US v. Aaron Graham
Filing
PUBLISHED AUTHORED OPINION filed. Motion disposition in opinion granting Motion to strike [999421448-2] Originating case number: 1:11-cr-00094-RDB-1. [999634986]. [12-4659, 12-4825]
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 1 of 134
PUBLISHED
UNITED STATES COURT OF APPEALS
FOR THE FOURTH CIRCUIT
___________
No. 12-4659
____________
UNITED STATES OF AMERICA,
Plaintiff - Appellee,
v.
AARON GRAHAM,
Defendant – Appellant.
-----------------------------------ELECTRONIC FRONTIER FOUNDATION; NATIONAL ASSOCIATION OF
CRIMINAL DEFENSE LAWYERS; AMERICAN CIVIL LIBERTIES UNION
FOUNDATION OF MARYLAND; CENTER FOR DEMOCRACY & TECHNOLOGY;
AMERICAN CIVIL LIBERTIES UNION FOUNDATION,
Amici Supporting Appellant.
_____________
No. 12-4825
_____________
UNITED STATES OF AMERICA,
Plaintiff - Appellee,
v.
ERIC JORDAN,
Defendant – Appellant.
-----------------------------------ELECTRONIC FRONTIER FOUNDATION; NATIONAL ASSOCIATION OF
CRIMINAL DEFENSE LAWYERS; AMERICAN CIVIL LIBERTIES UNION
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 2 of 134
FOUNDATION OF MARYLAND; CENTER FOR DEMOCRACY & TECHNOLOGY;
AMERICAN CIVIL LIBERTIES UNION FOUNDATION,
Amici Supporting Appellant.
___________
Appeals from the United States District Court for the District
of Maryland, at Baltimore. Richard D. Bennett, District Judge.
(1:11-cr-00094-RDB-1; 1:11-cr-00094-RDB-2)
____________
Argued:
December 11, 2014
Decided:
August 5, 2015
____________
Before MOTZ and
Circuit Judge.
THACKER,
Circuit
Judges,
and
DAVIS,
Senior
_____________
Affirmed by published opinion. Senior Judge Davis wrote the
majority opinion, in which Judge Thacker joined. Judge Thacker
wrote a separate concurring opinion. Judge Motz wrote an opinion
dissenting in part and concurring in the judgment.
_____________
ARGUED: Meghan Suzanne Skelton, OFFICE OF THE FEDERAL PUBLIC
DEFENDER, Greenbelt, Maryland; Ruth J. Vernet, RUTH J VERNET,
ESQ., LLC, Rockville, Maryland, for Appellants.
Rod J.
Rosenstein, OFFICE OF THE UNITED STATES ATTORNEY, Baltimore,
Maryland, for Appellee.
ON BRIEF:
James Wyda, Federal Public
Defender, OFFICE OF THE FEDERAL PUBLIC DEFENDER, Baltimore,
Maryland, for Appellant Aaron Graham.
Nathan Judish, Computer
Crime & Intellectual Property Section, UNITED STATES DEPARTMENT
OF JUSTICE, Washington, D.C.; Benjamin M. Block, Assistant
United States Attorney, Baltimore, Maryland, Sujit Raman, Chief
of Appeals, OFFICE OF THE UNITED STATES ATTORNEY, Greenbelt,
Maryland, for Appellee.
Nathan Freed Wessler, Catherine Crump,
Ben Wizner, AMERICAN CIVIL LIBERTIES UNION FOUNDATION, New York,
New York; David R. Rocah, AMERICAN CIVIL LIBERTIES UNION
FOUNDATION OF MARYLAND, Baltimore, Maryland; Kevin S. Bankston,
Gregory
T.
Nojeim,
CENTER
FOR
DEMOCRACY
&
TECHNOLOGY,
Washington, D.C.; Thomas K. Maher, Vice-Chair, 4th Circuit
Amicus Committee, NATIONAL ASSOCIATION OF CRIMINAL DEFENSE
LAWYERS, Durham, North Carolina; Hanni Fakhoury, ELECTRONIC
FRONTIER FOUNDATION, San Francisco, California, for Amici
Curiae.
2
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 3 of 134
DAVIS, Senior Circuit Judge:
Appellants
Aaron
Graham
and
Eric
Jordan
appeal
their
convictions for several offenses arising from a series of armed
robberies.
court’s
Specifically,
admission
of
Appellants
testimonial
challenge
district
documentary
and
the
evidence
relating to cell site location information (“CSLI”) recorded by
their
cell
government’s
phone
service
We
conclude
procurement
warrantless
provider.
of
the
that
CSLI
was
the
an
unreasonable search in violation of Appellants’ Fourth Amendment
rights.
Nevertheless,
because
the
government
relied
in
good
faith on court orders issued in accordance with Title II of the
Electronic
Communications
Privacy
Act,
or
the
Stored
Communications Act (“SCA”), we hold the court’s admission of the
challenged evidence must be sustained.
Jordan
separately
challenges
restrictions
on
his
own
testimony imposed by the district court, the court’s denial of
his motion for severance, the exclusion of certain out-of-court
statements
attributed
to
Graham,
the
admission
of
evidence
seized during a search of his residence, and the sufficiency of
the evidence supporting several of his convictions. Finding no
reversible error in these respects, we affirm the judgment of
the district court.
I.
3
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 4 of 134
This prosecution arose from a series of six armed robberies
of several business establishments located in Baltimore City and
Baltimore County, Maryland. After a nine-day joint trial in the
U.S. District Court for the District of Maryland, a jury found
Appellants guilty on all counts submitted to it. Aaron Graham
was convicted of being a felon in possession of a firearm, Hobbs
Act
robbery,
conspiracy
to
commit
Hobbs
Act
robbery,
and
brandishing a firearm in connection with all six robberies. Eric
Jordan
was
convicted
of
conspiracy,
Hobbs
Act
robbery,
and
brandishing a firearm in connection with three of the robberies.
A.
The evidence adduced at trial permitted the jury to find
the following facts.
The first robbery occurred the evening of January 17, 2011,
at a Dollar Tree store in Baltimore County. Graham entered the
store, brandished a small black gun, and directed a cashier to
open a cash register. The cashier removed cash from the register
and gave it to Graham. Graham reached over the counter to grab
additional cash before fleeing the store.
The second and third robberies occurred five days later. On
the evening of January 22, 2011, five individuals, including
Graham, arrived at Mondawmin Mall in Baltimore in a dark colored
Ford F-150 pickup truck, exited the vehicle, and entered the
shopping
mall
before
the
truck
4
pulled
away.
Graham,
seen
on
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 5 of 134
video surveillance wearing the same clothing worn during the
Dollar Tree robbery five days earlier, entered the Milan Gold &
Diamonds jewelry store (“Milan Gold”) inside the mall with a
second
individual.
After
two
other
individuals
entered
the
store, leaving a fifth standing outside the door, Graham pointed
a gun at a clerk and demanded, “Don’t be smart with me. Just
give me everything.” J.A. 1522. The three persons with Graham
picked up the jewelry as the clerk removed it from a display
case. Graham demanded a specific watch from a separate display
case and, after the clerk gave it to him, he and the others left
the mall.
Later that evening, Graham, again wearing the same clothes,
entered
a
7-Eleven
store
in
Baltimore,
walked
behind
the
counter, grabbed the clerk, and demanded that he open the cash
register. The clerk did not see a gun but saw Graham’s hand
inside his jacket and later testified that “it felt like there
was some kind of weapon, some kind of material in there . . . .”
J.A. 1600. Graham emptied two cash registers and then ordered
the clerk to go into a back room inside the store. After Graham
left, the clerk observed Graham enter the driver’s side of an F150 truck and depart. The clerk recorded video of the truck
pulling away and its appearance matched that of the truck used
at Mondawmin Mall earlier that evening.
5
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 6 of 134
The fourth robbery occurred on February 1, 2011, at a Shell
gas station in Baltimore County. Graham and a masked individual
entered the cashier’s booth, where Graham pushed the clerk to
the floor, began punching and kicking him, and then brandished a
small gun, placing it near the clerk’s ear. Meanwhile, a third
individual stood near the door to the store with a sawed-off
shotgun. When a customer attempted to leave, the third robber
blocked the exit, forced the customer to the ground, and beat
him in the head with the shotgun. After Graham and the second
robber removed cash from the booth, the three robbers departed.
The fifth and sixth robberies occurred four days later. On
February 5, 2011, at approximately 3:29 p.m., Graham entered a
Burger King restaurant in Baltimore wearing the same jacket worn
during the Dollar Tree, Milan Gold, and 7-Eleven robberies, and
carrying
a
small
black
gun
with
a
white
handle.
Graham
brandished the weapon and demanded money. The restaurant manager
opened
several
cash
registers,
which
Graham
emptied
before
departing. Graham was seen entering a dark colored F-150 truck
on the passenger side before the truck pulled away.
About forty five minutes later, Graham entered a McDonald’s
restaurant approximately two miles from the Burger King, went
behind
black
the
gun
counter,
with
a
and
white
demanded
handle.
money,
After
brandishing
the
restaurant
a
small
manager
opened three cash registers, Graham removed cash and stuffed it
6
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 7 of 134
into his jacket before departing. The manager saw Graham enter
the passenger side of a dark pickup truck, which pulled away
rapidly.
While investigating the Burger King robbery, Officer Joshua
Corcoran
of
describing
Shortly
the
the
Baltimore
robber,
thereafter,
McDonald’s
robbery
his
he
and
Police
Department
clothing,
heard
a
indicating
and
radio
that
received
the
call
the
pickup
reports
truck.
regarding
pickup
truck
the
was
possibly headed toward his location.
After leaving the Burger King, Corcoran spotted a pickup
truck matching the descriptions he received and observed that a
passenger
inside
the
vehicle
wore
a
jacket
matching
the
description of that reportedly worn by the Burger King robber.
During Corcoran’s pursuit of the truck, the driver drove it up
onto a sidewalk and accelerated. Corcoran continued pursuit just
before
the
truck
became
trapped
between
heavy
traffic,
a
construction barrier, and a moving train in front of it, and was
forced to stop.
Corcoran and another officer conducted a felony car stop,
directing orders to Graham and the driver, Jordan. Graham and
Jordan
were
non-compliant
with
some
of
the
officers’
instructions but were eventually secured and arrested. At the
scene, employees of Burger King and McDonald’s identified Graham
as the robber. A black .25 caliber Taurus pistol with a pearl
7
Appeal: 12-4659
handle
Doc: 169
was
Filed: 08/05/2015
recovered
from
under
Pg: 8 of 134
the
passenger
seat.
Nearly
$1,100 in cash bundles were recovered from the person of Graham
and Jordan, and from an open console inside the truck.
B.
During
Chris
the
Woerner
ensuing,
recognized
post-arrest
similarities
investigation,
between
the
Detective
restaurant
robberies and the Milan Gold and 7-Eleven robberies. Woerner
prepared search warrants for Graham’s and Jordan’s residences
and the pickup truck. The probable cause portion of each of the
warrant affidavits described what was known at the time about
the Milan Gold, 7-Eleven, Burger King, and McDonald’s robberies.
The search warrants were issued by a judge of the Circuit Court
of Maryland for Baltimore City.
While
residence,
Woerner
other
was
seeking
officers
the
conducted
warrant
a
search
for
Graham’s
of
Jordan’s
apartment, recovering a sawed-off shotgun, a matching shotgun
shell, a .357 caliber Rossi revolver, .357 caliber cartridges,
and other items. Woerner executed searches of Graham’s residence
and the pickup truck, recovering a gun holster and several rings
and watches from the residence, and two cell phones from the
truck. After Woerner obtained warrants for the phones, the phone
numbers associated with each phone was determined and matched
the
respective
numbers
disclosed
their arrest.
8
by
Graham
and
Jordan
after
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 9 of 134
Woerner contacted the Baltimore County Police Department to
determine
related
whether
robberies,
they
were
sending
investigating
photos
of
any
Graham
and
potentially
Jordan
and
photos from the searches. Detective Kelly Marstellar recognized
similarities to the Dollar Tree and Shell station robberies,
including the similarity between the jacket worn by Jordan at
the time of his arrest and that worn by the masked robber of the
Shell station, who had entered the cashier booth. The Baltimore
County Police Department prepared and executed a second round of
search warrants at Graham’s and Jordan’s residences on February
23,
2011.
During
the
second
search
of
Jordan’s
apartment,
officers recovered clothing that matched that worn by Graham
during the Shell station robbery.
The
government
sought
cell
phone
information
from
Sprint/Nextel, the service provider for the two phones recovered
from
the
truck.
Sprint/Nextel
identified
Graham’s
phone
as
subscribed to Graham’s wife at their shared Baltimore County
address and Jordan’s phone as subscribed to an alias or proxy.
The government then sought and obtained two court orders for
disclosure of CSLI for calls and text messages transmitted to
and from both phones. The government’s initial application for a
court order sought CSLI for four time periods: August 10-15,
2010; September 18-20, 2010; January 21-23, 2011; and February
4-5, 2011. A second application followed, seeking information
9
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 10 of 134
for a much broader timeframe: July 1, 2010 through February 6,
2011.
The
government
used
the
court
order
to
obtain
from
Sprint/Nextel records listing CSLI for this 221-day time period.
C.
The
government
charged
Graham
and
Jordan
with
multiple
counts of being felons in possession of a firearm, see 18 U.S.C.
§ 922(g)(1) (2011); robbery affecting commerce, see 18 U.S.C. §
1951(a) (Hobbs Act); conspiracy to commit Hobbs Act robbery, see
id.; brandishing a firearm during a crime of violence, see 18
U.S.C. § 924(c); and conspiracy to brandish a firearm during a
crime
of
violence,
see
18
U.S.C.
§
924(o).
Jordan
was
also
charged with possession of an unregistered sawed-off shotgun.
See 18 U.S.C. § 5861(d). The indictment also charged aiding and
abetting the felon-in-possession, Hobbs Act robbery, conspiracy,
and brandishing-a-firearm offenses. See 18 U.S.C. § 2. Graham
was charged in connection with all six robberies, and Jordan was
charged
in
connection
with
the
Shell,
Burger
King,
and
McDonald’s robberies.
Appellants filed a number of pre-trial motions, including
motions for severance under Rule 14 of the Federal Rules of
Criminal Procedure and a motion to suppress the CSLI obtained
from
Sprint/Nextel
on
Fourth
Amendment
grounds.
Jordan
separately filed a motion to suppress evidence seized during the
search of his apartment, arguing that the first search warrant
10
Appeal: 12-4659
was
Doc: 169
defective.
Filed: 08/05/2015
The
district
Pg: 11 of 134
court
denied
all
of
Appellants’
motions, and the case proceeded to trial.
During
trial,
Appellants
objected
to
proposed
testimony
regarding CSLI from a Sprint/Nextel records custodian and from
an
FBI
agent
proposed
who
investigated
testimony
was
the
case,
impermissible
arguing
the
opinion.
expert
that
The
district court disagreed and admitted the proposed testimony.
Jordan
also
handwritten
filed
a
statement
motion
in
limine
purportedly
seeking
written
by
to
admit
a
and
a
Graham
recorded telephone call in which Graham participated. The court
denied the motion, excluded the handwritten statement as hearsay
and unauthenticated, and excluded the phone call as irrelevant.
The court also ordered that the scope of Jordan’s testimony be
limited
to
exclude
certain
irrelevant
topics
that
were
potentially prejudicial to Graham.
At the close of the government’s case, the government moved
to dismiss the count of conspiracy to possess a firearm during a
crime
of
violence.
acquittal
as
evidence
under
to
Graham
all
Rule
and
Jordan
remaining
29(a)
of
counts
the
moved
for
Federal
for
judgment
of
insufficiency
of
Rules
of
Criminal
Procedure. The court denied the defendants’ Rule 29(a) motions,
except with respect to the felon-in-possession count, which the
court granted as to Jordan.
11
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 12 of 134
Jordan’s defense case consisted of his own testimony as
well
as
that
investigator.
of
four
Graham
character
declined
witnesses
to
testify
and
and
a
private
offered
no
evidence.
The parties rested on April 26, 2012, and delivered closing
arguments
the
following
day.
On
April
30,
2012,
the
jury
returned guilty verdicts on all remaining counts. Graham and
Jordan
submitted
motions
for
new
trials,
which
the
district
court denied. This appeal followed.
D.
During the pendency of this appeal, prior to oral argument,
this
Court
directed
each
party
to
file
a
supplemental
brief
addressing the U.S. Supreme Court’s recent decision in Riley v.
California, 134 S. Ct. 2473 (2014), and permitted Appellants to
file a supplemental reply brief. Dkt. No. 135. Appellants filed
their supplemental brief on July 18, 2014, Dkt. No. 138; the
government filed its supplemental response brief on August 4,
2014, Dkt. No. 142; and Appellants filed a supplemental reply
brief on August 8, 2014, Dkt. No. 144.
On August 21, 2014, the government filed a letter with the
Court
requesting
permission
to
identify
what
it
called
“erroneous factual assertions” in Appellants’ supplemental reply
and seeking to rebut several assertions made in that brief. Dkt.
No. 145. The next day, Appellants filed a motion to strike the
12
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 13 of 134
government’s letter as a sur-reply, Dkt. No. 146, to which the
government did not respond.
The
government’s
submission
is,
in
effect,
a
sur-reply
brief in the form of a letter. This Court does not generally
permit the filing of sur-reply briefs without first granting
leave for such a filing. Moreover, the government’s letter fails
to make an adequate demonstration of the need for a sur-reply.
Accordingly,
we
grant
the
motion
to
strike,
deny
the
government’s request, and do not consider the content of the
government’s letter in disposition of this appeal.
E.
Graham and Jordan present several issues on appeal, arguing
that the district court erred in admitting the government’s CSLI
evidence
and
certain
testimony
Sprint/Nextel
records
custodian
argues
separately
that
the
of
the
case
regarding
district
agent
the
court
and
CSLI.
also
the
Jordan
committed
constitutional error in restricting his testimony and erred in
denying
his
severance
motion,
excluding
the
out-of-court
statements attributed to Graham, and admitting evidence seized
from
his
apartment.
Jordan
argues
further
that
the
evidence
presented at trial was insufficient to support convictions for
conspiracy, Hobbs Act robbery, or brandishing a firearm during a
crime of violence. We consider these issues in turn.
II.
13
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 14 of 134
During the investigation of the robberies charged in this
case, the government secured court orders under the SCA for 221
days’ worth of historical CSLI from Sprint/Nextel. Appellants
filed a motion to suppress use of the CSLI at trial, arguing
that
the
government’s
acquisition
of
the
records
without
a
warrant based on probable cause was an unreasonable search in
violation of the Fourth Amendment. The district court denied the
motion,
holding
unreasonable
that
search
the
and,
government’s
even
if
it
conduct
was,
was
the
not
an
good-faith
exception to the exclusionary rule justified admission of the
CSLI. See generally United States v. Graham, 846 F. Supp. 2d 384
(D. Md. 2012). The government ultimately used the CSLI at trial
to establish Appellants’ locations at various times before and
after most of the charged robberies.
Appellants
now
appeal
the
denial
of
their
motion
to
suppress. We review a district court’s evidentiary rulings for
abuse of discretion, United States v. Rivera, 412 F.3d 562, 566
(4th Cir. 2005), but we review de novo any legal conclusions as
to
whether
certain
law
enforcement
conduct
infringes
Fourth
Amendment rights, United States v. Breza, 308 F.3d 430, 433 (4th
Cir. 2002).
For
the
reasons
explained
below,
we
hold
that
the
government’s procurement of the historical CSLI at issue in this
case
was
an
unreasonable
search.
14
Notwithstanding
that
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
conclusion,
we
affirm
suppression
motion
the
Pg: 15 of 134
district
because,
in
court’s
obtaining
denial
the
records,
the
of
the
government acted in good-faith reliance on the SCA and the court
orders issued under that statute.
A.
Historical CSLI identifies cell sites, or “base stations,”
to
and
from
signals,
and
which
the
a
cell
phone
particular
has
points
sent
in
or
time
received
at
which
radio
these
transmissions occurred, over a given timeframe. Cell sites are
placed
at
various
coverage
area
arranged
in
facilitate
and
locations
throughout
a
are
placed
towers
sectors
radio
often
facing
on
multiple
transmissions.
A
cell
service
with
directions
phone
provider’s
antennae
to
connects
better
to
a
service provider’s cellular network through communications with
cell sites, occurring whenever a call or text message is sent or
received by the phone. 1 The phone will connect to the cell site
with which it shares the strongest signal, which is typically
the nearest cell site. The connecting cell site can change over
the course of a single call as the phone travels through the
coverage
area.
When
the
phone
1
connects
to
the
network,
the
A “smartphone,” a type of cell phone with a computer
operating system, may communicate more frequently with the
network than other types of cell phones through, for example,
automatic updates to email inboxes and other operations of
software applications installed on the phone.
15
Appeal: 12-4659
Doc: 169
service
Filed: 08/05/2015
provider
automatically
Pg: 16 of 134
captures
and
retains
certain
information about the communication, including identification of
the specific cell site and sector through which the connection
is made.
By identifying the nearest cell tower and sector, CSLI can
be used to approximate the whereabouts of the cell phone at the
particular points in time in which transmissions are made. The
cell sites listed can be used to interpolate the path the cell
phone, and the person carrying the phone, travelled during a
given time period. The precision of this location data depends
on the size of the identified cell sites’ geographical coverage
ranges.
Cell
sites
in
urban
areas,
which
have
the
greatest
density of cell sites, tend to have smaller radii of operability
than those in rural areas. The cell sites identified in the CSLI
at issue in this case covered areas with a maximum radius of two
miles, each divided into three 120-degree sectors.
B.
The
government
obtained
Appellants’
CSLI
through
use
of
court orders issued under the SCA directing Sprint/Nextel to
disclose the information. The SCA “provid[es] an avenue for law
enforcement
entities
to
compel
a
provider
of
electronic
communication services to disclose the contents and records of
electronic communications.” In re Application of U.S. for an
Order Pursuant to 18 U.S.C. Section 2703(d) (In re Application
16
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 17 of 134
(Fourth Circuit)), 707 F.3d 283, 287 (4th Cir. 2013); see also
18 U.S.C. §§ 2701–2711 (2010). The statute outlines procedures a
governmental entity must follow to procure information from a
service
provider,
differently
than
treating
the
subscriber
content
of
account
electronic
records
communications.
United States v. Clenney, 631 F.3d 658, 666 (4th Cir. 2011)
(citing 18 U.S.C. § 2703).
Absent subscriber notice and consent, the government must
secure
a
records.
warrant
18
or
U.S.C.
a
§
court
order
2703(c)(1).
for
A
subscription
warrant
from
a
account
federal
district court for the disclosure of subscriber records must be
issued pursuant to the Federal Rules of Criminal Procedure, id.
§ 2703(c)(1)(A), which, in accordance with the Fourth Amendment,
require a finding of probable cause by an impartial magistrate,
Fed. R. Crim. P. 41(d); see also Payton v. New York, 445 U.S.
573, 588 n.26 (1980).
Section 2703(d) sets out the requirements for a court order
for a service provider to disclose subscriber account records.
The
government
must
“offer[]
specific
and
articulable
facts
showing that there are reasonable grounds to believe that . . .
the
records
material
2703(d).
to
or
other
an
ongoing
criminal
is
essentially
“This
information
sought[]
are
investigation.”
a
relevant
18
reasonable
and
U.S.C.
