throbber

`(Slip Opinion)
`
`OCTOBER TERM, 2017
`
`
`Syllabus
`
`
`1
`
` NOTE: Where it is feasible, a syllabus (headnote) will be released, as is
`
`
`
` being done in connection with this case, at the time the opinion is issued.
`
`
`
` The syllabus constitutes no part of the opinion of the Court but has been
`
` prepared by the Reporter of Decisions for the convenience of the reader.
`
` See United States v. Detroit Timber & Lumber Co., 200 U. S. 321, 337.
`
`
`SUPREME COURT OF THE UNITED STATES
`
`
`
` Syllabus
`
` CARPENTER v. UNITED STATES
`
`CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR
`
`THE SIXTH CIRCUIT
` No. 16–402. Argued November 29, 2017—Decided June 22, 2018
`
`Cell phones perform their wide and growing variety of functions by con-
`
`tinuously connecting to a set of radio antennas called “cell sites.”
`
`Each time a phone connects to a cell site, it generates a time-stamped
`record known as cell-site location information (CSLI). Wireless carri-
`
`ers collect and store this information for their own business purposes.
`Here, after the FBI identified the cell phone numbers of several rob-
`
`bery suspects, prosecutors were granted court orders to obtain the
`
`
`suspects’ cell phone records under the Stored Communications Act.
`
`Wireless carriers produced CSLI for petitioner Timothy Carpenter’s
`
`phone, and the Government was able to obtain 12,898 location points
`
`cataloging Carpenter’s movements over 127 days—an average of 101
`
`data points per day. Carpenter moved to suppress the data, arguing
`
`that the Government’s seizure of the records without obtaining a
`warrant supported by probable cause violated the Fourth Amend-
`
`ment. The District Court denied the motion, and prosecutors used
`
`the records at trial to show that Carpenter’s phone was near four of
`
`the robbery locations at the time those robberies occurred. Carpen-
`ter was convicted. The Sixth Circuit affirmed, holding that Carpen-
`ter lacked a reasonable expectation of privacy in the location infor-
`
`mation collected by the FBI because he had shared that information
`
`with his wireless carriers.
`Held:
`
`
`
`1. The Government’s acquisition of Carpenter’s cell-site records
`
`
`was a Fourth Amendment search. Pp. 4–18.
`
`
`
`
`(a) The Fourth Amendment protects not only property interests
`
`but certain expectations of privacy as well. Katz v. United States, 389
`U. S. 347, 351. Thus, when an individual “seeks to preserve some-
`
`
`thing as private,” and his expectation of privacy is “one that society is
`
`
`
`

