United States v. Binyamin Stimler ( 2017 )


Menu:
  •                              PRECEDENTIAL
    UNITED STATES COURT OF APPEALS
    FOR THE THIRD CIRCUIT
    ________________
    Nos. 15-4053, 15-4094 & 15-4095
    ________________
    UNITED STATES OF AMERICA
    v.
    BINYAMIN STIMLER,
    Appellant in No. 15-4053
    UNITED STATES OF AMERICA
    v.
    JAY GOLDSTEIN a/k/a Yaakov
    JAY GOLDSTEIN,
    Appellant in No. 15-4094
    UNITED STATES OF AMERICA
    v.
    MENDEL EPSTEIN,
    Appellant in No. 15-4095
    ________________
    On Appeal from the United States District Court
    for the District of New Jersey
    (D. C. Nos. 3-14-cr-00287-005, 3-14-cr-00287-003 and 3-14-
    cr-00287-001)
    District Judge: Honorable Freda L. Wolfson
    ________________
    Argued on January 25, 2017
    Before: CHAGARES, RESTREPO and ROTH, Circuit
    Judges
    (Opinion filed: July 7, 2017)
    Nathan Lewin, Esq.                (Argued)
    Lewin & Lewin
    888 17th Street, N.W.
    4th Floor
    Washington, DC 20006
    Gedalia M. Stern, Esq.
    541 Passaic Avenue
    Clifton, NJ 07014
    Counsel for Appellant Stimler
    2
    Aidan P. O’Connor, Esq.        (Argued)
    Pashman Stein Walder Hayden, P.C.
    21 Main Street
    Court Plaza South, Suite 200
    Hackensack, NJ 07601
    Counsel for Appellant Goldstein
    Laura K. Gasiorowski, Esq.
    Robert G. Stahl, Esq.
    Stahl Farella
    220 St. Paul Street
    Westfield, NJ 07090
    Peter Goldberger, Esq.           (Argued)
    50 Rittenhouse Place
    Ardmore, PA 19003
    Counsel for Appellant Epstein
    Mark E. Coyne, Esq.
    Office of United States Attorney
    970 Broad Street
    Room 700
    Newark, NJ 07102
    Norman Gross, Esq.               (Argued)
    Glenn J. Moramarco, Esq.         (Argued)
    Office of United States Attorney
    Camden Federal Building & Courthouse
    401 Market Street
    Camden, NJ 08101
    Counsel for Appellee
    3
    ________________
    AMENDED OPINION
    ________________
    ROTH, Circuit Judge
    Binyamin Stimler, Jay Goldstein, and Mendel Epstein
    are Orthodox Jewish rabbis who were charged with various
    kidnapping-related      offenses,  stemming       from    their
    involvement in a scheme through which they, along with
    others,1 sought to assist Orthodox Jewish women to obtain
    divorces from recalcitrant husbands. After a jury trial, all
    three defendants were convicted of conspiracy to commit
    kidnapping. The defendants now appeal various rulings made
    by the District Court before, during, and after trial. Because
    we find no merit in any of the defendants’ arguments, we will
    affirm all three convictions.
    1
    The other rabbis associated with the ring were variously 1)
    charged but pled guilty, 2) went to trial and were acquitted, or
    3) had their charges dismissed by the government. Stimler,
    Goldstein, and Epstein were the only three to be convicted
    after trial.
    4
    I2
    In the Orthodox Jewish tradition, a married woman
    cannot obtain a religious divorce until her husband provides
    her with a contract called a “get” (pluralized as “gittin”),
    which must, in turn, be signed by an “eid,” or witness. A
    woman who attempts to leave her husband without obtaining
    a get becomes an “agunah” (pluralized as “agunot”), which
    subjects her to severe social ostracism within the Orthodox
    Jewish community. Agunot may seek relief in a “beth din,” a
    rabbinical court presided over by a panel of three rabbis. The
    beth din may then issue “psak kefiah,” or contempt orders
    authorizing sanctions, which include, but are not limited to,
    the use of force against a husband to secure a get. To assist
    an agunah to obtain a get is a “mitzvah,” or religious
    commandment of the Orthodox Jewish faith. Starting in at
    least 2009, Stimler, Epstein, and Goldstein participated in the
    beth din process to help agunot obtain gittin. They worked
    with “tough guys” or “muscle men” in exchange for money to
    kidnap and torture husbands in order to coerce them to sign
    the gittin.
    In 2013, the FBI learned of the kidnapping ring and
    began investigating the rabbis. As part of this investigation,
    an FBI agent posed as an agunah and approached Epstein.
    The agent met with Epstein at his home in New Jersey.
    Epstein suggested that kidnapping would be appropriate in
    the agent’s “situation,” promising that “what we’re doing is
    2
    As all three defendants were convicted, the facts and
    evidence are taken in the light most favorable to the
    government. United States v. Ozcelik, 
    527 F.3d 88
    , 93 (3d
    Cir. 2008).
    5
    basically gonna be kidnapping a guy for a couple of hours and
    beatin’ him up and torturing him . . ..”3 One month after this
    meeting, Epstein and Goldstein found a potential location for
    the kidnapping. Epstein then convened a beth din at which
    he, Goldstein, and a third rabbi presided. Together, the rabbis
    issued a psak kefiah authorizing the use of force against the
    agent’s “husband.” Epstein and the agent subsequently
    planned the details, including the date, location, and manner
    of the kidnapping of the “husband.” On the day of the
    kidnapping, a team of rabbis and “tough guys” assembled at
    the agreed-upon location. Goldstein and Stimler arrived in
    disguise and Stimler conducted counter-surveillance of the
    area.
    Once the kidnapping team had assembled, the FBI
    arrested them. Epstein and Stimler were each charged with
    one substantive kidnapping count, one count of attempted
    kidnapping, and one count of conspiracy to commit
    kidnapping. Goldstein was charged with two substantive
    kidnapping counts, one count of attempted kidnapping, and
    one count of conspiracy.
    During its preparation for trial, the government applied
    for a court order, pursuant to Section 2703(d) of the Stored
    Communications Act (SCA), compelling AT&T to turn over
    historic cell site location information (CSLI) generated by
    Goldstein’s phone. CSLI is generated every time a cell phone
    user sends or receives a call or text message; when the call or
    message is routed through the nearest cell tower, the user’s
    service provider generates and retains a record identifying the
    particular tower through which the communication was
    3
    JA 4654.
    6
    routed.4 In more densely populated areas, cell towers are able
    to triangulate an individual’s approximate location based on
    the individual’s distance from the three nearest towers. Thus,
    while less precise than traditional GPS systems, historic CSLI
    records can nonetheless generate a rough profile of an
    individual’s approximate movements based on the phone calls
    that individual makes over a period of time. The order for
    such records, covering a total of 57 days of Goldstein’s
    location history, was issued by a magistrate judge on October
    30, 2014.
    II
    The defendants filed numerous pretrial motions before
    the District Court; we consider only the three which are
    relevant to this appeal. First, Goldstein moved to suppress
    the CSLI obtained pursuant to the SCA, arguing that cell
    phone users have a reasonable expectation of privacy in such
    metadata, implicating the Fourth Amendment’s warrant
    requirement. The District Court denied Goldstein’s motion,
    reasoning that collection of CSLI “does not involve physical
    intrusion upon [Goldstein’s] property or any real time
    tracking information” and did not “concern the search or
    seizure of a cell phone, or the content of any
    communication.”5
    Second, all three defendants sought dismissal of the
    indictment pursuant to the Religious Freedom Restoration Act
    (RFRA), arguing that the government’s decision to prosecute
    4
    United States v. Epstein (Epstein II), No. 14 CR 287, 
    2015 WL 1646838
    , at *1 (D.N.J. Apr. 14, 2015).
    5
    Epstein II, 
    2015 WL 1646838
    , at *3.
    7
    them substantially burdened their sincerely held religious
    beliefs and was not the least restrictive means of furthering
    any compelling government interest. Stimler raised the
    additional argument that RFRA required him to be severed
    from the trial of Epstein and Goldstein. The District Court
    rejected these arguments, finding that the government’s
    decision to prosecute the defendants did not substantially
    burden their religious exercise.6 In the alternative, the
    District Court found that the government had a compelling
    interest in the uniform prosecution of kidnapping laws and
    that the prosecution of the defendants was the least restrictive
    way of achieving that interest.7 The District Court summarily
    rejected Stimler’s request for severance, reasoning that the
    joint prosecution was not a substantial burden and that
    “[t]here is nothing in [RFRA] which suggests that it can be
    used to argue for severance.”8
    Third, the defendants sought to introduce evidence of
    their religious beliefs and, more broadly, of Orthodox Jewish
    law in order to negate the motive element of the kidnapping
    statute, or, in the alternative, to demonstrate consent on the
    part of the husbands. The District Court refused to admit
    such evidence, finding that it was irrelevant both to motive
    and to the affirmative defense of consent. In the alternative,
    the District Court held that the evidence would be unduly
    prejudicial under Rule 403 of the Federal Rules of Evidence,
    6
    United States v. Epstein (Epstein I), 
    91 F. Supp. 3d 573
    ,
    582-83 (D.N.J. 2015).
    7
    Id. at 584-85.
    8
    Id. at 588.
    8
    as it “would carry a significant potential for jury
    nullification.”9
    At trial, the government introduced a variety of
    evidence against the defendants. As relevant here, the
    government introduced testimony from FBI agents placing
    Stimler and Goldstein at the site of the proposed kidnapping
    in a disguise. The agents stated that Stimler performed
    counter-surveillance at the site. The government also
    introduced the statements made about Goldstein by another
    rabbi at a beth din convened to determine the validity of a get
    obtained from one of the prior kidnappings. After both the
    government and the defense rested, the judge instructed the
    jury as to the elements of each charged offense and
    sequestered the jury for deliberations. On the fourth day of
    deliberations, the jury sent a question to the judge, inquiring
    whether failure to intervene could make an individual liable
    for kidnapping. The judge wrote back that, having interpreted
    the question to refer only to the substantive kidnapping
    counts, the answer was no. The defendants objected to this
    response, arguing that it implied that failure to intervene
    could support a conviction for the attempt and conspiracy
    charges.
    All three defendants were convicted. Stimler was
    sentenced to 39 months incarceration, Goldstein to 96
    months, and Epstein to 120 months. They appealed. We
    consolidated the appeals for disposition.
    9
    Id. at 597.
    9
    III10
    This appeal presents eight issues, not all of which
    apply to every defendant. As such, we treat each issue in
    turn, and note which defendants have raised which claims.
    A.
    We first address whether the District Court erred in
    denying Goldstein’s11 motion to suppress the CSLI evidence.
    Because the parties agree as to all the relevant facts and
    dispute only the legal implications thereof, our review is
    plenary.12   Section 2703 of the SCA authorizes the
    government to “require a provider of electronic
    communication service . . . to disclose a record or other
    10
    The District Court had jurisdiction over the criminal
    prosecutions of the three defendants pursuant to 
    18 U.S.C. § 3231
    . We have jurisdiction over the defendants’ appeal
    pursuant to 
    28 U.S.C. § 1291
    .
    11
    To the extent Epstein also seeks to challenge the District
    Court’s denial of the motion to suppress, he lacks standing to
    do so because it does not appear that the government obtained
    any CSLI about his whereabouts. See United States v. Nagle,
    
