Lost Hiker Rescued Alive by Emergency Cell Phone Record Analysis

Tuolumne County, CA – March 26, 2020 started out as a beautiful day in Tuolumne County California, filled with blue skies and an unusual tranquility due to the COVID-19 global pandemic.  Throughout the state residents struggled to find activities to occupy their time as California issued a “stay-at-home” order.  A day hike in the Red Hills Recreational Area at the foothills of the Stanislaus National Forest seemed to be a good idea for getting out while practicing social distancing, but the trip had unintended consequences for one female hiker.  Read More Below

 

T-Mobile Completes Merger with Sprint to Create the New T-Mobile

April 01, 2020 |

T-Mobile US, Inc. (NASDAQ: TMUS) announced today that it has officially completed its merger with Sprint Corporation to create the New T-Mobile, a supercharged Un-carrier that will deliver a transformative 5G network. The parent of the combined company is T-Mobile US, Inc., whose shares of common stock will continue to trade on the NASDAQ Global Select Market under the symbol “TMUS”. The combined company will operate under the name T-Mobile.

The New T-Mobile’s commitment to building the world’s best broad and deep nationwide 5G network, which will bring lightning-fast speeds to urban areas and underserved rural communities alike, is more critical than ever, as reliable connectivity has become so important to Americans. With 14 times more capacity in six years than standalone T-Mobile has today, the New T-Mobile network will be able to offer unmatched value to consumers, with better service at lower prices. The company will also continue to focus on its commitment to customers and being a force for good. The enhanced scale and financial strength of the combined company will drive a planned investment of $40 billion into its network, business and more over the next three years. Synergies achieved from the integration have the potential to unlock massive scale and unleash at least $43 billion in value for shareholders.

The company also announced that with close of the merger, it has successfully completed its long-planned Chief Executive Officer transition from John Legere to Mike Sievert ahead of schedule. Effective immediately, Sievert will assume the role of CEO of T-Mobile. Legere, who served as CEO of T-Mobile since 2012, built a culture around listening to employees, putting the customer first and shaking up the market with signature Un-carrier moves. During his tenure, Legere engineered a turnaround of the company as T-Mobile completely disrupted the wireless industry and became the fastest growing company in wireless, capturing 80% of the industry’s postpaid phone growth from 2013 to today. Legere will continue as a member of the Board of Directors for the remainder of his current term, through the Annual Meeting of Shareholders scheduled in June 2020.

“During this extraordinary time, it has become abundantly clear how vital a strong and reliable network is to the world we live in. The New T-Mobile’s commitment to delivering a transformative broad and deep nationwide 5G network is more important and more needed than ever and what we are building is mission-critical for consumers,” said Mike Sievert, president and CEO of T-Mobile. “With this powerful network, the New T-Mobile will deliver real choice and value to wireless and home broadband customers and double down on all the things customers have always loved about the Un-carrier. T-Mobile has been changing wireless for good — and now we are going to do it on a whole new level!”

Sievert continued, “All of us at T-Mobile owe John an incredible thank you for everything he’s done to get this company to where we are today. He has changed what it means to be a CEO. Everything that T-Mobile has accomplished is the result of his vision for what a different kind of wireless provider could be. John IS what the Un-carrier is all about: advocating for customers at every turn, forcing us to think differently and always driving for more. He has always pushed the boundaries of what’s possible and pushed us to do the same. His leadership has made us what we are today, and we will take that into the future. Thank you, John, for everything you’ve done for wireless consumers and for our beloved employees! I also want to thank Marcelo Claure and the entire Sprint leadership team for their hard work to get us to this huge day! We did it!… and I’m looking forward to welcoming Sprint employees into Team Magenta, and to working with you now as a member of our Board of Directors.”

“The Un-carrier movement started with T-Mobile saying we were going to shake up wireless — and we did! We eliminated annual service contracts, overages and roaming fees, improved customer service and introduced more value. But there’s more. In the best and worst of times, T-Mobile has been here with a dependable network and giving customers best-in-class customer service they can depend on. Today, when those connections are needed more than ever, we are reinforcing everything we’ve stood for as the supercharged New T-Mobile!” said John Legere. “You know T-Mobile has been all about challenging the status quo … and Sprint has a track record of being a tenacious challenger and a dedicated customer advocate as well. So, with innovation, disruption and obsession for the customer experience as the foundation that the New T-Mobile is built on, just imagine what’s to come.”

