Massachusetts’ Highest Court Upholds Cell Tower Dump Warrant

Fri. May 27, 2022 | By Jennifer Lynch & Emma Hagemann | EFF |

Massachusetts’ highest court has upheld the collection of mass cell tower data, despite recognizing that this data not only provides investigators with “highly personal and private” information but also has the potential to reveal “the locations, identities, and associations of tens of thousands of individuals.”

The case is Commonwealth v. Perry, and in it the Massachusetts Supreme Judicial Court (SJC) addressed the constitutionality of “tower dumps” of cell site location information (CSLI).

A “tower dump” occurs when a phone company provides law enforcement with data on all devices that connected with a specific cell tower during a specified period of time. Because each cell tower covers a particular geographic area, police can infer from the data that the device owners were in that area at the time. Tower dumps can identify hundreds or thousands of phones—or, in this case, “more than 50,000 individuals . . . without any one of them ever knowing that he or she was the target of police surveillance.”

In Perry, after a series of six store robberies and one homicide, law enforcement sought and obtained two tower dump warrants. Together, the warrants covered seven cell towers on seven different days over the course of a month. Officers cross-referenced the tens of thousands of phone numbers they obtained to identify devices that pinged multiple towers on the days the crimes occurred. Through this process, they were able to identify Mr. Perry as a suspect. Mr. Perry moved to suppress the evidence.

EFF, along with ACLU and the Massachusetts Committee for Public Counsel Services, filed an amicus brief in the case, arguing that a tower dump is a general search that violates the Fourth Amendment and Article 14, Massachusetts’ constitutional equivalent. Like the general warrants reviled by the Constitution’s drafters, tower dumps are irremediably overbroad because they sweep up the information of hundreds or thousands of people that have no connection to the crime under investigation. These searches lack probable cause because the police can’t show a reason to suspect the thousands of innocent people whose information is caught in the dragnet had any link to the crime. They also fail constitutional particularity requirements because the scope of the search is not appropriately limited. We further argued that, even if the court upheld tower dumps, it should impose strict minimization requirements as a safeguard against abuse; the government must demonstrate that the tower dump is necessary and must delete any device data unrelated to the crime as soon as possible.

Although the court declined to adopt a rule that cell tower dumps are always unconstitutional, it didn’t preclude such an argument in a future case. It recognized that these searches not only allow police to track individuals into private, constitutionally-protected areas and, by tracking call data, provide police “significant insight into the individual’s associations,” they also make it possible for police to piece together people’s patterns of behavior. Because the police requested tower dumps in multiple areas over the course of multiple days, the data not only could establish “where an individual was and with whom he or she associated on one occasion, but also where the individual had been and with whom the individual had associated on multiple different occasions.” If a warrant were not sufficiently limited in scope—if it allowed police to select any phone number at random from the 50,000 and determine the identity of that individual, their location, and with whom they had communicated—it would “undoubtedly violate” constitutional particularity requirements.

Nevertheless, the court here held the police had sufficiently limited the scope of the search. Police had reason to believe the crimes were connected and committed by the same people, and police explained in their affidavit supporting the warrant that they had requested multiple tower dumps to look for commonalities among the records—phone numbers that appeared in more than one location. Because one of the warrants also established probable cause to believe the suspect had used a phone in commission of the crime, the court upheld that warrant. The court suppressed the evidence from the other warrant, finding it failed to establish these same facts.

The court did mandate important limitations on these searches going forward. These include requiring a judge to issue the warrant and requiring the warrant to include protocols for the prompt and permanent disposal of any data that is not related to the crime under investigation. However, while these minimization requirements are important, overall, the result in Perry is disappointing. Requiring only that police state that they intend to “identify and/or verify commonalities” in the data on thousands of people is a low bar.