    803 F.3d 167
    , 178 (3d Cir. 2015) (“Fourth Amendment rights
    are personal rights which, like some other constitutional
    rights, may not be vicariously asserted.”) (quoting Rakas v.
    Illinois, 
    439 U.S. 128
    , 133-34 (1978)).
    12
    United States v. Lafferty, 
    503 F.3d 293
    , 298 (3d Cir. 2007)
    (“We . . . exercise plenary review as to [a suppression
    motion’s] legality in light of the [district] court’s properly
    found facts.” (internal quotation marks and citation omitted)).
    10
    information pertaining to a subscriber to or customer of such
    service . . . when the governmental entity . . . obtains a court
    order for such disclosure . . ..”13 Such a court order “shall
    issue only if the governmental entity offers specific and
    articulable facts showing that there are reasonable grounds to
    believe” that the records “are relevant and material to an
    ongoing criminal investigation.”14 Notably, this “reasonable
    grounds” requirement is a lesser burden than the “probable
    cause” requirement of the Fourth Amendment.15
    Recognizing that the SCA permits precisely what the
    government here did, Goldstein argues that the SCA violates
    the Fourth Amendment insofar as it authorizes the
    government to require disclosure of historic CSLI without
    obtaining a warrant. To the extent that historic CSLI records
    allow the government to aggregate an individual’s movement
    history over an indefinite period of time, Goldstein argues
    that the Supreme Court has suggested that individuals have a
    reasonable expectation of privacy in such information. In the
    alternative, Goldstein asserts that the government failed to
    meet even the relaxed “reasonable grounds” requirement of
    the SCA. In response to Goldstein’s constitutional argument,
    13
    
    18 U.S.C. § 2703
    (c)(B). The parties do not dispute that cell
    site location information is a record “pertaining to” the user
    of a cell phone.
    14
    
    18 U.S.C. § 2703
    (d).
    15
    In re Application of the United States for an Order
    Directing a Provider of Electronic Communication Service to
    Disclose Records to the Government (In re Application), 
    620 F.3d 304
    , 315 (3d Cir. 2010) (“[T]he standard [of reasonable
    grounds] is an intermediate one that is less stringent than
    probable cause.”).
    11
    the government rests primarily on the third-party doctrine,16
    arguing that cell phone users voluntarily turn over CSLI to
    their service providers. With respect to Goldstein’s statutory
    arguments, the government maintains that the detailed
    descriptions of prior kidnappings allegedly committed and the
    identification of specific periods of interest provided
    “reasonable grounds” for disclosure.
    We do not decide these questions on a blank slate.
    Both parties agree that our decision in In re Application of the
    United States for an Order Directing a Provider of Electronic
    Communication Service to Disclose Records to the
    Government (In re Application) addresses the same issues
    presented in this appeal. In In re Application, we rejected the
    applicability of the third-party doctrine to CSLI, holding that
    the transmission of CSLI was not truly voluntary.17 We went
    on to conclude, however, that the SCA’s disclosure regime
    did not violate the Fourth Amendment because individuals
    lack a reasonable expectation of privacy in CSLI.18
    Pursuant to our Internal Operating Procedures, “the
    holding of a panel in a precedential opinion is binding on
    16
    The third-party doctrine precludes defendants from
    asserting any privacy interests in information which they
    voluntarily disclose to third parties. United States v. Christie,
    
    624 F.3d 558
    , 573-74 (3d Cir. 2010).
    17
    In re Application, 
    620 F.3d at 317
    .
    18
    
    Id. at 312-13
     (explaining that CSLI does not implicate an
    individual’s privacy interests because such interests “are
    confined to the interior of the home” and holding that “CSLI
    from cell phone calls is obtainable under a § 2703(d) order
    and that such an order does not require the traditional
    probable cause determination”).
    12
    subsequent panels.”19 Thus, as a general matter, we remain
    obliged to follow our precedent absent en banc
    reconsideration. A narrow exception to this rule exists,
    however, where intervening legal developments have
    undercut the decisional rationale of our precedent.20 We have
    described this as an exacting standard; we generally will not
    decline to follow our precedent unless it “no longer has any
    vitality”21 or is “patently inconsistent”22 with subsequent legal
    developments. Because In re Application has not been
    overturned by this Court sitting en banc, we will continue to
    follow it in its entirety unless the government demonstrates
    that intervening legal developments have undermined In re
    Application’s rejection of the third-party doctrine or
    Goldstein can demonstrate that intervening changes in the law
    have created a reasonable expectation of privacy in CSLI.
    We conclude that neither the government nor Goldstein have
    met their respective burdens.
    1.
    We begin with the government’s contention that
    individuals voluntarily convey CSLI to their cell service
    19
    3d Cir. I.O.P. 9.1.
    20
    See, e.g., In re Krebs, 
    527 F.3d 82
    , 84 (3d Cir. 2008) (“A
    panel of this Court may reevaluate the holding of a prior
    panel which conflicts with intervening Supreme Court
    precedent.” (citations omitted)).
    21
    West v. Keve, 
    721 F.2d 91
    , 93 (3d Cir. 1983) (emphasis
    added).
    22
    United States v. Tann, 
    577 F.3d 533
    , 541 (3d Cir. 2009)
    (quoting Cox v. Dravo Corp., 
    517 F.2d 620
    , 627 (3d Cir.
    1975)).
    13
    providers. The government attempts to sidestep In re
    Application by characterizing its rejection of the third-party
    doctrine as dictum. However, the government placed the
    issue of the third-party doctrine squarely before us in In re
    Application by arguing that the doctrine prevented CSLI from
    ever implicating Fourth Amendment concerns. We explicitly
    considered and rejected this argument, reasoning that “[a] cell
    phone customer has not ‘voluntarily’ shared his location
    information with a cellular provider in any meaningful
    way.”23 We noted, however, that § 2703(c) offers the judge
    the option of requiring probable cause before CSLI is
    released.24 By holding that magistrate judges presented with
    requests for § 2703(d) orders retain discretion under §
    2703(c) to “mak[e] a judgment about the possibility that such
    disclosure would implicate the Fourth Amendment,”25 we
    necessarily rejected the third-party doctrine.       Had the
    government been correct that CSLI records were records
    voluntarily disclosed to third parties, CSLI could never
    implicate an individual’s reasonable expectation of privacy
    and thus would never be protected by the Fourth
    Amendment’s warrant requirement. Thus, the rejection of the
    third-party doctrine was necessary to the holding of In re
    Application.
    The government suggests, nevertheless, that this Court
    “should join all of its sister circuits” in applying the third-
    party doctrine to CSLI,26 apparently arguing that the
    23
    In re Application, 
    620 F.3d at 317
    .
    24
    
