Supreme Court Takes Up Police Use of Cell Phone Location Data in Criminal Cases
TL;DR
The U.S. Supreme Court heard oral arguments on April 27, 2026, in Chatrie v. United States, a landmark case that will determine whether police can use "geofence warrants" to compel tech companies like Google to hand over location data on every cellphone user near a crime scene. The case pits law enforcement's need for modern investigative tools against Fourth Amendment protections, with implications for millions of Americans whose phones constantly broadcast their whereabouts to corporate databases.
On a spring morning in 2019, a man walked into a Call Federal Credit Union in Midlothian, Virginia, slid a note to the teller demanding "at least 100k," and walked out with a stack of cash . Police had no suspect. No eyewitness could identify the robber. But a detective had another idea: ask Google to identify every cellphone user who had been near the bank during the robbery.
That request — a "geofence warrant" — ultimately led investigators to Okello Chatrie, who was convicted and sentenced to nearly 12 years in federal prison . On April 27, 2026, the Supreme Court heard oral arguments in Chatrie v. United States, a case that could redefine the boundaries of digital privacy under the Fourth Amendment .
What Is a Geofence Warrant?
A geofence warrant works by drawing a virtual boundary — a "geofence" — around a geographic area where a crime occurred. Law enforcement then obtains a court order compelling a technology company, most often Google, to search its vast database of user location records and identify every device that was within that boundary during a specified time window .
The process typically unfolds in three steps. First, the company provides anonymized data on all phones detected in the geofenced area. Second, investigators request expanded location data for a subset of those devices to narrow the pool. Third, the company unmasks the identities of the remaining users . In the Chatrie case, Google initially identified 19 users near the credit union; the detective eventually narrowed the list to Chatrie, whose phone had Google's "Location History" feature switched on .
Critics describe this as a "reverse warrant" — instead of identifying a suspect and then seeking evidence, police cast a wide net and work backward from data to find a suspect .
The Explosion of Geofence Requests
The scale of geofence warrant use expanded dramatically before Google changed its data practices. Google reported receiving 982 geofence warrants in 2018, 8,396 in 2019, and 11,554 in 2020 . By 2021, geofence requests accounted for more than 25% of all warrants Google received in the United States .
These numbers reflect only Google's data. Apple, which stores location data differently, reported receiving just 36 geofence warrants in 2022 and 26 in 2023, underscoring that Google's centrality to the practice stems from its extensive Location History database, internally known as "Sensorvault" .
In December 2023, Google announced that it would begin storing Location History data on users' devices rather than centrally, delete it by default after three months, and encrypt any cloud backups so that even Google cannot read them . These changes may render future geofence warrants against Google far less productive — but they do not resolve the constitutional question for the thousands of cases already built on the old system, nor do they prevent the technique from being applied to other data holders.
Carrier Transparency: The Broader Data Pipeline
Geofence warrants represent only one slice of law enforcement's appetite for location data. The major wireless carriers — AT&T, Verizon, and T-Mobile — field tens of thousands of law enforcement demands annually for cell-site location information (CSLI), the records generated every time a phone connects to a cell tower.
Verizon reported receiving 19,886 warrants for location data in the first half of 2023 alone, along with 3,013 warrants or court orders for "cell tower dumps" — bulk downloads of every device that connected to a specific tower during a given interval . In the second half of 2024, Verizon received 25,031 total warrants from U.S. law enforcement . T-Mobile reported receiving 51,557 historic CSLI requests in 2016, a figure that preceded the Carpenter warrant requirement .
AT&T publishes similar transparency data, breaking out requests for location information, emergency disclosures, and international demands . The cost to agencies varies by carrier and request type, but the financial barrier is low enough that location data requests have become routine across federal, state, and local law enforcement.
The Constitutional Question: From Carpenter to Chatrie
The legal backdrop for Chatrie is the Supreme Court's 2018 decision in Carpenter v. United States, which held 5-4 that obtaining seven days or more of historical CSLI constitutes a "search" under the Fourth Amendment and requires a warrant supported by probable cause . Before Carpenter, the government could access these records under the Stored Communications Act by showing merely "reasonable grounds" — a standard well below probable cause .
