AI Case Brief
Generate an AI-powered case brief with:
Estimated cost: $0.001 - $0.003 per brief
Full Opinion
delivered the opinion of the Court.
Advances in technology offer great benefits to society in many areas. At the same time, they can pose significant risks to individual privacy rights. This case highlights both principles as we consider recent strides in cell-phone technology. New improvements not only expand our ability to communicate with one another and access the Internet, but the cell phones we carry can also serve as powerful tracking devices able to pinpoint our movements with remarkable precision and accuracy.
In this appeal, we consider whether people have a constitutional right of privacy in cell-phone location information. Cell phones register or identify themselves with nearby cell towers every seven seconds. Cell providers collect data from those contacts, which allows carriers to locate cell phones on a real-time basis and to reconstruct a phone’s movement from recorded data. Those developments, in turn, raise questions about the right to privacy in the location of one’s cell phone.
Historically, the State Constitution has offered greater protection to New Jersey residents than the Fourth Amendment. Under settled New Jersey law, individuals do not lose their right to privacy simply because they have to give information to a third-party provider, like a phone company or bank, to get service. See State v. Reid, 194 N.J. 386, 399, 945 A.2d 26 (2008). In addition, New Jersey case law continues to be guided by whether the government has violated an individual’s reasonable expectation of privacy.
Applying those principles here, we note that disclosure of cellphone location information, which cell-phone users must provide to receive service, can reveal a great deal of personal information about an individual. With increasing accuracy, cell phones can now trace our daily movements and disclose not only where individuals are located at a point in time but also which shops, doctors, religious services, and political events they go to, and with whom they choose to associate. Yet people do not buy cell phones to serve as tracking devices or reasonably expect them to be used
We also recognize that cell-phone location information can be a powerful tool to fight crime. That data will still be available to law enforcement officers upon a showing of probable cause. To be clear, the police will be able to access cell-phone location data with a properly authorized search warrant. If the State can show that a recognized exception to the warrant requirement applies, such as exigent circumstances, then no warrant is needed.
Having a clear set of rules serves two key goals. It protects legitimate privacy interests and also gives guidance to law enforcement officials who carry out important public safety responsibilities. Because today’s decision creates a new rule of law that would disrupt the administration of justice if applied retroactively, the rule will apply to this defendant and prospective cases only.
The issue before the Court arises in the case of a burglary investigation. In an effort to locate the target and his girlfriend, whose safety was in question, the police obtained cell-phone location information from T-Mobile on three occasions during the same evening — without first getting a court order or a warrant.
The trial court found that defendant had a reasonable expectation of privacy in his cell-phone location information but admitted the evidence under the emergency aid exception to the warrant requirement. The Appellate Division affirmed on different grounds. It concluded that defendant lacked a reasonable expectation of privacy in his cell-phone location information and that the police lawfully seized evidence in plain view. The panel had no reason to consider the emergency aid doctrine.
Because we find that cell-phone users have a reasonable expectation of privacy in their cell-phone location information, and that police must obtain a search warrant before accessing that information, we reverse the judgment of the Appellate Division. To determine whether the emergency aid doctrine or some other
I.
We draw the following facts from testimony at the suppression hearing in this case. In January 2006, Detective William Strohkirch of the Middletown Township Police Department was investigating a series of residential burglaries. After a victim told Strohkirch that a cell phone stolen from his home was still active, a court-ordered trace of the phone led the police to a bar in Asbury Park. Strohkirch and two other officers found an individual at the bar with the phone, and they arrested him. He told the police that his cousin, defendant Thomas Earls, had sold him the phone. He added that defendant had been involved in residential burglaries and kept the proceeds in a storage unit that either defendant or his former girlfriend, Desiree Gates, had rented.
The police found Gates the next day at her cousin’s home, and Gates agreed to cooperate in the investigation. Gates confirmed that she had leased a storage facility in Neptune, which defendant had paid for, and the trial court found that she consented to a search of the unit. That issue is not before us.
Several detectives accompanied Gates and her cousin to the storage unit. Because defendant had the only key to the unit, the officers cut the lock. Inside, the police found various items they believed were stolen, including golf clubs, flat-screen televisions, expensive jewelry, and sports memorabilia. Gates denied any knowledge of the items.
Strohkirch spoke with Gates’s cousin the following day, January 26, 2006. She said that she had not seen Gates since the visit to the storage unit and was concerned about Gates’s safety. According to the cousin, defendant learned about Gates’s cooperation and threatened to harm her. The cousin also relayed that defendant and Gates had “some domestic violence situations” in the past. Strohkirch was able to locate an Asbury Park police report from
At some point on January 26, 2006, the police filed a complaint against defendant for receiving stolen property and obtained an arrest warrant. Strohkirch then began to search for defendant and Gates to ensure her safety and to execute the warrant.