Legere continued, “I’ve been fortunate enough to lead this company for the past seven years, but now it’s time for me to hand the reins over to Mike Sievert. The Board of Directors and I agree that it makes perfect sense for Mike to assume his leadership role on day one of the new company. He’s ready! I had originally planned to stay on through the end of my contract on April 30, 2020, but it makes much more sense to transition this responsibility to Mike today. Mike was the first person I hired at T-Mobile and I have tremendous faith in his ability to take the Un-carrier into its next SUPERCHARGED chapter. Between his leadership, his expanded and talented leadership team and the amazing people at T-Mobile, the future is SO bright! The Un-carrier that we created started with our employees. Each and every one of them. They are different. They play the game differently, and I love them all. I cannot wait to see what this entire team does next!”

THE WORLD’S MOST TRANSFORMATIVE NETWORK

  • Strong, dependable network connectivity has never been more critical to customers or to the country. Now the New T-Mobile will focus on creating a much-needed transformational nationwide 5G network, driving innovation in the U.S. and bringing wireless access to people throughout the country. This quantum leap forward can only be achieved by using T-Mobile and Sprint’s combined low-, mid- and high-spectrum bands — and only the New T-Mobile will have the resources to do it quickly.

    The network will have 14 times more capacity in the next six years than T-Mobile alone has today, enabling the New T-Mobile to leapfrog the competition in network capability and experience.

  • Customers will have access to average 5G speeds up to eight times faster than current LTE in just a few years and 15 times faster over the next six years.
  • Within six years, the New T-Mobile will provide 5G to 99% of the U.S. population and average 5G speeds in excess of 100 Mbps to 90% of the U.S. population.
  • New T-Mobile’s business plan is built on covering 90% of rural Americans with average 5G speeds of 50 Mbps, up to two times faster than broadband on average.

 

“The network is at the core of everything we do as a business, and it’s critically important for keeping customers connected to each other, their communities and the world,” said Neville Ray, president of Technology at T-Mobile. “The supercharged 5G network that we’ll build as a combined company will be a huge step forward, transforming wireless, fueling innovation and delivering new experiences for customers all across the country that we can’t even imagine today.”

BETTER PRODUCTS AT LOWER PRICES

With 14 times more total capacity in the next six years than T-Mobile has today, customers won’t have to choose between great service or low prices — they’ll get both. The New T-Mobile will offer free access to 5G and the best rate plans at low prices, now and in the future, so all customers can reap the benefits of a supercharged Un-Carrier network at a great value. And the New T-Mobile has committed to delivering the same or better rate plans for three years, which includes access to 5G, including for prepaid and Lifeline customers.

Backed by that additional capacity, the New T-Mobile is also taking the fight beyond wireless. By offering an alternative to in-home broadband, the Un-carrier will provide much-needed competition in home internet to Big Cable, at a time when just under half of the country’s households have only one or zero options for high-speed broadband. The New T-Mobile’s wireless in-home broadband service will overcome the obstacles to extending traditional wireline access by blanketing high-capacity coverage over previously difficult to serve areas. Its network will deliver 100+ Mbps speeds for wireless broadband to 90% of the population and offer in-home service to millions of the country’s households in the next six years.

A BRAND THAT CUSTOMERS LOVE

New T-Mobile will capitalize on the winning formula it built and double down on what customers love about the brand. It will also continue to be a force for good, pledging not only to be a bigger company but also a better company.  New T-Mobile customers should expect everything the Un-carrier has ALWAYS stood for: treating customers right, shaking up the status quo and being a force for good. The company will use its network to lift up communities nationwide and bring the benefits of 5G to as many Americans as possible, and it will continue supporting the programs and causes that matter most to employees and the communities they serve.

It began with the T-Mobile Connect plan. To address America’s urgent needs around COVID-19, T-Mobile fast-tracked its groundbreaking, lowest-priced plan EVER, launched on March 23. Other initiatives to bring the New T-Mobile’s newly expanded network capabilities to the customers and communities that can benefit most will launch soon, including the Connecting Heroes Initiative to offer FREE unlimited talk, text and smartphone data to ALL first responders at ALL public and nonprofit state and local fire, police and EMS agencies; and Project 10Million, delivering free internet access and hardware to 10 million households over the next five years.