Chief Justice John Roberts, writing for the majority in Carpenter, rejected the application of the "third-party doctrine" to CSLI. That doctrine, rooted in Smith v. Maryland (1979), holds that individuals have no reasonable expectation of privacy in information they voluntarily share with third parties like banks or phone companies . Roberts reasoned that CSLI is qualitatively different: it creates a "detailed, encyclopedic, and effortlessly compiled" record of a person's movements that is generated automatically, not truly "voluntarily" shared .
But the Carpenter majority deliberately left several questions open. The opinion explicitly declined to address real-time CSLI, tower dumps, or "other collection techniques" . Chatrie sits squarely in that gap.
The Doctrinal Fault Lines
The Supreme Court is being asked to resolve which Fourth Amendment framework governs geofence warrants. Three competing doctrines are in play.
The third-party doctrine. The government argues that Chatrie opted into Google's Location History feature, voluntarily disclosing his location data to a third party, and therefore lacks a reasonable expectation of privacy under Smith v. Maryland . If the Court adopts this view, geofence warrants would require no warrant at all — a significant expansion of the third-party doctrine into the digital era.
The mosaic theory. Under this framework, endorsed by several concurring justices in United States v. Jones (2012) and implicitly embraced in Carpenter, individual data points may not constitute a search, but their aggregation into a comprehensive picture of a person's life does . Chatrie's attorneys argue that Google Location History — which can pinpoint a user within roughly three meters, log data every two minutes, record elevation within a building, and retain information indefinitely — is even more revealing than the CSLI at issue in Carpenter .
A new digital-privacy framework. Some amici have urged the Court to move beyond both doctrines and establish a clear rule that reverse warrants — those directed at identifying unknown suspects from a pool of data rather than gathering evidence about a known suspect — are categorically unconstitutional general warrants . The ACLU and Electronic Frontier Foundation filed a brief asserting that "geofence warrants are never a permissible investigatory method under the Fourth Amendment" .
The en banc Fourth Circuit was deadlocked. Its 14 judges produced nine separate opinions and split 7-7 on whether Google's compliance with the geofence warrant even constituted a "search" .
The Law Enforcement Case
Law enforcement agencies and 18 states filed amicus briefs defending geofence warrants as a necessary tool for solving serious crimes . They argue that the warrants should not be treated as categorically unconstitutional and that the relevant inquiry should focus on traditional warrant requirements — probable cause, particularity, and reasonableness .
The practical record supports their position in specific cases. Geofence warrants have been used to investigate murders, arsons, burglaries, sexual assaults, kidnappings, and terrorism, including the identification of participants in the January 6, 2021, Capitol breach . In Louisville, Kentucky, police turned to geofence warrants to investigate homicides in a city struggling with rising violent crime . A 2017 Milwaukee kidnapping and sexual assault — one of the earliest known uses of the technique — was solved after investigators obtained geofence data .
Justice Department lawyers told the Court that police had "probable cause" to believe Google possessed information that could identify the robber, accomplices, and witnesses, and that Chatrie's decision to enable Location History stripped him of any privacy expectation .
The Privacy Advocates' Response
Privacy organizations counter that the utility of geofence warrants in individual cases does not justify their sweeping scope. The Brennan Center for Justice, the Center for Democracy and Technology, and other groups argued in an amicus brief that geofence warrants are inherently overbroad because they necessarily capture data on hundreds or thousands of innocent people to identify a single suspect .
Justice Sonia Sotomayor flagged this concern during oral argument, noting that "data will follow you everywhere" and could reveal whether someone visited "a brothel or a cannabis store" .
Chatrie's attorney, Adam Unikowsky, told the justices: "The technology may be novel, but the constitutional problem it presents is not" . His brief draws a direct line from the 18th-century "writs of assistance" — the general warrants that helped spark the American Revolution — to modern geofence warrants, arguing that both grant the government open-ended authority to search without identifying a particular suspect .
