Geofence warrants on trial: The Supreme Court weighs privacy against policing

April 23, 20267 min read5 sources
Share:
Geofence warrants on trial: The Supreme Court weighs privacy against policing

A digital dragnet under judicial scrutiny

In May 2019, an armed man robbed a credit union in Richmond, Virginia. With no witnesses able to identify the suspect and little physical evidence, the investigation stalled. Instead of relying on traditional shoe-leather detective work, police turned to Google, armed with a novel and controversial tool: a geofence warrant. This legal order compelled the tech giant to identify every device that had been near the bank during the robbery. The digital dragnet worked, leading police to Raymond Chatrie. Now, his case, Chatrie v. United States, is before the Supreme Court, posing a fundamental question for our time: does the Fourth Amendment permit the government to search the location data of hundreds or thousands of innocent people to find one guilty person?

The court’s decision will have profound consequences, potentially redrawing the boundaries of digital privacy and defining the extent of law enforcement's power to peer into our daily movements. It forces a confrontation between 18th-century constitutional principles and 21st-century surveillance technology.

Background: From a bank robbery to the nation's highest court

The legal journey of Chatrie v. United States began after investigators used Google's location data to place Chatrie near the scene of the crime. Chatrie's lawyers moved to suppress the evidence, arguing the geofence warrant was an unconstitutional general warrant, violating the Fourth Amendment's prohibitions against unreasonable searches and its requirements for probable cause and particularity. Both the district court and the U.S. Court of Appeals for the Fourth Circuit disagreed, upholding the conviction. The Fourth Circuit reasoned that the multi-step nature of the warrant, which started with anonymized data, made the search permissible.

This case builds directly upon the landmark 2018 Supreme Court decision in Carpenter v. United States. In Carpenter, the court ruled that individuals have a reasonable expectation of privacy in their historical location data, and that police generally need a warrant to access it. However, Carpenter dealt with data from a single individual. Chatrie asks the next logical question: what happens when the initial search to establish probable cause involves the data of everyone in an area?

The Supreme Court’s interest is heightened by conflicting rulings in lower courts. While the Fourth Circuit approved the warrant in Chatrie, federal courts in Virginia and Illinois have reached opposite conclusions on similar warrants, creating a legal inconsistency that only the Supreme Court can resolve. In June 2023, the court took a significant step by asking the Solicitor General to file a brief on the case, a strong signal that it is seriously considering taking it up.

Technical details: The mechanics of a digital lineup

Understanding the controversy requires a look at how geofence warrants operate. The process leverages Google's vast repository of user location data, often called the "Sensorvault," which collects precise location points from Android devices and any device running Google apps with Location History enabled.

The process unfolds in distinct phases:

  1. The Geofence: Law enforcement defines a precise geographic boundary and a specific time window, submitting a warrant to Google for all devices present within those parameters. In Chatrie's case, this was a 17.5-acre area around the bank for a one-hour period.
  2. The Anonymized Data Dump: Google complies by providing an anonymized list of all device IDs that entered the geofence. This initial dataset can include dozens, hundreds, or even thousands of devices belonging to innocent bystanders, residents, and commuters. The data shows each device's movement patterns as a series of timestamps and coordinates.
  3. The Pattern Analysis: Investigators sift through this mountain of anonymized data, looking for patterns consistent with the crime. They might look for a device that entered the bank, stayed for the duration of the robbery, and then fled along a specific route. This is effectively a digital lineup where most participants are completely innocent.
  4. The De-anonymization: Once investigators isolate one or more suspicious device IDs, they return to Google with a second legal request to de-anonymize those specific accounts. Google then provides the associated user information, such as name and email address, revealing the real-world identity of the suspect.

Critics, including the American Civil Liberties Union (ACLU), argue this process inverts the Fourth Amendment. Instead of starting with a suspect and seeking a warrant to search their effects, a geofence warrant starts with a search of everyone to find a suspect.

Impact assessment: A collision of privacy and security

The Supreme Court's decision will reverberate across society, affecting ordinary citizens, law enforcement agencies, and the tech industry.

