Amster Diehl 74 Stan. L. Rev. 385
Amster Diehl 74 Stan. L. Rev. 385
Amster Diehl 74 Stan. L. Rev. 385
NOTE
Against Geofences
Haley Amster & Brett Diehl*
* Haley Amster is a law clerk at Covington & Burling LLP; J.D., Stanford Law School, 2021.
Brett Diehl is a trial attorney at Federal Defenders of San Diego, Inc.; J.D., Stanford Law
School, 2021.
Our deepest gratitude to Robert Weisberg for his encouragement, guidance, and insights.
Thanks to Michael W. McConnell, Morgan N. Weiland, and the rest of the
Constitutional Law Center for their support and guidance. Thanks to Jonathan Abel,
David Sklansky, Jonathan Mayer, Orin Kerr, John Ellis, Rick Salgado, Todd Hinnen,
Sierra Villaran, Laura Koenig, the participants of the Constitutional Law Center’s
Works-in-Progress Workshop, and the students of the Legal Studies Workshop for their
helpful comments and feedback throughout the drafting process. Thanks to editors and
friends—Marty Berger, Marc Brunton, Julia Irwin, Jenny Jiao, Dan Kim, Matt Krantz,
David Levin, Caro Sundermeyer, Daphne Thompson, Mitchell Wong, Jeffrey Xia, and
Peggy Xu—who made this Note better with their insightful edits and commentary. And
thanks to Tal Klement for immediately recognizing the many questions that geofence
warrants raise. All views expressed are our own and do not reflect those of any current or
former employers.
385
Against Geofences
74 STAN. L. REV. 385 (2022)
answers the question of whether probable cause must be shown for each device included in
a digital search, based in part on jurisprudence regarding checkpoints, area warrants, and
searches of many people in a commercial location. The Note next examines the selective
expansion and unmasking steps, arguing (1) that geofence warrants are unconstitutional
general warrants because of the discretion given to law-enforcement officials in warrant
execution; and (2) that these steps may impermissibly increase a warrant’s scope or
constitute multiple searches under one warrant. The Note concludes by considering the
broader implications of corporate policy shaping Fourth Amendment guardrails.
386
Against Geofences
74 STAN. L. REV. 385 (2022)
Table of Contents
Introduction ............................................................................................................................................................388
I. The Technology Behind a Geofence Request.............................................................................393
A. The SensorVault ...............................................................................................................................394
B. Warrant Execution ........................................................................................................................398
1. Initial data dump ....................................................................................................................399
2. Selective expansion ..............................................................................................................404
3. Unmasking ................................................................................................................................405
II. Geofences and the Fourth Amendment.........................................................................................406
A. Is a Geofence a Fourth Amendment “Search”? .................................................................406
B. Probable Cause, Particularity, and Warrant Execution ............................................410
III. How Courts Are Handling Geofence Warrants .......................................................................411
A. Northern District of Illinois Magistrate Opinions .......................................................412
1. Pharmaceutical sale investigation: first denial ......................................................413
2. Pharmaceutical sale investigation: second denial ................................................414
3. Pharmaceutical sale investigation: third denial ....................................................415
4. Arson investigation ..............................................................................................................416
B. District of Kansas Magistrate Opinion ................................................................................417
C. Ongoing State and Federal Litigation ..................................................................................419
D. Preliminary Takeaways from the Early Litigation......................................................421
IV. Constitutionality of the Initial Data Dump.................................................................................422
A. Probable Cause...................................................................................................................................422
1. Geofences as Ybarra searches ..........................................................................................423
2. Geofences as checkpoints ..................................................................................................425
3. Geofences as area warrants ..............................................................................................427
4. Takeaways .................................................................................................................................429
B. Issues with the Particularity Requirement ........................................................................431
V. Constitutionality of Selective Expansion and Unmasking ................................................433
A. Geofences as General Warrants ..............................................................................................433
B. Selective Expansions as Increases in Scope .......................................................................435
C. Multiple Searches.............................................................................................................................436
VI. Corporate Policy and Fourth Amendment Protections .......................................................437
A. Absence of Legislation ..................................................................................................................438
B. Corporate Constitutional Policy .............................................................................................440
Conclusion................................................................................................................................................................444
387
Against Geofences
74 STAN. L. REV. 385 (2022)
Introduction*
Suppose a law-enforcement officer investigating a hit-and-run sets up a
checkpoint near the site of the incident. The investigating officer stops each
passerby and examines their cell phone location history to determine if they
were present at the crime scene. This officer would be in violation of the
Fourth Amendment for employing a checkpoint in the “ordinary enterprise of
investigating” a crime.1 Now suppose that officer obtains a warrant compelling
Google to do the same thing—digitally. Different result?2
Since roughly 2016, law enforcement has used geofence warrants to help
revive criminal investigations gone cold.3 These warrants have become
increasingly common,4 and there are even indications that a warrant-
authorized geofence was used to investigate the January 6, 2021 attempted
insurrection at the U.S. Capitol.5
Geofence warrants “work in reverse” from traditional search warrants.6
Instead of law enforcement requesting that a third-party provider produce the
location history of a particular suspect’s device, geofence warrants proceed first
by giving investigators access to data for all cellular devices that were present
near a crime scene around the time when the crime occurred. Through a series
* This Note is current as of November 2021. Subsequent changes in the legal landscape
are not addressed.
1. See City of Indianapolis v. Edmond, 531 U.S. 32, 44, 48 (2000) (invalidating a checkpoint
employed “primarily for the ordinary enterprise of investigating crimes”); cf. Illinois v.
Lidster, 540 U.S. 419, 423, 427-28 (2004) (upholding a checkpoint because its primary
purpose was not to “determine whether a vehicle’s occupants were committing a crime,
but to ask vehicle occupants, as members of the public, for their help in providing
information about a crime in all likelihood committed by others”).
2. Credit is due to Dennis Martin for inspiring our introduction. See Dennis Martin, Note,
Demystifying Hash Searches, 70 STAN. L. REV. 691, 693 (2018).
3. Jennifer Valentino-DeVries, Tracking Phones, Google Is a Dragnet for the Police, N.Y.
TIMES (Apr. 13, 2019), https://perma.cc/P75R-DZCU (to locate, select “View the live
page”). We use “geofence warrant” to align with the term most commonly used by
litigators and commentators. See, e.g., id. But the precise term is “reverse location”
warrant. See, e.g., Thomas Brewster, To Catch a Robber, the FBI Attempted an
Unprecedented Grab for Google Location Data, FORBES (Aug. 15, 2018, 9:00 AM EDT),
https://perma.cc/XG3N-JEGG; Tyler Dukes, To Find Suspects, Police Quietly Turn to
Google, WRAL.COM (Mar. 15, 2018, 5:05 AM), https://perma.cc/RFU9-XDF7.
4. Alfred Ng, Privacy Groups Demand Google Disclose Details on Geofence Warrants, CNET
(Dec. 8, 2020, 5:00 AM PT), https://perma.cc/TGS4-DUE5.
5. Statement of Facts at 5-6, United States v. Groseclose, No. 21-mj-00250 (D.D.C. Feb. 22,
2021), 2021 U.S. Dist. Ct. Pleadings LEXIS 132, ECF No. 1-1; Drew Harwell & Craig
Timberg, How America’s Surveillance Networks Helped the FBI Catch the Capitol Mob,
WASH. POST (Apr. 2, 2021, 9:00 AM EDT), https://perma.cc/Q257-LHYT.
6. Sidney Fussell, Creepy “Geofence” Finds Anyone Who Went Near a Crime Scene, WIRED
(Sept. 4, 2020, 7:00 AM), https://perma.cc/Y3S8-ZT8Q.
388
Against Geofences
74 STAN. L. REV. 385 (2022)
7. Thomas Brewster, Google Hands Feds 1,500 Phone Locations in Unprecedented “Geofence”
Search, FORBES (Dec. 11, 2019, 7:45 AM EST), https://perma.cc/34QP-XMKY.
8. Id.
9. See Jennifer Valentino-DeVries, Google’s Sensorvault Is a Boon for Law Enforcement. This Is
How It Works., N.Y. TIMES (Apr. 13, 2019), https://perma.cc/FPL9-KRX6; Declaration of
Marlo McGriff ¶ 26, United States v. Chatrie, No. 19-cr-00130 (E.D. Va. Mar. 11, 2020),
ECF No. 96-1. For example, if a cell phone owner is walking toward a Starbucks, she
might see a Starbucks coupon appear on her device (because her device sensed that she
was near the store). Once she goes into the Starbucks and uses her coupon, her device
registers that information. Google tracks and stores such advertisement-servicing and
usage data.
10. Declaration of Sarah Rodriguez ¶ 5, United States v. Chatrie, No. 19-cr-00130 (E.D. Va.
Mar. 11, 2020), ECF No. 96-2.
11. Google, Supplemental Information on Geofence Warrants in the United States 1 (n.d.),
https://perma.cc/6B34-PPCX. A TechCrunch article notes that Google released this
data in August 2021. See Zack Whittaker, Google Says Geofence Warrants Make Up One-
Quarter of All US Demands, TECHCRUNCH (Aug. 19, 2021, 2:54 PM PDT),
https://perma.cc/V95P-2MMD.
389
Against Geofences
74 STAN. L. REV. 385 (2022)
12. Google, supra note 11, at 2 (to locate, select “View the live page,” and then select
“Download supplemental data as a CSV”).
13. Brief of Amicus Curiae Google LLC in Support of Neither Party Concerning
Defendant’s Motion to Suppress Evidence from a “Geofence” General Warrant (ECF
No. 29) at 3, United States v. Chatrie, No. 19-cr-00130 (E.D. Va. Dec. 20, 2019), 2019 WL
8227162, ECF No. 59-1 [hereinafter Google Amicus Brief].
14. Google, supra note 11, at 2 (to locate, select “View the live page,” and then select
“Download supplemental data as a CSV”).
15. Id.
16. Id.
17. Id.
18. Id.
19. Shannon Ryan, Family, Investigators Push for Geofence Warrant in Jason Landry Case,
FOX 7 AUSTIN (May 11, 2021), https://perma.cc/NX7G-4FLK.