`

`2
`
`
`
`
`CARPENTER v. UNITED STATES
`
`
`Syllabus
`
`prepared to recognize as reasonable,” official intrusion into that
`
`sphere generally qualifies as a search and requires a warrant sup-
`
`ported by probable cause. Smith v. Maryland, 442 U. S. 735, 740 (in-
`ternal quotation marks and alterations omitted). The analysis re-
`garding which expectations of privacy are entitled to protection is
`informed by historical understandings “of what was deemed an un-
`reasonable search and seizure when [the Fourth Amendment] was
`adopted.” Carroll v. United States, 267 U. S. 132, 149. These Found-
`ing-era understandings continue to inform this Court when applying
`the Fourth Amendment to innovations in surveillance tools. See, e.g.,
`
`
`Kyllo v. United States, 533 U. S. 27. Pp. 4–7.
`
`
`
`(b) The digital data at issue—personal location information
`maintained by a third party—does not fit neatly under existing prec-
`
`edents but lies at the intersection of two lines of cases. One set ad-
`
`dresses a person’s expectation of privacy in his physical location and
`
`movements. See, e.g., United States v. Jones, 565 U. S. 400 (five Jus-
`
`tices concluding that privacy concerns would be raised by GPS track-
`ing). The other addresses a person’s expectation of privacy in infor-
`mation voluntarily turned over to third parties. See United States v.
`
`Miller, 425 U. S. 435 (no expectation of privacy in financial records
`held by a bank), and Smith, 442 U. S. 735 (no expectation of privacy
`in records of dialed telephone numbers conveyed to telephone compa-
`ny). Pp. 7–10.
`
`
`
`(c) Tracking a person’s past movements through CSLI partakes
`
`of many of the qualities of GPS monitoring considered in Jones—it is
`
`detailed, encyclopedic, and effortlessly compiled. At the same time,
`however, the fact that the individual continuously reveals his loca-
`
`tion to his wireless carrier implicates the third-party principle of
`
`
`Smith and Miller. Given the unique nature of cell-site records, this
`
`Court declines to extend Smith and Miller to cover them. Pp. 10–18.
`
`
`
`(1) A majority of the Court has already recognized that indi-
`
`viduals have a reasonable expectation of privacy in the whole of their
`physical movements. Allowing government access to cell-site rec-
`ords—which “hold for many Americans the ‘privacies of life,’ ” Riley v.
`
`
`California, 573 U. S. ___, ___—contravenes that expectation. In fact,
`
`historical cell-site records present even greater privacy concerns than
`
`
`the GPS monitoring considered in Jones: They give the Government
`near perfect surveillance and allow it to travel back in time to retrace
`a person’s whereabouts, subject only to the five-year retention poli-
`cies of most wireless carriers. The Government contends that CSLI
`data is less precise than GPS information, but it thought the data ac-
`curate enough here to highlight it during closing argument in Car-
`penter’s trial. At any rate, the rule the Court adopts “must take ac-
`
`count of more sophisticated systems that are already in use or in
`
`
`
`

`

`3
`
`
`
`
`Cite as: 585 U. S. ____ (2018)
`
`
`Syllabus
`
`development,” Kyllo, 533 U. S., at 36, and the accuracy of CSLI is
`rapidly approaching GPS-level precision. Pp. 12–15.
`(2) The Government contends that the third-party doctrine
`governs this case, because cell-site records, like the records in Smith
`and Miller, are “business records,” created and maintained by wire-
`
`
`less carriers. But there is a world of difference between the limited
`
`types of personal information addressed in Smith and Miller and the
`
`exhaustive chronicle of location information casually collected by
`
`wireless carriers.
`
`The third-party doctrine partly stems from the notion that an indi-
`vidual has a reduced expectation of privacy in information knowingly
`
`shared with another. Smith and Miller, however, did not rely solely
`
`on the act of sharing. They also considered “the nature of the partic-
`ular documents sought” and limitations on any “legitimate ‘expecta-
`
`tion of privacy’ concerning their contents.” Miller, 425 U. S., at 442.
`
`In mechanically applying the third-party doctrine to this case the
`
`Government fails to appreciate the lack of comparable limitations on
`
`the revealing nature of CSLI.
`
`Nor does the second rationale for the third-party doctrine—
`voluntary exposure—hold up when it comes to CSLI. Cell phone lo-
`
`cation information is not truly “shared” as the term is normally un-
`derstood. First, cell phones and the services they provide are “such a
`
`pervasive and insistent part of daily life” that carrying one is indis-
`pensable to participation in modern society. Riley, 573 U. S., at ___.
`
`
`Second, a cell phone logs a cell-site record by dint of its operation,
`
`without any affirmative act on the user’s part beyond powering up.
`Pp. 15–17.
`
`
`
`(d) This decision is narrow. It does not express a view on matters
`not before the Court; does not disturb the application of Smith and
`Miller or call into question conventional surveillance techniques and
`
`tools, such as security cameras; does not address other business rec-
`ords that might incidentally reveal location information; and does not
`consider other collection techniques involving foreign affairs or na-
`tional security. Pp. 17–18.
`
`2. The Government did not obtain a warrant supported by proba-
`ble cause before acquiring Carpenter’s cell-site records. It acquired
`those records pursuant to a court order under the Stored Communi-
`
`cations Act, which required the Government to show “reasonable
`grounds” for believing that the records were “relevant and material to
`
`an ongoing investigation.” 18 U. S. C. §2703(d). That showing falls
`well short of the probable cause required for a warrant. Consequent-
`
`ly, an order issued under §2703(d) is not a permissible mechanism for
`
`accessing historical cell-site records. Not all orders compelling the
`
`production of documents will require a showing of probable cause. A
`
`
`
`
`
`
`
`
`
`