New T-Mobile customers will also receive industry-leading customer care, and all post-paid customers will have access to T-Mobile’s award-winning Team of Experts (TEX) model as it expands into every current and planned customer experience center.

MASSIVE VALUE-CREATION OPPORTUNITY

The combined assets of T-Mobile and Sprint are so complementary that the merger is expected to unlock at least $43 billion in synergies for all shareholders. The vast majority of synergies in this deal come from combining networks, such as reducing redundant cell sites and rapidly deploying spectrum and other technologies more efficiently. The company plans to deliver a seamless, high-quality integration, just as it did with its MetroPCS merger, which was completed a year earlier than planned. These synergies and our combined scale are expected to put New T-Mobile in an enhanced financial position, including significant free-cash flow, margin expansion and strong, flexible capital structure.

Under the terms of the transaction, Sprint shareholders will receive a fixed exchange ratio of 0.10256 T-Mobile shares for each Sprint share, or the equivalent of approximately 9.75 Sprint shares for each T-Mobile share. As previously announced, per a separate arrangement, SoftBank Group Corp. surrendered approximately 48.8 million T-Mobile shares acquired in the merger to New T-Mobile immediately following the closing of the transaction, making SoftBank’s effective ratio 11.31 Sprint shares per T-Mobile share.

Effective at the beginning of today’s trading session, T-Mobile will trade on the NASDAQ on a combined basis under the ticker symbol “TMUS.” The Sprint shares will no longer trade on the New York Stock Exchange.

PJT Partners and Goldman Sachs acted as financial advisors to T-Mobile. Wachtell, Lipton, Rosen & Katz provided legal counsel to T-Mobile and Deutsche Telekom. Evercore acted as financial advisor to the committee of independent directors of T-Mobile and Latham & Watkins provided legal counsel to the committee of independent directors. Morgan Stanley served as a financial advisor to Deutsche Telekom.

The Raine Group LLC acted as lead financial advisor to Sprint. J.P. Morgan also acted as a financial advisor to Sprint. Morrison & Foerster LLP provided legal counsel to Sprint and SoftBank.

About T-Mobile

T-Mobile U.S. Inc. (NASDAQ: TMUS) is America’s supercharged Un-carrier, delivering an advanced 4G LTE and transformative nationwide 5G network that will offer reliable connectivity for all. T-Mobile’s customers benefit from its unmatched combination of value and quality, unwavering obsession with offering them the best possible service experience and undisputable drive for disruption that creates competition and innovation in wireless and beyond. Based in Bellevue, Wash., T-Mobile provides services through its subsidiaries and operates its flagship brands, T-Mobile, Metro by T-Mobile and Sprint. For more information please visit: http://www.t-mobile.com.

Read the original news release on T-Mobiles Newsroom HERE.

State of Wyoming Becomes 27th State to Sign into Law the Kelsey Smith Act

The State of Wyoming became the 27th state to sign into law the Kelsey Smith Act, an Act to help law enforcement obtain wireless carrier and service provider call location information records during emergency situations.  On March 13, 2020, Governor Mark Gordon signed Bill HB0126.  This is another great milestone for the Kelsey Smith Foundation, a non-profit dedicated to honor and perpetuate the life of Kelsey Smith…  Read more about their efforts and the story of Kelsey Smith HERE

Do Google Geofence Warrants Violate the Fourth Amendment?

By Nathaniel Sobel | February 24, 2020

Last year, a New York Times feature detailed law enforcement’s use of a new investigative technique called a geofence warrant. Unlike traditional warrants that identify a particular suspect in advance of a search, geofence warrants essentially allow the government to work backward. These warrants compel a technology company (so far, only Google) to disclose anonymized location records for any devices in a certain area during a specified time period. After that, for certain accounts, the government may obtain additional location data and subscriber information. Particularly in light of the Supreme Court’s watershed decision in Carpenter, geofence warrants present a host of novel Fourth Amendment issues.

A criminal defendant accused of armed bank robbery is currently mounting the first known federal Fourth Amendment challenge against a geofence warrant in a federal district court in Richmond, Virginia. This post unpacks briefings from the defense, the government and Google (through an amicus brief) on the motion to suppress in that case, U.S. v. Chatrie. The stakes of the litigation are high. As Google reported in its brief, “Year over year, Google has observed a 1,500% increase in the number of geofence requests it received in 2018 compared to 2017; and [as of December 2019], the rate [] increased from over 500% from 2018 to 2019.”