In an effort to locate them, the police contacted T-Mobile, a cell-phone service provider, at about 6:00 p.m. At three different times that evening, T-Mobile provided information about the location of a cell phone the police believed defendant had been using. First, at around 8:00 p.m., T-Mobile told the police that the cell phone in question was in the “general location” of Highway 35 in Eatontown.
Second, at about 9:30 p.m., the police again contacted T-Mobile, which reported that the cell phone was being used in the area of Routes 33 and 18 in Neptune. The police searched that area in response but did not find defendant. Finally, after the police called T-Mobile at around 11:00 p.m., the carrier reported that a cell-site tower in the area of Route 9 in Howell had been used. At no point did the police seek a warrant for the three traces.
The officers decided to call for backup from the Howell Police Department out of concern for a potential hostage situation. At about 1:30 a.m., additional officers arrived, but they left the scene because of an emergency elsewhere in Howell. Strohkireh and Deickman remained and called for additional officers from their department. Strohkireh testified that he did not believe that two officers could safely apprehend defendant.
At about 3:00 a.m., two hours after Strohkireh and Deickman first arrived at the motel, two police officers from Middletown arrived. At that point, Deickman spoke with a clerk in the motel office who confirmed where Gates and defendant were staying. Deickman called their room from the clerk’s office to ask Gates to come outside. When defendant and Gates opened the door, the police arrested him. The police saw a flat-screen television and several pieces of luggage on the floor of the room. Inside a closed dresser drawer, the police found a pillowcase tied in a knot.
The police brought defendant and the items to headquarters, where defendant signed eonsent-to-seareh forms. Inside the luggage, the police found stolen property and marijuana. The pillowcase contained stolen jewelry.
A Monmouth County Grand Jury returned an indictment against defendant charging him with third-degree burglary, N.J.S.A. 2C:18-2, third-degree theft, N.J.S.A. 2C:20-3a, third-degree receiving stolen property, N.J.S.A. 2C:20-7a, and fourth-degree possession of a controlled dangerous substance (marijuana), N.J.S.A. 2C:35-10a(3).
The trial court found that defendant had a reasonable expectation of privacy in the location of his cell phone under State law and that the police should have obtained a warrant before tracking defendant via cell-tower information from T-Mobile. Nonetheless, the court concluded that the emergency aid exception to the warrant requirement applied. In the trial court’s judgment, recent events — including Gates’s cooperation with the police, defendant’s threat to harm her, her absence, and her prior domestic-violence complaint against defendant — provided an objectively reasonable basis to believe that Gates was in physical danger. The trial court also found that the television and luggage in the motel room were lawfully seized in plain view, that the State had not established that defendant or Gates orally consented to a search of the motel room, and that defendant gave written consent at headquarters to search the luggage.
Defendant pled guilty on September 28, 2007 to third-degree burglary and third-degree theft. On November 2, 2007, the court sentenced defendant in accordance with a plea agreement to an aggregate, extended term of seven years’ imprisonment with three years of parole ineligibility. The Appellate Division affirmed defendant’s sentence on June 23, 2009, and later allowed defendant to reopen his appeal to challenge the suppression ruling.
In a published opinion, the Appellate Division affirmed the trial court’s order for different reasons. State v. Earls, 420 N.J.Super. 583, 591, 22 A.3d 114 (App.Div.2011). The appellate panel “concludeLdJ that defendant had no constitutionally protected privacy interest in preventing T-Mobile from disclosing information concerning the general location of his cell phone.” Ibid. The court
We granted defendant’s petition for certification “limited to the issues of the validity of defendant’s arrest based on law enforcement’s use of information from defendant’s cell phone provider about the general location of the cell phone and the application of the plain view exception to the warrant requirement.” 209 N.J. 97, 35 A.3d 680 (2011). We also granted motions from the American Civil Liberties Union of New Jersey (ACLU) and the Association of Criminal Defense Lawyers (ACDL), who filed a joint application, and the Electronic Privacy Information Center (EPIC) to participate as amici curiae.
We heard oral arguments on October 22, 2012. Afterward, we asked the parties and amici to address whether a determination that a warrant is required to obtain cell-phone location data would constitute a new rule of law and whether such a ruling should be applied retroactively. We also requested information about the current state of technology relating to cell-phone location tracking and whether cell-phone users today have a reasonable expectation of privacy in modern cell phones. The case was reargued on January 29, 2013.
