
Loading summary
A
Need real insight from industrial data versit with a single source of everything and get the best outcomes. Transform the everyday with Siemens there's never
B
been a better time to get outside and experience the benefits of nature, discover nearby trails and explore the outdoors with all trails. Download the free app today and find your outside. Hi, I'm Kate Clonik, a senior editor at Lawfare. You might know me as the person who keeps trying to convince you that content moderation is actually fascinating. I think that some of you are finally convinced by now, and that's progress. Lawfare is built around one simple idea. Reliable, independent, non partisan expert analysis delivered at the pace of news. And these days the news moves fast. Between democracy under pressure, technology outrunning the rules meant to govern it, and a whole lot of legal questions that nobody saw coming, careful analysis matters more than ever. And here's the thing. We're a 501c3 nonprofit. Everything we produce is free. No paywalls available to anyone who wants it. And that only works because listeners like you step up and right now, thousands already are. Please join them and head to lawfaremedia.org support and become a material supporter. $10 a month or more if you can swing it genuinely makes a difference. A huge difference. Thanks for listening and thanks for caring about the things that matter.
A
In this case. The court is working in a line of cases in which it has steadily readjusted the scop of the Fourth Amendment from physical world, analog world searches to take into account the novel potential of technology to intrude on privacy.
B
It's the lawfare Podcast. I'm Kate Clonick, senior editor of lawfare, with former Deputy Solicitor General Michael Dreeben, lecturer in law at Stanford Richard Salgado, and attorney Adam Unakowski.
C
Google was really acting as an agent of the government when it was executing the search warrant. Like, it is true that Google pushed the button and not the government, but you know, Google wasn't acting on its own. Google got a search warrant from the government. It was compelled by the government. And so Google's actions really are attributable to the government for Fourth Amendment purposes.
B
Today we're talking about the geofencing Fourth Amendment case that was heard on Monday, April 27th in the Supreme Court. Chatry versus the United States let's start with you, Adam. There's three of you here, so we're going to kind of try to like see how that we can triangulate or recreate in some way the arguments that happened on Monday. But you argue the case on Monday Adam, it was about a two hour argument. Walk us through the basic mechanics of kind of what had happened to your client to get us to this point. And for listeners kind of coming into Chatri Cold, can you set the stakes, kind of explain what a geofence warrant even is? What did the police do here and what the fourth Amendment problem you asked the court to kind of recognize? Recognize?
C
Sure. So I think a good place to start is explaining what Google location history is. And once you know that is, you could explain how it was used for law enforcement purposes. In this case, when you activate an Android phone or certain Google apps on an iPhone, such as Google Maps, you're prompted to enable a service known as location history. And the prompt says something like creates a private map of where you go with your signed in devices and it delivers. If you activate location history, you click yes, I'm in. While you're activating the app or the phone, every couple of minutes, Google records exactly where you are, often with a great degree of precision, as close as 3 meters. And with it, and it could also record the elevation within a particular building. And until a couple of years ago, Google would store your location every couple of minutes in a centralized server known as the sensor vault. And so as a result, for millions of people who had activated the service, Google had records of exactly where their device was, which is exactly where they were for anyone who carries their device around in their buckets at all times in the indefinite, you know, in the indefinite past, until the time that, you know, dating back to when they first activated the service. And so that had obvious law enforcement benefits. And that takes us to the crime that gave rise to the Chatri case. So a bank was robbed and the police had no suspects, but the police knew that the perpetrator of the robbery was holding a cell phone at the time of the robbery. And so the police obtained what is known as a geofence warrant. And the geofence warrant allows the police to go to Google and ask Google to determine the identities of everyone who was within the so called geofence, which is a kind of virtual fence around the scene of the crime near the time of the crime. So in this particular case, the police drew a geofence that encompassed the bank as well as a nearby church and the church parking lot starting 30 minutes before the crime and ending 30 minutes after the crime. And it asked Google to identify all the people or all the devices that were within the geofence during that period. And so the way these warrants work, it's called A geofence warrant. Warrant. At the first step of the warrant, Google returns the movements to the police of everyone it can find within the geofence. But initially it's anonymized. So in this case, Google identified 19 devices that were within the geofence and returned the movements of those people within the geofence in anonymized form for that one hour stretch. And then at the second step, the police examined that information and identified those individuals, still anonymous at that point, that it felt were likely to be associated with the crime or at least were particularly suspicious. And the police identified nine of those 19 people and asked for an additional hours worth of their movements outside of the geofence. And so the police returned that. So now we're talking about one hour before the robbery to one hour after the robbery. So a total of two hours of information for those people. And then based on that information, the police then asked Google to de anonymize or identify three people or three devices actually. And one of those people turned out to be Okello Chachra street, and he was convicted of the crime of bank robber. So he, he was indicted for the crime, and then he filed a motion to suppress the evidence, alleging that the police had violated the Fourth Amendment in executing the the geofence warrant. And after the district court denied his motion to suppress, he pleaded guilty, reserving the right to appeal the denial of the motion to suppress. After lengthy and extensive proceedings in the Fourth Circuit, Fourth Circuit affirmed his conviction, and he filed a petition for certiorari alleging that the fourth Amendment was violated based on the admission of the evidence gleaned from the geofence world.
B
Yeah, so I think that that's a wonderful start to kind of where we are and how we ended up in the Supreme Court on Monday. But I think, Richard, you actually have a lot of kind of meat to add to the bone here. You just, you've spent over a decade running the team at Google before you kind of were at Stanford and on your own for private practice that warrants like this one in this case. And you also join the technologist brief in this case, if I'm not mistaken, which is a really, I thought, pretty elucidating guide to how this stuff really works, how it is the private companies work through warrants like this and what they can actually particularize for the purposes of complying with the warrant. Could you kind of just like help our listeners also understand the scale of what we're talking about when we're talking about the geofence warrants? Like how many, how often do companies receive geofence warrants? What does the response process look like within the company? And like, you know, there was a lot of talk in the oral argument about how Google developed a three step procedure that ended up to be kind of the heart of this case. But of course that's Google's procedure. Kind of just talk to us a little bit about like how Google set up that procedure and kind of, I don't know, the role of kind of that being adopted as a necessary thing for all companies potentially.