On the question of how investigations would proceed under stricter rules, privacy advocates point to traditional police work — witness canvassing, surveillance cameras, forensic evidence — and argue that the mere convenience of a digital shortcut does not justify abandoning constitutional protections . They also note documented cases where CSLI evidence contributed to wrongful convictions: Vernon Horn and Marquis Jackson spent 18 years in prison before being exonerated with cell-site data that had not been disclosed to the defense, and Herbert Alford served five years on murder charges before new CSLI analysis cleared him .
The Real-Time vs. Historical Divide
Carpenter addressed historical CSLI — records generated over days or weeks and stored by carriers. But it explicitly reserved the question of real-time location tracking, and lower courts have since split on where the line falls.
The Fifth Circuit ruled in United States v. Smith (2024) that location data shared with Google was analogous to the CSLI in Carpenter and required a warrant based on probable cause and particularized suspicion, holding that the geofence warrant used in that case was constitutionally inadequate . Other circuits have drawn different boundaries. No consistent time threshold separates "real-time" from "historical" across federal and state courts, creating a patchwork that Chatrie could resolve — or deepen.
International Comparisons
The United States is not alone in grappling with these questions, and international practice offers no simple answer.
European Union. The Court of Justice of the European Union ruled in La Quadrature du Net (2020) that EU member states cannot require telecom providers to carry out "general and indiscriminate" retention of traffic and location data . Data retention must be targeted, limited to what is strictly necessary for combating serious crime, and subject to prior judicial review. Only a "genuine and present or foreseeable" threat to national security justifies a temporary exception . Real-time location collection is permitted only for individuals suspected of terrorist involvement, and only with prior judicial authorization .
United Kingdom. The Investigatory Powers Act 2016 permits police and intelligence agencies to access communications data, including location records, but the Data Retention and Acquisition Regulations 2018 raised the threshold so that access is allowed only for "serious crime" — offenses carrying a sentence of 12 months or more . A "double-lock" system requires both ministerial authorization and judicial approval for interception warrants .
Canada. The Supreme Court of Canada's 2014 decision in R v. Spencer established that internet users have a reasonable expectation of privacy in subscriber information held by service providers, and law enforcement must obtain prior judicial authorization before requesting such data . The Court recognized "privacy as anonymity" as a constitutionally protected component of informational privacy .
Germany. German constitutional law imposes strict proportionality requirements on surveillance, and the Federal Constitutional Court has repeatedly struck down data retention laws as incompatible with the right to informational self-determination.
The EU framework is significantly more restrictive than current U.S. practice. Proponents of stricter warrant requirements cite international norms as evidence that effective policing does not require mass location data collection. Defenders of broader law enforcement access argue that the comparisons are inapt because U.S. crime rates and the scale of the federal system create different operational demands.
The Technology Gap
A ruling in Chatrie will address Google Location History data from 2019. But the technology landscape has already shifted.
Cell-site location information — the data at the center of Carpenter — is the least precise form of location tracking, typically accurate to 500 to 1,500 meters depending on tower density . Google Location History, which combines GPS, Wi-Fi, and cell signals, can achieve accuracy within roughly three meters . GPS alone is accurate to about 4.9 meters . Wi-Fi triangulation can locate a device within 10 to 25 meters in dense urban environments . Bluetooth beacons and ultra-wideband chips in newer devices can pinpoint location to within centimeters.
Each generation of technology is more precise, more persistent, and more capable of generating inferences about behavior. A ruling tailored to 2019-era Google Location History may not address the capabilities of 2026-era tracking, let alone what comes next. Several amici flagged this concern, urging the Court to articulate principles broad enough to govern future technologies rather than issuing a narrow, technology-specific holding .