Perry could also have troubling implications for other dragnet search technologies like geofence warrants. The court asserted that the thousands of innocent individuals swept up in a tower dump are not subjected to a “search” in the constitutional sense because, although police collected their data, police didn’t take the further step of analyzing it. Like tower dumps, geofence warrants allow the government to search the location information of many innocent people to try to identify a suspect. Several courts have already recognized the mass privacy violations inherent in geofence data dumps, regardless of whether any police conduct any analysis on the collected data. These courts have ruled geofence warrants are unconstitutional for reasons similar to those we raised in our Perry amicus brief, and we hope that the Supreme Judicial Court would take a fresh look at these arguments if or when it rules on the constitutionality of geofence warrants.

We will continue to challenge cell tower dumps, geofence warrants, and other forms of location surveillance in other cases going forward.

Chatrie Pleads Guilty in Case Testing Use of Google Geofence Warrant

Tues. May 10, 2022 | By The Associated Press | ABC News |

A Richmond, VA. man has pleaded guilty to bank robbery charges in a case that tested the constitutionality of broad search warrants that use Google location history to find people who were near crime scenes

RICHMOND, Va. — A Richmond man has pleaded guilty to federal bank robbery charges in a closely watched case that tested the constitutionality of broad search warrants that use Google location history to find people who were near crime scenes.

The Richmond Times-Dispatch reports Okello Chatrie pleaded guilty Monday to armed robbery and use of a firearm in the 2019 robbery of the Call Federal Credit Union in Midlothian.

Chatrie’s lawyers argued the use of a “geofence warrant” to identify people who were near the scene of the robbery violated their constitutional protection against unreasonable searches. Federal prosecutors argued Chatrie had no reasonable expectation of privacy since he voluntarily opted in to Google’s Location History.

U.S. District Judge M. Hannah Lauck ruled in March that the warrant violated the Constitution by gathering the location history of people near the bank without having any evidence they had anything to do with the robbery. Geofence warrants seek location data on every person within a specific location over a certain period of time.

“The warrant simply did not include any facts to establish probable cause to collect such broad and intrusive data from each of these individuals,” Lauck wrote in her ruling.

Privacy advocates said the ruling — believed to be the first time a federal district court judge has ruled on the constitutionality of a geofence warrant — could make it more difficult for police to continue using a popular investigative technique that has helped lead them to suspects in a list of crimes around the country.

Lauck’s ruling did not help Chatrie because she denied his motion to suppress the evidence produced by the warrant, finding the detective had acted in good faith by consulting with prosecutors before applying for the warrant and relied on his past experience in obtaining three similar warrants.

The judge said she was not ruling on whether geofence warrants can ever satisfy the Fourth Amendment. She urged legislative action on the issue, noting there is currently no law prohibiting Google and other companies from collecting and using vast amounts of data from their customers.

In a legal brief filed in the case, Google said geofence requests jumped 1,500% from 2017 to 2018, and another 500% from 2018 to 2019. Google now reports that geofence warrants make up more than 25% of all the warrants Google receives in the U.S., the judge wrote in her ruling.

Chatrie’s lawyers did not immediately respond to an emailed request seeking comment on his guilty plea.

Lauck scheduled sentencing for Aug. 2. In a plea agreement, prosecutors have agreed they will not argue for a sentence above nearly 13 years in prison, while Chatrie’s lawyers have agreed to argue for no less than just under 11 years.

Sourced from ABC News and The Associated Press here.

AT&T’s New Tech Means Better Location Data, Routing for 911

Wed. May 11, 2022 | By Ben Miller | Gov Tech |

The technology will use GPS data from mobile devices to route calls to the nearest 911 dispatch center, making it more likely the call goes to the right place. And dispatchers won’t have to do anything to get it.

Soon, 911 dispatch centers nationwide will have better location data in hand for many mobile phone callers — at least, those using AT&T.

The telecommunications firm has begun rolling out new technology called location-based routing that will mean using data from mobile devices themselves to establish location. That means calls will be routed to the nearest public safety answering point (PSAP), and the dispatcher will be able to establish where the caller is within 50 feet of their mobile device.

Today, most of the time, a cellphone call is routed to a PSAP based on which cell tower the call is routed through. That might not actually be the closest dispatch center — especially in places close to county borders or outside big cities.

