US Supreme Court Deliberates on Privacy Rights in Relation to Smartphone Location Data
The United States Supreme Court is pondering a pivotal case concerning the extent to which expansive warrants for smartphone location data contravene the privacy rights of Americans and potentially breach constitutional protections.
On Monday, the justices engaged in initial arguments surrounding the case of Chatrie v. United States, which highlights law enforcement’s dependency on “geofence warrants” during complex investigations.
The case was initiated by Okello Chatrie, a man whose smartphone location data was instrumental in tracking him down after he committed a bank robbery in Richmond, Virginia, making off with $195,000 in 2019.
Following a guilty plea to armed robbery, Chatrie received a 12-year prison sentence. However, his legal team contends that the evidence utilized against him should not have been permitted in court.
A representative from the US Department of Justice asserted that actions taken publicly while possessing a smartphone inherently carry no expectation of privacy.
“An individual has no reasonable expectation of privacy in movements that anyone could see, which he has permitted a third party to analyze for its own purposes,” declared the US solicitor general, a key legal figure during the Trump administration, in court documents.
Law enforcement agencies are increasingly required to procure sensitive smartphone location data from tech companies concerning individuals present at or near locations of alleged crimes—essentially encapsulating anyone within a designated virtual “fence.”
These geofence warrants do not identify specific targets but compel tech firms to surrender data on every device within a specified geographic area at a given time.
Privacy advocates and various legal scholars perceive these geofence searches as a form of indiscriminate surveillance, ensnaring unsuspecting bystanders.
“Should having a cell phone subject you to extensive law enforcement scrutiny due to crimes occurring nearby?” questioned Paul Ohm, a law professor at Georgetown University who has filed an amicus brief for the case.
He posited that these warrants could lead to the sharing of an individual’s location data with law enforcement simply due to someone being “in the wrong place at the wrong time, or even worse—your phone mistakenly believed you were there,” he warned.
Proponents within law enforcement argue that such warrants are essential for solving crimes, particularly when traditional leads have run dry. Justice Brett Kavanaugh raised concerns regarding “the practical ramifications of failing to solve murders.”
Chatrie had enabled an optional feature on Google, dubbed “location history,” which recorded his whereabouts at intermittent intervals.
The government’s filings indicated that merely a third of active Google account holders opted into this service; Chatrie’s attorneys highlighted that this statistic encompasses over 500 million users.
Subsequent to interviewing witnesses and reviewing surveillance footage of the robbery, investigators lacked leads.
The geofence warrant sought by law enforcement requested Google to release phone location information for a 30-minute timeframe surrounding the robbery, encompassing all cellphones within a 150-meter radius of the bank.
This not only included Chatrie’s data but that of 19 other devices. The detective involved sought additional details on all these individuals; however, after pushback from Google, the inquiry was narrowed down, ultimately focusing on three devices—one of which was Chatrie’s, containing identifiable information.
The US government contended that Chatrie voluntarily allowed Google to collect and utilize his location data, asserting that he was identified through a warrant, although the plaintiff’s counsel claimed this warrant was excessively broad.
In the aftermath of Chatrie’s arrest, Google has altered some of its geofencing protocols. The tech conglomerate has moved to store such location data on personal devices rather than its servers, making compliance with geofencing warrants more complex, as noted by Matthew Tokson, a law professor at the University of Utah.
Nevertheless, the government is increasingly attempting to secure this information directly from cellular service providers and associated companies.
The ramifications of this case are profound, affecting “privacy protections for data housed in cloud services and harvested by consumer applications,” according to a statement from the Electronic Privacy Information Center.
Privacy advocates caution that the repercussions of this case transcend merely those suspected of criminal activity.
“If the government can bypass the necessity of a warrant or link data to a crime, it may surveil protests, abortion clinics, gun ranges, churches, AA meetings, or medical facilities,” Tokson lamented. Some justices expressed apprehension regarding broader implications for privacy as well.
Should the court conclude that geofence warrants do not constitute a search under law enforcement parameters, “our privacy rights could be fundamentally dismantled,” warned Ohm, indicating a looming surge in unregulated police activity.
The Fourth Amendment of the US Constitution safeguards citizens against “unreasonable search and seizure.”
Observations from Monday’s proceedings hinted that several justices may incline towards recognizing these geofence warrants as a form of search, potentially offering solace to privacy advocates.

Justice Sonia Sotomayor voiced her skepticism toward the government’s assertion that ephemeral location data does not unveil critical aspects of an individual’s lifestyle.
She elaborated on the ubiquitous nature of smartphones—accompanying individuals everywhere from bathrooms to cannabis dispensaries and even illicit establishments.
“Whether it pertains to a minute or several weeks, the crux lies not in the duration, but in whether private information—which one justifiably expects to remain private—is being sought,” she articulated.
Source link: Theguardian.com.






