Powell via his cell phone into, for example, his residence, would lead to evidence of the suspected criminal activity. Accordingly, the Court finds the affidavit does not establish probable cause sufficient to warrant the invasion of privacy brought about by long-term real-time cell phone tracking. A reasonable alternative procedure that the government could have followed in this instance would have been to seek short-term cell-phone location data for the limited purpose of determining Powell’s location. The government could then have dispatched agents to track Powell physically until they uncovered the additional facts necessary to show a nexus between any protected locations frequented by Powell and the suspected criminal activity. Armed with those facts, the government would readily have met the cellphone tracking standard described here.
3. Good Faith Exception
Under the Court’s construction of the applicable precedent, the government did not make a sufficient showing to demonstrate that probable cause existed for the warrant to issue. The evidence is nonetheless admissible, however, because whether or not the warrant issued on probable cause, the government relied on it in good faith. See Buford,
The exception is not absolute. The Supreme Court has outlined four scenarios when good-faith reliance on a warrant is not sufficient: “(1) when the warrant is issued on the basis of an affidavit that the affiant knows (or is reckless in not knowing) contains false information; (2) when the issuing magistrate abandons his neutral and detached role and serves as a rubber stamp for police activities; (3) when the affidavit is so lacking in indicia of probable cause that a belief in its existence is objectively unreasonable; and, (4) when the warrant is so facially deficient that it cannot reasonably be presumed to be val
Defendants argue that the exception does not apply here because the affidavit is lacking in indicia of probable cause, such that the DEA’s reliance on it was objectively unreasonable. An affidavit is lacking in indicia of probáble cause, also known as a “bare bones” affidavit, if it contains only “suspicions, beliefs, or conclusions, without providing some underlying factual circumstances regarding veracity, reliability, and basis of knowledge.” United States v. Laughton,
E. “Fruit of the Poisonous Tree” and the Remaining CelUSite Warrants
Defendants argue that if the initial March 11, 2010 search was unreasonable, any evidence obtained from it— specifically the subsequent real-time cell-site location-data search warrants — are “fruit of the poisonous tree” and are therefore inadmissible. Defendants are correct that when the government exploits illegally obtained evidence, subsequent searches and seizures based on that evidence are tainted and subject to the exclusionary rule. See Pearce,
III. Warrantless Use of GPS Tracking DevicesIVehicle Searches
Next, Defendants challenge the government’s warrantless installation of GPS tracking devices on vehicles belonging to Carlos Powell
A. GPS Tracking Device
As stated above, the Court conducted an evidentiary hearing on January 17 and February 12, 2013 to provide a factual basis for a decision on the motion to suppress. Special Agent Donovan was the only witness. He testified regarding his and the DEA’s actions in using the GPS tracker to follow Eric Powell’s vehicle during the investigation. See Hr’g I at 15. The following facts are taken from his testimony.
1. Technical Background
The DEA used a GPS tracker that affixes to the undercarriage or other unobtrusive spot on a vehicle. The tracker is “self-contained,” and is found within a storage box that protects it from the elements. The box is attached with magnets to the undercarriage of a vehicle. Id. at 16. The GPS unit transmits its coordinates via the internet. During a typical operation, a DEA or other federal agent has a laptop computer with a wireless internet connection. At any time, the DEA agent can “ping” the GPS tracker by pressing a button on the tracking program. The GPS tracker then transmits its coordinates back to the computer. The program can ping a tracker at regular intervals as long as half an hour or as short as every minute, or whenever the agent wishes. Id. at 53; Hr’g II. There can be a time delay of up to ten minutes between when the GPS tracker transmits its coordinates and when the DEA agent receives the coordinates on the computer. Hr’g I at 54. The printed records of the location data show only when the data was generated, and not when a DEA agent accessed or received the data. Hr’g II. The GPS tracking device is generally accurate to within several meters, and the location data will state the variation from the coordinate reading. For example, a 12-meter variation and a direction would indicate that the actual GPS unit could be within 12 meters from the coordinate reading. Id.
