Kansas Court Rejects Government's 'Reverse Warrant,' Sets Ground Rules For Future Requests

from the getting-some-of-that-crucial-bulwarking-done dept

We haven't seen a lot of legal challenges to so-called "reverse warrants." This is likely due to their relative novelty. It's probably also due to the fact that no one "targeted" by these warrants knows about them until well after an investigation has been closed.

Reverse warrants don't target people or places. They target (and I'm using that term loosely) areas roughly defined/confined by GPS coordinates. Everything inside the geofence is a target. Working backward from the data obtained from companies like Google, investigators try to determine which of these data points is their suspect.

For the time being, it's mostly up to the judges reading the warrant affidavits to raise challenges to the methods used or the broadness of request. And, so far, we've only seen one rejection of a reverse warrant, albeit one rejected twice by consecutive judges (a magistrate and a district court judge).

Now we have one more rejection to examine, coming to us via FourthAmendment.com. A magistrate judge in Kansas has rejected [PDF] the government's attempt to obtain location data from Google. The magistrate notes that judges all over the nation should expect to see more of these as time goes on and should be aware of the constitutional issues at play when the government works backwards from bulk data to identify a criminal suspect. Because this investigative technique is only expected to become more common, this judge has decided to set some ground rules for the government's future attempts to work its way backwards to probable cause.

The court issues this written order not only to address the subject application, but also to provide guidance for future search warrant applications involving geofence technology given the relatively sparse authority on this issue.

And the court is doing this because this warrant just doesn't cut it, constitutionally speaking.

Here, the application and accompanying affidavit are not sufficiently specific or narrowly tailored to establish probable cause or particularity. The court therefore denies the application without prejudice.

The order doesn't detail the federal crime suspected of being committed but does note it involves a heavily trafficked business. The government is seeking location data on every device in the area during a one-hour period. That isn't narrow enough for the court.

The application here establishes probable cause that a crime was committed at the subject business establishment during the relevant one-hour time period. However, it does not establish probable cause that evidence of the crime will be located at the place searched—that is, Google’s records showing the location data of cell phone users within the geofence boundaries.

The court notes it's obviously true that Google's data would show what devices were in the business during this time period, but goes on to point out the flaws in the warrant affidavit. The warrant request, as written, fails to provide a link between the data sought and the suspected criminals.

The court has considered the agent’s statements in the current application based on his training and experience, and finds that they are too vague and generic to establish a fair probability—or any probability—that the identity of the perpetrator or witnesses would be encompassed within the search. For beginners, the affidavit does not suggest that any relevant perpetrator or witness even had a smartphone. In Arson, the court relied on an affidavit that explained that that co-conspirators probably would have been coordinating their efforts by phone. Here, the affidavit contains no analogous explanation, whether based on the agent’s training and experience or based on the facts of the investigation. To the contrary, the affidavit suggests only that the culprit was a lone pedestrian in the early morning hours who was caught on surveillance footage. The affidavit conspicuously omits any suggestion that the surveillance footage shows that the individual had a cell phone.

Almost everyone carries a phone wherever they go. Almost. And there's no reason to believe the phone being gradually targeted here would be transmitting location data to Google. Android devices may make up 85% of the market, but that's not enough market share for the court to ignore the assumptions made by the agent seeking the warrant. iOS users don't always send location data to Google. Android users have the option to deny Google access to location data. The judge says there's too much unknown to allow this warrant to be granted without modification.

The judge also says the warrant makes a mockery of probable cause by allowing the government to treat every person in the area as a suspect until proven otherwise.

The application also does not address the anticipated number of individuals likely to be encompassed within the targeted Google location data. This also goes to the particularity requirement, which is intertwined with probable cause. If a geofence warrant is likely to return a large amount of data from individuals having nothing to do with the alleged criminal activity—as in Pharma I & II—the sheer amount of information lessens the likelihood that the data would reveal a criminal suspect’s identity, thereby weakening the showing of probable cause.

And that may result in a whole lot of incidental targeting that could negatively affect the rights and freedoms of people who had nothing to do with the alleged crime.

[T]he geofence boundary appears to potentially include the data for cell phone users having nothing to do with the alleged criminal activity. The boundary encompasses two public streets, so anyone driving their automobile by the target location during the relevant time period could be identified in the data. Google Maps also indicates that the subject building contains another business, which the application does not address. The government is also seeking data within the geofence’s “margin of error,” meaning that it seeks location-point data outside of the geofence but which could conceivably fall within the geofence if the margin of error would permit the device to be located within the parameters. See Pharma II, 481 F. Supp. 3d at 745 n.11 (describing the margin of error). As a result, the warrant may return data from users who are outside of the radius of the geofence. Id. Google Maps shows that the area just outside of the perimeter of the geofence includes residences and other businesses that could be implicated by the margin of error.

The government supplied no data or specifics on the expected margin of error nor did it explain what steps it would take to ensure it only gathered as much info as needed to identify its suspect.

The court also says the time period of the data sought is far too long and too disconnected from the criminal activity.

