{"id":330,"date":"2018-01-16T12:01:21","date_gmt":"2018-01-16T18:01:21","guid":{"rendered":"https:\/\/blogofnotesite.wpengine.com\/?p=330"},"modified":"2019-07-03T23:45:14","modified_gmt":"2019-07-04T04:45:14","slug":"carpenter-v-us-the-intersection-of-law-technology-and-privacy","status":"publish","type":"post","link":"https:\/\/blog.northwesternlaw.review\/?p=330","title":{"rendered":"<i>Carpenter v. US<\/i>: The Intersection of Law, Technology, and Privacy"},"content":{"rendered":"<figure id=\"attachment_389\" aria-describedby=\"caption-attachment-389\" style=\"width: 660px\" class=\"wp-caption aligncenter\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"389\" data-permalink=\"https:\/\/blog.northwesternlaw.review\/?attachment_id=389\" data-orig-file=\"https:\/\/i0.wp.com\/blog.northwesternlaw.review\/wp-content\/uploads\/2017\/12\/17468693762_079222cf4b_k.jpg?fit=2048%2C1365&amp;ssl=1\" data-orig-size=\"2048,1365\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Looking at Smartphone\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Image by Japanexperterna&lt;\/p&gt;\n\" data-medium-file=\"https:\/\/i0.wp.com\/blog.northwesternlaw.review\/wp-content\/uploads\/2017\/12\/17468693762_079222cf4b_k.jpg?fit=300%2C200&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/blog.northwesternlaw.review\/wp-content\/uploads\/2017\/12\/17468693762_079222cf4b_k.jpg?fit=640%2C427&amp;ssl=1\" class=\"size-large wp-image-389\" src=\"https:\/\/i0.wp.com\/blogofnotesite.wpengine.com\/wp-content\/uploads\/2017\/12\/17468693762_079222cf4b_k-1024x683.jpg?resize=640%2C427&#038;ssl=1\" alt=\"\" width=\"640\" height=\"427\" srcset=\"https:\/\/i0.wp.com\/blog.northwesternlaw.review\/wp-content\/uploads\/2017\/12\/17468693762_079222cf4b_k.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/blog.northwesternlaw.review\/wp-content\/uploads\/2017\/12\/17468693762_079222cf4b_k.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/blog.northwesternlaw.review\/wp-content\/uploads\/2017\/12\/17468693762_079222cf4b_k.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/blog.northwesternlaw.review\/wp-content\/uploads\/2017\/12\/17468693762_079222cf4b_k.jpg?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/blog.northwesternlaw.review\/wp-content\/uploads\/2017\/12\/17468693762_079222cf4b_k.jpg?w=1280&amp;ssl=1 1280w, https:\/\/i0.wp.com\/blog.northwesternlaw.review\/wp-content\/uploads\/2017\/12\/17468693762_079222cf4b_k.jpg?w=1920&amp;ssl=1 1920w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-389\" class=\"wp-caption-text\">Image by <a href=\"http:\/\/www.japanexperterna.se\">Japanexperterna<\/a>. <a href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/2.0\/\">CC BY-SA<\/a>\u00a0License.<\/figcaption><\/figure>\n<p>Since Steve Jobs <a href=\"http:\/\/www.businessinsider.com\/watch-steve-jobs-first-iphone-10-years-ago-legendary-keynote-macworld-sale-2017-6\/#finally-heres-part-of-the-press-release-that-came-out-alongside-the-announcement-of-the-first-iphone-and-the-full-keynote-17\">unveiled<\/a> the legendary iPhone in 2007, smartphones have fundamentally changed countless aspects of human interaction from how we navigate to how we communicate. Today, over <a href=\"http:\/\/www.pewresearch.org\/fact-tank\/2017\/06\/28\/10-facts-about-smartphones\/\">three-quarters<\/a> of adults in the United States own a smartphone, making it one of the <a href=\"https:\/\/www.technologyreview.com\/s\/427787\/are-smart-phones-spreading-faster-than-any-technology-in-human-history\/\">fastest spreading<\/a> technologies of all time. The emergence of smartphones has also changed the way federal and local law enforcement agencies <a href=\"https:\/\/www.usatoday.com\/story\/news\/nation\/2013\/12\/08\/cellphone-data-spying-nsa-police\/3902809\/\">conduct investigations\u00a0<\/a>using data-collecting techniques that some argue infringe on our right to privacy.