D
Sure. Happy to. And thank you for the comments about the technologist briefs. I was one of the lawyers who prepared it, but we had excellent support from the students at the Harvard Cyber Law Clinic and some other counsel who worked on it. So, you know, when, when companies, these hyperscalers get legal process, the vast majority of it is legal process that identifies a user that the government's interested in. They want the user's basic subscriber information. You know, it's cool guy1989mail.com and they want to know who that is. And so they'll get basic subscriber information. Maybe they want the content of the email box so they'll get a search warrant, which I think is pretty well understood to be required, or docs or spreadsheets, that kind of thing. And maybe they want to know what's in the user's location history account. These data points that Adam talked about being uploaded by users into the location history account that also is viewed as content. Just like everything else in a warrant is required, these geofence warrants are different. They're a category of legal process that has been referred to as a reverse search, which is where you don't start with a user, you start with some information you want that can help you identify who the users are. And we really have two flavors of those that we've seen. The one with the vast majority of them is the geofence situation. The other is reverse search, where the police want to know what search queries were entered, maybe what AI prompts were entered by users, and then try to identify the users from that. But the geofence was really the first one of these reverse search types of warrants that gained any sort of popularity and boy, was it popular. We received our first geofence warrant in 2016 and it was something that was, that came after conversations. So we had been approached by law enforcement about this possibility and talk to them about what the data was, how it was stored, what it could mean what it was potentially useful for providing some warnings that this data wasn't collected for the purpose of identifying somebody at a crime. This is information that users uploaded into their service so that they could have a history of their coming and going. And after the course of that, we got a search warrant from there. This is novel. So you try to look at it, figure out is it valid. One of the things that providers learn very quickly is from judges and the government alike, is that their objections on fourth Amendment grounds are very much not welcome. They are to comply with the warrant. And if there's a fourth Amendment problem, that is for the person who holds the fourth Amendment right to raise it is not something that a provider is allowed to raise. So that kind of gets scratched off your list of at least legal basis to object to these things. But you can look at the data that's being requested and as is the case with many of the geofence warrants, realize this is a lot of data. We're being asked to search across all of the users, poke into all the private accounts of these users, their location history data, and look for the evidence that the government's asking us to look for. And the result of that can be a massive amount and often is a massive amount of data. So that led to the three step process which is like this seems wrong to be turning over to the government. It may be a violation of fourth Amendment rights, which isn't something we're allowed to have an objection on. But at least maybe there's some conversation with the agent about this and we can try to get this reduced, sort of common sense attempts to reduce the privacy damage that is being caused by this massive search across a huge swath of user data in their accounts. And that's where the stepped process came from. It was our sitting down and trying to figure out what is a rational way of doing this. It wasn't really meant to be a solution to fourth Amendment problems. It was a looking at this as a practical matter, all of this data and how can we whittle it down so that the police get what they think they need and we're minimizing if not eliminating the privacy injury done to the users. That's where it came from. And the police didn't have to go along with that. They could have said no, just comply. But ultimately we really had very little pushback on that. And I don't think we ever had any pushback on getting a warrant. And thus was born this process that was used thousands and thousands of times.
B
Yeah, thank you for that, we could have a whole separate podcast at some point, you and I, Richard, about how all of that has changed within the private companies and how the take on kind of pushing back on government as private entities has kind of like has altered in the last decade or last five years even. But I'm going to turn to Michael because I think you said you termed something, Richard, that I think was actually at the heart of the case, which is essentially about whether or not this was a search, what had happened. And then of course, you know, whether or not the this had been a particularized enough warrant if it had been a search. And so, Michael, you have argued more Fourth Amendment cases at the Supreme Court than I think maybe anyone alive. You, you would be the one to correct me on that if I'm wrong. In this case in particular sits in this long shadow of Carpenter versus the United States, which you argued for the government. And that was in 2018, I think the decision came down, it was argued in 2017, and the court found a Fourth Amendment search in the government's acquisition of cell site location information. It was a narrow holding. I mean, all of these are narrow holdings, frankly. And the government argues that Chatri is meaningfully different, right, because location history is opt in on your phone, whereas in Carpenter, it was really kind of anyone walking around within the triangulation of cell towers that would have their data collected. And so the data here was kind of short term. So there's some interesting kind of conflation of issues there, terms of service, you know, whether or not you like what, like the standards and the ways that companies set up, like the design of their phones and what you opt in and opt out of and on top of all the Fourth Amendment stuff. But the petitioner argues, extending Carpenter's logic. So this was, you know, Adam, sorry, we're talking about you while you're here. Adam, extending Carpenter's logic, that highly revealing location data deserves kind of protection regardless of who holds it like applies with even more force to something like location history because it's even more precise, it's even more personal to you. And so I'm just kind of curious, what do you think about how the justices are likely to read Carpenter's reach here? Is there kind of a principled stopping point in the doctrine as a stands and, you know, and should there be?