20. Mr. Chatrie’s Post-hearing Brief on “Geofence” General Warrant at 3-4, United
States v. Chatrie, No. 19-cr-00130 (E.D. Va. May 3, 2021), ECF No. 205 [hereinafter
Chatrie Post-hearing Brief].
21. Sam Richards, Powerful Mobile Phone Surveillance Tool Operates in Obscurity Across the
Country, INTERCEPT (Dec. 23, 2020, 6:31 AM), https://perma.cc/57XS-WX2X.
390
Against Geofences
74 STAN. L. REV. 385 (2022)
22. Working with Google Geofence Reverse Location Search Records, HAWK ANALYTICS (Jan. 23,
2020), https://perma.cc/3QQ4-HAXM; Hawk Analytics (@hawkanalytics), FACEBOOK
(June 17, 2019) (capitalization altered), https://perma.cc/LD5J-QDNY (to locate, select
“View the live page”); Johana Bhuiyan, The New Warrant: How US Police Mine Google for
Your Location and Search History, GUARDIAN (Sept. 16, 2021, 6:00 AM EDT),
https://perma.cc/94H4-ERPF.
23. See infra notes 57-67 and accompanying text.
24. See infra Parts III, VI.A. And the literature has only begun to explore the many
questions raised by this new tool. See Note, Geofence Warrants and the Fourth
Amendment, 134 HARV. L. REV. 2508, 2515-20 (2021) (considering the question of when a
geofence search occurs and arguing that it occurs when the provider searches its
database, not when law enforcement receives the requested data); Tim O’Brien,
Suspicionless Search: Geofence Warrants and the Fourth Amendment 19-31 (Aug. 6,
2021) (unpublished manuscript), https://perma.cc/L7C3-SYZ3 (highlighting the
shortcomings of anonymization in the geofence-warrant process and arguing that
Fourth Amendment case law and statutory protections are insufficient to protect users’
privacy); Donna Lee Elm, Geofence Warrants: Challenging Digital Dragnets, CRIM. JUST.,
Summer 2020, at 7, 12-13 (recommending limitations on the use of geofence warrants,
such as allowing these warrants only for violent offenses and only after exhausting
traditional investigation methods). See generally John C. Ellis, Jr., Google Data and
Geofence Warrant Process, NLSBLOG.ORG (Jan. 8, 2021), https://perma.cc/E7CW-7NZJ
(explaining geofence-warrant technology and execution); Nathaniel Sobel, Do Geofence
Warrants Violate the Fourth Amendment?, LAWFARE (Feb. 24, 2020, 1:03 PM),
https://perma.cc/Y4MV-FTVR (detailing the motion to suppress filed in United
States v. Chatrie, a case discussed below). This Note breaks new ground by focusing on
how to properly conduct the probable-cause inquiry, explaining that courts must focus
the inquiry on each device swept up in the geofence search. This Note also makes a
novel contribution by introducing analogies to checkpoints, area warrants, and
searches of many people in a commercial location. Finally, this Note is the first to
highlight the broader impacts of Google’s role in this emerging issue, arguing that the
corporation’s policies have played an outsized role in shaping law-enforcement norms
and practices.
25. See infra Part III.
26. 138 S. Ct. 2206, 2212, 2217 n.3, 2220-21 (2018).
391
Against Geofences
74 STAN. L. REV. 385 (2022)
27. See id. at 2220 (noting the decision’s narrow scope). For post-Carpenter litigation, see
generally United States v. Moore-Bush, 963 F.3d 29 (1st Cir.) (holding that Carpenter does
not extend to eight months of video surveillance conducted using a pole camera),
vacated and reh’g en banc granted, 982 F.3d 50 (1st Cir. 2020); State v. Sylvestre, 254 So. 3d
986 (Fla. Dist. Ct. App. 2018) (holding that Carpenter extends to cell-site simulator
location data); and United States v. Diggs, 385 F. Supp. 3d 648 (N.D. Ill. 2019) (holding that
Carpenter extends to the acquisition of a vehicle’s long-term GPS data). For post-
Carpenter scholarship applying the decision in a variety of contexts, see, for example,
Orin S. Kerr, Implementing Carpenter (USC L. Legal Stud. Working Paper, Paper
No. 18-29, 2018), https://perma.cc/XG96-NMTR (arguing that Carpenter should apply
to non-content internet records if those records are collected by new digital
technologies, are collected without a user’s meaningful consent, and reveal intimate
personal details); Susan Freiwald & Stephen Wm. Smith, The Supreme Court, 2017
Term—Comment: The Carpenter Chronicle: A Near-Perfect Surveillance, 132 HARV. L. REV.
205, 227-31 (2018) (suggesting Carpenter may extend to real-time location information,
fewer than seven days of historical location information, and other technologies);
Andrew Guthrie Ferguson, Future-Proofing the Fourth Amendment, HARV. L. REV. BLOG
(June 25, 2018), https://perma.cc/A2SX-Z9GP (“[A]lmost everything we do in the
digital age—social media, internet searches, the Internet of Things—has locational
privacy implications because they track location, and Carpenter suggests that they
might also have Fourth Amendment implications.”); Paul Ohm, The Many Revolutions of
Carpenter, 32 HARV. J.L. & TECH. 357, 375-76 (2019) (suggesting that Carpenter could
extend to real-time location information); Lara M. McMahon, Note, Limited Privacy in
“Pings”: Why Law Enforcement’s Use of Cell-Site Simulators Does Not Categorically Violate
the Fourth Amendment, 77 WASH. & LEE L. REV. 981, 1027 (2020) (arguing that Carpenter
does not extend to all cell phone pings); Emma Lux, Student Contribution, Privacy in
the Dumps: Analyzing Cell Tower Dumps Under the Fourth Amendment, 57 AM. CRIM. L.
REV. ONLINE 109, 113-18 (2020) (analyzing whether Carpenter extends to tower dumps);
and Stephanie Foster, Note, Should the Use of Automated License Plate Readers Constitute a
Search After Carpenter v. United States?, 97 WASH. U. L. REV. 221, 238-39 (2019)
(asserting that Carpenter extends to aggregated data from automated license-plate
readers).
28. See infra Part II.A.
392
Against Geofences
74 STAN. L. REV. 385 (2022)
cause and particularity requirements due to the inherent breadth of the search.
Here the Note analogizes to the search of many people located at the scene of a
crime in Ybarra v. Illinois,29 the use of digital checkpoints, and the use of area
warrants. It then explores the difficulty of tailoring by (1) examining digital
searches of multi-occupancy buildings; (2) surveying scholarship and litigation
regarding tower dumps; and (3) suggesting particularized search protocols that
could meet constitutional requirements. Part V examines the selective
expansion and unmasking steps, arguing that geofence warrants are
unconstitutional general warrants because of the discretion given to law-
enforcement officials in warrant execution. Part V also argues that the
selective-expansion and unmasking steps may impermissibly increase a
warrant’s scope or constitute multiple searches under one warrant. Finally,
Part VI considers the broader implications of corporate policy driving Fourth
Amendment guardrails.
393
Against Geofences
74 STAN. L. REV. 385 (2022)
A. The SensorVault
Google’s SensorVault is a prodigious pool of consumer location
information, pioneered in part to target advertisements but now routinely
used by law enforcement for geofence warrants.31 Cell-service providers and
other corporations also collect cell-site location information for various
purposes.32 Yet the SensorVault and linked internal Google databases are more
expansive, storing user location information generated from “search queries,”
“users’ IP addresses, device sensors,” and “device signals including GPS,
information cellular networks provide to a device, information from nearby
Wi-Fi networks, and information from nearby Bluetooth devices.”33 Multiple
inputs can be combined to estimate a user’s location “to a high degree of
precision.”34 Google refers collectively to this data, regardless of its source, as
location history (LH). Absent a user request or account closure, LH is stored
within Google’s databases for at least eighteen months.35
Google’s LH practices affect the vast majority of people living in the
United States. Eighty-five percent of Americans currently own a smartphone
31. See supra note 9 and accompanying text. For examples of commercial uses of location
data, see Geofencing Advertising Platform, GROUNDTRUTH, https://perma.cc/MWE6-
DUCL (archived Oct. 22, 2021); Sarah Berry, Geofencing Marketing: The New Way to
Market Your Business, WEBFX (Apr. 20, 2021), https://perma.cc/4MKB-RYK8; and
Justin Croxton, Geofencing Advertising: What Is Geo Fencing & How Does It Work,
PROPELLANT MEDIA (Jan. 5, 2021), https://perma.cc/CDP6-NTAM. The use of location
data and geofences to target advertisements raises privacy and ethics questions beyond
the scope of this Note. See, e.g., Kearston L. Wesner, Is the Grass Greener on the Other Side
of the Geofence? The First Amendment and Privacy Implications of Unauthorized Smartphone
Messages, 10 CASE W. RSRV. J.L. TECH. & INTERNET, no. 1, 2019, at 1, 1-3 (describing a
settlement regarding geofence-based advertisements that targeted women in the
vicinity of abortion clinics and encouraged them not to terminate their pregnancies);
John G. Browning, Geo-Fencing: Free Speech or Tainting the Jury Pool?, J.L. & TECH. TEX.
(Nov. 15, 2019), https://perma.cc/9EVH-F7RK (describing Monsanto’s use of geofences
to target ads highlighting its herbicide’s safety in the lead-up to a California trial on the
issue).
32. See supra note 31; see also, e.g., AT&T, AT&T Location Information Services 1-2 (2012),
https://perma.cc/8E5N-FV4C.
33. Exhibit 202 at 4, State v. Google LLC, No. CV2020-006219 (Ariz. Super. Ct. July 17,
2020); see also Google Amicus Brief, supra note 13, at 10 (“[I]nputs include not only
information related to the locations of nearby cell sites, but also GPS signals . . . or
signals from nearby Wi-Fi networks or Bluetooth devices.”).
34. Google Amicus Brief, supra note 13, at 10. Google’s geofence-warrant results normally
include an indication of location precision, shown via a radius in which Google’s
algorithm has calculated the user is likely located. A smaller radius, resulting from
more location inputs or better quality, indicates a more precise location. See infra
Figure 3; infra notes 73-74 and accompanying text.