    Id. at 319
    .
    25
    
    Id. at 317
    .
    26
    See, e.g., United States v. Graham, 
    824 F.3d 421
    , 425 (4th
    Cir. 2016) (en banc).
    14
    subsequent decisions of other circuits may constitute
    intervening legal authority allowing departure from our
    precedent. We have never so held, and we decline to do so
    now. To the contrary, in declining to follow our decisions,
    we have recognized intervening authority only from the
    Supreme Court of the United States, Congress, or
    administrative agencies.27 Accordingly, we continue to
    adhere to our view, espoused in In re Application, that the
    third-party doctrine does not apply because cell phone users
    do not voluntarily disclose CSLI to their service providers
    simply by signing a service contract.28
    2.
    We next address whether intervening changes in law
    undermine In re Application’s holding that CSLI does not
    implicate an individual’s reasonable expectation of privacy.
    Goldstein argues that the Supreme Court’s subsequent
    decisions in Riley v. California29 and United States v. Jones30
    27
    See, e.g., Baptiste v. Attorney Gen., 
    841 F.3d 601
    , 609 n.8
    (3d Cir. 2016) (noting that “an intervening Supreme Court
    decision . . . is also a ‘sufficient basis’ for us to reevaluate our
    precedent” even without en banc review); United States v.
    Adams, 
    252 F.3d 276
    , 286 (3d Cir. 2001) (noting that “a panel
    may reevaluate a precedent in light of intervening authority
    and amendments to statutes and regulations”).
    28
    For these reasons, to the extent that sections of the District
    Court opinion may be read to suggest that the third-party
    doctrine applies here, those sections are reversed. See, e.g.,
    Epstein II, 
    2015 WL 1646838
    , at *3.
    29
    
    134 S. Ct. 2473
     (2014).
    30
    
    565 U.S. 400
     (2012).
    15
    render the underpinnings of In re Application untenable, and
    warrant a departure from our precedent. In Goldstein’s view,
    Riley and Jones, taken together, strongly imply that an
    individual has a reasonable expectation of privacy in his or
    her aggregated movements over a period of time, particularly
    where cell phones are involved.
    We are not persuaded by Goldstein’s readings of Riley
    and Jones. In Riley, the Supreme Court held that officers’
    warrantless search of data stored on an individual’s cell phone
    ran afoul of the Fourth Amendment, noting that the diversity
    and quantity of data stored on mobile phones today created a
    reasonable expectation of privacy therein.31 However, Riley
    focused primarily on protecting the contents of cell phones,
    not metadata generated from cell phone usage.32 This
    distinction is far from trivial; Fourth Amendment
    jurisprudence has consistently protected only the contents of
    an individual’s communications.33 We recently emphasized
    this point in United States v. Stanley,34 rejecting the argument
    
    31 Riley, 134
     S. Ct. at 2494-95.
    32
    Id. at 2489 (discussing the amount and variety of data
    stored on cell phones).
    33
    See, e.g., Katz v. United States, 
    389 U.S. 347
    , 353 (1967)
    (“The Government’s activities in electronically listening to
    and recording the petitioner’s words . . . constituted a ‘search
    and seizure’ within the meaning of the Fourth Amendment.”)
    (emphasis added); Smith v. Maryland, 
    442 U.S. 735
    , 741
    (1979) (finding no Fourth Amendment violation in
    warrantless application of a pen register because “pen
    registers do not acquire the contents of communications”)
    (emphasis in original).
    34
    
    753 F.3d 114
     (3d Cir. 2014).
    16
    that an individual had a reasonable expectation of privacy in
    his or her IP address routed through a third party’s wireless
    router. Even though we acknowledged that obtaining an
    individual’s IP address could roughly track his or her
    location, we reasoned that such records “revealed only the
    path of the signal establishing this connection [and] revealed
    nothing about the content of the data carried by that signal.”35
    Riley’s holding is thus an application of the Fourth
    Amendment’s protection of content. Goldstein does not
    argue that the CSLI at issue here is content, nor would we
    find any such argument persuasive.36 Accordingly, Riley
    provides little support for extending Fourth Amendment
    protections to historic CSLI.
    Goldstein’s argument finds better support in the
    statements of the concurring opinions of Jones, in which the
    Supreme Court held that warrantless placement of a GPS
    tracker on an individual’s car for 28 days, and the resulting
    aggregated movement history, violated the Fourth
    Amendment.37 Although the majority rested on a trespass
    theory to reach this conclusion, five justices—in two separate
    concurrences—suggested that location tracking also
    35
    Id. at 122.
    36
    In the wake of Riley, we have adopted a flexible test for
    determining whether data is content or ancillary by analyzing
    whether the data is “part of the substantive information
    conveyed to the recipient,” noting that “location identifiers
    have classically been associated with non-content means of
    establishing communication.” In re Google Inc. Cookie
    Placement Consumer Privacy Litig., 
    806 F.3d 125
    , 136 (3d
    Cir. 2015) (internal quotation marks and citation omitted).
    
    37 Jones, 565
     U.S. at 412-13.
    17
    implicated an individual’s reasonable expectation of privacy.
    Justice Sotomayor, writing separately, expressed her view
    that the Fourth Amendment inquiry turns on “whether people
    reasonably expect that their movements will be recorded and
    aggregated in a manner that enables the Government to
    ascertain, more or less at will, their political and religious
    beliefs, sexual habits, and so on.”38          Justice Alito’s
    concurrence, which was joined by three other justices, echoed
    this idea, focusing on “whether respondent’s reasonable
    expectations of privacy were violated by the long-term
    monitoring of the movements of the vehicle he drove.”39
    We do not believe that either concurrence in Jones has
    undercut In re Application in any meaningful way because of
    the different technologies at issue. Jones dealt with GPS
    tracking, not historic CSLI. In re Application expressly
    considered the differential accuracy of CSLI and GPS,
    holding that CSLI is less intrusive on individuals’ privacy
    rights than GPS tracking. Jones made no suggestion that this
    holding was erroneous.
    Goldstein admits the inexact nature of CSLI. He
    concedes that the tower which transmits the signal is
    generally, but not always, the tower closest to the cell phone.
    He further concedes that a phone may change from one tower
    to another nearby tower during a call without the phone
    having moved. Because of the less precise nature of CSLI
    38
    Id. at 416 (Sotomayor, J., concurring).
    39
    Id. at 419 (Alito, J., concurring in the judgment).
    18
    data, we are not persuaded that CSLI is sufficiently similar to
    GPS to warrant departure from In re Application.40
    Goldstein’s reading of Jones suffers from another
    flaw; four of the five justices, who engaged in an analysis of
    whether individuals have a reasonable expectation of privacy
    in their movements, expressly limited their consideration to
    areas in which Congress has not provided statutory
    protection. Justice Alito’s concurrence noted that “[i]n
    circumstances involving dramatic technological change, the
    best solution to privacy concerns may be legislative.”41 This,
    he explained, is because “[a] legislative body is well situated
    to gauge changing public attitudes, to draw detailed lines, and
    to balance privacy and public safety in a comprehensive
    40
    We do note some aspects of the testimony adduced at trial
    that suggest that the line between GPS tracking and CSLI
    records is blurring. It appears that the government used CSLI
    to track Goldstein’s movement down various interstate
    highways between New York and New Jersey. R. 3497a-
    3502a. The government’s expert explained that CSLI is no
    longer only generated at the beginning and end of each call,
    but at every point at which an individual moves closer to a
    different cell tower. R. 3497a.         The government expert
    further stated that, given the density of cell towers in New
    York and New Jersey, CSLI generated there is relatively
    precise. R. 3492a-94a. Finally, the expert noted that CSLI
    records are generated far more frequently than they used to
    be, including when an individual sends text messages or uses
    certain applications. R. 3531a-32a.
    