§
suspicion
standard[,]” In re Application (Fourth Circuit), 707 F.3d at
17
Appeal: 12-4659
287,
Doc: 169
in
Filed: 08/05/2015
contrast
to
the
Pg: 18 of 134
substantially
higher
probable
cause
standard for securing a warrant. The statute offers no express
direction as to when the government should seek a warrant versus
a § 2703(d) order.
The government obtained two § 2703(d) court orders for the
CSLI
at
issue
in
this
appeal.
The
first
order
directed
Sprint/Nextel to disclose CSLI records for four time periods
amounting to 14 days, and the second order directed disclosure
of records for a much broader 221-day time period that included
the previously ordered 14 days. Sprint/Nextel disclosed to the
government
the
total
221
days’
worth
of
CSLI
for
each
Appellant’s phone.
C.
Appellants argue that the government violated the Fourth
Amendment
in
seeking
and
inspecting
the
CSLI
at
issue
here
without a warrant based on probable cause. We agree.
The
Fourth
Amendment
protects
individuals
against
unreasonable searches and seizures. Katz v. United States, 389
U.S.
347,
353
(1967).
A
“search”
within
the
meaning
of
the
Fourth Amendment occurs where the government invades a matter in
which a person has an expectation of privacy that society is
willing to recognize as reasonable. Kyllo v. United States, 533
U.S. 27, 33 (2001) (citing Katz, 389 U.S. at 361 (Harlan, J.,
concurring)). A person’s expectation of privacy is considered
18
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 19 of 134
reasonable by societal standards when derived from “‘concepts of
real or personal property law or . . . understandings that are
recognized and permitted by society.’” Minnesota v. Carter, 525
U.S. 83, 88 (1998) (quoting Rakas v. Illinois, 439 U.S. 128, 143
n.12 (1978)). Warrantless searches are, “as a general matter, .
. . per se unreasonable under the Fourth Amendment,” although
“there are a few specifically established and well-delineated
exceptions
to
that
general
rule.”
United
States
v.
(Earl
Whittley) Davis, 690 F.3d 226, 241-42 (4th Cir. 2012) (quoting
City
of
Ontario,
Cal.
v.
Quon,
560
U.S.
746,
760
(2010))
(internal quotation marks omitted).
We hold that the government conducts a search under the
Fourth
user’s
Amendment
when
historical
Examination
of
a
it
CSLI
obtains
for
person’s
an
and
inspects
extended
historical
CSLI
a
cell
phone
period
of
time.
can
enable
the
government to trace the movements of the cell phone and its user
across
public
and
private
spaces
and
thereby
discover
the
private activities and personal habits of the user. Cell phone
users have an objectively reasonable expectation of privacy in
this information. Its inspection by the government, therefore,
19
Appeal: 12-4659
Doc: 169
requires
a
Filed: 08/05/2015
warrant,
unless
an
Pg: 20 of 134
established
exception
to
the
warrant requirement applies. 2
1.
As an initial matter, we are not persuaded that, as the
district court stated, Sprint/Nextel’s privacy policy disproves
Appellants’ claim that they had an actual expectation in the
privacy of their location and movements. The privacy policy in
effect
at
the
time
Sprint/Nextel
disclosed
CSLI
to
the
government stated as follows:
Information we collect when we provide you with
Services includes when your wireless device is turned
on, how your device is functioning, device signal
strength, where it is located, what device you are
using, what you have purchased with your device, how
you are using it, and what sites you visit.
J.A.
957.
First,
the
policy
only
states
that
Sprint/Nextel
collects information about the phone’s location – not that it
discloses this information to the government or anyone else.
2
The en banc Eleventh Circuit recently held that, assuming
government acquisition of CSLI through use of a § 2703(d) order
is a Fourth Amendment search, such a search would be reasonable
under the Fourth Amendment and not require a warrant. United
States v. (Quartavious) Davis, 785 F.3d 498, 516-18 (11th Cir.
2015) (en banc). Section 2703(d) orders, as previously noted, do
not require a showing of probable cause and do not fit within
any of the “well delineated exceptions” to the general rule that
a search requires a warrant based on probable cause. Quon, 560
U.S. at 760. We decline here to create a new exception to a rule
so well established in the context of criminal investigations.
20
Appeal: 12-4659
Doc: 169
Second,
Filed: 08/05/2015
studies
have
Pg: 21 of 134
shown
that
users
of
electronic
communications services often do not read or understand their
providers’
privacy
policies. 3
There
is
no
evidence
that
Appellants here read or understood the Sprint/Nextel policy.
2.
The Supreme Court has recognized an individual’s privacy
interests in comprehensive accounts of her movements, in her
location,
and
in
the
location
of
her
personal
property
in
private spaces, particularly when such information is available
only
through
technological
means
not
in
use
by
the
general
public.
a.
In
United
States
v.
Knotts,
460
U.S.
276
(1983),
law
enforcement officers used a combination of visual surveillance
and monitoring of a radio transmitter installed in a container
of chloroform to track the container’s movements by automobile
to the defendants’ homes. 460 U.S. at 278-79. In holding that
this practice did not infringe upon a reasonable expectation of
3
See, e.g., Federal Trade Commission, Mobile Privacy
Disclosures: Building Trust Through Transparency 10 (Feb. 2013),
http://www.ftc.gov/sites/default/files/documents/reports/mobileprivacy-disclosures-building-trust-through-transparency-federaltrade-commission-staff-report/130201mobileprivacyreport.pdf
(saved as ECF opinion attachment); Aleecia M. McDonald & Lorrie
Faith Cranor, The Cost of Reading Privacy Policies, 4 I/S: J. L.
& Pol’y Info. Soc’y 543, 544 (2008).
21
Appeal: 12-4659
Doc: 169
privacy,
the
Filed: 08/05/2015
Court
Pg: 22 of 134
emphasized
the
“limited”
nature
of
the
government’s electronic surveillance effort, which was confined
to tracking the container’s movement on public roads from its
place
of
purchase
to
its
ultimate
destination.
Id.
at
284.
Although the government tracked the container to a defendant’s
private
home,
continued
after
its
was
monitor
to
there
the
public
no
indication
container
journey
had
that
inside
ended.
Id.
the
at
the
officers
private
285;
see
space
also
California v. Ciraolo, 476 U.S. 207, 213 (1986) (“The Fourth
Amendment
require
protection
law
of
enforcement
the
home
officers
has
never
to
shield
been
extended
their
eyes
to
when
passing by a home on public thoroughfares.”).
Knotts left unanswered two questions critical to assessing
the constitutionality of the government’s conduct in the present
case: (1) whether tracking the location of an individual and her
property inside a private space constitutes a Fourth Amendment
search; and (2) whether locational tracking of an individual and
her
property
constitutes
continuously
a
search.
over
Courts
an
have
extended
answered
period
each
of
of
time
these
questions in the affirmative.
b.
United States v. Karo, 468 U.S. 705 (1984), addressed the
first question. As in Knotts, government agents surreptitiously
used a radio transmitter to track the movements of a chemical
22
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 23 of 134
container to a private residence, but here the agents continued
to
monitor
the
container
while
it
was
inside
the
residence.
Karo, 468 U.S. at 709-10. The Court held that this practice
“violate[d]
the
Fourth
Amendment
rights
of
those
who
have
a
justifiable interest in the privacy of the residence.” Id. at
714. The government’s monitoring of the beeper “reveal[ed] a
critical fact about the interior of the premises . . . that [the
government]
could
not
have
otherwise
obtained
without
a
warrant”: “that a particular article is actually located at a
particular
time
in
the
private
residence
and
is
in
the
possession of the person or persons whose residence is being
watched.”
Id.
at
715.
“Indiscriminate
monitoring
of
property
that has been withdrawn from public view would present far too
serious a threat to privacy interests in the home to escape
entirely some sort of Fourth Amendment oversight.” Id. at 716
(footnote omitted).
In Kyllo v. United States, 533 U.S. 27 (2001), the Court
again
considered
information
whether
hidden
in
a
the
use
private
of
home
technology
to
constituted
discover
a
Fourth
Amendment search. The government aimed a thermal imaging device
at the petitioner’s home from a public street to detect infrared
radiation inside the home, which would allow it to identify the
locations and movements of persons and certain objects inside.
Id. at 29-30. The Court held that “[w]here . . . the Government
23
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 24 of 134
uses a device that is not in general public use, to explore
details of the home that would previously have been unknowable
without physical intrusion, the surveillance is a ‘search’ and
is presumptively unreasonable without a warrant.” Id. at 40.
Like the searches challenged in Karo and Kyllo, examination
of
historical
CSLI
can
allow
the
government
to
place
an
individual and her personal property – specifically, her cell
phone – at the person’s home and other private locations at
specific points in time. “In the home, . . . all details are
intimate
details,
because
the
entire
area
is
held
safe
from
prying government eyes.” Id. at 37; see also Karo, 468 U.S. at
714 (“[P]rivate residences are places in which the individual
normally
expects
privacy
free
of
governmental
intrusion
not
authorized by a warrant, and that expectation is plainly one
that society is prepared to recognize as justifiable.”). The
Karo and Kyllo Courts recognized the location of a person and
her property within a home at a particular time as a “critical”
private detail protected from the government’s intrusive use of
technology. See Kyllo, 533 U.S. at 37; Karo, 468 U.S. at 715.
Inspection
of
long-term
CSLI
invades
an
even
greater
privacy interest than the search challenged in Karo because,
unlike a cell phone, the tracking device in Karo was not carried
on anyone’s person and therefore was not capable of tracking the
location of any individual. Additionally, the private location
24
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 25 of 134
information discovered in this case covered a remarkable 221
days,
potentially
placing
each
Appellant
at
home
on
several
dozen specific occasions, far more than the single instances
discovered in Karo and Kyllo. See Kyllo, 533 U.S. at 30; Karo,
468 U.S. at 709, 714.
c.
The Supreme Court considered long-term electronic location
surveillance in United States v. Jones, 132 S. Ct. 945 (2012).
In
that
installed
case,
a
the
Global
government,
Positioning
acting
System
without
(“GPS”)
a
warrant,
device
on
a
suspect’s vehicle to track the movements of the vehicle over a
28-day period. Jones, 132 S. Ct. at 948. The D.C. Circuit had
decided that this practice was a search because (1) a reasonable
individual would not expect that the sum of her movements over a
month would be observed by a stranger in public, and (2) this
information could reveal “an intimate picture” of her life not
disclosed
by
any
one
of
her
movements
viewed
individually.
United States v. Maynard, 615 F.3d 544, 561-64 (D.C. Cir. 2010),
aff’d sub. nom. Jones, 132 S. Ct. 945.
The
without
Supreme
Court
reaching
full
unanimously
agreement
affirmed
as
to
the
the
D.C.
basis
Circuit
for
this
decision. See Jones, 132 S. Ct. at 954; id. at 964 (Alito, J.,
concurring in the judgment). The entire Court did agree however
that Knotts had explicitly left unanswered the constitutionality
25
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 26 of 134
of “dragnet type law enforcement practices” like the form of
“twenty-four hour surveillance” employed in Jones. Knotts, 460
U.S. at 283-84); see Jones, 132 S. Ct. at 952 n.6 (Scalia, J.,
writing
for
the
majority);
concurring);
id.
at
judgment).
Justice
963
id.
n.10
Scalia’s
at
956
(Alito,
majority
n.*
J.,
(Sotomayor,
concurring
J.,
the
expressing
opinion,
in
the
views of five Justices, held that the government’s installation
of the GPS device on the suspect’s vehicle constituted a search
under the traditional trespass-based theory of Fourth Amendment
protection,
analysis
bypassing
established
acknowledging
that
the
in
reasonable-expectation-of-privacy
Katz.
See
“[s]ituations
id.
at
949-52.
involving
While
merely
the
transmission of electronic signals without trespass would remain
subject to Katz analysis,” Justice Scalia declined to address
this question. Id. at 953; see also id. at 954 (“It may be that
achieving the same result through electronic means, without an
accompanying
trespass,
is
an
unconstitutional
invasion
of
privacy, but the present case does not require us to answer that
question.”).
In two concurring opinions, five Justices confronted the
Katz question and agreed that “longer term GPS monitoring in
investigations
of
most
offenses
impinges
on
expectations
of
privacy.” Id. at 955 (Sotomayor, J., concurring); id. at 964
(Alito,
J.,
concurring
in
the
26
judgment).
Justice
Sotomayor
Appeal: 12-4659
Doc: 169
echoed
the
Filed: 08/05/2015
D.C.
Circuit’s
Pg: 27 of 134
concerns
about
the
government’s
ability to record an individual’s movements and aggregate the
information
a
more
ascertain,
“in
or
manner
less
at
that
enables
will,”
the
private
Government
facts
about
to
the
individual, such as her “political and religious beliefs, sexual
habits, and so on.” Id. at 956. Neither concurrence indicated
how
long
location
surveillance
could
occur
before
triggering
Fourth Amendment protection, but, considering the investigation
challenged in Jones, Justice Alito stated that “the line was
surely crossed before the 4-week mark.” Id. at 964.
The privacy interests affected by long-term GPS monitoring,
as identified in Maynard and the Jones concurrences, apply with
equal or greater force to historical CSLI for an extended time
period. See Commonwealth v. Augustine, 4 N.E.3d 846, 861 (Mass.
2014) (“CSLI implicates the same nature of privacy concerns as a
GPS
tracking
device.”).
“[C]itizens
of
this
country
largely
expect the freedom to move about in relative anonymity without
the government keeping an individualized, turn-by-turn itinerary
of our comings and goings.” Renée McDonald Hutchins, Tied Up in
Knotts? GPS Technology and the Fourth Amendment, 55 UCLA L. Rev.
409, 455 (2007). Much like long-term GPS monitoring, long-term
location information disclosed in cell phone records can reveal
both
a
comprehensive
view
and
specific
details
of
the
individual’s daily life. As the D.C. Circuit stated in Maynard,
27
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 28 of 134
“A person who knows all of another’s travels can deduce whether
he is a weekly church goer, a heavy drinker, a regular at the
gym,
an
unfaithful
husband,
an
outpatient
receiving
medical
treatment, an associate of particular individuals or political
groups – and not just one such fact about a person, but all such
facts.” 615 F.3d at 561-62; compare Jones, 132 S. Ct. at 955
(Sotomayor,
precise,
J.,
concurring)
comprehensive
record
(“GPS
of
a
monitoring
person’s
generates
public
a
movements
that reflects a wealth of detail about her familial, political,
professional, religious, and sexual associations.”), with State
v. Earls, 70 A.3d 630, 642 (N.J. 2013) (“[CSLI] can reveal not
just where people go — which doctors, religious services, and
stores they visit — but also the people and groups they choose
to affiliate with and when they actually do so.”).
Inspection of historical CSLI may provide even more private
information about an individual than the locational monitoring
challenged in Maynard/Jones. The surveillance at issue in that
case was limited to movements of an automobile on public roads.
See Jones, 132 S. Ct. at 948. Quite unlike an automobile, a cell
phone is a small hand-held device that is often hidden on the
person of its user and seldom leaves her presence. As previously
discussed, cell phone users regularly carry these devices into
their homes and other private spaces to which automobiles have
28
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 29 of 134
limited access at best. See Augustine, 4 N.E.3d at 861. 4 Thus,
unlike GPS monitoring of a vehicle, examination of historical
CSLI can permit the government to track a person’s movements
between
public
and
private
spaces,
impacting
at
once
her
interests in both the privacy of her movements and the privacy
of her home. 5
Considering the multiple privacy interests at stake, it is
not surprising that we are not the first court to recognize as
objectively reasonable cell phone users’ expectation of privacy
in their long-term CSLI. See, e.g., Augustine, 4 N.E.3d at 865-
4
Cell phones are not subject to the “lesser expectation of
privacy in a motor vehicle,” which, as noted in Knotts, “has
little capacity for escaping public scrutiny.” 460 U.S. at 281
(quoting
Cardwell
v.
Lewis,
417
U.S.
583,
590
(1974)
(plurality)). Additionally, while a car “seldom serves . . . as
the repository of personal effects[,]” id., cell phones often
provide access to substantial collections of private notes and
records, hiding these personal effects from inspection even
while themselves hidden from view in their owners’ purses or
pockets, see Riley, 134 S. Ct. at 2489-91.
5
Indeed, a recent survey by the Pew Research Center
revealed that 82% of adults feel that the details of their
physical location revealed by cell phone GPS tracking is at
least “somewhat sensitive,” with half of adults considering this
information “very sensitive.” Pew Research Center, Public
Perceptions of Privacy and Security in the Post-Snowden Era 34
(Nov.
12,
2014),
http://www.pewinternet.org/files/2014/11/PI_PublicPerceptionsofP
rivacy_111214.pdf (saved as ECF opinion attachment). This
percentage rivals that of adults who consider their health
information and the content of their phone conversations,
emails, and text messages at least “somewhat sensitive” – 81%,
81%, 77%, and 75%, respectively. Id. at 32-34.
29
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 30 of 134
66 (reasonable expectation of privacy in location information
shown
in
historical
CSLI
records);
Earls,
70
A.3d
at
632
(reasonable expectation of privacy in location of cell phones);
Tracey v. State, 152 So.3d 504, 526 (Fla. 2014) (objectively
reasonable expectation of privacy in “location as signaled by
one’s
cell
phone”);
In
re
Application
of
U.S.
for
an
Order
Authorizing Disclosure of Location Info. of a Specified Wireless
Tel.,
849
F.
Supp.
2d
526,
539
(D.
Md.
2011)
(“reasonable
expectation of privacy both in [subject’s] location as revealed
by real-time [CSLI] and in his movement where his location is
subject to continuous tracking over an extended period of time,
here
thirty
days”);
In
re
Application
of
U.S.
for
an
Order
Authorizing the Release of Historical Cell-Site Info. (In re
Application
2011)
(E.D.N.Y.)),
(“reasonable
site-location
809
F.
expectation
records”). 6
Supp.
of
Even
the
2d
privacy
Supreme
113,
in
120
(E.D.N.Y.
long-term
Court,
in
cellRiley,
6
As the dissenting opinion points out, a number of courts
that have addressed the issue have not reached the same
conclusion we reach today. Courts that have reached the opposite
conclusion, like the dissent, have typically done so through
application of the “third-party” doctrine as discussed in Part
II.C.4 infra.
In United States v. Skinner, 690 F.3d 772 (6th Cir. 2012),
the Sixth Circuit held that the defendant “did not have a
reasonable expectation of privacy in the data given off by his
voluntarily procured pay-as-you-go cell phone.”
690 F.3d at
777. This case involved locational surveillance of two cell
phones in real time over the course of a few days as the users
(Continued)
30
Appeal: 12-4659
Doc: 169
specifically
the
cited
heightened
inspection
Filed: 08/05/2015
of
“[h]istoric
privacy
cell
Pg: 31 of 134
location
concerns
phones,
as
such
information”
presented
in
information
as
among
government
details
the
user’s “specific movements down to the minute, not only around
town but also within a particular building.” 134 S. Ct. at 2490. 7
Taken together, Karo, Kyllo, and the views expressed in
Riley and the Jones concurrences support our conclusion that the
government invades a reasonable expectation of privacy when it
relies
upon
technology
not
in
general
use
to
discover
the
movements of an individual over an extended period of time. Cell
phone
tracking
through
inspection
of
CSLI
is
one
such
technology. It is possible that the CSLI for a particular cell
transported marijuana along public roads. Id. at 776. The Sixth
Circuit determined that the case was governed by Knotts, id. at
777-78, and distinguished Jones based on the “comprehensiveness
of the tracking” in that case, involving “‘constant monitoring’”
over the course of four weeks, id. at 780 (quoting Jones, 132 S.
Ct. at 963 (Alito, J., concurring in the judgment)). The instant
case is similarly distinguishable.
7
Some courts, including the district court in this case, as
well as the dissent, have suggested that privacy interests in
real-time or prospective location information are greater than
those in historical location information, like that at issue in
this case. See (Quartavious) Davis, 785 F.3d at 509 n.10;
Graham, 846 F. Supp. 2d at 391. We see no constitutional
distinction
between
the
two
types
of
data.
A
person’s
expectation of privacy in information about where she has been
is no less reasonable, or less deserving of respect, than that
regarding where she is or where she is going.
31
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 32 of 134
phone is not very revealing at all because, for instance, the
phone has been turned off or it has made few or no connections
to
the
cellular
network.
But
the
government
cannot
know
in
advance of obtaining this information how revealing it will be
or whether it will detail the cell phone user’s movements in
private spaces. See Earls, 70 A.3d at 642. We hold, therefore,
that the government engages in a Fourth Amendment search when it
seeks to examine historical CSLI pertaining to an extended time
period like 14 or 221 days. 8
3.
The
district
court
concluded
that
this
case
is
distinguishable from Karo and Maynard/Jones because the type of
locational surveillance at issue in those cases permits realtime tracking with greater precision and continuity than the
examination of historical CSLI. See Graham, 846 F. Supp. 2d at
391-92,
404.
The
use
of
GPS
technology
challenged
in
Maynard/Jones permitted law enforcement to track the suspect’s
vehicle continuously at every moment “‘24 hours a day for 28
days[,]’” id. at 392 (quoting Maynard, 615 F.3d at 558), while,
8
This case does not require us to draw a bright line as to
how long the time period for historical CSLI can be before its
inspection rises to the level of a Fourth Amendment search, and
we decline to do so.
32
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 33 of 134
here, the CSLI records only disclose a finite number of location
data points for certain points in time.
This
distinction
is
constitutionally
insignificant.
The
Fourth Amendment challenge is directed toward the government’s
investigative conduct, i.e., its decision to seek and inspect
CSLI records without a warrant. There is no way the government
could have known before obtaining the CSLI records how granular
the location data in the records would be. If Appellants had
been in constant use of their phones as they moved about each
waking day – constantly starting and terminating calls – then
the
government
historical
would
location
have
obtained
information
a
continuous
approaching
that
stream
of
GPS.
of
A
similar or greater degree of continuity would have been achieved
if Appellants had smartphones that automatically connect to the
nearest cell site every few minutes or seconds.
As it turns out, the CSLI records did reveal an impressive
29,659 location data points for Graham and 28,410 for Jordan,
amounting to well over 100 data points for each Appellant per
day on average. This quantum of data is substantial enough to
provide a reasonably detailed account of Appellants’ movements
during the 221-day time period, including movements to and from
the
cell-site
sectors
in
which
their
homes
were
located.
We
therefore reject the district court’s suggestion that the CSLI
33
Appeal: 12-4659
was
Doc: 169
not
Filed: 08/05/2015
sufficiently
continuous
Pg: 34 of 134
to
raise
reasonable
privacy
concerns.
The district court also questioned the precision of the
location data itself, concluding that the CSLI did not identify
sufficiently precise locations to invade a reasonable privacy
expectation. Unlike GPS data, the court found, CSLI “can only
reveal the general vicinity in which a cellular phone is used.”
Graham, 846 F. Supp. 2d at 392.