35. See Jessica Bursztynsky, Google Just Announced It Will Automatically Delete Your Location
History by Default, CNBC (updated June 24, 2020, 12:11 PM EDT), https://perma.cc/
RN7M-6XQF.
394
Against Geofences
74 STAN. L. REV. 385 (2022)
36. Mobile Fact Sheet, PEW RSCH. CTR. (Apr. 7, 2021), https://perma.cc/5UX9-P7PU.
37. S. O’Dea, U.S. Smartphone Subscriber Share by Operating Platform 2012-2021, by Month,
STATISTA (Aug. 11, 2021), https://perma.cc/3KRQ-TS53 (to locate, select “View the live
page”).
38. See Statista Rsch. Dep’t, Reach of Most Popular U.S. Smartphone Apps 2021, STATISTA
(July 26, 2021), https://perma.cc/9MVQ-K8QC (to locate, select “View the live page”). A
fourth, YouTube, is owned by Google’s parent company, Alphabet. See id.
39. Statista Rsch. Dep’t, Number of Mobile Search Users in the United States 2014 -2020,
STATISTA, https://perma.cc/PV5B-3VWZ (archived Oct. 22, 2021) (to locate, select
“View the live page”).
40. Joseph Johnson, U.S. Total & Mobile Organic Search Visits 2020, by Engine, STATISTA
(Feb. 22, 2021), https://perma.cc/43LF-PNRW.
41. See How Google Uses Location Information, GOOGLE, https://perma.cc/D4ZX-C9A3
(archived Oct. 22, 2021). The government has explained the ubiquity of Google
products in court filings. “In its affidavit, the government asserts that approximately
97% of smartphones in the world use Google applications or Google’s operating
system,” which would allow those smartphones to appear in a geofence if present
within its boundaries. In re the Search of: Info. Stored at Premises Controlled by
Google, as Further Described in Attachment A, No. 20-mc-00297, 2020 WL 5491763, at
*3 (N.D. Ill. July 8, 2020). “[T]he government asserts a likelihood ‘that at any given time,
a mobile telephone, regardless of make, is interfacing in some manner with a Google
application, service, and/or platform[.]’ ” Id. at *3 n.3 (alteration in original) (quoting the
government’s filing). “We assume this reasonable conclusion to be true, and thus
reasonably conclude that likely hundreds of cellphones other than the suspect’s
cellphone would be included in the requested geofences.” Id.
42. See Global Requests for User Information, GOOGLE, https://perma.cc/2YTD-ZMEV
(archived Oct. 23, 2021); Ng, supra note 4; supra note 11.
43. Valentino-DeVries, supra note 3.
395
Against Geofences
74 STAN. L. REV. 385 (2022)
44. See Gabriel J.X. Dance & Jennifer Valentino-DeVries, Have a Search Warrant for Data?
Google Wants You to Pay, N.Y. TIMES (Jan. 24, 2020), https://perma.cc/NZP5-5924.
45. See supra notes 11-18 and accompanying text.
46. Magistrate Judge M. David Weisman has lamented the government’s “undisciplined . . .
overuse” of geofence warrants in “run-of-the-mill cases that present no urgency or
imminent danger.” In re the Search, 2020 WL 5491763, at *8.
47. Tony Webster, How Did the Police Know You Were Near a Crime Scene? Google Told Them,
MPR NEWS (Feb. 8, 2019, 1:10 PM), https://perma.cc/HF3G-BP2V.
48. Zack Whittaker, Minneapolis Police Tapped Google to Identify George Floyd Protestors,
TECHCRUNCH (Feb. 6, 2021, 8:00 AM PST), https://perma.cc/Y6BX-GHLL.
49. Google Amicus Brief, supra note 13, at 5. (“Holders of Google accounts can control
various account-level and service-level settings and preferences. ‘Location History’ . . .
is an optional account-level Google service. It does not function automatically for
Google users.”); Manage Your Location History, GOOGLE ACCT. HELP, https://perma.cc/
GP93-XARG (archived Oct. 23, 2021) (“Location History is turned off by default for
your Google Account and can only be turned on if you opt in.”).
50. See Barbara Krasnoff, Android 101: How to Stop Location Tracking, VERGE (Aug. 25, 2020,
3:04 PM EDT), https://perma.cc/X6EQ-5XQ5 (describing the difficult process to
deactivate Google location history); Ryan Nakashima, AP Exclusive: Google Tracks Your
Movements, Like It or Not, AP NEWS (Aug. 13, 2018), https://perma.cc/CB84-X5KE
(same).
51. Complaint for Injunctive and Other Relief ¶ 8, State ex rel. Brnovich v. Google LLC,
No. CV2020-006219 (Ariz. Super. Ct. May 27, 2020) (quoting Nakashima, supra note 50).
396
Against Geofences
74 STAN. L. REV. 385 (2022)
52. Nakashima, supra note 50; see also Mark Brnovich (@GeneralBrnovich), TWITTER
(May 27, 2020, 3:29 PM), https://perma.cc/9WYV-QSMB (“We began our investigation
of Google following a 2018 @AP article that detailed how users are lulled into a false
sense of security, believing Google provides users the ability to actually disable their
Location History.”).
53. Exhibit 18 at 6, State ex rel. Brnovich v. Google LLC, No. CV2020-006219 (Ariz. Super.
Ct. Aug. 21, 2020).
54. Exhibit 215 at 6, State ex rel. Brnovich v. Google LLC, No. CV2020-006219 (Ariz. Super.
Ct. Aug. 21, 2020).
55. Id.
56. Id. at 4-5.
57. Fussell, supra note 6; see also Meg O’Connor, Avondale Man Sues After Google Data Leads
to Wrongful Arrest for Murder, PHX. NEW TIMES (Jan. 16, 2020, 9:11 AM),
https://perma.cc/63PT-K2JM.
58. Fussell, supra note 6 (quoting the police report).
59. See id.
60. O’Connor, supra note 57.
61. Id.
397
Against Geofences
74 STAN. L. REV. 385 (2022)
B. Warrant Execution
Google has crafted a three-step warrant execution process to handle
geofence requests.68 As a Google employee stated in a court declaration, “[e]arly
‘geofence’ legal requests sought LH data that would identify all Google users
who were in a geographical area in a given time frame”—essentially an
unmasked data dump.69 To “ensure privacy protections for Google users and to
protect against overbroad disclosures . . . Google instituted a policy of objecting
to any warrant that failed to include deidentification and narrowing
measures.”70 This has led to the now “typical[]” three-step protocol.71
62. Jon Schuppe, Google Tracked His Bike Ride Past a Burglarized Home. That Made Him a
Suspect., NBC NEWS (Mar. 7, 2020, 3:22 AM PST), https://perma.cc/84NC-K8QQ.
63. Id.
64. Id.
65. Id.
66. Id.
67. Captain John Sherwin of the Rochester Police Department in Minnesota put it
colorfully, telling reporters: “When you sit down and think about it, it makes you
want to destroy all your devices” and “move to a cabin in Montana.” Thomas Brewster,
Feds Order Google to Hand Over a Load of Innocent Americans’ Locations, FORBES (Oct. 23,
2018, 9:00 AM EDT) (quoting Sherwin), https://perma.cc/5QSU-Y74P.
68. Declaration of Sarah Rodriguez, supra note 10, ¶ 5.
69. Id.
70. Id.
71. See id. ¶¶ 5-12.
398
Against Geofences
74 STAN. L. REV. 385 (2022)
Figure 1
This was one of the geofences requested as part of a Dollar Tree robbery
investigation by the FBI in Henrico, Virginia. A significant number of residences
and commercial businesses other than the targeted Dollar Tree were within the
geofence’s geographic zone.
Source: Brewster, supra note 67.
399
Against Geofences
74 STAN. L. REV. 385 (2022)
Figure 2
We created this visual aid to represent what the initial data dump may have
looked like to law enforcement, with each circle representing a location ping
from a device caught within the boundaries of the geofence.
72. See Brewster, supra note 7. Notably, users’ supposedly anonymous IDs may not actually
be anonymous. A recent exposé on mobile advertising identifiers revealed that these
identifiers can be used to piece together personal information about even “masked”
users. Charlie Warzel & Stuart A. Thompson, Opinion, They Stormed the Capitol. Their
Apps Tracked Them., N.Y. TIMES (Feb. 5, 2021), https://perma.cc/2J5T-VUHL (to locate,
select “View the live page”). It is not clear whether Google uses mobile advertising
identifiers in its data returns.
400
Against Geofences
74 STAN. L. REV. 385 (2022)
Figure 3
This is what the initial data dump looks like on paper. This particular list was the
location history returned to law-enforcement officials investigating a bank
robbery in Allenton, Wisconsin.
Source: Brewster, supra note 7.
73. This is the circle that a user sees when they open up a map-based application on their
mobile device: The larger the radius of the circle, the less precise the reported location
of the user. See Find & Improve Your Location’s Accuracy, GOOGLE MAPS HELP,
https://perma.cc/C4MC-QXR7 (archived Jan. 28, 2022); Ellis, supra note 24. See
generally Krista Merry & Pete Bettinger, Smartphone GPS Accuracy Study in an Urban
Environment, 14 PLOS ONE, no. 7, July 2019, at 1, 2-3, 17 (noting that the accuracy of a
smartphone’s reported location data can vary widely depending on a number of
variables).
74. Declaration of Marlo McGriff, supra note 9, ¶ 24. Geofence warrants do not necessarily
limit the data searched to the subset of users actually present in the geofence.
Depending on how a corporation indexes data, all accounts may need to be queried to
identify records that match the warrant’s specified place and time. This is the case for
Google, which has stated that its database is structured such that it requires a search of
all users to produce the initial data dump. See Google Amicus Brief, supra note 13, at 12-
13.