    41 Jones, 565
     U.S. at 429 (Alito, J., concurring in the
    judgment).
    19
    way.”42 Citing to the wiretapping statute as an example,
    Justice Alito stated that, where Congress strikes a particular
    balance between digital age privacy rights and government
    investigative interests, “regulation . . . has been governed
    primarily by statute and not by case law.”43 Justice Alito
    expressly warned against judicial creation of new privacy
    interests, cautioning that “judges are apt to confuse their own
    expectations of privacy with those of the hypothetical
    reasonable person . . ..”44
    Here, Congress has expressly weighed the privacy
    rights in digital information against government interest in
    passing the SCA.45 Justice Alito’s concurrence suggests that
    we should be wary of revisiting this balance that Congress
    has struck.46
    Accordingly, Goldstein’s readings of Jones and Riley
    do not persuade us to reconsider our own precedent, nor do
    42
    
    Id.
    43
    Id. at 428.
    44
    Id. at 427.
    45
    In re Application, 
    620 F.3d at 313-15
     (discussing the
    legislative history of the SCA). Other circuits agree with this
    determination as well. See, e.g., United States v. Carpenter,
    
    819 F.3d 880
    , 889 (6th Cir. 2016) (“Congress has specifically
    legislated on the question . . . and in doing so has struck the
    balance reflected in the [SCA].”).
    46
    Moreover, in view of the balance reflected by the statutory
    provisions for obtaining a court order under § 2703(d), we are
    particularly loathe to disregard the holding in In re
    Application based not on a direct holding of the Supreme
    Court, but on two cobbled together concurrences in Jones.
    20
    we see any independent reason to do so. While the rapidly
    evolving nature of CSLI may one day give us a reason to
    reconsider the distinction between GPS and CSLI, we decline
    to do so today. We continue to adhere to our view of In re
    Application: the Fourth Amendment is not violated when the
    government has shown “reasonable grounds to believe that
    the . . . records . . . are relevant and material to an ongoing
    criminal investigation.”47
    3.
    Goldstein argues, in the alternative, that the
    government failed to meet the “reasonable grounds” standard
    of the SCA. As noted above, the “reasonable grounds”
    standard is a lesser burden than that of probable cause, and
    “in essence is a reasonable suspicion standard.”48 We thus
    look to the totality of the circumstances to determine whether
    the government had a “particularized and objective basis” for
    believing that the CSLI would assist its investigation, mindful
    of the fact that agents are entitled “to draw on their own
    experience and specialized training to make inferences from
    and deductions about the cumulative information available to
    them . . ..”49
    47
    
    18 U.S.C. § 2703
    (d).
    48
    United States v. Daniels, 
    803 F.3d 335
    , 351 (7th Cir. 2015);
    accord In re Application of the United States of America for
    an Order Pursuant to 18 U.S.C. Section 2703(d), 
    707 F.3d 283
    , 287 (4th Cir. 2013).
    49
    United States v. Arvizu, 
    534 U.S. 266
    , 273 (2002) (citations
    omitted).
    21
    In light of this threshold, we find that the
    government’s application was more than satisfactory. The
    government presented information about the kidnapping ring,
    the charged kidnappings, and the alleged involvement of each
    defendant. In addition,, the government stated that another
    coconspirator had implicated the defendants in his statements
    to agents.50 The government then explained that its request
    was limited to CSLI records “during the time periods when
    the alleged kidnappings and attempted kidnappings occurred”
    in order to “identify the location of the alleged participants . .
    ..”51 Collectively, this information provided the government
    with reasonable grounds to believe that the records would be
    relevant to their investigation.52
    Accordingly, we will affirm the District Court’s order
    denying suppression of the CSLI records obtained pursuant to
    the SCA.
    B.
    We next turn to the arguments raised by all three
    defendants that various aspects of the prosecution violated
    RFRA. Because the motion implicates the proper scope of
    50
    SA 9.
    51
    
    Id.
    52
    The government urges us to adopt a strict rule that
    suppression of evidence is not among the remedies available
    under the SCA. Two of our sister circuits have so held. See
    Carpenter, 819 F.3d at 890; United States v. Guerrero, 
    768 F.3d 351
    , 358 (5th Cir. 2014). In light, however, of our
    holding that the government’s application satisfied the SCA,
    we need not and do not reach this question.
    22
    RFRA, we exercise plenary review.53 RFRA proscribes
    government conduct which “substantially burden[s] a
    person’s exercise of religion” unless the government can
    demonstrate, inter alia, that the burden is the “least restrictive
    means of furthering [a] compelling government interest.”54
    This proscription extends to the government’s criminal
    prosecutions under laws of general applicability; a defendant
    “may raise RFRA as a shield in the hopes of beating back the
    government’s charge.”55 The party invoking RFRA bears the
    initial burden of making out a prima facie case by showing
    that (1) it possesses a sincerely held religious belief, and (2)
    the government’s conduct substantially burdened that belief.56
    The burden then switches to the government to demonstrate
    that its conduct is the least restrictive means of furthering a
    compelling interest.57
    1.
    We agree with the District Court’s holding that the
    defendants failed to satisfy their burden of establishing that
    the government substantially burdened their religious beliefs
    by prosecuting them for kidnapping. While the government’s
    decision to prosecute the defendants undoubtedly constituted
    a burden on their sincerely held religious beliefs, the District
    53
    See, e.g., Gonzales v. O Centro Espirita Beneficente Uniao
    do Vegetal, 
    546 U.S. 418
    , 428 (2006).
    54
    42 U.S.C. § 2000bb-1.
    55
    United States v. Christie, 
    825 F.3d 1048
    , 1055 (9th Cir.
    2016).
    56
    Tagore v. United States, 
    735 F.3d 324
    , 330 (5th Cir. 2013);
    see also Adams v. Comm’r of Internal Revenue, 
    170 F.3d 173
    ,
    176 (3d Cir. 1999).
    57
    Tagore, 735 F.3d at 330; Adams, 
    170 F.3d at 176
    .
    23
    Court properly analyzed whether the burden was “substantial”
    by looking to acceptable alternative means of religious
    practice that remained available to the defendants.58 Here,
    none of the defendants argue that they are unable to
    participate in the mitzvah of liberating agunot without
    engaging in kidnapping; as the District Court noted, “it is
    unclear whether all non-violent methods were exhausted
    before the alleged kidnappings took place here.”59 The
    defendants do not challenge this determination on appeal. As
    the defendants have failed to demonstrate that the prosecution
    was a “substantial” burden, we will affirm the District Court’s
    holding that prosecution under the federal kidnapping statute
    did not violate RFRA.
    Moreover, even if the defendants had demonstrated
    that the government’s actions constituted a substantial burden
    on their religious exercise, we would nonetheless affirm the
    District Court’s determination that the government has a
    compelling interest in uniform application of laws about
    violent crimes and that no other effective means of such
    uniformity existed. The Supreme Court has advised that the
    government’s interest in preventing serious crimes “is both
    legitimate and compelling.”60 The defendants fail to cite, nor
    can we identify, any cases in which any court has allowed
    RFRA to shield individuals in the commission of violent
    crimes.
    58
    We have previously examined the adequacy of alternative
    means of practice in determining whether a religious burden
    is “substantial.” See, e.g., Washington v. Klem, 
    497 F.3d 272
    ,
    282-83 (3d Cir. 2007).
    59
    Epstein I, 91 F. Supp. 3d at 582.
    60
    United States v. Salerno, 
    481 U.S. 739
    , 749 (1987).
    24
    Accordingly, we will affirm the District Court’s denial
    of the motion to dismiss the indictment.
    2.
    We turn next to the argument raised only by Stimler
    that his joinder with Epstein and Goldstein constituted an
    independent RFRA violation. No court appears to have
    answered the question of whether RFRA imposes further
    limits on the government’s ability to structure a prosecution.
    The Supreme Court has noted that RFRA requires only that
    an individual face “serious disciplinary action”61 for acting on
    their religious beliefs. This phrase encompasses sanctions
    short of prosecution. However, Stimler’s briefing fails to
    suggest that the joinder itself was any kind of sanction, nor
    does it suggest that the joinder caused any burden on his
    religious exercise; instead, it focuses entirely on whether the
    prosecution itself worked a unique burden on Stimler’s
    religious practice. Thus, we need not determine the exact
    boundaries of RFRA here, as Stimler has not adequately
    alleged that joinder violated his rights under RFRA.
    C.
    All three defendants challenge the District Court’s
    decision under Rules 402 and 403 of the Federal Rules of
    61
    Holt v. Hobbs, 
    135 S. Ct. 853
    , 862 (2015) (second
    alteration in original). Although Holt dealt with a claim
    under the Religious Land Use and Institutionalized Persons
    Act (RLUIPA), the Supreme Court has stated that RLUIPA
    “imposes the same general test as RFRA . . ..” Burwell v.
    Hobby Lobby Stores, Inc., 
    134 S. Ct. 2751
    , 2761 (2014).
    25
    Evidence to bar admission of evidence about Orthodox
    Jewish marital law and the religious motivations for the
    kidnappings, arguing that such evidence was relevant to
    negating the specific intent required for conviction.
    Alternatively, the defendants argue that evidence of Orthodox
    Jewish laws about marital duties would be relevant to
    showing that the husbands consented to the kidnappings. We
    review a district court’s exclusion of evidence for an abuse of
    discretion, but review de novo its interpretation of the Federal
    Rules of Evidence.62
    In relevant part, the federal kidnapping statute requires
    that the kidnapping be committed “for ransom or reward or
    otherwise . . ..”63 The District Court properly read this
    language as encompassing a broad set of potential motives,
    including the religious benefit of performing a mitzvah, while
    reasoning, however, “that religious motivation simply cannot
    negate the intent to commit a crime.”64 We agree that a
    religious benefit can constitute a “benefit” under the statute.
    We will also affirm the District Court’s determination
    that the evidence of religious practices was not relevant to the
    affirmative defense of consent. The defendants argue that, by
    practicing Orthodox Judaism and signing a marriage contract,
    the husbands consented to any use of force authorized by any
    beth din. The District Court properly rejected this argument,
    reasoning that “[w]hile consent can be a defense to
    kidnapping, it has to be specific and cannot be prospective in
    62
    Hirst v. Inverness Hotel Corp., 
    544 F.3d 221
    , 225 (3d Cir.
    2008).
    63
    