The precision of CSLI in identifying the location of a cell
phone
depends
in
part
on
the
size
of
the
coverage
area
associated with each cell-site sector listed in the records. 9
Service providers have begun to increase network capacity and to
fill gaps in network coverage by installing low-power cells such
as “microcells” and “femtocells,” which cover areas as small as
40
feet. 10
The
intense
competition
among
cellular
networks
9
Sprint/Nextel’s custodian testified at trial that the cell
sites listed in the records each had, at most, a two-mile radius
of operability. Each cell site, therefore, covered no greater
than approximately 12.6 square miles, divided into three sectors
of approximately 4.2 square miles or less.
10
See Federal Communications Commission, Public Safety Tech
Topic #23 – Femtocells, http://www.fcc.gov/help/public-safetytech-topic-23-femtocells; PR Newswire, Small Cells Market 20142019: Femtocell, Picocell, & Microcell Prospects for LTE, SONs,
Wireless Offloading & Heterogeneous Networks (Nov. 6, 2014),
http://www.prnewswire.com/news-releases/small-cells-market-20142019-femtocell-picocell--microcell-prospects-for-lte-sonswireless-offloading--heterogeneous-networks-281857341.html;
Nancy
Gohring,
Femtocells
Make
Way
Into
Enterprises,
(Continued)
34
Appeal: 12-4659
Doc: 169
provides
ample
Filed: 08/05/2015
reason
to
Pg: 35 of 134
anticipate
increasing
use
of
small
cells and, as a result, CSLI of increasing precision. We must
take such developments into account. See Kyllo, 533 U.S. at 36
(“While the technology used in the present case was relatively
crude, the rule we adopt must take account of more sophisticated
systems that are already in use or in development.”).
In any event, the CSLI at issue here was precise enough, at
minimum,
to
support
reasonable
inferences
about
Appellants’
locations at specific points in time. Otherwise, the information
would have lacked any probative value at trial. The very reason
that the government obtained and introduced the evidence was to
establish
charged
Appellants’
robberies. 11
locations
during
Investigators
and
times
surrounding
prosecutors
ComputerWorld
(May
7,
http://www.computerworld.com/article/2550032/mobilewireless/femtocells-make-way-into-enterprises.html.
11
must
the
have
2011),
Specifically, the government used the CSLI to show, among
other things, that Graham was within a few miles of the Dollar
Tree before and after the robbery of January 17, 2011; Graham
was within a few miles of the 7-Eleven before and after the
robbery of January 22, 2011; minutes after the robbery of Shell
on February 1, 2011, Jordan was near the Shell and then both he
and Graham were near Jordan’s apartment; Appellants were both
near Jordan’s apartment approximately 45 minutes before robbery
of Burger King on February 5, 2011; Graham was near the Burger
King within minutes of the robbery; Appellants were together a
few miles north of the Burger King minutes after the robbery;
and Graham was near the McDonald’s approximately one half hour
before the McDonald’s robbery.
35
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 36 of 134
believed, after analyzing the CSLI, that it was sufficiently
precise
to
establish
Appellants’
whereabouts.
The
fact
that
inference was required to glean Appellants’ past locations from
the
CSLI
invasion
does
not
ameliorate
of
privacy.
Indeed,
specifically
rejected
“the
or
the
novel
lessen
Supreme
in
any
manner
Court,
proposition
in
that
the
Kyllo,
inference
insulates a search . . . .” Id. at 36 (citing Karo, 468 U.S.
705). We therefore reject the government’s argument that the
CSLI was not adequately precise to infringe upon Appellants’
expectations of privacy in their locations and movements.
4.
We
dissent’s
also
disagree
conclusion
with
that
the
district
Appellants
court’s
lacked
a
and
the
reasonable
expectation of privacy in their CSLI because the CSLI records
were kept by Sprint/Nextel in the ordinary course of business.
See Graham, 846 F. Supp. 2d at 403; post at 111.
The
dissent
argues
first
that
“[t]he
nature
of
the
governmental activity” at issue in this case sets it apart from
Karo, Kyllo, and Jones. Post at 108-09. While Karo, Kyllo, and
Jones each involved direct and contemporaneous surveillance by
government agents, the locational tracking challenged here was
achieved
through
government
inspection
third party.
36
of
records
held
by
a
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 37 of 134
This distinction is inconsequential. The precedents of this
Court
and
certainly
others
be
show
achieved
that
a
Fourth
through
an
Amendment
inspection
of
search
may
third-party
records. See, e.g., Doe v. Broderick, 225 F.3d 440, 450-52 (4th
Cir. 2000) (holding that detective’s examination of a patient
file
held
by
a
methadone
clinic
was
a
search
and,
without
probable cause, violated the patient’s Fourth Amendment rights);
DeMassa v. Nunez, 770 F.2d 1505, 1508 (9th Cir. 1985) (holding
that “an attorney’s clients have a legitimate expectation of
privacy
in
their
client
files”);
cf.
Ferguson
v.
City
of
Charleston, 532 U.S. 67, 78 (2001) (holding that patients enjoy
a
reasonable
diagnostic
expectation
tests
will
not
of
privacy
be
that
disclosed
to
the
law
results
of
enforcement
without the patient’s consent). 12 That the government acquired
12
In the sense most crucial to a proper Fourth Amendment
analysis, “[t]he nature of the governmental activity” challenged
in this case, post at 108-09, was not unlike that challenged in
Karo, Kyllo, and Jones. The dissent’s language is apparently
drawn from Smith v. Maryland, 442 U.S. 735 (1979), where the
Court deemed it important to identify “the nature of the state
activity that is challenged” in order to determine the precise
nature of Smith’s Fourth Amendment claim. 442 U.S. at 741.
Specifically, this initial inquiry was made in order to
determine whether Smith could claim an invasion of his property
or intrusion into a constitutionally protected area, under the
traditional
trespass-based
theory
of
Fourth
Amendment
protection. Because the challenged governmental activity was the
installation of a pen register “on telephone company property at
the telephone company’s central offices,” Smith could make no
such claim. Id. Instead, Smith claimed an invasion of a
legitimate expectation of privacy in the numbers he dialed,
(Continued)
37
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 38 of 134
Appellants’ private information through an inspection of thirdparty records cannot dispose of their Fourth Amendment claim.
Yet the dissent seizes upon the fact that the government
obtained
Appellants’
CSLI
from
a
third-party
cell
service
provider and maintains that we have placed our focus on the
wrong
question.
Appellants’
Instead
expectation
of
of
assessing
privacy
in
the
reasonableness
their
“location
of
and
movements over time,” our dissenting colleague would frame the
question as “whether an individual has a reasonable expectation
which the government obtained through use of the pen register.
Id. at 742.
In this sense, the nature of the governmental activity
challenged in this case is not unlike the activities challenged
in Karo, Kyllo, and Jones. In Karo and Kyllo, the nature of the
challenged governmental activity was the use of technology to
acquire certain private information rather than the physical
invasion of constitutionally protected property or spaces. See
Karo, 468 U.S. at 714; Kyllo, 533 U.S. at 34-35. The
governmental activity challenged in Jones was of both sorts:
installation of a GPS tracking device effected through a
trespass onto Jones’ property, and use of the device to obtain
information about Jones’ location and movements over an extended
period of time. As previously noted, the majority confined its
analysis to the trespass without considering the nature of the
information the government subsequently acquired. 132 S. Ct. at
949-54. In the concurrences, five Justices focused on the
government’s acquisition of location information and whether
this conduct invaded a legitimate expectation of privacy.
Because the challenged activity in the present case, like those
considered in Karo, Kyllo, and the Jones concurrences, is the
government’s non-trespassory acquisition of certain information,
our inquiry is properly focused on the legitimacy of Appellants’
expectation of privacy in this information.
38
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 39 of 134
of privacy in a third party’s records that permit the government
to deduce this information.” Post at 109. But even the analyses
in the cases upon which the dissent relies focused foremost on
whether,
under
Katz,
the
privacy
expectations
asserted
for
certain information obtained by the government were legitimate.
See United States v. Miller, 425 U.S. 435, 442 (1976) (“We must
examine
the
nature
of
the
particular
documents
sought
to
be
protected in order to determine whether there is a legitimate
‘expectation of privacy’ concerning their contents.” (emphasis
added));
Smith
v.
Maryland,
442
U.S.
735,
742
(1979)
(“[P]etitioner’s argument that [the] installation and use [of a
pen register] constituted a ‘search’ necessarily rests upon a
claim
that
regarding
added)).
he
the
In
information
had
a
numbers
‘legitimate
he
answering
at
issue
dialed
in
that
expectation
on
his
question,
Miller
and
phone.”
the
Smith
of
fact
was
privacy’
(emphasis
that
contained
the
in
records held by third parties became relevant only insofar as
the
defendant
in
each
case
had
“voluntarily
conveyed”
the
information to the third party in the first place. See Miller,
425 U.S. at 442; Smith, 442 U.S. at 743-44.
It is clear to us, as explained below, that cell phone
users
do
providers.
not
The
voluntarily
convey
third-party
their
doctrine
therefore inapplicable here.
39
of
CSLI
to
Miller
their
and
service
Smith
is
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 40 of 134
a.
The Supreme Court held in Miller and Smith that “a person
has
no
legitimate
expectation
of
privacy
in
information
he
voluntarily turns over to third parties.” Smith, 442 U.S. at
743-44; see also Miller, 425 U.S. at 442. This is so even if
“the information is revealed on the assumption that it will be
used only for a limited purpose and the confidence placed in the
third party will not be betrayed.” Miller, 425 U.S. at 443. 13
In
Miller,
the
government
used
defective
subpoenas
to
obtain financial records from the defendant’s bank. 425 U.S. at
436. The Court determined first that the defendant could not
claim
because
an
unconstitutional
he
transactional
had
neither
records
at
invasion
ownership
issue.
of
his
nor
Id.
“private
possession
at
440-41
papers”
of
the
(citation
omitted). Next, the Court turned to the defendant’s claim that
the government violated his privacy interests in the contents of
13
This “third-party” doctrine finds its roots in cases
involving consensual disclosures to informants or undercover
government agents. See United States v. White, 401 U.S. 745,
751-752 (1971); Hoffa v. United States, 385 U.S. 293, 302-303
(1966); Lopez v. United States, 373 U.S. 427, 439 (1963). White,
Hoffa, Lopez, and similar cases generally establish that a
person who confides information about her illegal activities in
another bears the risk that this information will be reported to
law enforcement, see White, 401 U.S. at 752, and introduced as
evidence against her, see Lopez, 373 U.S. at 439. Any
expectation she holds that this information will be held in
confidence is not one entitled to Fourth Amendment protection.
See White, 401 U.S. at 749; Hoffa, 385 U.S. at 301.
40
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 41 of 134
the bank records. Id. at 442. Because such documents “contain
only information voluntarily conveyed to the banks and exposed
to
their
employees
in
the
ordinary
course
of
business,”
the
Court held that the depositor lacks “any legitimate expectation
of privacy” in this information. Id. at 442. “[I]n revealing his
affairs to another,” the defendant assumed the risk “that the
information
[would]
be
conveyed
by
that
person
to
the
Government.” Id. at 443.
In Smith, a telephone company, at the request of police,
utilized a pen register device to record the numbers dialed from
the home phone of Michael Lee Smith, a man suspected of robbing
a woman and then harassing her through anonymous phone calls.
442 U.S. at 737. Smith argued that the warrantless installation
of the pen register was an unreasonable search. Id. at 737-38.
The Court determined, first, that people generally understand
that they must communicate the numbers they dial to the phone
company and that the company has facilities for recording and
storing this information permanently. Id. at 742. Even if Smith
had an actual expectation of privacy in the numbers he dialed,
this
would
not
be
a
“legitimate”
expectation
because
he
“voluntarily conveyed” the numerical information to the phone
company
and
“‘exposed’”
the
information
to
the
company’s
recording and storage equipment. Id. at 744. In so doing, Smith
41
Appeal: 12-4659
Doc: 169
“assumed
Filed: 08/05/2015
the
risk”
that
the
Pg: 42 of 134
company
would
disclose
this
information to law enforcement. Id.
We recently applied the third-party doctrine of Miller and
Smith in United States v. Bynum, 604 F.3d 161 (4th Cir. 2010),
where
the
government
served
administrative
subpoenas
on
a
website operator to obtain a user’s account information. 604
F.3d at 162. Specifically, the government obtained the user’s
name, email address, telephone number, and physical address, id.
at 164, all information that the user entered on the website
when
he
opened
determined
his
that,
account,
in
id.
at
“voluntarily
162.
Citing
Smith,
convey[ing]
all
we
this
information” to the Internet company, the user “‘assumed the
risk’”
that
this
information
would
be
revealed
to
law
enforcement. Id. at 164 (quoting Smith, 442 U.S. at 744). The
user, therefore, could not show that he had either an actual or
an
objectively
reasonable
expectation
of
privacy
in
this
information. Id.
These precedents do not categorically exclude third-party
records from Fourth Amendment protection. They simply hold that
a
person
can
claim
no
legitimate
expectation
of
privacy
in
information she voluntarily conveys to a third party. It is that
voluntary conveyance – not the mere fact that the information
winds up in the third party’s records – that demonstrates an
assumption of risk of disclosure and therefore the lack of any
42
Appeal: 12-4659
Doc: 169
reasonable
Filed: 08/05/2015
expectation
of
Pg: 43 of 134
privacy.
We
decline
to
apply
the
third-party doctrine in the present case because a cell phone
user does not “convey” CSLI to her service provider at all –
voluntarily or otherwise – and therefore does not assume any
risk of disclosure to law enforcement. 14
The
response
service
to
provider’s
provider
connections
network,
automatically
made
with
between
and
the
without
generates
cell
phone
the
user’s
CSLI
in
and
the
active
participation. See Augustine, 4 N.E.3d at 862 (“CSLI is purely a
function and product of cellular telephone technology, created
by the provider’s system network at the time that a cellular
telephone
call
connects
to
a
14
cell
site.”);
id.
at
863
At the outset of its argument that the third-party
doctrine applies here, the dissent insists that Appellants
“exposed” their CSLI to their service provider and therefore
assumed the risk of disclosure to law enforcement. Post at 111.
This “exposure” language is derived from Miller and Smith, but
it is clear in each of those cases that any “exposure” of the
information at issue to the third party’s employees or
facilities occurred only through the defendant’s voluntary
conveyance of that information to the third party. See Miller,
425 U.S. at 442 (noting that the financial information at issue
had been “voluntarily conveyed to the banks and exposed to their
employees in the ordinary course of business” (emphasis added));
Smith, 442 U.S. at 744 (“When he used his phone, petitioner
voluntarily conveyed numerical information to the telephone
company and ‘exposed’ that information to its equipment in the
ordinary course of business.” (emphasis added)). The dissent
goes on to argue that Appellants did indeed voluntarily convey
the wealth of cell site location data points at issue here to
their service provider by choosing generally to operate and
carry their phones. We reject this contention.
43
Appeal: 12-4659
Doc: 169
(describing
Filed: 08/05/2015
CSLI
as
Pg: 44 of 134
“location-identifying
by-product”
of
cell
phone technology). “Unlike the bank records in Miller or the
phone
numbers
dialed
in
Smith,
cell-site
data
is
neither
tangible nor visible to a cell phone user.” In re Application of
U.S. for Historical Cell Site Data, 747 F. Supp. 2d 827, 844
(S.D. Tex. 2010), vacated, 724 F.3d 600 (5th Cir. 2013). A user
is
not
required
information
when
to
actively
making
a
submit
call
or
any
location-identifying
sending
a
message.
Such
information is rather “quietly and automatically calculated by
the network, without unusual or overt intervention that might be
detected by the target user.” Id. at 833. We cannot impute to a
cell phone user the risk that information about her location
created
by
her
service
provider
will
be
disclosed
to
law
enforcement when she herself has not actively disclosed this
information.
Notably, the CSLI at issue in this appeal details location
information not only for those transmissions in which Appellants
actively participated – i.e., messages or calls they made or
answered – but also for messages and calls their phones received
but they did not answer. When a cell phone receives a call or
message and the user does not respond, the phone’s location is
identified without any affirmative act by its user at all – much
less, “voluntary conveyance.” See In re Application of U.S. for
an
Order
Directing
a
Provider
44
of
Electronic
Communication
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 45 of 134
Service to Disclose Records to the Government (In re Application
(Third Circuit)), 620 F.3d 304, 317 (3d Cir. 2010) (“[W]hen a
cell phone user receives a call, he hasn’t voluntarily exposed
anything at all.”). We conclude, in agreement with the analysis
of the Third Circuit in In re Application (Third Circuit) and
that
of
several
state
supreme
courts,
that
the
third-party
doctrine of Smith and Miller does not apply to CSLI generated by
cell phone service providers. See id.; Augustine, 4 N.E.3d at
862-63; Tracey, 152 So.3d at 525; see also Earls, 70 A.3d at
641-42 (categorically rejecting third-party doctrine).
b.
The
Fifth
Circuit,
in
In
re
Application
of
U.S.
for
Historical Cell Site Data (In re Application (Fifth Circuit)),
724 F.3d 600 (5th Cir. 2013), and the en banc Eleventh Circuit
in United States v. (Quartavious) Davis, 785 F.3d 498 (11th Cir.
2015), have reached the opposite conclusion. While acknowledging
that the cell phone user “does not directly inform his service
provider of the location of the nearest cell phone tower[,]” the
Fifth
Circuit
decided
that
their
service
providers
users
through
voluntarily
general
use
convey
of
CSLI
their
to
cell
phones. In re Application (Fifth Circuit), 724 F.3d at 614. 15 In
15
In United States v. Guerrero, 768 F.3d 351 (5th Cir.
2014), the Fifth Circuit reaffirmed its holding in In re
(Continued)
45
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 46 of 134
reaching this conclusion, the court relied on the proposition,
advanced by the government, that “users know that they convey
information about their location to their service providers when
they make a call.” Id. at 612. The Eleventh Circuit followed
suit, suggesting that because users are generally aware that
their
calls
are
connected
through
cell
towers,
their
use
of
their phones amounts to voluntary conveyance of “their general
location within that cell tower’s range[.]” (Quartavious) Davis,
785 F.3d at 511.
We
cannot
volunteer
to
accept
convey
the
proposition
their
that
location
cell
phone
information
users
simply
by
choosing to activate and use their cell phones and to carry the
devices on their person. Cell phone use is not only ubiquitous
in our society today but, at least for an increasing portion of
our
society,
it
has
become
essential
to
full
cultural
and
economic participation. See Quon, 560 U.S. at 760 (“Cell phone
and
text
message
communications
are
so
pervasive
that
some
persons may consider them to be essential means or necessary
instruments
for
self-expression,
even
self-identification.”);
Riley, 134 S. Ct. at 2484 (“[M]odern cell phones . . . are now
such
a
pervasive
and
insistent
part
of
daily
life
that
the
Application (Fifth Circuit) in affirming denial of a motion to
suppress CSLI evidence. See 768 F.3d at 358-61.
46
Appeal: 12-4659
Doc: 169
proverbial
Filed: 08/05/2015
visitor
from
Mars
Pg: 47 of 134
might
conclude
they
were
an
important feature of human anatomy.”). People cannot be deemed
to have volunteered to forfeit expectations of privacy by simply
seeking active participation in society through use of their
cell phones. “The fiction that the vast majority of the American
population
consents
to
warrantless
government
access
to
the
records of a significant share of their movements by ‘choosing’
to
carry
a
cell
phone
must
be
rejected.”
In
re
Application
(E.D.N.Y.), 809 F. Supp. 2d at 127, quoted in Tracey, 152 So.3d
at 523. 16
16
The dissent points out that similar arguments were made
in dissenting opinions in Miller and Smith and ultimately
rejected by the Court. We do not doubt that the financial
services
implicated
in
Miller
or
the
telephone
service
implicated in Smith were any less crucial to social and economic
participation than cell phone service has become. But the
determination in each of those cases that the defendant had
assumed the risk of disclosure to law enforcement did not rely
upon the defendant’s general choice to avail himself of these
services. The assumption of risk was based on voluntary acts by
which the defendant conveyed specific information to a third
party while using these services. Smith, for instance, actively
and voluntarily turned specific numbers over to his phone
company, and was surely aware of what numbers he was turning
over, when he placed specific calls. See Smith, 442 U.S. at 742.
Smith
even
conceded
that
he
could
claim
no
legitimate
expectation of privacy in the same numbers had he placed the
calls through a live operator. Id. at 744. Similarly here, we do
not believe that Appellants could claim a legitimate privacy
expectation had they specifically identified their location or
the closest cell tower to their service provider each time a
transmission was made to or from their cell phones.
47
Appeal: 12-4659
Doc: 169
Users’
Filed: 08/05/2015
understanding
of
Pg: 48 of 134
how
cellular
networks
generally
function is beside the point. The more pertinent question is
whether users are generally aware of what specific cell sites
are utilized when their phones connect to a cellular network.
After all, it is the specificity with which CSLI identifies cell
sites
that
privacy
allows
concerns.
users’
We
have
location
no
to
be
tracked
and
reason
to
suppose
that
raises
users
generally know what cell sites transmit their communications or
where those cell sites are located. A cell phone user cannot be
said to “voluntarily convey” to her service provider information
that she never held but was instead generated by the service
provider itself without the user’s involvement. 17
Both
the
Fifth
and
Eleventh
Circuits
emphasized
that
service providers maintain CSLI records for their own business
purposes rather than for law enforcement purposes and on this
basis concluded that a subscriber can have no legitimate privacy
17
In (Quartavious) Davis, the Eleventh Circuit pointed out
that the pen register information at issue in Smith had the
effect of disclosing precise information about the phone user’s
location. 724 F.3d at 511-12. Pen register information could be
used to place the phone user at a specific address at a specific
time “because the phone lines at issue in Smith corresponded to
stationary landlines at known physical addresses.” Id. The
location information at issue in the present case is not
“stationary” but permits tracking of a person’s movements across
private and public spaces. In this way, CSLI raises greater
locational privacy concerns than any location information
revealed through use of a stationary landline. See Karo, 468
U.S. at 715.
48
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 49 of 134
expectation in the information these records contain. See In re
Application (Fifth Circuit), 724 F.3d at 611-12; (Quartavious)
Davis, 785 F.3d at 511-12. CSLI records are, however, wholly
unlike business records such as “credit card statements, bank
statements, hotel bills, purchase orders, and billing invoices,”
which
the
businesses
records
government
by
“routinely”
subpoena.
merely
capture
Id.
at
obtains
506.
voluntary
These
from
third-party
sorts
commercial
of
business
transactions
to
which the business and its individual client or customer are
parties. See Miller, 425 U.S. at 442. CSLI, on the other hand,
records transmissions of radio signals in which the cell phone
service subscriber may or may not be an active and voluntary
participant.
We agree with our sister circuits that a service provider’s
business
interest
in
maintaining
CSLI
records
is
a
relevant
consideration in determining whether a subscriber can have a
legitimate expectation of privacy in this information. But it is
not
the
“concepts
only
of
consideration.
real
or
Courts
personal
consider
property
law”
not
in
only
such
making
this
determination but also “‘understandings that are recognized and
permitted
omitted).
by
As
society.’”
we
have
Carter,
525
explained,
U.S.
society
at
88
(citation
recognizes
an
individual’s privacy interest in her movements over an extended
time period as well as her movements in private spaces. The fact
49
Appeal: 12-4659
that
Doc: 169
a
Filed: 08/05/2015
provider
records,
captures
without
the
Pg: 50 of 134
this
information
subscriber’s
in
its
involvement,
account
does
not
extinguish the subscriber’s reasonable expectation of privacy.