The location data is stored on a remote computer server, capable of being accessed by the DEA, and it is usually archived. Hr’g II. On cross-examination, Donovan testified that archived location data for the first two months of the tracking, beginning around June 10, 2010, was inadvertently lost. Typically, the servers keep the data for several months. In this case, the servers overwrote the data as part of an apparently normal record storage procedure. The first available tracking records begin on or around August 31, 2010. Id.
2. GPS Tracker Installation and Re-Installation
Before placing the GPS tracking device on Eric Powell’s truck, the DEA had amassed considerable evidence about the overall drug trafficking ring and Eric Powell’s involvement in it. On approximately June 10, 2010, the DEA located Eric Powell’s Chevy Silverado pick-up truck parked in the driveway of Eric Powell’s residence at 24505 Franklin Farms Drive, in Franklin, Michigan. Hr’g I at 19-21. The DEA changed out the battery on the tracking devices several times. Most of the time, the change-out was done in Eric Powell’s driveway. On three occasions, the truck was parked elsewhere: in front of Earnest Proge’s residence, in the commercial park
Powell’s home is in a gated community. A security gate blocked the entrance to Franklin Farms Drive, and on the gate there was a sign reading “private property, no trespassing.” To install the GPS device, the DEA agents simply walked around the gate, as it is only a vehicular gate and does not bar foot traffic. Hr’g II. During daylight hours, Donovan has driven to the gate and it has opened automatically. Id. Donovan installed the GPS tracker at night, and is unsure whether or not the gate would have opened automatically at that time. Id.
3. Constitutionality of the GPS tracker
Defendants principally challenge the use of the GPS trackers under Jones, arguing that after Jones, “it seems clear enough that the warrantless employment of the tracking devices constituted a Fourth Amendment violation.” Mot. to Dismiss at 2. Defendants also argue that whether or not the warrantless installation of the GPS devices was itself a Fourth Amendment violation under Jones, the long-term use of the GPS device to track Powell’s vehicle moves the surveillance beyond the realm of a reasonable search and into one that was clearly unreasonable. Finally, Defendants argue that because Powell’s truck was parked in a gated community, requiring key-card access to enter, the DEA agents committed a standard trespass, and hence an unconstitutional search, by entering the property to plant the GPS device. Hr’g II.
Taking the last argument first, it is true that gated communities are “private property” in the general sense and are designed to restrict access to the community. But it is not true that residence in a gated community transforms the entire community into an individual’s private property for Fourth Amendment purposes. See United States v. Harris,
With respect to Jones, the parties disagree about the scope of its holding. In that case, police installed a GPS device on a vehicle and used the data collected to monitor the defendant’s movements for four weeks. The Supreme Court held that the physical installation of the GPS device was a “search” under the Fourth Amendment and affirmed the court of appeals’ finding that evidence obtained as a result should have been excluded at trial. Jones,
B. The Traffic Stops
Defendants seek suppression of evidence seized during four traffic stops. Specifically, Defendants argue that installation of the GPS device on Powell’s car allowed police to seize evidence in vehicle searches during: (1) the June 23, 2010 traffic stop and search of Benny Whig-ham’s vehicle; (2) the September 17, 2010 traffic stop of Earnest Proge’s vehicle; (3) the June 28, 2010 traffic stop and search of Juan Valle’s vehicle; and (4) the October 22, 2010 traffic stop and search of Margarita de Vallejo’s vehicle. The Court finds that the evidence seized in the traffic stops is admissible because each stop falls within an exception to the exclusionary rule.
