Post-Carpenter Ruling Says Call Records Aren't Content Or Cell Site Location Info; Thus, No 4th Amendment Protection

from the narrow-ruling-means-narrow-applications dept

Judicial citations and applications of the recent Supreme Court decision in the Carpenter case continue to roll in. The narrow holding by the Supreme Court was that acquisition of cell site location info (CSLI) now requires a warrant, seeing as it can be used to effectively "track" someone over a period of days or months. Historical CSLI -- especially large amounts of it -- is far more revealing than many other records covered by the Third Party Doctrine. An "equilibrium shift" was needed and the court applied it.

The shift is trickling down to lower courts, leading to some examinations of the Carpenter ruling in cases that don't appear to call for it. The Supreme Court of California, ruling [PDF] on a case that originated 15 years ago, takes a brief moment to weigh the Carpenter ruling against the specifics of this appeal. (via FourthAmendment.com)

At stake here -- one of the several challenges raised by the defendant -- are phone records gathered with an SCA court order. Phone records were left undisturbed by the Carpenter ruling, but here's the court's brief examination of the issue.

The prosecution presented telephone records and testimony showing telephone calls among the various participants during relevant times. It obtained the telephone records pursuant to a court order under 18 United States Code section 2703, part of the federal Stored Communications Act. (See Carpenter v. United States (June 22, 2018, No. 16-402) 585 U.S. __. __ [2018 WL 3073916 p. *4].) Defendant moved to suppress the evidence, partly on the ground that obtaining the records without a search warrant violated his rights under the Fourth Amendment to the United States Constitution.

Unsurprisingly, the trial court -- ruling years before the Supreme Court's decision -- found this to be constitutional under the Smith v. Maryland decision, which solidified the Third Party Doctrine framework. The court here notes the records now exempted from the Third Party Doctrine include records obtainable under the Stored Communications Act. Still, it finds no violation -- not because the Carpenter ruling wasn't in place yet, but because call records aren't communications.

The United States Supreme Court has now held that a search warrant is needed to obtain at least some types of information governed by the Stored Communications Act. (Carpenter v. United States, supra, 2018 WL 3073916.) The court stressed that its holding is “narrow,” and that it did “not disturb the application of” cases such as Smith v. Maryland, supra, 442 U.S. 735. (Carpenter, at p. *13.) It is not clear whether Carpenter’s holding would apply here. But we need not decide the question. Any error was harmless beyond a reasonable doubt. The evidence merely showed that some of the alleged conspirators communicated by telephone at certain times; the content of the communications was not revealed. Although relevant, the evidence was unimportant in light of the trial as a whole.

Even if this were being challenged post-Carpenter and even if the originating events happened after the Supreme Court's decision, the outcome would still be the same. The Supreme Court issued no opinion on the privacy implications of phone call metadata and took care to leave the Third Party Doctrine standing, minus the small part it trimmed off for historical CSLI. Content has always required warrants. There's a whole set of wiretap laws and litigation pertaining to it. Dialed numbers haven't been given Constitutional protection in over 50 years. But it is good to know courts are at least seeking to apply the ruling in cases where there's no obvious application, rather than ignoring the implications of the ruling completely.

Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: 4th amendment, call records, carpenter, location info, scli, warrants


Reader Comments

Subscribe: RSS

View by: Time | Thread


  1. This comment has been flagged by the community. Click here to show it
    identicon
    Edwin Ruhiu, 11 Jul 2018 @ 5:06am

    Greatness

    Really good piece

    link to this | view in thread ]

  2. icon
    DannyB (profile), 11 Jul 2018 @ 6:01am

    The danger of call records

    link to this | view in thread ]

  3. icon
    DannyB (profile), 11 Jul 2018 @ 6:02am

    The danger of call records

    This article

    https://kieranhealy.org/blog/archives/2013/06/09/using-metadata-to-find-paul-revere/

    shows how dangerous metadata can be. That traitorous Paul Revere could be discovered using call records.

    link to this | view in thread ]

  4. icon
    Nathan F (profile), 11 Jul 2018 @ 6:04am

    So, if CSLI is now protected factual data points, then why isn't call metadata (number called, date, and time)? Both are factual data points. Both will, when looked at over an extended period of time, reveal many interesting bits of information about a person. Both are collected by the telco for their routine business and yet only one is protected by warrant requirements? This (seemingly to me double standard) doesn't make much sense.

    link to this | view in thread ]

  5. identicon
    Anonymous Coward, 11 Jul 2018 @ 11:58am

    The new world order should bow in disgrace beg the world for forgiveness because in the end those treasonous PEOPLE will be punished like no other by the creator of this universe.

    link to this | view in thread ]

  6. icon
    Ninja (profile), 11 Jul 2018 @ 12:23pm

    Re:

    That's the main problem. Unless they are looking for one specific point of metadata in a specific time then anything should need a warrant. If law enforcement wants to plant a goddamn ankle gps on a person they need authorization, if they want to 'stalk' someone to check exactly who is said person talking to they need authorization but when it goes to cellphones or online everything is suddenly crazy. Seriously, what's the goddamn difference?

    link to this | view in thread ]

  7. identicon
    Anonymous Coward, 11 Jul 2018 @ 12:28pm

    The only real (partial) solution for this is to have phones which can connect directly without going through a cell tower when the phones are within range (like within the same cell). This seems do able and possibly extensible to a mesh network of phones.

    link to this | view in thread ]

  8. icon
    Ninja (profile), 11 Jul 2018 @ 1:10pm

    Re:

    And a battery sinkhole. Cell to cell seems feasible but even then your phone would still have to search for towers to call other numbers or even be in the network. Otherwise you are talking about radio comms with possibly encrypted signal.

    link to this | view in thread ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.