401
Against Geofences
74 STAN. L. REV. 385 (2022)
Accordingly, law enforcement may obtain data for users outside of the
warrant’s geographic parameters who, due to imprecision, logged a location
radius that fell within the geofence.75 The following example illustrates such a
possibility. Focusing on two devices in our geofence, Device 1 and Device 2, let
us assume (1) that Device 1 has location coordinates derived from Wi-Fi with a
radius of fifty-five meters; and (2) that Device 2 has location coordinates
derived from a cell site with a radius of 1,000 meters (a radius that can be
typical for locations based on cell sites76).
The radius of Device 1 would look like this:
Figure 4
402
Against Geofences
74 STAN. L. REV. 385 (2022)
Figure 5
77. Indeed, a Google product manager explained that Google’s ability to approximate
device location “is sufficiently precise and reliable for [the] purposes for which Google
designed LH.” Declaration of Marlo McGriff, supra note 9, ¶ 26.
403
Against Geofences
74 STAN. L. REV. 385 (2022)
2. Selective expansion
After law-enforcement officials review the data in the initial dump, the
next step is selective expansion. Without the oversight of a magistrate judge,
law enforcement requests additional location history for certain devices in the
geofence.78 The expanded location history reaches beyond the geographic and
temporal ranges specified in the initial data dump, enabling law enforcement
to track the path of devices before and after the window in which the crime
allegedly occurred.79 This information can lead officials to discard some
devices from the investigation and focus more deeply on others (if, for
example, a device’s trajectory aligns with the known escape route of an
unidentified person of interest).80
The original warrant typically governs the time frame beyond the original
window for which law enforcement can request geographically unbounded
LH. For example, one geofence warrant told Google to “provide additional
location history outside of the predefined area for . . . relevant accounts to
determine path of travel” for up to forty-five minutes before or after the
originally enumerated time windows.81 Another geofence warrant permitted
investigators to request additional data from “30 minutes before AND 30
minutes after the initial search time periods.”82
78. See, e.g., Defendant Okello Chatrie’s Motion to Suppress Evidence Obtained from a
“Geofence” General Warrant at 6, United States v. Chatrie, No. 19-cr-00130 (E.D. Va.
Oct. 29, 2019), 2019 WL 7660969, ECF No. 29 [hereinafter Chatrie Motion to Suppress];
see also Valentino-DeVries, supra note 3.
79. See, e.g., Chatrie Motion to Suppress, supra note 78, at 6 (describing how investigators,
without judicial scrutiny, gained access to the unbounded location data of nine users
for thirty minutes before and after the initial geofence time period).
80. The selective-expansion step is sometimes omitted for geofence warrants that examine
multiple time frames. See, e.g., Application for a Search Warrant at 16-17, In re the
Search of: Location & Identifying Info. Maintained by Google LLC, No. 19-mj-00918
(E.D. Wis. Dec. 31, 2019), ECF No. 1 [hereinafter Dec. 31, 2019 Application]; Application
for a Search Warrant at 20-22, In re the Search of: Location Hist. Data from Google LLC
Generated from Mobile Devices, No. 19-mj-00104 (E.D. Wis. Dec. 4, 2019), ECF No. 1;
Application for a Search Warrant at 14-16, 19, In re the Search of: Location Hist. Data
from Google LLC Generated from Mobile Devices, No. 19-mj-00846 (E.D. Wis. May 1,
2019), ECF No. 1; Application for a Search Warrant at 9, 11, 13-14, In re the Search of:
Info. That Is Stored at Premises Controlled by Google, No. 18-mj-01307 (E.D. Wis.
Nov. 20, 2018), ECF No. 1. This may be because investigators are able to identify devices
of interest based on multiple appearances.
81. Motion to Quash & Suppress Evidence Under Penal Code §§ 1538.5 & 1546 at 8,
People v. Dawes, No. 19002022 (Cal. Super. Ct. June 9, 2020) [hereinafter Dawes Motion
to Quash & Suppress] (emphasis omitted) (quoting the warrant).
82. Chatrie Motion to Suppress, supra note 78, at 6 (quoting the warrant).
404
Against Geofences
74 STAN. L. REV. 385 (2022)
Figure 6
3. Unmasking
Lastly, and again without judicial oversight, law enforcement requires
Google to provide subscriber information for any device selected by
investigators.83 This unmasking divulges information including the account’s
registered name, address, start date of service, services utilized, telephone
83. See, e.g., Chatrie Motion to Suppress, supra note 78, at 6-7; see also Valentino-DeVries,
supra note 3. Note that Minnesota police officers follow a different practice: After they
receive the initial data dump, they request another warrant from the court to retrieve
identifying information. Aaron Mak, Close Enough, SLATE (Feb. 19, 2019, 5:55 AM),
https://perma.cc/72YG-393W.
405
Against Geofences
74 STAN. L. REV. 385 (2022)
numbers, email addresses, and means and sources of payment for services.84 In
at least one instance, law enforcement has sought personal identifying
information from all devices included in the initial data dump.85
84. See, e.g., Dec. 31, 2019 Application, supra note 80, at 17; cf. 18 U.S.C. § 2703(c)(2)
(describing the required disclosures in response to a Stored Communications Act
subpoena for subscriber information).
85. Brewster, supra note 7.
86. See 389 U.S. 347, 360-61 (1967) (Harlan, J., concurring).
87. 138 S. Ct. 2206, 2212-13, 2216-17 (2018).
88. Traditionally, under the third-party doctrine, “a person has no legitimate expectation
of privacy in information he voluntarily turns over to third parties.” Smith v.
Maryland, 442 U.S. 735, 743-44 (1979).
89. Carpenter, 138 S. Ct. at 2221, 2223.
90. Id. at 2220.
91. See supra note 27.
406
Against Geofences
74 STAN. L. REV. 385 (2022)
(as it does with geofence warrants) rather than a few large intrusions over a
small population (as it did in Carpenter).92
In addition to its unclear scope, Carpenter’s longevity is uncertain. The
recent change in Supreme Court membership (with the passing of Justice
Ginsburg and the confirmation of Justice Barrett) means that the five-vote
Carpenter majority is no longer intact. Attention has now turned to Justice
Gorsuch’s Carpenter dissent as a possible path forward.93 Justice Gorsuch’s
theory employs a positive-law approach, suggesting that a user may retain a
property interest in his or her data held by a third-party provider.94
Accordingly, an in-depth analysis of the Carpenter question—whether a
geofence warrant constitutes a Fourth Amendment search—is not the main
focus of this Note. Google’s policy of objecting to anything less than a
probable-cause warrant has seemingly pressured the government to file only
warrant applications, punting the resolution of the Carpenter question further
down the line.95 And at least one court to consider the Carpenter question in the
geofence context has noted that Carpenter is not dispositive. In a 2020 opinion
denying a geofence warrant, Magistrate Judge M. David Weisman wrote that a
citation to Carpenter was “not intended to suggest that Carpenter pre-ordains the
outcome here.”96 Instead, Judge Weisman’s opinion was “premised on much
longer established Fourth Amendment principles that a search warrant must
establish probable cause to justify the scope of the search requested, and the
type of evidence to be seized must be particularly described, not left to the
agents’ complete discretion.”97 The court thus found that the only dispositive
question was whether the geofence warrant could be properly issued under the
magistrate’s authority, bound to the probable-cause and particularity issues we
discuss in Parts IV and V below.
92. This question raises a related issue: If there is a search, when does the search occur? Is it
at the time Google queries the database, or is it when law enforcement gains access to
the data? See generally Note, supra note 24, at 2515-20 (arguing that a search occurs
“when a private company first searches through its entire database”). For the purposes
of this Note, the distinction makes no difference. Even if the search occurs when data is
returned to law enforcement, the search still cannot satisfy probable-cause and
particularity requirements. See infra Part IV.
93. See, e.g., Chris Machold, Note, Could Justice Gorsuch’s Libertarian Fourth Amendment Be the
Future of Digital Privacy? A “Moderate” Contracts Approach to Protecting Defendants After
Carpenter, 53 U.C. DAVIS L. REV. 1643, 1648-49 (2020) (noting that Justice Gorsuch’s
Carpenter dissent offers a promising path to a majority that can protect the digital
privacy interests of defendants).
94. See Carpenter, 138 S. Ct. at 2267-72 (Gorsuch, J., dissenting).
95. See infra Parts III.A-.C.
96. In re the Search of: Info. Stored at Premises Controlled by Google, as Further Described
in Attachment A, No. 20-mc-00297, 2020 WL 5491763, at *7 n.10 (N.D. Ill. July 8, 2020).
97. Id.
407
Against Geofences
74 STAN. L. REV. 385 (2022)
98. See, e.g., State v. Sylvestre, 254 So. 3d 986, 991-92 (Fla. Dist. Ct. App. 2018) (holding that
Carpenter extends to cell-site simulator location data); Freiwald & Smith, supra note 27,
at 227-31.
99. See Carpenter, 138 S. Ct. at 2212 (noting that “modern cell phones generate increasingly
vast amounts of increasingly precise” cell-site location information).
100. See, e.g., Jennifer Valentino-DeVries, Natasha Singer, Michael H. Keller & Aaron
Krolick, Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret,
N.Y. TIMES (Dec. 10, 2018), https://perma.cc/R8QW-XWCF (to locate, select “View the
live page”); Chaim Gartenberg, Why Apple’s New Privacy Feature Is Such a Big Deal,
VERGE (Apr. 27, 2021, 10:30 AM EDT), https://perma.cc/H8LT-24GC; Brian X. Chen,
To Be Tracked or Not ? Apple Is Now Giving Us the Choice, N.Y. TIMES (updated Sept. 29,
2021), https://perma.cc/PJN5-RB6N.
101. Carpenter, 138 S. Ct. at 2220; Ellis, supra note 24.
102. See supra Part I.A.
103. Valentino-DeVries, supra note 3 (quoting Brooklyn Park Deputy Police Chief Mark
Bruley).
104. United States v. Jones, 565 U.S. 400, 415 (2012) (Sotomayor, J., concurring) (quoting
People v. Weaver, 909 N.E.2d 1195, 1199 (N.Y. 2009)).