Applying the third-party doctrine in this context would simply
permit the government to convert an individual’s cell phone into
a
tracking
information
device
by
retained
examining
by
her
the
massive
service
bank
provider,
of
and
location
to
do
so
without probable cause. See David Gray & Danielle Citron, The
Right to Quantitative Privacy, 98 Minn. L. Rev. 62, 140 (2013)
(“If the government lacks legal authority to install and monitor
a
GPS-enabled
tracking
device,
then
it
can
get
the
same
information by securing locational data from OnStar, Lojac, a
cellular phone provider, or any number of ‘apps’ that gather and
use locational information as part of their services.” (emphasis
added)).
This is not a case like Hoffa, where a person assumes the
risk
that
an
associate
or
confidante
will
disclose
her
communications to law enforcement, see 385 U.S. at 302-03; nor
is this a case like Miller, where a person assumes the risk that
a
bank
will
government,
actively
or
information
see
disclose
425
U.S.
knowingly
to
her
their
financial
at
443.
communicate
service
transactions
Cell
or
phone
“trade”
providers
as
users
their
part
to
the
do
not
location
of
the
consideration for the services provided, to say nothing of the
50
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 51 of 134
documentation of such information in reproducible formats. That
this
information
consequence
of
winds
how
up
in
cellular
the
provider’s
networks
function
hands
does
as
not
a
and
should not affect cell phone users’ reasonable expectations of
privacy
in
this
information
or
society’s
respect
for
that
expectation.
c.
Courts
have
recognized
that
not
all
private
information
entrusted to third-party providers of communications services is
subject to warrantless government inspection. As far back as
1877, the Supreme Court recognized Fourth Amendment protection
against warrantless inspection of the contents of mail entrusted
to the postal service for delivery. Ex parte Jackson, 96 U.S.
727,
733
(1877).
In
so
holding,
the
Court
recognized
a
distinction between, on one hand, protected matter “intended to
be
kept
free
packages[,]”
from
and,
inspection,
on
the
such
other
as
hand,
letters[]
and
unprotected
sealed
matter
“purposefully left in a condition to be examined” as well as the
“outward form and weight” of sealed articles. Id.
The Court continued to recognize this distinction 90 years
later in Katz: “What a person knowingly exposes to the public,
even in his own home or office, is not a subject of Fourth
Amendment protection. . . . But what he seeks to preserve as
private,
even
in
an
area
accessible
51
to
the
public,
may
be
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
constitutionally
protected.”
Pg: 52 of 134
389
U.S.
at
351-52
(citations
omitted). Katz involved a Fourth Amendment challenge to use of
an
electronic
public
phone
recording
booth
device
that
attached
recorded
the
to
the
outside
petitioner’s
of
of
a
side
a
phone conversation. Id. at 348-49. Applying the principle that
the
Fourth
Amendment
protects
that
which
a
person
“seeks
to
preserve as private,” id. at 351, the Court held that “[o]ne who
occupies [a public phone booth], shuts the door behind him, and
pays
the
toll
that
permits
him
to
place
a
call
is
surely
entitled to assume that the words he utters into the mouthpiece
will not be broadcast to the world[,]” id. at 352. Although
shutting
the
door
to
the
phone
booth
proved
inadequate
to
prevent the petitioner’s private words from being overheard, and
indeed would have been inadequate to prevent monitoring by the
phone
company,
the
petitioner
demonstrated
an
expectation
of
privacy society would accept as reasonable. See Smith, 442 U.S.
at
746-47
(Stewart,
J.,
dissenting);
Katz,
389
U.S.
at
361
(Harlan, J., concurring).
In
Fourth
the
current
Amendment
digital
age,
protection
to
courts
continue
information
to
accord
entrusted
to
communications intermediaries but intended to remain private and
free
from
government
inspection.
inspection
Courts
of
have,
for
the
contents
of
example,
emails
a
deemed
Fourth
Amendment search but have declined to do the same for email
52
Appeal: 12-4659
Doc: 169
address
Filed: 08/05/2015
information
used
to
Pg: 53 of 134
transmit
emails.
Compare
United
States v. Warshak, 631 F.3d 266, 287-88 (6th Cir. 2010) (holding
that email subscribers enjoy a reasonable expectation of privacy
in
the
content
of
their
emails
even
though
such
content
is
accessible to Internet service providers), with United States v.
Forrester,
512
F.3d
500,
510
(9th
Cir.
2008)
(holding
that
government surveillance of a computer to discover email address
information, IP addresses, and amount of data transmitted by
email does not constitute a Fourth Amendment search).
The
address
dissent
argues
information
information
that
at
essentially
issue
facilitates
in
that,
like
Forrester,
the
routing
the
CSLI
of
forms
is
of
simply
communications
rather than protected content, and on this basis distinguishes
cases like Warshak. Post at 124. CSLI is of course more than
simple
location
routing
across
information;
specific
it
points
18
tracks
in
a
time. 18
cell
And
phone
as
user’s
previously
The dissent argues that types of information deemed
unworthy of Fourth Amendment protection “‘track[]’ some form of
activity when aggregated over time.” Post at 125. To be sure, we
do not hold that a person may claim Fourth Amendment protection
for records of just any type of information that happens to
disclose a location, i.e., her location when she deposits an
article of mail or engages in a credit card transaction. We do
hold that a person may claim protection for her long-term CSLI
because this information may track practically all of the
movements a person makes over an extended period of time. This
feature sets CSLI apart from the various sorts of address and
routing information cited in the dissent.
53
Appeal: 12-4659
Doc: 169
noted,
cell
Filed: 08/05/2015
phone
users
Pg: 54 of 134
generally
consider
their
location
information no less sensitive than the contents of emails and
phone calls. 19 Like a user of web-based email who intends to
maintain the privacy of her messages, however, there is nothing
the typical cell phone user can do to hide information about her
location
from
her
service
provider. 20
In
the
absence
of
any
evidence that Appellants or cell phone users generally intend
for
their
location
information
to
be
open
to
inspection
by
others, we cannot treat the fact that CSLI is used to route
communications and is recorded by intermediaries as dispositive
of Appellants’ claim of Fourth Amendment protection for this
information.
d.
Our review of well settled Fourth Amendment jurisprudence
teaches us that, even as technology evolves, protections against
government intrusion should remain consistent with those privacy
expectations society deems reasonable. See, e.g., United States
19
See supra note 4.
20
It seems that, here, Appellants took what little action
was possible that might have concealed their personal location
information from their service provider. Graham’s service was
subscribed in his wife’s name, and Jordan used an alias or proxy
on his account, although the record does not indicate that these
actions were taken specifically to protect Appellants’ privacy
interests.
54
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 55 of 134
v. U.S. Dist. Court for E. Dist. of Mich., S. Div., 407 U.S.
297,
312
uneasiness
(1972)
and
(“There
is,
apprehension
understandably,
that
[government’s
a
deep-seated
capability
for
electronic surveillance] will be used to intrude upon cherished
privacy of law-abiding citizens.”); Berger v. State of N.Y., 388
U.S. 41, 62 (1967) (“‘[T]he fantastic advances in the field of
electronic
communication
constitute
a
great
danger
to
the
privacy of the individual; . . . indiscriminate use of such
devices in law enforcement raises grave constitutional questions
under the Fourth and Fifth Amendments . . . .’”) (quoting Lopez,
373 U.S. at 1389 (Warren, C.J., concurring in the result)). That
is
not
to
say
that
societal
expectations
of
privacy
cannot
change over time, but the advent of new technology alone – even
major technological advances – is not a sufficient basis upon
which to infer an equally dramatic shift in people’s privacy
expectations. 21
21
In Smith, for instance, the Supreme Court rejected the
notion that different constitutional rules should apply to
different technological means of engaging in the same form of
communication, lest “a crazy quilt” be made of the Fourth
Amendment. 442 U.S. at 745. Just as a caller could claim no
legitimate expectation of privacy in telephone connections made
personally by an operator, Smith could claim no privacy
expectation in numbers he dialed to connect his calls through
the phone company’s automatic switching equipment. Id. at 744.
Smith, in this way, reflects the principle that the use of new
technology to hide from view what would otherwise be exposed
cannot by itself expand Fourth Amendment rights where none would
otherwise exist.
(Continued)
55
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 56 of 134
It turns out that the proliferation of cellular networks
has
left
service
increasingly
providers
precise
with
information
a
continuing
about
the
stream
of
locations
and
movements of network users. Prior to this development, people
generally had no cause for concern that their movements could be
tracked
generate
to
this
and
extent.
permit
That
retention
new
of
technology
this
has
happened
information
cannot
to
by
itself displace our reasonable privacy expectations; nor can it
justify inspection of this information by the government in the
absence of judicially determined probable cause.
Courts and commentators have for years begun to acknowledge
the
increasing
between
the
tension,
third-party
wrought
doctrine
by
our
and
technological
the
primacy
age,
Fourth
Amendment doctrine grants our society’s expectations of privacy.
The natural corollary to this principle is that a
technological advance alone cannot constrict Fourth Amendment
protection for private matters that would otherwise be hidden or
inaccessible. Confronting the question of “what limits there are
upon [the] power of technology to shrink the realm of guaranteed
privacy” in Kyllo, 533 U.S. at 34, Justice Scalia concluded for
the majority that the use of new technology “to explore details
of the home that would previously have been unknowable without
physical intrusion” constitutes a search, id. at 40. “This
assures
preservation
of
that
degree
of
privacy
against
government that existed when the Fourth Amendment was adopted.”
Id. at 34. As one prominent commentator explained, the Fourth
Amendment not only “permit[s] access to that which technology
hides” but also “protect[s] that which technology exposes.” Orin
S. Kerr, The Case for the Third-Party Doctrine, 107 Mich. L.
Rev. 561, 580 (2009).
56
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 57 of 134
In her concurring opinion in Jones, Justice Sotomayor declared
the assumption that people lack reasonable privacy expectations
in information held by third parties “ill suited to the digital
age, in which people reveal a great deal of information about
themselves
mundane
to
third
tasks.”
parties
Jones,
in
132
S.
the
course
Ct.
at
of
out
(Sotomayor,
957
carrying
J.,
concurring).
It is concerning that now, during a time and context in
which the viability of the third-party doctrine, “the Lochner of
search and seizure law,” Orin S. Kerr, The Case for the ThirdParty
Doctrine,
omitted),
has
treatment
of
107
never
the
Mich.
L.
been
Rev.
doctrine
in
561,
graver
would
563
(2009)
doubt,
expand
it
the
into
(footnote
dissent’s
a
full-on
exception to the legitimate-expectation-of-privacy inquiry. Post
at 133. Our dissenting colleague reads into Miller and Smith a
rule
that
would
preclude
virtually
any
Fourth
Amendment
challenge against government inspection of third-party records.
But just a few years ago, writing for the Court in Bynum, our
dissenting
colleague
rightly
declared
that
the
question
of
whether an individual has a reasonable expectation of privacy in
a matter searched is “[t]he ‘touchstone’ of Fourth Amendment
analysis[.]” 604 F.3d 164 (citation omitted). Contrary to her
current views, the third-party doctrine was not devised to sidestep
this
question;
rather,
the
57
doctrine
aids
the
court
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 58 of 134
precisely in deciding whether certain privacy expectations are
reasonable by societal standards. See Smith, 442 U.S. at 743-44;
Bynum, 604 F.3d at 164; (Quartavious) Davis, 785 F.3d at 527
(Rosenbaum, J., concurring) (“Supreme Court precedent fairly may
be
read
to
subordinate
suggest
to
that
the
expectations
third-party
of
privacy
doctrine
that
must
society
be
has
historically recognized as reasonable.”). Smith and Miller do
not endorse blind application of the doctrine in cases where
information
in
which
there
are
clearly
reasonable
privacy
expectations is generated and recorded by a third party through
an accident of technology. The third-party doctrine is intended
to delimit Fourth Amendment protections where privacy claims are
not reasonable - not to diminish Fourth Amendment protections
where new technology provides new means for acquiring private
information. See Orin S. Kerr, An Equilibrium-Adjustment Theory
of
the
(“[I]f
Fourth
Amendment,
a
technology
new
information
that
it
125
Harv.
permits
previously
L.
the
could
Rev.
476,
527
(2011)
government
to
access
not
access
without
a
warrant, using techniques not regulated under preexisting rules
that predate that technology, the effect will be that the Fourth
Amendment matters less and less over time.”).
*
For
doctrine
these
reasons,
here
and
hold
*
we
*
*
decline
that
*
to
apply
Appellants
58
the
have
a
third-party
reasonable
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 59 of 134
expectation of privacy in their long-term CSLI. 22 Specifically,
we conclude that the government’s procurement and inspection of
Appellants’ historical CSLI was a search, and the government
violated Appellants’ Fourth Amendment rights by engaging in this
search
without
probable cause. 23
first
securing
a
judicial
warrant
based
on
If the Twenty-First Century Fourth Amendment
is to be a shrunken one, as the dissent proposes, we should
22
Echoing the sentiments of the Fifth and Eleventh
Circuits, the dissent suggests that any privacy concerns raised
by the government’s warrantless acquisition of CSLI should be
presented to Congress and addressed legislatively, rather than
to the courts for constitutional protection. Post at 131-33. We
think the same argument might be made in any case in which a new
technological means or investigative practice is employed to
obtain personal information and the court must decide the Katz
question. In each of these cases, the court is tasked with
making an assessment of what privacy interests society might
deem reasonable. This is a task for which one might argue the
legislative branch is suited, but one that is, as a matter of
constitutional interpretation, nonetheless imposed upon the
courts. See Marbury v. Madison, 5 U.S. (1 Cranch) 137, 177
(1803) (“It is emphatically the province and duty of the
judicial department to say what the law is.”).
23
Moving beyond her theoretical objections to our holding,
our dissenting colleague declares the holding “bizarre in
practice,” citing the fact that the cell service records
admitted in this case included not just CSLI but also
information we have not deemed Fourth Amendment protected. Post
at 126. The § 2703(d) orders in this case specifically requested
the CSLI associated with Appellants’ cell service accounts.
After today’s holding, the government will need to secure a
warrant for this information. This requirement would not affect
whether, in response to such a warrant, the service provider
produces records that include information for which a warrant is
not specifically required. It is unclear to us what makes this
practice “bizarre.”
59
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 60 of 134
leave that solemn task to our superiors in the majestic building
on First Street and not presume to complete the task ourselves.
D.
Although
Appellants’
we
conclude
Fourth
that
the
Amendment
rights
in
government
procuring
violated
their
CSLI
without a warrant based on probable cause, the records were not
subject to suppression because the government acted in goodfaith reliance on court orders issued under the SCA.
“The
exclusionary
rule
‘generally
prohibits
the
introduction at criminal trial of evidence obtained in violation
of a defendant’s Fourth Amendment rights[.]’” United States v.
Stephens, 764 F.3d 327, 335 (4th Cir. 2014) (quoting Pa. Bd. of
Prob. & Parole v. Scott, 524 U.S. 357, 359 (1998)). But our
system of justice and society at large incur “‘heavy costs’”
when
courts
are
required
to
disregard
reliable
evidence,
“‘suppress the truth’” about criminal conduct, and release to
the
community
a
criminal
who
might
otherwise
be
subject
to
imprisonment. Id. (quoting (Willie Gene) Davis v. United States,
131
S.
Ct.
2419,
2427
(2011)).
Considering
that
the
“sole
purpose” of the exclusionary rule “is to deter future Fourth
Amendment
violations[,]”
(Willie
Gene)
Davis,
131
S.
Ct.
at
2426, courts apply the rule to exclude evidence only where the
benefits of deterrence outweigh the costs of suppression, id. at
2427.
60
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 61 of 134
In assessing the deterrent value of suppression, our focus
is properly placed on culpable police conduct and not on the
actions of legislators and judicial officers. Id. at 2432-33.
Where
law
enforcement
acts
“with
an
objectively
‘reasonable
good-faith belief’ that their conduct is lawful,” there is no
need
for
deterrence
sufficient
to
justify
the
exclusion
of
reliable evidence. Id. at 2427 (quoting United States v. Leon,
468
U.S.
897,
exclusionary
909
(1984)).
rule
applies
This
good-faith
where
law
exception
enforcement
to
the
reasonably
relies on (1) an enacted statute, unless that statute is clearly
unconstitutional,
Illinois
v.
Krull,
480
U.S.
340,
349-50
(1987); (2) a search warrant or other court order issued by a
neutral
magistrate,
defective,
Leon,
unless
468
issuance
U.S.
at
of
922-23,
the
order
926;
or
is
(3)
clearly
“binding
appellate precedent,” (Willie Gene) Davis, 131 S. Ct. at 2429.
Here,
the
government
is
entitled
to
the
good-faith
exception because, in seeking Appellants’ CSLI, the government
relied on the procedures established in the SCA and on two court
orders issued by magistrate judges in accordance with the SCA.
The
government’s
regarding
during
calls
four
first
and
time
§
2703(d)
messages
periods
to
application
and
and
from
described
requested
data
Appellants’
phones
robberies
under
investigation that occurred during some of those time periods.
After
learning
about
other
similar
61
robberies,
the
government
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 62 of 134
submitted a second application to request records for the much
broader 221-day time frame. The second application included the
same
facts
provided
descriptions
of
in
the
additional
first
application
robberies
under
but
added
investigation.
Appellants do not claim that the government was “dishonest or
reckless” in preparing either application. Leon, 468 U.S. at
926.
Upon
consideration
applications,
two
of
magistrate
each
judges
of
of
the
the
government’s
district
court
respectively issued § 2703(d) orders to Sprint/Nextel for the
disclosure of Appellants’ account records. There is nothing in
the record to suggest that either magistrate “abandoned” her or
his
“detached
and
neutral”
role
such
that
a
well
trained
officer’s reliance on either order would have been unreasonable.
Id.
Appellants
do
not
attack
the
facial
validity
of
the
§
2703(d) orders. Instead, they argue that the government cannot
reasonably rely on the § 2703 orders because, in offering law
enforcement a choice between seeking a warrant and a § 2703(d)
court
order
internally
to
obtain
subscriber
records,
inconsistent.
Appellants
point
out
the
statute
that,
while
is
a
warrant requires a showing of probable cause, a § 2703(d) order
62
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 63 of 134
requires a significantly lesser showing – a standard akin to
reasonable suspicion. 24
We find no “inherent contradiction on the face of the SCA.”
Appellants’
Br.
46.
Section
2703(c)
unambiguously
offers
law
enforcement a choice between specific avenues to obtain records
from
service
providers.
“Unless
a
statute
is
clearly
unconstitutional, an officer cannot be expected to question the
judgment of the legislature that passed the law.” Krull, 480
U.S.
at
349-50.
That
the
statute
provides
options
that
set
different requirements on law enforcement does not amount to a
contradiction or render the statute facially unconstitutional.
Appellants
government’s
argue
next
that
unconstitutional
the
use
of
SCA
cannot
discretion
justify
granted
the
under
the statute to seek a § 2703(d) court order instead of a warrant
for
historical
CSLI.
Citing
State
v.
Thompson,
810
P.2d
415
(Utah 1991), Appellants argue that the good-faith exception is
24
Appellants cite In re Application (Third Circuit),
wherein the Third Circuit reviewed a district court’s denial of
§ 2703(d) applications for CSLI. 620 F.3d at 305-06. In seeking
to determine whether a magistrate has authority under the
statute to deny an application that satisfies the requirements
of § 2703(d), the court stated, “There is an inherent
contradiction in the statute or at least an underlying
omission.” Id. at 319. The court did not specifically identify
any contradiction in the statute. We presume that the court’s
comment is based on the statute’s lack of clarity as to the
scope of the magistrate’s discretion to grant or deny § 2703(d)
applications. That does not appear to be the “inherent
contradiction” upon which Appellants rely.
63
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 64 of 134
inapplicable where a prosecutor fails to exercise a statutory
grant of discretionary power within constitutional bounds. In a
related case prior to Thompson, the Supreme Court of Utah had
determined that issuance and use of certain subpoenas by the
state attorney general under Utah’s Subpoena Powers Act violated
the Utah Constitution in several respects for which the attorney
general was responsible. In re Criminal Investigation, 7th Dist.
Ct.
No.
CS-1,
754
P.2d
633,
658-59
(Utah
1988),
cited
in
Thompson, 810 P.2d at 146. In Thompson, the court determined
that “a good faith exception [to Utah’s exclusionary rule] . . .
would be inapplicable to illegal subpoenas issued . . . by the
attorney general, who is chargeable for the illegality[,]” and
therefore evidence obtained through use of the illegal subpoenas
was subject to suppression. 810 P.2d at 420. The constitutional
defects in the issuance and use of the subpoenas were clear
enough for the attorney general to concede that the Subpoena
Powers Act had been unconstitutionally applied. See id. at 639,
658.
The constitutionally infirm decision of the prosecution in
the present case to seek § 2703(d) orders instead of warrants
was not so clear, at least not prior to today’s decision. Prior
to our ruling today, neither this Court nor the U.S. Supreme
Court
had
deemed
the
government’s
unconstitutional.
64
conduct
in
this
case
Appeal: 12-4659
Doc: 169
We
agree
government
Filed: 08/05/2015
with
should
Pg: 65 of 134
Appellants
“err
on
that,
the
when
side
of
in
doubt,
the
constitutional
behavior[.]” Leon, 468 U.S. at 926 (Brennan, J., dissenting).
And we recognize that, at the time the government obtained the
CSLI at issue here, court rulings outside of this Circuit were
in
conflict
as
to
the
constitutionality
of
obtaining
this
information without a warrant. But the government’s conduct in
this case was not governed by disagreements among a handful of
courts
outside
this
Circuit,
and
there
was
no
decisional
authority in this Circuit suggesting that the choice presented
in § 2703(c) was unconstitutional as applied to CSLI from cell
phone
service
providers.
We
conclude,
therefore,
that
the
government reasonably relied on the SCA in exercising its option
to seek a § 2703(d) order rather than a warrant. The good-faith
exception applies. 25 We affirm denial of Appellants’ motion to
suppress.
III.
Appellants appeal the district court’s admission of certain
testimony of Jeff Strohm, records custodian for Sprint/Nextel,
25
Now that we have determined that law enforcement violates
the Fourth Amendment when it acts without a warrant to obtain an
individual’s long-term CSLI, its choice under § 2703(c) is
constrained. The government may no longer rely on the statute to
justify an election not to secure a warrant for this
information.
65
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 66 of 134
and Special Agent Colin Simons of the FBI, arguing that portions
constitute expert testimony in the guise of lay opinion.
As
previously
stated,
we
review
the
district
court’s
evidentiary rulings for abuse of discretion. United States v.
Johnson, 617 F.3d 286, 292 (4th Cir. 2010). “A district court
has
abused
its
discretion
if
its
decision
‘is
guided
by
erroneous legal principles’ or ‘rests upon a clearly erroneous
factual finding.’” Morris v. Wachovia Sec., Inc., 448 F.3d 268,
277 (4th Cir. 2006) (quoting Westberry v. Gislaved Gummi AB, 178
F.3d 257, 261 (4th Cir. 1999)). If we find such an abuse of
discretion,
we
review
it
under
the
harmless-error
standard
stated in Rule 52(a) of the Federal Rules of Criminal Procedure.