    18 U.S.C. § 1201
    (a).
    64
    Epstein I, 91 F. Supp. 3d at 595.
    26
    nature.”65 The defendants do not argue that the religious
    evidence would demonstrate that the husbands gave specific
    consent to their particular kidnappings; accordingly, we agree
    that the religious evidence was not relevant to the affirmative
    defense.
    We further agree with the District Court that any
    marginal relevance that the religious evidence may have had
    was substantially outweighed by the prejudicial impact it
    would have had on the trial. Suggesting that the defendants
    acted for a religious purpose might have given rise to the
    potential for jury nullification, which we have held is
    substantially prejudicial.66
    Accordingly, we find no abuse of discretion in the
    District Court’s decision under Rules 402 and 403 to exclude
    evidence about Orthodox Jewish marital law.
    D.
    We next turn to the argument, raised by Epstein and
    Goldstein, that the District Court erred in three respects in
    charging the jury. First, they argue that the District Court
    failed to include the jurisdictional element of the kidnapping
    offense in the conspiracy instruction. Second, they contend
    that the District Court erred in refusing to charge the jury that
    kidnapping requires the victim to be held for an appreciable
    65
    Id.
    66
    See United States v. DeMuro, 
    677 F.3d 550
    , 566 (3d Cir.
    2012) (finding that it was not abuse of discretion to exclude
    evidence that “had the potential for confusion and opened the
    door to jury nullification.”).
    27
    period of time. Finally, the defendants claim that the District
    Court’s instruction as to motive constituted a constructive
    amendment of the indictment inasmuch as it did not include
    the specific religious motives charged in the indictment.
    Because the defendants did not object in the District Court,
    our review is for plain error.
    A district judge’s failure to instruct the jury as to a
    necessary element of the offense “ordinarily constitutes plain
    error”67 unless the instructions as a whole make clear to the
    jury all necessary elements of the offense.68 In determining
    whether there has been a plain error in jury instructions, we
    “consider the totality of the instructions . . ., not focusing on a
    particular paragraph in isolation.”69 Finally, even if the
    instructions omitted a necessary element in a way that would
    confuse the jury, we may nonetheless affirm if “no reasonable
    jury could find that the element was not present.”70
    We see no merit in the claim that the District Court
    failed to make clear the interstate commerce element in
    instructing the jury on the conspiracy charge. While the
    conspiracy charge included no explicit jurisdictional
    67
    United States v. Haywood, 
    363 F.3d 200
    , 207 (3d Cir.
    2004) (quoting United States v. Xavier, 
    2 F.3d 1281
    , 1287 (3d
    Cir. 1993)) (emphasis in original).
    68
    See, e.g., United States v. De Lazo, 
    497 F.2d 1168
    , 1171
    n.6 (3d Cir. 1974).
    69
    United States v. Kukafka, 
    478 F.3d 531
    , 539 (3d Cir. 2007)
    (citing United States v. Coyle, 
    63 F.3d 1239
    , 1245 (3d Cir.
    1995)).
    70
    United States v. Andrews, 
    681 F.3d 509
    , 527 (3d Cir. 2012)
    (citation omitted).
    28
    requirement, it did state that the jury would have to find that
    the defendants conspired to engage in “kidnapping, as alleged
    in the indictment.”71 The parties agree that the District Court
    included this element in the instructions as to the substantive
    kidnapping counts and in the indictment. We therefore
    conclude that the instructions as a whole made clear that the
    conspiracy charge required the jury to find a conspiracy to
    commit a kidnapping that would cross state lines.
    We similarly decline to find error in the District
    Court’s decision to not include a temporal element in the
    kidnapping instruction. Seizing on just one line in Chatwin v.
    United States, the defendants argue that federal kidnapping
    requires holding the victim “for an appreciable period.”72 We
    do not believe that the Supreme Court intended to create a
    new limit on kidnapping liability—one not found anywhere in
    the statutory text—in one line of dictum. Further, as the
    government properly notes, we have upheld jury instructions
    that do not refer to any temporal limit on kidnapping liability
    even after Chatwin.73 Indeed, we have upheld convictions
    when an individual was held for mere minutes.74 Moreover,
    even if we were to see merit in the defendants’ assertions on
    this point, we would nonetheless affirm. No reasonable juror
    71
    R. 4123a.
    72
    
    326 U.S. 455
    , 460 (1946).
    73
    See, e.g., United States v. Sriyuth, 
    98 F.3d 739
    , 750 (3d Cir.
    1996).
    74
    Cf. Government of Virgin Islands v. Ventura, 
    775 F.2d 92
    ,
    96 (3d Cir. 1985). In fact, Ventura dealt with the Virgin
    Islands aggravated kidnapping statute, under which we have
    expressly held that we must consider “the duration of the
    detention.” 
    Id. at 95
     (citation omitted).
    29
    would have failed to find that the seizure, blindfolding and
    coercion by the defendants did not involve holding for “an
    appreciable period.”
    Finally, the District Court did not constructively
    amend the indictment because, in instructing the jury, it
    actually did include the specific motive charged in the
    indictment. The defendants assert that the indictment alleged
    that the defendants’ motive was “to threaten and coerce
    Jewish husbands to give gets to their wives.”75 The District
    Court expressly stated in its instructions that “[t]he indictment
    alleges the defendants had a purpose of holding the individual
    victims to coerce them into giving a get to the victim’s
    wife.”76 In light of this instruction, and the entirety of the
    evidence produced at trial, we cannot say that there is any
    “substantial likelihood that the jury may have convicted the
    defendant for an offense differing from the offense the
    indictment . . . actually charged.” 77
    Accordingly, we reject the defendants’ challenges to
    the District Court’s jury instructions.
    E.
    Stimler and Goldstein next argue that the        District
    Court improperly responded to a question from the       jury on
    the third day of deliberations. The jury asked the      District
    Court whether “element #1 of kidnapping”—the            “seizes,
    75
    R. 174a.
    76
    R. 4128a.
    77
    United States v. Daraio, 
    445 F.3d 253
    , 260 (3d Cir. 2006)
    (emphasis added).
    30
    confines, inveigles, decoys, kidnaps, abducts, or carries away
    and holds” requirement—could be satisfied “[i]f you know
    that someone is being confined against their will and . . . do
    not intervene . . ..”78 The District Court responded that it
    “interpreted [the] question as referring to the kidnapping
    counts, counts 2 and 3. If that is accurate, then the answer to
    [the] question is no.”79 The court further told the jury that if
    they were “inquiring about any other count, please so
    indicate, so that I may more fully consider [the] question and
    answer appropriately.”80 Stimler objected to this response,
    asserting that it suggested that the conspiracy count could be
    satisfied by failure to intervene. Because Stimler properly
    objected to the response, we conduct plenary review.81 If we
    determine that the response was improper, we nonetheless
    may affirm if the error was harmless.82
    We do not agree that the District Court’s response
    improperly suggested that liability could be found upon a
    failure to intervene. The District Court expressly stated that it
    was speaking only to the substantive kidnapping counts, and
    suggested nothing about the other counts, noting that it would
    need to “more fully consider [the] question” to “answer
    appropriately” if the jurors had questions about the other
    counts. Accordingly, we find no error in the District Court’s
    response to the jury’s question.
    78
    R. 4853a.
    79
    R. 4854a.
    80
    
    Id.
    81
    United States v. Waller, 
    654 F.3d 430
    , 434 (3d Cir. 2011)
    (citation omitted).
    82
    
    Id.
    31
    F.
    Goldstein and Epstein next challenge the admission of
    certain statements made by alleged co-conspirators, arguing
    that the statements were inadmissible hearsay under the
    Federal Rules of Evidence and violated the Confrontation
    Clause. While we “review a nonconstitutional challenge to
    the admission of hearsay for abuse of discretion,” we
    “exercise plenary review over Confrontation Clause
    challenges.”83 In distinguishing when to review admission of
    evidence under the Confrontation Clause from when to
    review under the Federal Rules of Evidence, the touchstone
    of our inquiry is “whether the contested statement by an out-
    of-court declarant qualifies as testimonial . . ..”84 “[W]here
    nontestimonial hearsay is concerned, the Confrontation
    Clause has no role to play in determining the admissibility of
    a declarant’s statement.”85 A statement is testimonial only if
    it meets two requirements: (1) it is a “solemn declaration or
    affirmation made for the purpose of establishing or proving
    some fact;”86 and (2) it was made primarily for the purpose of
    “prov[ing] past events potentially relevant to later criminal
    prosecution.”87 If the contested statement is testimonial, we
    83
    United States v. Berrios, 
    676 F.3d 118
    , 125 (3d Cir. 2012)
    (internal quotation marks and citations omitted).
    84
    