The Virginia Geofence Warrant

Around 5 p.m. on May 20, 2019, a man with a gun robbed a bank near Richmond, Virginia, escaping with $195,000. Surveillance footage showed that the perpetrator held a cell phone to his ear before he entered the bank. About a month after the robbery, state law enforcement officials obtained a geofence warrant from a state magistrate judge. The warrant authorized a three-step process in which law enforcement could, without seeking further judicial approval, compel Google to produce increasingly detailed data on certain suspects.

In the first step, the government requested that Google provide it with anonymized location records for any “Google account that is associated with a device” that was within 150 meters of the bank during a one-hour window that included the time of the robbery as well as 30 minutes before and 30 minutes after it occurred. As Google noted in its brief, this required Google to search across every existing Google account and then run a computation to determine which records matched the time and space parameters in the warrant. When there is “a strong GPS signal available,” Google explained, “a device’s location can be estimated within approximately twenty meters.”

About two weeks after the warrant was approved, Google disclosed to the government the anonymized location records of 19 accounts that had been within 150 meters of the bank during the specified time interval. According to the government, one account stood out: The location data placed that account inside the bank at the time of the robbery and allegedly corroborated a witness’s observation of a suspect’s whereabouts before the crime and surveillance footage of the robber’s flight from the bank.

At the second step, the government requested another round of anonymized location data for nine of the 19 accounts. This time, the government sought data from 30 minutes before and 30 minutes after the original hour-long interval provided in the first step. The government alleges that the account it had identified as suspicious at step one traveled to a residence after the robbery. Using the address of the residence, the government was able to obtain records that linked an individual’s name to that residence. The government also used that name to search other databases for more information on the suspect.

Finally, at the third step, law enforcement requested that Google reveal the subscriber information for the account discussed above and two additional accounts. After Google produced the data for the account focused on at steps one and two, the government discovered that the name linked to the residence was consistent with the email address and user name on the Google account. The presumed holder of the account was ultimately indicted by a federal grand jury on Sept. 17, 2019, and has pleaded not guilty.

Was There a Fourth Amendment Search?

The parties dispute whether the data obtained from Google constituted a Fourth Amendment search. In other words, while the government contended that it could have obtained the Google data without having sought a warrant, defense counsel argued that the government’s actions implicated Fourth Amendment protections.

For both parties, this analysis turned on the question of how to apply Carpenter. In Carpenter, the Supreme Court ruled that access to at least seven days of a person’s cell-site records (the information collected as a cell phone identifies its location to nearby cell towers) was a Fourth Amendment search because it violated a person’s “legitimate expectation of privacy in the record of his physical movements.” Crucially, the Carpenter court found that the third-party doctrine, under which individuals forfeit their reasonable expectation of privacy when they disclose information to a third party, did not apply to cell phone records. As Chief Justice John Roberts wrote for the majority,

There is a world of difference between the limited types of personal information addressed in [cases involving phone numbers dialed on a landline and bank deposit slips] and the exhaustive chronicle of location information casually collected by wireless carriers today. The Government thus is not asking for a straightforward application of the third-party doctrine, but instead a significant extension of it to a distinct category of information.

The defendant presented two principal arguments for why the third-party doctrine could not defeat his expectation of privacy in the location data that the government obtained from Google. First, counsel contended that, like the cell phone location records in Carpenter, “Google location records are qualitatively different from the business records to which the third-party doctrine traditionally applies.” Second, counsel argued that, unlike the cases where the Court applied the third-party doctrine, the defendant did not voluntarily share his location data with Google. Relying on the Carpenter court’s reasoning that cell phone location data was not voluntarily shared because carrying a cell phone is “indispensable to participation in modern society,” counsel argued that “it is not reasonable to expect ordinary phone users to avoid Google software.”

The government responded with the position that “the defendant had no reasonable expectation of privacy in any of the information disclosed by Google pursuant to the [geofence] warrant.” The government first argued that the Google data was less revealing than the cell-site information at issue in Carpenter. Emphasizing the fact that the two hours of location data obtained through the geofence warrant obtained covered “only 1/84th of the period that Carpenter held constituted a search,” the government asserted that the Google data did not “provide the sort of ‘all-encompassing record of the holder’s whereabouts’ and ‘intimate window into a person’s life’ that concerned the Court [in Carpenter].” Additionally, the government argued that even if the Google data is more precise than cell-site records, such a distinction was immaterial as the Carpenter court “grounded [its] holding in an assumption that cell-site information would approach the precision of GPS.” And the government contested the defendant’s characterization of the Google data as being involuntarily conveyed, noting that Google requires users to opt in to allow the company to obtain location information.