II.
Defendant argues that he had a reasonable expectation of privacy in his cell-phone location information and that a warrant was therefore needed before law enforcement officials could access that information. He submits that technology now allows law enforcement to track the location of cell phones in an intrusive, continuous manner and thereby threatens to erode protected
In a supplemental brief, defendant maintains that it would be a logical extension of existing precedent to require police to get a warrant before they can request cell-phone location data. Such an approach, he claims, would not constitute a new rule of law and should be applied retroactively.
The Attorney General claims that defendant had no reasonable expectation of privacy in the generalized location of his cell phone. The State contends that the non-specific information it obtained during a brief period of time directed officers to public areas and differed from today’s more sophisticated and precise tracking data. The State acknowledges that location information available today could raise constitutional concerns and that, unless there is an emergency, police now typically obtain warrants before seeking that type of data. To the extent defendant had a privacy interest in the location of his cell phone, the Attorney General asserts that the emergency aid exception to the warrant requirement would apply here.
In its supplemental brief, the State submits that imposing a warrant requirement would amount to a new rule of law that should apply prospectively only.
The arguments of amici amplify defendant’s position on the constitutional issue. The ACLU and ACDL, in a joint brief, contend that there is a reasonable expectation of privacy in cellphone location information under the State Constitution. According to the two amicus groups, such information can reveal intimate details about one’s affairs and intrude upon the constitutional right of association. The groups therefore argue that law enforcement must get a warrant supported by probable cause before it can gather such information. Absent a warrant, they argue that the exclusionary rule should apply.
EPIC also maintains that individuals have a reasonable expectation of privacy in the location of their cell phones. EPIC argues that real-time cell-phone location tracking can be more invasive than Global Positioning System (GPS) tracking and involves a level of intrusion that a reasonable person would not anticipate. In its supplemental brief, EPIC offered helpful details about the current state of cell-phone technology.
III.
For a better understanding of the issues presented, we begin by examining how cell phones function. We draw on congressional testimony by Professor Matt Blaze of the University of Pennsylvania, see ECPA Reform and the Revolution in Location Based Technologies and Sendees: Hearing Before the Subcomm. on the Constitution, Civil Rights, and Civil Liberties of the H. Comm, on the Judiciary, 111th Cong. 12-30 (2010) (statement of Prof. Matt Blaze) (“Blaze Testimony”), and other sources.
A basic cell phone operates like a scanning radio. Cell phones use radio waves to communicate between a user’s handset and a telephone network. Id. at 20. To connect with the local telephone network, the Internet, or other wireless networks, cell-phone providers maintain an extensive network of cell sites, or radio base stations, in the geographic areas they serve. In re U.S. Historical Cell Site Data, 747 F.Supp.2d 827, 831 (S.D.Tex.2010).
Whenever a cell phone is turned on, it searches for a signal and automatically registers or identifies itself with the nearest cell site — the one with the strongest signal. Blaze Testimony, supra, at 20. The process is automatic. Cell phones re-scan every seven seconds, or whenever the signal strength weakens, even when no calls are made. See In re Pen Register & Trap/Trace Device with Cell Site Location Auth., 396 F.Supp.2d 747, 750 (S.D.Tex.2005).
The degree of accuracy in tracking a cell phone depends on the type of mobile device, the type of tracking method, the service provider, and other factors. We consider two main types of mobile phone devices: cell phones and smartphones. Smart-phones are an advanced version of basic cell phones that can be used not only to make calls and send text messages but also to connect to the Internet, among other features. See Stephanie K. Pell & Christopher Soghoian, Can You See Me Now? Toward Reasonable Standards for Law Enforcement Access to Location Data That Congress Could Enact, 27 Berkeley Tech. L.J. 117, 129 (2012). Those connections create countless cell-site records that facilitate tracking. See id. at 130; Blaze Testimony, supra, at 27.
There are two primary methods to track mobile devices: network-based (cell-site) and handset-based (GPS). Blaze Testimony, supra, at 20-21.
Network-based location tracking relies on the network of cell sites and antennas described above. As mobile devices register with a cell site, make a call, or download data, they “communicate” with a station through radio signal data that is collected and analyzed at the provider’s cell towers. Id. at 22. That process enables carriers to identify “the position of virtually every handset active in the network at all times.” Ibid. The information is typically created and stored in a database. Id. at 27. A log is also ordinarily created each time a call is made or data downloaded. Ibid.; Pell & Soghoian, supra, 27 Berkeley Tech. L.J. at 128.