Retroactive Exposure
If the Court rules that the geofence warrant in Chatrie was unconstitutional, the decision could ripple backward through thousands of cases. Google received more than 20,000 geofence warrants between 2018 and 2020 alone . Many of those resulted in criminal prosecutions where defendants may not have raised Fourth Amendment challenges, either because the legal landscape was unsettled or because they lacked the resources to litigate the issue.
The scope of retroactive exposure depends on how broadly the Court rules and whether it applies the "good-faith exception" — the doctrine that evidence obtained by officers reasonably relying on existing law need not be suppressed even if the law later changes. The district court in Chatrie applied this exception, suppressing no evidence despite finding the warrant "plainly violates the rights enshrined in the [Fourth] Amendment" . How the Supreme Court handles this question will determine whether a pro-defendant ruling has practical teeth or remains largely symbolic for past convictions.
What Comes Next
A decision is expected by the end of June 2026 . The Court's options range from a narrow holding that the specific warrant in Chatrie was deficient to a broad pronouncement on whether reverse warrants are categorically incompatible with the Fourth Amendment.
Whatever the outcome, the case will not end the debate. Google's 2023 policy changes have already reduced the data available for geofence warrants. Law enforcement agencies are adapting, turning to other data sources — commercial data brokers, app-based location services, automated license plate readers — that may fall outside whatever rule the Court establishes . Congress has considered but not passed legislation specifically addressing geofence warrants .
The 29 amicus briefs filed in Chatrie — from tech companies, law enforcement associations, civil liberties organizations, legal scholars, and state attorneys general — reflect the breadth of interests at stake . The answer the Court delivers will shape not only the legality of a single Virginia bank robbery investigation but the constitutional framework for digital surveillance in the United States for years to come.
Related Stories
Justice Sotomayor Apologizes for Public Remarks About Justice Kavanaugh
Supreme Court Rules in Favor of Cox in Music Piracy Case
Supreme Court Hears Mail-In Ballot Dispute Before Midterm Elections
Supreme Court Hears Arguments on Trump's Birthright Citizenship Order
Mississippi Governor to Call Special Session on Redistricting After SCOTUS Ruling as Democrats Vow Fight
Sources (24)
- [1]Supreme Court considers lawfulness of broad police requests for cellphone location datanbcnews.com
A detective identified Okello Chatrie as the prime suspect by obtaining data from Google about cellphone users in the vicinity of a bank during a 2019 robbery. Google initially identified 19 users; the officer narrowed it to Chatrie.
- [2]Ingenious? Orwellian? Or both? Supreme Court considers constitutionality of 'geofence' warrantsnpr.org
Geofence warrants are used thousands of times a year by American law enforcement, helping solve murders, arsons, burglaries, sexual assaults, and kidnappings — including cases tied to the Jan. 6, 2021 Capitol breach.
- [3]Supreme Court debates whether police may seek sweeping cellphone location data in investigationscnn.com
The Supreme Court heard arguments on whether law enforcement use of geofence warrants to obtain cellphone data near crime scenes violates the Fourth Amendment.
- [4]Court to hear argument on law enforcement's use of geofence warrantsscotusblog.com
Digital location data heads back to the Supreme Court as the justices consider whether geofence warrants satisfy Fourth Amendment requirements.
- [5]Oral Argument Preview: Chatrie v. United Stateslawfaremedia.org
Chatrie argues that Google Location History can pinpoint a user within roughly three meters, log data every two minutes, and retain information indefinitely. The en banc Fourth Circuit split 7-7 on whether a search occurred.
- [6]Geofence and Keyword Searches: Reverse Warrants and the Fourth Amendmentcongress.gov
Congressional Research Service report analyzing the constitutional implications of reverse warrants, including geofence warrants, under the Fourth Amendment.
- [7]Geofence warrant - Wikipediaen.wikipedia.org
Google reported receiving 982 geofence warrants in 2018, 8,396 in 2019, and 11,554 in 2020. By 2021, more than 25% of all warrants Google received in the U.S. were for geofence data.