The defense also put forward another argument based on Carpenter. Relying on Justice Neil Gorsuch’s solo dissent in the case, defense counsel added a property-based theory, under which Fourth Amendment search occurs when the government intrudes on an individual’s property. Counsel argued that the location data was the defendant’s property: Pointing to Google’s privacy policy, which limited Google’s use of location data, counsel claimed that the defendant “retain[ed] the right to exclude others from his location data, a quintessential feature of property ownership.” Counsel maintained that since the defendant held a property right to his Google data, the government’s access of that data constituted a trespass and therefore triggered Fourth Amendment protection. The government declined to address the merits of this argument, noting that “a solo dissent is not the law.”

Did the Geofence Warrant Violate the Fourth Amendment?

The parties next disputed whether geofence warrants can be squared with the Fourth Amendment. It is well recognized that the Constitution forbids general warrants. The text of the Fourth Amendment makes clear that warrants must be based on probable cause and must state with specificity the property to be seized. Defense counsel argued both that all geofence warrants fail to satisfy the Fourth Amendment—and, in the alternative, that the specific warrant at issue in this case was invalid.

Defense counsel opened by asserting that geofence warrants are the “modern-day incarnation of the historically reviled general warrant.” Noting that the geofence warrant requires a sweeping search of Google accounts that do not even have an alleged connection to the crime, counsel described the warrants as “the digital equivalent of searching every home in the neighborhood of a reported burglary, or searching the bags of every person walking along Broadway because of a theft in Times Square.” Counsel also contended that geofence warrants categorically violate the Fourth Amendment’s probable cause and particularity requirements since, by their very design, they fail to identify a “single individual suspected of a criminal offense.”

Addressing the warrant at issue, counsel argued that the police had failed to show that they had probable cause to believe that the bank was robbed by a Google user. Counsel wrote that “[w]hile the warrant application does state that the robber could be seen using a cell phone, there is no evidence to show that it was an Android phone or that he or she used a Google service within the initial one-hour window identified in the warrant.” To drive home that point, counsel explained that “[i]f the robber had an iPhone and did not use Google services between 4:20 and 5:20 p.m., then Google would not have a record of the phone’s location during that time.”

Counsel also challenged the warrant on particularity grounds. Noting that the warrant did not specify which Google accounts to search, counsel argued that even the 150-meter radius was not sufficiently particular. Of special concern to defense counsel was the fact that the geofence included a large church adjacent to the bank that had no nexus with the crime, implicating potential First Amendment issues. And counsel drew attention to the fact that, at steps two and three, the magistrate judge had no oversight over which people were chosen for further search and that the warrant ultimately permitted investigators to track devices “anywhere outside the [initial 150 meter] geofence.”

The government argued not only that geofence warrants are consistent with the Constitution but also that they “should be encouraged, not condemned.” On probable cause, the government contended that the requirement had been met by the following factual stipulations state police had made in the warrant application: The robber was seen with a cell phone, data shows that a majority of cell phones are smartphones, and all Android smartphones and some non-Android smartphones collect Google location data when the account owner enables Google to do so. So “there was a substantial basis for the magistrate to find probable cause to believe that Google possessed evidence related to the robbery.” The government additionally argued that the warrant was supported by probable cause since there was sufficient reason to believe that the Google data would provide “information for evidentiary purposes other than identifying the robber directly,” such as “identify[ing] potential witnesses” and “assist[ing] investigators in forming a fuller geospatial understanding and timeline” of the robbery.

To show that the warrant was sufficiently particular, the government relied primarily on two cases upholding recent digital law enforcement investigations. The government first pointed to a recent federal district court decision that rejected a particularity challenge to a tower dump warrant that allowed the government to identify cell phone users within geographic and temporal constraints related to a series of robberies. In the government’s view, that case showed that warrants that allowed law enforcement to identify the locations of “hundreds if not thousands” of devices in a certain area and during a certain time frame were sufficiently particular. The government also relied on lower courts’ unanimous agreement that the Network Investigative Technique (NIT) search warrant used in the Playpen child pornography investigation—which Lawfare has covered extensively—satisfied the Fourth Amendment. That warrant authorized the FBI to search the computers of everyone who logged onto a child pornography site for 30 days while, as the government explained, “allow[ing] the FBI to choose to obtain less than the maximum amount of information the warrant authorized.” Along similar lines, the government argued that, with respect to the geofence warrant, “the fact that investigators here could have and did narrow the information obtained from Google is immaterial, as the GeoFence warrant was based on probable cause and appropriately authorized seizure of location and identity information of anyone at the site of the robbery.”