1. Legal Standards
A police officer may lawfully stop a car if there is “probable cause to believe that a civil traffic violation has occurred, or reasonable suspicion of an ongoing crime.” United States v. Blair,
Three exceptions to the exclusionary rule permit the admission of evidence, even when a Fourth Amendment violation has occurred: the independent-source, inevitable-discovery, and attenuation doctrines. See generally United States v. Kennedy,
Similarly, under the inevitable-discovery doctrine, evidence is admissible if the government proves that it “inevitably would have been acquired through lawful means had the [] misconduct not occurred.” Kennedy,
Finally, the attenuation doctrine states that if evidence seized is sufficiently “attenuated” from the initial Fourth Amendment wrongdoing, the taint may also be so attenuated as to permit the admission of the evidence. United States v. Williams,
2. Analysis
The Court will apply the above standards to the traffic stops, in chronological order.
a. Whigham Traffic Stop
The first challenged stop after the GPS tracker was placed on Eric Powell’s truck, was the traffic stop of Benny Whig-ham’s vehicle on June 23, 2010. On June 22, 2010, the DEA determined, using the GPS tracker, that Eric Powell had traveled from Detroit to Chicago. At some point while Powell was in Chicago, the DEA lost the GPS tracker signal from Powell’s truck, and deployed agents to locate the truck visually. Hr’g I at 38-40. The next day, the DEA began physical surveillance of Powell’s truck and Whigham’s vehicle, following the vehicles to Cicero, Illinois. Id. In Cicero, Powell, Whigham, and Earnest Proge left the two vehicles in a restaurant parking lot for a period of time during which an unknown Hispanic male took Whigham’s vehicle to a garage, and then returned it to the parking spot several minutes later. Id. at 40. The agents, assisted by the Michigan State Police, continued physical surveillance of the vehicles for over ten hours, as they were driven in tandem from Cicero back toward Detroit. Sullivan Aff. ¶ 11, ECF No. 74-9. A state trooper stopped Whigham’s vehicle for a traffic violation near Ann Arbor, Michigan. Hr’g I at 44. Whigham granted the police consent to search the vehicle. Id.; Sullivan Aff. at ¶ 13. The trooper found thirteen kilograms of heroin in the vehicle. Id.
The traffic stop and search are sufficiently attenuated from use of the GPS tracker to preclude application of the exclusionary rule. As stated above, the factors relevant to attenuation are (1) the length of time between the illegal search and discovery of new evidence; (2) the presence of intervening circumstances; and (3) the purpose and flagrancy of the official misconduct. United States v. Gross,
Here, the time factor is neutral; the GPS tracker was used to locate Eric Powell’s vehicle in Chicago nearly a full day before the traffic stop of Whigham’s vehicle. Even if the gap between use of the GPS tracker and the traffic stop can be considered close in time, temporal proximity alone, does not justify suppression. See generally Clariot,
Next, multiple intervening circumstances occurred between the use of the GPS tracker and the vehicle stop that were sufficient to dissipate any unlawful conduct. First, the GPS tracker was not used to track Whigham’s vehicle at all. Second, Whigham’s vehicle was directly observed by several DEA agents that day, both in the city and on the highways. The DEA would have inevitably discovered Whigham’s vehicle on the highway, regardless of any use of the GPS tracking device on Eric Powell’s truck that day. Third, Whigham’s vehicle was lawfully stopped by the MSP. Although the stop was pretextual, nothing in the record shows that Whig-ham did not actually violate the traffic laws justifying the stop. See United States v. Herbin,
Finally, the agents’ conduct was not flagrant. Donovan had no reason to believe installation of the tracker was illegal. To the contrary, he consulted extensively with the U.S. Attorney’s Office and the DEA general counsel’s office regarding use of the tracker, and he testified that he would have, and could have, obtained a warrant had he felt it necessary. See Hr’g II; see also United States v. Boone,
b. Valle Traffic Stop
On June 28, 2010, the DEA was conducting surveillance of a suspected stash location, a residence at 20109 Conley Street, Detroit, Michigan, using pole cameras and physical surveillance. Nov. 8 Donovan Aff. ¶ 61, ECF No. 74-13; Resp. at 37-38. The DEA observed Juan Valle arrive at the residence, followed shortly thereafter by Carlos Powell. Powell carried a large bag with him into the residence. When Valle emerged later, he placed several objects into his vehicle and drove away. Nov. 8 Donovan Aff. ¶ 61-62. The DEA coordinated with the Michigan State Police in Charlotte, Michigan, to track Valle’s vehicle. State troopers stopped the vehicle after a traffic violation. Valle gave them his consent to search the vehicle. Resp. at 38. State troopers found roughly $259,000 in the vehicle. Id. at ¶ 63.