`

`4
`
`
`
`
` CARPENTER v. UNITED STATES
`
`
`Syllabus
`warrant is required only in the rare case where the suspect has a le-
`gitimate privacy interest in records held by a third party. And even
`
` though the Government will generally need a warrant to access
`
`CSLI, case-specific exceptions—e.g., exigent circumstances—may
`
`support a warrantless search. Pp. 18–22.
` 819 F. 3d 880, reversed and remanded.
`ROBERTS, C. J., delivered the opinion of the Court, in which GINS-
`
`
`BURG, BREYER, SOTOMAYOR, and KAGAN, JJ., joined. KENNEDY, J., filed a
`
`
`
`
`dissenting opinion, in which THOMAS and ALITO, JJ., joined. THOMAS, J.,
`
`
`
`
`
`filed a dissenting opinion. ALITO, J., filed a dissenting opinion, in which
`THOMAS, J., joined. GORSUCH, J., filed a dissenting opinion.
`
`
`
`

`

`
`
`
`
` Cite as: 585 U. S. ____ (2018)
`
`Opinion of the Court
`
`1
`
`
` NOTICE: This opinion is subject to formal revision before publication in the
`
`
`
` preliminary print of the United States Reports. Readers are requested to
`
` notify the Reporter of Decisions, Supreme Court of the United States, Wash-
`
` ington, D. C. 20543, of any typographical or other formal errors, in order
`
`
` that corrections may be made before the preliminary print goes to press.
`
`
`
`
`SUPREME COURT OF THE UNITED STATES
`
`
`
`_________________
`
` No. 16–402
`_________________
` TIMOTHY IVORY CARPENTER, PETITIONER v.
`
`
` UNITED STATES
`
`ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF
`
`
`APPEALS FOR THE SIXTH CIRCUIT
`
`[June 22, 2018]
`
`CHIEF JUSTICE ROBERTS delivered the opinion of the
`Court.
`
`This case presents the question whether the Govern-
`
`ment conducts a search under the Fourth Amendment
`when it accesses historical cell phone records that provide
`
`a comprehensive chronicle of the user’s past movements.
`I
`
`A
`
`There are 396 million cell phone service accounts in the
`
`
`United States—for a Nation of 326 million people. Cell
`phones perform their wide and growing variety of func-
`tions by connecting to a set of radio antennas called “cell
`sites.” Although cell sites are usually mounted on a tower,
`
`they can also be found on light posts, flagpoles, church
`
`steeples, or the sides of buildings. Cell sites typically have
`
`several directional antennas that divide the covered area
`
`into sectors.
`Cell phones continuously scan their environment look-
`
`ing for the best signal, which generally comes from the
`closest cell site. Most modern devices, such as
`
`smartphones, tap into the wireless network several times
`
`
`
`
`

`

`2
`
`
`
`
` CARPENTER v. UNITED STATES
`
`Opinion of the Court
`a minute whenever their signal is on, even if the owner is
`not using one of the phone’s features. Each time the
`
`phone connects to a cell site, it generates a time-stamped
`record known as cell-site location information (CSLI). The
`precision of this information depends on the size of the
`geographic area covered by the cell site. The greater the
`
`concentration of cell sites, the smaller the coverage area.
`
`As data usage from cell phones has increased, wireless
`
`carriers have installed more cell sites to handle the traffic.
`That has led to increasingly compact coverage areas,
`especially in urban areas.
`
`
`Wireless carriers collect and store CSLI for their own
`business purposes, including finding weak spots in their
`network and applying “roaming” charges when another
`carrier routes data through their cell sites. In addition,
`
`wireless carriers often sell aggregated location records to
`data brokers, without individual identifying information of
`the sort at issue here. While carriers have long retained
`CSLI for the start and end of incoming calls, in recent
`years phone companies have also collected location infor-
`mation from the transmission of text messages and rou-
`tine data connections. Accordingly, modern cell phones
`generate increasingly vast amounts of increasingly precise
`CSLI.
`
`
`
`
`B
`
`In 2011, police officers arrested four men suspected of
`robbing a series of Radio Shack and (ironically enough) T-
`Mobile stores in Detroit. One of the men confessed that,
`over the previous four months, the group (along with a
`
`rotating cast of getaway drivers and lookouts) had robbed
`nine different stores in Michigan and Ohio. The suspect
`identified 15 accomplices who had participated in the
`
`heists and gave the FBI some of their cell phone numbers;
`the FBI then reviewed his call records to identify addi-
`tional numbers that he had called around the time of the
`
`
`
`