Johnson, 617 F.3d at 292. We find the district court’s error
harmless if we can “say with fair assurance, after pondering all
that happened without stripping the erroneous action from the
whole, that the judgment was not substantially swayed by the
error.” Id. (quoting United States v. Brooks, 111 F.3d 365, 371
(4th Cir. 1997)) (internal quotation marks omitted).
For
the
discretion
in
reasons
the
explained
district
below,
court’s
we
find
admission
no
of
abuse
of
Simons’
testimony and portions of Strohm’s testimony. Insofar as the
court erred in admitting other portions of Strohm’s testimony as
that of a lay witness, we find such error harmless.
A.
66
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 67 of 134
The admission of expert testimony is governed by Rule 702
of the Federal Rules of Evidence, which permits one “who is
qualified
based
as
on
an
expert”
“scientific,
to
offer
at
technical,
trial
or
opinion
other
testimony
specialized
knowledge.” Prior to admitting any expert testimony, the trial
judge
must
act
as
a
gatekeeper,
conducting
a
preliminary
assessment of whether the expert’s proffered testimony is both
relevant and reliable. Kumho Tire Co. v. Carmichael, 526 U.S.
137, 149 (1999) (citing Daubert v. Merrell Dow Pharm., Inc., 509
U.S. 579, 592 (1993)).
Under Rule 701, lay witnesses are “‘not permit[ted] . . .
to express an opinion as to matters which are beyond the realm
of common experience and which require the special skill and
knowledge
of
an
expert
witness.’”
Certain
Underwriters
at
Lloyd’s, London v. Sinkovich, 232 F.3d 200, 203 (4th Cir. 2000)
(quoting Randolph v. Collectramatic, Inc., 590 F.2d 844, 846
(10th
Cir.
1979)).
“At
bottom,
.
.
.
Rule
701
forbids
the
admission of expert testimony dressed in lay witness clothing,
but
it
‘does
not
interdict
all
inference
drawing
by
lay
witnesses.’” United States v. Perkins, 470 F.3d 150, 156 (4th
Cir. 2006) (quoting United States v. Santos, 201 F.3d 953, 963
(7th Cir. 2000)).
B.
67
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 68 of 134
Appellants challenge Strohm’s testimony regarding how cell
phones
connect
with
cell
sites
and
the
operations
and
radio
frequency range of cell sites. Strohm testified that, in seeking
or receiving a connection to the cellular network, a cell phone
connects to the cell tower emitting the strongest signal, and
that cell sites in urban areas have a two-mile maximum range of
connectivity. He testified further that, aside from proximity,
factors such as line of sight and volume of call traffic may
affect the ability of a particular cell tower to connect to a
phone, but, in any case, the phone must be located within two
miles
of
any
cell
tower
in
the
Baltimore
area
in
order
to
connect to it.
Strohm’s
testimony
that
signal
strength
determines
which
cell tower will connect to a phone and that cell towers in urban
areas
have
a
two-mile
maximum
range
of
operability
was
not
opinion testimony. These statements were not conclusions Strohm
drew based on any specialized reasoning or assessment, and were
not presented in the form of an opinion or inference. They were
facts
based
on
Sprint/Nextel.
declined
to
Strohm’s
Indeed,
challenge
at
experience
trial,
Strohm’s
as
an
employee
defense
counsel
testimony
that
a
of
specifically
cell
phone
connects to the tower emitting the strongest signal. Strohm’s
testimony as to cell sites’ range of operability required no
greater than the same minimal technical knowledge. The district
68
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 69 of 134
court did not abuse its discretion in admitting this testimony
by a lay witness.
Similarly,
Strohm’s
testimony
that
factors
including
proximity, line of sight, and call traffic may affect a phone’s
ability to connect to a particular cell tower did not rise to
the level of an expert opinion. Strohm did not, for instance,
engage
in
determine
any
analysis
how
these
comparing
factors
the
factors
resulted
in
or
any
seek
to
particular
connection, which would have required scientific, technical, or
specialized knowledge. He merely presented the fact that these
factors exist, which prevented the jury from being misled into
believing that signal strength is a matter of proximity alone or
that a cell phone will always connect to the nearest tower.
Even
if
the
district
court
abused
its
discretion
in
admitting Strohm’s testimony about these factors, any such error
was harmless. The government’s evidence as to the locations of
Appellants’
cell
phones
solely
the
locations
on
at
various
of
the
points
cell
in
time
towers
was
based
listed
in
Sprint/Nextel’s records and each tower’s two-mile maximum range
of operability. In order for Appellants’ cell phones to connect
to the towers listed in Sprint/Nextel’s records, they had to
have been located within two miles of the listed towers, even if
line of sight or call traffic affected which cell sites within
two miles ultimately connected to the phones. The mere fact that
69
Appeal: 12-4659
these
Doc: 169
factors
Filed: 08/05/2015
exist,
Pg: 70 of 134
therefore,
could
not
have
substantially
affected the jury’s assessment of the government’s evidence and
the resultant verdict.
The admission of other aspects of Strohm’s lay testimony is
more concerning. Strohm provided explanations of how cell phones
connect
to
a
cellular
going,
at
times,
network
into
for
technical
the
completion
details
about
of
calls,
operations
performed by cell sites and how calls are routed through network
switches.
Such
testimony
was
clearly
“based
on
scientific,
technical, or specialized knowledge within the scope of Rule
702.” Fed. R. Evid. 701(c); see also United States v. YeleyDavis,
632
F.3d
673,
684
(10th
Cir.
2011)
(“The
agent’s
testimony concerning how cell phone towers operate constituted
expert testimony because it involved specialized knowledge not
readily accessible to any ordinary person.”); United States v.
Evans, 892 F. Supp. 2d 949, 954 (N.D. Ill. 2012) (holding that
testimony
process
by
as
to
which
“how
a
cellular
cell
phone
networks
operate,
connects
to
a
i.e.,
given
the
tower”
requires an expert qualified to “meet the demands of Rule 702
and Daubert”).
We conclude, however, that any error in the admission of
this testimony was harmless. The technical aspects of how cell
phone calls are completed have little to do with establishing
the location of a cell phone based on cell site information. All
70
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 71 of 134
that really matters is that the cell site had a particular range
of connectivity and that the phone connected to a cell site at a
particular
time
–
facts
established
through
Sprint/Nextel’s
records and admissible portions of Strohm’s testimony.
C.
Appellants
challenge
testimony
offered
by
Agent
Simons
regarding his creation of maps based on the CSLI disclosed by
Sprint/Nextel. The maps plot the locations of certain cell sites
listed in the CSLI records, the business establishments robbed,
and Jordan’s apartment. The maps also identify the dates and
times of inbound and outbound calls made by Appellants’ phones
through the plotted cell sites.
Simons’ testimony did not amount to an expert opinion. To
create
the
maps,
Simons
utilized
mapping
software
that
was
marketed to the general public and required little more than
identification of the various locations he intended to plot. He
entered the locations of the businesses and Jordan’s apartment
by their physical addresses and the cell sites by latitude and
longitude, as disclosed by Sprint/Nextel. The minimal technical
knowledge or skill required to complete this task was not so
“specialized” as to constitute a matter of expertise within the
meaning of Rule 702. See United States v. Henderson, 564 F.
App’x
352,
364
(10th
Cir.
2014)
(unpublished)
(holding
that
agent’s testimony regarding review of cell phone records and
71
Appeal: 12-4659
Doc: 169
creation
of
Filed: 08/05/2015
map
of
cell
Pg: 72 of 134
tower
locations
“did
not
require
expertise”). The district court did not abuse its discretion in
admitting Simons’ testimony.
IV.
Jordan appeals the district court’s decision to set certain
restrictions on his testimony, arguing that these restrictions
infringed upon his constitutional right to testify in his own
defense. We review the district court’s evidentiary rulings for
abuse of discretion but review constitutional questions de novo.
United States v. Dinkins, 691 F.3d 358, 382 (4th Cir. 2012). We
find
no
constitutional
error
or
abuse
of
discretion
in
the
challenged restrictions.
A.
A criminal defendant has a constitutional right to testify
on her own behalf derived from the compulsory process clause of
the Sixth Amendment and the due process clause of the Fourteenth
Amendment.
Rock
v.
Arkansas,
483
U.S.
44,
52
(1987);
United
States v. Midgett, 342 F.3d 321, 325 (4th Cir. 2003). The right
to testify is not absolute, however, and “‘may, in appropriate
cases,
bow
to
accommodate
other
legitimate
interests
in
the
criminal trial process.’” Rock, 483 U.S. at 55 (quoting Chambers
v.
Mississippi,
410
U.S.
284,
295
(1973)).
This
Court
has
previously held, for instance, that “criminal defendants do not
have a right to present evidence that the district court, in its
72
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 73 of 134
discretion, deems irrelevant or immaterial.” United States v.
Prince-Oyibo, 320 F.3d 494, 501 (4th Cir. 2003); see also Taylor
v. Illinois, 484 U.S. 400, 410 (1988) (holding that compulsory
process clause does not give defendant “an unfettered right to
offer testimony that is incompetent, privileged, or otherwise
inadmissible
under
standard
rules
of
evidence”);
Montana
v.
Egelhoff, 518 U.S. 37, 42 (1996) (applying same rule in due
process context).
The defendant exercising her right to testify “must comply
with established rules of procedure and evidence designed to
assure both fairness and reliability in the ascertainment of
guilt and innocence.” Chambers, 410 U.S. at 302. Thus, under
Rule
403
of
the
Federal
Rules
of
Evidence,
even
relevant
testimony by the defendant “may be excluded if its probative
value
is
substantially
outweighed
by
the
danger
of
unfair
prejudice, confusion of the issues, or misleading the jury[.]”
B.
The
district
court
set
certain
restrictions
on
Jordan’s
testimony to prevent unfair prejudice to Graham. Specifically,
Jordan was precluded from
73
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 74 of 134
.
Jordan did not object to these restrictions at trial, so
any
error
committed
by
the
district
court
in
imposing
the
restrictions is subject to plain-error review. United States v.
Godwin, 272 F.3d 659, 672 (4th Cir. 2001); see also Fed. R.
Crim. P. 52(b). We will reverse only upon a showing by Jordan
that an error by the district court was “clear or obvious[,]”
affected Jordan’s substantial rights, and “‘seriously affect[s]
the
fairness,
integrity
or
public
reputation
of
judicial
proceedings.’” Godwin, 272 F.3d at 672-73 (quoting United States
v. Olano, 507 U.S. 725, 732 (1993)).
C.
We find no constitutional error in the restrictions the
district
court
restrictions
did
placed
not
on
prevent
Jordan’s
Jordan
testimony
from
because
presenting
a
the
full
narrative in his defense. Jordan was permitted to testify – and
did
indeed
testify
–
as
follows:
In
late
January
or
early
February of 2011, Graham and a group of friends began coming to
Jordan’s home on a regular basis. Jordan would socialize with
them “for a little while” before asking them to leave because “I
don’t live like they live[.]” J.A. 2303. Friends of Graham were
at Jordan’s apartment on the morning of February 5, 2011, and
74
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 75 of 134
Graham arrived later. After Jordan and Graham visited a liquor
store together, Graham dropped Jordan off at his home, and then
Jordan went to visit his aunt’s home on the 300 block of North
Stricker
Street
neighborhood,
in
and
Baltimore.
Jordan
Graham
arranged
came
for
him
through
to
the
meet
an
unidentified person to “do their little business.” J.A. 2310.
When Graham returned to Jordan, he asked Jordan to take him to a
Wal-Mart
store
to
purchase
a
television
set.
Jordan
drove
Graham’s truck and was eventually stopped by police, and the two
were arrested. When asked about the weapons recovered from his
home after his arrest, Jordan testified that he did not know how
they
got
there
but
believed
that
Graham’s
friends
left
them
there. 26
Jordan argues that the court’s restrictions prevented him
from explaining the basis of his association with Graham. He
avers that a full account of his relationship with Graham would
have shown that they were together and communicated at certain
times
for
reasons
other
than
to
commit
robberies.
The
only
alternative explanation disclosed in Jordan’s brief is that
26
Specifically, Jordan stated, “I think the day I let his
home boys stay [in my house], they left them in there.” J.A.
2314. Viewed in context, the statement implicitly referred to
Graham. The court admonished Jordan for this statement,
instructing him “to confine [his] remarks to what [he] did.” Id.
75
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 76 of 134
. Jordan also sought to testify that,
.
The restrictions imposed by the district court were not
arbitrary but were appropriately tailored to suit their purpose
in preventing unfair prejudice to Graham. Testimony that
had the potential to
prejudice Graham while bearing no real exculpatory value for
Jordan. Specifically naming Graham and his associates would have
had
minimal
probative
value
in
Jordan’s
favor.
The
district
court did not abuse its discretion in determining that the risk
of unfair prejudice to Graham outweighed the probative value of
any of this testimony. See Fed. R. Evid. 403.
D.
Jordan argues that testimony about
would have explained a prior inconsistent statement the
government used to impeach him.
76
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 77 of 134
The cell phone records
obtained by the government disproved this version of events,
showing
that
the
earlier
that
afternoon
phones
were
last
near
each
call
and
Graham
then
other,
made
both
but
to
Jordan
Jordan’s
several
was
and
miles
much
Graham’s
away
from
Jordan’s apartment.
Jordan’s initial version of events also contradicted his
testimony at trial, wherein he stated that Graham picked him up
from Stricker Street to ask for a ride – not from his home. When
confronted by the inconsistent statement made to authorities,
Jordan admitted that he had lied, but stated that he did so
because he was “scared.” J.A. 2314, 2343. Jordan avers that his
initial account was not accurate because he was afraid to inform
the authorities about
.
However,
Jordan
was
precluded
from
explaining the basis for his fear at trial due to the court’s
restriction
During
its
against
closing
testifying
argument,
about
the
government
.
disputed
whether
Jordan’s purported fear was the reason for the lies he told
authorities, stating to the jury, “he didn’t mislead the police
77
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 78 of 134
because he was afraid. He misled the police to get away with
what he had done.” J.A. 2444.
We
agree
government’s
with
Jordan
efforts
to
that,
impeach
in
him,
the
it
context
was
an
of
abuse
the
of
discretion for the court to prevent Jordan from rebutting these
efforts through a full explanation of his prior inconsistent
statement.
Jordan’s
counsel,
however,
did
not
object
to
the
restriction and thus forfeited the issue. The forfeited error
only warrants reversal if it was “clear or obvious” and affected
Jordan’s substantial rights. Godwin, 272 F.3d at 672. Absent an
objection
court’s
that
would
attention,
have
the
brought
court’s
the
abuse
issue
of
to
the
discretion
district
was
not
“clear or obvious.”
Further, Jordan fails to show that the error affected his
substantial
rights.
substantial
evidence
events.
Such
At
trial,
tending
evidence
to
included
the
government
disprove
data
Jordan’s
from
test
introduced
version
drives
of
and
Computer Aided Dispatch (“CAD”) reports showing that it would
not have been possible for Graham to have picked Jordan up from
the 300 block of North Stricker Street during the brief time
period between the McDonald’s robbery and the point at which
Jordan and Graham were apprehended by Baltimore police. On this
record, we cannot conclude that the government’s impeachment of
78
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 79 of 134
Jordan by prior inconsistent statement was necessary for the
jury to determine that Jordan’s version of events was untrue.
In sum, Jordan fails to show that the restriction against
testimony about
on the date of the Burger King and McDonald’s
robberies was plain error. 27 We affirm.
V.
Jordan appeals the district court’s denial of his motion
for severance, arguing that the joint trial of him and Graham
compromised his right to testify fully in his own defense. “We
review a district court’s denial of a motion for severance for
an abuse of discretion.” United States v. Lighty, 616 F.3d 321,
348 (4th Cir. 2010) (citation omitted). The district court has
“broad
discretion”
to
deny
a
motion
27
for
severance.
Id.
To
Based on the apparent agreement between Jordan’s counsel,
the government, and the district court about the restrictions on
Jordan’s testimony, the government argues that Jordan waived the
issue and that even plain-error review is not warranted. See
Olano, 507 U.S. at 733 (“Waiver is different from forfeiture.
Whereas forfeiture is the failure to make the timely assertion
of a right, waiver is the ‘intentional relinquishment or
abandonment of a known right.’”) (citation omitted). Jordan
argues
that
the
restriction
implicated
his
personal
constitutional right to testify in his own defense, which cannot
be waived by defense counsel or the court. United States v.
Flores-Martinez, 677 F.3d 699, 711 (5th Cir. 2012); United
States v. Teague, 953 F.2d 1525, 1532 (11th Cir. 1992); see also
Midgett, 342 F.3d at 327 (agreement between court and defense
counsel did not effect waiver of defendant’s constitutional
right to testify). We need not decide whether Jordan waived the
issue because there is no plain error.
79
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 80 of 134
establish abuse of discretion, “a defendant must show that he
was prejudiced by the denial of a severance motion . . . .”
Id.
(citation omitted).
Under Rule 8(b) of the Federal Rules of Criminal Procedure,
multiple defendants “may be charged in the same indictment if
they
are
alleged
to
have
transaction,
or
in
the
constituting
an
offense
‘participated
same
or
series
offenses.’”
the
acts
of
in
or
Id.
same
act
or
transactions,
(quoting
Fed.
R.
Crim. P. 8(b)). “There is a preference in the federal system for
joint trials of defendants who are indicted together[]” because
such
trials
“promote
efficiency
and
‘serve
the
interests
of
justice by avoiding the scandal and inequity of inconsistent
verdicts.’” Zafiro v. United States, 506 U.S. 534, 537 (1993)
(quoting
Richardson
v.
Marsh,
481
U.S.
200,
210
(1987)).
“Accordingly, severance under Rule 14 is only warranted when
‘there is a serious risk that a joint trial would compromise a
specific trial right of one of the defendants, or prevent the
jury from making a reliable judgment about guilt or innocence.’”
United
States
(quoting
v.
Zafiro,
Najjar,
506
300
U.S.
F.3d
at
466,
539).
473
The
(4th
Cir.
defendant
2002)
seeking
severance must show “‘that actual prejudice would result from a
joint trial, . . . and not merely that a separate trial would
offer a better chance of acquittal.’” Id. (quoting United States
v. Reavis, 48 F.3d 763, 767 (4th Cir. 1995)).
80
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 81 of 134
Jordan argues that the joint trial compromised his right to
provide exculpatory testimony on his own behalf and resulted in
prejudice to him. As discussed in Part IV supra, the district
court placed some restrictions on Jordan’s testimony to prevent
prejudice to Graham and to permit a fair joint trial between the
defendants.
Jordan
contends,
again,
that
these
restrictions
impaired his right to provide testimony that would exculpate him
but tend to inculpate Graham. This Court has previously held,
however, that a defendant’s “desire . . . to exculpate himself
by
inculpating
another
[is]
insufficient
grounds
to
require
separate trials.” Najjar, 300 F.3d at 474 (quoting United States
v. Spitler, 800 F.2d 1267, 1271 (4th Cir. 1986)). As explained
in Part IV, Jordan was permitted to present a full narrative in
his
defense
Jordan
to
sought
the
to
charges
provide
against
him.
inculpating
The
testimony
Graham
held
that
little
exculpatory value for Jordan. The restrictions did not prejudice
Jordan
and
did
not
prevent
the
jury
from
making
a
reliable
judgment.
As we stated in Najjar,
[Rule 14] requires more than finger pointing. There
must be such a stark contrast presented by the
defenses
that
the
jury
is
presented
with
the
proposition that to believe the core of one defense it
must disbelieve the core of the other . . . or “that
the jury will unjustifiably infer that this conflict
alone demonstrates that both are guilty.”
Id. (citations omitted).
81
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 82 of 134
In summary, Graham’s defense was that he was not any of the
individuals seen in video surveillance of the armed robberies
charged in the case; witnesses’ identifications of Graham were
dubious; the CSLI in the cell phone records was imprecise; the
government failed to show that Graham’s and Jordan’s association
amounted to an agreement to commit crime; and items of clothing
and the vehicle used to link Graham to various robberies were
common and not distinctive. Similarly, Jordan contended at trial
that he did not drive Graham’s pickup truck to flee any robbery;
that he was visiting a relative’s home when the Burger King and
McDonald’s robberies occurred; that descriptions of individuals
who committed the Shell robbery did not match Jordan; that the
government
amounted
to
failed
a
to
show
conspiracy;
that
and
his
that
association
the
CSLI
with
was
Graham
imprecise.
Additionally, Jordan asserted in his defense that he did not
sanction Graham’s friends using his apartment to store weapons
and
clothing.
There
is
little,
if
any,
contrast
between
Appellants’ defenses, and certainly no contrast so stark as to
necessitate
severance.
We
cannot
conclude
that
the
district
court abused its broad discretion and therefore affirm denial of
Jordan’s motion for severance.
VI.
Jordan challenges the district court’s decision to exclude
from
evidence
two
out-of-court
82
statements
of
an
unavailable
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 83 of 134
declarant, i.e., Graham. We review the district court’s decision
for abuse of discretion. United States v. Bumpass, 60 F.3d 1099,
1102 (4th Cir. 1995).
Hearsay is generally not admissible in evidence, Fed. R.
Evid. 802, given the “dangers” of insincerity, misperception,
misremembrance,
statements,
and
ambiguity
Williamson
v.
presented
United
States,
in
512
out-of-court
U.S.
594,
598
(1994). Rule 804(b)(3), however, provides an exception to the
hearsay
rule
for
statements
made
against
the
declarant’s
interest, including statements that, at the time they were made,
“had so great a tendency . . . to expose the declarant to civil
or criminal liability” that a reasonable person in her position
would not have made the statements unless believing them to be
true. Fed. R. Evid. 804(b)(3). “[H]earsay may be admitted under
this
exception
statement
is
if
(1)
the
genuinely
declarant
adverse
to
is
unavailable,
the
(2)
declarant’s
the
penal
interest, and (3) ‘corroborating circumstances clearly indicate
the
trustworthiness
1102.
Satisfying
of
these
the
statement.’”
requirements
Bumpass,
presents
a
60
F.3d
at
“formidable
burden” to the party offering the statement. Id.
Jordan argues that the district court should have admitted
a written statement bearing the signature “Aaron Graham” and the
recording of a jail call between Graham and an individual called
Tony. Dated February 9, 2011, the written statement reads, “I
83
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 84 of 134
Aaron Graham I did pick up Eric Jordan 10-15 minutes prior to my
truck being pulled over and he had no knowledge of anything I’m
accused of.” J.A. 2638. On the jail call, Tony asks, “Remember,
didn’t you write a statement or something saying he wasn’t with
you or something like that?” Graham responds, “Oh, yeah, yeah,
yeah, yeah, yeah.” J.A. 2218. Exercising his Fifth Amendment
right not to testify at trial, Graham was unavailable to testify
as the declarant of the statements at issue. See United States
v. Dargan, 738 F.3d 643, 649 (4th Cir. 2013).
We
conclude
that
the
district
court
did
not
abuse
its
discretion in excluding the statements from evidence. First, the
written statement was not genuinely adverse to Graham’s penal
interest. The statement admits of no wrongdoing by Graham but
rather casts the charges against Graham as mere allegations.
Second,
Jordan
fails
to
show
corroborating
circumstances
that clearly indicate that the written statement is trustworthy.