408
Against Geofences
74 STAN. L. REV. 385 (2022)
105. The inability of users to stop sharing location data with cell-service providers helped
motivate the holding in Carpenter. See Carpenter, 138 S. Ct. at 2220 (“[A] cell phone logs a
cell-site record by dint of its operation, without any affirmative act on the part of the
user beyond powering up. . . . Apart from disconnecting the phone from the network,
there is no way to avoid leaving behind a trail of location data.”).
106. Warzel & Thompson, supra note 72; Gina Kolata, Your Data Were “Anonymized”? These
Scientists Can Still Identify You, N.Y. TIMES (July 23, 2019), https://perma.cc/73J2-PXUQ.
107. See supra notes 53-56 and accompanying text.
409
Against Geofences
74 STAN. L. REV. 385 (2022)
108. Defendant Okello Chatrie’s Supplemental Motion to Suppress Evidence Obtained from
a “Geofence” General Warrant at 15-17, United States v. Chatrie, No. 19-cr-00130 (E.D.
Va. May 22, 2020), 2020 WL 4551093, ECF No. 104 [hereinafter Chatrie Supplemental
Motion to Suppress] (footnotes omitted) (citations omitted).
109. Chatrie Post-hearing Brief, supra note 20, at 14-15.
110. See Carpenter, 138 S. Ct. at 2268-69 (Gorsuch, J., dissenting); supra notes 93-94 and
accompanying text.
111. See supra notes 92-97 and accompanying text.
112. See U.S. CONST. amend. IV; Coolidge v. New Hampshire, 403 U.S. 443, 454-55 (1971),
overruled in part on other grounds by Horton v. California, 496 U.S. 128 (1990); Johnson v.
United States, 333 U.S. 10, 13-15 (1948).
113. See infra Part IV.A.3.
114. U.S. CONST. amend. IV.
410
Against Geofences
74 STAN. L. REV. 385 (2022)
411
Against Geofences
74 STAN. L. REV. 385 (2022)
evidence in his indictment”); Sobel, supra note 24 (identifying Chatrie as “the first
known federal Fourth Amendment challenge against a geofence warrant in a federal
district court”).
121. See Dawes Motion to Quash & Suppress, supra note 81, at 1-2. One of the authors of this
Note was an author of the motion to quash and suppress in Dawes.
122. In re the Search of: Info. Stored at Premises Controlled by Google, 481 F. Supp. 3d 730,
732-33 (N.D. Ill. 2020).
123. Id. at 732-33, 757; see also Sealed Memorandum Opinion & Order at 1, 25, In re the
Search of: Info. Stored at Premises Controlled by Google, as Further Described in
Attachment A, No. 20-mc-00392 (N.D. Ill. July 24, 2020), ECF No. 5; In re the Search of:
Info. Stored at Premises Controlled by Google, as Further Described in Attachment A,
No. 20-mc-00297, 2020 WL 5491763, at *1 (N.D. Ill. July 8, 2020), ECF No. 4.
124. In re the Search Warrant Application for Geofence Location Data Stored at Google
Concerning an Arson Investigation, 497 F. Supp. 3d 345, 349, 351 (N.D. Ill. 2020).
125. See In re the Search, 481 F. Supp. 3d at 748 (“The Court is not aware of any federal
decision addressing [probable-cause and particularity] issues with respect to a geofence
warrant, and the Court has reason to believe that geofence warrants are facing their
first round of judicial scrutiny.”).
126. In re the Search, 2020 WL 5491763, at *1.
127. Id.
412
Against Geofences
74 STAN. L. REV. 385 (2022)
(over 7.7 acres of land) during the afternoon in “a densely populated” area
containing “restaurants, various commercial establishments, and at least one
large residential complex.”128 The second and third, both of which also covered
100-meter radii during the afternoon, included “medical offices and other
single and multi-floor commercial establishments that are likely to have
multiple patrons.”129
413
Against Geofences
74 STAN. L. REV. 385 (2022)
414
Against Geofences
74 STAN. L. REV. 385 (2022)
area of [that geofence], and to assume the number of persons was reduced by the stay-
at-home order based on the statistics the government presented would be pure
speculation.” Id. at 23.
145. In re the Search of: Info. Stored at Premises Controlled by Google, 481 F. Supp. 3d 730,
732-33 (N.D. Ill. 2020) (stating that the three forty-five-minute geofences contained in
the third application were unchanged in geographic scope from the second
application).
146. Id. at 733.
147. Id. (quoting the application).
148. Id. at 749.
149. Id.
150. Id. at 750 (quoting the application).
151. See id.
152. Id. at 750-51.
415
Against Geofences
74 STAN. L. REV. 385 (2022)
4. Arson investigation
In the second investigation that produced an unsealed federal magistrate’s
opinion, the government presented a geofence warrant application in
connection with “a series of approximately 10 arsons in the Chicago area.”153
Law enforcement believed that the fires, most of which burned vehicles, were
connected, and that the geofences would “contain evidence pertaining to the
identity of the arson suspects and their co-conspirators.”154 The government
requested six geofences, four located in commercial lots where the vehicle fires
had occurred and two along areas of roadway where the unknown arsonists
were alleged to have traveled.155 Each spanned between fifteen and thirty-
seven minutes in length during early morning hours.156 All but one covered
less than a city block, with the fourth proposed geofence covering an elongated
roadway area “approximately the length of 1.25 city blocks.”157 Similar to the
first investigation, the second investigation’s warrant application requested a
two-step execution: the initial data dump followed by unmasking.158
Magistrate Judge Sunil Harjani approved the application, explaining that,
“[o]nce novel,” geofence warrants are “now more frequent in criminal
investigations” and finding that the application “satisfies the probable cause
and particularity requirements of the Fourth Amendment.”159 Judge Harjani
held that there was “probable cause that evidence of the crime will be located at
Google because location data on cell phones at the scene of the arson, as well as
the surrounding streets, can provide evidence on the identity of the
perpetrators and witnesses to the crime.”160 Based on the government’s
assertions that (1) the alleged arsonists likely “use[d] cell phones to plan and
commit criminal offenses”; and (2) “there was a reasonable probability that a
cell phone, regardless of its make, is interfacing in some manner with a Google
application, service, or platform,” the court concluded that “there is a fair
probability that location data at Google will contain evidence of the arson
crime, namely the identities of perpetrators and witnesses to the crime.”161
The court also held that the geofences were sufficiently limited in scope:
They were “specific to the time of the arson incidents only” and “narrowly
153. In re the Search Warrant Application for Geofence Location Data Stored at Google
Concerning an Arson Investigation, 497 F. Supp. 3d 345, 351 (N.D. Ill. 2020).
154. Id.
155. Id. at 351-53.
156. Id.
157. Id.
158. See id. at 353; supra note 130 and accompanying text.
159. In re the Search Warrant Application, 497 F. Supp. 3d at 349.
160. Id. at 355.
161. Id. at 356.
416
Against Geofences
74 STAN. L. REV. 385 (2022)
crafted to ensure that location data, with a fair probability, will capture
evidence of the crime only.”162 The court noted that the warrant request was
appropriately narrow because the buildings and streets contained in the
geofences were unlikely to be occupied during the early-morning times
requested.163 The court also explained that a margin of error for location-
history data, the “exact scope” of which “is unknown,” did not render the
warrant unconstitutional.164 In the court’s eyes, “the fact that warrants for
location data have margins of error does not invalidate them—only
reasonableness is required, not surgical precision.”165 Because the margin of
error was “reasonable given the nature of the evidence being sought and what
is possible with the technology at issue,” the court found that the warrant met
the particularity requirement.166
417
Against Geofences
74 STAN. L. REV. 385 (2022)
the [geofence location] during the relevant one-hour time period.”172 She found
that the government had failed, however, to “establish probable cause that
evidence of the crime will be located at the place searched—that is, Google’s
records showing the location data of cell phone users within the geofence
boundaries.”173 In her judgment, Google’s stored location data “would
undoubtedly show” where certain devices were located at a given point in
time.174 But the government’s statements were “too vague and generic to
establish a fair probability—or any probability—that the identity of the
perpetrator or witnesses would be encompassed within the search.”175 Even if
the court assumed that most individuals, including those committing crimes,
used mobile devices, the government’s affidavit still failed to establish “a fair
probability that any pertinent individual would have been using a device that
feeds into Google’s location-tracking technology.”176 Judge Mitchell contrasted
the government’s conclusory statements about phones linked to Google’s
location-tracking services with the more detailed explanations offered by the
government in the Northern District of Illinois warrant applications.177
Finally, with regard to probable cause, Judge Mitchell found fault with the
application’s failure to anticipate the number of individuals likely to be
included within the geofence.178 In her view, the probable-cause inquiry is one
of relative scale, in which a large amount of information on innocent
individuals “lessens the likelihood that the data would reveal a criminal
suspect’s identity, thereby weakening the showing of probable cause.”179
The opinion similarly emphasized a proportionality requirement for
particularity,180 with the court writing that “[t]he particularity requirement is
more stringent if the privacy interest is greater.”181 The court found that the
government’s application was “missing key information to determine whether
the proposed warrant is sufficiently particularized”: The government did not
address the public streets and second business contained within the geofence,
nor did it “explain the extent to which the geofence, combined with the margin
of error, is likely to capture uninvolved individuals from . . . surrounding
172. Id.
173. Id.
174. Id.
175. Id. at *3.
176. Id.
177. Id.
178. Id. Judge Mitchell noted that this failure “also goes to the particularity requirement,
which is intertwined with probable cause.” Id.
179. Id.
180. Id. (citing Maryland v. Garrison, 480 U.S. 79, 84 (1987)).
181. Id. (citing Berger v. New York, 388 U.S. 41, 56 (1967)).
418
Against Geofences
74 STAN. L. REV. 385 (2022)
419
Against Geofences
74 STAN. L. REV. 385 (2022)
420
Against Geofences
74 STAN. L. REV. 385 (2022)
421
Against Geofences
74 STAN. L. REV. 385 (2022)
A. Probable Cause
When applying for geofence warrants, law enforcement’s support for
probable cause often resembles that proffered in the Northern District of
Illinois arson investigation, as described in Part III.A.4 above. An unknown
suspect committed a crime at a certain location at a certain time; investigators
assumed—with no proof—that the perpetrator had a smartphone with him
422
Against Geofences
74 STAN. L. REV. 385 (2022)
during the offense; and investigators noted “a reasonable probability that a cell
phone, regardless of its make, is interfacing in some manner with a Google
application, service, or platform.”213
Geofence warrants are not the first instance of the government selecting a
geographic region and searching everything within it. Sometimes, law
enforcement has selected an area and searched every person within it.214 At
other times, it has selected an area and searched every home within it.215 Now,
law enforcement selects an area and searches every device within it. Fourth
Amendment jurisprudence has long grappled with the probable-cause and
particularity requirements of these inherently broad searches.
