Connecticut Judge Says Cops Can't Get Real Time Cell Site Location Info Without A Warrant
from the which-apparently-law-enforcement-already-knew dept
It's a lower-level decision but it still means something. Well, a couple of somethings. First off, it appears Connecticut law enforcement probably shouldn't continue seeking "live" cell site location information without a warrant. It also appears the law enforcement agency involved doesn't have access to a cell site simulator (Stingray, etc.).
New Haven Superior Judge Jon Blue agreed to suppress evidence in an ATM robbery case, saying it was the result of Connecticut State Police improperly asking in advance to receive periodic live updates from the phone company of the location of the suspect’s cellphoneThis sort of collection is nothing new. Many law enforcement agencies act under the belief that location information is just another business record, subject to fewer restrictions and a lower level of privacy protections. Generally speaking, courts have found the acquisition of historical cell site location data without a warrant to have minimal impact on Fourth Amendment protections. Using this information as a tracking device, however, has generated plenty of friction in the judicial system, something that probably won't be resolved until the Supreme Court tackles it.
The Monday ruling comes in the case of Terrance Brown, 29, of Stratford, who was charged with robbing several automated bank teller machines in 2010.
T-Mobile was ordered to provide the location of Brown’s cellphone every 10 minutes during the time police were tracking him.
In this case, the presiding judge found that the omnipresence of cellphones wasn't supposed to be viewed by law enforcement as a bold new world of exploitable tracking devices.
“The convenience of cellphones is well known; it is increasingly rare to meet someone who doesn’t carry one on his or her person,” Blue wrote. “But with this convenience comes the possibility of an Orwellian state.”Currently, the state's laws only demand law enforcement offer "reasonable, articulable suspicion" in exchange for phone records, including location info. (This is the same standard the NSA is "held" to in its acquisition of phone records.) The ACLU would like to see that raised to "probable cause," but it's going to be an uphill battle against reams of legal precedent. Circuit splits on the issue of whether location data should be considered a business record complicate the matter, but for the most part, jurisprudence suggests location data -- especially historical location data -- may act as an ad hoc tracking device but still somehow lands outside of the Fourth Amendment's protections.
But using a phone as a GPS stand-in isn't quite the same thing, not when law enforcement is issuing subpoenas demanding periodic updates on futurelocation pings. Judge Blue notes the case's prosecutors admitted state law does not permit the warrantless tracking of individuals via their cellphone providers. Not that this admission means much when weighed against law enforcement's actual actions.
Using a 2005 "update" to a telecommunications record statute (referred to by some as Connecticut's Patriot Act), law enforcement could secure "ex-parte" orders to obtain phone records and communications. All that's required is reasonable suspicion. And use these orders law enforcement did -- more than 14,000 times since the law was enacted. An attempt to restore the warrant requirement died this summer in the state's legislature. Perhaps the judge's decision here will prompt legislators to take another run at restoring some Fourth Amendment protections to cell phone records.
However, the lack of a prosecutorial challenge suggests law enforcement knows the law doesn't specifically grant it the power to perform real-time tracking of individuals without warrants. Then again, knowing this didn't stop it from doing it, and the end result is the loss of its collected evidence, and most likely the case itself.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: 4th amendment, cell site location info, connecticut, csli, jon blue, location info, warrant
Reader Comments
Subscribe: RSS
View by: Time | Thread
"YES, EXACTLY" said the government with a big smile.
[ link to this | view in thread ]
[ link to this | view in thread ]
The only reason a cel phone's location is needed is to route any call to it, even if the phone's GPS locator is turned off.
For plans that charge per minute or per call the records only need calling number/called number/time placed/number of minutes. Unlimited plans could care less about those even though they will also log that information. Location only plays if caller/callee are in different areas (ie: international) that results in a tariff, or other sort of long distance fee. These logs do become business records that have to be maintained at least until the business' fiscal year has been closed and audited; some will be maintained longer depending on the business or jurisdiction.
[ link to this | view in thread ]
More complex than it needs to be
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Apple gets a win in Brooklyn iPhone case
And a Brooklyn judge says the Feds can't use the All Writs Act to force Apple to bypass passcode security on another iPhone!
[ link to this | view in thread ]