While recognizing that “the precise nature of the corroboration
required
by
Rule
804(b)(3)
cannot
be
fully
described,”
this
Court has identified several factors that courts consider in
“determining whether sufficient corroboration exists to justify
admitting a statement under the rule[.]” Bumpass, 60 F.3d at
1102. These factors include
(1) whether the declarant had at the time of making
the statement pled guilty or was still exposed to
prosecution
for
making
the
statement,
(2)
the
84
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 85 of 134
declarant’s motive in making the statement and whether
there was a reason for the declarant to lie, (3)
whether the declarant repeated the statement and did
so consistently, (4) the party or parties to whom the
statement was made, (5) the relationship of the
declarant with the accused, and (6) the nature and
strength of independent evidence relevant to the
conduct in question.
Id.
The fact that Graham and Jordan were friends or associates
likely gave Graham a motive to exonerate Jordan and a reason to
lie for this purpose. Further, there is no indication in the
record
that
the
content
of
the
written
statement
was
ever
repeated by Graham; nor is there any independent evidence, aside
from Jordan’s own testimony, to show that Jordan was not with
Graham during the robberies. Graham was facing prosecution on
the date attached to the written statement, but he could not
have exposed himself to greater criminal liability or risk of
conviction in making the statement, given its non-incriminating
character.
In sum, we agree with the district court that there are not
sufficient corroborating circumstances to “clearly” indicate the
trustworthiness of the written statement. We find no abuse of
discretion
in
the
district
court’s
decision
to
exclude
the
hearsay statement.
We also agree with the district court that the jail call is
insufficient to establish that the written statement was indeed
85
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 86 of 134
a statement by Graham. See Fed. R. Evid. 901. On the call,
Graham
appears
statement,
but
to
affirm
his
that
comment
he,
falls
at
some
short
of
point,
wrote
identifying
a
or
otherwise authenticating the written statement Jordan sought to
admit
into
evidence.
We
find
no
abuse
of
discretion
in
the
district court’s decision to exclude jail call as non-relevant.
See Fed. R. Evid. 401.
VII.
Jordan challenges the district court’s denial of his motion
to suppress evidence obtained in searches of his home conducted
after his arrest in February 2011. The searches were conducted
pursuant to two warrants Jordan argues were invalid based on
defects in the affidavit of probable cause submitted to obtain
the first warrant and in the return after the first warrant was
executed. Jordan does not dispute that the affidavits for both
warrants provided a substantial basis for a finding of probable
cause. Instead, Jordan argues that the warrants were invalid
because (1) the affidavit supporting the first warrant omitted
exculpatory
information
while
including
information
about
robberies for which Jordan was not ultimately charged; and (2)
the affiant falsely certified in the return that he executed the
warrant. We find no reversible error.
A.
86
Appeal: 12-4659
Doc: 169
Jordan
Filed: 08/05/2015
identifies
two
Pg: 87 of 134
sets
of
defects
in
the
affidavit
supporting the first warrant: (1) it included facts about the
robberies
of
January
22,
2011,
with
which
Jordan
was
not
ultimately charged; and (2) it omitted the facts about these
robberies that would tend to exculpate Jordan, including the
fact that descriptions of the robbers did not match Jordan and
the lack of forensic evidence linked to Jordan. Jordan claims
that he was prejudiced by these additions and omissions.
An affidavit supporting a search warrant is entitled to “a
presumption of validity[,]” Franks v. Delaware, 438 U.S. 154,
171 (1978), but a defendant may “attack a facially sufficient
affidavit” “in certain narrowly defined circumstances[,]” United
States v. Colkley, 899 F.2d 297, 300 (4th Cir. 1990) (citing
Franks, 438 U.S. 154). After making a preliminary showing, a
defendant may demand under the Fourth Amendment a hearing to
determine
(1)
intentionally,
included
a
whether
the
whether
or
false
false
with
an
affiant
reckless
statement
statement
in
a
“is
has
disregard
warrant
“knowingly
for
the
affidavit;
necessary
to
and
truth,”
and
(2)
the
finding
of
if
perjury
or
probable cause[.]” Franks, 438 U.S. at 155-56.
“[T]he
reckless
search
disregard
warrant
is
must
established
be
by
voided”
a
preponderance
of
the
evidence, and, “with the affidavit’s false material set to one
side,
the
affidavit’s
remaining
87
content
is
insufficient
to
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 88 of 134
establish probable cause[.]” Id. at 156. In such a case, “the
fruits of the search [must be] excluded to the same extent as if
probable cause was lacking on the face of the affidavit.” Id.
This rule “also applies when affiants omit material facts ‘with
the intent to make, or in reckless disregard of whether they
thereby made, the affidavit misleading.’” Colkley, 899 F.2d at
300 (quoting United States v. Reivich, 793 F.2d 957, 961 (8th
Cir. 1986)).
Jordan did not request a Franks hearing before the district
court and has made no showing before this Court that the affiant
on
the
challenged
affidavit
whether
“knowingly
and
included
any
intentionally,
.
false
.
.
statement,
with
reckless
disregard for the truth,” or otherwise. Franks, 438 U.S. at 155.
Jordan
also
statements
has
not
included
shown
in
the
that
any
affidavit
of
were
the
complained-of
“necessary
to
the
finding of probable cause” or that any of the excluded facts
would have prevented a finding of probable cause. Id. at 156.
We
also
potentially
reject
Jordan’s
exculpatory
challenge
information
he
with
respect
complains
to
was
the
not
included in the first warrant affidavit. In Colkley, this Court
affirmed denial of a defendant’s motion to suppress fruits of an
arrest
warrant
that
“did
not
contain
certain
potentially
exculpatory information known to the affiant.” 899 F.2d at 298.
The
defendant
“made
no
showing
88
that
the
affiant
intended
to
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 89 of 134
mislead the magistrate by omitting information, and because the
warrant with the omitted information would in any event have
been supported by probable cause . . . .” Id. Similarly here,
Jordan has not shown that the affiant intended to mislead the
magistrate by omitting, or was reckless in omitting, information
that tended to exculpate Jordan as to the robberies of January
22, 2011.
We find no reason to set aside our presumption that the
challenged warrant affidavit was valid and therefore find no
reversible
error
in
the
district
court’s
decision
to
admit
evidence seized during the searches of Jordan’s home.
B.
Citing
Rule
41(f)(1)
of
the
Federal
Rules
of
Criminal
Procedure, Jordan next argues that the first search warrant was
defective
because
certified
in
the
41(f)(1)
provides
the
affiant,
return
that
that
Detective
he
“[a]n
executed
officer
Woerner,
the
falsely
warrant.
present
Rule
during
the
execution of the warrant must prepare and verify an inventory of
any
property
seized”
and
that
“[t]he
officer
executing
the
warrant must promptly return it — together with a copy of the
inventory — to the magistrate judge designated on the warrant.”
By its own terms, however, Rule 41 applies only to federal
search warrants requested by “a federal law enforcement officer”
or “an attorney for the government[.]” Fed. R. Crim. P. 41. This
89
Appeal: 12-4659
Doc: 169
Court
has
Filed: 08/05/2015
held
that
“a
Pg: 90 of 134
warrant
proceeding
must
meet
the
particulars of Rule 41 only where the warrant application was
made at the direction or urging of a federal officer.” United
States v. Clyburn, 24 F.3d 613, 616 (4th Cir. 1994) (citations
and internal quotation marks omitted). We have also held that
“[n]on-constitutional violations of Rule 41 warrant suppression
only when the defendant is prejudiced by the violation . . . or
when ‘there is evidence of intentional and deliberate disregard
of a provision in the Rule[.]’” United States v. Simons, 206
F.3d 392, 403 (4th Cir. 2000) (citations omitted).
The warrants Jordan challenges were prepared and executed
by local law enforcement officers, not federal agents. Thus, any
defect in the return cannot serve as a basis for suppression.
Even if Rule 41 applied, however, Jordan has not shown that the
officers
intentionally
or
deliberately
disregarded
the
requirements of Rule 41(f) or that he was prejudiced by the
defect
in
the
return.
In
this
context,
prejudice
would
be
established by a showing that the search would not have taken
place the same way if the officers had complied with the Rule
with respect to the return. See United States v. Pangburn, 983
F.2d
449,
Salcido
455
because
(2d
the
Cir.
1993)
search
(“[T]here
of
his
was
storage
no
prejudice
locker
would
to
have
taken place in exactly the same way if Rule 41 had been followed
with regard to notice of the entry . . . .”). Jordan has made no
90
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 91 of 134
such showing. The false certification of the return provides no
basis
for
suppression
in
this
case.
We
affirm
the
district
court’s decision to admit the challenged evidence.
VIII.
Jordan appeals the district court’s denial of his motion
for acquittal with respect to the charges for conspiracy, Hobbs
Act
robbery,
violence
in
McDonald’s
Criminal
and
brandishing
connection
robberies.
Procedure
with
Rule
requires
a
firearm
the
29(a)
the
Shell,
of
the
district
during
a
Burger
King,
Federal
court
crime
to
of
and
Rules
of
“enter
a
judgment of acquittal of any offense for which the evidence is
insufficient
to
government’s
case-in-chief,
acquittal
to
as
sustain
all
a
offenses
conviction.”
Jordan
charged
At
the
submitted
in
the
close
motions
indictment.
of
for
The
district court granted the motion as to the charge under 18
U.S.C. § 922(g)(1) in Count One for being a felon in possession
of a firearm but denied the motion as to the remaining counts.
The jury ultimately returned guilty verdicts as to each of these
offenses. Jordan argues that the evidence presented at trial was
not
sufficient
to
support
the
guilty
verdicts
beyond
a
evidence
de
reasonable doubt. We disagree.
A.
We
review
challenges
to
the
sufficiency
of
novo. United States v. Engle, 676 F.3d 405, 419 (4th Cir. 2012),
91
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 92 of 134
cert. denied, 133 S. Ct. 179 (2012). The Court must sustain the
verdict if, “viewing the evidence and the reasonable inferences
to
be
drawn
therefrom
in
the
light
most
favorable
to
the
Government, ‘. . . the evidence adduced at trial could support
any
rational
determination
of
guilty
beyond
a
reasonable
doubt.’” United States v. Burgos, 94 F.3d 849, 863 (4th Cir.
1996) (quoting United States v. Powell, 469 U.S. 57, 67 (1984)).
In assessing the challenge, we focus on “‘the complete picture
that the evidence presents[,]’ . . . consider[ing] the evidence
‘in cumulative context’ rather than ‘in a piecemeal fashion[.]’”
United
States
v.
Strayhorn,
743
F.3d
917,
921-22
(4th
Cir.
2014), cert. denied, 134 S. Ct. 2689 (2014) (quoting Burgos, 94
F.3d at 863).
This
verdict
Court
merely
determines
“may
because
that
Burgos,
insufficiency
[is]
prosecution’s
failure
Burks
v.
overturn
it
finds
another,
preferable.”
(quoting
not
94
‘.
is
United
substantially
the
verdict
reasonable
F.3d
.
a
.
at
862.
confined
clear[.]’”
States,
Rather,
Engle,
437
unpalatable
verdict
to
U.S.
676
or
would
be
“reversal
for
cases
1,
supported
where
F.3d
17
at
the
419
(1978)).
A
defendant asserting a sufficiency challenge therefore bears a
“‘heavy burden[.]’” Id. (quoting United States v. Hoyte, 51 F.3d
1239, 1245 (4th Cir. 1995)).
B.
92
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 93 of 134
The evidence presented at trial included the following:
Three
individuals
were
seen
on
video
surveillance
using
firearms to rob Shell on February 1, 2011. Clothing matching
that worn by one of the individuals, who the government sought
to prove was Graham, and weapons matching those seen in the
video
and
described
different
locations
personal
by
belongings.
victims
inside
were
Jordan’s
Photographs
later
recovered
apartment,
showed
that
from
among
his
distinctive
clothing Jordan wore at the time of his arrest closely resembled
that worn by a masked robber seen in the video of the Shell
robbery,
which
detectives.
was
CSLI
confirmed
in
cell
in
the
phone
testimony
records
showed
of
two
that,
police
minutes
after the Shell robbery on February 1, 2011, Jordan was near
Shell and then both he and Graham were near Jordan’s apartment.
Cell phone records also showed that numerous calls were
made between Jordan and Graham between February 1 and February
5,
2011.
Graham
CSLI
were
showed
both
that,
near
on
February
Jordan’s
5,
apartment
2011,
Jordan
approximately
and
45
minutes before the Burger King robbery and that Graham was near
Burger
King
according
to
within
minutes
eyewitness
of
the
testimony,
robbery.
an
On
that
individual
date,
later
identified as Graham used a black pistol with a white handle to
rob Burger King and then McDonald’s. Graham was seen fleeing
93
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 94 of 134
each robbery by entering the passenger side of a dark colored
Ford F-150 pickup truck that was driven by another individual.
Officer Corcoran testified that, during his investigation
of the Burger King robbery, he received reports describing the
robber, his weapon, and the getaway vehicle. A 911 call was
placed
reporting
getaway
vehicle
the
as
a
McDonald’s
pickup
robbery
truck.
described
reports
CAD
and
confirm
the
that
approximately five minutes after the call, Corcoran spotted a
speeding F-150 truck on the road and saw that the passenger wore
a jacket matching the description of the Burger King robber.
Corcoran
patrol
pursued
car.
The
the
vehicle
driver
of
and
the
activated
truck,
who
the
siren
turned
on
out
his
to
be
Jordan, responded by driving up on a sidewalk before becoming
trapped between heavy traffic, a construction barrier, and a
moving train in front of the truck. Jordan was initially noncompliant with instructions given by Officer Corcoran but was
eventually secured and arrested. Graham was arrested from the
passenger side of the vehicle.
Bundles of folded and crumbled cash were recovered from
Jordan
and
Graham,
including
more
than
$200
recovered
from
Jordan’s person and $83 stuffed in the console inside the truck.
A .25 caliber Taurus pistol with a pearl handle was found under
the passenger seat of the truck and matched the description of
the gun used in the Burger King and McDonald’s robberies. The
94
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 95 of 134
truck was owned by Graham and matched the description of the
truck used as the getaway vehicle after each of the Burger King
and McDonald’s robberies. A fingerprint belonging to Graham was
found at Burger King after the robbery.
Test drives were conducted of the route between McDonald’s
and the location on North Stricker Street where Jordan testified
that he was picked up by Graham on February 5, 2011. The tests
showed
that
the
trip
would
take
more
than
seven
minutes
to
travel at the highest possible rate of speed in traffic, using
emergency lights and sirens. This evidence tended to show that
it would not have been possible for Jordan to have been picked
up from North Stricker Street between the time of the McDonald’s
robbery and the pursuit by Officer Corcoran.
In
addition
stipulated
that
to
the
the
foregoing
businesses
evidence,
robbed
operated
the
in
parties
interstate
commerce and that the robberies affected interstate commerce.
Viewed as a whole and in the light most favorable to the
government,
presented
at
a
reasonable
trial
“as
juror
adequate
could
and
accept
sufficient
the
to
evidence
support
a
conclusion of guilt beyond a reasonable doubt[]” on each of the
offenses of which Jordan was convicted. Engle, 676 F.3d at 419.
C.
Jordan’s
sufficiency
challenges
as
to
his
robbery
and
firearm convictions proceed from assumptions that he was found
95
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 96 of 134
guilty of these offenses solely on a theory of having aided and
abetted armed robberies principally committed by Graham. These
assumptions are dubious, considering that the jury found Jordan
guilty of conspiracy in Count Four.
To
prove
conspiracy,
the
government
must
show
“(1)
an
agreement between two or more people to commit a crime, and (2)
an overt act in furtherance of the conspiracy.” United States v.
Ellis, 121 F.3d 908, 922 (4th Cir. 1997). “The existence of a
‘tacit
or
mutual
understanding’
between
conspirators
is
sufficient evidence of a conspiratorial agreement.” Id. (quoting
United States v. Chorman, 910 F.2d 102, 109 (4th Cir. 1990)).
Such
an
agreement
evidence,
such
as
may
be
established
the
defendant’s
through
circumstantial
“‘relationship
with
other
members of the conspiracy, the length of this association, [the
defendant’s]
attitude
[and]
conduct,
and
the
nature
of
the
conspiracy.’” Burgos, 94 F.3d at 858 (4th Cir. 1996) (citation
omitted).
“Like
the
conspirators’
agreement,
a
defendant’s
participation in the conspiracy ‘need not be explicit; it may be
inferred from circumstantial evidence.’” Id. This Court has held
that “once a conspiracy is established, even a slight connection
between a defendant and the conspiracy is sufficient to include
him in the plan.” Ellis, 121 F.3d at 922 (internal quotation
marks and citation omitted).
96
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 97 of 134
A reasonable fact finder could conclude from the evidence
presented at trial that Jordan conspired with Graham to commit
armed
robberies
Circumstantial
Graham
of
and
cooperated
Shell,
direct
in
Burger
King,
evidence
performing
the
armed
McDonald’s.
that
showing
and
Jordan
robbery
of
and
Shell
reflects a “‘tacit and mutual understanding’” between the two
and supports a reasonable inference that they had an agreement
to commit this crime. Ellis, 121 F.3d at 922 (citation omitted).
Evidence of the pair’s involvement in the Shell robbery, ongoing
communications between Jordan and Graham over the course of the
days
to
Graham’s
follow,
and
robberies
circumstantial
Jordan’s
of
evidence
role
as
Burger
King
that
Jordan
getaway
and
and
driver
McDonald’s
Graham
after
provide
agreed
to
cooperate in assuming their respective roles in these robberies.
In
sum,
the
evidence
presented
at
trial
was
sufficient
to
support Jordan’s conspiracy conviction.
As a co-conspirator with Graham in the Shell, Burger King,
and
McDonald’s
robberies,
Jordan
is
liable
for
Graham’s
reasonably foreseeable acts in furtherance of the conspiracy.
See United States v. Ashley, 606 F.3d 135, 142-43 (4th Cir.
2010)
(citing
Pinkerton
v.
United
States,
328
U.S.
640,
647
(1946)). Jordan does not dispute that the government presented
substantial evidence that Graham was responsible for Hobbs Act
robbery
of
Shell,
Burger
King,
97
and
McDonald’s,
and
used
a
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 98 of 134
firearm in each of those robberies. 28 We hold, therefore, that
Jordan’s convictions for Hobbs Act robbery and brandishing a
firearm under 18 U.S.C. § 924(c) are supported by substantial
evidence.
D.
Jordan contends that the district court made a ruling that
the government failed to prove Jordan’s knowledge that Graham
brought a firearm into the pickup truck after the McDonald’s
robbery. Without such evidence, Jordan argues, there was not
sufficient evidence to convict him on the Hobbs Act robbery and
firearm offenses arising from the Burger King and McDonald’s
robberies.
The
record
discloses
no
clear
ruling
from
the
district court as to any evidence of Jordan’s knowledge about
the Taurus pistol in the truck.
Jordan
directs
our
attention
to
the
district
court’s
decision to grant Jordan’s Rule 29(a) motion for acquittal on
Count One, which charged Jordan with being a felon in possession
28
A conviction under the Hobbs Act requires proof
(1) that the defendant coerced the victim to part
with property; (2) that the coercion occurred through
the “wrongful use of actual or threatened force,
violence or fear or under color of official right”;
and (3) that the coercion occurred in such a way as to
affect adversely interstate commerce.
United States v. Buffey, 899 F.2d 1402, 1403 (4th Cir. 1990)
(citation omitted); see also 18 U.S.C. § 1951.
98
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 99 of 134
of a firearm under 18 U.S.C. § 922(g)(1). Liability under §
922(g)(1) may arise from a felon’s voluntary and intentional
possession of a firearm, whether the felon possessed the weapon
actually or constructively, exclusively or jointly with others.
See United States v. Gallimore, 247 F.3d 134, 136-37 (4th Cir.
2001). “‘Constructive possession’ . . . occurs when a person
‘exercise[s],
or
ha[s]
the
power
to
exercise,
dominion
and
control over [an] item’ of property.” United States v. Scott,
424 F.3d 431, 435 (4th Cir. 2005) (quoting United States v.
Shorter, 328 F.3d 167, 172 (4th Cir. 2003)). The government may
“prove constructive possession of an item in instances when a
defendant has dominion and control over the premises or vehicle
where the item is located.” Id. at 435 n.*.
The government asserted multiple theories of the felon-inpossession
Jordan
charge
was
in
against
Jordan,
constructive
including
possession
of
the
the
theory
Taurus
that
pistol
through operation of the truck in which it was located. The
district court rejected each of the government’s theories. As to
the
two
constructive-possession
grounds
for
its
theory,
decision:
the
(1)
district
“all
of
court
the
stated
evidence
introduced to date indicates the firearm was under the complete
individual control of the co-defendant Graham[;]” and (2) there
was
“no
evidence
tending
to
99
show
that
Jordan’s
alleged
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 100 of 134
constructive possession of the firearm was voluntary as required
by the Scott case.” J.A. 2213.
We are not persuaded that, in so ruling, the district court
implied that there was insufficient evidence that Jordan knew
about the gun Graham brought into the truck. Cf. Schneckloth v.
Bustamonte, 412 U.S. 218, 224 (1973) (“[Voluntariness] cannot be
taken literally to mean a ‘knowing’ choice.”). From the larger
context
of
the
court’s
felon-in-possession
colloquy
charge,
it
is
with
counsel
apparent
regarding
that
the
the
court’s
skepticism of the constructive-possession theory was based on
the
view
that
Jordan,
as
“the
alleged
getaway
driver,”
J.A.
2192, could not have assumed joint possession of a weapon that
was solely within the control of Graham simply because Graham
chose
to
bring
it
into
the
vehicle.
In
that
sense,
any
possession Jordan had of the weapon by virtue of his control of
the vehicle was not “voluntary.” But that does not mean that
Jordan was unaware that the weapon was present. 29
In any case, our review of the district court’s sufficiency
determination is de novo, and we hold that there was indeed
sufficient evidence that Jordan knew the Taurus pistol was in
the
truck
after
the
Burger
King
29
and
McDonald’s
robberies.
We decline to reach the question of whether the district
court expressed the correct view of constructive possession of a
firearm through control of the vehicle in which it is located.
100
Appeal: 12-4659
Doc: 169
Accordingly,
we
Filed: 08/05/2015
reject
Jordan’s
Pg: 101 of 134
sufficiency
challenge
to
his
convictions for these robberies and associated firearm offenses.
IX.
For the foregoing reasons, Appellants’ Motion to Strike the
Sur-Reply of the United States is granted, and the judgment of
the district court is
AFFIRMED.
101
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 102 of 134
THACKER, Circuit Judge, concurring:
I am in agreement with Judge Davis’s conclusion that
cell
site
location
information
(”CSLI”)
cannot
be
obtained
without a warrant but that, in this case, admission of the CSLI
evidence
must
be
sustained
pursuant
exception to the warrant requirement.
to
the
“good
faith”
I write separately to
express my concern about the erosion of privacy in this era of
rapid technological development.
The tension between the right to privacy and emerging
technology, particularly as it relates to cell phones, impacts
all Americans.
Indeed, as the Supreme Court noted in Riley v.
California, cell phones “are now such a pervasive and insistent
part of daily life that the proverbial visitor from Mars might
conclude
they
were
an
important
134 S. Ct. 2473, 2484 (2014).
a cell phone. *
Ctr.,
feature
of
human
anatomy.”
