Select date

October 2024
Mon Tue Wed Thu Fri Sat Sun

Federal Appeals Court Finds Geofence Warrants Are “Categorically” Unconstitutional

12-8-2024 < Activist Post 24 767 words
 

By Andrew Crocker


In a major decision on Friday, the federal Fifth Circuit Court of Appeals held that geofence warrants are “categorically prohibited by the Fourth Amendment.” Closely following arguments EFF has made in a number of cases, the court found that geofence warrants constitute the sort of “general, exploratory rummaging” that the drafters of the Fourth Amendment intended to outlaw. EFF applauds this decision because it is essential that every person feels like they can simply take their cell phone out into the world without the fear that they might end up a criminal suspect because their location data was swept up in open-ended digital dragnet.


The new Fifth Circuit case, United States v. Smith, involved an armed robbery and assault of a US Postal Service worker at a post office in Mississippi in 2018. After several months of investigation, police had no identifiable suspects, so they obtained a geofence warrant covering a large geographic area around the post office for the hour surrounding the crime. Google responded to the warrant with information on several devices, ultimately leading police to the two defendants.


On appeal, the Fifth Circuit reached several important holdings.






First, it determined that under the Supreme Court’s landmark ruling in Carpenter v. United States, individuals have a reasonable expectation of privacy in the location data implicated by geofence warrants. As a result, the court broke from the Fourth Circuit’s deeply flawed decision last month in United States v. Chatrie, noting that although geofence warrants can be more “limited temporally” than the data sought in Carpenter, geofence location data is still highly invasive because it can expose sensitive information about a person’s associations and allow police to “follow” them into private spaces.


Second, the court found that even though investigators seek warrants for geofence location data, these searches are inherently unconstitutional. As the court noted, geofence warrants require a provider, almost always Google, to search “the entirety” of its reserve of location data “while law enforcement officials have no idea who they are looking for, or whether the search will even turn up a result.” Therefore, “the quintessential problem with these warrants is that they never include a specific user to be identified, only a temporal and geographic location where any given user may turn up post-search. That is constitutionally insufficient.”



Unsurprisingly, however, the court found that in 2018, police could have relied on such a warrant in “good faith,” because geofence technology was novel, and police reached out to other agencies with more experience for guidance. This means that the evidence they obtained will not be suppressed in this case.


Nevertheless, it is gratifying to see an appeals court recognize the fundamental invasions of privacy created by these warrants and uphold our constitutional tradition prohibiting general searches. Police around the country have increasingly relied on geofence warrants and other reverse warrants, and this opinion should act as a warning against narrow applications of Fourth Amendment precedent in these cases.


Source: EFF



Andrew’s work focuses on surveillance, privacy, and cybersecurity. As Surveillance Litigation Director, he leads EFF’s legal work on issues at the intersection of technology and privacy through lawsuits and amicus briefs in state and federal courts, including the U.S. Supreme Court. He also leads EFF’s Coders’ Rights Project, which provides representation for security researchers, journalists, and hackers, who often face unwarranted legal threats and scrutiny for their work. Representative cases include challenging the constitutionality of national security letters (NSLs); working to establish that the Fifth Amendment privilege against self-incrimination protects against the compelled decryption of electronic devices; and limiting overbroad anti-hacking laws such as the Computer Fraud and Abuse Act (CFAA). He also writes and speaks about EFF’s legislative and advocacy priorities including FISA Section 702, anti-encryption proposals, location tracking and other novel surveillance techniques. He received his undergraduate and law degrees from Harvard University.


Become a Patron!
Or support us at SubscribeStar
Donate cryptocurrency HERE


Subscribe to Activist Post for truth, peace, and freedom news. Follow us on Telegram, HIVE, Minds, MeWe, Twitter – X  and Gab.


Provide, Protect and Profit from what’s coming! Get a free issue of Counter Markets today.



Print