423
Against Geofences
74 STAN. L. REV. 385 (2022)
criminal activity does not, without more, give rise to probable cause to search
that person.”223
An individual Google user being searched via geofence is analogous to
Ventura Ybarra being searched at the tavern. Like the warrant application in
Ybarra, a standard geofence-warrant application alleges two things: (1) that
someone committed a crime;224 and (2) that the crime occurred in a certain
location. And like a search of all persons present at the Aurora Tap Tavern, a
geofence warrant searches all devices within the specified area.
Similar to the Ybarra warrant application, which did not “even mention”
individuals other than the bartender,225 a standard geofence-warrant
application does not mention any details about individuals other than the fact
that a suspect is likely to be present in the geofence.226 To borrow from the
Ybarra Court: The investigators know “nothing in particular about” any
individual subjected to the geofence search “except that he was present” in a
place “at a time when the police had reason to believe” that a crime occurred.227
The Court in Ybarra underscored that probable cause must be established
for each individual subject to the search. The Court’s analysis contrasts with
Magistrate Judge Harjani’s reasoning in the Northern District of Illinois arson
case discussed above.228 In granting a geofence warrant, Judge Harjani
considered whether there was a fair probability that evidence of the crime
would be found in the SensorVault, instead of asking whether there was a fair
probability that evidence of the crime would be found in each user account
searched.229 In reviewing such decisions, courts must grapple with Ybarra’s
declaration that the probable-cause requirement “cannot be undercut or
avoided by simply pointing to the fact that coincidentally there exists probable
cause to search or seize another or to search the premises where the person
may happen to be.”230
223. Id. (citing Sibron v. New York, 392 U.S. 40, 62-63 (1968)); see also United States v. Di Re,
332 U.S. 581, 587 (1948) (holding that an individual does not lose constitutional
immunities from search by “mere presence in a suspected car”). This holding applies
when presence at a crime scene is a known certainty—but presence is not a certainty
with geofence returns because of the way that Google collects data. See supra notes 73-
77 and accompanying text.
224. But in the geofence case, there is not even a named suspect like “Greg” the bartender.
225. Ybarra, 444 U.S. at 90.
226. See, e.g., supra notes 202-08 and accompanying text.
227. Ybarra, 444 U.S. at 91.
228. See supra Part III.A.4.
229. See In re the Search Warrant Application for Geofence Location Data Stored at Google
Concerning an Arson Investigation, 497 F. Supp. 3d 345, 355 (N.D. Ill. 2020).
230. Ybarra, 444 U.S. at 91.
424
Against Geofences
74 STAN. L. REV. 385 (2022)
2. Geofences as checkpoints
Geofence warrants also resemble checkpoints: Both geofences and
checkpoints delineate a geographic region and search everyone within that
region. The Supreme Court’s checkpoint doctrine is illustrated in Michigan
Department of State Police v. Sitz, in which law enforcement constructed a
checkpoint for drunk driving:
All vehicles passing through a checkpoint would be stopped and their drivers
briefly examined for signs of intoxication. In cases where a checkpoint officer
detected signs of intoxication, the motorist would be directed to a location out of
the traffic flow where an officer would check the motorist’s driver’s license and
car registration and, if warranted, conduct further sobriety tests. Should the field
tests and the officer’s observations suggest that the driver was intoxicated, an
arrest would be made.235
A geofence search is essentially a digitized version of the Sitz checkpoint.
All devices that passed through the specified region during the relevant time
window are revealed in the initial data dump, and their location history is
examined by law enforcement for signs of criminal activity. When an officer
sees suspicious location history, that individual is selected for further
investigation via the selective-expansion step.236 Should the officer’s further
observations suggest that the individual is a suspect, the geofence warrant
425
Against Geofences
74 STAN. L. REV. 385 (2022)
requires Google to unmask that person and produce his or her subscriber
information.237 In other words, all individuals in the area are preliminarily
inspected and, at the officer’s discretion, searched. More broadly, law-
enforcement officials executing a geofence warrant develop probable cause to
investigate certain individuals only after they have reviewed the initial data
dump (and perhaps selective-expansion data).
The Sitz Court found the checkpoint constitutional because it “was clearly
aimed at reducing the immediate hazard posed by the presence of drunk
drivers on the highways, and there was an obvious connection between the
imperative of highway safety and the law enforcement practice at issue.”238 But
in City of Indianapolis v. Edmond, the Court held that a checkpoint was
unconstitutional because its “primary purpose . . . [was] the interdiction of
narcotics” and made clear that general-purpose checkpoints are prohibited.239
The Edmond Court declined to “suspend the usual requirement of
individualized suspicion where the police seek to employ a checkpoint
primarily for the ordinary enterprise of investigating crimes.”240 If such
checkpoints were allowed, the Court reasoned, “there would be little check on
the ability of the authorities to construct roadblocks for almost any
conceivable law enforcement purpose.”241 Under this logic, geofence warrants
used to investigate ordinary crimes (i.e., those that do not pose an immediate
hazard) seem to run afoul of Edmond and Sitz.
Illinois v. Lidster presents an apt comparison to geofence warrants, as the
case involved a criminal investigation in search of leads.242 Faced with a stale
investigation of a fatal hit-and-run, law enforcement created an “information-
seeking” checkpoint near the accident’s location.243 The checkpoint blocked a
portion of the highway so that officers could approach each vehicle, ask
passengers if they had witnessed the accident, and hand passengers a flyer
requesting assistance in identifying the vehicle and driver involved.244 The
Supreme Court upheld this checkpoint as constitutional because, unlike the
Edmond checkpoint, it was not set up primarily to detect evidence of ordinary
426
Against Geofences
74 STAN. L. REV. 385 (2022)
criminal wrongdoing.245 In the Court’s eyes, the key distinguishing factor from
Edmond was that law enforcement in Lidster sought information from third
parties unlikely to have themselves committed the crime under
investigation.246
Like in Lidster, law enforcement has no suspect and no known witnesses
when requesting a geofence warrant. But a geofence warrant is more like the
checkpoint in Edmond than the one in Lidster. While Lidster’s checkpoint was
in furtherance of a criminal investigation, it did not aim to “determine whether
a vehicle’s occupants were committing a crime, but to ask vehicle occupants, as
members of the public, for their help in providing information about a crime
in all likelihood committed by others.”247 As the geofence warrants surveyed
above indicate, however, the government seeks geofence warrants precisely to
reveal unknown perpetrators.248 Inspection of geofence data is thus equivalent
to law enforcement stopping each individual leaving an area, demanding his or
her digital device, and checking its location history for evidence of a crime.
This is precisely what the Fourth Amendment prohibits.249
427
Against Geofences
74 STAN. L. REV. 385 (2022)
probable cause for each thing searched within the specific location,253 so they
cannot meet the usual standard required for warrants. Instead, the Supreme
Court recognizes an exception for area warrants in cases where “requiring
individualized showings of probable cause would prevent the government
from addressing important health or safety concerns,” such as the need to
conduct “[a] health or safety inspection of every home in a given area or every
business in a particular industry.”254 Because of this unique government
rationale, these warrants can be predicated on sui generis area-wide probable
cause.
The Supreme Court defined the constitutional limits of area warrants in
Camara v. Municipal Court, which concerned a municipal government’s
inspection of housing “based on its appraisal of conditions in the area as a
whole, not on its knowledge of conditions in each particular building.”255 In
Camara, the government expected that many homes subject to search would be
in compliance with housing codes.256 As a result, the government’s inspections
“would burden many law-abiding homeowners who had done nothing to
trigger any suspicion of wrongdoing.”257 Under ordinary Fourth Amendment
jurisprudence, such inspections would be prohibited. The Camara Court,
however, recognized an exception to the usual probable-cause requirement
“because the inspections are neither personal in nature nor aimed at the
discovery of evidence of crime,” meaning that “they involve a relatively
limited invasion of the urban citizen’s privacy.”258
But the Court emphasized that “the importance of the government’s
interest” in regulating health and safety and the “minimally intrusive nature of
the search” were not, by themselves, sufficient to exempt housing inspections
from the requirement of individualized suspicion.259 The Court included in its
test an exhaustion requirement, indicating that area warrants were only to be
used as a last resort 260 and explaining the “unanimous agreement among those
most familiar with this field that the only effective way to seek universal
compliance with the minimum standards required by municipal codes is
through routine periodic inspections of all structures.”261 The Court
253. Id.
254. Id. at 262-63.
255. See 387 U.S. 523, 535-36 (1967).
256. Primus, supra note 252, at 264.
257. Id.; see Camara, 387 U.S. at 532-33 (emphasizing various ways in which administrative
inspections burden each individual whose property is searched).
258. Camara, 387 U.S. at 537.
259. Primus, supra note 252, at 264.
260. See Camara, 387 U.S. at 539-40.
261. Id. at 535-36 (emphasis added).
428
Against Geofences
74 STAN. L. REV. 385 (2022)
4. Takeaways
As seen through the Ybarra opinion and the other examples discussed in
the previous Subparts, the probable-cause requirement is likely the main
barrier to the constitutionality of geofence warrants. Geofence-warrant
applications in their current form assert only that individual users (1) were at
or near the scene of a crime; and (2) possessed a cell phone that sends data to
Google.265 This falls short of probable cause.
The first allegation, that a user was near the scene of the crime, clashes
with Ybarra. In order to obtain a geofence warrant, the government may have
to show—also in line with the Supreme Court’s checkpoint and area-warrant
jurisprudence—that a special need beyond general law-enforcement activity,
such as the risk of harm to public health or safety, is present.