Lastly, the government argued that “even if there were a particularity problem in the three-step process for the GeoFence warrant, the appropriate remedy would at most be to sever the second step of the warrant and to suppress second-step information.” Since the government claimed that “first-step information alone was sufficient for the investigators to recognize that the [defendant’s] account likely belonged to the robber,” such a remedy could have only limited consequences on the government’s investigation in this case.

The Google Amicus Brief

After the parties had briefed the motion to suppress, Google submitted an amicus brief in support of neither party “to provide contextual information to the Court about the data at issue.” The Google brief addressed certain claims made by both parties about the location data and argued that it was necessary for the government to obtain a warrant under both the Stored Communications Act (SCA) and the Fourth Amendment.

The brief first supplemented claims made by both the defense and the government about the nature of the Google data. Google argued that the data it provided to law enforcement clearly fell outside the category of business records typically covered by the third-party doctrine. In language favorable to the defense, it described the data as “essentially a history or journal that Google users can choose to create, edit, and store to record their movements and travels.” Without directly confronting the government’s arguments, Google accordingly suggested that, given the nature of the Google data, the government’s analogies of the geofence warrant to cell-site location information and tower dumps were off target.

However, directly rebutting defense counsel, Google stressed that users had to opt in to take advantage of the “Location History” services. Google wrote bluntly: “[The] Defendant thus errs in asserting that ‘[i]ndividuals do not voluntarily share their location information with Google,’ … and that acquisition of user location records by Google is ‘automatic and inescapable.’” In subsequent briefing, defense counsel has argued that, in practice, users do not opt in to Google’s location tracking in a meaningful way.

Next, while neither party addressed the legal process required under the SCA, Google discussed the statute at some length, suggesting that “the Court’s resolution of the important questions presented here should reflect the entire legal landscape.” In short, Google concluded that its data “is subject to the SCA’s warrant requirement because that information qualifies as [quoting the statute] ‘contents’ of ‘electronic communications.’”

Finally, and most significantly, Google argued that “[u]nder the traditional Katz analysis, Google’s users have a reasonable expectation of privacy in their [‘Location History’] information.” In the context of the Carpenter court’s holding, Google discussed the extent of information that “Location History” data reveals. Google even asserted that “[t]he privacy interests implicated by Google [‘Location History’] information are thus even greater than in Carpenter.”

Google then discussed why the third-party doctrine did not defeat the defendant’s reasonable expectation of privacy. In addition to emphasizing the deeply revealing nature of the data, Google argued that “as in Carpenter, the fact that users voluntarily choose to save and share [‘Location History’] information with Google does not on its own implicate the third-party doctrine to the extent that doctrine is still viable.” Drawing a comparison with the way the Carpenter court discussed cell phones as “indispensable” to modern life, Google suggested that “[f]or many users, the same is true of the location-based services [cell phones provide].” These benefits, Google noted, “includ[e]the ability to track one’s own movements and enrich one’s electronic footprint with that information.” Additionally, Google pressed that the third-party doctrine, which is aimed at business records, ought not to apply to its location data because the Google data “is created and stored at the discretion of the user for the user’s own purposes and remains in the user’s control.”

Google declined to address whether the Virginia warrant satisfied the requirements of probable cause and particularity.

***

The ultimate resolution of the Fourth Amendment questions in this litigation are enormously consequential for at least two reasons. First, given the rising prevalence of geofence warrants, the extent of their constitutional regulation could have major implications for future law enforcement investigations. And second, as courts are beginning to grapple with the challenge of applying Carpenter in contexts outside of a warrant for a single person’s cell phone location data, this case will serve as a crucial data point informing the scope of Fourth Amendment protections in the digital era.

The parties are currently litigating a range of pretrial motions. As of Feb. 24, no date has been set for a hearing on the motion to suppress.

Read the original article from Lawfare HERE.