A
Well, thank you, Kate. I think it's helpful to consider these issues against the backdrop of what the Court has been doing with the Fourth Amendment as the advances in technology have shrunk the realms of privacy and increased the ability of the police to get access to evidence. In addressing these issues that are created by new technology, the court is cognizant of several different things. One is protecting whatever the baseline of privacy or fourth amendment interest that it can identify as an original matter in the ideas of the founders. And the second thing is to keep in mind the importance of not unduly preventing law enforcement from acquiring information that can help it solve crimes. Technological advances both give the rich trove of data that the government might get and also pose the problem of intruding on privacy. In this case, the court is working in a line of cases in which it has steadily readjusted the scope of the fourth amendment from physical world, analog world searches to take into account the novel potential of technology to intrude on privacy, Carpenter the court really made an inroad into a doctrine known as the third party doctrine, which is if you give information to a third party, you no longer have an expectation of privacy in it. And as a corollary, Larry, it's not really your property. So the two branches of fourth amendment search doctrine cover intrusions on privacy, which was a mid 20th century innovation when property concepts failed to do justice to protecting people's interests. And a more recent turn back to looking at property interests, Carpenter, was a privacy case in which the court said, look, we know that cell site location information is stored by the cell site provider used by it to give you cell phone service. Sure, it's a business record, but it is also deeply revealing, comprehensive, cheap to acquire, and I think most importantly, if the government could just get it without a warrant, and it would diminish protections for privacy, that would have existed in an analog URL, where it's very hard to search somebody's location in the past. So the court breached the wall between the third party doctrine, which says if you give financial information to a bank, you give your phone numbers to a company that's dialing the phones, you don't have any fourth amendment interest. And Carpenter said, well, you do. With respect to cell site history, Chatri comes along, and it falls short of Carpenter in several respects. As Adam described, the initial tranche of data is just an hour. It doesn't build a comprehensive portrait of somebody's life, which is what the court focused on in Carpenter. It also isn't something that's indispensable to the use of a phone. About a third of the people who have the option activate their location history. Many others don't. Now, of course, that third adds up to many millions of people. So it's not a trivial slice of the pie, but it's not indispensable to living in modern life, which was one of the considerations that the Court had taken into account. So in this case, the Court is examining both. Is there enough privacy interest so that we really ought to extend the Fourth Amendment to protect this? Or alternatively, should we look at location history, as Adam argued, as my property stored in a virtual storage locker on Google servers, but it's really mine. Yeah, they have access to it. They may direct some ads to me, but that's incidental to its main purpose, which is to store information that I've decided to put on the cloud and that I can delete, that I can alter, that Google, in some meaningful sense doesn't have full control over. And maybe that's enough to bring it within the Fourth Amendment. And that argument is designed to appeal primarily to Neil Gorsuch, who is very hostile to the somewhat subjective and amorphous privacy inquiry that has been much criticized over the years and would look for something more determinate, more anchored in Fourth Amendment, in property concepts. So that is kind of the first issue that the Court had to grapple with. And I thought going in that the Court was going to have some inclination to expand Carpenter to any point of location history. And Adam made these points very effectively, and so did Justice Sotomayor, who has really been on the leading edge of protecting location history. The Chief justice asked an incredibly revealing question. If this is not a search, then the Fourth Amendment doesn't apply. The government can get this information from Google without a warrant, without any showing, a probable cause, without any particularization. And it could go to a church and say, who's going to that church? You know, maybe we think that the people there are, you know, proto revolutionaries, or they're suspicious, or maybe they're illegal, you know, illegally in the country. And we could go to an abortion clinic, we could go to a doctor's office, we could go to a school, we could go to your home, we could go anywhere. And those kinds of questions fall into the category that we used to think of as if the Justices can imagine it happening to them, it's going to attract constitutional protection so that it doesn't get out of hand and become arbitrary. So that's the search question. If you move past the search question, as I expect the Court will do, you then get to, well, what about this? Warrant warrants are the gold standard in Fourth Amendment law. They overcome really all privacy interests. They don't overcome other constitutional interests. Potentially Such as the Fifth Amendment act of Production. You don't have to incriminate yourself by turning something over not based on the contents, but by your act of producing it to the government. But a warrant pretty much overrides any Fourth Amendment interest. And to address that issue, the Court is going to grapple with a layer cake of arguments that petitioner presented and that the government sought to swat back at the broadest. Petitioner argued that the geofence warrant that Adam described is really a general warrant, which is a highly disfavored category in Fourth Amendment law. It was the impetus for Fourth Amendment protection in the first place. It basically allowed the King's agents to go anywhere, to search anyone, and to seize anything that they wanted to seize. And this is usually preceded by the adjective the hated writs of assistance and general warrants that animated John Adams and James Otis, and that's what gave us the Fourth Amendment. So you fall into the General Warren box. That's very bad. How does Adam get there? Adam says, look, you can't get location information without searching through every single account in censorvault, maybe 500 million of them. There's no way that you're going to be able to identify who's in the geofence until you peer into those location history, private storage lockers, and you see the person is there or not. There's. And that is incredibly broad. You can come up with the easy analogies of why in the real world you would never allow the government to do that. Say somebody was walking off the Queen Mary with a thousand other customers and the police smelled marijuana does not give you a right to get a warrant to search everybody there, search their staterooms. Another analogy that probably the Justices could relate to. So is Adam right? Is it a search of everybody out there? I think that no justice on the Court is going to say that, and for good reason. I don't actually think the good reason surfaced very clearly at the argument. To me, the good reason is it's not being seen by a human being. It's being passed over by a algorithm that is looking for data. And if it doesn't find anything, it moves on. And in the real world, you could make an argument that, say you were dealing with safe deposit box in bank. That could be a search if the government actually opened every safe deposit box and looked in it. But in the digital world, it doesn't really feel like one to me. And I think intuitively it won't to the Court either. So then you go on. If you reject the general warrant thesis, either historically or analytically, then you go on to whether this warrant was sufficiently particular as the Fourth Amendment requires and whether it was adequately supported by probable cause, not overbroad. And here I think there's a little bit more to work with. And the court may or may not decide that this warrant just wasn't compatible with Fourth Amendment standards. At the second and the third steps, as Adam talked about, the police there got to narrow down who's in the fence. They didn't go back to a judge. They didn't tell you why they don't have to have probable cause, and they end up de anonymizing data. And at least Justice Jackson very clearly articulated, why aren't the police going back? Why doesn't this step need to have judicial authorization in order to avoid arbitrary government action by the police?
B
Okay, Adam, I'm going to let you talk for a second instead of being talked about, but I do want to just kind of hit on a few things that Michael said and just kind of respond. One is that I think you are so correct in every time I've listened to Fourth Amendment cases, I don't know, one could argue anytime you listen to kind of cases in which the justices are grappling with something new or novel that they don't understand, which is make it real to me, which is just such a. I mean, a human impulse. But we think that by the time it reaches, like the Supreme Court of the United States, there should be something about more than whether it is like an analogy that the justices themselves can grok. Right. And it's not. It's actually, it's very much still about the metaphor game, about what you're going to give to them as kind of the. The comparison to kind of touch to say this is like the virtual locker. This is like a locker box, as they said in the arguments with glass doors. And so I think that that's just like a wonderful kind of very thoughtful conversation to kind of come out of this and how one argues in front of the Court so many times and kind of how you best make arguments to the justices. But I wanted to go back to Adam. I think that one of your central arguments, as Michael kind of just forecast, was that this was a general warrant, which is, you know, the warrant that is like the least defensible, and that Google was effectively asked to rummage through hundreds of millions of accounts to find one suspect. Whether that was done by an algorithm or people. You know, your mileage may vary and how much that matters, the government counters that the warrant was particularized. It was 150 meter radius. Right. It's a one hour window. It's not like this dragnet of like a beeper on a car or, or kind of cell pinging a cell tower for 12 hours of data. Right. It's a one hour window and it's supported by probable cause. There was a robbery and we know that something, a crime happened in this area. So I'm kind of, I want to give you a chance to kind of respond to kind of Michael here, which is like, why is the government's framing wrong about that? Like, why is particularization not about like kind of a circumspect amount of space or even a small amount of time as the court is kind of glommed onto when it's kind of made a lot of these decisions in the past. It's the dragnet nature of a lot of these cases that it really kind of pushes back on. And here that's a huge part. Trying to get them away from that distinction is a huge part, I think, of this case.