    Id. at 127
    .
    85
    
    Id. at 126
    .
    86
    Melendez-Diaz v. Massachusetts, 
    557 U.S. 305
    , 310 (2009)
    (quoting Crawford v. Washington, 
    541 U.S. 36
    , 51 (2004)).
    87
    Michigan v. Bryant, 
    562 U.S. 344
    , 361 (2011) (internal
    quotation marks and citation omitted); see also Ohio v. Clark,
    
    135 S. Ct. 2173
    , 2184 (2015) (Scalia, J., concurring in the
    judgment) (formalizing two-part inquiry).
    32
    next must determine “if the defendant had a prior opportunity
    to cross-examine [the declarant].”88
    The statements at issue were testified to by Aryeh
    Ralbag. At trial, Ralbag described the statements made
    before a beth din which was convened when the alleged
    victim of one of the charged kidnappings had challenged the
    validity of the get he signed. Ralbag and two other rabbis
    presided at the beth din, and four witnesses—including
    Goldstein and Stimler—testified that Goldstein and Stimler
    had served as eid in procuring the contested get.89
    We have no trouble concluding that these statements
    were not testimonial within the meaning of the Sixth
    Amendment. It is clear that none of the individuals at the
    beth din—all of whom were charged as part of the
    conspiracy—would have reasonably believed that they were
    making statements for the purpose of assisting a criminal
    prosecution.    Accordingly, the Confrontation Clause is
    inapplicable to defendants’ challenge, and we only analyze
    whether the statements were inadmissible hearsay under the
    Federal Rules of Evidence.90
    88
    Giles v. California, 
    554 U.S. 353
    , 358 (2008).
    89
    The other two witnesses, were arrested and charged as part
    of the kidnapping ring. Ralbag was granted immunity in
    exchange for his testimony, and the other two witnesses pled
    guilty to lesser offenses.
    90
    We therefore decline to consider whether the defendants
    had an adequate opportunity to cross-examine the two other
    witnesses at the beth din, an issue which neither the
    defendants nor the government has briefed.
    33
    Rule 801 of the Federal Rules of Evidence explains
    that a statement is not hearsay if “the statement is offered
    against an opposing party and . . . was made by the party’s
    coconspirator during and in furtherance of the conspiracy.” 91
    The Rule thus imposes two predicate inquiries before a
    statement will be admitted: (1) the statement must be made
    by a coconspirator,92 and (2) the statement must be made
    during the course of and in furtherance of the conspiracy.
    Both requirements must be satisfied by a preponderance of
    the evidence.93 Goldstein and Epstein assert that neither
    requirement was met here. We disagree. The fact that the
    two other individuals were present at the warehouse as part of
    the kidnapping team, coupled with their knowledge of the
    other kidnappings, was sufficient to demonstrate that they
    were indeed coconspirators.94 Similarly, because the purpose
    of the conspiracy was broadly to secure valid gittin from
    husbands, statements by coconspirators to prove the validity
    of the gittin were clearly made during the course and in
    furtherance of the conspiracy, regardless of when they were
    91
    Fed. R. Evid. 801(d)(2)(E).
    92
    A declarant will be considered a “coconspirator” whenever
    a conspiracy existed between the declarant and the party
    against whom the statement is offered. See United States v.
    Gambino, 
    926 F.2d 1355
    , 1360 (3d Cir. 1991).
    93
    Bourjaily v. United States, 
    483 U.S. 171
    , 175-76 (1987).
    94
    The mere fact that the two other individuals were allowed
    to plead to violations of other statutes does not persuade us
    otherwise; prosecutors have broad discretion in deciding what
    to charge and what pleas to accept. See Bordenkircher v.
    Hayes, 
    434 U.S. 357
    , 368 n.2 (1978) (Blackman, J.,
    dissenting).
    34
    occurred.95   We thus find no error, constitutional or
    otherwise, in the District Court’s decision to admit the
    statements made at the beth din.
    Even if we were to assume that the statements were
    improperly admitted, however, we would nonetheless affirm
    because any error was harmless. 96 As noted, Ralbag testified
    as to statements made by four witnesses, including Goldstein
    and Stimler. The defendants do not challenge the admission
    of the statements they themselves made, which largely
    paralleled those of the other two witnesses; the statements of
    the other two witnesses, therefore, were largely duplicative,
    and any error in their admission was harmless.97
    Accordingly, we conclude that the District Court
    properly admitted the evidence.
    95
    See, e.g., United States v. Weaver, 
    507 F.3d 178
    , 185-87
    (3d Cir. 2007) (holding that statements made after the core
    acts of the conspiracy were committed were in furtherance of
    the conspiracy insofar as they were made to conceal the
    unlawful acts).
    96
    See United States v. Moreno, 
    809 F.3d 766
    , 774, 776 (3d
    Cir. 2016) (citations omitted) (noting that harmless error
    review applies to both admission of hearsay evidence and
    violations of Confrontation Clause, although the harmless
    error inquiry under the Federal Rules of Evidence is a
    “slightly less onerous standard”).
    97
    Cf. DeMuro, 
    677 F.3d at 564-65
     (noting that exclusion of
    duplicative evidence is well within the discretion of a trial
    judge).
    35
    G.
    Stimler next challenges the sufficiency of the evidence
    against him. We employ a “particularly deferential standard
    of review” to appeals challenging the sufficiency of evidence
    presented to the jury.98 In examining the sufficiency of the
    evidence, we should not “weigh the evidence or . . . determine
    the credibility of witnesses.”99 Rather, the defendant bears
    the “very heavy burden” of showing that no rational trier of
    fact could have found the essential elements of the crime
    beyond a reasonable doubt.100
    Stimler has failed to meet this burden.           The
    government presented uncontested evidence that Stimler was
    present at the site of the proposed kidnapping, and wore a
    disguise. The government next introduced evidence that
    Stimler performed countersurveillance by walking around the
    warehouse with a flashlight. On appeal, Stimler presents an
    alternative explanation of these facts. Simply disagreeing
    with the jury’s interpretation of the facts, however, is
    insufficient. We believe that the jury made a reasonable
    inference in finding that Stimler knew of the conspiracy and
    took affirmative steps to help carry it out. We therefore
    affirm his conviction.
    98
    United States v. Soto, 
    539 F.3d 191
    , 194 (3d Cir. 2008)
    (quoting United States v. Dent, 
    149 F.3d 180
    , 187 (3d Cir.
    1998)).
    99
    
    Id.
     (internal quotation marks and citation omitted).
    100
    
    Id.
     (citation omitted).
    36
    H.
    Finally, all three defendants challenge the FBI’s sting
    operation as conduct so outrageous that it violated due
    process. This claim is procedurally barred, as the defendants
    failed to make the argument in the District Court, despite full
    knowledge of the scope of the government’s investigation.
    Nor do the defendants identify any new information that
    supports their claim of outrageous government conduct. We
    have made clear that such failure waives challenges to
    allegedly outrageous government conduct.101
    Moreover, even if this argument had been preserved,
    we would see no merit to it. In reviewing claims of
    outrageous government conduct, we “repeatedly have noted
    that we are ‘extremely hesitant to find law enforcement
    conduct so offensive that it violates the Due Process
    Clause.’”102    We have rejected the argument that the
    government’s invitation to engage in criminal activity rises to
    this level where, as here, the defendants used their own
    knowledge and connections to set up and carry out the
    unlawful conduct.103 We have suggested that “the supply of
    ingredients” to commit a crime would be insufficient to meet
    101
    United States v. Salahuddin, 
    765 F.3d 329
    , 350 (3d Cir.
    2014).
    102
    United States v. Hoffecker, 
    530 F.3d 137
    , 154 (3d Cir.
    2008) (quoting United States v. Voigt, 
    89 F.3d 1050
    , 1065 (3d
    Cir. 1996)).
    103
    United States v. Lakhani, 
    480 F.3d 171
    , 182 (3d Cir.
    2007).
    37
    this standard.104 Given that Epstein first suggested the use of
    violence, and that the defendants assembled the kidnapping
    team, chose a location, and acquired their own tools, we see
    no due process violation here.
    IV.
    In our legal system, “liberty and social stability
    demand a religious tolerance that respects the religious views
    of all citizens . . ..”105 Respect for religious beliefs cannot,
    however, trump all other legitimate, and sometimes
    competing, government objectives. This appeal asks us to
    clarify the balance between religious freedom and public
    safety. The balance here clearly lies on the side of public
    safety. For the reasons stated above, we will affirm the
    District Court’s convictions of Mendel Epstein, Jay
    Goldstein, and Binyamin Stimler.
    104
    See United States v. Twigg, 
    588 F.2d 373
    , 378 (3d Cir.
    1978).
    105
    McCreary County, Kentucky v. American Civil Liberties
    Union of Kentucky, 
    545 U.S. 844
    , 860 (2005) (internal
    quotation marks and citation omitted).
    38
    RESTREPO, Circuit Judge, concurring in part and concurring
    in the judgment.
    I join parts I, II, III(A)(1), and III(B)-(H) of the
    Opinion of the Court, which address the parties’ arguments
    concerning the application of the third party doctrine to
    historical cell site location information (“CSLI”); applications
    of the federal Religious Freedom Restoration Act, 42 U.S.C.
    § 2000bb et seq., to discretionary trial procedure decisions of
    the District Court; introduction of evidence about Orthodox
    Jewish law; propriety of jury instructions and the District
    Court’s response to jury questions; admission of co-
    conspirator statements; sufficiency of evidence; and
    outrageous government conduct. However, I concur only in
    the judgment with respect to parts III(A)(2)-(3), because I
    believe that the Government obtaining 57 days of aggregated
    CSLI with only a § 2703(d) order supported by reasonable
    suspicion is, in this case, a warrantless search that violates the
    Fourth Amendment. I depart from the Majority because of
    two Supreme Court opinions that have issued since our own
    Court last considered this issue.
    I
    “[T]he holding of a panel in a precedential opinion”—
    such as that in our Court’s most recent opinion on law
    enforcement requests for CSLI, In the Matter of the
    Application of the United States for an Order Directing a
    Provider of Electronic Communication Service to Disclose
    Records to the Government, 
    620 F.3d 304
     (3d Cir. 2010) (“In
    re Application”)—“is binding on subsequent panels.” Third
    Circuit I.O.P. 9.1. This rule exists for good reason: it
    maintains uniformity of law within the Circuit, and promotes
    1
    predictability for litigants. However, if Supreme Court
    authority abrogates or calls existing Circuit precedent into
    question, our Court has recognized that subsequent panels
    may decline to follow the prior holding without reconsidering
    the issue en banc. George Harms Constr. Co., Inc. v. Chao,
    
