Bulk Suspicion: Typo In Geofence Warrant Created Two-Mile Long Dragnet

from the so-long-and-thanks-for-all-the-data dept

We’ve expressed our displeasure with geofence warrants multiple times. I’ve often referred to them as “reverse” warrants, a term that implies how these warrants invert probable cause. Those in the business of protecting rights (ACLU, EFF) aren’t fans of that term, but it is useful shorthand. Rather than show a court probable cause exists to search a place for evidence of a crime because investigators have found suspects worth searching, investigators simply tell courts they have probable cause to believe Google (and it’s almost always Google) holds the cell site location data sought by law enforcement.

Geofence warrants aren’t new. They’ve been around for years. The pushback, however, is more recent. As criminal defendants have slowly been made aware this is how investigators are compiling lists of suspects, they’ve been challenging this evidence in court.

As for the courts, the issue is nowhere near settled. Some view massive demands for geolocation data to be nothing more than a reasonable extension of the Third Party Doctrine. Others have expressed concern that law enforcement, with a single warrant, can force Google to search the data of all of its users to find the limited (by time and place) information sought by investigators.

This is only the tip of the problematic iceberg. Most courts don’t vet these warrant requests closely, allowing investigators to create dragnets that force Google to cough up data on dozens or hundreds of innocent people while maintaining the pretense cops are smart enough to parse this data dump correctly.

Those requesting warrants are often hesitant to provide courts with overhead shots of the area being subjected to this dragnet, allowing courts to assume this is a good faith effort to narrow the data demand while working with nothing more than geographic coordinates that convey limited information about the area (and entities) covered by the request.

Then there’s the human error problem. Cops frequently screw up addresses when seeking warrants to search a single location. When cops screw up coordinates on a geofence warrant, this singular problem becomes a bulk collection problem — something highlighted in a recent post by the ACLU covering its examination of several geofence warrants. (h/t Zack Whittaker at TechCrunch)

Geofence warrants, like all other warrants, are not error-proof. During our investigation, we discovered one warrant that apparently contained an alarming error.   

The error (perhaps the result of a typo) resulted in a warrant stretching nearly two miles across San Francisco and permitted law enforcement to capture information about people across the United Nations Building, Asian Art Museum, Civic Center Courthouse, State of California Building, Rosa Parks Senior Center, and Fire Station 5. Many private homes were also captured in the massive sweep.   

Perhaps if the court had seen a visual representation of the proposed search, it might have decided to deny this request. Because this very definitely doesn’t look like something someone meant to do. And if they did mean to do this, there’s no way it’s permissible under the Fourth Amendment.

That’s a two-mile stretch of unrelated businesses, public buildings, and homes being subjected to a Google search just because someone fat-fingered the coordinates. And this surely can’t be the only time this sort of error has happened. It raises a host of questions, none of which have been answered to this point. How often does this sort of mistake happen? How often do courts grant these erroneous requests? And, most importantly, how often do law enforcement agencies avail themselves of data they mistakenly obtained via a typo?

Even non-erroneous requests tend to create massive dragnets. The ACLU’s report displays the results of a couple of other granted geofence warrants — ones that cover multi-family housing, public buildings, places of worship, and shopping centers. Every one of these is capable of giving cops permission to gather more data — if not actually arrest — people who did nothing more than exist in the areas covered by these geographic coordinates.

The Fourth Amendment demands specificity on top of probable cause. Even if it can be argued there’s probable cause to believe Google retains this data, each warrant forces Google to search its entire data repository for responsive records. That’s definitely not specific. Just because this is the only way Google can fulfill these requests shouldn’t be taken by courts to mean this search method is justified.

Then there are the areas sought. When they cover areas where dozens or hundreds of innocent people might be present, the potential for false positives (and false arrests) expands exponentially.