C
Sure. So maybe it would be helpful to explain the argument that we advanced in a little bit more detail. I certainly don't disagree with the way Michael very eloquently described it and then described some of the arguments against it. But yeah, I'll just say a few more words about what motivated the argument and why. We argued that at least the theory was well grounded in fourth amendment law. So it is the case as a factual matter that Google doesn't have a way of determining who was within the geofence unless it searches every single person's account. And that's because the Sensor Vault, the server that Google uses, indexes location history by accounts. So translate into English. What that means is that it's organized into different accounts. And so if you put in a single account identifier and appropriate credentials like a password, you can recover all the location history associated with that account, but no one else's. And to determine everyone within the geofence, you have to look at every single person's account. So in terms of physical analogy, and one difficulty about these cases is trying to, you know, turn the digital world into physical analogies. It's quite challenging to do that sometimes, and sometimes misleading. But one way of looking at it is just to imagine the sensor fault being like an absolutely massive a filing cabinet and every folder corresponds to one person's account. So, you know, if you want to find out one individual person's movements, you just have to take out his folder. You don't have to look at anyone else's folders, but if you want to know, say, every single document that was sent on January 1, 2026, in the whole cabinet, you can't just look at one folder. You have to open every single folder and look at every single one to find every document that was sent on that date. And that's essentially what's happening when Google searches its servers. So our argument basically was as follows. Number one, Google was really acting as an agent of the government when it was executing the search warrant. Like, it is true that Google pushed the button and not the government, but, you know, Google wasn't acting on its own. Google had a search warrant from the government. It was compelled by the government. And so Google's actions really are attributable to the government for Fourth amendment purposes. So that was the first premise. And the second premise, which is maybe a more controversial one that Michael adverted to, is that really every time the government or Google, you know, looks in every single account to see whether a person had been within the geofence, that really is a search under the fourth Amendment, and you know it. I understand there's a counterintuitive quality to that. I mean, it's just an algorithm. It's not even a human being, you know, zipping past every single account, just doing a quick check as to whether the data matched the data that Google was looking for. No human being ever laid eyes on it. It was just a computer. And if the, you know, if the software did not find the within geofence information, it would just go on to the next account and sort of no one would. That does seem a little bit less intrusive than, you know, the police coming to every single person's house with the battering ram and checking inside everyone's diaries. But nonetheless, our argument that it was a search is well grounded of every account is well grounded in both fourth amendment law and the English language. I just, I think the ordinary English way to describe what happened here is that Google searched every account. And there was a moment of the oral argument where there's some discussion as whether as to whether Google really had searched every account or queried every account. But I just, I think an ordinary English speaker would say, yeah, Google searched every account to see whether there was within geofence data. And I know it was a computer that did it, but I think the word search is apt here. And to me, the relevant analogy that I find persuasive is suppose a police officer came to you and said, hey, I'D like to check your cell phone as to whether you were at that protest last week. And let's just. The police officer said, look, I'm not going to look in your phone myself. I'm just going to use a piece of software just to check whether you were there. And I promise that if you weren't there, I won't look at anything else on your phone. I'll leave. I just want to look at your cell phone for that very specific purpose. I do think in the ordinary, in ordinary English, a lot of us would think that that's, that's a type of search. It's a very minimal search in some sense. You know, the government is only looking for a very discreet piece of information. It's not laying eyes on anything. Software is doing the work, but it still feels like a search in ordinary English. And I think most people would say, you know, get a warrant. And that's essentially what was happening here, except the data was in the cloud as opposed to on people's cell phones. And the other point is, you know, there is case law from the Supreme Court holding that even a fairly minimal intrusion still qualifies as a search as long as it's sort of invading that protective area. I feel awkward talking about this with Michael on a call because he's argued like every single seminal case on this issue in sort of the history of the Supreme Court. But you know, there's a case called Jones, which holds that merely putting a GPS on the underside of a car, that minimal trespass was enough to qualify as a search. There's a famous case called Kylo involving the police holding up a so called thermo vision to someone's house just to check if it was hot or cold. They were checking for marijuana. And that was a sufficient basis. You know, that was a fairly minimal intrusion. All you're determining is the temperature. But the court nonetheless held that because you're getting information about what's going on inside the house, that's a search. There's another famous case called Arizona vs Hicks that holds that merely lifting a turntable to see a serial number underneath is a search. So, you know, there's a bunch of doctrine that says that even minimal intrusions is a search. And so we argued that checking someone's Google account as to whether they were within the geofence is a search under that line of authority. I'll just say one more word about this. You know, I think there's two challenges of litigating this type of case, at least for me. One is trying to turn, you know, digital technology into real world analogies that can sometimes be misleading. And the other is working with a broad terrain of doctrine when the justices are actually quite, you know, practical people. As an attorney, there's such an instinct to sort of weave your way between the different cases and pull the doctrine out and apply it to your fact pattern. And, you know, the justices are, you know, pragmatic people, they're reasonable people, and they want to understand the real implications of whether something is a search or not. And I think those are, you know, challenges on, really on both sides of the House in litigating fourth Amendment cases in the digital world. But what I've described to you is how we tried to turn traditional fourth Amendment law and the facts of the case into an argument that this was a general warrant and that general warrants violate the fourth Amendment.