The application also does not adequately justify the time period requested. It seeks an hour of data, which is longer than what was at issue in either Pharma I & II or Arson. And the nexus between the alleged criminal activity and this one-hour duration is weak. According to the affidavit, video surveillance footage shows the suspect at three discrete times. The proposed geofence’s temporal scope ranges from just before the second sighting to approximately 10 minutes after the suspect fled the scene. The affidavit does not explain why the government does not seek data from the time period surrounding the first sighting, and it does not explain why the government seeks data for the entire period between the second and third sighting.

The government will be given another chance to request this data. But it will need to provide far more information and include far more limitations than it did with its first pass. This is now the minimum expectation for reverse warrants, at least in this court.

The court… issues this opinion to provide fair notice that geofence warrant applications must sufficiently address the breadth of the proposed geofence and how it relates to the investigation. It is not enough to submit an affidavit stating that probable cause exists for a geofence warrant because, given broad cell phone usage, it is likely the criminal suspect had a cell phone. If this were the standard, a geofence warrant could issue in almost any criminal investigation where a suspect is unidentified. The Fourth Amendment requires more, particularly where the warrant implicates the privacy interests of individuals who have nothing to do with the alleged criminal activity.

If the government wants to work its way backwards to a suspect, it needs more particularity and better probable cause to do so.

Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: 4th amendment, kansas, reverse warrant
Companies: google


Reader Comments

Subscribe: RSS

View by: Time | Thread


  • identicon
    Jim, 23 Jun 2021 @ 10:27am

    ?

    Go after google? Illogical! Should have gone thru the records of local phone carriers, those even tell you the elevation of the phone, and those nearby. Plus, shows datastreams, and those datastreams show the functions in use. I would say going after the wrong barking dog.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 23 Jun 2021 @ 11:14am

    Warrants seem to like those cell phones

    If I were a criminal, I'd start leaving my cell phone at home while I commit whatever acts in the darkness... it's almost like camouflage.

    link to this | view in chronology ]

    • identicon
      Anonymous Coward, 23 Jun 2021 @ 1:10pm

      Re: Warrants seem to like those cell phones

      It really isn't that hard to disable GPS in most cell phones. Simply remove the battery. No power, no GPS, no matter what the police procedurals say. A lot harder with apple phones, which are more like limitted term rentals than purchases, with hardware built to expire on you and no way to fix it (especially a dead or dying battery in a case not made to be opened). If I were a criminal I'd carry a burner phone with the battery removed, except when I needed to use it.

      link to this | view in chronology ]

      • identicon
        Anonymous Coward, 23 Jun 2021 @ 7:34pm

        Re: Re: Warrants seem to like those cell phones

        Simply remove the battery.

        Have you looked at "modern" phones? The battery can always be removed, but it's hardly "simple".

        link to this | view in chronology ]

    • identicon
      Anonymous Coward, 23 Jun 2021 @ 1:52pm

      Re: Warrants seem to like those cell phones

      More like everyone should start leaving their cellphones at home. This kind of overreach by the government was one of the most obvious threats that everyone was warned about when Google and co. started all of their data mining.

      Today, it's two streets over a one hour period. Ten years from now it will be an entire state (if not the whole country), over a three week period. (Got to find out where he hid the money, obviously.)

      People need to see these things for what they are: Prisoner Trackers. The government sure does.

      link to this | view in chronology ]

      • icon
        nasch (profile), 25 Jun 2021 @ 10:52am

        Re: Re: Warrants seem to like those cell phones

        More like everyone should start leaving their cellphones at home.

        Kind of defeats the purpose of having a mobile phone.

        link to this | view in chronology ]

  • icon
    jimb (profile), 23 Jun 2021 @ 1:42pm

    "reverse warrants"...

    I know people, or so I've heard, who used to do something similar. We called, I mean they called, it "dynamite fishing". You get everything in the pond, then you just sort out the fish that are edible. Works good. Or so I've heard. Too bad about the other fish, frogs, turtles, and such, though.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 23 Jun 2021 @ 1:43pm

    The term is novel; fishing expeditions are not.

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 23 Jun 2021 @ 2:17pm

    If this were the standard, a geofence warrant could issue in almost any criminal investigation where a suspect is unidentified.

    Aw, snap. And we were so looking forward to easy busts of residents and bystanders...
    -- Kansas State Police

    link to this | view in chronology ]

  • identicon
    Anonymous Coward, 23 Jun 2021 @ 6:18pm

    Nothing to hide, nothing to fear.

    link to this | view in chronology ]

  • identicon
    anon, 23 Jun 2021 @ 9:21pm

    cell phone tracking...its too late

    https://youtu.be/cq2zuE3ISYU?t=42

    This is what they want. in my not-so-humble opinion, this data should never exist outside of the capacity planning software applications used by the telcos.

    link to this | view in chronology ]

  • This comment has been flagged by the community. Click here to show it
    icon
    louis5962 (profile), 23 Jun 2021 @ 10:15pm

    https://www.mybalancenow.bid/

    basic fire and earthquake safety norms and require regular sustainable with the needs of future generations; and. (xiii) To granted on the basis of a defective Form-I is liable to be rejected.

    link to this | view in chronology ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.