A reverse search warrant is a type of search warrant used in the United States, in which law enforcement obtains a court order for information from technology companies to identify a group of people who may be suspects in a crime. They differ from traditional search warrants, which typically apply to specific individuals. [1] [2] Geo-fence warrants, which seek data on mobile phone users who were in a specific location at a given time, and keyword warrants, which request information on users who searched specific phrases, are two types of reverse search warrants. [2]
Reverse location warrants were first used in 2016, and have become increasingly widely used by United States law enforcement. [1] Google reported that it had received 982 reverse location warrants in 2018, 8,396 in 2019, and 11,554 in 2020. [2] A 2021 transparency report showed that 25% of data requests from law enforcement to Google were geo-fence data requests. [3] Google is the most common recipient of reverse location warrants and the main provider of such data, [4] [5] although companies including Apple, Snapchat, Lyft, and Uber have also received such warrants. [1] [3]
Geo-fence warrants, also called reverse location warrants, seek to compel data from search engine companies and other technology companies that collect mobile location data, to determine which users may have been in a specific location at a given time. [2]
Keyword search warrants seek to compel search engine companies to release data on users who have searched specific phrases—for example, an address that was later the location of a crime. [2] Keyword warrants are comparatively rare but have been used to request data from companies including Google, Microsoft, and Yahoo since at least 2017. [6]
Companies that collect DNA data have received warrants from law enforcement seeking to access their databases. GEDMatch and Family Tree DNA have cooperated with such requests, while larger companies like Ancestry.com and 23andMe have stated they would fight such attempts by law enforcement. [7] [8] These warrants attempt to connect DNA samples from crime scenes with data belonging to commercial DNA testing companies. Even if a perpetrator of a crime has not submitted their data to such companies, DNA samples belonging to relatives, even quite distant ones, have been used to identify suspects and criminals. [7]
Some lawyers and privacy experts have argued reverse search warrants are unconstitutional under the Fourth Amendment to the United States Constitution or unauthorized by the Stored Communications Act, notwithstanding the third-party doctrine (there is no reasonable expectation of privacy for information voluntarily given to third parties). The Fourth Amendment specifies that warrants may only be issued "upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." [1] Some lawyers, legal scholars, and privacy experts have likened reverse search warrants to general warrants, which are not permitted by the Fourth Amendment because they lack specificity in terms of the place to be searched or the items to be seized. [1] Although most judges have authorized geofence warrants, at least two federal judges have ruled that such warrants violate the Fourth Amendment's requirements of probable cause and particularity. [9]
Groups including the New York Civil Liberties Union and the Surveillance Technology Oversight Project joined state senator Zellnor Myrie and assembly member Dan Quart in 2020 to begin work on legislation in New York that would prohibit both geo-fence and keyword warrants. [3] Groups including the Electronic Frontier Foundation have opposed geofence warrants in amicus briefs filed in motions to quash such orders to disclose geofence data. [9]
The Fourth Amendment to the United States Constitution is part of the Bill of Rights. It prohibits unreasonable searches and seizures and sets requirements for issuing warrants: warrants must be issued by a judge or magistrate, justified by probable cause, supported by oath or affirmation, and must particularly describe the place to be searched and the persons or things to be seized.
A search warrant is a court order that a magistrate or judge issues to authorize law enforcement officers to conduct a search of a person, location, or vehicle for evidence of a crime and to confiscate any evidence they find. In most countries, a search warrant cannot be issued in aid of civil process.
The Electronic Communications Privacy Act of 1986 (ECPA) was enacted by the United States Congress to extend restrictions on government wire taps of telephone calls to include transmissions of electronic data by computer, added new provisions prohibiting access to stored electronic communications, i.e., the Stored Communications Act, and added so-called pen trap provisions that permit the tracing of telephone communications . ECPA was an amendment to Title III of the Omnibus Crime Control and Safe Streets Act of 1968, which was primarily designed to prevent unauthorized government access to private electronic communications. The ECPA has been amended by the Communications Assistance for Law Enforcement Act (CALEA) of 1994, the USA PATRIOT Act (2001), the USA PATRIOT reauthorization acts (2006), and the FISA Amendments Act (2008).
Mobile phone tracking is a process for identifying the location of a mobile phone, whether stationary or moving. Localization may be affected by a number of technologies, such as the multilateration of radio signals between (several) cell towers of the network and the phone or by simply using GNSS. To locate a mobile phone using multilateration of mobile radio signals, the phone must emit at least the idle signal to contact nearby antenna towers and does not require an active call. The Global System for Mobile Communications (GSM) is based on the phone's signal strength to nearby antenna masts.
In United States constitutional law, expectation of privacy is a legal test which is crucial in defining the scope of the applicability of the privacy protections of the Fourth Amendment to the U.S. Constitution. It is related to, but is not the same as, a right to privacy, a much broader concept which is found in many legal systems. Overall, expectations of privacy can be subjective or objective.