A
Kate, can I just say a word in response to Adam here? Because I think that the last thing that he said really frames up one of the key things that the Court is thinking about when it's trying to decide whether to extend doctrine, remold doctrine, apply an analogy. Adam's analytical arguments from the cases are incredibly precise and accurate. The difficulty, at least for some members of the Court, is that the logical conclusion of saying that all of the censorvault accounts are searched, all 500 million of them, is you could never get a geofence warrant because you have no probable cause to get into those accounts. If you equated them to a house, as in kilo, you need probable cause particularized to that house. If you're searching a person, the same, if you're searching their cell phone records, their email record is the same. So I'm going to say that one of the biggest obstacles to accepting that argument as a practical matter is it means you could not solve crimes with using any kind of reverse search warrant. I think we should talk a little bit about the stakes involved in reverse search warrants, because this is not the only context in which they come up. And the Court will face even more difficult problems than this, I think, down the road. But knocking out the ability of the government to try to find out who committed this crime through a fairly discreet inquiry where you clearly have probable cause that the bank robbery occurred and that the person who committed it was on a cell phone, you don't have a guarantee that his location history will be in Google, but you've got a reasonable shot. There are other providers that the government might have gone to to try to round out the profile of what Phones were in that area and this led to the solution of a pretty serious robbery. And the same is true for murders, for rapes, for kidnappings, for a variety of other crimes. So if you're pitching an argument to the court that requires a kind of analogical extension of real physical world precedence to a digital context that doesn't quite feel the same, and the consequences are the government's going to solve these crimes even with a warrant that's going to make it a tough road, a hoe. And on the other side, the practical argument that Adam made incredibly successfully and eventually forced the government to basically say uncle is that if all information that's stored with the cloud is placed there voluntarily, as you alluded to in your setup question, and therefore it means the third party doctrine kicks in and you have no expectation of privacy, it's like hanging it out your window so anyone can see it. That covers email, it covers Google Docs, it covers calendars, covers photos and maybe much more health records and attorney client communications and who knows what. And there's no way that the court is going to buy that. And the government knows that. When I was doing in these cases, I had internal arguments that we should say that email is not protected by an expectation of privacy because Google scans it to direct ads to you. And I said, yeah, you know what? Email is the modern letter, and we are never going to get the court to say that there's no expectation of privacy in it, so why try? Adam incredibly successfully parlayed that argument into his pitch. And the government, after trying to stave off giving an answer several times, finally got pinned down and had to admit it wasn't going that far.
E
This episode is brought to you by Bill, the intelligent finance platform that helps businesses and accounting firms scale with proven results. When you're growing a business, the stakes get higher. You can't afford infrastructure that breaks under pressure.
C
Pressure.
E
If you care about security, reliability and scale, I want to let you in on a secret. Bill is the foundational software that nearly half a million businesses and 90 of the top 100 US accounting firms use to automate back office workflows, add secure controls to payment processes, and scale without increased overhead. With AI powered accounts payable automation, Bill erases the busy work from capturing invoices, routing approvals, and processing payments, syncing seamlessly with the top accounting software platforms. So your books are always accurate. But Bill isn't just accounts payable. It supports the full payments workflow. Bill has processed over $1 trillion in transactions, leveraging that expertise to help you manage, move and maximize your finances. So stop the guesswork and start scaling with the proven Choice. Go to Bill.comProven to talk with a payments expert and get a $250 gift card as a thank you. That's Bill.comProven. terms and conditions apply. See Offer page for details. Deleteme makes it easy, quick and safe to remove your personal data online at a time when surveillance and data breaches are common enough to make everyone vulnerable. Look, it does all the hard work. You give it the information that you want to get rid of from the public domain and it does the job of wiping you and your family's personal information from data broker websites you can it isn't just a one time service. DeleteMe is always working for you, constantly monitoring and removing the personal information you don't want on the Internet. The data brokers don't quit. They keep putting stuff about you back where the bad guys can get it. And Delete Me doesn't quit either. It keeps taking it down and it sends you regular personalized reports showing what information they found, where they found it, and what they removed. That's why the New York Times Wirecutter has named Deleteme their top pick for data removal services. I'm somebody with an online presence. I do a lot of commentary on things. I don't hold back on my opinions. I have people out there who really don't like me and yet my privacy is important to me. I don't want things that I don't want about myself in public to be made public. I don't want people knowing where I live or knowing what my car's license plate is. They One time somebody defaced my car. I've been a victim of identity theft harassment and if you haven't, you probably will be at some point and you probably know someone who has. Delete Me can help. So take control of your data and keep your private life private by signing up for Delete Me now at a special discount for our listeners. Get 20% off your delete Me plan when you go to join deleteme.com lawfare20 and use the promo code lawfare20 at checkout. The only way to get 20% off is to go to joindeleteme.com lawfare20 and enter the code lawfare20 at checkout. That's joindeleteme.com Lawfare20 code lawfare20.
A
Need real insight from industrial data? Verse it with a single source of everything and get the best outcomes. Transform the everyday With Siemens every idea
B
starts With a problem. Warby Parker's was simple. Glasses are too expensive. So they set out to change that. By designing glasses in house and selling directly to customers, they're able to offer prescription eyewear that's expertly crafted and unexpectedly affordable. Warby Parker glasses are made from premium materials like impact resistant polycarbonate and custom acetate. And they start at just $95, including prescription lenses. Get glasses made from the good stuff. Stop by a Warby Parker store near you. There's never been a better time to get outside and experience the benefits of nature. Discover nearby trails and explore the outdoors with alltrails. Download the free app today and find your outside. Yeah, there were a number of points where, where the government had to kind of concede some of the realities of the situation and that they weren't arguing cert for certain types of things to be included in the, in the search terms. But you state this very well. I want to get back to the stakes in a second. I completely agree with. We should talk about where the third party doctrine is going, what the stakes of this are, but it would be a huge waste of having Richard here if we could not just like unpack everything that you guys just talked about, about how we think about what the technology is. Richard, you were, you wrote the Technologist brief in this part. You wrote part of this brief. There seems to be. And I, I, you can tell me if you think that I'm wrong. But everything that Adam just said and Michael just said, these are consistent kind of appeals to a physical world that just does not really actually map on very clearly. Although maybe it doesn't matter. Maybe reality is what we want it to be. Maybe email is just going to be a digital letter, even if it's actually not working like a digital letter. Maybe we're just always going to think of email like a digital letter because that's what it feels like to us. And this is like, you know, that's, that's going to be the end of it. But one of the things that you could, that I don't think got enough credit or didn't get enough discussion in oral argument and I thought was great was the discussion the Technologist brief lays out about exactly how the cloud works, how it's not like file folders, how it's not like someone searching like your hard drive, how it's not like someone searching your location history. Can you tell me, can you just talk to us a little bit about like, you know, what you spelled out there for the court?