Although the GPS tracking device was attached to Eric Powell’s vehicle during this period, nothing in the record demonstrates that the tracking information had anything to do with the stop of Valle’s vehicle. Donovan testified specifically that GPS location data from Eric Powell’s vehicle was not used in the events surrounding this search. Hr’g I at 48. Accordingly, the Court finds the GPS tracking data
c. Proge Traffic Stop
Over the course of several weeks of investigation, which included some use of the GPS tracker, the DEA determined that on several occasions Eric Powell and Earnest Proge drove in tandem between Detroit and Michigan. Nov. 8, 2010 Donovan Aff. ¶ 68. On September 17, 2010, while the GPS tracker was still attached to Powell’s truck, the DEA used surveillance cameras to independently observe Powell arrive at a residence in Eastpointe, Michigan, and, wearing latex gloves, load several large suitcases into Proge’s Ford Flex. Hr’g I at 51; Nov. 8, 2010 Donovan Aff. ¶ 69. Powell drove the Ford Flex to a warehouse in Centerline, Michigan where the DEA continued surveillance of the vehicle using a different pole camera. Id. Later, the Ford Flex, now driven by Proge, departed from the warehouse. From their knowledge of Powell and Proge’s previously tracked trips, the DEA dispatched agents along Interstate 94 to look for the Ford Flex. Hr’g I at 53. An agent spotted the vehicle proceeding west on Interstate 94 toward Kalamazoo, traveling in tandem with Powell’s truck. Id. at 53; Nov] 8, 2010 Donovan Aff. ¶ 70. The GPS device may or may not have been used to locate Powell’s truck at the same time, but Donovan testified that in his opinion, the DEA would inevitably have located Proge’s vehicle on the highway at some point that day because of the multiple DEA and Michigan State Police officers searching the highway for the vehicle. Id. at 57.
State troopers stopped Proge’s vehicle in Calhoun County, after a traffic violation. Nov. 8 Donovan Aff. ¶ 71. Proge at first complied with the stop, but then fled the scene, nearly striking another police officer who had just arrived. Hrg. I at 59. Proge engaged the Michigan State Police in a high-speed chase before pulling over. The police arrested Proge for felony Fleeing and Eluding and Assault of a Police Officer, and searched his car. During the search of the vehicle, troopers discovered more than $2.2 million, as well as a drug ledger, and a newspaper article regarding a Detroit Police Department drug raid. Id.; Nov. 8 Donovan Aff. at ¶¶ 71-73.
“If a suspect’s response to an illegal stop is a new and distinct crime, such as flight or use of force, any evidence recovered incident to the arrest for the subsequent crime is not tainted by the unlawfulness of the initial detention.” Beauchamp,
d. de Vallejo Traffic Stop
The final challenged traffic stop is the search of Margarita de Vallejo’s car on October 22, 2010. Donovan had removed the GPS tracker from Eric Powell’s truck sometime on September 17, 2010, because he believed its use may have caused suspicion among the drug traffickers. Hr’g I at 60. But on October 1, 2010, after learning that Eric Powell had apparently taken another trip to Chicago for the purpose of exchanging drugs, Donovan replaced the tracker. Id. at 61.
On October 22, 2010, the DEA, using a pole camera, observed Powell loading several suitcases from the Eastpointe residence onto his truck. Nov. 8 Donovan Aff.