`

`
`
`
`
` Cite as: 585 U. S. ____ (2018)
`
`Opinion of the Court
`
`3
`
`
`
`robberies.
`
`Based on that information, the prosecutors applied for
`court orders under the Stored Communications Act to
`
`obtain cell phone records for petitioner Timothy Carpenter
`
`and several other suspects. That statute, as amended in
`
`1994, permits the Government to compel the disclosure of
`
`certain telecommunications records when it “offers specific
`and articulable facts showing that there are reasonable
`grounds to believe” that the records sought “are relevant
`
`and material to an ongoing criminal investigation.” 18
`
`U. S. C. §2703(d). Federal Magistrate Judges issued two
`
`orders directing Carpenter’s wireless carriers—MetroPCS
`and Sprint—to disclose “cell/site sector [information] for
`
`[Carpenter’s] telephone[ ] at call origination and at call
`
`termination for incoming and outgoing calls” during the
`
`four-month period when the string of robberies occurred.
`
`App. to Pet. for Cert. 60a, 72a. The first order sought 152
`
`days of cell-site records from MetroPCS, which produced
`records spanning 127 days. The second order requested
`
`seven days of CSLI from Sprint, which produced two days
`of records covering the period when Carpenter’s phone was
`“roaming” in northeastern Ohio. Altogether the Govern-
`ment obtained 12,898 location points cataloging Carpen-
`
`ter’s movements—an average of 101 data points per day.
`
`
`Carpenter was charged with six counts of robbery and
`
`an additional six counts of carrying a firearm during a
`federal crime of violence. See 18 U. S. C. §§924(c), 1951(a).
`Prior to trial, Carpenter moved to suppress the cell-site
`
`data provided by the wireless carriers. He argued that the
`
`Government’s seizure of the records violated the Fourth
`Amendment because they had been obtained without a
`
`warrant supported by probable cause. The District Court
`denied the motion. App. to Pet. for Cert. 38a–39a.
`
`At trial, seven of Carpenter’s confederates pegged him
`as the leader of the operation. In addition, FBI agent
`Christopher Hess offered expert testimony about the cell-
`
`
`
`
`
`

`

`4
`
`
`
`
` CARPENTER v. UNITED STATES
`
`Opinion of the Court
`site data. Hess explained that each time a cell phone taps
`
`into the wireless network, the carrier logs a time-stamped
`record of the cell site and particular sector that were used.
`
`With this information, Hess produced maps that placed
`Carpenter’s phone near four of the charged robberies. In
`
`the Government’s view, the location records clinched the
`case: They confirmed that Carpenter was “right where the
`. . . robbery was at the exact time of the robbery.” App.
`
`131 (closing argument). Carpenter was convicted on all
`but one of the firearm counts and sentenced to more than
`
`100 years in prison.
`The Court of Appeals for the Sixth Circuit affirmed. 819
`
`
`F. 3d 880 (2016). The court held that Carpenter lacked a
`
`reasonable expectation of privacy in the location infor-
`mation collected by the FBI because he had shared that
`information with his wireless carriers. Given that cell
`phone users voluntarily convey cell-site data to their
`
`carriers as “a means of establishing communication,” the
`court concluded that the resulting business records are not
`
`entitled to Fourth Amendment protection. Id., at 888
`(quoting Smith v. Maryland, 442 U. S. 735, 741 (1979)).
`We granted certiorari. 582 U. S. ___ (2017).
`
`
`II
`
`
`A
`
`The Fourth Amendment protects “[t]he right of the
`
`
`people to be secure in their persons, houses, papers, and
`
` effects, against unreasonable searches and seizures.” The
`
`“basic purpose of this Amendment,” our cases have recog-
`nized, “is to safeguard the privacy and security of individ-
`uals against arbitrary invasions by governmental offi-
`cials.” Camara v. Municipal Court of City and County of
`
`
`San Francisco, 387 U. S. 523, 528 (1967). The Founding
`generation crafted the Fourth Amendment as a “response
`
`to the reviled ‘general warrants’ and ‘writs of assistance’ of
`the colonial era, which allowed British officers to rum-
`
`
`
`