D
Sure, absolutely. I mean, the the idea was to let's look at reality here. And if you think you need an analogy, fine, we can look at analogy. But we've been working with computer networks for 50, 60 years now, and we all have our experience. We know what our personal accounts are and whether they're storing email or photos or videos or docs or spreadsheets. You can go on down the list of different data types that we store. We all have this concept of a private space that we use with providers where we store this information and the concept of an account and that only we have access to it. And maybe we can share elements from it or use it to communicate with one another. That's not uncommon. I don't know that we need to look at safety deposit box. Probably far more people have these accounts than have safety deposit boxes, but maybe that's not the case with these jurists. So I think one of the things we were trying to point out in the brief was this is not. You really don't even need to start straining yourself looking at safety deposit boxes and whether they're translucent. And all of that line of inquiry that went on in the oral argument, when we've got decades of experience, we have generations of people who've lived with this. We know what it is. So we really all have this experience. And it may just not be necessary to, I would think, at this point, and it may be because I'm living for three years in a bubble of tech, but it certainly feels like a common part of our lives. And if you're. And you know, going back to Fourth Amendment doctrine, if we accept the account as this thing that exists that we can all identify, you even find examples of account being used in the law and the law of trespass and in our surveillance statutes. Talk about accounts and searching accounts. It's very not. It's not foreign to people, nor is it foreign to our law, then you can use that and you can say, okay, this feels like in these geofence warrants, this particular application geofence warrants to Google for location, history, information. The place to be searched, which is you must specify according to the Fourth Amendment to get your warrant. The place to be searched are the accounts that Google has structured the data structure for its services, including location, history, and Gmail and all the others, is around the account. And Google is being told to enter these accounts and search for the data and pull out whatever the government is telling it to pull out in the warrant. And that is how the companies, not just Google, but all these hyperscalers and so many more. And these, from small to large operate, and their data structures and the code and the expectation and the policies, security policies, physical all are there to protect these accounts and the data structures formed to make them. And that's the experience we have. It really doesn't make sense to me to ignore that and say, well, we're just going to treat this as though it's an Excel spreadsheet, like it's the mail merge file for your holiday cards, when it's really this rather elaborate data structure spread across very sophisticated infrastructure. The right abstraction, I think, is to treat the accounts as the place to be searched. And then it does lead to the question of, well, is it a search for the Fourth Amendment purposes when all that's happened, when all that's happening is that code is being run, run across it, that's fine to struggle with that. I do worry that that's a question that may lead the court into a decision that's going to be very much the Olmstead of our era to say that these kind of searches, because it's done through software, aren't searches. We've seen the 2nd Circuit reject that in admittedly slightly different context in the Hashbarami case, which involved the Section 702 collection, where this data is collected for one purpose, but the government searches it for another purpose. And the court and the Eastern District of New York holding that is a search for Fourth Amendment purposes, even though it's just software and it's data in the possession of the government lawfully, it's not even a third party being forced to do it, that that's still a search. Now, the FISA court disagrees with that. And so there's plenty of debate to be had there. But it's not a foreign concept at all. And certainly for the hyperscalers, they're going to look at this and you look at the location history accounts, and you say, well, what's the difference between this account and the email and the docs and the photos? This is where the users have stored data. It happens to be location data. So we have a different rule for different types of data. And what happens if the location data is in the email account, in the email where you have said where you are? Or what if it's in a doc, which is nothing more than a list of the location of your phone, which you could certainly have automated. So it leads down a very troublesome analytical path for the court that's very easy to resolve if you just start with the place to be searched as the account.
B
Yeah, I think that's a correct kind of framing. And I just wanted to say to something that Michael said yesterday and that the court addressed in arguments was essentially that there was this question of, well, if this is a voluntary measure of turning on this location history. So. And it's not essential to daily life. And you know, when I was listening to that in the arguments, I said it's not essential to daily life now, but actually it might be legally required in the future because there are all of these age assurance laws that are coming out. All of these things that really might kind of to, in order to understand which state you're in and which laws the, the company, the private companies have to comply with would really necess. Necessitate knowing exactly where you're, where you are in your location history and what they have to potentially give over to the government. So that might not be a voluntary thing in very short order because I think that geolocation is going to become increasingly a focus potentially of lawmaking. But that aside, I want to kind of switch the stakes here and kind of the last kind of questions and open this up to everyone. But I'll start with kind of aiming this at Micha, which is that, you know, Oren Kerr, like at Stanford, filed this influential amicus brief. The justices, I think referenced him either by name or the idea that he coined about virtual lockers about three times during arguments. And he had like put his brief in siding with the government. And his proposal was that if it, even if a geofence search is a fourth Amendment search and he doesn't think it is, one warrant could authorize the whole search with constitutional concerns addressed through use restrictions downstream. Right. Limiting how the government can deploy information about people who turn out not to be suspects. Essentially like we could also essentially something like what Google instituted through its three step program. But does they did so voluntarily. And this could be something that could happen also with the government. And I'm just. From your perspective, is a use restriction framework administrable? Like do you see it about a broader shift towards thinking about fourth Amendment protection at the back end of an investigation rather than at the the front end? Is that a potential way that the court might think about narrowing this decision?