Nearly every American adult owns
See Mobile Technology Fact Sheet, Pew Research
http://www.pewinternet.org/fact-sheets/mobile-technology-
fact-sheet (last visited July 23, 2015) (saved as ECF opinion
attachment)
(reporting
that,
as
*
of
January
2014,
“90%
of
Cell phone ownership is even higher among young adults.
See Aaron Smith, How Americans Use Text Messaging, Pew Research
Ctr.,
http://www.pewinternet.org/2011/09/19/how-americans-usetext-messaging (last visited July 23, 2015) (saved as ECF
opinion attachment) (reporting that 95% of 18 to 24 year olds
own a cell phone).
102
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 103 of 134
American adults own a cell phone”). More than three-fifths of
American
adults
Research
2
own
a
Ctr.,
smartphone.
U.S.
(2015),
See
Smith,
Use
Smartphone
Aaron
Pew
in
2015
http://www.pewinternet.org/files/2015/03/
PI_Smartphones_0401151.pdf
(saved
as
ECF
opinion
attachment)
(reporting that “64% of American adults now own a smartphone of
some kind”).
on
cell
And each year more Americans decide to rely solely
phones,
untethering
from
landlines.
See,
e.g.,
Stephen J. Blumberg & Julian V. Luke, U.S. Dept. of Health &
Human Res., Wireless Substitution: Early Release Estimates from
the
National;
Health
(2015),
Interview
Survey,
July
-
December
2014
http://www.cdc.gov/nchs/data/nhis/earlyrelease/
wireless201506.pdf (saved as ECF opinion attachment).
As of
2014, almost half of American homes only had cell phones.
See
id. (“More than two in every five American homes (45.4%) had
only
wireless
telephones
(also
cell
phones,
or
phones)
mobile
known
as
during
cellular
the
telephones,
second
half
of
2014 . . . .”).
And
cell
walkie-talkies.
a
conversation,
phones
are
far
more
than
sophisticated
Unlike a walkie-talkie, which merely facilities
“a
cell
phone
collects
in
one
place
many
distinct types of information . . . that reveal much more in
combination than any isolated record” or conversation.
134 S. Ct. at 2489.
Riley,
This information -- stored on the phone and
103
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 104 of 134
on remote servers -- makes reconstructing a day in the life of
any individual a simple task.
individual’s
thousand
private
photographs
descriptions . . . .”).
life
See, e.g., id. (“The sum of an
can
labeled
be
reconstructed
with
dates,
through
locations,
a
and
In fact, gathering and storing location
information “is a standard feature on many smart phones and can
reconstruct someone’s specific movements down to the minute, not
only
around
town
but
also
within
a
particular
including in the privacy of his or her own home.
This is the reality of modern life.
building,”
Id. at 2490.
“The fact that technology
now allows an individual to carry such information in his hand
does not make the information any less worthy of the protection
for which the Founders fought.”
Id. at 2495 (2014).
It is particularly disturbing that any one of us can
be
tracked
from
afar
regardless
actively using our phones.
of
whether
or
not
we
are
Even just sitting at home alone,
your phone may be relaying data, including your location data.
This data is transmitted to the remote servers of your service
provider,
where
the
data
is
stored.
According
to
the
Government, it does not need a warrant to force your service
provider to turn over this information.
By doing nothing, you
disclosed your location information to a third party.
Per the
Government’s theory, in so doing you have foregone your right to
104
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 105 of 134
privacy such that a warrant is not necessary.
I cannot approve
of such a process (or lack thereof).
As the march of technological progress continues to
advance upon our zone of privacy, each step forward should be
met with considered judgment that errs on the side of protecting
privacy and accounts for the practical realities of modern life.
At
bottom,
this
decision
continues
a
time-honored
American tradition -- obtaining a warrant is the rule, not the
exception.
105
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
DIANA GRIBBON MOTZ, Circuit
concurring in the judgment:
Pg: 106 of 134
Judge,
dissenting
in
part
and
I concur in the judgment affirming Defendants’ convictions
and sentences.
that
the
rights.
But, with respect, I dissent from the holding
government
violated
Defendants’
Fourth
Amendment
The majority concludes that the government did so when
it obtained, pursuant to 18 U.S.C. § 2703(d) court orders, but
without warrants, records of the cell phone towers Defendants
used to make and receive calls and text messages.
That holding
flies in the face of the Supreme Court’s well-established thirdparty doctrine. 1
The
Court
has
long
held
that
an
individual
enjoys
“no
legitimate expectation of privacy,” and so no Fourth Amendment
protection, in information he “voluntarily turns over to [a]
third part[y].”
Smith v. Maryland, 442 U.S. 735, 743-44 (1979).
This rule applies even when “the information is revealed,” as it
assertedly was here, “on the assumption that it will be used
only for a limited purpose and the confidence placed in the
1
Given the majority’s affirmance of Defendants’ convictions
on alternate grounds, its rejection of the third-party doctrine
makes no difference to the result in this case.
But the
majority’s disavowal of the third-party doctrine will have
profound consequences in future cases in the Fourth Circuit.
For unlike in cases arising in every other circuit to consider
the matter, the government will have to obtain a search warrant
supported by probable cause before obtaining even historical
CSLI in this circuit.
106
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 107 of 134
third party will not be betrayed.”
U.S. 435, 443 (1976).
of
historical
cell
United States v. Miller, 425
Accordingly, the government’s acquisition
site
location
information
(CSLI)
from
Defendants’ cell phone provider did not implicate, much less
violate, the Fourth Amendment.
I.
The
people
Fourth
to
be
Amendment
secure
in
ensures
their
that
“[t]he
persons,
right
the
papers,
houses,
of
and
effects, against unreasonable searches and seizures, shall not
be
violated.”
U.S.
Amendment
search
subjective
expectation
reasonable.”
In
Const.
occurs
of
amend.
when
IV.
the
privacy
Broadly,
government
that
society
“a
Fourth
violates
a
recognizes
as
Kyllo v. United States, 533 U.S. 27, 33 (2001).
assessing
whether
such
a
search
occurred,
“it
is
important to begin by specifying precisely the nature of the
state activity that is challenged.”
(emphasis added).
Smith, 442 U.S. at 741
Here, that “activity” is the government’s
acquisition from a phone company, Sprint/Nextel, of CSLI records
-- i.e., the records the phone company created that identify
which
cell
messages.
towers
it
used
to
route
Defendants’
calls
and
The government did not surreptitiously view, listen
to, record, or in any other way engage in direct surveillance of
Defendants
to
obtain
this
information.
Rather,
it
was
Sprint/Nextel alone that obtained the information, and generated
107
Appeal: 12-4659
the
Doc: 169
business
Filed: 08/05/2015
records,
that
Pg: 108 of 134
Defendants
now
claim
are
constitutionally protected.
The
critically
majority
nature
of
the
distinguishes
relies
--
governmental
this
cases
case
in
from
which
activity
those
the
surreptitiously collect private information. 2
on
here
which
government
thus
the
did
In United States
v. Karo, 468 U.S. 705, 714-15 (1984), for instance, the Drug
Enforcement Agency placed a beeper within a can of ether and
received tracking information from the beeper while the can was
inside a private residence.
Similarly, in Kyllo, 533 U.S. at
34-35, the Department of the Interior used a thermal imager to
2
My colleagues acknowledge this distinction but dismiss it
as “inconsequential.”
I cannot agree.
It matters, for Fourth
Amendment purposes, how the government acquires information.
Just as the Supreme Court applies a different analysis depending
on whether the government engages in a physical trespass, see
United States v. Jones, 132 S. Ct. 945, 949-53 (2012), so too
the Court applies a different analysis, in non-trespassory
cases, depending on whether the information at issue was
voluntarily disclosed to a third party. See Smith, 442 U.S. at
743-44.
Perhaps, in accord with the two lower court cases the
majority cites, the Court will someday conclude that, given
long-established statutory and common-law protections, the
third-party doctrine does not apply to information a patient
reveals to a doctor or a client to a lawyer -- i.e., that the
patient and client do have reasonable expectations of privacy in
information conveyed in the course of these confidential
relationships. But see 1 Wayne R. LaFave, Search & Seizure: A
Treatise on the Fourth Amendment § 2.7(d) (5th ed. 2012 & Supp.
2014).
Clearly, however, the Court has already declined to
recognize any reasonable expectation of privacy for information
a phone company customer provides to the phone company.
See
Smith, 442 U.S. at 743-44.
108
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 109 of 134
gather “information regarding the interior of the home.”
And in
United States v. Jones, 132 S. Ct. 945, 949 (2012), the FBI and
local law enforcement secretly installed a GPS tracking device
on a suspect’s vehicle and monitored the vehicle’s movements for
four weeks.
On the basis of these cases, the majority contends that
“the government invades a reasonable expectation of privacy when
it relies upon technology not in general use to discover the
movements of an individual over an extended period of time.”
Perhaps.
But that question is not before us.
The question we
must answer is not whether, in the abstract, an individual has a
reasonable expectation of privacy in his location and movements
over
time.
Rather,
the
question
before
us
is
whether
an
individual has a reasonable expectation of privacy in a third
party’s
records
information.
that
Karo,
permit
Kyllo,
the
and
government
Jones,
all
to
of
deduce
which
this
involve
direct government surveillance, tell us nothing about the answer
to that question.
Instead, the cases that establish the third-party doctrine
provide
the
answer.
Under
the
third-party
doctrine,
an
individual can claim “no legitimate expectation of privacy” in
information
party.
reasoned
that
he
Smith,
442
that,
by
has
U.S.
voluntarily
at
743-44.
“revealing
his
109
turned
over
The
Supreme
affairs
to
to
a
third
Court
another,”
has
an
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 110 of 134
individual “takes the risk . . . that the information will be
conveyed by that person to the Government.”
443.
The
Fourth
Amendment
does
not
Miller, 425 U.S. at
protect
information
voluntarily disclosed to a third party because even a subjective
expectation
of
privacy
in
such
information
is
“not
society is prepared to recognize as ‘reasonable.’”
one
that
Smith, 442
U.S. at 743 (internal quotation marks and citation omitted).
The government therefore does not engage in a Fourth Amendment
“search” when it acquires such information from a third party.
Applying
the
third-party
doctrine
to
the
facts
of
this
case, I would hold that Defendants did not have a reasonable
expectation of privacy in the CSLI recorded by Sprint/Nextel.
The Supreme Court’s reasoning in Smith controls.
There, the
defendant challenged the government’s use of a pen register -- a
device that could record the outgoing phone numbers dialed from
his
home
telephone.
Id.
at
737.
The
Court
held
that
the
defendant could “claim no legitimate expectation of privacy” in
the numbers he had dialed because he had “voluntarily conveyed”
those
numbers
to
the
phone
company
by
“‘expos[ing]’
that
information to” the phone company’s “equipment in the ordinary
course
of
business.”
Id.
at
744.
The
defendant
thereby
“assumed the risk that the company would reveal to police the
numbers he dialed.”
Id.
110
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 111 of 134
Here, as in Smith, Defendants unquestionably “exposed” the
information at issue to the phone company’s “equipment in the
ordinary course of business.”
received
a
activities
call,
well
or
Id.
sent
within
or
the
Each time Defendants made or
received
“ordinary
a
text
course”
of
message
cell
--
phone
ownership -- Sprint/Nextel generated a record of the cell towers
used.
The
CSLI
that
Sprint/Nexel
recorded
was
necessary
to
route Defendants’ cell phone calls and texts, just as the dialed
numbers recorded by the pen register in Smith were necessary to
route the defendant’s landline calls.
Having “exposed” the CSLI
to Sprint/Nextel, Defendants here, like the defendant in Smith,
“assumed the risk” that the phone company would disclose their
information to the government.
the
government’s
acquisition
Id. at 744.
of
that
For these reasons,
information
(historical
CSLI) pursuant to § 2703(d) orders, rather than warrants, did
not violate the Fourth Amendment.
Three other federal appellate courts have considered the
Fourth Amendment question before us.
majority’s holding.
Not one has adopted the
Two of our sister courts have expressly
held, as I would, that individuals do not have a reasonable
expectation
of
privacy
in
historical
CSLI
records
that
the
government obtains from cell phone service providers through a
§ 2703(d) order.
(11th
Cir.
See United States v. Davis, 785 F.3d 498, 511
2015)
(en
banc)
111
(holding
defendant
had
no
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 112 of 134
“objective[ly] reasonable expectation of privacy in MetroPCS’s
business
records
showing
the
cell
tower
locations
that
wirelessly connected his calls”); In re Application of U.S. for
Historical Cell Site Data, 724 F.3d 600, 615 (5th Cir. 2013) (In
re Application (Fifth Circuit)) (holding the government can use
“[s]ection
2703(d)
orders
to
obtain
historical
cell
site
information” without implicating the Fourth Amendment (emphasis
omitted)).
phone
And although the third court opined that “[a] cell
customer
has
not
‘voluntarily’
shared
his
location
information with a cellular provider in any meaningful way,” it
held that “CSLI from cell phone calls is obtainable under a
§ 2703(d)
order,”
which
“does
not
require
the
traditional
probable cause determination” necessary for a warrant.
In re
Application of U.S. for an Order Directing a Provider of Elec.
Commc’n Serv. to Disclose Records to Gov’t, 620 F.3d 304, 313,
317 (3d Cir. 2010) (In re Application (Third Circuit)).
Even in the absence of binding circuit precedent, the vast
majority of federal district court judges have reached the same
conclusion. 3
Given this near unanimity of federal authority, the
3
See, e.g., United States v. Epstein, No. 14-287, 2015 WL
1646838, at *4 (D.N.J. Apr. 14, 2015) (Wolfson, J.); United
States v. Dorsey, No. 14-328, 2015 WL 847395, at *8 (C.D. Cal.
Feb. 23, 2015) (Snyder, J.); United States v. Lang, No. 14-390,
2015 WL 327338, at *3-4 (N.D. Ill. Jan. 23, 2015) (St. Eve, J.);
United States v. Shah, No. 13-328, 2015 WL 72118, at *7-9
(E.D.N.C. Jan. 6, 2015) (Flanagan, J.); United States v.
(Continued)
112
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 113 of 134
majority is forced to rest its holding on three inapposite state
cases and three district court opinions -- including one that
has been vacated, In re Application of U.S. for Historical Cell
Site Data, 747 F. Supp. 2d 827 (S.D. Tex. 2010), vacated, 724
F.3d
600
(5th
Cir.
2013),
and
another
that
involves
only
prospective and real-time CSLI, In re Application of U.S. for an
Order Authorizing Disclosure of Location Info. of a Specified
Wireless Tel., 849 F. Supp. 2d 526, 535 & n.4 (D. Md. 2011). 4
Martinez, No. 13-3560, 2014 WL 5480686, at *3-5 (S.D. Cal. Oct.
28, 2014) (Hayes, J.); United States v. Rogers, No. 13-952, 2014
WL 5152543, at *3-4 (N.D. Ill. Oct. 9, 2014) (Kocoras, J.);
United States v. Giddins, 57 F. Supp. 3d 481, 491-94 (D. Md.
2014) (Quarles, J.); United States v. Banks, 52 F. Supp. 3d
1201, 1204-06 (D. Kan. 2014) (Crabtree, J.); United States v.
Serrano, No. 13-0058, 2014 WL 2696569, at *6-7 (S.D.N.Y. June
10, 2014) (Forrest, J.); United States v. Moreno-Nevarez, No.
13-0841, 2013 WL 5631017, at *1-2 (S.D. Cal. Oct. 2, 2013)
(Benitez, J.); United States v. Rigmaiden, No. 08-814, 2013 WL
1932800, at *14 (D. Ariz. May 8, 2013) (Campbell, J.); United
States v. Gordon, No. 09-153-02, 2012 WL 8499876, at *2 (D.D.C.
Feb. 6, 2012) (Urbina, J.); United States v. Benford, No. 09-86,
2010 WL 1266507, at *2-3 (N.D. Ind. Mar. 26, 2010) (Moody, J.);
In re Application of the U.S. for an Order Authorizing the
Disclosure of Cell Site Location Info., No. 08-6038, 2009 WL
8231744, at *9-11 (E.D. Ky. Apr. 17, 2009) (Wier, Mag. J.); In
re Applications of U.S. for Orders Pursuant to Title 18, U.S.
Code Section 2703(d), 509 F. Supp. 2d 76, 79-82 (D. Mass. 2007)
(Stearns, J.).
But see United States v. Cooper, No. 13-00693,
2015 WL 881578, at *6-8 (N.D. Cal. Mar. 2, 2015) (Illston, J.);
In re Application of U.S. for an Order Authorizing the Release
of Historical Cell-Site Info., 809 F. Supp. 2d 113, 120-27
(E.D.N.Y. 2011) (Garaufis, J.).
4
Two of the state cases do not even interpret the Fourth
Amendment, but instead rely on broader state constitutional
protections.
See Commonwealth v. Augustine, 4 N.E.3d 846, 858
(Continued)
113
Appeal: 12-4659
Doc: 169
In
sum,
Filed: 08/05/2015
the
majority’s
Pg: 114 of 134
holding
lacks
support
from
all
relevant authority and places us in conflict with the Supreme
Court and three other federal appellate courts.
II.
Despite the lack of support for its position, the majority
insists that the third-party doctrine does not apply here.
The
majority maintains that “a cell phone user does not ‘convey’
CSLI to her service provider at all –- voluntarily or otherwise
–- and therefore does not assume any risk of disclosure to law
enforcement.”
holding. 5
This is the analytical lynchpin of my colleagues’
By my count, they invoke a cell phone user’s asserted
(Mass. 2014) (finding “no need to wade into the[] Fourth
Amendment waters” when the court could rely on article 14 of the
Massachusetts Declaration of Rights); State v. Earls, 70 A.3d
630, 641-42 (N.J. 2013) (explaining that New Jersey has
“departed” from Smith and Miller and does not recognize the
third-party doctrine).
And the court in the third state case
repeatedly pointed out that it was not considering “historical
cell site location records” -- like those at issue here -- but
“real time cell site location information,” which had been
obtained, not through a § 2703(d) order, but under an order that
had authorized only a “pen register” and “trap and trace
device.”
Tracey v. State, 152 So. 3d 504, 506-08, 515-16, 526
(Fla. 2014). Thus, contrary to my colleagues’ charge, it is not
the dissent, but rather cases on which the majority relies, that
“have suggested” that there are different privacy interests in
“real-time” versus “historical” location information.
See id.;
see also In re Application of U.S. for an Order Authorizing
Disclosure of Location Info. of a Specified Wireless Tel., 849
F. Supp. 2d 526, 535-39 (D. Md. 2011).
5
My colleagues also emphasize the general “sensitiv[ity]”
of location information. But to the extent they do so to argue
(Continued)
114
Appeal: 12-4659
lack
Doc: 169
of
Filed: 08/05/2015
“voluntariness”
discussion
of
the
no
Pg: 115 of 134
less
third-party
than
twenty
doctrine.
times
But
my
in
their
colleagues’
holding that cell phone users do not voluntarily convey CSLI
misapprehends
third-party
argument
the
nature
doctrine,
and
the
and
of
CSLI,
rests
on
constitutional
attempts
a
to
redefine
long-rejected
protection
the
factual
afforded
a
communication’s content.
A.
With respect to the nature of CSLI, there can be little
question that cell phone users “convey” CSLI to their service
providers.
After all, if they do not, then who does?
Perhaps
the majority believes that because a service provider generates
a record of CSLI, the provider just conveys CSLI to itself.
But
before the provider can create such a record, it must receive
information indicating that a cell phone user is relying on a
that the third-party doctrine does not apply to CSLI, they are
mistaken.
The third-party doctrine clearly covers information
regarded as comparably “sensitive” to location information, like
financial records, Miller, 425 U.S. at 442, and phone records,
Smith, 442 U.S. at 745.
Indeed, the public polling study the
majority
twice
cites
in
attempting
to
establish
the
“sensitivity” of CSLI relates that a similar number of adults
regard the phone numbers they call to be just as “sensitive” as
location data. Pew Research Ctr., Public Perceptions of Privacy
and
Security
in
the
Post-Snowden
Era
34-35
(2014),
http://www.pewinternet.org/files/2014/11/PI_PublicPerceptionsof
Privacy_111214.pdf.
This is so even though the location data
that the study asked about (GPS) is far more precise than the
CSLI at issue here. See id. at 34.
115
Appeal: 12-4659
Doc: 169
particular
Filed: 08/05/2015
cell
tower.
Pg: 116 of 134
The
provider
only
receives
that
information when a cell phone user’s phone exchanges signals
with
the
nearest
available
cell
tower.
A
cell
phone
user
therefore “conveys” the location of the cell towers his phone
connects with whenever he uses the provider’s network.
There is similarly little question that cell phone users
convey
CSLI
Davis,
785
to
their
F.3d
at
service
512
n.12
providers
(“Cell
“voluntarily.”
phone
users
See
voluntarily
convey cell tower location information to telephone companies in
the
course
of
phones.”).
making
and
receiving
calls
on
their
cell
This is so, as the Fifth Circuit explained, even
though a cell phone user “does not directly inform his service
provider of the location of the nearest cell phone tower.”
In
re Application (Fifth Circuit), 724 F.3d at 614.
Logic
purchases
compels
a
cell
this
phone
conclusion.
and
chooses
When
a
an
service
individual
provider,
he
expects the provider will, at a minimum, place outgoing calls,
send text messages, and route incoming calls and messages.
As
most cell phone users know all too well, however, proximity to a
cell tower is necessary to complete these tasks.
Anyone who has
stepped outside to “get a signal,” or has warned a caller of a
potential
loss
of
service
before
entering
an
understands, on some level, that location matters.
elevator,
See id. at
613 (“Cell phone users recognize that, if their phone cannot
116
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 117 of 134
pick up a signal (or ‘has no bars’), they are out of the range
of their service provider’s network of towers.”).
A cell phone user thus voluntarily enters an arrangement
with
his
service
provider
in
which
he
knows
that
he
must
maintain proximity to the provider’s cell towers in order for
his phone to function.
Whenever he expects his phone to work,
he
--
is
thus
provider
nearby
permitting
to
establish
cell
tower.
A
requesting
connection
a
indeed,
between
cell
phone
user
--
his
his
phone
therefore
service
and
a
voluntarily
conveys the information necessary for his service provider to
identify the CSLI for his calls and texts.
And whether the
service provider actually “elects to make a . . . record” of
this
information
difference.”
“does
not
. . .
make
any
constitutional
Smith, 442 U.S. at 745.
To be sure, some cell phone users may not recognize, in the
moment,
provider.
317.
that
they
are
“conveying”
CSLI
to
their
service
See In re Application (Third Circuit), 620 F.3d at
But the Supreme Court’s use of the word “voluntarily” in
Smith and Miller does not require contemporaneous recognition of
every detail an individual conveys to a third party. 6
6
Rather,
If it were otherwise, as my colleagues appear to believe,
then courts would frequently need to parse business records for
indicia of what an individual knew he conveyed to a third party.
For example, when a person hands his credit card to the cashier
at a grocery store, he may not pause to consider that he is also
(Continued)
117
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 118 of 134
these cases make clear that the third-party doctrine does not
apply when an individual involuntarily conveys information -- as
when the government conducts surreptitious surveillance or when
a third party steals private information.
