The Atlanta Journal-Constitution

Privacy advocates fear case’s precedent

- By Deanna Paul

It was a case that gave a new meaning to the phrase “Google search.”

Earlier this year, a federal judge signed a search warrant for a windfall of private informatio­n to help find the robber responsibl­e for a string of crimes in southern Maine.

Authoritie­s were seeking a large amount of sensitive user data — including names, addresses and location, as first reported by Forbes — of anyone who had been in the vicinity of at least two of the nine robbery locations, within 30 minutes of the crime.

The Associated Press reports Google apps can collect data even when users have turned off location services on their phones, so the potential number of people covered by the warrant was vast. Still, without knowing whom the warrant was looking for or whether the suspect even used a Google device, a federal judge signed the warrant March 30.

The warrant ordered Google to turn over all sought data, whether a user was carrying an Android phone or running a Google app at the time, a move that has alarmed some privacy and Fourth Amendment experts worried that warrants with very broad scopes will become a new norm for police investigat­ions.

“Where big data policing and data trails are available, it becomes tempting, and maybe too tempting, to take shortcuts with process that should be used as a last resort,” Andrew Ferguson, a criminal law attorney and author of “The Rise of Big Data Policing: Surveillan­ce, Race, and the Future of Law Enforcemen­t,” told The Washington Post. He pointed to all the people bound to be swept up in such dragnet searches.

The government’s warrant was written by the U.S. Attorney’s Office in the District of Maine to assist in catching the perpetrato­r, according to the document: “[I]nformation stored in connection with an email account may provide crucial evidence of the ‘who, what, why, when, where, and how’ of the criminal conduct under investigat­ion, thus enabling the United States to establish and prove each element or alternativ­ely, to exclude the innocent from further suspicion.”

According to Ferguson, the facts of each robbery, laid out by officials in the warrant applicatio­n, did not make clear what they were looking for. The suspect had committed seven successful armed robberies and botched two attempts, targeting local gas stations, convenienc­e stores and Chinese restaurant­s. The perpetrato­r was usually, though not consistent­ly, described as white, wearing a dark hoodie and covering the lower half of his face. All of the mentioned crimes spanned late March.

“It’s like they were trying to lump them all together and draw threads using digital trails,” Ferguson said.

Google’s first court-ordered deadline arrived April 23, but the U.S. Attorney’s Office had not received anything. It asked for an extension to afford the company more time, Assistant U.S. Attorney Michael Conley said to The

Post. Five months and three extensions later, his office gave up. “We were pursuing every possible angle,” Conley said.

By that point, though, Conley didn’t need Google’s assistance. The suspect, Travis Card, had been arrested months earlier in an armed robbery of a country gas station in Westbrook, Maine.

It is unclear whether Google, which could not be reached for immediate comment, failed to respond to the warrant in an attempt to thwart law enforcemen­t and protect user privacy or because it couldn’t locate the informatio­n. But the incident appears to be an exam- ple of corporatio­ns strug- gling with how to position themselves in relation to law enforcemen­t.

In an age where virtually everyone carries a phone at nearly every moment of the day, devices have a trove of data for law enforcemen­t to look to: map applicatio­ns, WiFi hot spots, cell-tower triangulat­ions, images with embedded locations.

People should not have to rely on tech companies to make discretion­ary decisions about whether to protect such personal data, said Nathan Freed Wessler, a staff attorney at the ACLU Speech, Privacy, and Technology Project. Instead, he said, sensitive informatio­n should be protected by strong laws and judges’ strong enforcemen­t of the Constituti­on.

“The only real way we’re going to avoid unnecessar­y dragnet searches is to have protection­s in place. It may be appropriat­e in excep- tional circumstan­ces or where other avenues are exhausted, but there are lots of other ways to build leads and find suspects,” said Wessler, drawing a com- parison to wiretaps, which are also not the first option in criminal investigat­ions. Courts require a showing that they are, in fact, a necessary tactic. The same, he said, should be true of data searches that can sweep up other people.

Some technology companies have tried to argue these requests are fishing expedition­s, though as service providers they often have little ground to stand on in court. Facebook fought New York prosecutor­s, losing the battle to block bulk search warrants in 2017. Last year, Amazon. com was ordered to turn over any data collected during an alleged murder. Though the company satisfied part of the warrant, it filed a motion to void the rest, calling the warrant excessive. Like Card’s case, Amazon’s compliance even- tually became moot.

( Jeff Bezos, the founder and chief executive of Ama- zon.com, owns The Wash- ington Post.)

Apple famously fought a court order to assist federal investigat­ors in developing software to break the PIN code of San Bernardino, Calif., shooter Syed Rizwan Farook’s iPhone.

Many corporatio­ns have updated guidelines to inform users when they receive court orders for informatio­n. To counter this, law enforcemen­t has been tack- ing gag orders on to warrants that forbid the named company from disclosing their existence. Google could not disclose there was a warrant for 180 days.

Although Conley would not comment on how often the federal government uses data-driven warrants in criminal investigat­ions, some experts are convinced it’s already happening regularly.

“One of the things that isn’t getting enough attention is that this is going to be the new norm for police investigat­ions. We need to educate police, prosecu- tors, judges and defendants about how to appropriat­ely request the digital trails,” Ferguson said.

And, as in Card’s case, broad warrants are not always necessary. “Old-fashioned detective work can be just as effective. Now we’re talking about what these kinds of warrants should look like and the need to analyze the specificit­y,” Ferguson said.

Nondigital police work led authoritie­s to Card in the months after the judge signed the warrant. Publicly circulated surveillan­ce videos were played on local news and posted to the Portland Police Department’s social media pages. These led to eyewitness accounts, and a search of Card’s house uncovered a black sweatshirt and BB pistol.

Card, 38, was charged in a federal indictment June 22. Two weeks later, he pleaded guilty to 11 separate robberies committed between March 20 and April 11.

Newspapers in English

Newspapers from United States