United States v. Graham, 846 F. Supp. 2d 384, was a Maryland District Court case in which the Court held that historical cell site location data is not protected by the Fourth Amendment. Reacting to the precedent established by the recent Supreme Court case United States v. Jones in conjunction with the application of the third party doctrine, Judge Richard D. Bennett found that "information voluntarily disclosed to a third party ceases to enjoy Fourth Amendment protection" because that information no longer belongs to the consumer, but rather to the telecommunications company that handles the transmissions records. The historical cell site location data is then not subject to the privacy protections afforded by the Fourth Amendment standard of probable cause, but rather to the Stored Communications Act, which governs the voluntary or compelled disclosure of stored electronic communications records.
United States v. Kincade, 379 F.3d 813, is a case of the United States Court of Appeals for the Ninth Circuit dealing with the constitutionality of collecting and retaining DNA from parolees.
Maryland v. King, 569 U.S. 435 (2013), was a decision of the United States Supreme Court which held that a cheek swab of an arrestee's DNA is comparable to fingerprinting and therefore, a legal police booking procedure that is reasonable under the Fourth Amendment.
The third-party doctrine is a United States legal doctrine that holds that people who voluntarily give information to third parties—such as banks, phone companies, internet service providers (ISPs), and e-mail servers—have "no reasonable expectation of privacy" in that information. A lack of privacy protection allows the United States government to obtain information from third parties without a legal warrant and without otherwise complying with the Fourth Amendment prohibition against search and seizure without probable cause and a judicial search warrant.
In re Application of the United States for Historical Cell Site Data, 724 F.3d 600, was a case in which the United States Court of Appeals for the Fifth Circuit held that the government can access cell site records without a warrant. Specifically, the court held that court orders under the Stored Communications Act compelling cell phone providers to disclose historical cell site information are not per se unconstitutional.
Mass surveillance in Australia takes place in several network media, including telephone, internet, and other communications networks, financial systems, vehicle and transit networks, international travel, utilities, and government schemes and services including those asking citizens to report on themselves or other citizens.
Microsoft Corp. v. United States, known on appeal to the U.S. Supreme Court as United States v. Microsoft Corp., 584 U.S. ___, 138 S. Ct. 1186 (2018), was a data privacy case involving the extraterritoriality of law enforcement seeking electronic data under the 1986 Stored Communications Act (SCA), Title II of the Electronic Communications Privacy Act of 1986 (ECPA), in light of modern computing and Internet technologies such as data centers and cloud storage.
Microsoft Corporation v. United States of America was a complaint for declaratory judgment action filed in the U.S. District Court in Seattle, Washington. At issue was the 1986 Electronic Communications Privacy Act. with Microsoft arguing that secrecy orders were preventing them from disclosing warrants to customers in violation of the company's and customers' rights. The case was started in April 2016 and although the government bid for dismissal of the suit, in February 2017 a federal judge set a trial date set for June 2018. Microsoft was supported in its lawsuit by companies such as Amazon, Apple, Google, Dropbox and Salesforce. The case was dropped by Microsoft in October 2017 after policy changes at the Department of Justice. Although no laws were changed, the new DOJ policy "changed data request rules on alerting Internet users about agencies accessing their information," and mandated defined periods of time for secrecy orders from the government. Although the change represented "most of what Microsoft was asking for," Microsoft did not rule out future litigation.
Carpenter v. United States, 585 U.S. 296 (2018), is a landmark United States Supreme Court case concerning the privacy of historical cell site location information (CSLI). The Court held that the government violates the Fourth Amendment to the United States Constitution when it accesses historical CSLI records containing the physical locations of cellphones without a search warrant.
Investigative genetic genealogy, also known as forensic genetic genealogy, is the emerging practice of utilizing genetic information from direct-to-consumer companies for identifying suspects or victims in criminal cases. As of December 2023, the use of this technology has solved a total of 651 criminal cases, including 318 individual perpetrators who were brought to light. There have also been 464 decedents identified, as well as 4 living Does. The investigative power of genetic genealogy revolves around the use of publicly accessible genealogy databases such as GEDMatch and FamilyTreeDNA. On GEDMatch, users are able to upload their genetic data from any direct-to-consumer company in an effort to identify relatives that have tested at companies other than their own.
Search engine privacy is a subset of internet privacy that deals with user data being collected by search engines. Both types of privacy fall under the umbrella of information privacy. Privacy concerns regarding search engines can take many forms, such as the ability for search engines to log individual search queries, browsing history, IP addresses, and cookies of users, and conducting user profiling in general. The collection of personally identifiable information (PII) of users by search engines is referred to as tracking.
Sensorvault is an internal Google database that contains records of users' historical geo-location data.
A geo-fence warrant is a search warrant issued by a court to allow law enforcement to search a database to find all active mobile devices within a particular geo-fence area. Courts have granted law enforcement geo-fence warrants to obtain information from databases such as Google's Sensorvault, which collects users' historical geolocation data. Geo-fence warrants are a part of a category of warrants known as reverse search warrants.
Digital Search and Seizure refers to the ability of the United States Government to obtain and read an individual's private digital correspondence and material under The Fourth Amendment of the United States Constitution.
Fog Reveal is a tracking tool that aggregates location data from mobile apps. It is a product of FOG Data Science.