<\/p>\n<p>On November 29th, the Supreme Court heard oral arguments in a case which lies at the intersection of the ever-evolving capabilities of technology and the decades-old Fourth Amendment doctrine. The <a href=\"https:\/\/www.washingtonpost.com\/news\/volokh-conspiracy\/wp\/2017\/06\/05\/supreme-court-agrees-to-hear-carpenter-v-united-states-the-fourth-amendment-historical-cell-site-case\/?utm_term=.9ea022d90779\">issue<\/a> in\u00a0<em>Carpenter v. United States\u00a0<\/em>is whether police obtaining historical cell-site records that reveal time-stamped locations of a cell phone user without a warrant is permitted under the Fourth Amendment.<\/p>\n<p>The case arose from the conviction of a man named Timothy Carpenter, who was involved in a <a href=\"http:\/\/detroit.cbslocal.com\/2014\/04\/16\/man-sentenced-to-life-in-prison-in-phone-store-armed-robberies\/\">series of armed robberies<\/a> in which a group of men targeted cell phone stores in Michigan. Ironically, it was Carpenter&#8217;s own cell phone that ultimately led to his conviction and life sentence. Carpenter acted as the <a href=\"https:\/\/www.washingtonpost.com\/news\/volokh-conspiracy\/wp\/2017\/06\/05\/supreme-court-agrees-to-hear-carpenter-v-united-states-the-fourth-amendment-historical-cell-site-case\/?utm_term=.9ea022d90779\">leader of the group<\/a>, supplying the guns and\u00a0signaling the start of each robbery. After a coconspirator confessed to the robberies and turned over Carpenter&#8217;s phone number, the<a href=\"https:\/\/www.oyez.org\/cases\/2017\/16-402\"> government applied for historical cell-site records<\/a>\u00a0under the Stored Communications Act. Unlike the probable cause requirement for obtaining a warrant under the <a href=\"https:\/\/www.law.cornell.edu\/constitution\/fourth_amendment\">Fourth Amendment<\/a>, the Stored Communications\u00a0Act merely states that a court order may be issued if there are\u00a0<a href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/18\/2703#\">&#8220;reasonable grounds to believe&#8221;<\/a> that the information sought is relevant and material to a criminal investigation. The court order was granted, and the government\u00a0received <a href=\"https:\/\/www.aclu.org\/cases\/united-states-v-carpenter\">four months<\/a>\u00a0of cell-site location\u00a0data, which placed Carpenter near several of the robberies in question and ultimately contributed to his conviction.<\/p>\n<p>On appeal, a divided three-judge panel on the Sixth Circuit <a href=\"http:\/\/www.scotusblog.com\/wp-content\/uploads\/2016\/10\/16-402-op-bel-6th-cir.pdf\">affirmed<\/a> Carpenter&#8217;s conviction and sentence, holding that the government collection of cell-site location data from cell service providers did not require a warrant, because it did not constitute a search under the Fourth Amendment. The test for a Fourth Amendment search comes from Justice Harlan&#8217;s concurring opinion in\u00a0<em><a href=\"https:\/\/scholar.google.com\/scholar_case?case=9210492700696416594&amp;q=katz+v+united+states&amp;hl=en&amp;as_sdt=400006\">Katz v. United States<\/a><\/em>\u00a0(1967). Under the two-part\u00a0<em>Katz <\/em>test<em>, <\/em>a search requires a warrant if\u00a0the individual has a subjective expectation of privacy that <a href=\"https:\/\/scholar.google.com\/scholar_case?case=9210492700696416594&amp;q=katz+v+united+states&amp;hl=en&amp;as_sdt=400006\">&#8220;society is prepared to recognize as reasonable.&#8221;<\/a>\u00a0In the 1979 case <a href=\"https:\/\/scholar.google.com\/scholar_case?case=3033726127475530815&amp;q=Smith+v.+Maryland&amp;hl=en&amp;as_sdt=400006\"><em>Smith v. Maryland<\/em><\/a><em>,<\/em> the Supreme Court explored how this test applied in the context of phone records: the police had installed a pen register at a central telephone company office to record telephone numbers dialed from the suspect&#8217;s home phone. The Court stated that obtaining a record of phone numbers from a suspect is not a search under the Fourth Amendment, because\u00a0an individual has\u00a0<a href=\"https:\/\/scholar.google.com\/scholar_case?case=3033726127475530815&amp;q=Smith+v.