The accuracy of the location information depends in part on the size of the “sector”' — the area served by the cell tower. Blaze
From 2000 to 2012, as cell phones became more popular, the number of cell towers in the United States increased from 104,288 to 301,779. CTIA — The Wireless Ass’n, Wireless Industry Survey Results (Dec. 2012), http://files.CTIA.org/pdf/CTIA_Survey_YE_ 2012_Graphics-FINAL.pdf. As a direct consequence, not only are carriers able to accommodate new customers and provide better reception, but they can also locate cell phones with greater precision. In dense urban areas and environments that use “microcells” — newer, smaller cellular base stations — a sector’s coverage area can be “quite small indeed.” Blaze Testimony, supra, at 25 (explaining that microeells can “sometimes effectively identify! ] ... individual floors and rooms within buildings”); Historical Cell Site Data, supra, 747 F.Supp.2d at 833 (noting “microcell has a range of 40 feet” (citations omitted)). New Jersey, of course, is the most densely populated state in the nation. See U.S. Census Bureau, Resident Population Data: Population Density (2010), http://www.census.gov/2010census/data/apportionment-dens-text. php.
Handset-based tracking uses GPS technology to locate cell users. Blaze Testimony, supra, at 21. The GPS system is comprised of “orbiting satellites that provide navigation data to military and civilian users” throughout the world. U.S. Air Force, Global Positioning System Factsheet (Sept. 15, 2010), http://www. af.mil/information/factsheets/factsheet.asp?id=119. Most modern phones contain GPS receivers, see Jagdish Rebello, Four Out of Five Cell Phones to Integrate GPS by End of 2011 (July 16, 2010), http://www.isuppli.com/Mobile-and-Wireless-Communications/ News/Pages/Four-ouWof-Five-Cell-Phones-to-Integrate-GPSby-End-of-2011.aspx, and “the user’s phone calculates its own location” with “GPS satellite receiver hardware built in to the handset,” Blaze Testimony, supra, at 20-21. GPS technology
Many modern cell phones contain a GPS chip that can be used for emergency tracking. For example, new handsets sold by Verizon Wireless since December 31, 2003 have a chip in the phone that helps provide location information. See Verizon Wireless, Wireless Issues: Enhanced 911 (2013), http://aboutus. verizonwireless.com/eommitmenVsafety_security/.
Each carrier has its own practice to collect and retain location data. Blaze Testimony, supra, at 27. With more accurate information available, carriers can now collect more precise data about the location of cell phones that their customers use. Ibid.; Historical Cell Site Data, supra, 747 F.Supp.2d at 833-34.
The number of users has increased steadily as well. From 2000 to 2012, the estimated number of wireless devices in the United States grew from 109.4 million to 326.4 million. CTIA, supra. As of May 2013, the Pew Research Center reported that 91 percent of American adults have a cell phone and 56 percent have a smart-phone. Pew Research Ctr., Pew Internet: Mobile (June 6, 2013), http://pewinternet.org/Commentary/2012/February/Pew-InternetMobile.aspx.
IV.
We turn next to relevant federal and state law relating to location information.
A.
The United States Constitution guarantees “[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures____” U.S. Const. amend. IV. To determine whether a violation of the Fourth Amendment had occurred, earlier cases focused on whether the government had violated an individual’s reasonable expectation of privacy. See, e.g., Kyllo v. United States, 533 U.S. 27, 31-33, 121
Two cases after Katz addressed the government’s use of beepers or electronic tracking devices. See United States v. Knotts, 460 U.S. 276, 103 S.Ct. 1081, 75 L.Ed.2d 55 (1983); United States v. Karo, 468 U.S. 705, 104 S.Ct. 3296, 82 L.Ed.2d 530 (1984). In Knotts, supra, the United States Supreme Court upheld the warrantless monitoring of a beeper that law enforcement had placed in a container of chloroform. 460 U.S. at 285, 103 S.Ct. at 1087, 75 L.Ed.2d at 64. The decision relied heavily on the public nature of the target’s activities. Police followed the target’s ear, where the container had been placed, as it traveled on public streets and highways. Id. at 281, 103 S.Ct. at 1085, 75 L.Ed.2d at 62. They maintained visual contact with the car and used a monitoring device located in a helicopter when they lost the signal from the beeper. Id. at 278, 103 S.Ct. at 1083, 75 L.Ed.2d at 60. Because the Court concluded that the defendant had no reasonable expectation of privacy in his car’s movement on public roads, id. at 281-82, 103 S.Ct. at 1085-86, 75 L.Ed.2d at 62, no warrant was required. If “dragnet-type law enforcement practices” occur in the future, the Court observed, “there will be time enough then to determine whether different constitutional principles may be applicable.” Id. at 284, 103 S.Ct. at 1086, 75 L.Ed.2d at 63.