Based on the facts presented, the Court finds the inevitable-discovery and attenuation doctrines permit admission of the evidence found in de Vallejo’s vehicle. First, although it is true that agents used the GPS tracker during the pursuit of Eric Powell’s vehicle, they did so only after they had observed via the pole camera behavior indicating he was preparing to engage in another illegal drug or money transfer trip. Moreover, as Donovan testified, agents and state troopers were dispatched to locate the truck on the interstate and would inevitably have done so and been able to physically track Powell and Proge as they traveled to Ann Arbor where they met de Vallejo. For these reasons, the Court finds that the agents would inevitably have discovered de Vallejo’s involvement, even without the GPS tracking evidence.
Second, like the Whigham stop, the police detained de Vallejo pursuant to a lawful traffic stop, and de Vallejo gave her consent to search. Based on these intervening circumstances, and applying the same legal standards discussed during the Whigham analysis, the Court finds that the agent’s use of the GPS device to track Powell was so attenuated from the DEA’s actions in stopping de Vallejo’s vehicle that the evidence seized in the stop is admissible.
IV. Warrants Issued for the Search of Nine Detroit Properties
Finally, Defendants challenge the warrants issued on November 8, 2010, for the searches of nine properties in the Detroit metro area. Defendants do not challenge the searches directly, but rather challenge them under the fruit-of-the-poisonous-tree doctrine, arguing that the warrants were premised on information obtained through the contested searches discussed above. The nine properties are:
• 20109 Conley Street, Detroit, Michigan; a stash house/safe house used by Carlos Powell and his organization.
• 15765 Strieker, Eastpointe, Michigan; a stash house/safe house used by Carlos and Eric Powell to facilitate their operation.
• 15514 E. Eight Mile Road, Detroit, Michigan; a commercial store front owned and operated by Carlos Powell.
• 22208 Raven Avenue, Eastpointe, Michigan; a residence used by Carlos Powell and Tamika Turner.
*792 • 57869 Apple Creek Drive, Washington Township, Michigan; a residence used by Carlos Powell and Tamika Turner.
• 6748 Oyster Cove, West Bloomfield, Michigan; a residence owned by Carlos Powell.
• 24505 Franklin Farms Drive, Franklin, Michigan; a residence used by Eric Powell.
• 24300 Sherwood Avenue, Centerline, Michigan; a commercial warehouse operated and utilized by Eric Powell.
• 1137 Outer Drive, Detroit, Michigan; a residence used by Earnest Proge.
In applying for the relevant warrants, Donovan prepared a seventy-six page affidavit. See Nov. 8 Donovan Aff. In the affidavit, Donovan first reiterated the identity of Morowa as an informant who identified Carlos Powell as a major drug trafficker; and then he proceeded to outline the course of the investigation until that point, including the seizure of $1.1 million in Phoenix, Arizona, in April 2010; the interview of another incarcerated participant in the trafficking ring; the seizure of 13 kilograms of heroin in June; the seizure of $5 million in Chicago in July; surveillance of Carlos Powell and Eric Powell via pole cameras and GPS tracking devices; the seizure of $2 million and 12 kilograms of cocaine in October; and the results of financial and income tax investigations and analysis. Id. at ¶¶ 8-53.
The crux of Defendants’ argument is that evidence derived from the cell-site and GPS location data from the phones, and from the GPS tracking device on Powell’s truck, formed so substantial a part of the November 8 Donovan Affidavit as to taint the warrants with illegality under the fruit-of-the-poisonous-tree doctrine, thereby requiring suppression of the evidence seized from the properties. The Court finds that all the evidence is admissible.