+Maryland&amp;hl=en&amp;as_sdt=400006#p744\">&#8220;no legitimate expectation of privacy in information he voluntarily turns over to third parties<\/a>.\u201d The Sixth Circuit <a href=\"http:\/\/www.scotusblog.com\/wp-content\/uploads\/2016\/10\/16-402-op-bel-6th-cir.pdf\">reasoned<\/a> that under this third-party doctrine,\u00a0Carpenter voluntarily carried and used his cell phone, and he therefore lacked a sufficient interest in the cell-site records created and maintained by his wireless carriers.<\/p>\n<p><em>Carpenter v. United States\u00a0<\/em>illustrates the fundamental\u00a0conflict between rapidly evolving technology and relatively static constitutional doctrine. The legitimate expectation of privacy standard articulated in\u00a0<em>Smith\u00a0<\/em>is incompatible with how technology, particularly the smartphone, is used in everyday life. As Justice Sotomayor pointed out in her concurrence in the 2012 case <a href=\"https:\/\/scholar.google.com\/scholar_case?case=6122276400056758151&amp;q=%22This+approach+is+ill-suited+to+the+digital+age,+in+which+people+reveal+a+great+deal+of+information+about+themselves+to+third+parties+in+the+course+of+carrying+out+mundane+tasks.%22&amp;hl=en&amp;as_sdt=400006#p957\"><em>United States v.\u00a0<\/em><em>Jones,\u00a0<\/em>&#8220;[t]his approach is ill-suited to the digital age, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks.<\/a>&#8221;\u00a0Hopefully, the Supreme Court will use\u00a0<em>Carpenter v. United States<\/em> to\u00a0readdress the third-party doctrine and articulate a Fourth Amendment standard that is more closely aligned with our privacy expectations today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since Steve Jobs unveiled the legendary iPhone in 2007, smartphones have fundamentally changed countless aspects of human interaction from how we navigate to how we communicate. Today, over three-quarters of adults in the United States own a smartphone, making it one of the fastest spreading technologies of all time. The emergence of smartphones has also changed the way federal and local law enforcement agencies conduct investigations\u00a0using data-collecting techniques that some argue infringe on our right to privacy. On November 29th,&#8230;<\/p>\n<p class=\"read-more\"><a class=\"btn btn-default\" href=\"https:\/\/blog.northwesternlaw.review\/?p=330\"> Read More<span class=\"screen-reader-text\">  Read More<\/span><\/a><\/p>\n","protected":false},"author":41,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"BLOG: Carpenter v. US: The Intersection of Law, Technology, and Privacy by Emma Englund. Can law enforcement use location-based cell cite records without a warrant?","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[55],"tags":[],"class_list":["post-330","post","type-post","status-publish","format-standard","hentry","category-board-member-contribution"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9jSvD-5k","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/blog.northwesternlaw.review\/index.php?rest_route=\/wp\/v2\/posts\/330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.northwesternlaw.review\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.northwesternlaw.review\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.northwesternlaw.review\/index.php?rest_route=\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.northwesternlaw.review\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=330"}],"version-history":[{"count":0,"href":"https:\/\/blog.northwesternlaw.review\/index.php?rest_route=\/wp\/v2\/posts\/330\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.northwesternlaw.review\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.northwesternlaw.review\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.northwesternlaw.review\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}