  • The General Public: A ruling that upholds geofence warrants would normalize a powerful form of mass surveillance. It would affirm that the government can, with a single warrant, scrutinize the movements of every person in a given area. This could create a chilling effect, where individuals become wary of attending protests, visiting sensitive locations like clinics or places of worship, or simply moving freely, knowing their presence is being logged and is subject to government search.
  • Law Enforcement: Police and prosecutors view geofence warrants as an indispensable tool for solving serious crimes, from robberies and arsons to murders, that might otherwise go cold. They argue the multi-step process includes safeguards that narrow the search and protect privacy. A decision curtailing or banning these warrants would remove a significant investigative capability.
  • Technology Companies: Google and other companies that collect location data are caught in the middle. A decision in either direction will provide legal clarity on their obligations. A ruling against the warrants could lead companies to reconsider their data retention policies, potentially purging location data more quickly to avoid being drawn into such disputes.

How to protect yourself

While the Supreme Court deliberates, individuals can take concrete steps to manage their digital footprint and limit the location data they share. The core issue is data collection by your device's operating system and the apps you use. You can significantly reduce this tracking.

  • Manage Your Google Location History: Google provides a dashboard to control this data. Go to your Google Account settings, navigate to "Data & privacy," and find "Location History." Here you can pause collection, set up auto-delete for data older than 3, 18, or 36 months, and manually delete your existing history.
  • Review Apple's Significant Locations: On an iPhone, go to Settings > Privacy & Security > Location Services > System Services > Significant Locations. You can view, clear, and turn off this feature, which tracks places you frequent.
  • Audit App Permissions: Regularly review which apps have access to your location. On both iOS and Android, you can grant permission only "While Using the App" or "Ask Next Time." For apps that have no legitimate need for your location (like a simple game or calculator), set it to "Never."
  • Consider Broader privacy protection: While a VPN service won't stop GPS-based tracking from your phone's hardware, it can mask your IP address, which is another vector for location tracking used by websites and online services.
  • Disable Location-Based Ad Tracking: On both Android and iOS, you can reset your advertising ID and enable settings to limit ad tracking, which reduces the incentive for some companies to collect your location data.

The Chatrie case places the judiciary at a critical crossroads. The court must either adapt foundational Fourth Amendment protections to the realities of pervasive data collection or grant law enforcement a powerful new surveillance capability with few precedents. The outcome will not only decide Raymond Chatrie's fate but will also draw the line between public safety and personal privacy for generations to come.

Share:

// FAQ

What is a geofence warrant?

A geofence warrant is a legal order that compels a technology company, usually Google, to provide law enforcement with location data for all devices that were within a specified geographic area (the 'geofence') during a specific time period.

Why are geofence warrants so controversial?

They are controversial because they scoop up the location data of potentially thousands of innocent people in order to find a single criminal suspect. Critics argue this violates the Fourth Amendment's protection against unreasonable searches and its requirement that warrants be specific, not general dragnets.

What is the core Fourth Amendment issue in Chatrie v. United States?

The core issue is whether a geofence warrant meets the Fourth Amendment's requirements for 'probable cause' and 'particularity.' The warrant searches everyone in an area to find a suspect, rather than starting with a suspect, and it isn't particular to a specific person or place to be searched, initially targeting a wide geographic area.

How can I check if Google is tracking my location?

You can check and manage your Google Location History by going to your Google Account settings, selecting 'Data & privacy,' and then clicking on 'Location History.' From there, you can pause collection, manage your activity, and set up auto-delete.

What was the Supreme Court's ruling in Carpenter v. United States?

In the 2018 Carpenter case, the Supreme Court ruled that people have a 'reasonable expectation of privacy' in their historical location data. Therefore, the government generally needs a warrant based on probable cause to access seven days or more of a person's cell-site location information (CSLI). This case set the stage for the current geofence warrant debate.

// SOURCES

// RELATED

FISA Section 702 renewed for two years after contentious congressional battle

A contentious legislative battle ends with a two-year renewal of the controversial FISA Section 702 surveillance program, side-stepping major privacy

6 min readApr 20

Google's war on bad ads escalates as Android 17 promises major privacy overhaul

Google's latest report reveals a massive crackdown, blocking 8.3 billion malicious ads in 2025, while preparing a major privacy overhaul for Android 1

6 min readApr 18

The surveillance law Congress can’t quit — and can’t explain

Despite a 2024 overhaul with 56 amendments, Section 702 of FISA remains deeply controversial as supporters and critics cannot even agree on its scope.

7 min readApr 18

Congress renews controversial FISA Section 702 surveillance law after years of debate

Congress renewed the controversial FISA Section 702 spying law for two years, preserving a key intelligence tool despite fierce opposition over privac

6 min readApr 18