See the original Amicus Brief of Curiae HERE.

Texas Court Says State’s Constitution Protects Cell Site Location Info

Tim Cushing | March 18, 2020 |

The Texas Criminal Court of Appeals has looked at the Supreme Court’s Carpenter decision and decided it applies to cell site location info, even when that information was obtained by law enforcement years before the Supreme Court came to this conclusion. (via Courthouse News)

The location records obtained from AT&T without a warrant destroyed the accused murderer’s alibi. From the decision [PDF]:

Christopher James Holder, Appellant, was charged with capital murder. During the course of the investigation, police accessed 23 days of his CSLI to corroborate his alibi that he was out of town when the victim was killed. But Appellant lied. The records showed that he was near the victim’s house at the time of the murder.

 

Holder filed motions to suppress the CSLI, arguing the records were obtained without reaching the required “specific and articulable” suspicion standard set by the Stored Communications Act. He also argued it violated the Texas Constitution’s version of the Fourth Amendment, which reads:

The people shall be secure in their persons, houses, papers and possessions, from all unreasonable seizures or searches, and no warrant to search any place, or to seize any person or thing, shall issue without describing them as near as may be, nor without probable cause, supported by oath or affirmation.

 

Here’s where the investigator went wrong. There’s a defining line between “reasonable suspicion” and “probable cause.” The officer who approached AT&T apparently felt the terms were interchangeable and he could use whichever of those to obtain CSLI records.

The morning of November 12, police obtained a court order directing AT&T Wireless (AT&T) to disclose call log and CSLI records showing the location of Appellant’s cell phone between October 20 and November 12, but an AT&T representative declined to produce them because, according to them, the court order had to be based on probable cause. After changing the phrase “reasonable suspicion” to “probable cause,” the petitioning officer took the new order to a judge, who signed it. According to the officer, “[i]t was simpler for [him] to just change the wording[,] have it re-signed[,] and bother the judge one more time . . . .”


The footnote attached to this paragraph notes the State admitted during oral arguments the request did not have “sufficient facts to establish probable cause.” Cutting corners isn’t acceptable when rights are on the line, no matter how heinous the crime.

The court says suppression is not the appropriate remedy for “non-Constitutional” violations of the Stored Communications Act. But it is likely the appropriate remedy when the Texas Constitution and the Supreme Court’s Carpenter decision are taken into consideration. The court undoes its own precedent to align the Texas Constitution with the US Constitution.

The question we must answer now is whether the Supreme Court’s analysis in Carpenter is persuasive, or whether we should take the position that Texas citizens have less privacy rights under the Texas Constitution than the United States Constitution based on a Supreme Court doctrine that even it has declined to apply to CSLI. We think that it makes more sense to adopt the Supreme Court’s reasoning in Carpenter and to no longer apply the third-party doctrine to CSLI records under Article I, Section 9.


Just because this court hasn’t examined a case directly on point with the Carpenter decision doesn’t mean Texans should have fewer rights just because they live in Texas.

The Supreme Court exhaustively analyzed the privacy issues implicated by CSLI, which we did not do in our original Hankston opinion, and we share the Court’s grave concerns about the Government’s ability to use a continuous, surreptitious, precise, and permeating form of surveillance to continually track its citizens’ every move retrospectively for up to five years. The same privacy concerns are implicated regardless of whether CSLI is accessed under the Fourth Amendment or Article I, Section 9. Further, we have reviewed the constitutional debates in Texas, which we did not previously do, and they show no intention on the part of our framers for Texas citizens to have less protection from unreasonable searches and seizure under the Texas Constitution than the United States Constitution.


Under the Texas Constitution, the search was unreasonable.

Generally, an Article I, Section 9 search is unreasonable absent probable cause, exigent circumstances, or some other recognized law-enforcement need. Here, because the State was acting in its traditional crime-fighting role, and it did not allege exigent circumstances or some other recognized law-enforcement need, the search had to be supported by probable cause to be reasonable. However, the State concedes that the petition does not support a probable cause finding. We agree.


This doesn’t automatically lead to suppression of the CSLI records. But it does overturn two previous decisions by the lower courts. It heads back to the county’s court of appeals for the judge to decide whether the illegally-obtained records gave the prosecution an unearned edge. Whatever the court decides, the rule is in place: the third-party doctrine does not apply to historical CSLI. Get a warrant.

Read the original article from techdirt.com HERE.