    371 F.3d 156
    , 161 (3d Cir. 2004); see also Reich v. D.M.
    Sabia Co., 
    90 F.3d 854
    , 858 (3d Cir. 1996).
    This exception to our Internal Operating Procedures is
    narrow. When our Court has declined to follow past
    precedent on the basis of intervening Supreme Court
    authority, we typically have declined to follow only the
    specific portions of the prior precedent that the intervening
    authority has called into question or abrogated. United States
    v. Johnson, 
    587 F.3d 203
    , 207 n.4 (3d Cir. 2009); see also
    Animal Science Prods., Inc. v. China Minmetals Corp., 
    654 F.3d 462
    , 467-68 (3d Cir. 2011). I agree with the Majority
    that the third party doctrine holding of In re Application has
    not been called into question by subsequent authority.
    However, I take a different view on the ongoing vitality of the
    reasonable expectation of privacy analysis in In re
    Application, in light of Supreme Court opinions in United
    States v. Jones, 
    565 U.S. 400
     (2012), and Riley v. California,
    
    134 S.Ct. 2473
     (2014).
    Jones and Riley have “sufficiently undercut the
    decisional basis” of In re Application’s holding that
    magistrate judges can issue a § 2703(d) order for aggregated
    location information, rather than requiring a warrant, in many
    instances. West v. Keve, 
    721 F.2d 91
    , 93 (3d Cir. 1983). In
    re Application held that magistrate judges could require a
    warrant for CSLI upon considering the individual surveillance
    target’s reasonable expectation of privacy under the Fourth
    2
    Amendment. With the more recent guidance of Jones and
    Riley, I would conclude that in at least most factual
    circumstances—including those before us—magistrate judges
    must require a warrant for the aggregated collection of
    historical CSLI to comply with the Fourth Amendment.
    In Jones, law enforcement officers surreptitiously
    placed a tracking device on the bumper of a surveillance
    target’s car without a valid warrant, and collected 28 days’
    worth of global positioning system (“GPS”) location data.
    Jones, 
    565 U.S. at 403
    . The lead opinion in Jones held that
    this conduct violated the Fourth Amendment because of the
    physical trespass committed. 
    Id. at 404-05
    . In what has
    come to be regarded as the “shadow majority” of Jones,1
    however, five Justices in two concurrences disagreed with the
    reasoning of the lead opinion, which “disregards what is
    really important (the use of a GPS for the purpose of long-
    term tracking).” Jones, 
    565 U.S. at 424
     (Alito, J., concurring)
    (emphasis in original). Those Justices found a constitutional
    privacy interest implicated by aggregated tracking of an
    individual’s location over time. 
    Id. at 430
     (Alito, J.,
    1
    See, e.g., In the Matter of the Application of the
    United States of America for an Order Authorizing
    Disclosure of Historical Cell Site Information for Telephone
    Number [Redacted], 
    40 F. Supp. 3d 89
    , 92 (D.D.C. 2014)
    (rejecting a § 2703(d) application absent a showing of
    probable cause or more evidence about CSLI, because of
    “serious questions about whether the Fourth Amendment
    requires a warrant to obtain CSLI” in light of Jones).
    3
    concurring); id. at 413-14 (Sotomayor, J., concurring).2 That
    reasonable expectation of privacy reflects the intrusion that
    occurs when the Government can aggregate enough location
    data on individuals to draw inferences about their private
    lives and constitutionally protected activities. Id. at 416
    (Sotomayor, J., concurring). The concurrences place more
    weight on protecting the privacy interest itself, and, in
    particular, considering the aggregation of information
    obtained by the Government. Id. at 426 (Alito, J.,
    concurring); id. at 414 (Sotomayor, J., concurring).
    Historically, this interest has been protected in part by
    resource constraints facing law enforcement agencies—but
    those resource constraints no longer present an obstacle to
    this type of aggregation. In the past, obtaining aggregated
    location information on any individual by tracking him or her
    “for any extended period of time was difficult and costly and
    therefore rarely undertaken.” Id. at 429 (Alito, J.,
    concurring). Constant monitoring of an individual’s location
    is possible now, however, because of new technology
    “available at a relatively low cost.” Id. at 416 (Sotomayor, J.,
    concurring); id. at 429 (Alito, J., concurring). Those former
    resource constraints, however, have shaped what the Jones
    2
    Although the lead opinion in Jones resolved the case
    on the basis of physical trespass, it addressed the
    concurrences’ position that the trespass theory provided
    insufficient protection of an individual’s reasonable
    expectation of privacy by acknowledging that “[i]t may be
    that achieving the same result through electronic means,
    without an accompanying trespass, is an unconstitutional
    invasion of privacy.” Jones, 
    565 U.S. at 412
    .
    4
    shadow majority recognized as a reasonable expectation of
    privacy. Historically, “society’s expectation has been that
    law enforcement agents and others would not—and indeed, in
    the main, simply could not—secretly monitor and catalogue
    every single movement of an individual’s car for a very long
    period.” 
    Id. at 430
     (Alito, J., concurring).
    Here, in its § 2703(d) application to the Magistrate
    Judge, the Government requested location information for 57
    total days. Such a quantity of location information prompts
    exactly the question Justice Sotomayor posed in Jones:
    “whether people reasonably expect that their movements will
    be recorded and aggregated in a manner that enables the
    Government to ascertain, more or less at will, their political
    and religious beliefs, sexual habits, and so on.” Jones, 
    565 U.S. at 416
     (Sotomayor, J., concurring); see also 
    id. at 419
    (Alito, J., concurring). Five Justices in Jones would answer
    that question in the negative—at least as to aggregation
    exceeding “the 4-week mark.” 
    Id. at 430
     (Alito, J.,
    concurring); see also id at 415 (Sotomayor, J., concurring).
    The Majority declines to read the Jones concurrences
    as undercutting “In re Application in any meaningful way” in
    part “because of the different technologies at issue.” Maj.
    Op. 15. To the extent that tracking an individual’s cell phone
    by CSLI and tracking an individual’s car by GPS differ, the
    privacy interest that protects an individual from the
    Government aggregating that location information (without a
    warrant) remains the same. If anything, the reasonable
    expectation of privacy in aggregated location derived from an
    individual’s use of a cell phone is stronger than the
    reasonable expectation of privacy in aggregated location
    derived from that same individual’s use of a car. Aggregating
    5
    data points from cell phone location into a comprehensive
    record offers the Government more opportunity to infer
    things about an individual, because cell phones accompany
    individuals many places that cars do not. “Historic location
    information . . . can reconstruct someone's specific
    movements down to the minute, not only around town but
    also within a particular building.” Riley, 134 S.Ct. at 2490.
    Moreover, cell phones accompany individuals who travel by
    public transit or otherwise not by car, regular drivers who
    temporarily rent a different car, and those who ride in the cars
    of others. And regardless of how an individual moves
    through the world, “nearly three-quarters of smartphone users
    report being within five feet of their phones most of the time,
    with 12% admitting that they even use their phones in the
    shower.” Id.
    The Majority also reads the Jones shadow majority as
    not undercutting In re Application in part because of the
    distinction in precision between GPS data—at issue in
    Jones—and the CSLI at issue here. This distinction has
    nearly disappeared since we decided In re Application. By
    the time of the events at issue in this case, CSLI had grown
    quite precise, particularly in more densely-populated
    jurisdictions.3 In cities where wireless providers have more
    towers to provide service for more people packed into a given
    area, the identifiable radius in which a subscriber would
    3
    Because we consider the case on the facts before us,
    we consider CSLI as precise as it is in urban areas. It may be
    that the less precise CSLI in rural areas is so dissimilar from
    GPS location data as to make Jones inapplicable, but we need
    not consider that question.
    6
    connect to one tower rather than another is substantially
    smaller. In explaining this concept to the jury, the
    Government’s expert at trial noted that the layout of “tightly
    compacted towers in Brooklyn” “will reduce the coverage
    area of” any one tower. App. 3494a. The number of towers
    and antennas in Brooklyn, for instance, allowed the expert to
    note proximity to an antenna on “the side of a building near
    the intersection of Webster Avenue and . . . Coney Island
    Avenue.” Id. The expert also used CSLI to describe an
    individual’s “southbound movement on I-278.” App. 3499a-
    500a.
    By contrast, when the In re Application court
    considered this issue, CSLI did “not provide information
