Federal Agents Are Using A Reverse Warrant To Track Down Arson Suspects

from the starting-with-what-we-don't-know-and-working-our-way-backwards dept

Reverse warrants have been deployed again. And, again, Wisconsin law enforcement agencies are involved. The feds used a reverse warrant to track down robbers who hit a bank at a strip mall just outside of Milwaukee earlier this year.

The feds are at it again. This time it's the ATF and the targets are two people suspected of arson.

The "reverse" warrant affidavit [PDF] spends a great deal of time letting us know what Special Agent Thomas Greenwich knows: that phones generate a ton of location info using a variety of connections (WiFi, Bluetooth, cell towers) and this information tends to get hoovered up almost immediately by service providers. In this instance the target is Google and the ATF wants any records that fall within two geofenced areas surrounding the sites of two suspicious fires.

If there's any upside here, it's that the geofenced locations won't be sweeping in as many non-suspects as other reverse warrants we've seen. And it includes photos depicting the areas targeted by the non-targeted warrant, which helps judges (and interested citizens) see how much potential data the ATF is targeting.

There were two suspected arsons in Milwaukee, located less than 5 miles apart, occurring within three weeks of each other. Both started at the back of the houses and both used accelerants. And both houses had a common denominator: John P. Hunt. Hunt had been evicted from one address (4047 N. 7th) two weeks prior to the first fire, and had been trying to claim tools left behind by a deceased family member, which were stored at the second address (5915 N. 42nd St.). This included one unscheduled visit to reclaim the disputed possessions which had been sorted out by local law enforcement four days before the second suspicious fire.

Here are the geofence coordinates included with the affidavit:

The geofences here are about as limited as they can be, given the nature of the crime. These are much more constrained than others we've seen -- ones that cover entire blocks in heavily-trafficked areas.

That being said, there are still a few problems. First, coarse location data isn't precise enough to exclude people living in surrounding houses. The geofenced areas will also capture foot and road traffic that passed through the area during the time frame investigators are looking at.

Finally, there's the problem that simply does not ever go away, no matter how tightly-constrained the geofence is: these warrants work in reverse, providing law enforcement with location data on people who aren't suspected of committing criminal acts and allowing investigators to use a pile of non-suspicious data to develop reasonable suspicion.

This data request seems almost extraneous. The ATF already appears to have a couple of suspects -- ones well-known to both federal agents and the Milwaukee Police Department. The MPD executed a search warrant at the 4047 N. 7th Street address last summer (following "10-15 visits" to the house by MPD officers during that same summer), recovering "a large amount of narcotics and several firearms." John Hunt -- the person connecting the two torched properties -- was charged with several drug and gun-related offenses.

Given this fact, it would seem investigators might want to start with John Hunt and then work their way outward if that doesn't pan out. Instead, they're demanding location info on everyone in the area and then hoping to narrow this list of info down to the person (or people) they already suspect. Yes, it's always useful to have as much evidence in hand as possible before arresting someone, but that law enforcement desire needs to be weighed against the impact it will have on non-suspects just because they happened to connect to cell towers in the wrong place at the wrong time.

Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: arson, atf, reverse warrants
Companies: google

Reader Comments

Subscribe: RSS

View by: Time | Thread

  1. identicon
    Anonymous Coward, 8 Jan 2020 @ 12:28pm

    Re: "start with John Hunt and then work their way outward "

    But how to Point at 1 person with no Data/info/anything,

    Try reading the article, Hunt has a motive for the Arson, like eviction from one address, and police involvement when trying to reclaim property from the other address.

    What is more surprising is that police did not use the available information to obtain location records for Hunts phone.

Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here

Subscribe to the Techdirt Daily newsletter

Comment Options:

  • Use markdown. Use plain text.
  • Remember name/email/url (set a cookie)

Follow Techdirt
Insider Shop - Show Your Support!

Essential Reading
Techdirt Insider Chat
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it

Email This

This feature is only available to registered users. Register or sign in to use it.