{"id":204205,"date":"2017-07-08T03:53:03","date_gmt":"2017-07-08T07:53:03","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/your-vanishing-location-privacy-why-the-supreme-court-is-giving-wireless-networks-a-look-insider-louisville\/"},"modified":"2017-07-08T03:53:03","modified_gmt":"2017-07-08T07:53:03","slug":"your-vanishing-location-privacy-why-the-supreme-court-is-giving-wireless-networks-a-look-insider-louisville","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/fourth-amendment\/your-vanishing-location-privacy-why-the-supreme-court-is-giving-wireless-networks-a-look-insider-louisville\/","title":{"rendered":"Your vanishing location privacy: Why the Supreme Court is giving wireless networks a look &#8211; Insider Louisville"},"content":{"rendered":"<p><p>Douglas F. Brent  <\/p>\n<p>    By Douglas    F. Brent and Victoria Allen,    Stoll Keenon Ogden    PLLC  <\/p>\n<p>    Editors Note: Victoria Allen is a 2017 Summer Associate    with SKO.  <\/p>\n<p>    The digital age has ushered in a multitude of location    mechanisms on a communication device. Anyone who has paid    roaming fees knows their phone connects to more networks than    just those designated by their wireless provider.  <\/p>\n<p>    Cellphones work by establishing a connection with cell towers.    Each tower projects unique directional signals, so a cellphone    picking up a signal from the north has distinct CSLI, or cell    site location information, from a signal broadcast from the    same towers southern sector. As they manage their networks,    carriers record these connections.  <\/p>\n<p>    With thousands of new microsites with smaller coverage areas,    CSLI rivals GPS as a way to nearly pinpoint a devices    location.  <\/p>\n<p>    CSLI and law enforcement  <\/p>\n<p>    In thousands of cases each year, law enforcement agencies    obtain the CSLI associated with suspects phones under the    Stored Communications Act, instead of securing a search warrant    based on probable cause. This tower dump can reconstruct a    suspects location and movements over time, and is effective in    crime solving.  <\/p>\n<p>    Nearly all federal courts have agreed that getting a tower dump    from cellular providers does not require a warrant. As recently    as 2015, the U.S. Supreme Court declined to review any of those    decisions.  <\/p>\n<p>    But on June 5, the Court granted a defendants request to    review his conviction upheld last year by the Sixth Circuit    Court of Appeals in     USA v. Timothy Carpenter.  <\/p>\n<p>    The Court will consider whether the warrantless seizure and    search of cellphone records revealing Carpenters location and    movements over 127 days violated his Constitutional rights,    specifically Fourth Amendment protection from unreasonable    searches and seizures.  <\/p>\n<p>    Carpenter was nabbed by the FBI in a string of armed robberies    at Radio Shacks and T-Mobile stores around southeastern    Michigan and northwestern Ohio. After receiving a judges order    to obtain records from wireless carriers, the FBI determined    that Carpenter had been less than two miles from each store    when the robberies took place.  <\/p>\n<p>    A Michigan jury convicted Carpenter and co-defendants, and a    district judge sentenced him to multiple 25-year terms. The    sentence was affirmed last year and Carpenter filed for Supreme    Court review, even though two terms ago the Court declined to    review a nearly identical decision from the Eleventh Circuit.  <\/p>\n<p>    Why answer an unasked question?  <\/p>\n<p>    We have written previously about why courts have generally held    a     warrant is not required to access cell site location    information. The privacy protection provided by the Fourth    Amendment guards individuals against unreasonable searches and    seizures by law enforcement. Reasonableness is grounded in    whether the person asserting the protection has an actual    expectation of privacy that society will recognize.  <\/p>\n<p>    But the Supreme Court has held that parties lack an expectation    of privacy in business records created by third parties, like a    telephone company that records the numbers dialed to initiate a    call. Courts dont treat the review of most third-party    transactional records as a search at all.  <\/p>\n<p>    The resulting third-party doctrine, though developed in a    different technology era, remains in use today. Regarding    cellphone network data for geo-location, the records of    wireless service providers have not triggered the same level of    privacy protection as more direct methods of surveillance, like    a hidden tracking device.  <\/p>\n<p>    To fill the gap between Fourth Amendment    protection and no protection at all, Congress created the    Stored Communications Act (SCA), which requires that the    government present reasonable grounds but not probable    cause to obtain records like CSLI. Whether such    information is also protected by the Fourth Amendment has    become a more difficult question as transactional records    become more numerous and more capable of revealing seemingly    private information.  <\/p>\n<p>    Some judges have been uncomfortable    applying the third-party doctrine to pervasive collections,    like thousands of locations recorded over months at a time.    Judges have also questioned whether the doctrine applies to    data not voluntarily conveyed by cellphone users. In the    earliest cases involving phone networks, the information    voluntarily conveyed was the number dialed by a suspect. In    contrast, cellphone users dont so directly influence which    cell tower their phone connects to.  <\/p>\n<p>    The Supreme Courts decision to review Carpenters claims    related to CSLI validates concern that the Fourth Amendment is    being browbeaten into retreat by the swell of information that    is conveyed to third parties. The Courts decision to hear    Carpenter is an indication that the Supreme Court is    ready to reconsider that decades old third-party doctrine in    light of todays technology.  <\/p>\n<p>    And it may be time.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"https:\/\/insiderlouisville.com\/sponsored\/your-vanishing-location-privacy-why-the-supreme-court-is-giving-wireless-networks-a-look\/\" title=\"Your vanishing location privacy: Why the Supreme Court is giving wireless networks a look - Insider Louisville\">Your vanishing location privacy: Why the Supreme Court is giving wireless networks a look - Insider Louisville<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Douglas F. Brent By Douglas F <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/fourth-amendment\/your-vanishing-location-privacy-why-the-supreme-court-is-giving-wireless-networks-a-look-insider-louisville\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94879],"tags":[],"class_list":["post-204205","post","type-post","status-publish","format-standard","hentry","category-fourth-amendment"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/204205"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=204205"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/204205\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=204205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=204205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=204205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}