The second allegation, that the user has a cell phone which sends data to
Google, also seems to fall short of the Ybarra hurdle. Owning an iPhone or an
Android phone is not a reason to believe that the individual “had committed,
was committing, or was about to commit any offense under state or federal
law,” and it is not “indicative of criminal conduct.”266 Rather, it is indicative of
429
Against Geofences
74 STAN. L. REV. 385 (2022)
430
Against Geofences
74 STAN. L. REV. 385 (2022)
that focusing probable cause on the group rather than the individual “would
mean that a larger database is always to be preferred” by law enforcement,
because “by definition there will be evidence of crime in that larger set.”271 This
would lead to an “absurd” understanding of probable cause, Henderson argues:
“[A] prosecutor confident that a bank customer is committing tax fraud could
access the combined records of all customers of that bank because, somewhere
in there, she is very sure is evidence of crime.”272 Instead, Henderson asserts, it
must be the case that probable cause is required for “each person’s obtained
records” in a tower dump, “meaning here each phone number contained within
the dump.”273 Indeed, the Supreme Court in Camara explained that while “in a
criminal investigation, the police may undertake to recover specific stolen or
contraband goods . . . public interest would hardly justify a sweeping search of
an entire city conducted in the hope that these goods might be found.”274
“Consequently, a search for these goods, even with a warrant, is ‘reasonable’
only when there is ‘probable cause’ to believe that they will be uncovered in a
particular dwelling.”275
few post-Carpenter opinions to address the constitutionality of tower dumps. See Shane
Rogers, Two Years of Carpenter, COVINGTON: INSIDE PRIV. (July 7, 2020),
https://perma.cc/9A8M-CXXS. Many of our arguments in this Part also apply to
tower dumps. Individuals are swept into tower dumps for the same reason they are
swept into geofences: proximity to the scene of the crime around the time when it
occurred. But the Carpenter question is more relevant to tower-dump litigation than to
geofence litigation, as corporations sometimes supply cell-tower information to law
enforcement without a warrant. David Kravets, Cops and Feds Routinely “Dump” Cell
Towers to Track Everyone Nearby, WIRED (Dec. 9, 2013, 5:15 PM), https://perma.cc/
KX4W-EPQW.
271. Stephen E. Henderson, Response, A Rose by Any Other Name: Regulating Law Enforcement
Bulk Metadata Collection, 94 TEX. L. REV. SEE ALSO 28, 40-41 (2016).
272. Id. at 41.
273. Id.
274. Camara v. Mun. Ct., 387 U.S. 523, 535 (1967).
275. Id.
276. United States v. Hinton, 219 F.2d 324, 326 (7th Cir. 1955).
277. Maryland v. Garrison, 480 U.S. 79, 84 (1987).
431
Against Geofences
74 STAN. L. REV. 385 (2022)
278. In fact, one of the most infamous national security laws, section 702 of the Foreign
Intelligence Surveillance Act, see FISA Amendments Act of 2008, Pub. L. No. 110-261,
§ 101(a)(2), 122 Stat. 2436, 2438-48 (codified as amended at 50 U.S.C. § 1881a), requires
more targeting than geofences do. Under this law, the government must task a
“selector” to a provider, meaning that the government must provide an “account
identifier such as an email address or telephone number,” and then the provider must
disclose certain communications to or from that selector. U.S. DEP’T OF COM., U.S. DEP’T
OF JUST. & U.S. OFF. OF THE DIR. OF NAT’L INTEL., INFORMATION ON U.S. PRIVACY
SAFEGUARDS RELEVANT TO SCCS AND OTHER EU LEGAL BASES FOR EU–U.S. DATA
TRANSFERS AFTER SCHREMS II, at 7-8 (2020), https://perma.cc/L4NX-AQYB.
279. State v. Ferrari, 460 P.2d 244, 248 (N.M. 1969) (emphasis added).
280. 2 LAFAVE ET AL., supra note 116, § 3.4(e) n.89.
281. Id.; see United States v. Clark, 638 F.3d 89, 94-96 (2d Cir. 2011).
282. In re the Search of: Info. Stored at Premises Controlled by Google, as Further Described
in Attachment A, No. 20-mc-00297, 2020 WL 5491763, at *5 n.7 (N.D. Ill. July 8, 2020)
(citing Kyllo v. United States, 533 U.S. 27, 34 (2001)).
283. See supra notes 33-34 and accompanying text (detailing the precision of SensorVault
location information). In 2020, Google released reports analyzing location data to show
how COVID-19 had changed movement patterns (and whether people were complying
with stay-at-home orders). Casey Newton, Google Uses Location Data to Show Which
Places Are Complying with Stay-at-Home Orders—and Which Aren’t, VERGE (Apr. 3, 2020,
2:00 AM EDT), https://perma.cc/QAT6-JNFX. Such reports reveal the precision with
which Google chronicles users’ movements.
432
Against Geofences
74 STAN. L. REV. 385 (2022)
284. In re the Search of: Info. Stored at Premises Controlled by Google, 481 F. Supp. 3d 730,
755-56 (N.D. Ill. 2020).
285. Brewster, supra note 67; Mak, supra note 83.
286. See supra Part I.B.2.
287. See supra Part I.B.2.
288. See supra Part I.B.3.
433
Against Geofences
74 STAN. L. REV. 385 (2022)
434
Against Geofences
74 STAN. L. REV. 385 (2022)
an invalid general warrant, as it gave executing officers total discretion as to what they
would seize (quoting the warrant)).
300. See Government’s Response in Opposition to Defendant’s Motion for Suppression of
Evidence Obtained Pursuant to Google Geofence Warrant at 19-20, United States v.
Chatrie, No. 19-cr-00130 (E.D. Va. Nov. 19, 2019), 2019 WL 8227160, ECF No. 41
[hereinafter Chatrie Government’s Response].
301. Id.
302. United States v. Anzalone, 208 F. Supp. 3d 358, 363, 368 (D. Mass. 2016) (quoting the
warrant’s affidavit), aff ’d, 923 F.3d 1 (1st Cir. 2019).
303. 2 LAFAVE ET AL., supra note 116, § 3.4(f); see United States v. Jenkins, 680 F.3d 101, 106-07
(1st Cir. 2012) (holding that probable cause to believe contraband will be found in a
certain place can satisfy the particularity requirement).
304. See Anzalone, 208 F. Supp. 3d at 368; Chatrie Government’s Response, supra note 300, at
20.
305. See supra Part IV.A.1.
306. 2 WAYNE R. LAFAVE, SEARCH AND SEIZURE: A TREATISE ON THE FOURTH AMENDMENT
§ 4.10 (West 2021).
307. Id. § 4.10(a).
435
Against Geofences
74 STAN. L. REV. 385 (2022)
C. Multiple Searches
Going a step further, recent federal appellate opinions indicate that
selective expansion could be interpreted as a violation of the Fourth
Amendment maxim that several searches cannot be authorized by one
warrant. In Marron, the Supreme Court explained that the particularity
requirement “prevents the seizure of one thing under a warrant describing
another.”311 A warrant “authorizes only one search,”312 and “if a place is to be
searched a second time the proper procedure is to obtain a second warrant
based on an affidavit explaining why there is now probable cause
notwithstanding the execution of the earlier warrant.”313
436
Against Geofences
74 STAN. L. REV. 385 (2022)
314. See supra Part I.B.2; Google Amicus Brief, supra note 13, at 12-14.
315. United States v. Hasbajrami, 945 F.3d 641, 669-73 (2d Cir. 2019).
316. United States v. Sedaghaty, 728 F.3d 885, 913 (9th Cir. 2013).
317. See supra Part I.B.2.
318. See Issie Lapowsky, New York Lawmakers Want to Outlaw Geofence Warrants as Protests
Grow, PROTOCOL (June 16, 2020), https://perma.cc/3HPW-BKT9 (noting that New
York’s proposed ban on geofence warrants “would be the first in the United States”).
319. See supra Part III.
437
Against Geofences
74 STAN. L. REV. 385 (2022)
significant implications for (1) the way that Fourth Amendment analysis is and
should be conducted; (2) how user’s rights should be protected; and (3) how
much deference government litigation positions are owed with regard to
geofence surveillance.
This Part begins by discussing the source of the vacuum in which Google
has been able to take control: legislative inaction, particularly by the federal
government. It then considers (1) Google’s reasons for choosing to implement
its policies; (2) law enforcement’s acquiescence; and (3) the implications of this
arrangement on democratic accountability, consumer privacy, and the role of
the courts.
A. Absence of Legislation
Legislative rules could govern and regulate the use of geofence warrants,
going above the constitutional floor or mandating protections in the absence
of a precedential holding.320 But Congress has displayed little inclination to act.
Similarly, although a few promising signs have emerged in certain state
legislatures, no bill that would curb geofence use by law enforcement has
neared passage.
At the time of writing, Congress has not indicated a willingness to regulate
law enforcement’s access to geofence data. The only direct mention of geofence
warrants in Congress came in a July 2020 appearance by the chief executive
officers of Alphabet (Google’s parent company), Amazon, Apple, and Facebook
before the House Judiciary Subcommittee on Antitrust, Commercial, and
Administrative Law.321 During that hearing, Representative Kelly Armstrong
explained to Alphabet CEO Sundar Pichai that he believed geofence warrants
were “the single most important issue” before the Subcommittee, because such
warrants fall short of the Fourth Amendment’s probable-cause and
particularity requirements.322 “People would be terrified to know,”
320. Cf. Orin S. Kerr, A User’s Guide to the Stored Communications Act, and a Legislator’s Guide to
Amending It, 72 GEO. WASH. L. REV. 1208, 1212 (2004) (explaining how the Stored
Communications Act created a “set of Fourth Amendment-like privacy protections by
statute, regulating the relationship between government investigators and service
providers in possession of users’ private information”); Susan Freiwald, Online
Surveillance: Remembering the Lessons of the Wiretap Act, 56 ALA. L. REV. 9, 24-26 (2004)
(detailing how the Wiretap Act set protections above the constitutional floor after the
Supreme Court’s decision in Berger).