In Karo, supra, by contrast, the Supreme Court reviewed the warrantless monitoring of a beeper that “reveal[ed] information that could not have been obtained through visual surveillance.” 468 U.S. at 707, 104 S.Ct. at 3299, 82 L.Ed.2d at 536. The police had placed a beeper in a container of ether, which the target transported on public roads but also stored in private homes. Id. at 708-09, 104 S.Ct. at 3299-300, 82 L.Ed.2d at 537. The Court found that the monitoring violated justifiable Fourth Amendment interests in the privacy of a home. Id. at 714, 104 S.Ct. at 3303, 82 L.Ed.2d at 541. As the Court explained, “[e]ven if visual surveil
By recent standards, the devices used were relatively primitive. The beeper in Knotts, supra, had a limited range and required physical surveillance so that law enforcement would be close enough to receive a signal. 460 U.S. at 278, 103 S.Ct. at 1083, 75 L.Ed.2d at 60. That is no longer the case. With more modern cell phones, as discussed above, data is collected remotely by way of contacts with cell towers, and the information is automatically recorded and stored. Also, radio signals travel to cell towers from both public and private locations.
Decisions that have applied Knotts and/or Karo to cell-site data are divided. Some have found that the government’s use of cell-site information to get a general location does not violate the Fourth Amendment. See, e.g., United States v. Skinner, 690 F.3d 772, 777-78 (6th Cir.2012); United States v. Forest, 355 F.3d 942, 950-52 (6th Cir.2004), remanded on unrelated sentencing grcmnds by 543 U.S. 1100, 125 S.Ct. 1050, 160 L.Ed.2d 1001 (2005); United States v. Navas, 640 F.Supp.2d 256, 263-64 (S.D.N.Y.2009), rev’d, on other grounds, 597 F.3d 492 (2d Cir.2010); Devega v. State, 286 Ga. 448, 689 S.E.2d 293, 300-01 (2010). Other courts have found that the Fourth Amendment requires that police get a warrant to obtain cell-site data. See, e.g., In re U.S. for Order Authorizing Release of Historical Cell-Site Info., 809 F.Supp.2d 113, 119-20 (E.D.N.Y.2011) (seeking long-term, historical information); Historical Cell Site Data, supra, 747 F.Supp.2d at 846 (same); see also In re U.S. for Order Directing Provider of Elec. Commc’n Serv. to Disclose Records to Gov’t, 620 F.3d 304, 313, 319 (3d Cir.2010) (allowing government to obtain cell-site location information on showing of less than probable cause but recognizing
A recent decision of the United States Supreme Court that rests on principles of trespass has altered the landscape somewhat. See United States v. Jones, 565 U.S. -, 132 S.Ct. 945, 181 L.Ed.2d 911 (2012). Jones held that the physical installation of a GPS device on a car amounted to a Fourth Amendment search and required a warrant. Id. at -, 132 S.Ct. at 949, 181 L.Ed.2d at 918. Federal officers had attached a GPS tracking device to a ear, without a valid warrant, and pinpointed the car’s movements to within 50 to 100 feet for nearly one month. Id. at —, 132 S.Ct. at 948, 181 L.Ed.2d at 916-17.
The Court unanimously found a violation of the Fourth Amendment but split on the underlying basis. The majority opinion by Justice Sealia, joined by Chief Justice Roberts and Justices Kennedy, Thomas, and Sotomayor, held that the installation of the device constituted a trespass on private property. Id. at -, 132 S.Ct. at 949-54, 181 L.Ed.2d at 918-23. The decision did not
Yet five members of the Court discussed expectation of privacy concerns. Justice Alito, in a concurring opinion joined by Justices Ginsburg, Breyer, and Kagan, would have analyzed the case under Katz. See id. at -, 132 S.Ct. at 958, 181 L.Ed.2d at 927 (Alito, J., concurring). In light of modern cell phones and other wireless devices that “permit more precise tracking,” and allow carriers to “record the location of users,” Justice Alito would have asked “whether the use of GPS tracking in a particular case involved a degree of intrusion that a reasonable person would not have anticipated.” Id. at ——, 132 S.Ct. at 963-64, 181 L.Ed.2d at 933-34. In his view, “relatively short-term monitoring of a person’s movements on public streets accords with expectations of privacy that our society has recognized as reasonable”; “[b]ut the use of longer term GPS monitoring in investigations of most offenses impinges on expectations of privacy.” Id. at ——, 132 S.Ct. at 964,