First, the Court has already admitted the cell-site and GPS location data from the cell phones under the good-faith exception. To the extent, therefore, the warrants are premised on information obtained from the cell-phone tracking, the evidence is untainted. See United States v. Jenkins,
And even considering the warrant absent the GPS data (which, as stated, would not exclude the previously admitted vehicle searches), any evidence seized from the properties would nevertheless remain admissible under the valid-warrant good faith exception. See Buford,
CONCLUSION
As set forth above, with respect to the real-time cell-site location data, the Court finds that the government did not adequately establish probable cause for the warrants to issue, but the evidence obtained from the cell-phone tracking is admissible under the good-faith exception. With respect to the installation and use of the GPS tracking device, whether or not a reasonable search, the inevitable-discovery, independent-source, or attenuation exceptions permit the admission of all the tracking data gathered, as well as the evidence obtained in the search of Whig-ham’s, Proge’s, and de Vallejo’s vehicles. The evidence obtained in the search of Valle’s vehicle is also admissible. Finally, the evidence obtained in the searches of the nine Detroit properties is admissible under the good-faith exception. For these reasons, and those stated in the Court’s prior order addressing the motion, Defendants’ motion to suppress is denied in full.
ORDER
WHEREFORE, it is hereby ORDERED that the Motion to Suppress (docket no. 74) is DENIED.
SO ORDERED.
Notes
. For the purposes of this order, the Court will refer to the eight moving defendants as “Defendants.”
. The concept is often referred to as "triangulation,” but because the process may involve more or fewer than three cell towers, "multilateration” is a more accurate term. Id.
. Defendants' initially challenged the March 31, 2010 warrant, but then shifted to the March 11, 2010 warrant when it became clear it was the first cell-phone warrant issued.
. These statutes have been amended from time to time; for example, by the Communications Assistance and Law Enforcement Act of 1994, P.L. 103-414, 108 Stat. 4279, and the USA PATRIOT Act, P.L. 107-56, 115 Stat. 272.
. Here, in contrast, Defendants filed a motion to suppress after the government collected the
. See also Florida v. Jardines, - U.S. -,
. This view has its critics. See, e.g., Orin Kerr, The Mosaic Theory of the Fourth Amendment, 111 Mich. L.Rev. 311 (2012). The present Order does not adopt any of the "mosaic theory” approaches specifically, nor does it purport to address the questions raised in Kerr’s article regarding the implications of the approach. The Court simply notes that the constitutionality of long-term cell-phone tracking was left open in Jones, submits that the privacy issues presented by such tracking merit a doctrinal response, and finds that the facts presented here fall on the wrong side of the constitutional divide.
. Defendants also challenge the October 5, 2010 warrant as derivative of the Whigham vehicle search. Because the Court will admit all the evidence seized during the Whigham vehicle search, discussed infra, at 783, the Court will not consider this challenge any further.
. Special Agent Donovan testified that the government did not collect or use any data from the tracking device affixed to Carlos Powell’s car. Hr'g I at 17-18. Because there is no evidence to suppress from the use of that tracking device, the Court will discuss only the tracking device affixed to Eric Powell’s vehicle.
. In addition to their fruit-of-the poisonous-tree objection to the evidence seized in the traffic stops, Defendants also seek to directly suppress the location data seized from the GPS tracker. The location-data evidence, strictly speaking, is simply evidence of the location of Eric Powell’s truck at any given moment. As a practical matter, therefore, suppression of the GPS data regarding the location of Powell’s truck, without anything more, really suppresses nothing. Moreover, the uncontroversial DEA testimony that Powell's truck was on a highway on any particular day, would be permissible in any event, given
. Nor will the Court discuss the government’s arguments that the officers' good-faith reliance on the existing law pre-Jones provides an exception to application of the exclusionary rule in this case. See Davis v. United States, - U.S. -,
. Defendants also argue that the real-time cell-site location data led to the traffic stops. Because the Court has already found the location data admissible under the good-faith exception, the Court need not consider whether the data led to a search where the evidence collected was "tainted.” Therefore, in this section, the Court addresses only the evidence gathered from the use of GPS tracking data on Eric Powell's vehicle.