This method may increase law enforcement efficiency by allowing it to generate a list of leads without ever leaving the desk, but the Constitution isn’t there to ensure cops can operate with optimum efficiency. In fact, the Fourth Amendment can be read to state the opposite: rights are to be respected, even if they make it more difficult for investigators to do their job.

What’s on display here is the opposite: dragnets are cast and cops are the direct beneficiaries of unsettled law. The Fourth Amendment says people should be free from unreasonable searches, but geofence warrants — at least those deployed in the San Francisco area — are anything but reasonable. The ACLU’s examination of these warrants shows 82 apartment complexes, 84 businesses, 32 bars and restaurants, and 12 places of worship have been swept up in geofence dragnets.

So, where do we go from here? Well, there’s Senator Ron Wyden’s bill, which would create a warrant requirement for obtaining location data from third party data brokers, who collect this data from iOS and Android apps. At this point, geofence warrants served to Google would be unaffected because Google isn’t (under the terms of the proposed law) a data broker and, more importantly, Google is actually being served with warrants rather than selling access to data to government agencies.

But that may change now that Google has stated most location data will be stored locally on users’ devices, rather than by Google itself. If that’s the case, investigators may turn to third parties to obtain location data — something they can currently do without showing reasonable suspicion, much less probable cause.

For the time being, the most important work is being done by those challenging these warrants. Google has, at least, proven willing to challenge overly broad requests, resulting in rewritten warrants or rejections of data demands by magistrate judges. Our rights mostly rely on those accused of crimes, something that has almost always been the case in terms of the Fourth Amendment. That these challengers are often unsympathetic protagonists doesn’t mean they’re wrong. It just means they’re unlikely to receive mainstream support from legislators and the general public.

These warrants always create dragnets, even when they’re done correctly. The courts need to step up and tell cops it’s just not enough to claim Google houses location data. The Fourth Amendment requires more than cops with hunches telling courts they think they know where they can find a whole lot of data.

Filed Under: , , , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Bulk Suspicion: Typo In Geofence Warrant Created Two-Mile Long Dragnet”

Subscribe: RSS Leave a comment
30 Comments
This comment has been deemed insightful by the community.
Anonymous Coward says:

… “General Warrant” is the correct term, historically in Anglo-American law.

a General-Warrant grants broad a priori search & seizure authority to government agents without any need for specifics or probable cause.

the British government widely used and abused such general search warrants against American colonists, causing severe resentment.
These British search abuses are often deemed the precipitating factor of the American Revolution.

the U.S. 4th Amendment was specifically written to prohibit all ‘general’ search authority and warrants.

a valid U.S. search warrant MUST expressly identify the person or his property to be searched/seized & the specific probable-cause of criminal behavior by the named person.

Thus, non-specific ‘geofence warrants’ are outrageous violations 4th Amendment !

This comment has been flagged by the community. Click here to show it.

Anonymous Coward says:

Re:

Except, of course, that no person or their property are being searched, except for Google, and Google is not the target of a criminal investigation, just the holder of data.

Tim Cushing despises law enforcement, and so wants to make it more difficult for criminals to be caught and punished, but why should anyone else go along with this? Given a crime, police might canvas a neighborhood looking for witnesses. They might look for security cameras that recorded the incident and examine the footage. None of that requires probable cause.

This comment has been flagged by the community. Click here to show it.

This comment has been flagged by the community. Click here to show it.

This comment has been deemed insightful by the community.
miked says:

Re: Re:

“Given a crime, police might canvas a neighborhood looking for witnesses…. None of that requires probable cause.”

Any potential witnesses approached by the police have the option to give the police info or withhold it. Google does not have the option and will likely do what costs them the least amount of money.

Anonymous Coward says:

Re: Re:

“Tim Cushing despises law enforcement”

Is this your opinion or is it potentially defamation?

“make it more difficult for criminals to be caught and punished, ”

Adherence to the law is just too difficult for some, please let us bend the rules ’cause we’re tired ‘ n stuff – ok?