`

`5
`
`
`Cite as: 585 U. S. ____ (2018)
`
`Opinion of the Court
`mage through homes in an unrestrained search for evi-
`dence of criminal activity.” Riley v. California, 573 U. S.
`
`___, ___ (2014) (slip op., at 27). In fact, as John Adams
`recalled, the patriot James Otis’s 1761 speech condemning
`writs of assistance was “the first act of opposition to the
`
`arbitrary claims of Great Britain” and helped spark the
`
`
`Revolution itself. Id., at ___–___ (slip op., at 27–28) (quot-
`ing 10 Works of John Adams 248 (C. Adams ed. 1856)).
`
`
`For much of our history, Fourth Amendment search
`doctrine was “tied to common-law trespass” and focused on
`whether the Government “obtains information by physi-
`
`cally intruding on a constitutionally protected area.”
`
`
`United States v. Jones, 565 U. S. 400, 405, 406, n. 3 (2012).
`
`More recently, the Court has recognized that “property
`
`rights are not the sole measure of Fourth Amendment
`
`
`violations.” Soldal v. Cook County, 506 U. S. 56, 64
`
`(1992). In Katz v. United States, 389 U. S. 347, 351 (1967),
`
`we established that “the Fourth Amendment protects
`people, not places,” and expanded our conception of the
`Amendment to protect certain expectations of privacy as
`well. When an individual “seeks to preserve something as
`private,” and his expectation of privacy is “one that society
`is prepared to recognize as reasonable,” we have held that
`official intrusion into that private sphere generally quali-
`fies as a search and requires a warrant supported by
`probable cause. Smith, 442 U. S., at 740 (internal quota-
`tion marks and alterations omitted).
`
`
`Although no single rubric definitively resolves which
`expectations of privacy are entitled to protection,1 the
`
`——————
`1 JUSTICE KENNEDY believes that there is such a rubric—the “proper-
`
`
`
`ty-based concepts” that Katz purported to move beyond. Post, at 3
`(dissenting opinion). But while property rights are often informative,
`
`
`our cases by no means suggest that such an interest is “fundamental”
`or “dispositive” in determining which expectations of privacy are
`legitimate. Post, at 8–9. JUSTICE THOMAS (and to a large extent
`JUSTICE GORSUCH) would have us abandon Katz and return to an
`
`
`
`
`
`
`
`
`
`
`