“You have a tower on a border location, and study this tower by tower, and analyze what percentage of the calls are going to what 911 centers or PSAPs, and whoever has the most calls, you route all the calls to that center,” said Kurt Mills, executive director of Snohomish County, Wash., 911.

Snohomish County, just north of Seattle, has frequently dealt with callers being routed to the wrong PSAP. But Snohomish County 911 became the first dispatch organization in the country to use the new technology and saw a decline in the need to transfer callers…

Click here to read the full article.

Silicon Valley rallies behind New York ban on geofence and keyword search warrants

Wed. May 11, 2022 | By Zack Whittaker | Tech Crunch |

Google, Microsoft and Yahoo back New York ban on controversial search warrants

A coalition of tech giants, including Google, Microsoft and Yahoo, have pledged support for a New York bill that would ban the use of controversial search warrants that can identify people based on their location data and internet search keywords.

In a brief statement, the coalition known as Reform Government Surveillance said it “supports the adoption of New York Assembly Bill A84A, the Reverse Location Search Prohibition Act, which would prohibit the use of reverse location and reverse keyword searches.”

The bill, if passed, would become the first state law to ban so-called geofence warrants and keyword search warrants, which rely on demanding tech companies turn over data about users who were near the scene of a crime or searched for particular keywords at a specific point in time. But the bill hasn’t moved since it was referred to a committee for discussion in January, the first major hurdle before it can be considered for a floor vote.

Reform Government Surveillance was set up in 2013 by several Silicon Valley tech companies to lobby lawmakers for reforms to U.S. surveillance laws following the leak of classified documents by NSA contractor Edward Snowden. The coalition is now at 11 members — Amazon, Apple, Dropbox, Evernote, Google, Meta, Microsoft, Snap, Twitter, Yahoo (which owns TechCrunch) and Zoom.

The move by the tech coalition to back the New York bill is not entirely altruistic. At least three of RGS’ members — Google, Microsoft and Yahoo — are frequently tapped by law enforcement for location data and search records of users because of the vast amount of data they store on billions of users around the world. Last year Google said that about one-quarter of all its U.S. legal demands are geofence warrants, a figure that’s growing exponentially each year…

Click here to read the full article.

Big Win for South Carolina Law Enforcement

Thurs. Apr 14, 2022 | By Justia US Law |

Prior to this case, South Carolina law enforcement (state peace officers) were struggling with the issue of obtaining Cell Site Location Information (CSLI) records from cell service providers where the compliance center was not in their state.  South Carolina law (Section 17-13-140), says, “…any court of record of the State having jurisdiction over the area where the property sought is located, may issue a search warrant…”.

The primary focus of the dispute before the trial court over the validity of this warrant was whether an Anderson County (SC) magistrate had the authority to issue the warrant to an out-of-state entity for records that are not physically located in South Carolina.

T-Mobile’s compliance center is located in New Jersey and not in South Carolina, and the Court assumed the data was stored in New Jersey.  The important fact is T-Mobile clearly does business in South Carolina, in particular, in Anderson County, as evidenced by the defendants CSLI records in this case. The Court found that T-Mobile, therefore, is subject to the jurisdiction of an Anderson County (SC) magistrate.

Justia Opinion Summary:

Justin Jamal Warner was convicted by jury of murder, attempted armed robbery, and possession of a weapon during the commission of a violent crime. The court of appeals affirmed. The South Carolina Supreme Court granted Warner’s petition for a writ of certiorari to address: (1) whether the trial court was correct to deny Warner’s motion to suppress cell-site location information (CSLI) seized from his cell phone service provider; and (2) whether an out-of-court viewing by Warner’s probation officer of a crime-scene video and the officer’s identification of Warner as the man in the video required a hearing under Neil v. Biggers, 409 U.S. 188 (1972). The Supreme Court found the trial court correctly ruled the identification made from the video did not require a Biggers hearing. As to the CSLI, the Court held the warrant the trial court found invalid because the warrant sought information stored in another state was not – at least for that reason – invalid. The Supreme Court affirmed the court of appeals as to the Biggers issue and remanded to the trial court for further proceedings as to Warner’s motion to suppress CSLI.

Link to the online version and a downloadable PDF