- [8]Geofence Warrants: The Mass Location Surveillance and Privacy Threat Created by Google May Be Eliminated by Its Creatorcriminallegalnews.org
In December 2023, Google announced changes to Location History storage, moving data to user devices, setting default 3-month deletion, and encrypting cloud backups.
- [9]Verizon Transparency Report for the First Half of 2023verizon.com
Verizon received 19,886 warrants for location data in H1 2023, plus 3,013 warrants or court orders for cell tower dumps.
- [10]Location Data: The More They Knowcdt.org
Center for Democracy and Technology analysis of carrier transparency reports, including T-Mobile's 51,557 historic CSLI requests in 2016.
- [11]AT&T Transparency Reportsustainability.att.com
AT&T publishes data on legal demands for location information, emergency requests, and international legal demands from law enforcement.
- [12]Carpenter v. United States - Wikipediaen.wikipedia.org
The Court held 5-4 that accessing historical CSLI is a search under the Fourth Amendment requiring a warrant. The opinion rejected applying the third-party doctrine to CSLI but left open questions about real-time data and tower dumps.
- [13]Third-party doctrine - Wikipediaen.wikipedia.org
The third-party doctrine holds that people who voluntarily give information to third parties have no reasonable expectation of privacy in that information, per Smith v. Maryland (1979).
- [14]Chatrie v. United States - Supreme Court Bulletinlaw.cornell.edu
The government argues that Chatrie opted into Google's Location History, voluntarily disclosing location data, and therefore lacks a reasonable expectation of privacy under existing precedent.
- [15]Mosaic theory of the Fourth Amendment - Wikipediaen.wikipedia.org
The mosaic theory holds that when it comes to reasonable expectations of privacy, the whole is greater than the sum of its parts — aggregated surveillance data reveals more than individual data points.
- [16]Okello Chatrie v. United States of Americabrennancenter.org
Twenty-nine amicus briefs were filed from legal professionals, tech companies, trade associations, and nonprofits. The ACLU asserts geofence warrants are never permissible under the Fourth Amendment.
- [17]To solve murders, Louisville police turn to 'geofence' warrantslpm.org
Louisville police used geofence warrants to investigate homicides, though the warrants netted few arrests despite widespread use.
- [18]Criminal Defense Digital Forensics Expert: Mobile Phone & CSLI Analysisirisinvestigations.com
Vernon Horn and Marquis Jackson were exonerated after 18 years when undisclosed CSLI evidence was discovered. Herbert Alford was freed after 5 years when new CSLI analysis cleared him.
- [19]The End of the Beginning? Geofencing Warrants Face Backlash from 5th Circuitsites.suffolk.edu
The Fifth Circuit ruled in United States v. Smith that location data shared with Google requires a warrant based on probable cause and particularized suspicion.
- [20]The Future of Data Retention Regimes and National Security in the EU after La Quadrature du Netasil.org
The CJEU held that EU law precludes general and indiscriminate retention of traffic and location data, requiring targeted retention limited to what is strictly necessary for combating serious crime.
- [21]Investigatory Powers Act 2016 - Wikipediaen.wikipedia.org
The UK's Investigatory Powers Act permits police access to communications data with a double-lock system. The 2018 regulations restricted access to serious crime carrying 12+ month sentences.
- [22]R v Spencer - Wikipediaen.wikipedia.org
The Supreme Court of Canada held that internet users have a reasonable expectation of privacy in subscriber information, requiring prior judicial authorization for police access and recognizing 'privacy as anonymity.'
- [23]Beyond GPS: Leveraging Cell + WiFi Triangulation for Precise IoT Location Trackingblues.com
Cell tower triangulation is accurate to 500-1,500 meters; GPS achieves roughly 4.9 meters; Wi-Fi triangulation reaches 10-25 meters in dense urban areas.
- [24]Your data is everywhere. The government is buying it without a warrantnpr.org
Law enforcement agencies increasingly purchase location data from commercial data brokers, bypassing warrant requirements entirely.
Sign in to dig deeper into this story
Sign In