`

`6
`
`
`
`CARPENTER v. UNITED STATES
`
`Opinion of the Court
` analysis is informed by historical understandings “of what
`
`was deemed an unreasonable search and seizure when
`[the Fourth Amendment] was adopted.” Carroll v. United
`States, 267 U. S. 132, 149 (1925). On this score, our cases
`
`have recognized some basic guideposts. First, that the
`
`Amendment seeks to secure “the privacies of life” against
`“arbitrary power.” Boyd v. United States, 116 U. S. 616,
`
`630 (1886). Second, and relatedly, that a central aim of
`the Framers was “to place obstacles in the way of a too
`
`permeating police surveillance.” United States v. Di Re,
`
`332 U. S. 581, 595 (1948).
`We have kept this attention to Founding-era under-
`
`standings in mind when applying the Fourth Amendment
`to innovations in surveillance tools. As technology has
`enhanced the Government’s capacity to encroach upon
`areas normally guarded from inquisitive eyes, this Court
`has sought to “assure[ ] preservation of that degree of
`privacy against government that existed when the Fourth
`Amendment was adopted.” Kyllo v. United States, 533
`U. S. 27, 34 (2001). For that reason, we rejected in Kyllo a
`“mechanical interpretation” of the Fourth Amendment and
`held that use of a thermal imager to detect heat radiating
`from the side of the defendant’s home was a search. Id., at
`35. Because any other conclusion would leave homeown-
`ers “at the mercy of advancing technology,” we determined
`that the Government—absent a warrant—could not capi-
`
`talize on such new sense-enhancing technology to explore
`——————
`exclusively property-based approach. Post, at 1–2, 17–21 (THOMAS J.,
`
`dissenting); post, at 6–9 (GORSUCH, J., dissenting). Katz of course
`
`“discredited” the “premise that property interests control,” 389 U. S., at
`
`353, and we have repeatedly emphasized that privacy interests do not
`
`
`rise or fall with property rights, see, e.g., United States v. Jones, 565
`
`U. S. 400, 411 (2012) (refusing to “make trespass the exclusive test”);
`Kyllo v. United States, 533 U. S. 27, 32 (2001) (“We have since decou-
`pled violation of a person’s Fourth Amendment rights from trespassory
`
`violation of his property.”). Neither party has asked the Court to
`reconsider Katz in this case.
`
`
`
`
`
`
`
`

`

`
`
`7
`
`
`
` Cite as: 585 U. S. ____ (2018)
`
`Opinion of the Court
` what was happening within the home. Ibid.
`
` Likewise in Riley, the Court recognized the “immense
`storage capacity” of modern cell phones in holding that
`
`police officers must generally obtain a warrant before
`searching the contents of a phone. 573 U. S., at ___ (slip
`op., at 17). We explained that while the general rule
`allowing warrantless searches incident to arrest “strikes
`the appropriate balance in the context of physical objects,
`neither of its rationales has much force with respect to”
`the vast store of sensitive information on a cell phone. Id.,
`at ___ (slip op., at 9).
`
`B
`The case before us involves the Government’s acquisi-
`
`tion of wireless carrier cell-site records revealing the
`
`
`location of Carpenter’s cell phone whenever it made or
`
`received calls. This sort of digital data—personal location
`
`information maintained by a third party—does not fit
`neatly under existing precedents. Instead, requests for
`cell-site records lie at the intersection of two lines of cases,
`both of which inform our understanding of the privacy
`
`interests at stake.
`The first set of cases addresses a person’s expectation of
`
`privacy in his physical location and movements. In United
`
`
`States v. Knotts, 460 U. S. 276 (1983), we considered the
`Government’s use of a “beeper” to aid in tracking a vehicle
`
`through traffic. Police officers in that case planted a
`beeper in a container of chloroform before it was pur-
`chased by one of Knotts’s co-conspirators. The officers
`(with intermittent aerial assistance) then followed the
`automobile carrying the container from Minneapolis to
`Knotts’s cabin in Wisconsin, relying on the beeper’s signal
`to help keep the vehicle in view. The Court concluded that
`
`the “augment[ed]” visual surveillance did not constitute a
`search because “[a] person traveling in an automobile on
`public thoroughfares has no reasonable expectation of
`
`
`
`