Thus, this would be a different case if Sprint/Nextel had
misused its access to Defendants’ phones and secretly recorded,
at
the
government’s
behest,
provision of cell service.
information
unnecessary
to
the
Defendants did not assume that risk
when they made calls or sent messages.
But like the defendant
in Smith, 442 U.S. at 747, Defendants here did “assume the risk”
that the phone company would make a record of the information
necessary
to
accomplish
company to perform.
the
very
tasks
they
paid
the
phone
They cannot now protest that providing this
essential information was involuntary.
B.
To justify its rejection of the third-party doctrine, the
majority attempts to redefine it.
The majority maintains that
the third-party doctrine does not apply to CSLI because a cell
“conveying” to his credit card company the date and time of his
purchase or the store’s street address. But he would hardly be
able to use that as an excuse to claim an expectation of privacy
if those pieces of information appear in the credit card
company’s resulting records of the transaction.
Cf. United
States v. Phibbs, 999 F.2d 1053, 1077-78 (6th Cir. 1993)
(Defendant “did not have both an actual and a justifiable
privacy interest in . . . his credit card statements.”).
118
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 119 of 134
phone user need not “actively submit any location-identifying
information
when
making
colleagues
a
apparently
call
or
believe
sending
that
a
an
message.”
individual
My
only
“voluntarily convey[s]” information he “actively submit[s],” but
such a rule is nowhere to be found in either Miller or Smith.
Moreover, this purported requirement cannot be squared with the
myriad of federal cases that permit the government to acquire
third-party
records,
even
when
individuals
do
not
“actively
submit” the information contained in the records.
For
starters,
significance
to
the
courts
have
distinction
versus outgoing phone calls.
attached
between
no
constitutional
records
of
incoming
The technology the police used in
Smith -- a pen register -- recorded only the numbers dialed by a
suspect’s
phone.
It
did
not
(and
information about incoming calls.
could
not)
record
any
To capture that information,
police routinely use a “trap and trace” device.
If the majority
were correct that the third-party doctrine applies only when an
individual “actively submit[s]” information, then any effort to
acquire
records
of
incoming
phone
calls
search protected by the Fourth Amendment.
customer
never
“voluntarily
or
telephone calls.
“actively
submits”
otherwise”
--
to
the
would
constitute
a
After all, the phone
the
phone
numbers
company
from
--
incoming
Only the user on the other end of the line,
who actually dials the numbers, does so.
119
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 120 of 134
But federal courts have not required a warrant supported by
probable
cause
routinely
to
permit
obtain
the
such
government
information.
to
install
Rather,
“trap
and
they
trace”
devices without demonstrating probable cause or even reasonable
suspicion,
the
showing
required
for
§ 2703(d)
orders.
See,
e.g., United States v. Reed, 575 F.3d 900, 914 (9th Cir. 2009);
United States v. Hallmark, 911 F.2d 399, 402 (10th Cir. 1990).
And recently we held that police “did not violate the Fourth
Amendment”
when
obtaining
a
defendant’s
“cellular
phone
records,” even though the records included “basic information
regarding
incoming
and
outgoing
calls
on
that
phone
line.”
United States v. Clenney, 631 F.3d 658, 666-67 (4th Cir. 2011)
(emphasis added). 7
Moreover, outside the context of phone records, we have
held that third-party information relating to the sending and
routing
of
electronic
Amendment protection.
communications
does
not
receive
Fourth
United States v. Bynum, 604 F.3d 161, 164
7
Nor has this court ever suggested that other information
typically contained in phone records -- the date, time, and
duration of each call, for example -- merits constitutional
protection. Yet a phone customer never “actively submits” this
information either.
Rather, this information is, to borrow a
phrase from the majority opinion, “quietly and automatically
calculated” by the phone company “without unusual or overt
intervention that might be detected by the target user.”
If
individuals “voluntarily convey” all of this information to
their phone companies, I see no basis for drawing the line at
CSLI. Notably, the majority does not provide one.
120
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
(4th Cir. 2010).
Pg: 121 of 134
In Bynum, we explained that it “would not be
objectively reasonable” for a defendant to expect privacy in his
phone
and
Internet
subscriber
records,
including
“his
email address, telephone number, and physical address.”
name,
Id.
Although we had no occasion in Bynum to consider whether an
individual
has
a
protected
privacy
interest
in
his
Internet
Protocol (IP) address, id. at 164 n.2, several of our sister
circuits
have
concluded
that
no
such
interest
exists.
See
United States v. Suing, 712 F.3d 1209, 1213 (8th Cir. 2013);
United States v. Christie, 624 F.3d 558, 574 (3d Cir. 2010).
And as the majority itself recognizes, the Ninth Circuit
has held that “e-mail and Internet users have no expectation of
privacy in . . . the IP addresses of the websites they visit.”
United States v. Forrester, 512 F.3d 500, 510 (9th Cir. 2008).
The
Forrester
expectation
of
court
also
privacy
in
held
that
either
there
the
is
to/from
no
reasonable
addresses
of
a
user’s emails or the “total amount of data transmitted to or
from [a user’s] account.”
Id. at 510-11.
The court found the
government’s acquisition of this information “constitutionally
indistinguishable from the use of a pen register that the Court
approved in Smith,” in part because “e-mail and Internet users,
like the telephone users in Smith, rely on third-party equipment
in order to engage in communication.”
121
Id. at 510.
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 122 of 134
Of course, computer users do “actively submit” some of the
information discussed in the above cases, like the “to” address
in an email and the subscriber information conveyed when signing
up for Internet service.
But users do not actively submit other
pieces of information, like an IP address or the amount of data
transmitted
to
their
account.
Internet
automatically generate that information.
service
providers
See Christie, 624 F.3d
at 563; Forrester, 512 F.3d at 511.
If
protects
the
majority
information
is
correct
individuals
that
do
the
not
Fourth
“actively
Amendment
submit”
to
third parties, then it should trouble my colleagues that we and
our sister circuits have consistently failed to recognize this
protection.
Yet nowhere in their opinion do my colleagues even
attempt to grapple with these cases or to reconcile the rule
they announce with the previous applications of the third-party
doctrine.
Today’s decision is a holding in search of a coherent
legal principle; my colleagues have offered none.
C.
Instead, my colleagues rely on an argument long rejected by
the Supreme Court and a series of cases involving the content of
communications to support their holding that CSLI is protected
by the Fourth Amendment.
First,
my
“ubiquitous
in
colleagues
our
emphasize
society
today”
122
that
and
cell
phone
“essential
use
to
is
full
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 123 of 134
cultural and economic participation.”
“ubiquitous”
and
“essential”
use
To the majority, such
shields
consequences of the third-party doctrine.
contends,
“forfeit
cell
phone
expectations
users
of
cannot
privacy
be
by
CSLI
from
the
For, the majority
held
to
simply
voluntarily
seeking
active
participation in society through use of their cell phones.”
But
the
dissenting
justices
in
Miller
and
unsuccessfully advanced nearly identical concerns.
Smith
Dissenting
in Miller, Justice Brennan contended that “the disclosure by
individuals or business firms of their financial affairs to a
bank
is
not
entirely
volitional,
since
it
is
impossible
to
participate in the economic life of contemporary society without
maintaining a bank account.”
dissenting)
(internal
425 U.S. at 451 (Brennan, J.,
quotation
marks
and
citation
omitted).
And dissenting in Smith, Justice Marshall warned that “unless a
person is prepared to forgo use of what for many has become a
personal
or
professional
necessity,”
i.e.,
a
telephone,
cannot help but accept the risk of surveillance.”
750 (Marshall, J., dissenting).
“he
442 U.S. at
It was, in Justice Marshall’s
view, “idle to speak of ‘assuming’ risks in contexts where, as a
practical
Id.
matter,
individuals
have
no
realistic
alternative.”
The Supreme Court has thus twice rejected the majority’s
“ubiquitous”
and
“essential”
theory.
otherwise, these holdings bind us.
123
Until
the
Court
says
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 124 of 134
Second, the majority relies on cases that afford Fourth
Amendment protection to the content of communications to suggest
that CSLI warrants the same protection.
See Ex parte Jackson,
96 U.S. 727, 733 (1877) (content of letters and packages); Katz
v. United States, 389 U.S. 347, 353 (1967) (content of telephone
calls); United States v. Warshak, 631 F.3d 266, 287 (6th Cir.
2010)
(content
of
emails).
What
the
majority
fails
to
acknowledge is that for each medium of communication these cases
address,
there
Amendment
is
also
protection
a
case
from
expressly
non-content
withholding
Fourth
information,
i.e.,
information involving addresses and routing.
See Jackson, 96
U.S. at 733 (no warrant needed to examine the outside of letters
and
packages);
Smith,
442
U.S.
at
743-44
(no
reasonable
expectation of privacy in phone numbers dialed); Forrester, 512
F.3d at 510 (no reasonable expectation of privacy in the to/from
addresses
of
emails);
accord
Jones,
132
S.
Ct.
at
957
(Sotomayor, J., concurring) (noting the Fourth Amendment does
not
currently
protect
“phone
numbers”
disclosed
to
phone
companies and “e-mail addresses” disclosed to Internet service
providers).
The
between
Supreme
the
information
Court
contents
that
has
of
enables
thus
forged
communications
communications
124
a
and
clear
distinction
the
non-content
providers
to
transmit
Appeal: 12-4659
Doc: 169
the content. 8
Filed: 08/05/2015
Pg: 125 of 134
CSLI, which reveals the equipment used to route
calls and texts, undeniably belongs in the non-content category.
My
colleagues
apparently
disagree
with
this
conclusion.
They posit that CSLI is “of course more than simple routing
information” because “it tracks a cell phone user’s location
across specific points in time.”
But all routing information
“tracks” some form of activity when aggregated over time.
The
postmark on letters “tracks” where a person has deposited his
correspondence in the mail; a pen register “tracks” every call a
person makes and allows the government to know precisely when he
is at home; credit card records “track” a consumer’s purchases,
including the location of the stores where he made them.
Of
course, CSLI is not identical to any of these other forms of
routing information, just as cell phones are not identical to
other modes of communication.
that
CSLI,
which
contains
no
But it blinks at reality to hold
content,
somehow
constitutes
a
communication of content for Fourth Amendment purposes.
8
In addition to being firmly grounded in the case law, the
content/non-content distinction makes good doctrinal sense. The
intended recipient of the content of communication is not the
third party who transmits it, but the person called, written,
emailed, or sent texts. The routing and addressing information,
by contrast, is intended for the third parties who facilitate
such transmissions.
125
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 126 of 134
That the majority attempts to blur this clear distinction 9
further
illustrates
the
extent
to
which
its
holding
is
a
constitutional outlier -- untenable in the abstract and bizarre
in practice.
Case in point:
As I understand the majority’s
view, the government could legally obtain, without a warrant,
all data in the Sprint/Nextel records admitted into evidence
here, except the CSLI.
If that is so, then the line in this
case between a Fourth Amendment “search” and “not a search” is
the
literal
Sprint/Nextel
the eighth.
line
that,
spreadsheets,
moving
left
separates
to
the
right
across
the
seventh
column
from
See J.A 2656; see also J.A. 1977-79.
The records
to the left of that line list the source of a call, the number
dialed, the date and time of the call, and the call’s duration -
9
I note that my concurring colleague’s concern about a
general “erosion of privacy” with respect to cell phones rests
on a similar misapprehension of this distinction. My friend
worries about protecting the large quantity of information
“stored on the phone and on remote servers.”
And if all that
information were indeed at risk of disclosure, I would share her
concern.
But the Supreme Court has already made clear that
police must “get a warrant” to search a cell phone for content
stored on the phone -- even for a call log listing the phone
numbers a suspect has dialed.
Riley v. California, 134 S. Ct.
2473, 2492, 2495 (2014).
Moreover, the Riley Court suggested
this rule would also apply to content stored on remote servers,
i.e., the “cloud,” given that “the same type of data may be
stored locally on the device for one user and in the cloud for
another.”
Id. at 2491.
These are clear limiting principles.
Holding, as I would, that the government may acquire, without a
warrant, non-content routing information (including historical
CSLI) would not send us down any slippery slope.
126
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 127 of 134
- all of which the government can acquire without triggering
Fourth Amendment protection.
The records to the right of that
line list the cell phone towers used at the start and end of
each call -- information the majority now holds is protected by
the
Fourth
Amendment.
Constitutional
distinctions
should
be
made of sturdier stuff.
III.
Technology
has
enabled
cell
phone
companies,
like
Sprint/Nextel, to collect a vast amount of information about
their customers.
seven
months’
30,000
calls
The quantity of data at issue in this case --
worth
and
of
texts
cell
for
phone
each
records,
defendant
spanning
--
nearly
unquestionably
implicates weighty privacy interests.
At
bottom,
information
distinction
the
I
suspect
government
between
CSLI
motivates today’s decision.
majority’s
suggestion
that
discomfort
obtained
and
with
here,
other
the
amount
of
rather
than
any
third-party
records,
That would certainly explain the
the
government
can
acquire
some
amount of CSLI “before its inspection rises to the level of a
Fourth Amendment search.” 10
But this concession is in fatal
10
It is unclear from my concurring colleague’s opinion,
which simply asserts that “cell site location information . . .
cannot be obtained without a warrant,” whether she agrees that
the government can acquire a small quantity of CSLI without
engaging in a Fourth Amendment “search.”
127
Appeal: 12-4659
Doc: 169
tension
with
Filed: 08/05/2015
the
majority’s
Pg: 128 of 134
rationale
for
finding
a
Fourth
Amendment violation here. 11
After all, the majority maintains
that
has
every
piece
of
CSLI
the
potential
to
“place
an
individual . . . at the person’s home,” that no piece of CSLI is
voluntarily conveyed, and that the government can never know
before it acquires CSLI whether the information “will detail the
cell phone user’s movements in private spaces.”
If all of this
is true (and I doubt it is) 12, then why does a cell phone user
have
a
reasonable
expectation
of
privacy
in
only
large
quantities of CSLI?
The majority’s answer appears to rest on a misunderstanding
of
the
analysis
embraced
in
the
two
concurring
opinions
in
11
The lack of a bright line between permissible and
impermissible amounts of CSLI also stands at odds with the
Supreme Court’s “general preference to provide clear guidance to
law
enforcement
through
categorical
rules.”
Riley
v.
California, 134 S. Ct. 2473, 2491 (2014). I do not envy the law
enforcement officers and district courts in this circuit who now
must attempt to divine this line.
12
Contrary to the majority’s suggestion, and unlike the
information in Karo and Jones, CSLI does not enable the
government to “place an individual” at home or at other private
locations. Each of the cell sites at issue here covers an area
with a radius of up to two miles, and each data point of CSLI
corresponds to a roughly 120-degree sector of a cell site’s
coverage area.
That translates to an area of more than four
square miles in which it would be possible to “locate” a cell
phone user.
Although I do not think the applicability of the
Fourth Amendment hinges on the precision of CSLI, it is
premature to equate CSLI with the far more accurate forms of
surveillance the majority cites.
128
Appeal: 12-4659
Jones.
Doc: 169
Filed: 08/05/2015
Pg: 129 of 134
There, the concurring justices recognized a line between
“short-term
monitoring
of
a
person’s
movements
on
public
streets,” which would not infringe a reasonable expectation of
privacy, and “longer term GPS monitoring,” which would.
Jones,
132 S. Ct. at 964 (Alito, J., concurring in the judgment); see
also id. at 955 (Sotomayor, J., concurring).
But Jones involved
government surveillance of an individual, not an individual’s
voluntary
disclosure
determining
when
of
information
government
to
a
third
surveillance
party.
infringes
And
on
an
individual’s reasonable expectation of privacy requires a very
different analysis.
In considering the legality of the government surveillance
at issue in Jones, Justice Alito looked to what a hypothetical
law
enforcement
officer
or
third
party,
engaged
in
visual
surveillance, could reasonably have learned about the defendant.
He concluded that four weeks of GPS monitoring constituted a
Fourth
Amendment
“search”
because
“society’s
expectation”
had
always been “that law enforcement agents and others would not -and indeed, in the main, simply could not -- secretly monitor
and
catalogue”
long.
Id.
at
an
964
(emphasis added).
disclosed
his
individual’s
(Alito,
movements
J.,
in
concurring
public
in
the
for
very
judgment)
In other words, when a defendant has not
location
to
any
particular
third
party,
the
government may nonetheless surveil him, without a warrant, for
129
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 130 of 134
as long as a hypothetical third party could reasonably “monitor
and catalogue” his movements in person.
When, however, an individual has voluntarily conveyed his
location to an actual third party, as Defendants did here, a
court need not resort to hypotheticals to determine whether he
justifiably expected that information to remain private.
Here,
we know that Defendants had already disclosed all the CSLI at
issue to Sprint/Nextel before the government acquired the phone
company’s records.
And the very act of disclosure negated any
reasonable expectation of privacy, regardless of how frequently
that disclosure occurred.
facts,
applying
the
The majority ignores these critical
same
constitutional
requirements
for
location information acquired directly through GPS tracking by
the government to historic CSLI that has already been disclosed
to a third party.
I recognize the appeal -- if we were writing on a clean
slate -- in holding that individuals always have a reasonable
expectation
of
privacy
in
large
quantities
of
location
information, even if they have shared that information with a
phone company.
that option.
But the third-party doctrine does not afford us
Intrinsic to the doctrine is an assumption that
the quantity of information an individual shares with a third
party does not affect whether that individual has a reasonable
expectation of privacy.
Although third parties have access to
130
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 131 of 134
much more information now than they did when the Supreme Court
decided Smith, the Court was certainly then aware of the privacy
implications
of
the
third-party
doctrine.
Justice
Stewart
warned the Smith majority that “broadcast[ing] to the world a
list of the local or long distance numbers” a person has called
could
“reveal
life.”
the
most
intimate
details
of
[that]
person’s
Smith, 442 U.S. at 748 (Stewart, J., dissenting).
That
is, in essence, the very warning that persuades the majority
today.
But the Supreme Court was unmoved by the argument then,
and it is not our place to credit it now.
If individuals lack
any legitimate expectation of privacy in information they share
with a third party, then sharing more non-private information
with that third party cannot change the calculus.
Application of the third-party doctrine does not, however,
render
privacy
progress.
an
unavoidable
casualty
of
technological
After all, Congress and state legislatures are far
better positioned to respond to changes in technology than are
the courts.
See Jones, 132 S. Ct. at 964 (Alito, J., concurring
in the judgment) (“A legislative body is well situated to gauge
changing
public
attitudes,
to
draw
detailed
lines,
and
to
balance privacy and public safety in a comprehensive way.”); see
also
In
re
Application
(Fifth
Circuit),
724
F.3d
at
615
(explaining that that the proper “recourse” for those seeking
131
Appeal: 12-4659
Doc: 169
increased
privacy
Filed: 08/05/2015
is
often
Pg: 132 of 134
“in
the
market
or
the
political
process”). 13
The very statute at issue here, the Stored Communications
Act (SCA), demonstrates that Congress can -- and does -- make
these
judgments.
The
SCA
imposes
a
higher
burden
on
the
government for acquiring “the contents of a wire or electronic
communication” than for obtaining “a record . . . pertaining to
a subscriber . . . or customer” of an electronic communication
service.
18 U.S.C. §§ 2703(a), (c).
And the SCA is part of a
broader statute, the Electronic Communications Privacy Act of
1986 (ECPA), which was enacted in the wake of Smith.
L. No. 99-508, 100 Stat. 1848.
directly
to
Smith’s
holding
See Pub.
In the ECPA, Congress responded
by
requiring
the
government
to
obtain a court order before installing a pen register or “trap
13
The majority posits that it is our responsibility to
ensure that “a technological advance alone cannot constrict
Fourth Amendment protection for private matters that would
otherwise be hidden or inaccessible.”
But this is simply an
incorrect statement of Fourth Amendment law.
As the Supreme
Court explained in Kyllo, “[i]t would be foolish to contend that
the degree of privacy secured to citizens by the Fourth
Amendment has been entirely unaffected by the advance of
technology.” 533 U.S. at 33-34. The “technology enabling human
flight,” for example, “has exposed to public view . . .
uncovered portions of the house and its curtilage that once were
private.” Id. at 34. And yet the Court held in California v.
Ciraolo, 476 U.S. 207, 215 (1986), and again in Florida v.
Riley, 488 U.S. 445, 450 (1989), that police observations of the
curtilage from an aircraft do not implicate the Fourth
Amendment. See Kyllo, 533 U.S. at 34.
132
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
and trace” device.
Pg: 133 of 134
See 18 U.S.C. § 3121(a).
Although Congress
could undoubtedly do more, it has not been asleep at the switch.
Ultimately,
revisit
the
of
course,
third-party
the
Supreme
doctrine.
Court
may
Justice
decide
Sotomayor
to
has
suggested that the doctrine is “ill suited to the digital age,
in
which
themselves
mundane
people
to
reveal
third
tasks.”
concurring).
a
great
parties
Jones,
132
deal
of
information
in
the
course
S.
Ct.
at
957
of
about
carrying
out
(Sotomayor,
J.,
Indeed, although the Court formulated the third-
party doctrine as an articulation of the reasonable-expectationof-privacy inquiry, it increasingly feels like an exception. 14
per
se
rule
information
that
it
is
voluntarily
unreasonable
disclosed
to
to
expect
third
privacy
parties
A
in
seems
unmoored from current understandings of privacy.
The landscape would be different “if our Fourth Amendment
jurisprudence cease[d] to treat secrecy as a prerequisite for
privacy.”
Id.
But until the Supreme Court so holds, we are
14
Seizing on the word “exception,” my colleagues suggest
that I advocate “an expansion” of the third-party doctrine.
They misinterpret my statement as to what the third-party
doctrine has become for a statement as to what the doctrine
should be.
This mistake is puzzling given my colleagues’
reliance on Justice Sotomayor’s opinion in Jones.
It is clear
from her opinion, though not from the majority’s retelling, that
tailoring the Fourth Amendment to “the digital age” would, in
Justice
Sotomayor’s
view,
require
the
Supreme
Court
to
“reconsider” the third-party doctrine. See Jones, 132 S. Ct. at
957 (Sotomayor, J., concurring).
133
Appeal: 12-4659
Doc: 169
Filed: 08/05/2015
Pg: 134 of 134
bound by the contours of the third-party doctrine as articulated
by the Court.
See, e.g., Agostini v. Felton, 521 U.S. 203, 237
(1997) (reversing
the
correctly
then-governing
applied
Second
Circuit
law,
but
noting
that
explaining
it
that
had
“if
a
precedent of this Court has direct application in a case, yet
appears
to
rest
on
reasons
rejected
in
some
other
line
of
decisions, the Court of Appeals should follow the case which
directly
citation
controls”
(internal
omitted)).
quotation
Applying
marks,
the
alteration,
third-party
and
doctrine,
consistent with controlling precedent, I can only conclude that
the Fourth Amendment did not protect Sprint/Nextel’s records of
Defendants’ CSLI.
Accordingly, I would hold that the government
legally acquired those records through § 2703(d) orders.
* * *
Time may show that my colleagues have struck the proper
balance between technology and privacy.
But if the majority is
proven right, it will only be because the Supreme Court revises
its decades-old understanding of how the Fourth Amendment treats
information voluntarily disclosed to third parties.
majority
endeavors
to
beat
the
Respectfully, I dissent.
134
Supreme
Court
to
Today the
the
punch.
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?