321. See User Clip: Google “Geofence” Warrants Questioned, C-SPAN (July 29, 2020),
https://perma.cc/WR4C-66TC. A 2019 letter to Google from the House Committee on
Energy and Commerce also expressed concern about the SensorVault’s storage of
precise location data. Letter from U.S. House of Representatives Comm. on Energy &
Com. Members to Sundar Pichai, Chief Exec. Officer, Google 1-3 (Apr. 23, 2019),
https://perma.cc/JSW7-W9AY. No response from Google has been reported.
322. User Clip: Google “Geofence” Warrants Questioned, supra note 321, at 02:06-02:10.
438
Against Geofences
74 STAN. L. REV. 385 (2022)
439
Against Geofences
74 STAN. L. REV. 385 (2022)
336. See generally State Location Privacy Policy, ELEC. PRIV. INFO. CTR., https://perma.cc/55CU-
JSWK (archived Oct. 23, 2021) (tracking pending and passed state legislation focused on
location privacy); Cell Phone Privacy, ACLU, https://perma.cc/2D6E-VE6Y (archived
Oct. 23, 2021) (highlighting the ACLU’s various efforts to increase cell phone users’
privacy rights). For those users willing to proactively limit what location (and other
personal) data is held by mobile carriers and technology corporations, the California
Consumer Privacy Act (CCPA) protects any personal information that “identifies,
relates to, describes, is reasonably capable of being associated with, or could reasonably
be linked, directly or indirectly, with a particular consumer or household,” including
geolocation data. CAL. CIV. CODE § 1798.140(o)(1) (West 2021). Under the CCPA, an
individual can find out what types of personal data a business has collected and how
such information is to be used. Individuals can also direct businesses to (1) delete their
personal information if certain conditions are met; or (2) refrain from selling their data
to third parties. Id. §§ 1798.100, .105, .110, .115, .120, .130, .135.
337. CAL. PENAL CODE § 1546.1(d)(1) (West 2021).
338. See Dawes Motion to Quash & Suppress, supra note 81, at 16-19. CalECPA, in contrast to
similar federal laws, includes a statutory suppression remedy. Compare PENAL
§ 1546.4(a), with 18 U.S.C. §§ 2703, 2708.
339. This Subpart’s discussion builds on literature examining (1) how a lack of legislation
can affect the exercise of constitutional rights; and (2) the role of corporations in this
context. See generally Jonathan Mayer, Government Hacking, 127 YALE L.J. 570, 575-78,
653-54 (2018) (noting that law enforcement increasingly uses unregulated hacking
technology to access encrypted computer systems); Kate Klonick, The New Governors:
The People, Rules, and Processes Governing Online Speech, 131 HARV. L. REV. 1598, 1601-03
(2018) (exploring how private platforms’ policies increasingly control public debate,
free speech, and democratic norms).
440
Against Geofences
74 STAN. L. REV. 385 (2022)
441
Against Geofences
74 STAN. L. REV. 385 (2022)
the geofence context fits into this broader trend.348 But while Google may have
post-Snowden economic incentives to consider privacy concerns, it remains a
body with little direct accountability. Absent legislation, Google is beholden
only to its shareholders and its corporate purpose.
Privacy “on the ground” thus remains the product of corporate norms and
private review processes.349 While the European Union has mandated a robust
privacy regime under the General Data Protection Regulation (GDPR),350 the
United States remains a regulatory patchwork lacking meaningful, binding
national privacy requirements.351 Without clear standards from legislation,
corporations fashion their own protocols and thresholds for responding to
subpoenas, warrants, and other law-enforcement requests.352 Democratic
oversight is dangerously absent, a shortcoming that even some technology
companies are eager to see remedied. As Apple CEO Tim Cook told the
348. See Brewster, supra note 67; Rozenshtein, supra note 345, at 109 (“Intermediaries couple
a proceduralism that rejects voluntary cooperation with government requests to an
aggressive litigiousness against government demands for data and restrictions on
publicizing those requests.” (emphasis omitted)).
349. See Kenneth A. Bamberger & Deirdre K. Mulligan, Privacy on the Books and on the
Ground, 63 STAN. L. REV. 247, 261-63 (2011) (describing the rise of corporate privacy
audits, privacy certification programs, and chief privacy officers).
350. Council Regulation 2016/679, 2016 O.J. (L 119) 1; see The EU General Data Protection
Regulation: Questions and Answers, HUM. RTS. WATCH (June 6, 2018, 5:00 AM EDT),
https://perma.cc/M6A3-RYHV (surveying the GDPR’s various requirements,
including consumer consent, special protections for sensitive information, disclosure,
privacy by design, and the right to be forgotten).
351. See Michael Beckerman, Opinion, Americans Will Pay a Price for State Privacy Laws, N.Y.
TIMES (Oct. 14, 2019), https://perma.cc/RDA7-T8S9 (arguing that federal inaction on
data privacy legislation has resulted in “inconsistent treatment of data depending on a
variety of factors, including the residency of the consumer and the type of businesses
with whom they interact”). The standards that do exist are long outdated, with
Congress continually refusing to update the Electronic Communications Privacy Act
of 1986 (ECPA), which rests on an understanding of technology that is now obsolete.
See ECPA (Part 1): Lawful Access to Stored Content: Hearing Before the Subcomm. on Crime,
Terrorism, Homeland Sec., & Investigations of the H. Comm. on the Judiciary, 113th Cong. 1
(2013) (statement of Rep. F. James Sensenbrenner, Jr., Chairman, Subcomm. on Crime,
Terrorism, Homeland Sec., & Investigations of the H. Comm. on the Judiciary) (“The
Electronic Communications Privacy Act of 1986 . . . is complicated, outdated, and
largely unconstitutional.”); id. at 48 (statement of Richard Salgado, Director, Law
Enforcement and Information Security, Google Inc.) (“The distinctions that ECPA
made in 1986 were foresighted in light of technology at the time. But in 2013, ECPA
frustrates users’ reasonable expectations of privacy.”); see also Kerr, supra note 320, at
1208 (noting that the Stored Communications Act, which forms part of ECPA, “is a bit
outdated and has several gaps in need of legislative attention”).
352. The absence of legislation also allows corporations to self-regulate in other realms
traditionally protected by the Constitution, including speech. See Klonick, supra
note 339, at 1615, 1666-69 (describing how moderation by private online platforms
shapes U.S. speech norms).
442
Against Geofences
74 STAN. L. REV. 385 (2022)
353. Eur. Data Prot. Supervisor, Keynote Address from Tim Cook, CEO, Apple Inc, YOUTUBE, at
05:41-05:50 (Oct. 24, 2018), https://perma.cc/8SAB-ELYW.
354. Id. at 06:15-06:25.
355. Id. at 08:11-08:20, 08:52-08:59.
356. India McKinney & Erica Portnoy, Apple’s Plan to “Think Different” About Encryption
Opens a Backdoor to Your Private Life, ELEC. FRONTIER FOUND. (Aug. 5, 2021),
https://perma.cc/Y7Z4-2SRA; see Frank Bajak & Barbara Ortutay, Apple to Scan U.S.
iPhones for Images of Child Sexual Abuse, AP NEWS (Aug. 6, 2021), https://perma.cc/
2WAD-HSUV.
357. See Carly Page, Apple Quietly Pulls References to Its CSAM Detection Tech After Privacy
Fears, TECHCRUNCH (Dec. 15, 2021, 6:24 AM PST), https://perma.cc/P5AC-MKH9.
358. See Sarah N-Marandi, What’s New in Android Privacy, ANDROID DEVS. BLOG (May 18,
2021), https://perma.cc/4CYN-E6E9.
359. Gerrit De Vynck, Google Announces New Privacy Features for Android Phones—but Stops
Short of Limiting Ad Tracking, WASH. POST (May 18, 2021, 8:53 PM EDT),
https://perma.cc/47XW-ZVJ8.
360. See Press Release, Slickdeals, iPhone Users Spend $101 Every Month on Tech
Purchases, Nearly Double of Android Users, According to a Survey Conducted by
Slickdeals (Oct. 30, 2018), https://perma.cc/4JY7-Y9W2; see also Jim Edwards, Here’s
Why Developers Keep Favoring Apple Over Android, SLATE (Apr. 4, 2014, 1:23 PM),
https://perma.cc/M5QB-9GE8.
443
Against Geofences
74 STAN. L. REV. 385 (2022)
Conclusion
Geofence warrants raise important Fourth Amendment questions. Courts
have yet to engage deeply with issues of probable cause, particularity, and
search expansion as they relate to geofences. And with corporate procedural
demands shaping the legal terrain, law enforcement’s tendency toward
minimally specific warrants has faced little resistance. Without legislative
action or increased judicial scrutiny of geofence warrants, undemocratic,
discretionary corporate policy will continue to shape location-history
protections.
As a closing note: Many commentators have highlighted the utility of
geofence warrants, explaining that they “greatly enhance[] investigations,”363
“help authorities catch criminals,”364 and so on. These comments may be true,
361. See Mayer, supra note 339, at 651 (“In the district courts in particular, federal
prosecutors are consummate repeat players . . . . The result appears to be a (mild) form
of regulatory capture, in which prosecutorial arguments receive unusual deference.”
(footnote omitted)).
362. See supra notes 196-97 and accompanying text.
363. Devon Alan Frankel, Digital Dragnet: Geofence Warrants and Their Constitutional
Issues 1 (2020), https://perma.cc/8Z32-HD3U.
364. Wendy Davis, Law Enforcement Is Using Location Tracking on Mobile Devices to Identify
Suspects, but Is It Unconstitutional?, ABA J. (Dec. 1, 2020, 1:50 AM CST), https://perma.cc/
footnote continued on next page
444
Against Geofences
74 STAN. L. REV. 385 (2022)
but they miss the point. Geofence warrants are indeed a powerful investigative
tool. The same can be said for Carpenter’s cell-site location information,365 the
eavesdrop orders placed on Berger’s conversations,366 and the door-to-door
search used to find and arrest Wilkes.367 Such is the burden of the Bill of
Rights: “Privacy comes at a cost.”368
445