`

`8
`
`
`
`
` CARPENTER v. UNITED STATES
`
`Opinion of the Court
` privacy in his movements from one place to another.” Id.,
`
`at 281, 282. Since the movements of the vehicle and its
`final destination had been “voluntarily conveyed to anyone
`who wanted to look,” Knotts could not assert a privacy
`
`interest in the information obtained. Id., at 281.
`This Court in Knotts, however, was careful to distin-
`
`guish between the rudimentary tracking facilitated by the
`
`beeper and more sweeping modes of surveillance. The
`
`Court emphasized the “limited use which the government
`made of the signals from this particular beeper” during a
`
`discrete “automotive journey.” Id., at 284, 285. Signifi-
`cantly, the Court reserved the question whether “different
`
`constitutional principles may be applicable” if “twenty-four
`
`hour surveillance of any citizen of this country [were]
`possible.” Id., at 283–284.
`
`Three decades later, the Court considered more sophis-
`ticated surveillance of the sort envisioned in Knotts and
`found that different principles did indeed apply. In United
`States v. Jones, FBI agents installed a GPS tracking de-
`vice on Jones’s vehicle and remotely monitored the vehi-
`cle’s movements for 28 days. The Court decided the case
`based on the Government’s physical trespass of the vehi-
`
`cle. 565 U. S., at 404–405. At the same time, five Justices
`
`agreed that related privacy concerns would be raised by,
`
`for example, “surreptitiously activating a stolen vehicle
`
`detection system” in Jones’s car to track Jones himself, or
`
`conducting GPS tracking of his cell phone. Id., at 426, 428
`judgment);
`id., at 415
`in
`(ALITO, J., concurring
`
`(SOTOMAYOR, J., concurring). Since GPS monitoring of a
`vehicle tracks “every movement” a person makes in that
`
`vehicle, the concurring Justices concluded that “longer
`
`term GPS monitoring in investigations of most offenses
`impinges on expectations of privacy”—regardless whether
`those movements were disclosed to the public at large.
`
`
`Id., at 430 (opinion of ALITO, J.); id., at 415 (opinion of
`
`
`
`

`

`
`
`
`Cite as: 585 U. S. ____ (2018)
`
`Opinion of the Court
`
`9
`
`
` SOTOMAYOR, J.).2
`In a second set of decisions, the Court has drawn a line
`
`
`between what a person keeps to himself and what he
`shares with others. We have previously held that “a per-
`son has no legitimate expectation of privacy in information
`he voluntarily turns over to third parties.” Smith, 442
`
`U. S., at 743–744. That remains true “even if the infor-
`mation is revealed on the assumption that it will be used
`only for a limited purpose.” United States v. Miller, 425
`
`U. S. 435, 443 (1976). As a result, the Government is
`typically free to obtain such information from the recipient
`
`without triggering Fourth Amendment protections.
`This third-party doctrine largely traces its roots to
`
`
`Miller. While investigating Miller for tax evasion, the
`Government subpoenaed his banks, seeking several
`
`months of canceled checks, deposit slips, and monthly
`
`statements. The Court rejected a Fourth Amendment
`challenge to the records collection. For one, Miller could
`“assert neither ownership nor possession” of the docu-
`ments; they were “business records of the banks.” Id., at
`440. For another, the nature of those records confirmed
`
`Miller’s limited expectation of privacy, because the checks
`
`were “not confidential communications but negotiable
`
`instruments to be used in commercial transactions,” and
`the bank statements contained information “exposed to
`——————
`
` 2 JUSTICE KENNEDY argues that this case is in a different category
`
` from Jones and the dragnet-type practices posited in Knotts because the
`
` disclosure of the cell-site records was subject to “judicial authorization.”
`
`
`
` Post, at 14–16. That line of argument conflates the threshold question
` whether a “search” has occurred with the separate matter of whether
`
`
`the search was reasonable. The subpoena process set forth in the
`
`Stored Communications Act does not determine a target’s expectation
` of privacy. And in any event, neither Jones nor Knotts purported to
`
`
`resolve the question of what authorization may be required to conduct
`
` such electronic surveillance techniques. But see Jones, 565 U. S., at
`430 (ALITO, J., concurring in judgment) (indicating that longer term
`GPS tracking may require a warrant).
`
`
`
`
`
`
`
`