A
These are great questions and they really have to be answered in a very context specific way here. I think the context was fairly tangible of a robbery. You get 19 names from the geofence warrant and then it has to be narrowed down. And I think if one wants to defend this warrant and the information that's acquired. You have to defend the whole two hours that the government got at step two of the nine people that it selected from the original 19. And at that point, you're really straining probable cause. I mean, it's one thing to say we want to figure out who the bank robber was in the immediate vicinity of the bank immediately before or after the robbery. That is, I think, going to strike most jurists as a reasonable scope to identify the potential bank robber. Once you start going outside of that and you're really looking at a much broader range of locations, you are acquiring a lot more information about people. You're not quite to the level of the carpenter. Seven days or more of location data. But even for those who think that a couple of minutes of location data is nothing because we don't really conceal our identities when we go out into the world and go to a bank, and we're probably on surveillance cameras anyway, the further you extend that, the more attenuated the probable cause argument gets. And the government didn't go back, as I said, to the magistrate to get that narrowing. And it doesn't go back to the magistrate to de anonymize the three people. That is assuming that anonymization actually matters. I think Adam has some pretty strong arguments that for fourth amendment purposes, it doesn't. If you broke into a house and you had no idea who lived in the house and you didn't have any data on that, it would still be a search of the house for someone who did in fact, live there. So anonymity, I think, is a rather weak argument for narrowing the search. And if you look at it in that context, you ask about use restrictions there, I think the court may well say, we're going to allow you to get this government. We're not going to analogize this to some search of 500 million accounts. That means we're out. Why? If we did that, techniques like tower dumps are really called into question. A tower dump is getting all the cell phones that connected to a cell tower, and the government uses that a lot lot when it has no leads on a person who committed a tangible crime. And it solved a lot of very serious crimes. So court is going to be reluctant to go down that route, but it may be more willing to say we still want more checks against the government making its own decisions about how much further it wants to extend privacy intrusions on individual people. And if I could say one thing in response to the sort of broader argument that we spent a lot of time wrestling with and that Richard Very eloquently and with technological precision framed up as, you know, we're searching everybody's accounts. And he referred to 702. 702 is, of course, the way the government gets information about foreign people speaking overseas who are associated with or believed to be associated with terrorism. And thus the acquisition of the information occurs in the United States. You don't get a traditional warrant. You get a certification by the Attorney General that allows you to scoop up all of that stuff. The real controversy has been, well, a lot of Americans might have been talking to those people. It goes into a big soup, a big database. And as Richard said, there has been an effort by the government to say, well, once it's in the database, it's ours. We acquired it lawfully, we can do anything we want with it. And courts in the Second Circuit are pushing back. I actually worry that extending the concept of a search to a digital algorithm, passing over the data, would cut against the argument that a warrant is needed to go into that database of 702 information to look for a specific individual. Why? The traditional view is that if information has been exposed to the government in a search, the expectation of privacy for that information is generally gone and the government can go back into it. Because once the expectation of privacy has been overcome, there's no longer a basis for saying that it's a search. Like the government could read the same document six or seven times. Times two through seven are not new searches. So if we conceptualized everything in the 702 database, which undoubtedly gets queried by AI or by computers as a search of everything in there, I think it would actually undermine the argument that a targeted search for a US Person in that database require some Fourth Amendment protection, as the district court said, a warrant. So those are some practical implications of the kind of expansion of the concept of search in ways that may be analytically and technically accurate, but produce consequences that I think we need to take carefully into account before we apply the Fourth Amendment to this novel context.
B
Yeah. Adam, I'm very curious to know whether you think that the third party doctrine is. I mean, it wasn't as kind of central here as it was in Carpenter and other types of things. What are you kind of seeing as the stakes here? And do you see the court is continuing kind of to narrow and very carefully limit the scope of the Fourth Amendment as they have been in these case by case bases, or do you think there's any chance to that they might make a broader decision on the. The facts of this case?
C
Well, I'm not going to try to predict what the court is going to do. Whenever I do that, I'm usually wrong. And it's a little hard to be objective here. But, you know, I can talk a little bit about some. Some of the stakes in the case. You know, we made this an interesting case in some ways a challenging case to litigate, maybe on both sides, is that there's really a lot of different issues in the case. There's whether there was a search, whether there was a warrant, and both of those issues had a fair number of sub issues. And so depending on how the court rules on every one of those issues and sub issues, you might have a broader or narrower ruling. But it is the case that in terms of what's at stake, the government did take the position that data in the cloud in general, at least in its brief, it took the position that data in the crowd in general is not protected by the Fourth Amendment because, you know, privacy policies by cloud providers typically say things like, you know, we'll respond to search warrants and we reserve the right, the right to analyze our data. Data for certain reasons. And the government argued that that is a sufficient basis to establish that the user has abandoned any reasonable expectation of privacy. And that has a pretty. That has pretty broad implications, pretty troubling implications from my perspective. You know, if you're using email sending documents or photos, you shouldn't have to show that the emails are documented themselves, are particularly private. Like if I, you know, take a picture of a beautiful sunrise, you know, maybe lots of people were observing that sunrise. And so it's not a particularly private photograph, but I still think it's mine. I still don't necessarily want the government snooping on it. And the fact that I sent it into the cloud and that Google may retain some rights to, you know, analyze it for its own purposes, maybe even for advertising purposes. I'm not sure that's a sufficient basis to say that I've implicitly consented to the government looking at it. I've abandoned an expectation of private privacy. So if the court were to reach that conclusion, which I think it's unlikely, given the. The government's concessions during the oral argument, that would have potentially broad implications. But, you know, I do think that, you know, that that is the likely out is not a likely outcome on the issue of the warrants. You know, there's a number of different issues that were raised, you know, but I would, you know, I'd be concerned about if the court is to hold, and I'm not going to speculate on what it's going to hold and not going to hold, but if it's going to hold that geofence warrants are not inherently or categorically unconstitutional, constitutional. Now, I would still be concerned with the ruling that, you know, every single person, you know, merely by virtue of their proximity to the crime, necessarily, there's probable cause to establish that. You can look inside of their Google accounts for, you know, a very large amount of time to inspect all their movements. You know, that that's a little bit of a troubling argument from my perspective. In this particular case, for example, the geofence encompassed a bank and a church. In fact, Most of the 19 people who were in the geofence were just sitting at church the whole time. To me, it's very hard to say that there's probable cause to determine that two hours of those people's movements, including outside the geofence, including perhaps when they went home from church, there's probable cause to search those movements merely because they were sort of near the scene of the crime. That, to me, would be inconsistent with how I ordinarily understand the concept of probable cause. And I would be troubled if the court stretched the concept of probable cause in that way. So if it were the case, hypothetically, that the court were to say this was not a general warrant and that, you know, geofence warrants are sometimes permissible. You know, one of the important issues the court will face is how to think about probable cause in this context. And I would hope, at least from my perspective, that the court will sort of rigorously enforce the concept of probable cause and hold that you really need to think that, you know, the evidence that you're looking for, really, there's probable cause to believe that that really is, you know, going to be relevant to a criminal investigation beyond mere speculation as to, you know, hey, maybe it'll be useful and we don't know. And so, you know, just the mere hypothetical possibility is enough.