    about the location of the caller closer than several hundred
    feet.” In re Application, 
    620 F.3d at 311
    . Since then,
    wireless network improvements have included the
    distribution of “hundreds of thousands of ‘microcells,’
    ‘picocells,’ and ‘femtocells,’” which function similarly to
    hotspots and create CSLI that “can in some cases be more
    accurate than GPS.” Stephanie K. Pell & Christopher
    Soghoian, Can You See Me Now?: Toward Reasonable
    Standards For Law Enforcement Access To Location Data
    That Congress Could Enact, 
    27 Berkeley Tech. L.J. 117
    , 132
    (2012). Even the proliferation of traditional cell towers has
    resulted in smaller coverage areas and CSLI that is “far more
    accurate—in some cases as good as GPS.” Id. at 133.
    The reasonable expectation of privacy of an individual
    in an urban area in the aggregated location information of his
    or her CSLI is functionally indistinguishable from the
    reasonable expectation of privacy of that same individual in
    the aggregated location information of his or her GPS data.
    7
    Distinguishing Jones on the basis of the greater precision of
    GPS ignores the current capabilities of CSLI, and indeed, the
    use the Government made of it in this case.
    Although the Majority distinguishes Riley from the
    facts here by separating contents and metadata, Riley should
    inform our analysis of the reasonable expectation of privacy
    in CSLI, as well. The animating principle behind Riley is the
    same as the principle behind Jones: the Government may
    violate an individual’s reasonable expectation of privacy
    when it obtains too much aggregated information without a
    warrant. In Riley, decided two years after Jones, the
    aggregation at issue merely took a different form. There, the
    Supreme Court recognized that the aggregation of data
    allowed by the increased capacity of digital storage helps law
    enforcement agents make inferences that intrude on an
    individual’s reasonable expectation of privacy. The Court
    held unconstitutional a warrantless search of a cell phone, in
    part because the types of information stored on the cell phone
    in question “reveal[ed] much more in combination than any
    isolated record.” Riley, 134 S.Ct. at 2489.
    The Riley Court rejected applications of doctrine
    created for older technologies that allowed for less
    aggregation of historically protected information. The Court
    distinguished call logs on modern cell phones from pen
    registers in part on the basis that “call logs typically contain
    more than just phone numbers; they include any identifying
    information that an individual might add.” Id. at 2493.
    While cataloguing the different types of data stored on cell
    phones that had not historically been stored on landline
    telephones, the Court explained that doctrines governing
    “qualitatively different” pre-digital counterparts do not
    8
    compare well to modern technology in considering questions
    of criminal procedure. Id. at 2490, 2493. Allowing
    warrantless collection by analogy to older technologies would
    instead cause “a significant diminution of privacy.” Id. at
    2493.
    Here, technological changes since In re Application in
    the provision of wireless service mean that CSLI—like the
    phone itself, in Riley—conveys a greater quantity of
    information for the Government to aggregate than it did
    previously. The Government’s application for CSLI
    encompassed more data points than merely the location at the
    time of incoming or outgoing telephone calls. In requesting
    “[a]ll data about which ‘cell towers’ and ‘sectors’ received a
    radio signal from each cellular telephone or device assigned
    to the Account, including, but not limited to, per call
    management data or return Time from Tower data,” App. 459
    (emphasis added), the Government sought information that
    would allow for essentially continuous location tracking,
    rather than rare location snapshots. AT&T, from which the
    government sought and obtained the information, collects
    CSLI data upon call “hand-offs,” which occur when a person
    moves while on a call, and the call switches to routing
    through the next tower (or a different face of the same tower)
    as the individual gets closer to it. App. 3497a. At trial, the
    Government’s expert was able to use hand-offs during a
    defendant’s 52-second call to describe the CSLI as
    “consistent with southbound movement on I-278” from New
    York to northern New Jersey. App. 3499a-3500a. Tracking
    an individual through space during the course of a call
    represents more data to aggregate—and a correspondingly
    greater privacy intrusion—than simply collecting his or her
    location only at the origination and termination of a call.
    9
    The application also reflects the Government’s
    capability to obtain data from use of a cell phone that it could
    not typically have obtained from an individual’s use of a
    telephone, which the Riley Court regarded as a reason to
    require warrants for cell phone searches. Riley, 134 S.Ct. at
    2489. Here, the Government requested location information
    for text messages, as well. Indeed, the Government’s request
    to AT&T may stretch even more broadly than calls and
    texts—asking for data about each time a tower “received a
    radio signal,” App. 459, from a phone could conceivably
    encompass any time any application on a phone, even one
    running passively in the background, connects to the network.
    In re Application for Telephone Information Needed for a
    Criminal Investigation, 
    119 F. Supp. 3d 1011
    , 1024 (N.D.
    Cal. 2015) (affirming a magistrate judge’s denial of an
    application for CSLI under § 2703(d)). CSLI may be
    generated by an action as innocuous as a user’s email
    application passively checking for mail in the background
    without an active request that it do so by the user. Id.
    Collecting data at every radio signal—whether the origin or
    termination of a call, a call hand-off, a text message, or a data
    connection by an application—threatens an individual’s
    reasonable expectation of privacy more than collecting data at
    the origination and termination of calls only.
    For all of the foregoing reasons, I believe that the
    Government obtaining the quantity of historical CSLI it did in
    this case amounts to a search that, without a warrant,
    infringes on an individual’s reasonable expectation of privacy
    and violates the Fourth Amendment.
    10
    II
    All of this said, I would not suppress the CSLI
    evidence in this case because of the good faith exception to
    the warrant requirement. “Searches conducted in objectively
    reasonable reliance on binding appellate precedent are not
    subject to the exclusionary rule.” United States v. Katzin, 
    769 F.3d 163
    , 172-73 (3d Cir. 2014) (en banc) (quoting Davis v.
    United States, 
    564 U.S. 229
    , 231 (2011)).4 In re Application
    amounted to binding Circuit precedent that “specifically
    authorize[d the] particular police practice” at issue here.
    Davis, 
    564 U.S. at 241
    . As such, the CSLI in this case need
    not have been excluded, and I concur with the Opinion of the
    Court as to the judgment on this issue.
    4
    The Opinion of the Court and the dissents in Katzin
    disagree as to how directly a prior case must authorize
    particular law enforcement conduct to amount to “binding
    appellate precedent” on which law enforcement officers could
    rely. Compare Katzin, 769 F.3d at 174, with id. at 192-93
    (Greenaway, Jr., J., dissenting). This case presents no such
    question of directness. The Katzin dissents also pointed out
    that limiting the application of the exclusionary rule might
    lead to more occasions of law enforcement officers
    conducting searches not sanctioned by judges. See id. at 189-
    90 (Greenaway, Jr., J., dissenting). Here, agents still sought
    out the imprimatur of a neutral magistrate judge for the search
    (albeit under a lesser standard than probable cause).
    11
    III
    Despite applying the good faith exception to the
    warrant requirement in this instance, I believe that obtaining
    historical CSLI that approaches GPS-level precision,
    aggregated over at least the four week period the Jones
    shadow majority rejected—as in this case—should require a
    warrant supported by probable cause rather than a § 2703(d)
    order supported by reasonable suspicion. “Our cases have
    historically recognized that the warrant requirement is an
    important working part of our machinery of government, not
    merely an inconvenience to be somehow weighed against the
    claims of police efficiency.” Riley, 
    134 S.Ct. at 2493
    (internal quotation marks omitted). Especially where
    “[r]ecent technological advances . . . have . . . made the
    process of obtaining a warrant itself more efficient,” we need
    not sanction the rapid pace and expansive scope of
    technological change eroding important constitutional
    protections that we have enjoyed for centuries. 
    Id.
     “The
    [Fourth] Amendment and the common law from which it was
    constructed leave ample room for law enforcement to do its
    job. A warrant will always do.” U.S. v. Carloss, 
    818 F.3d 988
    , 1015 (10th Cir. 2016) (Gorsuch, J., dissenting).
    For all of the foregoing reasons, I concur only as to the
    judgment in parts III(A)(2)-(3) of the Opinion of the Court.
    12