`

`10
`
`
`
`
` CARPENTER v. UNITED STATES
`
`Opinion of the Court
` [bank] employees in the ordinary course of business.” Id.,
`
`at 442. The Court thus concluded that Miller had “take[n]
`the risk, in revealing his affairs to another, that the in-
`formation [would] be conveyed by that person to the Gov-
`ernment.” Id., at 443.
`Three years later, Smith applied the same principles in
`
`the context of information conveyed to a telephone com-
`pany. The Court ruled that the Government’s use of a pen
`register—a device that recorded the outgoing phone num-
`bers dialed on a landline telephone—was not a search.
`
`Noting the pen register’s “limited capabilities,” the Court
`“doubt[ed] that people in general entertain any actual
`
`expectation of privacy in the numbers they dial.” 442
`U. S., at 742. Telephone subscribers know, after all, that
`
`the numbers are used by the telephone company “for a
`variety of legitimate business purposes,” including routing
`
`calls. Id., at 743. And at any rate, the Court explained,
`such an expectation “is not one that society is prepared to
`
`recognize as reasonable.” Ibid. (internal quotation marks
`omitted). When Smith placed a call, he “voluntarily con-
`veyed” the dialed numbers to the phone company by “ex-
`pos[ing] that information to its equipment in the ordinary
`
`course of business.” Id., at 744 (internal quotation marks
`omitted). Once again, we held that the defendant “as-
`sumed the risk” that the company’s records “would be
`divulged to police.” Id., at 745.
`
`III
`
`
`The question we confront today is how to apply the
`Fourth Amendment to a new phenomenon: the ability to
`chronicle a person’s past movements through the record of
`
`his cell phone signals. Such tracking partakes of many of
`
`the qualities of the GPS monitoring we considered in
`Jones. Much like GPS tracking of a vehicle, cell phone
`location information is detailed, encyclopedic, and effort-
`
`lessly compiled.
`
`
`
`

`

`
`
`
`11
`
`
`Cite as: 585 U. S. ____ (2018)
`
`Opinion of the Court
`At the same time, the fact that the individual continu-
`
`ously reveals his location to his wireless carrier implicates
`
`the third-party principle of Smith and Miller. But while
`the third-party doctrine applies to telephone numbers and
`bank records, it is not clear whether its logic extends to
`the qualitatively different category of cell-site records.
`
`After all, when Smith was decided in 1979, few could have
`
`imagined a society in which a phone goes wherever its
`
`owner goes, conveying to the wireless carrier not just
`
`dialed digits, but a detailed and comprehensive record of
`
`the person’s movements.
`We decline to extend Smith and Miller to cover these
`
`
`novel circumstances. Given the unique nature of cell
`
`phone location records, the fact that the information is
`held by a third party does not by itself overcome the user’s
`
` claim to Fourth Amendment protection. Whether the
`
` Government employs its own surveillance technology as in
`
`Jones or leverages the technology of a wireless carrier, we
`
`hold that an individual maintains a legitimate expectation
`of privacy in the record of his physical movements as
`captured through CSLI. The location information ob-
` tained from Carpenter’s wireless carriers was the product
`
`
`of a search.3
`
`
`
`——————
`
` 3The parties suggest as an alternative to their primary submissions
`
`
` that the acquisition of CSLI becomes a search only if it extends beyond
`
`a limited period. See Reply Brief 12 (proposing a 24-hour cutoff); Brief
`for United States 55–56 (suggesting a seven-day cutoff). As part of its
`
`argument, the Government treats the seven days of CSLI requested
`from Sprint as the pertinent period, even though Sprint produced only
`
` two days of records. Brief for United States 56. Contrary to JUSTICE
`
`KENNEDY’s assertion, post, at 19, we need not decide whether there is a
`
` limited period for which the Government may obtain an individual’s
`historical CSLI free from Fourth Amendment scrutiny, and if so, how
`
`long that period might be. It is sufficient for our purposes today to hold
`
`that accessing seven days of CSLI constitutes a Fourth Amendment
`
` search.
`
`
`
`

`

`
`
` CARPENTER v. UNITED STATES
`
`Opinion of the Court
`A
`
`A person does not surrender all Fourth Amendment
`protection by venturing into the public sphere. To the
`contrary, “what [one] seeks to preserve as private, even in
`an area accessible to the public, may be constitutionally
`
`protected.” Katz, 389 U. S., at 351–352. A majority of this
`
`Court has already recognized that individuals have a
`reasonable expectation of privac

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket