How a Bank Robbery Case Became SCOTUS’s Next Big Fourth Amendment Test
How a Bank Robbery Case Became SCOTUS’s Next Big Fourth Amendment Test
Police in Virginia located a suspect by demanding location-specific cell phone data from Google. Did that violate his constitutional rights?
It’s been a few years since the Supreme Court heard a major Fourth Amendment case. That will change next month when the justices hear oral arguments in Chatrie v. United States on the government’s use of geofencing warrants to obtain a person’s cell phone data. Their ruling could have major implications for how and when police can access Americans’ sensitive personal information in the digital age. It will also provide an important window into how the latest iteration of the Supreme Court thinks about the Fourth Amendment, tech companies, and privacy rights.
This particular case began with a bank robbery in a town outside Richmond, Virginia, in May 2019. Local police officers followed the usual investigative steps but came up short on leads. The following month, one of the detectives sought what is known as a geofencing warrant that required Google to comb through millions of accounts and identify which ones came within a 150-meter radius of the crime scene for an hour around the time of the robbery.
Google is a common target for geofencing requests because of its location-tracking service, unimaginatively named Location History, which more than 500 million users have activated. Location History updates itself roughly every two minutes, effectively creating a comprehensive record of a person’s movements—a literal digital footprint, if you will, albeit one that users can delete.
Since it receives so many requests, Google has developed a multistep process for responding to them. For the first step, the company initially provided a police detective with semi-anonymized data for 19 users within the geofence. The detective then requested additional data on nine of those users for the second step. He “did not explain to Google why he chose these nine accounts, nor did he consult a magistrate [judge],” according to court filings, but Google complied. From there, the detective “requested that Google de-anonymize three of the numbers, again without explaining why or consulting a judge,” which Google agreed to do as the third and final step.
Finally, detectives used the data to identify a local man named Okello Chatrie and obtain a search warrant to search his house. According to the Justice Department, they found “two robbery-style demand notes,” as well as “nearly $100,000 in U.S. currency (including bills wrapped in bands signed by the victim bank teller) and a silver and black 9mm semi-automatic pistol” that looked like the one carried by the bank robber in surveillance footage.
Federal prosecutors charged Chatrie with multiple felonies related to the bank robbery. Ahead of trial, Chatrie and his lawyers asked a judge to exclude any evidence obtained through the geofencing warrant, including what detectives found at Chatrie’s house because of it, on the grounds that it violated his Fourth Amendment protections from unreasonable searches and seizures.
The district court broadly ruled in Chatrie’s favor. For step one—the search warrant to obtain the first 19 accounts—the court held that the government did not have sufficient probable cause to obtain the warrant to geofence those accounts. On the additional searches that narrowed it down to nine users and then three users, the district court also concluded that it........