B
Really quickly, Richard, I just kind of want to ask you, you know, those are the implications for fourth Amendment. What are the implications going to be for private companies coming out of this? What are private companies looking for? You know, the framework that Google set up that was discussed in this case, the terms of services, things like the opt in versus opt out on location history and the defaults that are in place with that? I mean, are companies going like, what stakes do companies have for this? Do they have no stakes at all right now? They do a lot of work kind of pushing back against the Government and checking for warrants and things like that. Do they need to be doing that work? Are they going to get out of the business of doing some of that work?
D
Well, I will say I think the geofence warrant itself, as we are seeing in this case those days are gone. That service is no longer available to the extent that it's on server side now. The data is located on the individual devices and so you can still get your timeline service, although the data is coming off of your phone and not with Google. So I think this is over. There are some other companies who are getting geofence requests, but I don't think they were in quite the same context where the information is uploaded by the user to store in their personal account for later access. Access. So there's other flavors of geofence that just aren't going to present this place to be searched issue or business record issue quite the same way as here. So I think we might be done with these. It's hard to tell. Maybe I'm wrong in that and maybe it pops up in a like context in some other situation. I do think it means that companies will take a look as they have been at trying to. How do we as a company tell our users that when you send the data to us, this is the kinds of things that will happen, how it's processed, how it's handled and the situations where it might be disclosed. And when you're open and trying to be transparent and give your users an idea of what happens when they entrust their data with the provider and you tell them, you know, there's a chance the government might come and ask for this information and we might have to comply to it. And then to have the government and others argue, well, that means that you've consented to turning over the data to the government, which is nonsense. Right? It's just telling the user that there is a world of legal process that the companies are required to comply with. So I know there's a struggle like how do you tell the users without that turning into a consent to disclose to the government kind of a situation, so they'll be continued to struggle around that. I do think there are some other red flags in at least the government's argument. I don't know how seriously to take them. There was one point where the government was talking about moving the data to the phone and that Google doesn't have access, or so they say, to the data on the phone. But if that was different, then maybe the geofence technique would come back again. That definitely caused the hair on the back of my neck to rise up. The idea that the government might think that it, through compelled assistance orders, could have Google or any provider access the personal devices of users to be able to get data. I don't know how serious to take that. That may not have been what he was trying to get. He may have been more just saying it's data not in the possession of Google anymore. But that. But that's the sort of thing that I think when you are a provider, you worry about that you are going to become what Michael was saying, one of the King's agents, through compelled assistance to engage in these surveillance activities through code. So it doesn't seem to implement or implicate the Fourth Amendment because it's not a search through malware to be able to extract. And now this is getting a little crazy, I hope, but that is a little bit of a thing you hear when you're in a provider that's like, what does that mean? Like, where's the end of this? When does this end? What is the full scope of what the government is asking for? Because it's not clear. It's not clear why location history in a personal account is distinguishable from the things the government conceded, like Gmail and docs and Calendar, when it's all the personal data of the user entrusted to the provider. So I think those are the. It's a struggle to figure out, well, how is the court, if the court affirms or allows this, maybe with some guidance on describing with particularity the things to be seized, how is this going to be used going forward, and how are they going to distinguish this case from email and docs and so forth?
B
Yep, I think that's a great place to leave it. It's going to be a brave new world. It constantly is with all of this new technology and trying to overlay these very physical world doctrines onto these new situations.
A
ACAST powers the world's best podcasts.
B
Here's a show that we recommend. Do you want to know the best part about being married to a woman? That there's no man involved.
D
I mean, true, but I was gonna say that it's a sleepover every single night with your best friend.
B
Oh, yeah, that part's cute, too. I'm Taryn. She's Cami.
D
We're married.
B
And staying up is our weekly pillow
D
talk out loud with you. We're giggling, we're gossiping, we're arguing. Classic marriage stuff.
A
Just having fun being wives while we
B
navigate growing up and building a family together. Then our sleepover grows. Our listeners call the Pee Pee Hotline
D
with their own gossip, burning questions, late
B
late night spirals, all the stuff they'd only tell their best friends.
D
So it's a private sleepover, but you
B
are invited staying up with Taryn and Cami New episodes weekly follow wherever you listen. Acast helps creators launch, grow and monetize their podcasts everywhere. Acast.com situations that are just kind of not perfect fits but Adam Michael Richard, thank you so much for joining me for this chat on Chatry and putting up with that pun. We will hopefully see you again soon on Lawfair.
A
Thank you.
D
Thank you, Kate.
B
The Lawfare Podcast is produced by the Lawfare Institute. If you want to support the show and listen ad free, you can become a Lawfare material supporter@lawfairmedia.org supporters also get access to special events and other bonus content we don't share anywhere else. If you enjoyed the podcast, please rate and review us wherever you listen. It really does help. And be sure to check out our other shows Scaling Laws, Rational Security, Allies, the Aftermath, and Escalation. Our latest Lawfare Presents podcast series about the war in Ukraine. You can also find all of our written work at Lawfare Media. The podcast is edited by Jen Patia with audio engineering by Kara Shillin of Goat Rodeo. Our theme song is from Alibi Music, and as always, thanks for listening.
Lawfare Daily: Chatting on Chatrie with Adam Unikowsky, Michael Dreeben, and Richard Salgado
Date: May 5, 2026
Host: Kate Klonick
Guests: Adam Unikowsky (counsel for Chatrie), Michael Dreeben (former Deputy Solicitor General), Richard Salgado (former Senior Counsel, Google; Lecturer at Stanford)
In this episode, Lawfare’s Kate Klonick hosts a deep-dive discussion on Chatrie v. United States, the Supreme Court’s closely watched case on geofence warrants and the Fourth Amendment. Joined by legal experts Adam Unikowsky (who argued Chatrie before the Court), Michael Dreeben (noted Fourth Amendment litigator and expert), and Richard Salgado (former Google counsel and technologist briefing co-author), the episode explores the stakes, the doctrine, and the future of digital privacy in criminal investigations.
The episode frames Chatrie as a watershed moment for digital privacy and the Fourth Amendment, highlighting both the legal doctrine’s struggle to keep up with technological change and the very real consequences for nearly everyone living in a digital society. The guests agree that, whatever the Supreme Court decides, the debate over privacy, government surveillance, and the obligations and rights of technology companies is far from over:
“It’s going to be a brave new world. It constantly is with all of this new technology and trying to overlay these very physical world doctrines onto these new situations.” – Kate Klonick (67:15)