This comment has been deemed insightful by the community.
MrWilson (profile) says:

Re: Re:

Tim Cushing despises law enforcement,

If expecting cops to respect due process is “despising law enforcement,” sure.

and so wants to make it more difficult for criminals to be caught and punished,

Note that you completely excluded the possibility (and probability) that innocent people will also get caught up in an investigation. There are plenty of innocent people who have been successfully prosecuted because of shoddy data gathering by police. They damn well be cautious. It’s better to let a criminal go free than to let an innocent person rot in jail for someone else’s crime. That you ignore the existence of innocent suspects is telling.

but why should anyone else go along with this?

Because not everyone is an authoritarian or likes the taste of boot polish. Because a lot of people want actual justice, not abuse by law enforcement.

Given a crime, police might canvas a neighborhood looking for witnesses. They might look for security cameras that recorded the incident and examine the footage. None of that requires probable cause.

You don’t understand what probable cause is.

Mhajicek says:

Re: Re: Re:

When more people learn about this, people planning to commit a crime will simply leave their phone at home, or with a friend, while doing so. They won’t even be on the list of suspects. Police will begin with a list of people who had a phone in the area at the time, whittle it down to the most likely, and be guaranteed to accuse the wrong person.

This comment has been deemed insightful by the community.
Anonymous Coward says:

Re: Re:

no, 4A protects all your private information (“effects”) and your detailed geolocation data is certainly private even if Google has it.

by your faulty logic, the police are free to search every bank account for every American — because sharing your personal private info somehow erases your 4A Right to privacy from “Government” search and seizure.

Anonymous Coward says:

Re: Re: Re:

See Oliver v. United States, where the Supreme Court ruled that pot growing in an open field, even when fenced in and with “No Trespassing” signs, could be found without a warrant.

Does a person sharing their location data with a company have a reasonable expectation of privacy in that data? Does probable cause for a search apply to that data with respect to the individual who provided the data to the company? As for bank privacy, you do know that banks will report transactions over a certain limit to the government, and that it’s illegal for a person to break up a large transaction into chunks below that limit?

If these things were as cut-and-dried as you would have them be, the rules would already have been well-established. They’re not. Things will gradually work their way through Congress and the courts, but until then, don’t expect your simplistic understanding of the 4th Amendment to control.

MrWilson (profile) says:

Re: Re: Re:2

See Oliver v. United States, where the Supreme Court ruled that pot growing in an open field, even when fenced in and with “No Trespassing” signs, could be found without a warrant.

Pot growing in an open field is detectable by the cops without needing to get a third party to provide information to the cops. That doesn’t apply at all to data, which is collected and held by a third party for practical or incidental purposes, not for law enforcement to go fishing.

Does a person sharing their location data with a company have a reasonable expectation of privacy in that data?

Yes, because if a person thought their data would incriminate them, then granting a third party access to that information being the same as handing it to the cops would be tantamount to self-incrimination, which people have a constitutional right not to do.

As for bank privacy, you do know that banks will report transactions over a certain limit to the government, and that it’s illegal for a person to break up a large transaction into chunks below that limit?

You’re hurting your argument by pointing out a specific type of information that specific laws carve out as being required to be reported to the government. Unless you have a law you can cite stating that all other types of data are also subject to mandatory reporting, you’re only proving that you’re grasping at straws to justify overreach.

If these things were as cut-and-dried as you would have them be, the rules would already have been well-established. They’re not. Things will gradually work their way through Congress and the courts, but until then, don’t expect your simplistic understanding of the 4th Amendment to control.

It was already established. Data was private by it’s original nature, being collected for specific purposes and not intentionally shared with anyone who didn’t need it. But “tough on crime” authoritarians just push for undermining more and more rights, pretending that “on a computer somewhere” is completely different than “behind a closed door I can’t access without a warrant and probable cause” when it definitely isn’t.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...